Practice Free 102-500 Exam Online Questions
Question #71
Which of the following information is stored in /etc/shadow for each user?
- A . The timestamp of the user’s last login
- B . The user’s private SSH keys
- C . The hashed password of the user
- D . The numerical user ID (UID)
- E . The path to the user’s home directory
Correct Answer: C
C
Explanation:
The /etc/shadow file is a text file that stores encrypted passwords, along with user name, password expiration values, and last password change date. The credential information in the shadow file is encrypted using a one-way hash function to disable decryption. The /etc/shadow file contains one entry per line for each user listed in /etc/passwd file. Each line of the /etc/shadow file contains nine comma-separated fields, and the second field is the encrypted password of the user. The password field uses the $type$salt$hashed format, where $type is the method of cryptographic hash algorithm, salt is a random string, and hashed is the result of applying the hash function to the user’s password and the salt. The /etc/shadow file is only readable by the root user, and it is used to enhance the security and control of user passwords.
The other information listed are not stored in /etc/shadow file, but in /etc/passwd file. The /etc/passwd file is a text file that contains basic information about each user account on the system. Each line of the /etc/passwd file contains seven colon-separated fields, and they are: Username: The name of the user account.
Password: An x character indicates that the encrypted password is stored in /etc/shadow file.
User ID (UID): The numerical identifier of the user account.
Group ID (GID): The numerical identifier of the primary group of the user account.
User ID Info: The comment field that can store additional information about the user, such as full name, phone number, etc.
Home Directory: The absolute path to the user’s home directory, where the user’s personal files and settings are stored.
Shell: The absolute path to the user’s default login shell, which is the program that runs when the
user logs in to the system.
Reference: Understanding the /etc/shadow File | Linuxize Understanding /etc/shadow file format on Linux – nixCraft /etc/shadow file format | Linux#
[/etc/passwd file format | Linux#]
C
Explanation:
The /etc/shadow file is a text file that stores encrypted passwords, along with user name, password expiration values, and last password change date. The credential information in the shadow file is encrypted using a one-way hash function to disable decryption. The /etc/shadow file contains one entry per line for each user listed in /etc/passwd file. Each line of the /etc/shadow file contains nine comma-separated fields, and the second field is the encrypted password of the user. The password field uses the $type$salt$hashed format, where $type is the method of cryptographic hash algorithm, salt is a random string, and hashed is the result of applying the hash function to the user’s password and the salt. The /etc/shadow file is only readable by the root user, and it is used to enhance the security and control of user passwords.
The other information listed are not stored in /etc/shadow file, but in /etc/passwd file. The /etc/passwd file is a text file that contains basic information about each user account on the system. Each line of the /etc/passwd file contains seven colon-separated fields, and they are: Username: The name of the user account.
Password: An x character indicates that the encrypted password is stored in /etc/shadow file.
User ID (UID): The numerical identifier of the user account.
Group ID (GID): The numerical identifier of the primary group of the user account.
User ID Info: The comment field that can store additional information about the user, such as full name, phone number, etc.
Home Directory: The absolute path to the user’s home directory, where the user’s personal files and settings are stored.
Shell: The absolute path to the user’s default login shell, which is the program that runs when the
user logs in to the system.
Reference: Understanding the /etc/shadow File | Linuxize Understanding /etc/shadow file format on Linux – nixCraft /etc/shadow file format | Linux#
[/etc/passwd file format | Linux#]
Question #72
Which of the following commands will help identify a broken router between the local and the
remote machine?
- A . ps
- B . netstat
- C . nslookup
- D . ifconfig
- E . traceroute
Correct Answer: E
E
Explanation:
The traceroute command will help identify a broken router between the local and the remote machine. The traceroute command sends a series of packets with increasing time-to-live (TTL) values to a destination and displays the routers that the packets pass through along the way. If a router is broken or unreachable, the traceroute command will show a * symbol or a timeout message. The traceroute command is part of the topic 109.1: Fundamentals of internet protocols, which is one of the objectives of the LPI Linux Administrator – 102 exam12.
Reference: 1: https://learning.lpi.org/en/learning-materials/102-500/ 2: https://www.lpi.org/our-certifications/exam-102-objectives/
E
Explanation:
The traceroute command will help identify a broken router between the local and the remote machine. The traceroute command sends a series of packets with increasing time-to-live (TTL) values to a destination and displays the routers that the packets pass through along the way. If a router is broken or unreachable, the traceroute command will show a * symbol or a timeout message. The traceroute command is part of the topic 109.1: Fundamentals of internet protocols, which is one of the objectives of the LPI Linux Administrator – 102 exam12.
Reference: 1: https://learning.lpi.org/en/learning-materials/102-500/ 2: https://www.lpi.org/our-certifications/exam-102-objectives/
Question #73
What output will the following command sequence produce?
echo ‘1 2 3 4 5 6’ | while read a b c; do
echo result: $c $b $a;
done
- A . result: 3 4 5 6 2 1
- B . result: 1 2 3 4 5 6
- C . result: 6 5 4
- D . result: 6 5 4 3 2 1
- E . result: 3 2 1
Correct Answer: E
E
Explanation:
The while loop reads a line from the standard input and splits it into words using the IFS variable, which by default contains spaces, tabs, and newlines. The read command assigns the first word to the variable a, the second word to the variable b, and the rest of the line to the variable c. Therefore, in this case, a=1, b=2, and c=3 4 5 6. The echo command prints the values of c, b, and a in reverse order, separated by spaces. The output is result: 3 2 1. The loop terminates after reading the first line, since there is no more input to read.
Reference: Bash while Loop | Linuxize, Bash Scripting – While Loop – GeeksforGeeks
E
Explanation:
The while loop reads a line from the standard input and splits it into words using the IFS variable, which by default contains spaces, tabs, and newlines. The read command assigns the first word to the variable a, the second word to the variable b, and the rest of the line to the variable c. Therefore, in this case, a=1, b=2, and c=3 4 5 6. The echo command prints the values of c, b, and a in reverse order, separated by spaces. The output is result: 3 2 1. The loop terminates after reading the first line, since there is no more input to read.
Reference: Bash while Loop | Linuxize, Bash Scripting – While Loop – GeeksforGeeks