100

Description

My_tests Quiz on 100, created by Arturo Carmona on 24/01/2019.
Arturo Carmona
Quiz by Arturo Carmona, updated more than 1 year ago
Arturo Carmona
Created by Arturo Carmona over 5 years ago
507
2

Resource summary

Question 1

Question
This MDADM output: Which two aspects can be determined from this output?
Answer
  • A device failed and has been removed from this RAID set.
  • It is no longer possible to write to this RAID set.
  • Read and write performance is no longer optimal on this RAID set.
  • This RAID set was built without a spare device.
  • Only Write performance is no longer optimal on this RAID set.

Question 2

Question
Examine the command on its output: [root@FAROUT ~] # modprobe -v nfs insmod /lib/modules/2.6.39-100.0.12.e16uek.x86_64/kernel/fs/nfs_common/nfs_acl.ko insmod /lob/modules/2.6.39-100.0.12.e16uek.x86_64/kernel/net/sunrpc/auth_gss/auth_rpcgss.ko insmod /lib/modules/2.6.39-100.0.12.e16uek.x86_64/kernel/fs/fscache/fscache/ko insmod /lib/modules/2.6.39-100.0.12.e16uek.x86_64/kernel/fs/locked.ko insmod /lib/modules/2.6.39-100.0.12.e16uek.x86_64/kernel/fs/nfs/nfs.ko Which two statements are true about the modprobe command?
Answer
  • It will load the nfs module if all the modules upon which it depends have been loaded.
  • It displays the dependency resolution for the nfs module and loads all the modules upon which nfs depends before loading the nfs module.
  • It verifies that the nfs module and all other modules that depend on the nfs module are installed.
  • It displays the dependency resolution that would occur if the nfs module were to be loaded using modprobe nfs.
  • It only loads the nfs module if all the modules upon which it depends have not been loaded yet.

Question 3

Question
What is the main advantage of the Oracle Unbreakable Enterprise Kernel compared with the Red Hat compatible kernel?
Answer
  • It is more secure and, therefore, more difficult to hack.
  • It has a lower Mean Time Between Failures.
  • It provides higher availability for applications by reducing Mean Time to Recovery.
  • It scales better for more CPUS, memory, and Infiniband network connections.

Question 4

Question
Examine this output: # df -t nfs FilesystemSizeUsedAvailUse%Mounted on o16:export30G21G7.6G74%/mnt # 1s -1 /mnt/nfs.sh -rwxr-mr-x. 1 root root 22 May 8 16:37 /mnt/nfs.sh # file /mnt/nfs.sh /mnt/nfs.sh: Bourne-Again shell script text executables # /mnt/nfs.sh bash: /mnt/nfs.sh: Permission denied What is the reason for the error?
Answer
  • The file system was exported on host o16 using the ROOT_SQUASH option.
  • The /export filesystem was mounted with the NOEXEC option on host o16.
  • The filesystem mounted on /mnt was mounted with the NOEXEC option.
  • The filesystem was exported on host o16 by using the NO_ROOT_SQUASH option.

Question 5

Question
Which two software packages are prerequisites for enabling the configuration and use of a Network information Service (Nis) client?
Answer
  • nis-tools
  • slapi-nis
  • ypbind
  • nisserv
  • nisbind
  • yp-tools

Question 6

Question
Which two Statements are true concerning the configuration and use of cron and anacron?
Answer
  • Anacron jobs are used to make sure cron jobs run if the system had been down when they were meant to run.
  • All crontabs are held in the /etc/cron.d directory.
  • Cron jobs may run as frequently as once a minute.
  • Anacron jobs may run as frequently as once a minute.
  • The crond daemon looks for jobs only in /etc/crontab.

Question 7

Question
You recently updated the strace package to the latest version as shown: What is the outcome of running this command?
Answer
  • It downgrades the strace package to version 4.5.19-1.6.e16.
  • It downgrades strace package to version 4.5.19-1.11.e16_3.2.
  • It fails with an error because you cannot downgrade a package using the yum command.
  • It fails with an error because there are multiple versions available to which Yum can downgrade the strace package.
  • It will prompt you to select a version of the strace package that you want to downgrade.

Question 8

Question
Which statement is true concerning the /etc/sysconfig directory and its files and subdirectories?
Answer
  • The contents are always the same for a specific version of the Oracle Linux Kernel.
  • The file /etc/sysconfig/init is used by upstart to control the attributes of the tty devices that get started.
  • The directory /etc/sysconfig/network-scripts contains files that must not be modified while the network is up.
  • The files only contain default values for certain daemon processes.

Question 9

Question
Examine the routing table: Which three statements are true concerning the routing of IP packets?
Answer
  • Traffic to 192.168.180.180 is routed via eth1.
  • Traffic to 192.168.180.240 is routed via eth1.
  • Traffic to 192.168.0.42 is routed via eth2.
  • Traffic to 192.168.42.42 is routed via eth2.
  • Traffic to 192.168.42.42 is routed via eth0.
  • Traffic to 192.168.180.180 is routed via eth0.

Question 10

Question
You have a single network adapter called eth0. DEVICE = eth0 BOOTPROTO=DHCP HWADR=BC:305B:C5:63;F1 NM_CONTROLLED=no ONBOOT=YES TYPE=Ethernet PEERDNS=no UUID=C9dba2e8-9faf-4b77-bbe2-92dd81dda1f9 Which two statements are true concerning eth0 based on this configuration?
Answer
  • DHCP is used to obtain a lease on an IP address.
  • The dhclient command may only be used to obtain a lease at boot time.
  • dhclient does not override the contents of /etc/resolv.conf.
  • DNS is not used to resolve host names for this adapter.
  • dhclient overrides the contents of /etc/resolv.conf.

Question 11

Question
Which four statements are true about the proc and sysfs filesystem?
Answer
  • The sysfs filesystem contains information about processes.
  • The proc filesystem contains information about CPUs.
  • The proc filesystem contains information about memory.
  • The sysfs filesystem contains information about CPUs.
  • The sysfs filesystem contains information about memory.
  • The proc filesystem contains information about the installer parameters.

Question 12

Question
You want sendmail to deliver mail for these users: John.smith@acme.comto mailbox jsmith1 John.smith@foo.comto mailbox jsmith2 John.smith@bar.comto mailbox jsmith3 In which sendmail configuration database can this requirement be defined?
Answer
  • /etc/aliases
  • /etc/mail/userdb
  • /etc/mail/virtusertable
  • /etc/mail/domaintable
  • /etc/mail/genericstable

Question 13

Question
What is the purpose of Setting AUTOINSTALL to YES /etc/uptrack.conf?
Answer
  • To install Ksplice kernel updates during the reboot of a system
  • To install updates to the Ksplice software Itself during a system reboot
  • To enable the uptrack cron job to install Ksplice kernel updates whenever they become available
  • To enable Ksplice to automatically install the kernel rpm whenever new Ksplice kernel updates become available
  • To enable Ksplice to install Ksplice kernel updates and new kernel RPMS whenever they become available

Question 14

Question
Which two conditions should be met in order to successfully configure an openssh client on Oracle Linux?
Answer
  • The openssh-server package must not be installed.
  • The openssh package must be installed.
  • The sshd daemon must not be started.
  • The openssh-client package must be installed.
  • The ssh-agent must be started.
  • ssh keys must be generated by any user using the ssh client.

Question 15

Question
Which three settings are required to configure an openLdap to use directory service provided by Ldap.example.com?
Answer
  • Set the LDAP Search Base DN and the LDAP server address and post in /etc/openldap/ldap.conf to: dc=example, dc = com ldap://ldap.example.com:389
  • Set LDAP Search Base DN and the LDAP server address and port in /etc/ldap.conf to: dc=example, dc=com ldap://ldap.example.com:389
  • Ensure that /etc/nsswitch.conf correctly references authentication priorities: passed: files ldap shadow: files ldap group: files ldap
  • Ensure that the LDAP server name can be resolved.
  • Ensure that DNS is used to resolve the LDAP server name.

Question 16

Question
Refer to the Exhibit. [root@server1 ~ # 1s -1 /usr/bin/passwd -r-x--x--x 1 root root 21200 oct 7 21:01 /usr/bin/passwd [root@server1 ~] # 1s -1 /etc/shadow -r - - - - - - - - 1 root root 1818 Mar 7 10:31 /etc/shadow] [root@server1 ~]# A user smith is on your system complained that he is not able to change his password. As the administrator, you long-listed the passwd command and the /etc/shadow file. View the Exhibit that shows the output. What must you do to enable this user to change his password?
Answer
  • Set SGID on /usr/bin/passwd.
  • Set SUID on /usr/bin/passwd.
  • Set sticky bit on /usr/bin/passwd.
  • Set read and write permission for others on /etc/shadow.
  • Set permission on /etc/shadow to 600.

Question 17

Question
What happens if you reboot a Ksplice Uptrack-enabled system when the following conditions exist? 1. The Internet is unreachable due to a failing router. 2. The INSTALL_ON_REBOOT property is set to YES in /etc/uptrack/uptrack.conf.
Answer
  • The Ksplice updates are applied early in the boot sequence despite the fact that the Internet is unreachable.
  • The Ksplice updates are not applied during the boot sequence, but they will be applied as soon as the Internet becomes reachable again.
  • The updates are not applied during the boot sequence and will not be applied after the Internet has become reachable again.
  • The system waits in the boot sequence for the internet to become reachable again.
  • The system boots to single-user mode.

Question 18

Question
Which two statements are true about administering the use of the Sudo command in Oracle Linux?
Answer
  • visudo will never save the /etc/sudoers file if there are syntax errors in the file after editing.
  • visudo prompts for an action if there are syntax errors in the /etc/sudoers file after editing.
  • Using vi to edit /etc/sudoers opens the file read only.
  • Multiple administrators may edit the /etc/sudoers file simultaneously using visudo but only one may save the edited result.
  • Multiple administrators may edit the /etc/sudoers file simultaneously using vi but only one may save the edited result.

Question 19

Question
Which three statements are about the use of these files and directories by UPSTART?
Answer
  • /etc/rc.d/rc is executed each time the /sbin/init command us used, to change services appropriately for the target run level.
  • /etc/rc.d/rc.local is executed at boot time, before the run level processing takes place.
  • /etc/rc.d/rc is executed at boot time, to start the appropriate services for the run level defined in /etc/initab.
  • /etc/rc.d/rc.sysinit is executed once at boot time, regardless of which run level is set.
  • /etc/rc.d/rc.sysint is executed each time the /sbin/init command is used to change the run level.
  • /etc/rc.d/rc3.d contains links to scripts in /etc/init.d.
  • /etc/rc.d/rc is executed after /etc/rc.d/rc.local.

Question 20

Question
Examine these details from the sysctl.conf file and from the proc file system: [root@FAROUT fs]# grep aio-max-nr /etc/sysctl.conf # oracle-rdbms-server-11gR2-preinstall setting for fs.aio-mx-nr is 1048576 fs.aio-max-nr = 1048576 [root@FAROUT fs] # cat /proc/sys/fs/aio-max-nr 1048576 [root@FAROUT fs] # rpm -q libaio Libaio-0.0.107-10.e16.x86_64 Libaio-0.3.107-10.e76.i686 Which statement is true about the setting created by oracle-rdbms-server-11gR2-preinstall?
Answer
  • It allows a process to request an I/O without waiting for reply.
  • It allows two or more processes to request I/O simultaneously while running on different CPUs.
  • It allows a process to request a single I/O without awaiting for a reply. However, if a second I/O is requested, then the process must wait.
  • It allows two or more processes to request I/Os and then to both be notified when both of them complete.

Question 21

Question
You use the chkconfig command to administer one of the services on your Oracle Linux system: [root@FAROUT ~]# chkconfig vncserver off [root@FAROUT ~] # No changes have been made to the init script for the service. Which two statements are true regarding the effects of Issuing this command?
Answer
  • The vncserver service is shut down.
  • The vncserver service configuration is disabled only for those run levels for which it is currently enabled.
  • The vncserver service configuration is disabled for run levels 2, 3, 4 and 5.
  • The vncserver service remains in the same state it was in before the command was issued.
  • The vncserver service configuration is disabled for run levels 3 and 5 only.

Question 22

Question
Examine the commands used by root to create the chrooted environments in the /jail directory: # mkdir /jail/bin/jail/lib64 # cp /bin/bash/jail/bin linux-vdso.so.1 => (0x00007fff68dff000) libtinfo.so.5 => /lib64/libtinfo.so.5 (0x00000033e00000) lid1.so.2 => /lib64/libc.so.6 (0x00000033e1600000) /lib64/id-linix-86-64.so.2 (0x00000033e0e00000) # cp /lib64/libtinfo.so.5/jail/lib64 # cp /lib64/libd1.so.6 /jail/lib64 # cp /lib64/libc.so.6 /jail/lib64 # cp /lib64/id-linux-x86-64.so.2 /jail/lib64 The user root then issues this command: # chroot /jail What is the output from the cd, pwd, and ls commands?
Answer
  • bash-4.1# cd bash-4.1# pwd /root bash-4.1# 1s bash" 1s: command not found
  • bash-4.1# cd bash: cd: /root: No such file or directory bash-4.1# pwd / bash-4.1 # 1s bash: 1s: command not found
  • bash-4.1# cd bash: cd: command not found bash: pwd: command not found bash-4.1# 1s
  • bash: 1s; # cd bash: cd: /root: unable to access chrooted file or directory /root bash-4.1# pwd / bash-4.1 # 1s bin lib64
  • bash-4.1# cd bash: cd: /root: No such file or directory bash-4.1# pwd / bash-4.1# 1s bin lib64

Question 23

Question
Examine the partition table: Disk /dev/sdd: 107 MB Sector size (logical/physical): 512B/512B Partition Table: msdos Number StartEndSizeTypeFileSystemFlags 11049KB79.7MB78.6MBPrimary Which program cannot be used to add another partition on this device?
Answer
  • fdisk
  • cfdisk
  • parted
  • kpartx

Question 24

Question
What is the purpose of setting ONPARENT = no in an Interface configuration file located in /etc/sysconfig/network-scripts?
Answer
  • To prevent a network interface from being brought up during system startup
  • To prevent a slave network interface from being brought up during system startup
  • To prevent an alias network interface from being brought up during system startup
  • To prevent a master network interface from being brought up during system startup

Question 25

Question
You must remove the user harhest from your Oracle Linux system because the person has left the company: User harhest has numerous files, directories, and a crontab. You issue: Userdel r harhest Which three outcomes result from the execution of this command?
Answer
  • Files in the harhest home directory are removed.
  • The home directory of harhest is removed.
  • Files owned by narhest in any directory are removed.
  • All directories owned by harhest are removed.
  • The /var/spool/mail/harhest mailbox is removed.
  • crontab /var/spool/cron/harhest is removed.

Question 26

Question
Match the rpm options with their functions: 1. - I a. replaces any older versions of package with the new package 2. - U b. upgrades packages, but only if an earlier version exists on your system 3. - F c. Uninstall the specified package 4. - e d. installs a new package
Answer
  • 1-d, 2-a, 3-b, 4-c
  • 1-d, 2-b, 3-a, 4-c
  • 1-a, 2-c, 3-b, 4-d
  • 1-a, 2-b, 3-c, 4-d

Question 27

Question
Examine the line from /etc/rsyslog.conf: Mail.*-/var/log/maillog Which statement correctly describes this rule?
Answer
  • The rule name prefix of "-" is tolerated for syslog and syslog.sys compatibility with no impact or rsyslog behavior regardless of the global directive settings.
  • The file name prefix of "-" is a way of disabling mail log messages under certain conditions to /var/log/maillog.
  • The filename prefix of "-" is a performance enhancement. It stops file syncing on every message. The log certain will be the same whether a minus prefix is used or not.
  • The file name prefix of "-" forces file syncing after every message is logged to ensure each message is written to disk force before attempting to write a subsequent message to the same file.

Question 28

Question
Which two statements are true concerning a GUID Partition Table (GPT)?
Answer
  • It supports named disk partitions.
  • It supports primary and extended partitions.
  • It supports disks greater than two terabytes.
  • It cannot be used on the system disk.
  • It supports only up to 16 partitions.

Question 29

Question
Examine the extract of the /etc/nologin file and the /etc/pam.d/login file on server1: [root@server1 ~] # cat /etc/nologin bob smith [root@server1 ~] # cat /etc/pam.d/login accountrequiredpam_nologin.so accountincludesystem-auth Which statement is true about users?
Answer
  • Only the root user can log in to the system.
  • Only users root bob and smith would be unable to log in to the system.
  • All users, including the root user, would be permitted to log in to the system.
  • All users, including the root user, would be unable to log in to the system.
  • Only users bob and smith would be unable to log in to the system.

Question 30

Question
Which two statements correctly describe the type of Information and the behavior of files in the proc filesystem on Oracle Linux 6?
Answer
  • It is not possible to write to any file in the proc filesystem.
  • The /proc/cmdline file contains the parameters passed to the kernel.
  • Each process has a directory named for the process number in the proc filesystem.
  • The proc filesystem contains the same hardware information that is contained in the sys filesystem for backward compatibility.
  • Each process thread has a directory named for the process thread number in the proc files/stem.

Question 31

Question
Which four statements are true concerning the various stages of GRUB bootloader in Oracle Linux?
Answer
  • GRUB stage1 must always load stage1_5.
  • GRUB stage1_5 is used to process the /boot/grub/grub.conf file.
  • GRUB stage1_5 loads GRUB stage2.
  • GRUB stage1 may load GRUB stage2 directly.
  • GRUB stage1 provides support for several different filesystems, enabling stage1 to load stage1_5.
  • GRUB stage1_5 provides support for several different filesystems, enabling stage1_5 to load stage2.
  • GRUB stage2 is used to process the /boot/grub/grub.conf file.

Question 32

Question
Examine the commands and output when trying to start OSWatcher Black Box. Identify two recommended solutions to this problem.
Answer
  • Edit the startOSWbb.sh script to specify your proffered shell, ensuring that it is started in POSIX compliance mode.
  • Install ksh on the system, if not currently installed.
  • Create a Symbolic link /usr/bin/ksh that points to /bin/bash.
  • Ensure that ksh is accessible with the path /usr/bin/ksh. Create a symbolic link if necessary.
  • Create a shell alias called /usr/bin/ksh that expands to /bin/bash.

Question 33

Question
Identify two true statements about the nice command.
Answer
  • It may the used to raise the priority of existing processes.
  • It may be used to set the initial priority of a process.
  • A higher nice value makes a process run at a lower priority.
  • By default, a normal user can make a process run at a higher priority.
  • It may be used to lower the priority of existing processes.

Question 34

Question
Examine the output of a bonded interface configuration from which one network cable has been unplugged: # cat /proc.net/bonding/bond0 Ethernet Channel Bonding Driver: v3.6.0 (September 26, 2009) Bonding Mode: fault-tolerance (active-backup) Primary Slave: None Currently Active Slave: eth2 MII Status: up MII poling interval (ms): 100 Up Delay (ms): 0 Down Delay (ms): 0 Slave Interface: eth1 MII status: down Link Failure Count: 1 Permanent HW addr: 00:0c:29:7b:3c:71 Slave Queue ID: 0 Slave Interface: eth2 MII Status: up Link Failure Count: 0 Permanent HW addr: 00:0c:29:7b:3s:7b Which statement is true when you plug in the eth1 network cable?
Answer
  • The status of the slave interface eth1 changes to up and is promoted to the active slave and eth2 becomes the backup slave.
  • The status of the slave interface eth1 changes to up and becomes a second active slave.
  • The status of the slave interface eth1 changes to up but must be manually assigned the active or backup slave role.
  • The status of the slave interface eth1 changes to up and becomes the backup slave.

Question 35

Question
Which three statements are true about the shared directories defined in the /etc/exports file?
Answer
  • By default, a directory is shared with no root squashed.
  • By default, a directory is shared read write.
  • By default, a directory is shared with root squashed.
  • By default, a directory is shared read only.
  • By default, a directory is shared sync.

Question 36

Question
Which three statements are true when using the Anaconda Installer to install Oracle Linux?
Answer
  • Unattended installation is only possible if installing the Unbreakable Enterprise kernel.
  • The installation may be done from an NFS-mounted Image.
  • Unattended installation is only possible if installing the Red Hat-compatible kernel.
  • The installation may be done from a USB device.
  • The installation may be done in text or graphical mode.

Question 37

Question
You use the host command to find out about host name WAYOUT: Which two statements are true?
Answer
  • Example.com is an authoritative name server.
  • Dns1.example.com is an authoritative name server.
  • Dns2.example.com is a Cache-only name server.
  • Dns2.example.com is an authoritative name sever.
  • Dns1.example.com is a cache-only name server.

Question 38

Question
Which three statements are true about the configuration of OpenLdap secure encrypted connections?
Answer
  • TLS and ldaps should not both be selected.
  • To enable idaps, you must download the Certifying Authority (CA) Certificate.
  • To enable TLS, you must download the Certifying Authority (CA) Certificate.
  • The certificate is needed to verify ownership of the secret key used for encryption.
  • There is a command-line alternative to the Authentication Configuration Tool to enable the encrypted LDAP communication.

Question 39

Question
Which two actions should be completed when the firstboot utility runs under runlevel 5 in Oracle Linux?
Answer
  • Agreeing to the license agreement
  • Registering for software updated
  • Creating a nonadministrative user
  • setting the current date and time to be synchronized with an NTP server
  • Configuring the dtrace facility

Question 40

Question
Which two statements are true about the Unbreakable Linux Network (ULN)?
Answer
  • It is freely available to all Oracle Linux customers.
  • It contains additional packages not found on the installation media.
  • It contains only binary RPM packages.
  • It contains both source and binary RPM packages.
  • It is the only location to download errata.
  • All Unbreakable Linux subscribers are allowed to deploy a local YUM repository.

Question 41

Question
Examine the content of the mdstat pseudo file: # cat /proc/msstat personalities: [raid1] [raid0] [raid6] [raid5] [raid4] md0 : active raid1 md2[1] md1[0] 207680blocks super 1.2 [2/2] [UU] md2 : activeraid0 sdg[1] sdf1[0] 207872blocks super 1.2 512k chinks Md1 :active raid0sde1[1] sdd1[0] 207872blocks super 1.2 512k chunks Unused devices: <none> Which two statements are true about the MD0 RAID set?
Answer
  • MDO is a stripped mirror RAID set.
  • MDO is a mirrored stripped RAID set.
  • If MD1 fails, so will MDO.
  • If MD2 fails, MDO too fails.
  • If /dev/sdd1 and /dev/sdg1 fail, MDO fails.

Question 42

Question
Examine these commands used to control UPSTART logging: [root@FAROUT init] # initctl log-priority info [root@FAROUT init] # initctl log-priority Info [root@FAROUT init]# Which three statements are true about the logging done through these commands?
Answer
  • UPSTART logs State Changes to /vat/log/messages.
  • UPSTART logs job goals to /var/log/massages.
  • UPSTART logs only informational messages about warnings and errors to /var/log/messages.
  • UPSTART logs only informational messages about warnings to /var/log/messages.
  • UPSTART logs event emissions to /var/log/messages.

Question 43

Question
Which three statements are correct about NFSV4?
Answer
  • It relies on the LOCKD and RPC.STATD daemons to perform file locking.
  • It uses a single port (2049) for all client/server communications.
  • The UID and GID for a particular user must be the same on both client and server to avoid file ownership problems.
  • It has support for filesystem quotas.
  • RPC.IDMAPD is used to map a UID to its username and a GID to its group name and vice versa.

Question 44

Question
Which three statements are true about rpm package dependencies?
Answer
  • The RPM command can detect only direct package dependencies.
  • The RPM command can detect both direct and indirect package dependencies.
  • The YUM command can detect and resolve direct and indirect package dependencies.
  • The YUM command can detect and resolve indirect package dependencies only within the same repository.
  • The YUM command can only detect and resolve direct package dependencies.
  • A source RPM can have a dependency on a binary RPM.

Question 45

Question
Examine the channel specification in the /etc/yum.repos.d/public-yum-016.repo file: # head -6 /etc/yum.repos.d/public-yum-016.repo [016_latest] Name=Oracle Linux $releasever Latest ($basearch) Baseurl=http://public-yum.oracle.com/repo/oracleLinux/OL6/latest/$basearch/ Gpgkey=http://public-yum.oracle.com/RPM-CPG-KEY-oracle-o16 Gpgcheck=1 Enabled=0 What is the effect of the enabled=0 setting?
Answer
  • This channel is disabled and cannot be used by YUM at all.
  • This channel will not be used by YUM when searching for packages.
  • By default, YUM will not use this channel but this can be overridden on the command line.
  • This channel will not be used by YUM when it searches for packages, but YUM will check if updates exist for packages already installed from this channel.

Question 46

Question
Which three statements correctly describes the purpose of and administration of kernel boot parameters in Oracle Linux?
Answer
  • Kernel boot parameters may be specified in /boot/grub/grub/conf.
  • Kernel boot parameters used to boot the running system may be examined after boot by Viewing /boot/grub/grub/conf.
  • Kernel boot parameters used to boot the running system may be examined after boot by viewing /proc/cmdline.
  • Additional kernel boot parameters may be specified in an administrator-specified parameter file that is read by grub stage.
  • Additional kernel boot parameters may be specified from the grub command line.
  • Additional kernel boot parameters may be specified in an administrator-specified parameters that is read by GRUB stage1_5.

Question 47

Question
Which three options are available during the Anaconda installer disk partitioning setup stage for a machine with only one hard disk device?
Answer
  • Manual resizing of existing partitions on only a single device
  • Removal of all empty partitions only, leaving any Linux or non-Linux partitions unchanged
  • Replacing of existing Linux partitions only and leaving any other partitions unchanged
  • Replacing of existing non-Linux partitions only, and leaving any Linux partitions unchanged
  • Manual resizing of existing partitions on all selected devices
  • Removal of all existing partitions and creating new partitions to suit the install

Question 48

Question
Which two steps should be performed to permit using SSH, SCP, or SFTP commands by the ORACLE account on the host FAROUT to the oracle account on the host WAYOUT without supplying a password?
Answer
  • The oracle account user on host FAROUT must issue an ssh-keygen command to generate public and private key files in the ~ oracle/.ssh directory FAROUT.
  • The oracle account user on the host WAYOUT must issue an ssh-keygen command to generate public and private key files in the ~/oracle.ssh directory on WAYOUT.
  • The Oracle account user on host FAROUT must add the contents of ~/oracle/.ssh/id_dsa.pub or ~/oracle/.ssh/is_rsa.pub file to the ~/oracle/.ssh/authorized_keys file on host WAYOUT.
  • The Oracle account user on host WAYOUT must add the contents of ~/oracle/.ddh/id_dsa or ~/oracle/.ssh/id_rsa.pub file to the ~/oracle/.ssh/authorized_keys file on host FAROUT.
  • The oracle account user on host WAYOUT must set the permissions on the ~/oracle/.ssh/authorized_keys file to 644.
  • The Oracle account user on host FAROUT must set the permissions in ~/oracle/.ssh/authorized_keys file 644.

Question 49

Question
Your Oracle Linux server has a network interface eth0 but the ifcfg-eth0 file is missing from the /etc/sysconfig/network-scripts directly. To set the IP address for the interface, you run this command as root: [root@station1]# ifconfig eth0 192.168.0.1 up What is the effect of the command?
Answer
  • The IP address 192.168.0.1 is not assigned to eth0 because the netmask is not specified.
  • The IP address 192.168.0.1 is assigned to eth0, but the interface is not activated until the network service is reloaded.
  • The IP address 192.168.0.1 is assigned to eth0, but the interface is not activated until the network service is restarted.
  • The IP address 192.168.0.1 is assigned to eth0 with the default netmask for that address, and the interface is activated immediately.

Question 50

Question
Examine this output: $ ftp o16.example.com Connected to o16.example.com (192.168.40.131) 220 (vsFTpd 2.2.2) Name (o16.example.com:oracle): A carriage return is now entered on the keyboard and the result is shown: $ 30 permission denied. Login failed. ftp> Why is the oracle user denied access to the FTP server on the 016.example.com host?
Answer
  • The Oracle user is listed in /etc/vsftpd/ftpusers.
  • The oracle user is listed in /etc/vsftpd/user_list and the USERLIST_ENABLE setting is set to YES in /etc/vsftpd/vsftpd.conf.
  • The Oracle user is listed in /etc/vsftpd/user_list and USERLIST_ENABLE setting is set to NO in /etc/vsftpd/vsftpd.conf.
  • The LOCAL_ENABLE setting is set to NO in /etc/vsftpd/vsftpd.conf.
  • The Oracle user does not exist on the o16.example.com host.

Question 51

Question
Which two statements are true about the installation of certain components of asmlib in Oracle Linux 6?
Answer
  • The asmlib kernel module is included in the Red Hat-compatible kernel.
  • The asmlib kernel module is included in the Unbreakable Enterprise Kernel (UEK).
  • The asmlib kernel module must be installed separately when using the Unbreakable Enterprise Kernel (UEK).
  • The asmlib oracleasm-support package is installed as part of the Red Hat-compatible kernel package.
  • The asmlib oracleasm-support package is included as part of the Unbreakable Enterprise Kernel (UEK) package.
  • The asmlib oracleasm-support rpm must be installed separately when using the Unbreakable Enterprise Kernel (UEK).

Question 52

Question
Which three statements are true about administering user accounts and groups for an Oracle Linux server in preparation for installing the Oracle Database server?
Answer
  • The Oracle software owner must be a Linux user called oracle.
  • The Oracle software owner must not be the root user.
  • The owner of the Oracle httpd daemon process must be the Linux user called nobody.
  • A Linux user who is a member of the OSDBA group may start an Oracle database instance.
  • The /etc/sudoers file must specify that the Oracle software owner be allowed to run commands as root.
  • The OINSTALL group owns the Oracle Inventory.

Question 53

Question
Which four are among the many components included in the oracle Linux distribution?
Answer
  • Apache Web Server
  • Documentation
  • X Windowing system
  • Oracle Database Server 11g
  • Red Hat compatible kernel
  • Oracle WebLogic Server 11g

Question 54

Question
You are about to switch a Red Hat Enterprise Linux 6 (RHEL6) system from the Red Hat Network to the Unbreakable Linux Network (ULN). Consider this output: # rpm -qa *rhn* rhnlib-2.5.22-12.e16.noarch yum-rhn-plugin-0.9.1-36.e16.noarch rhn-setup-1.0.0-73.e16.noarch rhn-client-tools-1.0.0-73.e16.noarch rhn-check-1.0.0-73.e16.noarch rhnsd-4.9.3-2.e16.x86_64 Identify four minimum steps that you should perform to successfully switch this system from RHN to ULN.
Answer
  • Create a ULN account if it doesn't exist already.
  • Ensure you have a valid Oracle Linux support agreement.
  • Install the uln_register.tgz package.
  • Install the uln_register.tgz and uln_register-gnome.tgz packages.
  • Run the uln_register command as the root user and answer the prompts.
  • Install the Unbreakable Enterprise kernel (UEK).
  • Run the yum update command.
  • Reboot your system.

Question 55

Question
Which three statements are true about the bash shell script's capabilities and features?
Answer
  • The s* shell variable holds the exit status of the last command executed in the foreground.
  • The | | operator ensures that a command is run only if the command preceding the | | operator fails.
  • If test "SMYVAR" = prod and if ["SMYVAR" *= prod ] are equivalent ways to test the value of the MYVAR variable in a shell script.
  • If the first line of the script begins with #!/bin/sh, then the sh shell program is unable to interpret the script.
  • The bash shell supports more than 10 command-line arguments.
  • The && operator ensures that a command is run regardless of the outcome of the command that preceded the && operator.

Question 56

Question
Which three compression programs can tar use to natively filter an archive?
Answer
  • Zip
  • Bzip2
  • Gzip
  • Xz
  • Cpio

Question 57

Question
Examine this /etc/fstab entry: Identify the actions you must perform to relocate this filesystem permanently to its new mount point?
Answer
  • 1, 2, 3, 4, 5, 6 and 7
  • 1, 2, 3, 4, 5 and 6
  • 1, 2, 5 and 6
  • 1, 2, 5, 6 and 7 ^
  • 1, 2 and 6

Question 58

Question
During the setup of additional swap space on an ext2 filessystem, you encounter an error as shown below: Which action must you perform to add additional swap space?
Answer
  • Create a symbolic link /dev/swapfile that points to u01/swapfile.
  • Reinitialize /u01/swapfile by issuing mkswap L swapfile /u01/swapfile.
  • Re-create the swapfile on an ext3 or ext4 filesystem.
  • Change LABEL=swapfile to /u01/swapfile in the appropriate /etc/fstab entry.
  • None, because adding filesystem based swap space is not supported.

Question 59

Question
Examine the command and output shown: bash-4.1# 1s 1s: error while loading shared libraries: libselinux.so.1: cannot open shared object file: No such file or directory No files have been deleted from your system and you want to determine the cause of the error. Which two commands or utilities can help the root user diagnose this problem?
Answer
  • ldd
  • dmesg
  • grep libselinux.so.1 /var/log/dmesg
  • strace
  • grep libselinux.so.1 /var/log/message

Question 60

Question
For which three types of installs does the Oracle database Pre-install rpm help by installing required software packages and setting system parameters?
Answer
  • Oracle Database 11g Enterprise Edition single instance
  • Oracle WebLogic
  • Oracle Database Enterprise Edition Real Application Cluster
  • Oracle Enterprise Manager Cloud Control
  • Oracle Database 11g Standard Edition single instance

Question 61

Question
Which three statements are true concerning the IPTABLES Oracle Linux firewall?
Answer
  • The default rule table is filter.
  • iptables has two main components: the kernel component netfilter and the command-line utility ipchains.
  • Input, output, and forward are the rule tables associated with filter.
  • PREROUTING, OUTPUT, and POSTROUTING are the chains associated with nat.
  • The main rule chains are filter, nat, and mangle.
  • The main rule tables are filter, nat, and mangle.

Question 62

Question
Which two statements are true about signal handling in Oracle Linux?
Answer
  • The pkill command kills a process by name.
  • A process killed with the default signal always terminates gracefully if it: does not block the kill request.
  • The kill command sends a sigkill (signal 9) by default to the process being killed.
  • The kill command may send a termination signal to more than one process at a time.
  • All signals may be blocked by a process.

Question 63

Question
Bash is invoked as an interactive login shell. What is the order in which the bash configuration files are read, assuming that all the files exist in their correct location and are readable?
Answer
  • /etc/profile, ~/ .profile
  • /etc/profile, ~/ .bash_profile
  • /etc/profile, ~/ .bash_profile, ~/ .bash_login, ~/ .profile
  • /etc/profile, ~/ .bash_profile, ~/ .profile, ~/ .bash_login

Question 64

Question
Which type of nameserver is provided by the default bind configuration files on Oracle Linux?
Answer
  • A primary name server
  • A secondary name server
  • Recursive caching-only nameserver
  • An authoritative name server
  • Slave name server

Question 65

Question
Which three statements are true concerning the use of the grub menu in Oracle Linux?
Answer
  • All changes made using the grub editor at boot time are saved by default to /boot/grub/grub, conf.
  • Additional parameters may be passed to the selected kernel.
  • The initrd directive may not be changed.
  • Existing kernel parameters may be changed.
  • Some of the GRUB command-line functions may be password protected.

Question 66

Question
Consider the output shown: #rpm -i sendmail-cf-8.14.4-8.e16.noarch.rpm Error: Failed dependencies: Sendmail = 7.14.4-8.e16 is needed by sendmail-cf-8.e16.noarch # rpm -i sendmail-8.14.4-8.e16.x86_64.rpm # rpm -i sendmail-cf-8.14.4-8.e16.noarch.rpm # rpm -q sendmail sendmail-cf Sendmail-8.14.4-8.e16.x86_64 Sendmail-cf-8.e16_64 Sendmail-cf-8.14.4-8.e16.noarch # rpm -e sendmail Which statement is true about the execution of the rpm -e sendmail command?
Answer
  • It erases the sendmail package without errors.
  • It fails with an error because the package version is not supplied on the command line.
  • It fails with an error because the sendmail-cf package depends on the sendmail package.
  • It erases the sendmail package and raises an error because the sendmail package depends on the sendmail package.
  • It erases both the sendmail and sendmail-cf packages because the sendmail-cf package depends on the sendmail package.

Question 67

Question
Which three statements are true about the User Private Group scheme in Oracle Linux?
Answer
  • If a user jules is added with the useradd jules command, a group called jules_grp is also created
  • The umask for the jules user is 002 in /etc/bashrc
  • Users belonging to a group to which user jules also belongs, are automatically able to write to the private group belonging to the jules user.
  • If a user jules is added with the user add jules command, a group called jules is also added. but no other user may be a member of that group.
  • A directory owned by a group to which several users belong, and which has the setgid fa turned on, has shared write access to all members of the group.
  • The User private Group scheme is enabled by default in Oracle Linux.

Question 68

Question
Which two actions are the required steps to prevent: non-root ssh access to the system?
Answer
  • Ensuring that /etc/pam.d/sshd includes: account sufficient pam_nologin.so
  • Create the /etc/nologin/login.deny file containing a single line +all
  • Creating the /etc/nologin.allow file containing a single line root
  • Creating the /etc/nologin file
  • Ensuring that /etc/pam.d/sshd includes: account requiredpam_nologin.so

Question 69

Question
Examine this MDAM output: Which two aspects can be determined from this output?
Answer
  • A RAID device failed and has been replaced with the hot spare.
  • A new RAID device was just added to replace a failed one.
  • Read and write performance is currently not optimal on this RAID set.
  • Only write performance is currently not optimal on this raid set.
  • An extra device was added to this RAID set to increase its size.

Question 70

Question
Which three statements are true about the Oracle Linux Logical Volume Manager (LVM)?
Answer
  • LVM supports simple, striped, mirrored, and RAID-5 Logical Volumes (LVs).
  • A Physical Volume (PV) can be created on a disk or a disk partition.
  • A Physical Volume (PV) can only be created on a disk partition.
  • A Physical Volume (PV) can be resized.
  • A Volume Group (VB) can be split into multiple Volume Groups.
  • An LVM snapshot is read-only.

Question 71

Question
You want to convert an rpm packages file into a standard format as part of a shell script and then manipulate the contents. Which archive format is used by rpm?
Answer
  • cpio
  • tar
  • bzip2
  • gzip
  • zip

Question 72

Question
Which four statements correctly describe the contents of the sysfs filesystem?
Answer
  • It contains kernel parameter files.
  • It contains metadata on all block devices.
  • It contains metadata on firmware.
  • It contains metadata on all loaded modules in the kernel.
  • It contains metadata on device classes.
  • It contains metadata on system uptime.

Question 73

Question
Which three statements are true about the mount command?
Answer
  • It supports labels.
  • By default, it can be used by an ordinary user to mount a local file system.
  • It lists all the currently mounted filesystems, if executed without any arguments
  • It lists only the filesystems listed in /etc/fstab if executed without any arguments.
  • Only root can mount filesystems that are not listed in listed in /etc/fstab.

Question 74

Question
Examine these configuration files: # cat /etc/auto.master /net-hosts /- auto.direct ro # cat /etc/auto.direct /nfs1 o16:/export/share1 /nfs2 -sync o16:/export/share2 /nfs3 o16:/export/share3 Which mount options will automounter use to mount the filesystems listed in /etc/auto.direct?
Answer
  • All three filesystems are mounted read-only, async.
  • /nfs1 and /nfs3 are mounted read-only, async whereas /nfs2 mounted read-write, sync.
  • /nfs1 and /nfs3 are mounted read-only, async whereas /nfs2 mounted read-only, sync.
  • All three filesystems are mounted read-write, sync.

Question 75

Question
Examine the UserDir directives in this extract from /etc/httpd/conf/httpd.conf: <IfModule mod_userdir.c> UserDirenabled user1 UserDirdisabled user1 UserDirpublic_html </IfModule> The web server URL is http://host01. A website server URL is http://host01. A user attempts to access user1's webpages using this URL: httpd:/host01/~user1 Which statement describes the outcome?
Answer
  • The occurrence user1 in the list of disabled users causes an access denied error to the website contained in user1'1 public_html subdirecroty, overriding the enabled directive.
  • The occurrence of user1 in the list of enabled users allows access to the website contained in user1's public_html subdirectory, overriding the disabled directive.
  • The configuration produces an error upon web server startup, because the enabled and disabled directive conflict.
  • Access is guaranteed because the UserDir public_html directive applies default access to all local users on the system, overriding the enabled of disabled directive.

Question 76

Question
Which three Statements describe the capabilities and functions of the chkconfig command in Oracle Linux?
Answer
  • It can be used to change the state of a service.
  • It can be used to specify the run levels for which a service is to be activated.
  • It can be used to list all services and their run levels-
  • It can be used to check the status of a service to see if it is running.
  • It can be used to add a service.

Question 77

Question
Which three statements are true concerning the use of open SSH utilities?
Answer
  • SCP always requires a passphrase to be used.
  • SCP permits copies between two remote hosts.
  • SFTP permits transfers between two remote hosts.
  • SSH may be used to execute a single command on a remote host instead of executing the login shell on the remote host.
  • SFTP may be used to execute a command on the remote server.

Question 78

Question
The default locations and paths used by logwatch are: /etc/logwatch/conf /user/share/logwatch/default.conf /user/share/logwatch/dist.conf Which three statements are true logwatch installation and configuration?
Answer
  • After installing logwatch, no configuration is required to produce reports from system logs.
  • After installing logwatch, the /usr/share/logwatch/dist.conf directory will not exist because it is optional.
  • After installing logwatch, you must create /etc/logwatch/conf to produce reports from system logs.
  • After installing logwatch, all the default directories continue to exist.
  • To produce a report from the previous day's logs, the - - range yesterday parameter must be specified.
  • Running /usr/sbin/logwatch produces a report of the previous day's log files.

Question 79

Question
Which three tasks should be performed to configure a host to act as an SSH server?
Answer
  • The openssh-server package must be installed.
  • The sshd service must be started.
  • The openssh package must be installed.
  • The openssh-client package must not be installed.
  • The ssh-agent must be running.

Question 80

Question
Which three methods might be used to change kernel parameters, thereby modifying the values for running system?
Answer
  • Using the echo command to write values to specific files in the /sys directory
  • Issuing the sysct1 -w command to write values to specific files in the /proc/sys directory
  • Issuing the sysct1 -w command to write values to specific files in the /sys directory
  • Adding to or modifying parameters in /etc/sysct1.conf and issuing the sysct1 -p command
  • Using the echo command to write values to specific files in the /proc/sys directory

Question 81

Question
Examine some of the contents of the /boot/grub/grub.com file from an Oracle Linux system: Default=0 Timeout=5 Splashimage=(hd0, 0)/grub/splash.xpm.gz Hiddenmenu Title Oracle Linux Server (2.6.39-100.0.12.16uek.x86_64) Root (hd0, 0) Kernet /vmlinuz-2.6.39-100.0.12.e16uek.x86_64 ro root=UUIP=a4b6049b-9aa1-44b4-87cf- aebb17alcdf9 rd_NO_LUKS re_NO_LVM rd_NO_DM LANG=en_US.UTF-8 SYSFONT=1atarcycreheb-sun16 KEYBOARDTYPE=PC KEYTABLE=us rhgb quiet numa=off Initrd /initramfs-2.6.39-100.0.12.e16uek.x86_64.img Title Oracle Linux Server (2.6.32-131.0.15.e16.x86_64) Root (hd0, 0) Kernel /vmlinuz-2.6.32-131.0.15.e16.x86_64 ro root=UUIS=a4b6049b-9aa1-44b4-87cf- aebb17a1cdf9 rd_NO_LUKS rd_NO_LVM rd_NO_LVM re_NO_MD rd_NO_DM LANG=en_UD.UTF-8 SYSFONT=latarcyheb-sun16 KEYBOARDTYPE=PC KEYTABLE=us Crashkernel=auto rhgp quiet numa = off Initrd /initramfs-2.6.32-131.0.15.e16.x86_64.img Which three statements are true about the behavior and configuration of GRUB on this system?
Answer
  • (hd0, 0) represents the first partition on device /dev/hd0.
  • The hiddenmenu directive hides the GRUB menu only for 5 seconds after which it becomes visible again.
  • The root directive specifies an initial root filesystem, allowing access to block device modules to mount the real root filesystem on disk.
  • (hd0, 0) represents the first partition on the first drive detected by the BIOS.
  • The initrd directive specifies the initamfs, an initial root filesystem in RAM, allowing access to block device modules to mount the real root filesystem.
  • Each kernel must have an initramfs that matches the version of the kernel.
  • Because there is an Unbreakable Enterprise Kernel installed, it must be the default kernel listed as shown by the default=0 directive.

Question 82

Question
Identify three features/functions enabled by using asmlib?
Answer
  • Application-to-disk data integrity checking
  • Device naming persistence
  • Replaces udev for all files used by any application
  • Device ownership persistence
  • Multipathing driver for luns used for asmdisks
  • locking facility for using luns in an ASM cluster

Question 83

Question
You must remove a Physical Volume (PV) from a Volume Group (VG) containing one Logical Volume (LV) without compromising data availability. What must you do before using the vgreduce command, to remove the PV?
Answer
  • Move allocated physical Extents (PE) from /dev/sdd to other physical volumes using the pvmove command.
  • Remove the /dev/sdd PV using the pvremove command.
  • Resize the /dev/sdd PV to zero using the pvresize command.
  • Move allocated physical Extents (PE) from /dev/sdd to other physical volumes by using the 1vvonvert - - replace command.

Question 84

Question
Examine some rules from the /etc/rsyslog.conf file: *.info;mail.debug;authpriv.none;cron.none/var/log/messages uucp, news.notice/var/log/spooler Which statement is true about the listed rules?
Answer
  • Only messages with a priority of info from all facilities are sent to /var/log/messages.
  • Only messages with a priority of notice from the news facility are sent to /var/log/spooler.
  • Messages with a priority of debug or higher from the mail facility are sent to /var/log/message
  • Only messages with a priority of debug from the mail facility are sent to /var/log/messages.

Question 85

Question
Examine this output captured on an NFS server: # mount | grep export /dev/sdc1 on /export type ext3 (rw) /dev/sdc2 on /export/share2 type ext3 (rw) # cat /etc/exports /export (*ro) You mounted the /export filesystem on an NFS client using the command: # mount NFS_SERVER:/export/mnt What is the result of listing the files in /mnt/share2 on the NFS client?
Answer
  • It lists any files stored in the share2 directory in the /dev/sdc1 partition of the NFS server.
  • It lists any files stored in the root directory in the /dev/sdc2 partition of the NFS server.
  • It results in a permission denied error.
  • It results in a stale NFS handle error.
  • It produces no output.

Question 86

Question
A web server on HOST01 is listening on port 80. Examine the IPTABLES rule shown: [root@host01 ~] # iptables -L INPUT Chain INPUT (policy ACCEPT) targetportoptsourcedestination ACCEPTtcp- - anywhereanywheretcp dpt:http Another rule is then added: [root@host01 ~] # iptables -A INPUT -P tcp - - dport 80 -j REJECT What is the effect of this command on subsequent attempts to access the web server on HOST01 using port 80?
Answer
  • New connection attempts timeout.
  • New connection attempts are refused and the client informed of the refusal.
  • New connection attempts always succeed.
  • New connection attempts succeed until a reload of the firewall rules.

Question 87

Question
Which three actions may be performed using the date command in Oracle Linux?
Answer
  • Setting the hardware clock from the current system time
  • Setting the system time from the hardware clock
  • Displaying the current time in an administrator-specified format
  • Displaying the time and date in the future
  • Displaying the time and date in the past
  • Synchronizing the system time from an ntp server

Question 88

Question
Match the following symbolic notations of the file permissions with their numeric values: (1)- - - - S - - - - - - a) 5000 (2)- - - - - - - S - - - b) 4100 (3)- - - - - - - - - - - t c) 7101 (4)- - - - S - - - - - T d) 1001 (5)- - - - S - - S - - t e) 7040 (6)- S - - S r - - - T f) 2010
Answer
  • 1-d, 2-f, 3-b, 4-e, 5-c, 6-a
  • 1-b, 2-f, 3-d, 4-a, 5-c, 6-e
  • 1-f, 2-a, 3-c, 4-b, 5-e, 6-d
  • 1-b, 2-d, 3-f, 4-a, 5-e, 6-c

Question 89

Question
In which two situations would you use TCP as the preferred protocol to transfer data between different systems over a network spread across the globe? (Choose two.)
Answer
  • when the integrity of the data is important
  • when you want to retransmit the dropped packages
  • when the connection with the other system is important
  • when you want to establish a connection with another system before sending data

Question 90

Question
Identify the situation in which you would opt for aggregating multiple networks into a single interface via the Etherchannel.
Answer
  • to reduce redundancy in the event of hardware failure
  • to meet the requirement of hosting multiple Web sites on a single computer
  • when multiple IP networks are being used on the same physical network segment
  • when the bandwidth requirements on the network continue to grow beyond the capacity of a single network interface

Question 91

Question
As a Linux administrator, you issued the following command: tune2fs -O ^has_journal /dev/sdb2 What is the purpose of issuing this command?
Answer
  • to convert the ext2 filesystem on the /dev/sdb2 disk partition to the ext3 filesystem
  • to convert the ext3 filesystem on the /dev/sdb2 disk partition to the ext2 filesystem
  • to attach the /dev/sdb2 filesystem to the journal block device located on external journal
  • to take a backup of the journal in the /dev/sdb2 filesystem in to the super block of the /dev/sdb2 filesystem

Question 92

Question
The user smith, whose primary group is smith, wants to create a file in his home directory, which belongs to the group apps. Which two statements are correct?
Answer
  • SGID should be set on smith's home directory to let smith create files that belong to a group that is not his primary group.
  • The user smith can create a file that belongs to the apps group, only If his private group is the apps group as per /etc/group.
  • The user smith can use the newgrp command to change the primary group to apps, only if smith is listed in /etc/group as a member of the apps group.
  • The user smith can use the newgrp command to change the primary group to apps, but a password is required if smith is not listed in /etc/group as a member of the apps group.

Question 93

Question
Which three are valid directories for cron jobs to be run at known intervals?
Answer
  • /etc/cron.hourly
  • /etc/cron.daily
  • /etc/cron.minutely
  • /etc/cron.monthly
  • /etc/cron.yearly
  • /etc/cron.annually

Question 94

Question
Which two statements are true concerning the installation and configuration of the bootloader by the Anaconda installer, which is then used to boot Oracle Linux?
Answer
  • The Linux Loader (LILO) bootloader may be chosen for installation.
  • The bootloader must be password protected and Anaconda prompts for a password in all cases.
  • The Grand Unified Bootloader (GRUB) is the only bootloader used by Oracle Linux.
  • If previously installed operating systems are found on disk partitions that were not overwritten, then an attempt is made to configure the bootloader to be able to boot them.
  • The bootloader is installed by default in the first partition of the disk.

Question 95

Question
You want to display the value of a shell variable called service after assigning a value as shown: SERVICE =ACCTS Which two settings will display the name of the variable and its value?
Answer
  • set | grep service
  • echo $SERVICE
  • env | grep SERVICE
  • env $SERVICE
  • set $SERVICE

Question 96

Question
Which statements is true concerning Oracle Linux configuration files for users and groups?
Answer
  • The /etc/passwd file contains hashed passwords for each user.
  • The /etc/shadow file contains hashed passwords for each user.
  • The GECOS field in /etc/passwd file may be empty.
  • The /etc/group file contains the group name and the hashed group password.

Question 97

Question
Examine these statements and their output taken right after successful install of Oracle Linux: [root@FAROUT /] rpm q firstboot Firstboot -1.110.10-1.0.2.e16.x86_64 [root @FAROUT /] # chkconfig - - list firstboot Firstboot 0:off 2:off 3:off 4:off 5:off 6;off [root@FAROUT /] # /etc/sysconfig/firstboot RUN_FIRSTBOOT=NO What is the conclusion?
Answer
  • The option to run firstboot was deselected during Oracle Linux installation.
  • The system was installed with desktop graphical packages and rebooted and the firstboot utility ran successful.
  • Firstboot never ran in any run level because the service is turned off for all run levels.
  • The system was installed without selecting desktop graphical packages, thereby disabling firstboot from running.

Question 98

Question
Which three settings can be controlled by using the chage breemar command as the root user, to modify the parameters in the /etc/shadow file?
Answer
  • The expiration date of the breemar account
  • The number of days after the breemar account is locked, that it becomes expired
  • The maximum number of days that must elapse between password changes by the user breemar before the password becomes invalid
  • The number of days after the breemar account is locked, that it becomes unlocked
  • The minimum number of days that must elapse between password changes by the user breemar
  • The maximum number of failed login attempts on the breemar account before the account is locked

Question 99

Question
Examine this extract from the /etc/ssh/sshd_config file: passwordAuthentication no What is the effect of this parameter settings on the use of openSSH commands on both the client and server?
Answer
  • Passwords are not required and no ssh-keygen is required either. Only passphrase are required.
  • Client users whose keys are not in the authorized_keys file on the server are unable to use passwords to authenticate themselves to the server.
  • The ssh daemon does not ask for a password before starting or stopping the sshd service.
  • Client users whose keys are not in the authorized_keys file on the client are unable to use passwords to authenticate themselves to the server.

Question 100

Question
Which four statements are true about software on the Oracle Public YUM server?
Answer
  • It contains Oracle Linux installation ISO images.
  • It contains Oracle Linux binary RPM packages.
  • It contains Oracle Linux errata packages.
  • It contains Oracle Linux source RPM packages.
  • It contains beta Oracle Linux software packages.
  • It does not contain Unbreakable Enterprise Kernel packages.

Question 101

Question
Examine this sequence of commands and output: [root@FARAWAY ~] # cat /etc/oracle-release Oracle Linux Server release 6.1 [root@FARAWAY ~]# rpm -qa oraclelinux* Oraclelinux-release-noted-6Server-5.x86_64 Oraclelinux-release-6Server-1.0.2.x86_64 [root@FARAWAY ~] # rpm -qa rehat-release* [root@FARAWAY ~] # [root@FARAWAY ~] # rpm -qf /etc/oracle-release Oraclelinux-release-6Server-1.0.2.x86_64 [root@FARAWAY ~] rpm -qf /etc/redhat-release Oraclelinux-release-6Server-1.0.2.x86_64 Which two can be determined from this output?
Answer
  • The system has Oracle Linux 6 installed and the Red Hat compatible kernel is running.
  • The system has Oracle Linux 6 installed and the Oracle Unbreakable Enterprise kernel Is running.
  • It is not possible to determine which kernel is running.
  • This system has been booted at least once, with the Red Hat-compatible kernel and once with the Unbreakable Enterprise kernel.
  • The oracle-release package contains both Oracle and Red Hat release metadata.

Question 102

Question
Examine the contents of /etc/rc.d Which two statements are true concerning the files contained in the run level-specific directories rc0.d through rc6.d?
Answer
  • The files starting with S or K are links to scripts in the /ete/init.d directory.
  • The files starting with S are always invoked by the /etc/rc.d/rc script even if the service managed by that script is already down.
  • The files starting with S or K are added by using the chkcor.fig command.
  • The files starting with K are always invoked by the /rc/rc,d/re script even if the service managed by that script is already up.
  • The files starting with S are invoked before those starting with K.

Question 103

Question
As root, you enter a crontab command as shown; [root@FAROUT cron.daily] # crontab -1 */2 * * * * vmstat 0 0 1 1-5 * iostat [root@FAROUT cron.daily] # Which three statements are true concerning the two cron jobs listed?
Answer
  • The iostat command runs at midnight of every day except Sunday.
  • The vmstat command runs twice per hour.
  • The vmstat command runs every other hour.
  • The vmstat command runs every second minute.
  • All cron job output is sent to the root user's mall.
  • All cron job output is sent to /var/log/messages.
  • The iostat command runs at midnight on the first day of each of the first five months of the year.

Question 104

Question
Which three statements are true configuration files and the behavior of module parameters specified in those files, in the /etc/modprobe.d directory?
Answer
  • The files may contain options to be passed to a module only when it is a dependency of a module being inserted.
  • The file may contain shell commands to be run instead of inserting a particular module in the kernel.
  • The files may contain options to be passed to a module, only when it is inserted using a modprobe command.
  • The files may contain alias names for modules.
  • The file may contain instructions to ignore certain modules.
  • The files may contain options to be passed to a module only when it is Inserted using an insmod command.

Question 105

Question
Which two statements are true regarding the use of the ssh-agent and ssh-add commands?
Answer
  • The ssh-agent is used to hold private keys.
  • The ssh-add command may ask for a passphrase each time the same key is required by the same user in the same shell.
  • The ssh-agent is used to hold only public keys.
  • The ssh-add command asks for the passphrase only the first time a key is required by the same user in the same shell.
  • The ssh-add command retries the most recently saved passphrase if multiple key files are used.

Question 106

Question
Users complain that system performance is unacceptable when using a specific application service running on a multiprocessor service. You have established from the storage team that disk response times have not increased, so you can discount there being an I/O problem. You run vmstat to look at CPU activity and notice high average disk times on the multiprocessor system and an average run queue of zero. You require more detail about each CPU from which the vmstat figures are derived, to investigate if the load is distributed evenly across all CPUs. Which three commands provide more detailed information about CPU load distribution?
Answer
  • iostat x
  • top
  • mpstat
  • vmstat
  • sar

Question 107

Question
Which three statements are true concerning filesystems supported by Oracle Linux?
Answer
  • An ext3 filesystem can be mounted as an ext2 filesystem.
  • An ext4 filesystem can be mounted as an ext3 filesystem.
  • The ext3 and ext4 filesystems both support multiple journaling modes.
  • The btrfs filesystem includes a volume manager.
  • The btrfs filesystem cannot be used for the root filesystem.
  • The ext4 filesystem is a copy-on-write filesystem.

Question 108

Question
The SSHD service is controlled by the script in /etc/init.d/sshd, part of which is shown here: [root@FAROUT ~] cat /etc/init.d/sshd # !/bin/bash # # sshdStart up the OpenSSH server daemon # # chkconfig: 23455525 # description: SSH is a protocol for secure remite shell access. \ # This service starts up the Open SSH server daemon. # You issue chkconfig commands to change the sshd service: [root@FAROUT ~] # chkconfig sshd off [root@FAROUT ~] # chkconfig sshd reset What is the result of the two commands issued?
Answer
  • The sshd service configuration is restored to the settings that existed before setting it off.
  • The sshd service configuration is restored to start In run levels 2, 3, 4 and 5.
  • The sshd service configuration is restored to start in run levels 2 and 5 only.
  • The sshd service configuration is restored to those that existed after the operating system was first installed.

Question 109

Question
The dailyrun.sh shell script run by the user hr on a daily basis suddenly returns an error. You investigate this by running the commands manually as user hr and discovered that this line of shell cod is responsible: 1s als > /home/prodrun/files.1st Bash: files.1st:cannot overwrite existing file What is the cause of this error?
Answer
  • The hr user has no write permissions on the /home/prodrun/files.1st file.
  • The hr user has no write permissions on the /home/prodrun directory.
  • The dailyrun.sh shell script has the setuid bit turned off.
  • The hr user environment has set on the noclobber option.

Question 110

Question
Examine the output shown: [root@FAROUT fs] # rpm -qa | grep preinstall Oracle-rdbms-server-11gR2-preinstall-1.0-6.e16.x86_64 [root@FAROUT fs] # rpm -q1 oracle-rdbms-server-11gR2-preinstall-1.0-6.e16.x86_64 /etc/rc.d/init.d/oracle-rdbms-server-11gR2-preinstall-firstboot /etc/sysconfig/Oracle-rdbms-server- 11gR2-preinstall-verify /etc/sysconfig/oracle-rdbms-server-11gR2-preinstall/Oracle-rdbms-server-11gR2-preinstall.param /usr/bin/oracle-rdbms-server-11gR2-preinstall-verify Which three statements are true about oracle-rdbms-server-11gR2-preinstall-1.0-6.e16.x86_64 rpm?
Answer
  • It is a new name for oracle-validated package from Oracle Linux 5 that sets parameters to the same values.
  • It creates the oracle user if not already created, which owns the Grid Infrastructure software should that get installed.
  • It creates the grid user if not already created which owns the grid infrastructure software should that get installed.
  • It modifies kernel parameters in /etc/sysctl.conf.
  • It runs at the first boot after installing the packages to set a parameter indicating that is has run once.
  • It modifies parameters in the /etc/sysconfig/network-scripts directly.
  • It creates the osoper group, if not already created.

Question 111

Question
You installed the sendmail-cf package using the yum command as shown: # yum -Y install sendmail-cf Loaded plugins: security Setting up Install Process Resolving Dependencies - -> Running Transaction Check - - - > Package sendmail-cf.noarch 0:8.14.4-8.e16 will be installed - - > Processing Dependency: sendmail = 7.14.4-8.e16 for package: sendmail-cf-8.14.4- 8.e16.noarch - - > Running transaction check - - > Package sendmail.x86_64 0:8.14.4-8.e16 will be installed - - > Finished Dependency Resolution Dependency Resolved What is the outcome of the YUM command? # yun y remove sendmail
Answer
  • It fails with an error because the sendmail-cf package depends on the package being removed.
  • It succeeds and removes both the sendmail and sendmail-cf packages.
  • It succeeds and only removes the sendmail package.
  • It removes the sendmail packages and raises a warning about the sendmail-cf package, which depends on the package being removed.
  • It removes the sendmail package and prompts you for the option to remove the sendmail-cf package.

Question 112

Question
You issued the following command: renice +1 987 -u daemon smith -p 20 What is the purpose of issuing this command?
Answer
  • to change the priority of process with ID 20 and all processes owned by the user smith
  • to change the priority of process with ID 20 and all processes owned by the users daemon
  • to change the priority of processes with IDs 1 and 987 and all processes owned by daemon and smith to 20
  • to change the priority of processes with IDs 987 and 20 and all processes owned by users daemon and smith

Question 113

Question
Match the modinfo command options with their descriptions: 1) p A) description of the module 2) a B) license of the module 3) d C) lists parameters (options) for the module 4) l D) lists the author of the module
Answer
  • 1-C, 2-A, 3-D, 4-B
  • 1-C, 2-D, 3-A, 4-B
  • 1-B, 2-A, 3-D, 4-C
  • 1-B, 2-D, 3-A, 4-C

Question 114

Question
Which two statements are true about kickstart installation? (Choose two.)
Answer
  • It can be performed using only network file system (NFS).
  • The Anaconda has to be made aware of the kickstart installation by passing the ks option at the boot: prompt.
  • By default, the kickstart installation sets the same root password if all the systems are set up using the same kickstart file.
  • Omitting any required item during the kickstart file creation would cause the item to be skipped during the kickstart installation without requiring any user intervention.

Question 115

Question
You want to configure the display login program to display the face browser of user accounts for system logon. Which two display managers support this feature? (Choose two.)
Answer
  • gdm
  • kdm
  • twm
  • xdm

Question 116

Question
You want to probe the network segment so that you can determine which addresses are currently in use. Which three commands would you use to perform this task? (Choose three.)
Answer
  • arp
  • dig
  • mtr
  • ping -b
  • nslookup
  • nmap -sP
  • arping -D

Question 117

Question
You work for XYZ organization and are setting up a new Linux box. The organization wants the user's data on the system to be safe even in the event of a crash of the root filesystem. Which step do you think would help the administrator achieve the organization objective?
Answer
  • Have /opt directory on its own filesystem with the filesystem being ext3.
  • Have /home directory on its own filesystem with the filesystem being ext3.
  • Have /var directory on its own filesystem and all other filesystems under / (root filesystem).
  • Have /usr directory on its own filesystem and all other filesystems under / (root filesystem).

Question 118

Question
Your server is running without a reboot for more than a year and is suddenly showing a drift in the time with the hardware clock. As an administrator which two steps would you perform to synchronize both the clocks without using an external source? (Choose two.)
Answer
  • Use the date command to adjust the system clock.
  • Use the rdate command to adjust the hardware clock.
  • Use the ntpdate command to adjust the system clock.
  • Use the hwclock command to change the hardware clock time.

Question 119

Question
In which three situations is Grand Unified Bootloader (GRUB) the best choice as the boot loader? (Choose three.)
Answer
  • when you want to boot from a network
  • when there is a need for a serial console
  • when you want to have a dual boot on the system
  • when you want the support for journaling file system
  • when you want to boot the system by just passing the kernel and the initrd files path at the boot prompt

Question 120

Question
Which statements are true about Logical Volume Manager (LVM) in Linux? (Choose all that apply.)
Answer
  • The root filesystem / can be installed on a Logical Volume.
  • The LVM does not have built-in support for striping and mirroring.
  • Two Volume Groups can be merged together to form a single Volume Group.
  • The Logical Volumes can be extended without even unmounting the filesystems.
  • Physical Volumes can be added as well as removed from an existing Volume Group.

Question 121

Question
Which three statements are true about /etc/at.allow and /etc/at.deny files? (Choose three.)
Answer
  • If only the /etc/at.deny file exists, all users are denied from using at, except the root user.
  • If /etc/at.allow and /etc/at.deny files do not exist, all users are permitted to use at.
  • If /etc/at.allow and /etc/at.deny files do not exist, only the root user is permitted to use at.
  • If only the /etc/at.allow file exists, only the users whose names are listed in the /etc/at.allow file are allowed to use at.
  • If /etc/at.allow and /etc/at.deny files exist, only the users whose names are listed in /etc/at.allow would be allowed to use at.

Question 122

Question
Which two statements are true about the /etc/exports entry given below? (Choose two.) /export/setup station1 (rw,no_root_squash)
Answer
  • The network file system (NFS) service would not let station1 to write on the /export/setup share.
  • The NFS service would grant all other machines read and write access without squashing the root privileges except station1.
  • The NFS protocol on the server requires that requests from station1 should originate on an internet port greater than port 1024.
  • The NFS protocol on the server would reply to requests from station1 only after any changes made by that request have been committed to stable storage (/export/setup).

Question 123

Question
You set the SELinux policy as SELINUXTYPE=targeted. What implications does it have on different applications? (Choose all that apply.)
Answer
  • Only targeted network daemons are protected.
  • Separate types are defined for most commands and services.
  • Full SELinux protection would be applicable for all the daemons and applications.
  • Applications that do not have any policy defined would run in the unconfined_t domain.
  • Applications that do not have any policy defined would be denied access to the rest of the system.

Question 124

Question
Which three statements are true regarding the /etc/rc.sysinit boot script? (Choose three.)
Answer
  • It sets up the system clock.
  • It configures kernel parameters.
  • It does not configure swap space.
  • It is read before the /etc/inittab file by init.
  • It saves dmesg content to the /var/log/dmesg file.

Question 125

Question
Which two statements are true about an X server? (Choose two.)
Answer
  • Multiple X servers can be run on the same host.
  • The first X server on a remote host listens on port 6000.
  • The first X server on a remote host listens on port 6001.
  • Only a single X server can run on a machine at any given point of time.

Question 126

Question
Which statement is FALSE concerning the use of OpenSSH utilities? (Choose the best answer.)
Answer
  • scp always requires a passphrase to be used
  • scp permits copies between two remote hosts
  • ssh may be used to execute a single command on a remote host instead of executing the login shell on the remote host
  • sftp may be used to execute a command on the remote server

Question 127

Question
Examine the commands and output shown: What is the cause of this connection refusal? (Choose the best answer.)
Answer
  • The web server has no documents to serve
  • The firewall blocked the connection due to an unintended rule blocking localhost port 80
  • The web server is not listening on the local loopback adapter
  • The system has no route to localhost

Question 128

Question
The dailyrun.sh Bash shell script has the permissions as listed here: -rw-r- -r- - 1 hr hradmin 8 Apr 2 06:57 dailyrun.sh Which three methods will be successful at avoiding permissions errrors when attempting to run the script? (Choose three.)
Answer
  • executing the shell script using an alias created with the alias dailyrun='bash dailyrun.sh'
  • executing the shell script using an alias created with the alias dailyrun=dailyrun.sh
  • executing the shell script from the shell prompt using the bash command
  • executing the shell script from the shell prompt using the sh command
  • executing the shell script from within a shell function using an alias created with the alias dailyrun='dailyrun.sh'

Question 129

Question
Match the bash files with their correct description: (Choose the best answer.) File name Description 1) /.bash_history a. a list of commands to be executed when you log in 2) /.bash_logout b. a list of commands that is executed every time you open a new shell 3) /.bash_profile c. a list of commands you have executed from a bash shell 4) /.bashrc d. a list of commands to be executed when you exit a login shell e. a list of commands executed before the current day f. a list of commands executed when a shell script has a nonzero return code
Answer
  • 1-c, 2-d, 3-a, 4-f
  • 1-c, 2-b, 3-d, 4-a
  • 1-c, 2-d, 3-a, 4-b
  • 1-e, 2-c, 3-a, 4-d

Question 130

Question
The user scott tries to create a directory hierarchy under a specific directory location and encounters an error: Which command must scott use to create the directory hierarchy successfully? (Choose the best answer.)
Answer
  • mkdir /test/test1/stored/all
  • mkdir -r test/test1/stored/all
  • mkdir -p test/test1/stored/all
  • mkdir R test/test1/stored/all E. mkdir r /tmp/test/test1/stored/all
  • mkdir -r /tmp/test/test1/stored/all

Question 131

Question
Which statement correctly describes the default location of the GRUB bootloader code used by Oracle Linux? (Choose the best answer.)
Answer
  • All of the GRUB bootloader code is written to the Master Boot Record (MBR)
  • A portion of the GRUB bootloader code is written to the Master Boot Record (MBR) and the rest is written to the / filesystem
  • All of the GRUB bootloader code is written to the /boot filesystem
  • A portion of the GRUB bootloader code is written to the /boot filesystem and the rest is written to the / filesystem
  • A portion of the GRUB bootloader code is written to the Master Boot Record (MBR) and the rest is written to the /boot filesystem

Question 132

Question
Which two statements are true concerning OpenSSH configuration files? (Choose two.)
Answer
  • The /etc/ssh/ssh_config file is the global configuration file for the sshd server daemon
  • If user harhest has an ssh configuration file called /home/harhest/.ssh/config, then this overrides the /etc/ssh/ssh_config file for OpenSSH sessions used by harhest
  • Copying the /harhest/.ssh/known_hosts file from user harhest on hosta to the /jopam/.ssh/known_hosts file for user jopam on hostb, permits harhest to use OpenSSH commands to access the jopam account without supplying a password
  • An ssh client uses either id_dsa.pub or id_rsa.pub to authenticate itself without a password, to an ssh server, which checks them into the target users' authorized_keys file

Question 133

Question
Examine the channel specification in the /etc/yum.repos.d/public-yum-016.repo file: What is the effect of the gpgcheck=0 setting?
Answer
  • yum will not check for dependencies when installing packages from this channel
  • yum will not perform key verification during package installation from this channel
  • This channel will not be used by yum when it checks for updated packages
  • This channel will not be used by yum when it searches for packages
  • yum will not check if the channel metadata is up-to-date for this channel

Question 134

Question
Examine the commands and output related to the use of the cron facility: Which three statements are true concerning the use of the crontab utility? (Choose three.)
Answer
  • The oracle user may list the root user's crontab using cat /var/spoo1/cron/root
  • The oracle user may list the root user's crontab using crontab -u root -1
  • The oracle user may not delete the root user's crontab using crontab -u root -r
  • The oracle user may not modify the root user's crontab using crontab -u root -e
  • The root user may not create the oracle user's crontab using crontab -u oracle -e
  • The root user may modify the oracle user's crontab using crontab -u oracle -e

Question 135

Question
Examine the files and directories shown: What is the reason for this configuration? (Choose the best answer.)
Answer
  • The links in /etc to the directories in /etc/rc.d are provided to make Linux run level processing configuration resemble the SysV UNIX configuration
  • The links in /etc to the directories in /etc/rc.d are provided to permit one set to have different owners or ppermissions than the other
  • The links in /etc to the directories in /etc/rc.d are not required and must have been added by the administrator
  • The links in /etc to the directories in /etc/rc.d are provided to allow /etc/rc.d/rc to work properly

Question 136

Question
Which three actions may be done using the Anaconda installer when working with an Oracle Linux 6 system? (Choose three.)
Answer
  • downgrading an installed system
  • booting an installed system from a local drive
  • attempting a rescue to repair problems with a partition table that prevents booting an installed system
  • deinstalling an installed system
  • upgrading an installed system

Question 137

Question
Which three statements are true concerning the use of keys generated by the ssh-keygen command? (Choose three.)
Answer
  • dsa keys must be protected by a passphrase
  • dsa keys are supported by version 2 of the ssh protocol
  • rsa keys are supported by version 2 of the ssh protocol
  • rsa keys are supported by version 1 of the ssh protocol
  • dsa keys are supported by version 1 of the ssh protocol
  • rsa keys must be protected by a passphrase

Question 138

Question
You are attempting to install Oracle Linux 6 with default options and the screen is distorted. You stop the install. Which two methods can you use to install Oracle Linux and work around this problem? (Choose two.)
Answer
  • Install the system using text mode
  • Press the tab key and enter askmethod to allow a choice of video drivers to be listed
  • Specify the screen resolution at the Anaconda boot prompt
  • Install the system using a different X server
  • Install the system with the basic video driver option

Question 139

Question
Which two statements are true concerning an MSDOS partition table? (Choose two.)
Answer
  • It does not support disks with more than 1024 cylinders
  • It can be used on the boot disk
  • It supports either four primary partitions or three primary partitions and one extended partition
  • It can be used on disks up to four terabytes in size
  • It supports named partitions

Question 140

Question
Match the shell variables with their correct description: 1) $1 a) process ID of the shell 1) $* b) the string containing all the arguments to the shell 1) $? c) process ID of the last command run in the background 1) $$ d) positional parameter 1) $! e) exit status of the most recently executed command
Answer
  • 1-d, 2-b, 3-e, 4-a, 5-c
  • 1-b, 2-a, 3-e, 4-d, 5-c
  • 1-e, 2-c, 3-a, 4-b, 5-d
  • 1-d, 2-a, 3-c, 4-b, 5-e

Question 141

Question
Which two are correct about the oracle-rdbms-server-11gR2-preinstall and oracle-validated RPMs? (Choose two.)
Answer
  • They are only available to Oracle Premium Support customers
  • They contain a number of other RPMS that are required for a successful Oracle database product installation
  • They have dependencies on a number of other RPMS that are required for a successful Oracle database product installation
  • The oracle-validated RPMS if used, must be installed before installing an Oracle database product
  • The oracle-validated RPMS if used, must be installed after installing an Oracle database product

Question 142

Question
Examine the ssh connection and disconnection shown: What is checked when the oracle user on the host FAROUT attempts to connect to the oracle user on the host WAYOUT on subsequent occasions? (Choose the best answer.)
Answer
  • Hosts FAROUT and WAYOUT swap public host keys and compare them to the keys that were saved locally in the /oracle/.ssh/known_hosts file
  • The ssh client on host FAROUT, compares the public host key supplied by host WAYOUT with the public host key that was saved in the /oracle/.ssh/known_hosts file on server FAROUT
  • The ssh server on host WAYOUT, compares the public host key supplied by host FAROUT with the public host key that was saved in the /oracle/.ssh/authorized_keys file on server WAYOUT
  • The ssh client on host FAROUT, compares the public host key supplied by host WAYOUT with the public host key that was saved in the /oracle/.ssh/authorized_keys file on server FAROUT
  • The ssh server on host WAYOUT, compares the public host key supplied by host FAROUT with the public host key that was saved in the /oracle/.ssh/known_hosts file on server WAYOUT

Question 143

Question
Which three statements are true about HugePages? (Choose three.)
Answer
  • The number of HugePages is defined in /etc/security/limits.conf
  • The number of HugePages is controlled by a Linux kernel parameter
  • HugePages are never swapped to disk
  • HugePages usage reduces page table overhead
  • The number of HugePages is controlled by Oracle database parameters

Question 144

Question
What is the purpose of executing lvconvert -m1 ...? (Choose the best answer.)
Answer
  • to detach a copy from a mirrored logical volume
  • to reattach a detached copy back to its original logical volume
  • to add an additional copy to an already mirrored logical volume
  • to convert a linear logical volume into a mirrored logical volume
  • to convert a mirrored logical volume into a linear logical volume

Question 145

Question
What is the purpose of setting USERCTL=yes In an interface configuration file located in /etc/sysconfig/network-scripts? (Choose the best answer.)
Answer
  • to allow a non-root user to bring a network interface up or down using the ifup and ifdown commands
  • to allow a non-root user to bring a network interface up or down using the ifconfig command
  • to allow a non-root user to bring a network interface up or down using the ethtool command
  • to allow a non-root user to bring a network interface up or down using the ifup, ifdown, and ifconfig commands

Question 146

Question
Which three statements are true about the Oracle Linux Multiple Device Driver (MD)? (Choose three.)
Answer
  • RAID devices can only be built on disk partitions
  • It can be configured to have spare devices
  • It supports striping, mirroring, and a combination of striping and mirroring
  • It includes snapshot functionality
  • It can be used to mirror the root filesystem

Question 147

Question
An Oracle Linux system has not been updated for a while and the currently running kernel is three releases behind the most recent kernel release. Each released kernel fixed several problems, totaling 11 bug fixes. You are about to update this kernel using this command: How does Ksplice Uptrack apply these updates? (Choose the best answer.)
Answer
  • It downloads three updates, clones the running kernel in memory, applies the updates in one single atomic update, and uses Kexec to activate the updated kernel
  • It downloads 11 updates and applies them one by one to the running kernel
  • It downloads 11 updates and applies them in a single transaction to the running kernel
  • It downloads three updates and applies them in a single transaction to the running kernel

Question 148

Question
What is the default volume or device type for swap space in Oracle Linux, when choosing the "basic storage devices" option during the install? (Choose the best answer.)
Answer
  • a partition on a Logical Volume Manager Logical (LVM) managed volume
  • a partition on a local hard disk
  • a Linux Multi Disk (MD) driver device
  • a partition on a flash disk
  • a swap file on the root file system

Question 149

Question
Select the two keywords used in /etc/rsyslog.conf that perform these two tasks: (Choose two.) load modules implement log message formatting
Answer
  • template
  • $ModLoad
  • $template
  • $Load
  • ModLoad

Question 150

Question
Examine the output of a bonded interface configuration from which one network cable has been unplugged: Which statement is true when you plug in the eth2 network cable?
Answer
  • The status of the slave interface eth2 changes to up and becomes a backup slave
  • The status of the slave interface eth2 changes to up and becomes a second active slave.
  • The status of the slave interface eth2 changes to up but must be manually assigned the active or backup slave role.
  • The status of the slave interface eth2 changes to up and is promoted to the primary active slave whereas eth1 becomes the backup slave

Question 151

Question
Which two statements are true about an RPM package? (Choose two.)
Answer
  • An RPM can be installed from a local filesystem or a remote repository using the rpm command
  • In general, it is possible to have multiple versions of the same RPM package installed on a single system
  • a source RPM is machine architecture dependent
  • a binary RPM contains compiled programs as well as the source code of these programs
  • a RPM package can contain programs, documentation installation procedures, source files, and metadata about itself

Question 152

Question
Which three statements are true regarding the use and administration of su and sudo in Oracle Linux? (Choose three.)
Answer
  • A user may use su to start a new shell
  • The /etc/sudoers file may be edited to permit certain executables to be used with root privileges only if they are run on certain hosts
  • Using su-test to switch to the test user does not run the test user's login scripts
  • The /etc/sudoers file may be edited to prevent a user from using su to switch to another user
  • The /etc/sudoers file may be edited to allow a use to execute certain root-owned executables with root privileges
  • The /etc/sudoers file may be edited to prevent root from executing certain executables unless a password is provided

Question 153

Question
Which statement correctly describes the requisite PAM control flag? (Choose the best answer.)
Answer
  • requisite flagged modules are ignored if they fail
  • requisite flagged modules must be successfully checked for authentication to succeed. If a requisite module checks fails, the user is notified immediately with a message reflecting the first failed required or requisite module
  • requisite items only play a role when no other modules of that module type have succeeded or failed. In that case, the success or failure of a requisite flagged module determines the overall PAM authentication for that module type
  • requisite flagged modules must be successfully checked for authentication to succeed. If a requisite module checks fails, the user is not notified until all other modules of the same module's type have been checked

Question 154

Question
Which two statements are true about the Ksplice patching feature feature of Oracle Linux when running in standard mode? (Choose two.)
Answer
  • It can update both the Unbreakable Enterprise Kernel (UEK) as well as the Red Hat compatible kernel
  • It can update both the running kernel in memory and the corresponding kernel image on disk
  • It requires access to the Internet, either direct or via a proxy server
  • It can update the kernel without rebooting the system
  • Updates to the Ksplice software are installed automatically

Question 155

Question
Which three statements describe the OSWatcher Black Box (OSWbb) system monitoring and troubleshooting tool? (Choose three.)
Answer
  • OSWbb is a part of the standard Oracle Linux distribution
  • OSWbb is an Oracle product and must be installed after system installation using yum or rpm
  • OSWbb is an Oracle product and is installed by downloading is from MOS and unpacking a tar file
  • OSWbb is a set of scripts using traditional UNIX monitoring tools to gather system activity and performance data
  • OSWbb maintains an archive of text files containing gathered statistics
  • OSWbb is designed to work with any POSIX-compliant shell

Question 156

Question
You attempt to create a new user on Oracle Linux with nothing but a username: useradd goodbred Which three statements are true? (Choose three.)
Answer
  • The goodbred account has default values assigned from the /etc/login.defs file
  • The goodbred account has /sbin/nologin as the shell in /etc/passwd
  • The goodbred account has default values assigned from the /etc/default/useradd file
  • The goodbred account is locked
  • The goodbred account will never have files copied from /etc/skel to the /etc/home/goodbred directory

Question 157

Question
Which two actions should an Oracle Linux administrator perform to configure a server so that its clock is synchronized with a reference time server? (Choose two.)
Answer
  • Run ntpd at system boot to ensure that the system clock is synchronized with the reference time server
  • Run rdate at system boot to ensure that the system clock is synchronized with the reference time server
  • Run the ntpdate daemon to update the system clock, thereby keeping it synchronized with the reference time server
  • Run ntpdate at system boot to ensure that the system clock is synchronized with the reference time server
  • Run the ntpd daemon to update the system clock, thereby keeping it synchronized with the reference time server
  • Run the rdate daemon to update the system clock, thereby keeping it synchronized with the reference time server

Question 158

Question
Which three statements are true about maintaining system parameters in Oracle Linux? (Choose three.)
Answer
  • echo can be used to change values for various system parameters
  • sysctl -w can be used to change values for various system parameters
  • Changes made using echo are lost after rebooting the system
  • Changes made using sysctl -w are preserved after rebooting the system
  • Changes made to /etc/sysctl.conf take effect immediately after saving the file

Question 159

Question
Examine the partition table: Disk /dev/sdd: 107 MB Sector size (logical/physical): 512B/512B Partition Table: gpt NumberStartEndSizeTypeFileSystem Flags 11049KB79.7MB78.6MBPrimary Which program can be used to add another partition on this device?
Answer
  • fdisk
  • cfdisk
  • parted
  • kpartx
Show full summary Hide full summary

Similar

Limitaciones E-25 C 101
Jose Antonio Vazquez
ley 100 de 1993
joseosa98
FOSYGA
Jose Gañan
Multiplicación por 10, 100 y 1.000
abraham marquez robles
Ley 100 1993
María Angélica N
Ley 100 de 1993
María Angélica N
ley 100 de 1993 321
María Angélica N
Tipos de auditor
Richard Castillo
ley 100 de 1993 titulo
María Angélica N