Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

LPI 201-450 - LPIC-2 Exam 201, Part 1 of 2, version 4.5

Page: 1 / 5
Total 161 questions

In the following output from top, which processes contribute to the percentage of time that the CPU spends in the state of wa?

Tasks: 193 total, 1 running, 190 sleeping, 2 stopped, 0 zombie

Cpu(s): 0.5%us, 0.3%sy, 0.0%ni, 98.2%id, 1.0%wa, 0.0%hi, 0.0%si, 0.0%st

A.

Processes waiting for user interaction.

B.

Processes that were already closed and are waiting to be launched again.

C.

Processes that have not been scheduled yet because they haven't been fully loaded into RAM or are in swap.

D.

Processes waiting for IO operations to complete.

When is historical data of resource usage important? (Select THREE correct answers.)

A.

Predicting when resources will need to be increased.

B.

Selecting a computer vendor.

C.

Identifying processes killed during out of memory occurrences.

D.

Diagnosing capacity problems.

E.

Troubleshooting a software problem.

In the following output, the load averages represent the system load averages for what time frames?

12:10:05 up 18 days, 19:00, 2 users, load average: 0.47, 24.71, 35.31

A.

1, 5 and 15 minutes

B.

1, 15 and 30 minutes

C.

1, 15, and 30 seconds

D.

15, 30 and 60 minutes

E.

15, 30 and 60 seconds

Which commands below are useful to collect data about remote filesystem connections? (Choose TWO correct answers.)

A.

pidstat

B.

nfsiostat

C.

sadf

D.

cifsiostat

Which of the following commands will provide the PIDs of the processes sorted by which are using the most CPU cycles on the Linux system?

A.

top

B.

uptime

C.

ps aux

D.

vmstat

E.

freemem

What mechanism does collectd use to gather monitoring information on systems?

A.

It uses a library of plugins.

B.

A master server connects to a collectd service on each machine to retrieve the information.

C.

It collects its own information on each server and sends that to a master server.

D.

It makes SNMP queries to the clients being monitored.

Which of the following are common backup systems used in Linux? (Choose TWO correct answers.)

A.

Amanda

B.

Bacula

C.

DrBackup

D.

BREWBackup

E.

SARcheck

When a makefile is included in a source code package, what are commonly defined targets in the file?

A.

CFLAGS, CPPFLAGS, LIBS, LDFLAGS

B.

clean, install, uninstall

C.

PATHS, DESTDIR, LIBS, LDFLAGS

D.

prefix, exec_prefix, bindir, mandir

Which of the following commands will securely copy the directory ./fyf/ to /var/tmp/ on the remote host deltaur using the remote user account kevin?

A.

rsync -a -e ssh kevin@deltaur:/var/tmp/ fyf/

B.

rsync -a -u kevin -e ssh fyf/ deltaur:/var/tmp/

C.

rsync -a -u kevin -e ssh deltaur:/var/tmp/ fyf/

D.

rsync -a -e ssh fyf/ kevin@deltaur:/var/tmp/

Which one of these directories should not be backed up?

A.

/backup

B.

/etc

C.

/opt

D.

/proc

E.

/var/log