Which of the following commands can be used to limit the amount of memory a user may use?
A. umask
B. usermod
C. ulimit
D. passwd
E. chage
Which of the following commands connects to the remote host example.com which has OpenSSH listening on TCP port 2222? (Choose TWO correct answers.)
A. ssh --port 2222 example.com
B. ssh -p 2222 example.com
C. ssh -o Port=2222 example.com
D. ssh -o GatewayPort=2222 example.com
E. ssh example.com:2222
What is a purpose of an SSH host key?
A. It must be sent by any SSH client in addition to a user key in order to identify the client's host.
B. It provides the server's identity information to connecting SSH clients.
C. It is the root key by which all user SSH keys must be signed.
D. It authenticates any user that logs into a remote machine from the key's host.
E. It is used by system services like cron, syslog or a backup job to automatically connect to remote hosts.
Which of the following find commands will print out a list of files owned by root and with the SUID bit set in / usr?
A. find /usr -uid 0 -perm +4000
B. find -user root +mode +s /usr
C. find -type suid -username root -d /usr
D. find /usr -ls \*s\* -u root
E. find /usr -suid -perm +4000
Which of the following commands preloads and manages keys that are used for automatic authentication while logging in to other machines using SSH?
A. sshd
B. ssh-agent
C. ssh-keygen
D. ssh-add
When trying to unmount a device it is reported as being busy. Which of the following commands could be used to determine which process is causing this?
A. debug
B. lsof
C. nessus
D. strace
E. traceroute
Which configuration file would be edited to change default options for the OpenSSH server?
A. /etc/ssh/sshd_config
B. /etc/ssh/ssh
C. /etc/ssh/server
D. /etc/ssh/ssh_config
E. /etc/ssh/ssh_server
Which of the following programs uses the hosts.allow file to perform its main task of checking for access control restrictions to system services?
A. tcpd
B. inetd
C. fingerd
D. mountd
E. xinetd
Which command is used to set restrictions on the size of a core file that is created for a user when a program crashes?
A. core
B. edquota
C. ulimit
D. quota
Which of the following is a valid IPv6 address?
A. 2001:db8:3241::1
B. 2001::db8:4581::1
C. 2001:db8:0g41::1
D. 2001%db8%9990%%1
E. 2001.db8.819f..1
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Lpi exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 102-400 exam preparations and Lpi certification application, do not hesitate to visit our Vcedump.com to find your solutions here.