dc dotCreds
Linux Foundation Certified System Administrator

LFCS Practice Test

Start a free 30-question LFCS daily set with source-backed explanations, local progress, and a fresh rotation every morning.

30 daily web questions Source-backed explanations 7-day score history Questions updated at Apr 13, 2026, 6:30 PM CDT
LFCS icon

LFCS

Linux Foundation Certified System Administrator

Why this page works

  • Thirty focused questions every day
  • Source links on every explanation
  • Local progress saved automatically
  • Email sync path ready for later
  • Apps provide deeper drills when available
Today's 30 LFCS questions

Use this LFCS practice test to review Linux Foundation Certified System Administrator. Questions rotate daily and each explanation links to the source used to validate the answer.

Today’s Set
30 questions
Daily set rotates at 10:00 AM local time
Progress
0/30
Answered on this page session
Accuracy
0%
Loading countdown…

7-day score keeper

Answer questions today and this will become a rolling 7-day scorecard.

Local history
Optional progress sync

Keep today’s practice moving

Guest progress saves automatically on this device. Add an email later when you want a magic link that keeps your daily LFCS practice in sync across browsers.

Guest progress saves on this device automatically

Guest progress is available without an account.

150 verified questions are currently in the live bank. Questions updated at Apr 13, 2026, 6:30 PM CDT. The daily set rotates at 10:00 AM local time, and each explanation links back to the source used to write it. Use the web set for quick practice, then switch to the app when available for larger banks and deeper review.

Official exam resources

Use these official Linux Foundation resources alongside the daily practice set. They cover the provider's own exam page, study guide, or prep material.

Need adjacent Linux Foundation practice pages too? Linux Foundation practice hub.

Question 1 of 30
Objective 3.7 Storage

What is the purpose of the 'swapoff' command in Linux?

Concept tested: Storage

A. Incorrect: Mounts filesystems is incorrect because it does not answer this stem as directly as Disables swap areas.

B. Incorrect: Enables swap areas is incorrect because it does not answer this stem as directly as Disables swap areas.

C. Correct: Disables swap areas is the correct answer because 'swapoff' disables devices and files for paging and swapping. It is not used to enable or mount filesystems.

D. Incorrect: Unmounts filesystems is incorrect because it does not answer this stem as directly as Disables swap areas.

Why this matters: This matters because Storage questions test whether Disables swap areas fits the scenario's constraints, not just whether the term sounds familiar.
Question 2 of 30
Objective 1.13 Operations Deployment

Where can the location of a container's pidfile be found after it is started?

Concept tested: Operations Deployment

A. Incorrect: /etc/systemd/container.conf is incorrect because it does not answer this stem as directly as /run/containers/storage/${storage-driver}-containers/$CID/userdata/pidfile.

B. Incorrect: /var/run/docker.pid is incorrect because it does not answer this stem as directly as /run/containers/storage/${storage-driver}-containers/$CID/userdata/pidfile.

C. Correct: /run/containers/storage/${storage-driver}-containers/$CID/userdata/pidfile is the correct answer because use podman inspect to find the pidfile location at /run/containers/storage/${storage-driver}-containers/$CID/userdata/pidfile. The other options are not specific to Podman containers.

D. Incorrect: /proc/self/cgroup is incorrect because it does not answer this stem as directly as /run/containers/storage/${storage-driver}-containers/$CID/userdata/pidfile.

Why this matters: This matters because Operations Deployment questions test whether /run/containers/storage/${storage-driver}-containers/$CID/userdata/pi... fits the scenario's constraints, not just whether the term sounds familiar.
Question 3 of 30
Objective 4.5 Essential Commands

Which lsof option searches a directory tree recursively for open files?

Concept tested: Essential Commands

A. Correct: +D /path is the correct answer because the +D option recursively searches the named directory tree for open files; -i is a real lsof option for network sockets, but it does not walk a directory tree.

B. Incorrect: -i is incorrect because it does not answer this stem as directly as +D /path.

C. Incorrect: -p PID is incorrect because it does not answer this stem as directly as +D /path.

D. Incorrect: -u USER is incorrect because it does not answer this stem as directly as +D /path.

Why this matters: This matters because Essential Commands questions test whether +D /path fits the scenario's constraints, not just whether the term sounds familiar.
Question 4 of 30
Objective 5.2 Users and Groups

Which command is used to create a new local group account in Linux?

Concept tested: Users and Groups

A. Correct: groupadd is the correct answer because groupadd creates a new local group account; useradd is real and related, but it creates user accounts rather than standalone group accounts.

B. Incorrect: useradd is incorrect because it does not answer this stem as directly as groupadd.

C. Incorrect: newgrp is incorrect because it does not answer this stem as directly as groupadd.

D. Incorrect: sg is incorrect because it does not answer this stem as directly as groupadd.

Why this matters: This matters because Users and Groups questions test whether groupadd fits the scenario's constraints, not just whether the term sounds familiar.
Question 5 of 30
Objective 2.6 Networking

Which of the following files is NOT a valid configuration file for systemd-timesyncd?

Concept tested: Networking

A. Incorrect: /etc/systemd/timesyncd.conf is incorrect because it does not answer this stem as directly as /var/lib/systemd/timesyncd.conf.

B. Correct: /var/lib/systemd/timesyncd.conf is the correct answer because the valid configuration files for systemd-timesyncd include /etc/systemd/timesyncd.conf, /usr/local/lib/systemd/timesyncd.conf.d/*.conf, and others listed in the source. The file /var/lib/systemd/timesyncd.conf is not mentioned as a valid location.

C. Incorrect: /run/systemd/timesyncd.conf is incorrect because it does not answer this stem as directly as /var/lib/systemd/timesyncd.conf.

D. Incorrect: /usr/local/lib/systemd/timesyncd.conf.d/*.conf is incorrect because it does not answer this stem as directly as /var/lib/systemd/timesyncd.conf.

Why this matters: This matters because Networking questions test whether /var/lib/systemd/timesyncd.conf fits the scenario's constraints, not just whether the term sounds familiar.
Question 6 of 30
Objective 3.3 Storage

What is the purpose of the '--addtag' option in lvcreate?

Concept tested: Storage

A. Incorrect: To specify block device is incorrect because it does not answer this stem as directly as To add a tag to the logical volume.

B. Incorrect: To activate the logical volume is incorrect because it does not answer this stem as directly as To add a tag to the logical volume.

C. Incorrect: To set allocation policy is incorrect because it does not answer this stem as directly as To add a tag to the logical volume.

D. Correct: To add a tag to the logical volume is the correct answer because '--addtag Tag' is used specifically for adding tags to the logical volume. Activating, setting policies, or specifying devices are handled by other options.

Why this matters: This matters because Storage questions test whether To add a tag to the logical volume fits the scenario's constraints, not just whether the term sounds familiar.
Question 7 of 30
Objective 1.14 Operations Deployment

Which SELinux mode enforces mandatory access control policies based on Type Enforcement®?

Concept tested: Operations Deployment

A. Incorrect: permissive is incorrect because it does not answer this stem as directly as enforcing.

B. Correct: enforcing is the correct answer because enforcing mode actively enforces the defined security policy, including Type Enforcement. Permissive mode logs actions but does not enforce them.

C. Incorrect: disabled is incorrect because it does not answer this stem as directly as enforcing.

D. Incorrect: audit is incorrect because it does not answer this stem as directly as enforcing.

Why this matters: This matters because Operations Deployment questions test whether enforcing fits the scenario's constraints, not just whether the term sounds familiar.
Question 8 of 30
Objective 4.11 Essential Commands

Which command is used to change the user owner of a file in Linux?

Concept tested: Essential Commands

A. Incorrect: chgrp is incorrect because it does not answer this stem as directly as chown.

B. Correct: chown is the correct answer because the correct answer is chown because it changes the user and/or group ownership of files. Chgrp only changes the group, not the user owner.

C. Incorrect: chmod is incorrect because it does not answer this stem as directly as chown.

D. Incorrect: chattr is incorrect because it does not answer this stem as directly as chown.

Why this matters: This matters because Essential Commands questions test whether chown fits the scenario's constraints, not just whether the term sounds familiar.
Question 9 of 30
Objective 5.1 Users and Groups

Which useradd option creates the user's home directory if it does not already exist?

Concept tested: Users and Groups

A. Correct: -m is the correct answer because the -m option creates the new user home directory when needed; -s is real and useful, but it sets the login shell rather than creating the home directory.

B. Incorrect: -r is incorrect because it does not answer this stem as directly as -m.

C. Incorrect: -g GROUP is incorrect because it does not answer this stem as directly as -m.

D. Incorrect: -s SHELL is incorrect because it does not answer this stem as directly as -m.

Why this matters: This matters because Users and Groups questions test whether -m fits the scenario's constraints, not just whether the term sounds familiar.
Question 10 of 30
Objective 2.7 Networking

What ss command option would you use to display only TCP sockets that are bound but inactive?

Concept tested: Networking

A. Correct: --bound-inactive is the correct answer because the --bound-inactive option shows TCP sockets that are bound but not listening, connecting, etc. The -l option only displays listening sockets.

B. Incorrect: -l is incorrect because it does not answer this stem as directly as --bound-inactive.

C. Incorrect: -a is incorrect because it does not answer this stem as directly as --bound-inactive.

D. Incorrect: --listening is incorrect because it does not answer this stem as directly as --bound-inactive.

Why this matters: This matters because Networking questions test whether --bound-inactive fits the scenario's constraints, not just whether the term sounds familiar.
Question 11 of 30
Objective 3.1 Storage

What is the purpose of using 'pvcreate' in LVM management?

Concept tested: Storage

A. Correct: To initialize a device for use by LVM is the correct answer because 'pvcreate' initializes a Physical Volume (PV) on a device so it can be used by LVM. The other options describe actions performed by different commands, not 'pvcreate'.

B. Incorrect: To create a new logical volume is incorrect because it does not answer this stem as directly as To initialize a device for use by LVM.

C. Incorrect: To remove a physical volume is incorrect because it does not answer this stem as directly as To initialize a device for use by LVM.

D. Incorrect: To display information about physical volumes is incorrect because it does not answer this stem as directly as To initialize a device for use by LVM.

Why this matters: This matters because admin questions test whether you can map a task to the right control area before changing users, mail, security, or service settings.
Question 12 of 30
Objective 1.6 Operations Deployment

Which command allows you to schedule a single job for execution at a specific time in the future?

Concept tested: Operations Deployment

A. Incorrect: crontab is incorrect because it does not answer this stem as directly as at.

B. Incorrect: cron is incorrect because it does not answer this stem as directly as at.

C. Incorrect: batch is incorrect because it does not answer this stem as directly as at.

D. Correct: at is the correct answer because 'at' is used specifically for scheduling one-time jobs. Cron and crontab are better suited for tasks that need to be run repeatedly.

Why this matters: This matters because Operations Deployment questions test whether at fits the scenario's constraints, not just whether the term sounds familiar.
Question 13 of 30
Objective 4.10 Essential Commands

Which command would you use to add the setuid bit to a file named 'script.sh'?

Concept tested: Essential Commands

A. Incorrect: chmod 755 script.sh is incorrect because it does not answer this stem as directly as chmod u+s script.sh.

B. Incorrect: chmod g+w script.sh is incorrect because it does not answer this stem as directly as chmod u+s script.sh.

C. Correct: chmod u+s script.sh is the correct answer because the setuid bit is added with 'u+s', making the file executable as if it were run by its owner. The other options change group write permissions, adjust general file mode, or change ownership without affecting execution rights.

D. Incorrect: chown root:root script.sh is incorrect because it does not answer this stem as directly as chmod u+s script.sh.

Why this matters: This matters because Essential Commands questions test whether chmod u+s script.sh fits the scenario's constraints, not just whether the term sounds familiar.
Question 14 of 30
Objective 5.8 Users and Groups

Which configuration directive in sssd.conf is used to specify the LDAP server URI for an application domain?

Concept tested: Users and Groups

A. Correct: ldap_uri is the correct answer because the ldap_uri directive specifies the URL of the LDAP server. The other options are used for different purposes such as specifying the search base and Kerberos servers.

B. Incorrect: ldap_search_base is incorrect because it does not answer this stem as directly as ldap_uri.

C. Incorrect: auth_provider is incorrect because it does not answer this stem as directly as ldap_uri.

D. Incorrect: krb5_server is incorrect because it does not answer this stem as directly as ldap_uri.

Why this matters: This matters because Users and Groups questions test whether ldap_uri fits the scenario's constraints, not just whether the term sounds familiar.
Question 15 of 30
Objective 2.2 Networking

How would you configure a static route for IPv6 traffic to the network 2001:db8::/32 via the gateway fe80::1?

Concept tested: Networking

A. Correct: ip -6 route add 2001:db8::/32 via fe80::1 is the correct answer because 'ip -6 route' is the correct command to configure IPv6 static routes, specifying both destination and gateway. The other commands use incorrect tools or formats for IPv6 routing.

B. Incorrect: route -A inet6 add 2001:db8::/32 gw fe80::1 is incorrect because it does not answer this stem as directly as ip -6 route add 2001:db8::/32 via fe80::1.

C. Incorrect: netstat -r6 add 2001:db8::/32 via fe80::1 is incorrect because it does not answer this stem as directly as ip -6 route add 2001:db8::/32 via fe80::1.

D. Incorrect: ifconfig route6 add 2001:db8::/32 via fe80::1 is incorrect because it does not answer this stem as directly as ip -6 route add 2001:db8::/32 via fe80::1.

Why this matters: This matters because choosing ip -6 route add 2001:db8::/32 via fe80::1 separates content delivery from DNS routing, private connectivity, and general traffic acceleration.
Question 16 of 30
Objective 3.5 Storage

Which file contains static information about filesystems that can be mounted on a Linux system?

Concept tested: Storage

A. Incorrect: /etc/passwd is incorrect because it does not answer this stem as directly as /etc/fstab.

B. Correct: /etc/fstab is the correct answer because the correct answer is /etc/fstab because it contains static information about filesystems that can be mounted. The /etc/passwd file stores user account information, not filesystem details.

C. Incorrect: /proc/mounts is incorrect because it does not answer this stem as directly as /etc/fstab.

D. Incorrect: /etc/crontab is incorrect because it does not answer this stem as directly as /etc/fstab.

Why this matters: This matters because choosing /etc/fstab separates content delivery from DNS routing, private connectivity, and general traffic acceleration.
Question 17 of 30
Objective 1.2 Operations Deployment

Which ps option selects processes by process ID?

Concept tested: Operations Deployment

A. Correct: -p is the correct answer because the -p option limits ps output to specific process IDs; -u is a real process-selection option too, but it filters by user instead of PID.

B. Incorrect: -u is incorrect because it does not answer this stem as directly as -p.

C. Incorrect: -t is incorrect because it does not answer this stem as directly as -p.

D. Incorrect: -C is incorrect because it does not answer this stem as directly as -p.

Why this matters: This matters because Operations Deployment questions test whether -p fits the scenario's constraints, not just whether the term sounds familiar.
Question 18 of 30
Objective 4.9 Essential Commands

When troubleshooting a certificate issue, which OpenSSL command would you use to inspect the details of an X.509 certificate?

Concept tested: Essential Commands

A. Incorrect: openssl genrsa -out private.key 2048 is incorrect because it does not answer this stem as directly as openssl x509 -text -in cert.pem.

B. Incorrect: openssl verify -CAfile ca.crt cert.pem is incorrect because it does not answer this stem as directly as openssl x509 -text -in cert.pem.

C. Incorrect: openssl req -x509 -newkey rsa:2048 -nodes -out cert.pem -keyout key.pem is incorrect because it does not answer this stem as directly as openssl x509 -text -in cert.pem.

D. Correct: openssl x509 -text -in cert.pem is the correct answer because the x509 subcommand inspects X.509 certificate data and the -text flag prints readable certificate details; openssl verify is real and useful for trust-chain checks, but it does not dump the certificate fields for troubleshooting.

Why this matters: This matters because secure-architecture questions test the control that actually mitigates the stated risk, not a nearby security service.
Question 19 of 30
Objective 5.6 Users and Groups

How would you grant read access to the user 'lisa' on a file using setfacl?

Concept tested: Users and Groups

A. Incorrect: chmod u+r file is incorrect because it does not answer this stem as directly as setfacl -m u:lisa:r file.

B. Incorrect: getfacl -m u:lisa:r file is incorrect because it does not answer this stem as directly as setfacl -m u:lisa:r file.

C. Correct: setfacl -m u:lisa:r file is the correct answer because the correct command is setfacl -m u:lisa:r file, which grants read access to the user 'lisa'. The other options either modify permissions in a different way or change ownership rather than ACLs.

D. Incorrect: chown lisa:file is incorrect because it does not answer this stem as directly as setfacl -m u:lisa:r file.

Why this matters: This matters because Users and Groups questions test whether setfacl -m u:lisa:r file fits the scenario's constraints, not just whether the term sounds familiar.
Question 20 of 30
Objective 2.8 Networking

What directive in the sshd_config file specifies the maximum number of concurrent unauthenticated connections to the SSH server?

Concept tested: Networking

A. Incorrect: MaxSessions is incorrect because it does not answer this stem as directly as MaxStartups.

B. Incorrect: LoginGraceTime is incorrect because it does not answer this stem as directly as MaxStartups.

C. Correct: MaxStartups is the correct answer because the MaxStartups directive sets the maximum number of concurrent unauthenticated connections to the SSH server. MaxSessions controls the maximum number of simultaneous sessions per connection.

D. Incorrect: MaxAuthTries is incorrect because it does not answer this stem as directly as MaxStartups.

Why this matters: This matters because Networking questions test whether MaxStartups fits the scenario's constraints, not just whether the term sounds familiar.
Question 21 of 30
Objective 3.9 Storage

What is required in the Linux Kernel to use remote block devices such as NBD?

Concept tested: Storage

A. Incorrect: NFS (Network File System) is incorrect because it does not answer this stem as directly as NBD (Network Block Device) support.

B. Incorrect: iSCSI Initiator is incorrect because it does not answer this stem as directly as NBD (Network Block Device) support.

C. Incorrect: SMB/CIFS is incorrect because it does not answer this stem as directly as NBD (Network Block Device) support.

D. Correct: NBD (Network Block Device) support is the correct answer because the correct answer is NBD (Network Block Device) support because the Linux Kernel needs to have NBD enabled to use remote block devices like NBD. NFS, iSCSI Initiator, and SMB/CIFS are other network protocols for accessing storage but do not provide direct support for using NBD.

Why this matters: This matters because admin questions test whether you can map a task to the right control area before changing users, mail, security, or service settings.
Question 22 of 30
Objective 1.9 Operations Deployment

Which command is used to update the package lists and upgrade all installed packages in Debian?

Concept tested: Operations Deployment

A. Incorrect: yum update is incorrect because it does not answer this stem as directly as apt-get update && apt-get upgrade.

B. Correct: apt-get update && apt-get upgrade is the correct answer because use 'apt-get update && apt-get upgrade' to refresh package lists and then upgrade all installed packages. The other commands are not specific to Debian's APT system.

C. Incorrect: dpkg --configure -a is incorrect because it does not answer this stem as directly as apt-get update && apt-get upgrade.

D. Incorrect: apt-cache update is incorrect because it does not answer this stem as directly as apt-get update && apt-get upgrade.

Why this matters: This matters because Operations Deployment questions test whether apt-get update && apt-get upgrade fits the scenario's constraints, not just whether the term sounds familiar.
Question 23 of 30
Objective 4.7 Essential Commands

Which of the following is true about grep's handling of text files?

Concept tested: Essential Commands

A. Incorrect: It treats CR characters as line endings is incorrect because it does not answer this stem as directly as It removes CR characters to ensure proper regex matching.

B. Incorrect: It converts all text into uppercase for consistency is incorrect because it does not answer this stem as directly as It removes CR characters to ensure proper regex matching.

C. Correct: It removes CR characters to ensure proper regex matching is the correct answer because grep strips CR characters from the original file contents to make regular expressions with ^ and $ work correctly. The other options describe actions not supported by grep's functionality.

D. Incorrect: It ignores file type and processes everything as text is incorrect because it does not answer this stem as directly as It removes CR characters to ensure proper regex matching.

Why this matters: This matters because Essential Commands questions test whether It removes CR characters to ensure proper regex matching fits the scenario's constraints, not just whether the term sounds familiar.
Question 24 of 30
Objective 5.7 Users and Groups

What access is granted to a process with search permission on the directory containing a file when using getfacl?

Concept tested: Users and Groups

A. Incorrect: change ownership of the file is incorrect because it does not answer this stem as directly as read access to the file's ACLs.

B. Incorrect: write access to the file's mode bits is incorrect because it does not answer this stem as directly as read access to the file's ACLs.

C. Incorrect: execute access to the file itself is incorrect because it does not answer this stem as directly as read access to the file's ACLs.

D. Correct: read access to the file's ACLs is the correct answer because the correct answer is 'read access to the file's ACLs' because processes with search permission on a directory are granted read access to the ACLs within that directory. The other options pertain to different types of permissions and do not apply specifically to viewing ACLs.

Why this matters: This matters because access-control questions test whether you choose least-privilege patterns instead of broad credentials or root access.
Question 25 of 30
Objective 2.10 Networking

Which command lists the current nftables ruleset?

Concept tested: Networking

A. Correct: nft list ruleset is the correct answer because nft list ruleset displays the active nftables ruleset for review; iptables -L is a real legacy firewall command, but it does not list nftables rulesets.

B. Incorrect: iptables -L is incorrect because it does not answer this stem as directly as nft list ruleset.

C. Incorrect: ip route show is incorrect because it does not answer this stem as directly as nft list ruleset.

D. Incorrect: firewall-cmd --list-all is incorrect because it does not answer this stem as directly as nft list ruleset.

Why this matters: This matters because Networking questions test whether nft list ruleset fits the scenario's constraints, not just whether the term sounds familiar.
Question 26 of 30
Objective 3.12 Storage

Which command can be used to monitor storage I/O performance on a Linux system?

Concept tested: Storage

A. Incorrect: smartctl is incorrect because it does not answer this stem as directly as iostat.

B. Incorrect: iotop is incorrect because it does not answer this stem as directly as iostat.

C. Incorrect: hdparm is incorrect because it does not answer this stem as directly as iostat.

D. Correct: iostat is the correct answer because the iostat command is specifically designed for reporting CPU and input/output statistics, making it the best tool for monitoring storage I/O performance. While iotop provides disk I/O usage by process, hdparm tests and calibrates hard drives, and smartctl monitors drive health, none of these are as directly relevant to real-time I/O performance metrics.

Why this matters: This matters because Storage questions test whether iostat fits the scenario's constraints, not just whether the term sounds familiar.
Question 27 of 30
Objective 1.7 Operations Deployment

On systems lacking a battery-buffered Realtime Clock (RTC), what is recommended for services activated by repetitive timers?

Concept tested: Operations Deployment

A. Correct: Ensure time-sync.target is enabled is the correct answer because on systems without an RTC, it's wise to ensure that time-sync.target is enabled to synchronize system time accurately before activating services.

B. Incorrect: Disable the timer unit is incorrect because it does not answer this stem as directly as Ensure time-sync.target is enabled..

C. Incorrect: Use a different activation method is incorrect because it does not answer this stem as directly as Ensure time-sync.target is enabled..

D. Incorrect: Enable the RTC is incorrect because it does not answer this stem as directly as Ensure time-sync.target is enabled..

Why this matters: This matters because Operations Deployment questions test whether Ensure time-sync.target is enabled fits the scenario's constraints, not just whether the term sounds familiar.
Question 28 of 30
Objective 4.8 Essential Commands

What tar option allows you to extract all files into a specified directory or subdirectory named by the base name of the archive?

Concept tested: Essential Commands

A. Incorrect: --diff is incorrect because it does not answer this stem as directly as --one-top-level.

B. Incorrect: --same-owner is incorrect because it does not answer this stem as directly as --one-top-level.

C. Incorrect: --extract is incorrect because it does not answer this stem as directly as --one-top-level.

D. Correct: --one-top-level is the correct answer because the --one-top-level option extracts all files into a specified directory or subdirectory named by the base name of the archive. The --same-owner option is unrelated to specifying extraction directories.

Why this matters: This matters because Essential Commands questions test whether --one-top-level fits the scenario's constraints, not just whether the term sounds familiar.
Question 29 of 30
Objective 5.3 Users and Groups

Which option of the usermod command appends a new group to an existing list of supplementary groups for a user?

Concept tested: Users and Groups

A. Incorrect: -g, --gid is incorrect because it does not answer this stem as directly as -a, --append.

B. Correct: -a, --append is the correct answer because the -a or --append option is used to add a new group to the existing list of supplementary groups for a user. The -g option changes the user's primary group.

C. Incorrect: -s, --shell is incorrect because it does not answer this stem as directly as -a, --append.

D. Incorrect: -u, --uid is incorrect because it does not answer this stem as directly as -a, --append.

Why this matters: This matters because Users and Groups questions test whether -a, --append fits the scenario's constraints, not just whether the term sounds familiar.
Question 30 of 30
Objective 2.5 Networking

Which command would you use to check if the system clock is synchronized with an NTP service?

Concept tested: Networking

A. Correct: $ timedatectl status is the correct answer because the command $ timedatectl status provides information about the system clock synchronization. While other commands are related to time services, they do not directly show if the system clock is synchronized with an NTP service.

B. Incorrect: $ ntpq -p is incorrect because it does not answer this stem as directly as $ timedatectl status.

C. Incorrect: $ systemctl status systemd-timesyncd is incorrect because it does not answer this stem as directly as $ timedatectl status.

D. Incorrect: $ chronyc sources is incorrect because it does not answer this stem as directly as $ timedatectl status.

Why this matters: This matters because Networking questions test whether $ timedatectl status fits the scenario's constraints, not just whether the term sounds familiar.
Where to go after the daily web set

How are LFCS questions generated?

dotCreds builds LFCS practice questions from public exam objectives and Linux Foundation exam and documentation references. The questions are written for realistic study practice, not copied from exam dumps.

How are explanations sourced?

Each question includes an explanation and, when available, a source link back to the provider documentation or reference used to validate the answer. That keeps the practice tied to study material you can actually review.

What score do I get?

The page tracks today's answered count and accuracy for the 30-question daily set, then saves a 7-day score history on this device so you can see your recent practice trend.

Why use this site?

The site is the fastest way to start LFCS practice without installing anything. It is built for daily recall, quick weak-topic discovery, and source-backed explanations you can review immediately.

Why use the app when available?

The web page is the quick free sampler. If a dotCreds app is available for LFCS, the app is better for larger banks, focused weak-domain drills, longer review sessions, and mobile study routines.