102-500試験無料問題集「Lpi LPIC-1 Exam 102, Part 2 of 2, version 5.0 認定」
In an xinetd configuration file, which attribute specifies the network address that will be used to provide the service?
正解:
bindinterface
Explanation:
The bind attribute in an xinetd configuration file specifies the network address that will be used to provide the service. It can be either an IP address or a hostname. If the bind attribute is not specified, xinetd will listen on all available addresses on the system. The bind attribute can be used to restrict the service to a specific interface or network. For example, bind = 192.168.1.100 will only allow the service to be accessed from the 192.168.1.0/24 network. The bind attribute can also be used to provide different configurations for the same service on different addresses. For example, one can have two telnet configuration files, one with bind = 192.168.1.100 and another with bind = 192.168.2.100, to offer different access rules or options for the telnet service on each address.
Reference:
xinetd - Wikipedia
17.4. xinetd Configuration Files - Red Hat Customer Portal
How to configure xinetd ? - Red Hat Customer Portal
Explanation:
The bind attribute in an xinetd configuration file specifies the network address that will be used to provide the service. It can be either an IP address or a hostname. If the bind attribute is not specified, xinetd will listen on all available addresses on the system. The bind attribute can be used to restrict the service to a specific interface or network. For example, bind = 192.168.1.100 will only allow the service to be accessed from the 192.168.1.0/24 network. The bind attribute can also be used to provide different configurations for the same service on different addresses. For example, one can have two telnet configuration files, one with bind = 192.168.1.100 and another with bind = 192.168.2.100, to offer different access rules or options for the telnet service on each address.
Reference:
xinetd - Wikipedia
17.4. xinetd Configuration Files - Red Hat Customer Portal
How to configure xinetd ? - Red Hat Customer Portal
The presence of what file will temporarily prevent all users except root from logging into the system? (Specify the full name of the file, including path.)
正解:
etcnologin
Explanation:
The /etc/nologin file is used to prevent all users except root from logging into the system. This file is usually created by the system administrator when the system is going down for maintenance or reboot. The file can contain a message that is displayed to the users who try to log in, explaining the reason for the system shutdown. The file is automatically removed by the system when it boots up again. Reference:
LPI 102-500 Exam Objectives, Topic 104: Administrative Tasks, 104.5 Manage user accounts LPI 102-500 Study Guide, Chapter 4: User and Group Management, Section 4.3: Preventing Users from Logging In
Explanation:
The /etc/nologin file is used to prevent all users except root from logging into the system. This file is usually created by the system administrator when the system is going down for maintenance or reboot. The file can contain a message that is displayed to the users who try to log in, explaining the reason for the system shutdown. The file is automatically removed by the system when it boots up again. Reference:
LPI 102-500 Exam Objectives, Topic 104: Administrative Tasks, 104.5 Manage user accounts LPI 102-500 Study Guide, Chapter 4: User and Group Management, Section 4.3: Preventing Users from Logging In
What word is missing from the following SQL statement?
__________ count(*) from tablename;
(Please specify the missing word using lower-case letters only.)
__________ count(*) from tablename;
(Please specify the missing word using lower-case letters only.)
正解:
select
Explanation:
The missing word is select, which is the keyword used to query data from a table in SQL. The select statement has the following syntax:
select column_list from table_name where condition;
The column_list can be one or more columns separated by commas, or an asterisk () to indicate all columns. The table_name is the name of the table that contains the data. The where clause is optional and specifies a condition to filter the rows. The count() function is an aggregate function that returns the number of rows in the table or in a group. Therefore, the complete statement is:
select count(*) from tablename;
This statement will return the number of rows in the table named tablename. Reference: SQL COUNT() Function - W3Schools, SQL COUNT: The Ultimate Guide To SQL COUNT Function - SQL Tutorial, The SQL Count Function Explained With 7 Examples.
Explanation:
The missing word is select, which is the keyword used to query data from a table in SQL. The select statement has the following syntax:
select column_list from table_name where condition;
The column_list can be one or more columns separated by commas, or an asterisk () to indicate all columns. The table_name is the name of the table that contains the data. The where clause is optional and specifies a condition to filter the rows. The count() function is an aggregate function that returns the number of rows in the table or in a group. Therefore, the complete statement is:
select count(*) from tablename;
This statement will return the number of rows in the table named tablename. Reference: SQL COUNT() Function - W3Schools, SQL COUNT: The Ultimate Guide To SQL COUNT Function - SQL Tutorial, The SQL Count Function Explained With 7 Examples.