LPI 010-160 Exam Questions

Questions for the 010-160 were updated on : Dec 06 ,2025

Page 1 out of 6. Viewing questions 1-15 out of 81

Question 1

Which of the following keys can be pressed to exit less?

  • A. 1
  • B. x
  • C. e
  • D. q
  • E. !
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%

Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 2

Which of the following tar options handle compression? (Choose two correct answers.)

  • A. -bz
  • B. -z
  • C. -g
  • D. -J
  • E. -z2
Answer:

BD

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%

Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 3

What is the preferred source for the installation of new applications in a Linux based operating
system?

  • A. The vendor's version management system
  • B. A CD-ROM disk
  • C. The distribution's package repository
  • D. The vendor's website
  • E. A retail store
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%

Explanation:
The distribution’s package repository is the preferred source for the installation of new applications
in a Linux based operating system. A package repository is a collection of software packages that are
maintained by the distribution and can be easily installed, updated, or removed using a package
manager. Package repositories offer several advantages, such as:
They ensure compatibility and stability with the system and other packages.
They provide security updates and bug fixes for the packages.
They reduce the risk of malware or corrupted files.
They simplify the dependency management and configuration of the packages.
The other sources are not preferred because they may not offer these benefits and may cause
problems with the system. The vendor’s version management system, the vendor’s website, or a CD-
ROM disk may contain packages that are not compatible with the distribution or may conflict with
other packages. A retail store may not have the latest or the most suitable packages for the
system. Reference:
Linux Essentials - Linux Professional Institute (LPI)
, section 1.3 Installing, Updating and Removing
Software Packages
LPI Linux Essentials Study Guide: Exam 010 v1.6, 3rd Edition
, chapter 4 Working on the Command
Line, section 4.2 Managing Software
Table of Contents - Linux Professional Institute Certification Programs
, section 1.3 Installing,
Updating and Removing Software Packages

Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 4

What are the differences between a private web browser window and a regular web browser
window? (Choose three.)

  • A. Private web browser windows do not allow printing or storing websites.
  • B. Private web browser windows do not store cookies persistently.
  • C. Private web browser windows do not support logins into websites.
  • D. Private web browser windows do not keep records in the browser history.
  • E. Private web browser windows do not send regular stored cookies.
Answer:

BDE

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%

Explanation:
A private web browser window is a mode of browsing that prevents the browser from saving your
browsing history, cookies, and other site data, or information entered in forms. However, it does not
prevent websites, your employer or school, or your internet service provider from tracking your
online activity. The main differences between a private web browser window and a regular web
browser window are:
Private web browser windows do not store cookies persistently. Cookies are small files that websites
use to store information on your device, such as your preferences, login status, or tracking data. In a
regular web browser window, cookies are stored until they expire or you delete them. In a private
web browser window, cookies are deleted when you close all private windows.
Private web browser windows do not keep records in the browser history. The browser history is a
list of web pages that you have visited in the past. In a regular web browser window, the browser
history is saved and can be accessed by anyone who uses the same device or profile. In a private web
browser window, the browser history is not saved and cannot be viewed by anyone.
Private web browser windows do not send regular stored cookies. When you visit a website in a
regular web browser window, the browser sends any cookies that are stored for that website. This
allows the website to recognize you and provide personalized content or services. When you visit a
website in a private web browser window, the browser does not send any cookies that are stored in
regular windows. This prevents the website from identifying you or linking your activity across
different sessions.
Reference:
Browse in private - Computer - Google Chrome Help
,
Browse InPrivate in Microsoft Edge -
Microsoft Support
,
Private Browsing: What Is It and How to Use It | Edge Learning Center

Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 5

How is a new Linux computing instance provisioned in an laaS cloud?

  • A. The standard Linux installer has to be run through a remote console.
  • B. After buying a Linux distribution, its vendor delivers it to a cloud instance.
  • C. The installation has to be prepared in a local virtual machine which is then copied to the cloud.
  • D. The cloud hosting organization provides a set of pre-prepared images of popular Linux distributions.
  • E. A provider-specific configuration file describing the desired installation is uploaded to the cloud provider.
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%

Explanation:
In an Infrastructure as a Service (IaaS) cloud, the provider offers virtualized computing resources
such as servers, storage, and network over the internet. The user can provision and manage these
resources according to their needs. One of the common ways to provision a new Linux computing
instance in an IaaS cloud is to use a pre-prepared image of a Linux distribution provided by the cloud
hosting organization. An image is a snapshot of a virtual machine that contains the operating system
and other software components. The user can choose from a variety of images that suit their
requirements and launch a new instance from the image. This way, the user does not have to install
and configure the Linux operating system from scratch, which saves time and effort. Some examples
of cloud hosting organizations that provide pre-prepared images of popular Linux distributions are
Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform (GCP), and
DigitalOcean. Reference:
Linux Essentials - Topic 108: Cloud Computing
and
Linux Essentials - Topic
108: Cloud Computing - Exam Objectives

Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 6

Which of the following statements is true about Free Software?

  • A. It is developed by volunteers only.
  • B. It may be modified by anyone using it.
  • C. It must always be available free of charge.
  • D. It only runs on Linux.
  • E. It is only distributed as a compiled binary.
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%

Explanation:
The correct statement about Free Software is that it may be modified by anyone using it.
This is one
of the four essential freedoms of Free Software, which are: the freedom to run the program as you
wish, for any purpose; the freedom to study how the program works, and change it so it does your
computing as you wish; the freedom to redistribute copies so you can help your neighbor; and the
freedom to distribute copies of your modified versions to others1
.
Access to the source code is a
precondition for these freedoms1
.
The other statements are false for the following reasons:
Free Software is not developed by volunteers only. It can be developed by anyone, including
individuals, companies, organizations, or communities.
Some Free Software developers are paid for
their work, while others do it as a hobby or for social benefit1
.
Free Software does not have to be available free of charge. It can be sold or given away for any
price.
The term “free” refers to the users’ freedom, not the price of the software1
.
However, Free
Software users have the freedom to redistribute copies, so they can obtain the software at no charge
from someone who has a copy1
.
Free Software does not only run on Linux. It can run on any operating system that supports it, such as
Windows, MacOS, BSD, or Android.
Linux is an example of a Free Software operating system, but not
the only one1
.
Free Software is not only distributed as a compiled binary. It can also be distributed as source code,
or both.
In fact, Free Software must provide access to the source code, otherwise the users cannot
study or modify the software1
.
Reference:
What is Free Software? - GNU Project - Free Software Foundation

Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 7

Which of the following Linux Distributions is derived from Red Hat Enterprise Linux?

  • A. Raspbian
  • B. openSUSE
  • C. Debian
  • D. Ubuntu
  • E. CentOS
Answer:

E

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%

Explanation:
CentOS is a Linux distribution that is derived from Red Hat Enterprise Linux (RHEL). CentOS stands
for Community Enterprise Operating System and it aims to provide a free, enterprise-class,
community-supported computing platform that is functionally compatible with RHEL. CentOS is one
of the most popular Linux distributions for servers and cloud computing. Raspbian, openSUSE,
Debian and Ubuntu are other Linux distributions that are not derived from RHEL, but have their own
origins and development histories. Raspbian is based on Debian and optimized for the Raspberry Pi.
openSUSE is a community project sponsored by SUSE Linux and other companies. Debian is one of
the oldest and most influential Linux distributions, and Ubuntu is derived from Debian and sponsored
by Canonical Ltd. Reference:
Linux Essentials - Linux Professional Institute (LPI) 1
Linux Essentials Version 1.6 Update - Linux Professional Institute (LPI) 2
LPI Linux Essentials Study Guide: Exam 010 v1.6, 3rd Edition 4

Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 8

Which of the following programs are web servers? (Choose two.)

  • A. Apache HTTPD
  • B. Postfix
  • C. Curl
  • D. Dovecot
  • E. NGINX
Answer:

AE

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%

Explanation:
A web server is a program that listens for requests from web browsers and serves web pages,
images, or other resources. Apache HTTPD and NGINX are two popular web servers that can run on
Linux systems. They can handle multiple protocols, such as HTTP, HTTPS, FTP, and SMTP. Postfix, Curl,
and Dovecot are not web servers, but they are related to web or network services. Postfix is a mail
transfer agent (MTA) that can send and receive emails. Curl is a command-line tool that can transfer
data from or to a web server. Dovecot is a mail delivery agent (MDA) that can store and retrieve
emails from a local mailbox. Reference:
Linux Essentials - Linux Professional Institute (LPI)
, section 1.2 Major Open Source Applications
LPI Linux Essentials 010-160 - Testprep Training Tutorials
, section 4.4 Your Computer on the Network

Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 9

Which one of the following statements concerning Linux passwords is true?

  • A. All passwords can be decrypted using the system administrator's master password.
  • B. Passwords may never start with a non-letter.
  • C. Users cannot change their password once it has been set.
  • D. Passwords are only stored in hashed form.
  • E. Passwords may be at most six characters long.
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%

Explanation:
Linux passwords are not stored in plain text, but in a scrambled or encrypted form known as a hash.
A hash is a one-way function that transforms a string of characters into a fixed-length value. The
same input always produces the same hash, but it is impossible to reverse the process and recover
the original input from the hash. This way, the system can verify the user’s password without
exposing it to anyone who can read the file where the hashes are stored. The file that contains the
password hashes is /etc/shadow, which is only readable by the root user or members of the shadow
group. The passwd utility is used to change the user’s password, which updates the hash in the
/etc/shadow file. Reference:
Linux Essentials 1.6 Topic 105: Security and File Permissions
,
How to
Change Account Passwords on Linux
,
Where is my password stored on Linux?

Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 10

Which of the following commands finds all lines in the file operating-systems.txt which contain the
term
linux, regardless of the case?

  • A. igrep linux operating-systems.txt
  • B. less -i linux operating-systems.txt
  • C. grep -i linux operating-systems.txt
  • D. cut linux operating-systems.txt
  • E. cut [Ll] [Ii] [Nn] [Uu] [Xx] operating-systems.txt
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%

Explanation:
The grep command is used to search for a pattern in a file or input. The -i option makes the search
case-insensitive, meaning that it will match both uppercase and lowercase letters. The grep
command takes the pattern as the first argument and the file name as the second argument.
Therefore, the command grep -i linux operating-systems.txt will find all lines in the file operating-
systems.txt which contain the term linux, regardless of the case. Reference:
Linux Essentials - Topic
103: Finding Linux Documentation
and
Linux Essentials - Topic 104: Command Line Basics

Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 11

Which of the following commands extracts the contents of the compressed archive file1.tar.gz?

  • A. tar -czf file1.tar.gz
  • B. ztar file1.tar.gz
  • C. tar -xzf file1.tar.gz
  • D. tar --extract file1.tar.gz
  • E. detar file1.tar.gz
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%

Explanation:
The correct command to extract the contents of the compressed archive file1.tar.gz is tar -xzf
file1.tar.gz. This command uses the following options:
-x means extract files from an archive.
-z means filter the archive through gzip, which is a compression program that reduces the size of
files.
-f means use the following archive file name, which is file1.tar.gz in this case.
The other commands are incorrect for the following reasons:
tar -czf file1.tar.gz creates a compressed archive file1.tar.gz from the files specified after the
command, not extract it.
ztar file1.tar.gz is not a valid command, as ztar is not a standard program or option for tar.
tar --extract file1.tar.gz is missing the -z option to handle the gzip compression, and also the -f option
to specify the file name.
detar file1.tar.gz is not a valid command, as detar is not a standard program or option for tar.
Reference:
Linux Essentials - Topic 106: The Linux Operating System
, section 106.2 Use single shell commands
and one line command sequences to perform basic tasks on the command line.
LPI Linux Essentials Study Guide: Exam 010 v1.6, 3rd Edition
, Chapter 5: Working with Files and
Directories, section Compressing and Archiving Files.

Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 12

Which of the following statements are true regarding a typical shell script? (Choose two.)

  • A. It has the executable permission bit set.
  • B. It starts with the two character sequence #!.
  • C. It is located in /usr/local/scripts/.
  • D. It is located in /etc/bash/scripts/.
  • E. It is compiled into a binary file compatible with the current machine architecture.
Answer:

AB

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%

Explanation:
A typical shell script is a text file that contains a series of commands or instructions that can be
executed by a shell interpreter. A shell script usually has the executable permission bit set, which
means that it can be run as a program by the user or another program. A shell script also starts with
the two character sequence #!, which is called a shebang or a hashbang. This sequence tells the
operating system which shell interpreter to use to run the script. For example, #!/bin/bash indicates
that the script should be run by the bash shell. Reference:
Linux Essentials - Linux Professional Institute (LPI) 1
Linux Essentials - Linux Professional Institute Certification Programs 2

Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 13

Which of the following commands creates the ZIP archive poems.zip containing all files in the current
directory whose names end in .txt?

  • A. zip *.txt > poems.zip
  • B. zcat *.txt poems.zip
  • C. zip poems.zip *.txt
  • D. zip cfz poems.zip *.txt
  • E. cat *.txt | zip poems.zip
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%

Explanation:
The zip command is used to create compressed archive files that can contain one or more files or
directories. The zip command takes the name of the archive file as the first argument, followed by
the names of the files or directories to be included in the archive. You can also use wildcards to
match multiple files or directories with a common pattern. For example, the command zip poems.zip
*.txt will create the ZIP archive poems.zip containing all files in the current directory whose names
end in .txt. The other commands are either invalid or do not perform the desired operation. The
command zip *.txt > poems.zip will try to create an archive for each file ending in .txt and redirect
the output to poems.zip, which is not a valid archive file. The command zcat *.txt poems.zip will try
to decompress and concatenate the contents of the files ending in .txt and poems.zip, which is not a
valid ZIP file. The command zip cfz poems.zip *.txt will fail because the options c, f, and z are not
valid for the zip command. The command cat *.txt | zip poems.zip will try to read the contents of the
files ending in .txt from the standard input and create an archive named poems.zip, but this will not
preserve the file names or attributes of the original files. Reference:
Linux Essentials - Linux Professional Institute (LPI)
, section 3.1.1
3.1 Archiving Files on the Command Line - Linux Professional Institute Certification Programs
, slide

Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 14

What is the return value of a shell script after successful execution?

  • A. 1
  • B. 0
  • C. -1
  • D. -255
  • E. 255
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%

Explanation:
The return value of a shell script after successful execution is 0. This is a convention followed by most
UNIX and Linux commands, programs, and utilities. A return value of 0 indicates that the command
or script completed successfully, without any errors. A return value of non-zero (1-255) indicates that
the command or script failed, and the value can be interpreted as an error code.
The return value of
a command or script is stored in the special variable $? and can be used to test the outcome of a
command or script123
. For example, the following script will print a message based on the return
value of the ls command:
#!/bin/bash ls if [ $? -eq 0 ]; then echo “ls command executed successfully” else echo “ls command
failed” fi
Reference: 1: Exit and Exit Status - Linux Documentation Project 2: Linux Passwd Command Help and
Examples 3
: bash - Which is the best way to check return result? - Unix & Linux Stack Exchange

Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 15

The file script.sh in the current directory contains the following content:
#!/bin/bash echo $MYVAR
The following commands are used to execute this script:
MYVAR=value
./script.sh
The result is an empty line instead of the content of the variable MYVAR. How should MYVAR be set
in order to make script.sh display the content of MYVAR?

  • A. !MYVAR=value
  • B. env MYVAR=value
  • C. MYVAR=value
  • D. $MYVAR=value
  • E. export MYVAR=value
Answer:

E

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%

Explanation:
The reason why the script.sh does not display the content of the variable MYVAR is that the variable
is not exported to the environment of the script. When a script is executed, it runs in a separate
process that inherits the environment variables from the parent process, but not the shell
variables.
A shell variable is a variable that is defined and visible only in the current shell session,
while an environment variable is a variable that is exported to the environment and visible to all
processes that run in that environment1
.
To make a shell variable an environment variable, we need to use the export command.
The export
command takes a shell variable name and adds it to the environment of the current shell and any
subshells or processes that are created from it2
. For example, to export the variable MYVAR with the
value value, we can use:
export MYVAR=value
This will make the variable MYVAR available to the script.sh when it is executed, and the script will
print the value of MYVAR as expected.
Alternatively, we can also use the export command with the -
n option to remove a variable from the environment, or with the -p option to list all the environment
variables2
.
The other options are not valid ways to set MYVAR as an environment variable. The !MYVAR=value
option is not a valid syntax for setting a variable in bash.
The env MYVAR=value option will run the
env command with the MYVAR=value argument, which will print the environment variables with the
addition of MYVAR=value, but it will not affect the current shell or the script.sh3
.
The MYVAR=value
option will set MYVAR as a shell variable, but not as an environment variable, so it will not be visible
to the script.sh1
.
The $MYVAR=value option will try to set the variable whose name is the value of
MYVAR to the value value, which is not what we want4
. Reference:
Linux Essentials Exam Objectives
, Version 1.6, Topic 103.1, Weight 2
Linux Essentials Certification Guide
, Chapter 3, Page 51-52
env(1) - Linux manual page
Bash Variables - LinuxConfig.org

Discussions
vote your answer:
A
B
C
D
E
0 / 1000
To page 2