When attempting to send a file to another user securely with GPG, which of the following actions must be done?
A. Encrypt the file using your public key.
B. Encrypt the file using their public key.
C. Encrypt the file using your private key.
D. Encrypt the file using their private key.
E. Sign the file with your public key.
In xorg.conf, which of the following sections is concerned with fonts?
A. The Fonts section
B. The Files section
C. The xfsCodes section
D. The Graphics section
E. The modeline section
Which of the following outputs will the below command sequence produce? echo ‘1 2 3 4 5 6’ | while read a b c; do echo result: $c $b $a; done
A. result: 3 4 5 6 2 1
B. result: 1 2 3 4 5 6
C. result: 6 5 4
D. result: 6 5 4 3 2 1
E. result: 3 2 1
X is running okay but an administrator is concerned that the correct color depth set is not configured. Which of the following commands will show the administrator the running color depth while in X?
E. cat /etc/X11
Which of the following words is used to restrict the records that are returned from a SELECT query based on supplied criteria for the values in the records?
Which of the following outputs will the command seq 10 produce?
A. A continuous stream of numbers increasing in increments of 10 until stopped.
B. The numbers 1 through 10 with one number per line.
C. The numbers 0 though 9 with one number per line.
D. The number 10 to standard output.
Which of the following is the purpose of the Sticky Keys feature in X?
A. To assist users who have difficulty holding down multiple keys at once
B. To prevent repeated input of a single character if the key is held down
C. To ignore brief keystrokes according to a specified time limit
D. To repeat the input of a single character
Which of the following commands can be used to activate a specific network interface?
An administrator is looking into a new script that they have just received from a senior administrator. In the very first line the administrator notices a #! followed by a path to a binary.
A. ignore the script.
B. use that binary to interpret the script.
C. use that binary to compile the script.
D. be replaced by that binary.
Which of the following commands should be used to print a listing of emails in the system’s mail queue?
A. sendmail -l
Each entry in a crontab must end with which of the following characters?
A department decided to change the Gnome Display Manager’s greeting. Which of the following configuration files should an administrator edit?
Which of the following are commonly used Mail Transfer Agent (MTA) applications? (Select THREE).
On a dual boot system, every time the system is booted back into Linux the time has been set backward by two hours. Which of the following commands will correct the problem so it will not occur again?
A. ntpdate pool.ntp.org
B. date -d ‘two hours’
C. hwclock –hctosys –localtime
D. time hwclock
Which of the following files, when using Sendmail or a similar MTA system, will allow a user to redirect all their mail to another address and is configurable by the user themselves?
Braindump2go shares the latest CompTIA LX0-102 Practice Tests Questions Freely