New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

LPI 010-160 Exam - Topic 11 Question 12 Discussion

Actual exam question for LPI's 010-160 exam
Question #: 12
Topic #: 11
[All 010-160 Questions]

Which statements about the directory /etc/skel are correct? (Choose two.)

Show Suggested Answer Hide Answer
Suggested Answer: C, D

Contribute your Thoughts:

0/2000 characters
Beata
4 months ago
Totally agree with C, it's all about user creation!
upvoted 0 times
...
Goldie
4 months ago
Wait, are you sure about D?
upvoted 0 times
...
Deeann
4 months ago
A is a myth, root's settings aren't in /etc/skel.
upvoted 0 times
...
Marjory
4 months ago
B is wrong, it's not about starting the system.
upvoted 0 times
...
Alonzo
5 months ago
C is definitely correct!
upvoted 0 times
...
Phillip
5 months ago
I’m confused about option A; I thought root's settings were stored elsewhere, but I can't recall where exactly.
upvoted 0 times
...
Georgiann
5 months ago
I practiced a question similar to this, and I think option D is also correct since it mentions the useradd command.
upvoted 0 times
...
Mariann
5 months ago
I'm not entirely sure, but I feel like option B might be related to how user profiles are set up during installation.
upvoted 0 times
...
Daniela
5 months ago
I think option C is correct because I remember that /etc/skel is used when creating new user accounts.
upvoted 0 times
...
Nickole
5 months ago
Hmm, I'm a bit confused about the differences between component-based services, SOAP-based services, and REST services. I'll need to review my notes on that.
upvoted 0 times
...
Maryann
5 months ago
I think the term we're looking for might be "data mining," but I'm not completely sure. It just seems to fit the context of analyzing data patterns.
upvoted 0 times
...
Scarlet
5 months ago
I think option A sounds familiar from our studies on management representation letters. It was highlighted as a standard assurance regarding subsequent events.
upvoted 0 times
...
Lashandra
5 months ago
If I recall correctly, constraining user access in Alfresco could help, but it might not be enough for securing the HTTP API itself.
upvoted 0 times
...

Save Cancel