Exam Details

  • Exam Code
    :LX0-102
  • Exam Name
    :CompTIA Linux+ [Powered by LPI] Exam 2
  • Certification
    :CompTIA Linux+
  • Vendor
    :CompTIA
  • Total Questions
    :177 Q&As
  • Last Updated
    :Mar 31, 2025

CompTIA CompTIA Linux+ LX0-102 Questions & Answers

  • Question 71:

    Which of the following statements is true regarding the following /etc/resolv.conf file?

    search example.com nameserver 208.77.188.166 nameserver 208.77.188.167

    A. There is a syntax error.

    B. If DNS queries to the localhost fail, the server 208.77.188.166 will be queried.

    C. example.com will be appended to all host lookups.

    D. example.com will be appended to host names when they do not contain dots.

    E. The DNS server with the shortest ping time will be queried first. If the lookup fails, the second server will be queried.

  • Question 72:

    How is the file format of /etc/crontab different from a normal crontab file? (Select TWO).

    A. The /etc/crontab file can specify a year field.

    B. A normal crontab file must be installed with the crontab command.

    C. A normal crontab file allows for environment variable substitution.

    D. The /etc/crontab file has a user field for commands.

  • Question 73:

    Which of the following is the main difference between the batch and at commands?

    A. The batch command will run multiple times.The at command will only run once.

    B. The batch command will run when system load is low. The at command runs at a specific time.

    C. The at command reads commands from standard input. The batch command requires a command line argument.

    D. The at command emails results to the user. The batch command logs results to syslog.

  • Question 74:

    Which of the following configurations file does sudo read when determining if a user is permitted to run applications with root privileges?

    A. /etc/audit.conf

    B. /etc/shadow

    C. /etc/sudo.conf

    D. /etc/sudoers

  • Question 75:

    When generating new authentication keys with SSH for a user, where should the private key be kept?

    A. On any trusted system from which the user will login.

    B. On a CD-ROM or USB stick.

    C. Printed and kept in a secure place.

    D. Only on the computer where the key was created.

    E. SSH does not use private keys.

  • Question 76:

    Which of the following benefits does an alias in bash provide?

    A. It provides faster lookups for commands in the system directory.

    B. It creates a local copy of a file from another directory.

    C. It hides what command you are running from others.

    D. It allows a string to be substituted for the first word of a simple command.

  • Question 77:

    An administrator is looking into a new script they received from a senior executive. In the very first line the administrator notices a #! followed by a file path. This indicates that:

    A. the file at that location was used to make the script.

    B. this script provides identical functionality as the file at that location.

    C. this script will self-extract into a file at that location.

    D. the program at that location will be used to process the script.

  • Question 78:

    Why is the xhost program considered dangerous to use?

    A. It makes it difficult to uniquely identify a computer on the network.

    B. It allows easy access to your X server by other users.

    C. It logs sensitive information to syslog.

    D. It makes your computer share network resources without any authentication.

    E. It is a graphical DNS tool with known exploits.

  • Question 79:

    Of the ways listed, which is the best method to temporarily suspend a user's ability to interactively login?

    A. Use passwd -d username to give the user an empty password.

    B. Use chage to expire the user account.

    C. Change the user's password.

    D. Add the command exit to the user's .login file.

  • Question 80:

    Which of the following is the conventional purpose of Linux UIDs that are lower than 100?

    A. They are reserved for super user accounts.

    B. They are reserved for the system admin accounts.

    C. They are reserved for system accounts.

    D. They are unused, aside from 0, because they are targets of exploits.

    E. They are used to match with GIDs in grouping users.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your LX0-102 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.