Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

LPI Exam 101-500 Topic 1 Question 101 Discussion

Actual exam question for LPI's 101-500 exam
Question #: 101
Topic #: 1
[All 101-500 Questions]

A faulty kernel module is causing issues with a network interface card. Which of the following actions ensures that this module is not loaded automatically when the system boots?

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

Lorrine
2 months ago
Option A, huh? 'lsmod --remove --autoclean' without naming the module? Sounds like a great way to clean up your system... or accidentally nuke it. I'll pass on that one!
upvoted 0 times
Lasandra
28 days ago
Yeah, using modprobe to remove the module is a good approach too. Just be careful with the syntax.
upvoted 0 times
...
Virgina
1 months ago
I've used option C before and it worked fine for me. Just make sure you specify the name of the offending module.
upvoted 0 times
...
Keneth
1 months ago
I agree, it's a more controlled way to prevent the faulty module from loading automatically.
upvoted 0 times
...
Ashlee
1 months ago
I think option D is the safest bet. Adding the module to the blacklist seems like a good solution.
upvoted 0 times
...
...
Nelida
2 months ago
Hmm, Option B with modinfo seems a bit roundabout. I'd probably go for the simple blacklist route in Option D.
upvoted 0 times
Glenn
1 months ago
I think I'll go with Option D as well, thanks for the suggestion!
upvoted 0 times
...
Berry
2 months ago
Yeah, blacklisting the module is the easiest way to prevent it from loading.
upvoted 0 times
...
Heidy
2 months ago
I agree, Option D is the most straightforward solution.
upvoted 0 times
...
...
Samira
2 months ago
I'm not sure, but I think option C) Using modprobe --r followed by the name of the offending module could also work
upvoted 0 times
...
Roselle
3 months ago
Ooh, Option E sounds like an adventure! Recompiling the kernel, huh? That's a bold move, but I'm not sure I'm feeling that adventurous today.
upvoted 0 times
Cruz
2 months ago
A: Good idea, that seems like a safer option.
upvoted 0 times
...
Elvera
2 months ago
B: Yeah, I think I'll stick to adding a blacklist line in blacklist.conf.
upvoted 0 times
...
Delsie
2 months ago
A: I know, recompiling the kernel sounds intense.
upvoted 0 times
...
...
Reed
3 months ago
I agree with Cherilyn, adding the module to the blacklist is the best way to prevent it from loading automatically
upvoted 0 times
...
Paris
3 months ago
I'm leaning towards Option C. Using modprobe to remove the offending module seems like a more direct approach.
upvoted 0 times
Yuonne
2 months ago
That could work too, but modprobe seems quicker.
upvoted 0 times
...
Phil
2 months ago
But what about adding a blacklist line to blacklist.conf?
upvoted 0 times
...
Rasheeda
2 months ago
I agree, using modprobe is a direct way to remove the module.
upvoted 0 times
...
Natalie
2 months ago
I think Option C is the best choice.
upvoted 0 times
...
...
Cherilyn
3 months ago
I think the correct answer is D) Adding a blacklist line including the name of the offending module to the file /etc/modprobe.d/blacklist.conf
upvoted 0 times
...
Dahlia
3 months ago
Option D looks like the way to go. Blacklisting the pesky module in the modprobe.d config file sounds like a straightforward solution.
upvoted 0 times
Josue
2 months ago
Yeah, blacklisting the module in the config file should prevent it from loading automatically.
upvoted 0 times
...
Edmond
3 months ago
I agree, option D seems like the best choice.
upvoted 0 times
...
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77