LPI 102-500 Exam (page: 6)
LPI C-1 Exam 102, Part 2 of 2, version 5.0
Updated on: 15-Feb-2026

Viewing Page 6 of 31

What is the purpose of the Sticky Keys feature in X?

  1. To assist users who have difficulty holding down multiple keys at once
  2. To prevent repeated input of a single character if the key is held down
  3. To ignore brief keystrokes according to a specified time limit
  4. To repeat the input of a single character

Answer(s): A

Explanation:

The Sticky Keys feature in X is an accessibility option that allows users to press modifier keys (such as Ctrl, Alt, Shift, or the Windows key) one at a time, instead of holding them down simultaneously, to perform keyboard shortcuts. For example, to copy something, a user can press Ctrl, release it, and then press C, instead of pressing Ctrl+C together. This can be helpful for users who have difficulty pressing multiple keys at once, or who prefer not to do so.


Reference:

https://www.howtogeek.com/739764/how-to-turn-off-sticky-keys-on-windows-10/ https://geekflare.com/using-sticky-keys-in-windows/



Why is the xhost program considered dangerous to use?

  1. It makes it difficult to uniquely identify a computer on the network.
  2. It allows easy access to your X server by other users.
  3. It logs sensitive information to syslog.
  4. It makes your computer share network resources without any authentication.
  5. It is a graphical DNS tool with known exploits.

Answer(s): B

Explanation:

The xhost program is used to add and delete host names or user names to the list allowed to make connections to the X server1. In the case of hosts, this provides a rudimentary form of privacy control and security. It is only sufficient for a workstation (single user) environment, although it does limit the worst abuses1. However, if xhost is used to grant access to everyone, even if they aren't on the list (i.e., access control is turned off), then any user on the network can connect to your X server and monitor your keystrokes, capture your screen, or run malicious programs2. This is why xhost is considered dangerous to use and should be avoided in favor of more secure methods, such as xauth or ssh23.


Reference:

xhost linux command man page - commandlinux.com
Linux Xhost Command Help and Examples - Computer Hope xhost(1) -- Arch manual pages



An administrator wants to determine the geometry of a particular window in X, so she issues the __________ -metric command and then clicks on the window.

  1. /usr/bin/xwininfo,
    xwininfo

Answer(s): A

Explanation:

The xwininfo command is a utility for displaying information about windows in X. It can show various attributes of a window, such as its location, size, depth, border width, visual class, colormap, map state, and event masks. The -metric option specifies that all dimensions should be displayed in metric units (millimeters) rather than pixels. By issuing the xwininfo -metric command and then clicking on a window, the administrator can determine the geometry of that window, including the decorations, in millimeters.


Reference:

xwininfo(1) -- Arch manual pages
[command line -



On a system running the KDE Display Manager, when is the /etc/kde4/kdm/Xreset script automatically executed?

  1. When KDM starts
  2. When a user's X session exits
  3. When KDM crashes
  4. When X is restarted
  5. When X crashes

Answer(s): B

Explanation:

The /etc/kde4/kdm/Xreset script is a script that runs as root after a user's X session exits. It can be used to perform some cleanup tasks or other actions that need to be done when the user logs out of the graphical environment. For example, it can reassign the ownership of the console to root, or shut down the system if desired. The /etc/kde4/kdm/Xreset script is part of the KDE Display Manager (kdm), which is a graphical login manager for X. KDM can be configured to run this script by setting the Reset key in the [X-*-Core] section of the /etc/kde4/kdm/kdmrc configuration file.


Reference:

kdm.options - configuration options for X display manager kdm(1) -- kdm -- Debian jessie -- Debian Manpages debian - How to get system to shutdown when Xorg is quit? - Unix ...



Which of the following lines is an example of a correct setting for the DISPLAY environment variable?

  1. hostname:displayname
  2. hostname:displaynumber
  3. hostname/displayname
  4. hostname/displaynumber
  5. hostname

Answer(s): B

Explanation:

The correct format for the DISPLAY environment variable is hostname:displaynumber.screennumber, where hostname is the name of the computer where the X server runs, displaynumber is a sequence number (usually 0) that identifies a display, and screennumber is the number of the screen within that display (usually 0). The screennumber can be omitted if it is 0. For example, localhost:0 or myhost:1.0 are valid values for the DISPLAY variable. The other options are either missing the colon, using the wrong separator, or not specifying the display number.


Reference:

X11 - DISPLAY (environment variable) - Datacadamia x11 - How can I specify a display? - Stack Overflow
What is the $DISPLAY environment variable? - Ask Ubuntu



Which of the following steps prevents a user from obtaining an interactive login session?

  1. Run the command chsh -s /bin/false with the user name.
  2. Set the UID for the user to 0.
  3. Remove the user from the group staff.
  4. Add the user to /etc/noaccess.
  5. Create a .nologin file in the user's home directory.

Answer(s): A

Explanation:

Running the command chsh -s /bin/false with the user name will change the user's login shell to /bin/false, which is a program that does nothing and returns a non-zero exit code. This means that the user will not be able to execute any commands or start an interactive shell session. This is a common way to disable a user's login without disabling the account completely, which can be useful for users who only need to access the system via scp, sftp, or other non-interactive services.

However, this method does not prevent the user from authenticating with the system, and it may not work with some services that do not rely on the login shell, such as ssh with a forced command. Therefore, it is not a foolproof way to secure the system from unauthorized access.


Reference:

1234



Which file specifies the user accounts that can NOT submit jobs via at or batch? (Provide the full path and filename)

  1. /etc/at.deny

Answer(s): A

Explanation:

The /etc/at.deny file specifies the user accounts that can NOT submit jobs via at or batch. The format of the file is a list of usernames, one on each line.
Whitespace is not permitted. The superuser may always use at. If the file /etc/at.allow exists, only usernames mentioned in it are allowed to use at. If /etc/at.allow does not exist, /etc/at.deny is checked12. The at and batch commands use the files /usr/lib/cron/at.allow and /usr/lib/cron/at.deny to restrict usage on some systems3.


Reference:

at.allow(5) - Linux man page at.deny(5) [linux man page] - The UNIX and Linux Forums
The at.allow and at.deny files - IBM



Which character in the password field of /etc/passwd is used to indicate that the encrypted password is stored in /etc/shadow?

  1. *
  2. -
  3. s
  4. x

Answer(s): D

Explanation:

The password field of /etc/passwd is used to store the user's encrypted password or a special character that indicates how the password is stored. In older Linux systems, the user's encrypted password was stored in the /etc/passwd file. On most modern systems, this field is set to x, and the user password is stored in the /etc/shadow file12. The /etc/shadow file is more secure than the /etc/passwd file because it is readable only by the root user and not by regular users1. The other options are not valid characters for the password field of /etc/passwd.


Reference:

Understanding the /etc/passwd File | Linuxize
Understanding the /etc/passwd File - GeeksforGeeks



Viewing Page 6 of 31



Share your comments for LPI 102-500 exam with other users:

Nasir Mahmood 12/11/2023 7:32:00 AM

looks usefull
Anonymous


Jason 9/30/2023 1:07:00 PM

question 81 should be c.
CANADA


TestPD1 8/10/2023 12:22:00 PM

question 18 : response isnt a ?
EUROPEAN UNION


ally 8/19/2023 5:31:00 PM

plaese add questions
TURKEY


DIA 10/7/2023 5:59:00 AM

is dumps still valid ?
FRANCE


Annie 7/7/2023 8:33:00 AM

thanks for this
EUROPEAN UNION


arnie 9/17/2023 6:38:00 AM

please upload questions
Anonymous


Tanuj Rana 7/22/2023 2:33:00 AM

please upload the question dump for professional machinelearning
Anonymous


Future practitioner 8/10/2023 1:26:00 PM

question 4 answer is c. this site shows the correct answer as b. "adopt a consumption model" is clearly a cost optimization design principle. looks like im done using this site to study!!!
Anonymous


Ace 8/3/2023 10:37:00 AM

number 52 answer is d
UNITED STATES


Nathan 12/17/2023 12:04:00 PM

just started preparing for my exam , and this site is so much help
Anonymous


Corey 12/29/2023 5:06:00 PM

question 35 is incorrect, the correct answer is c, it even states so: explanation: when a vm is infected with ransomware, you should not restore the vm to the infected vm. this is because the ransomware will still be present on the vm, and it will encrypt the files again. you should also not restore the vm to any vm within the companys subscription. this is because the ransomware could spread to other vms in the subscription. the best way to restore a vm that is infected with ransomware is to restore it to a new azure vm. this will ensure that the ransomware is not present on the new vm.
Anonymous


Rajender 10/18/2023 3:54:00 AM

i would like to take psm1 exam.
Anonymous


Blessious Phiri 8/14/2023 9:53:00 AM

cbd and pdb are key to the database
SOUTH AFRICA


Alkaed 10/19/2022 10:41:00 AM

the purchase and download process is very much streamlined. the xengine application is very nice and user-friendly but there is always room for improvement.
NETHERLANDS


Dave Gregen 9/4/2023 3:17:00 PM

please upload p_sapea_2023
SWEDEN


Sarah 6/13/2023 1:42:00 PM

anyone use this? the question dont seem to follow other formats and terminology i have been studying im getting worried
CANADA


Shuv 10/3/2023 8:19:00 AM

good questions
UNITED STATES


Reb974 8/5/2023 1:44:00 AM

hello are these questions valid for ms-102
CANADA


Mchal 7/20/2023 3:38:00 AM

some questions are wrongly answered but its good nonetheless
POLAND


Sonbir 8/8/2023 1:04:00 PM

how to get system serial number using intune
Anonymous


Manju 10/19/2023 1:19:00 PM

is it really helpful to pass the exam
Anonymous


LeAnne Hair 8/24/2023 12:47:00 PM

#229 in incorrect - all the customers require an annual review
UNITED STATES


Abdul SK 9/28/2023 11:42:00 PM

kindy upload
Anonymous


Aderonke 10/23/2023 12:53:00 PM

fantastic assessment on psm 1
UNITED KINGDOM


SAJI 7/20/2023 2:51:00 AM

56 question correct answer a,b
Anonymous


Raj Kumar 10/23/2023 8:52:00 PM

thank you for providing the q bank
CANADA


piyush keshari 7/7/2023 9:46:00 PM

true quesstions
Anonymous


B.A.J 11/6/2023 7:01:00 AM

i can“t believe ms asks things like this, seems to be only marketing material.
Anonymous


Guss 5/23/2023 12:28:00 PM

hi, could you please add the last update of ns0-527
Anonymous


Rond65 8/22/2023 4:39:00 PM

question #3 refers to vnet4 and vnet5. however, there is no vnet5 listed in the case study (testlet 2).
UNITED STATES


Cheers 12/13/2023 9:55:00 AM

sometimes it may be good some times it may be
GERMANY


Sumita Bose 7/21/2023 1:01:00 AM

qs 4 answer seems wrong- please check
AUSTRALIA


Amit 9/7/2023 12:53:00 AM

very detailed explanation !
HONG KONG