Exam 1z0 100 Oracle Linux 5 and 6 System Administration
Exam 1z0 100 Oracle Linux 5 and 6 System Administration
Exam 1z0 100 Oracle Linux 5 and 6 System Administration
OracelQuesotins&Answers
Search
J U S T
A N O T H E R
A L L
O N E
T E SHome
T K I
NMembership
G
S I T E Subscribe
S
CheckPoint Cisco CIW CompTIA CWNP EC-Council ISC2 Juniper Linux Microsoft Oracle Sun VMWare EMC Exin Isilon PMI HP IBM ISACA
E X A M
I N F O R M Awhich
T I O
N
is then
used to boot Oracle Linux?
Posted by seenagape on July 25, 2014
No comments
W hich tw o statements are true concerning the installation and configuration of the bootloader by
the Anaconda installer, w hich is then used to boot Oracle Linux?
A.
Which two settings will display the name of the variable and its value?
Posted by seenagape on July 25, 2014
2 comments
You w ant to display the value of a shell variable called service after assigning a value as show n:
SERVICE =ACCT S
W hich tw o settings w ill display the name of the variable and its value?
A.
set | grep service
B.
echo $SERVICE
C.
Which statements is true concerning Oracle Linux configuration files for users and groups?
Posted by seenagape on July 25, 2014
W hich statements is true concerning Oracle Linux configuration files for users and groups?
A.
The /etc/passw d file contains hashed passw ords for each user.
B.
1 comment
Explanation:
/etc/shadow file stores actual password in encrypted (one-way hashed) format for
users account with additional properties related to user password i.e. it stores secure user
account information
2 comments
Examine these statements and their output taken right after successful install of Oracle Linux:
[root@FAROUT /] rpm q firstboot
Firstboot -1.110.10-1.0.2.e16.x86_64
[root @FAROUT /] # chkconfig - list firstboot
Firstboot 0:off 2:off 3:off 4:off 5:off 6;off
[root@FAROUT /] # /etc/sysconfig/firstboot
RUN_FIRSTBOOT=NO
W hat is the conclusion?
A.
The option to run firstboot was deselected during Oracle Linux installation.
B.
The system w as installed w ith desktop graphical packages and rebooted and the firstboot utility
ran successful.
C.
Firstboot never ran in any run level because the service is turned off for all run levels.
D.
The system w as installed w ithout selecting desktop graphical packages, thereby disabling
firstboot from running.
Explanation:
Firstboot is set to off for all levels.
Example:
The rm command below remove or delate the firstboot file in order to make sure the firstboot
program running when we restart or reboot the Fedora machine.
[root@fedora ~]# rm /etc/sysconfig/firstboot
rm: remove regular file `/etc/sysconfig/firstboot? y
[root@fedora ~]#
Then check and make sure that firstboot program or firstboot service is run when your Fedora
startup/boot up.
Check firstboot services
[root@fedora ~]# chkconfig list firstboot
firstboot 0:off 1:off 2:off 3:off 4:off 5:off 6:off
[root@fedora ~]#
Which three settings can be controlled by using the chage breemar command as the root user, to
modify the parameters in the /etc/shadow file?
Posted by seenagape on July 25, 2014
W hich three settings can be controlled by using the chage breemar command as the root user, to
modify the parameters in the /etc/shadow file?
A.
The maximum number of days that must elapse between password changes by the user
breemar before the password becomes invalid
D.
The number of days after the breemar account is locked, that it becomes unlocked
E.
The minimum number of days that must elapse between password changes by the user
breemar
F.
The maximum number of failed login attempts on the breemar account before the account is
locked
Explanation:
A: chage -E, expiredate EXPIRE_DATE
Set the date or number of days since January 1, 1970 on which the
users account will no longer be accessible.
CE: You need to use chage command to setup password aging.
The chage command changes the number of days between password changes
and the date of the last password change. This information is used by
the system to determine when a user must change his/her password.
No comments
What is the effect of this parameter settings on the use of openSSH commands on both the client
and server?
Posted by seenagape on July 25, 2014
No comments
Client users whose keys are not in the authorized_keys file on the server are unable to use
passwords to authenticate themselves to the server.
C.
The ssh daemon does not ask for a passw ord before starting or stopping the sshd service.
D.
Client users w hose keys are not in the authorized_keys file on the client are unable to use
passw ords to authenticate themselves to the server.
Explanation:
If you set PasswordAuthentication to no, you will no longer be able to use a login
and password to authenticate and must use a login and public key instead (if
PubkeyAuthentication is set to yes).
Which four statements are true about software on the Oracle Public YUM server?
Posted by seenagape on July 25, 2014
No comments
W hich four statements are true about softw are on the Oracle Public YUM server?
A.
It contains Oracle Linux installation ISO images.
B.
No comments
A device failed and has been removed from this RAID set.
B.
It is no longer possible to w rite to this RAID set.
C.
Read and w rite performance is no longer optimal on this RAID set.
D.
No comments
It will load the nfs module if all the modules upon which it depends have been loaded.
B.
It displays the dependency resolution for the nfs module and loads all the modules upon w hich
nfs depends before loading the nfs module.
C.
It verifies that the nfs module and all other modules that depend on the nfs module are
installed.
D.
It displays the dependency resolution that w ould occur if the nfs module w ere to be loaded
using modprobe nfs.
E.
It only loads the nfs module if all the modules upon w hich it depends have not been loaded yet.
Explanation:
Reference: http://redhat.activeventure.com/8/customizationguide/ch-kernel-modules.html (kernel
module utilities)
What is the main advantage of the Oracle Unbreakable Enterprise Kernel compared with the Red
No comments
W hat is the main advantage of the Oracle Unbreakable Enterprise Kernel compared w ith the Red
Hat compatible kernel?
A.
It is more secure and, therefore, more difficult to hack.
B.
It has a low er Mean Time Betw een Failures.
C.
It provides higher availability for applications by reducing Mean Time to Recovery.
D.
It scales better for more CPUS, memory, and Infiniband network connections.
Explanation:
The Unbreakable Enterprise Kernel, for those who want to leverage the latest
features from
mainline Linux and boost performance and scalability.
The Red Hat Compatible Kernel, for those who prefer strict Red Hat kernel ABI (kABI)
compatibility.
2 comments
The file system was exported on host o16 using the ROOT_SQUASH option.
B.
The /export filesystem w as mounted w ith the NOEXEC option on host o16.
C.
The filesystem mounted on /mnt w as mounted w ith the NOEXEC option.
D.
The filesystem w as exported on host o16 by using the NO_ROOT_SQUASH option.
Explanation:
Which two software packages are prerequisites for enabling the configuration and use of a
Network information Service (Nis) client?
Posted by seenagape on July 25, 2014
W hich tw o softw are packages are prerequisites for enabling the configuration and use of a
Netw ork information Service (Nis) client?
A.
nis-tools
B.
slapi-nis
C.
ypbind
D.
nisserv
E.
nisbind
F.
yp-tools
Explanation:
C: ypbind finds the server for NIS domains and maintains the NIS binding
information. The client (normaly the NIS routines in the standard C library) could get the
information over RPC from ypbind or read the binding files.
1 comment
No comments
Which two Statements are true concerning the configuration and use of cron and anacron?
Posted by seenagape on July 25, 2014
1 comment
W hich tw o Statements are true concerning the configuration and use of cron and anacron?
A.
Anacron jobs are used to make sure cron jobs run if the system had been dow n w hen they
w ere meant to run.
B.
All crontabs are held in the /etc/cron.d directory.
C.
Which statement is true concerning the /etc/sysconfig directory and its files and subdirectories?
Posted by seenagape on July 25, 2014
No comments
W hich statement is true concerning the /etc/sysconfig directory and its files and subdirectories?
A.
The contents are alw ays the same for a specific version of the Oracle Linux Kernel.
B.
The file /etc/sysconfig/init is used by upstart to control the attributes of the tty devices that get
started.
C.
The directory /etc/sysconfig/netw ork-scripts contains files that must not be modified w hile the
netw ork is up.
D.
The files only contain default values for certain daemon processes.
Explanation:
The /etc/sysconfig/init file controls how the system appears and functions during the
boot process.
Note: The /etc/sysconfig directory contains files that control your systems configuration. The
contents of this directory depend on the packages that you have installed on your system
3 comments
C.
Traffic to 192.168.0.42 is routed via eth2.
D.
Which two Statement:; are true concerning eth0 based on this configuration?
Posted by seenagape on July 25, 2014
1 comment
Which four statements are true about the proc and sysfs filesystem?
Posted by seenagape on July 25, 2014
No comments
W hich four statements are true about the proc and sysfs filesystem?
A.
No comments
/etc/mail/virtusertable
D.
/etc/mail/domaintable
E.
/etc/mail/genericstable
Explanation:
/etc/mail/virtusertable
This database file maps mail addresses for virtual domains and users to real mailboxes. These
mailboxes can be local, remote, aliases defined in /etc/mail/aliases, or files. This allows multiple
virtual domains to be hosted on one machine.
The following example demonstrates how to create custom entries using that format:
[email protected] root
[email protected] [email protected]
@example.com joe
No comments
To enable Ksplice to automatically install the kernel rpm whenever new Ksplice kernel updates
become available
E.
To enable Ksplice to install Ksplice kernel updates and new kernel RPMS w henever they
become available
Explanation:
If youd like Ksplice Uptrack to automatically install updates as they become
available, run:
sh install-uptrack YOUR_ACCESS_KEY autoinstall
in place of the above install-uptrack command, or set autoinstall = yes in your
/etc/uptrack/uptrack.conf after installation.
Note: Automatic updates
You can configure your systems to automatically install updates as they become available. To
enable autoinstall, set autoinstall = yes in your /etc/uptrack/uptrack.conf, or pass the autoinstall
flag during installation.
Autoinstall is our most popular configuration. It is a scalable way to ensure that updates get
installed quickly as they become available, regardless of when they are released.
Please note that enabling autoinstall does not mean the Uptrack client itself is automatically
upgraded. You will be notified via e-mail when a new Uptrack client is available, and it can be
upgraded through your package manager.
Which two conditions should be met in order to successfully configure an openssh client on
Oracle Linux?
Posted by seenagape on July 25, 2014
W hich tw o conditions should be met in order to successfully configure an openssh client on Oracle
Linux?
A.
The openssh-server package must not be installed.
B.
No comments
C.
The sshd daemon must not be started.
D.
Which three settings are required to configure an openLdap to use directory service provided by
Ldap.example.com?
Posted by seenagape on July 25, 2014
No comments
W hich three settings are required to configure an openLdap to use directory service provided by
Ldap.example.com?
A.
Set the LDAP Search Base DN and the LDAP server address and post
in /etc/openldap/ldap.conf to:
dc=example, dc = com
ldap://ldap.example.com:389
B.
Set LDAP Search Base DN and the LDAP server address and port in /etc/ldap.conf to:
dc=example, dc=com
ldap://ldap.example.com:389
C.
1 comment
What happens if you reboot a Ksplice Uptrack-enabled system when the following conditions
exist?
Posted by seenagape on July 25, 2014
No comments
W hat happens if you reboot a Ksplice Uptrack-enabled system w hen the follow ing conditions
exist?
1. The Internet is unreachable due to a failing router.
2. The INSTALL_ON_REBOOT property is set to YES in /etc/uptrack/uptrack.conf.
A.
The Ksplice updates are applied early in the boot sequence despite the fact that the Internet is
unreachable.
B.
The Ksplice updates are not applied during the boot sequence, but they w ill be applied as soon
as the Internet becomes reachable again.
C.
The updates are not applied during the boot sequence and w ill not be applied after the Internet
has become reachable again.
D.
The system w aits in the boot sequence for the internet to become reachable again.
E.
The system boots to single-user mode.
Explanation:
* # Automatically install updates at boot time. If this is set, on
# reboot into the same kernel, Uptrack will re-install the same set of
# updates that were present before the reboot.
install_on_reboot = yes
* To install updates automatically at boot time, the following entry must appear in
/etc/uptrack/uptrack.conf:
install_on_reboot = yes
Which two statements are true about administering the use of the Sudo command in Oracle Linux?
Posted by seenagape on July 25, 2014
No comments
W hich tw o statements are true about administering the use of the Sudo command in Oracle
Linux?
A.
visudo will never save the /etc/sudoers file if there are syntax errors in the file after editing.
B.
visudo prompts for an action if there are syntax errors in the /etc/sudoers file after editing.
C.
Using vi to edit /etc/sudoers opens the file read only.
D.
Multiple administrators may edit the /etc/sudoers file simultaneously using visudo but only one
may save the edited result.
E.
Multiple administrators may edit the /etc/sudoers file simultaneously using vi but only one may
save the edited result.
Explanation:
A: visudo parses the sudoers file after the edit and will not save the changes if there
is a syntax error.
E: visudo locks the sudoers file against multiple simultaneous edits
Note:
* sudo is configured through the file /etc/sudoers. Like with most Linux configuration files, any text
following a pound sign in the sudoers file is a comment. Within the sudoers file, sets of commands,
groups of users, and associate users or groups with command sets can be configured.
* If you want to grant certain users authority to be able to perform specific administrative tasks via
sudo, use the visudo command to modify the /etc/sudoers file.
The sudo command offers a way to grant partial or full access to the root account without the
users needing the root password.
Which four statements are about the use of these files and directories by UPSTART?
Posted by seenagape on July 25, 2014
W hich four statements are about the use of these files and directories by UPSTART?
3 comments
A.
/etc/rc.d/rc is executed each time the /sbin/init command us used, to change services
appropriately for the target run level.
B.
/etc/rc.d/rc.local is executed at boot time, before the run level processing takes place.
C.
/etc/rc.d/rc is executed at boot time, to start the appropriate services for the run level defined in
/etc/initab.
D.
/etc/rc.d/rc.sysinit is executed once at boot time, regardless of which run level is set.
E.
/etc/rc.d/rc.sysint is executed each time the /sbin/init command is used to change the run level.
F.
No comments
Examine these details from the sysctl.conf file and from the proc file system:
[root@FAROUT fs]# grep aio-max-nr /etc/sysctl.conf
# oracle-rdbms-server-11gR2-preinstall setting for fs.aio-mx-nr is 1048576
fs.aio-max-nr = 1048576
[root@FAROUT fs] # cat /proc/sys/fs/aio-max-nr
1048576
[root@FAROUT fs] # rpm q libaio
Libaio-0.0.107-10.e16.x86_64
Libaio-0.3.107-10.e76.i686
W hich statement is true about the setting created by oracle-rdbms-server-11gR2-preinstall?
A.
It allow s a process to request an I/O w ithout w aiting for reply.
B.
It allows two or more processes to request I/O simultaneously while running on different CPUs.
C.
It allow s a process to request a single I/O w ithout aw aiting for a reply. How ever, if a second I/O
is requested, then the process must w ait.
D.
It allow s tw o or more processes to request I/Os and then to both be notified w hen both of them
complete.
Explanation:
Which two statements are true regarding the effects of Issuing this command?
Posted by seenagape on July 25, 2014
You use the chkconfig command to administer one of the services on your Oracle Linux system:
[root@FAROUT ~]# chkconfig vncserver off
2 comments
[root@FAROUT ~] #
No changes have been made to the init script for the service.
W hich tw o statements are true regarding the effects of Issuing this command?
A.
The vncserver service configuration is disabled only for those run levels for which it is currently
enabled.
C.
The vncserver service configuration is disabled for run levels 2, 3, 4 and 5.
D.
The vncserver service remains in the same state it w as in before the command w as issued.
E.
The vncserver service configuration is disabled for run levels 3 and 5 only.
Explanation:
Reference: http://www.oracle-base.com/articles/linux/configuring-vnc-server-on-linux.php
2 comments
Examine the commands used by root to create the chrooted environments in the /jail directory:
# mkdir /jail/bin/jail/lib64
# cp /bin/bash/jail/bin
linux-vdso.so.1 => (0x00007fff68dff000)
libtinfo.so.5 => /lib64/libtinfo.so.5 (0x00000033e00000)
lid1.so.2 => /lib64/libc.so.6 (0x00000033e1600000)
/lib64/id-linix-86-64.so.2 (0x00000033e0e00000)
# cp /lib64/libtinfo.so.5/jail/lib64
# cp /lib64/libd1.so.6 /jail/lib64
# cp /lib64/libc.so.6 /jail/lib64
# cp /lib64/id-linux-x86-64.so.2 /jail/lib64
The user root then issues this command:
# chroot /jail
W hat is the output from the cd, pw d, and 1s commands?
A.
bash-4.1# cd
bash-4.1# pwd
/root
bash-4.1# 1s
bash 1s: command not found
B.
bash-4.1# cd
bash: cd: /root: No such file or directory
bash-4.1# pw d
/
bash-4.1 # 1s
bash: 1s: command not found
C.
bash-4.1# cd
bash: cd: command not found
bash: pw d: command not found
bash-4.1# 1s
D.
bash: 1s; # cd
bash: cd: /root: unable to access chrooted file or directory /root
bash-4.1# pw d
/
bash-4.1 # 1s
bin lib64
E.
bash-4.1# cd
bash: cd: /root: No such file or directory
bash-4.1# pw d
/
bash-4.1# 1s
bin lib64
Explanation:
No comments
kpartx
Explanation:
kpartx Create device maps from partition tables
Incorrect:
Not A: fdisk (in the first form of invocation) is a menu driven program for creation and manipulation
of partition tables.
Not B: cfdisk is a disk partition manipulation program, which allows you to create, destroy, resize,
move and copy partitions on a hard drive
not C: parted
GNU Parted a partition manipulation program
No comments
To prevent an alias network interface from being brought up during system startup
D.
To prevent a master netw ork interface from being brought up during system startup
Explanation:
The ONBOOT directive tells the network initialization scripts not to start a given
interface.
If you need to stop a virtual interface from starting when the network interfaces are initialized, you
need to set ONPARENT instead of ONBOOT to no.
-Reference: Keep IP Aliases from Starting at Boot
No comments
Explanation:
The userdel command modifies the system account files, deleting all entries that
refer to the user name LOGIN. The named user must exist.
parameter r
-r, remove
Files in the users home directory will be removed along with the home directory itself and the
users mail spool. Files located in other file systems will have to be searched for and deleted
manually.
1 comment
No comments
The file name prefix of - forces file syncing after every message is logged to ensure each
message is written to disk force before attempting to write a subsequent message to the same file.
Explanation:
* # Log all the mail messages in one place.
mail.* -/var/log/maillog
* Example:
To select all kernel syslog messages with any priority, add the following text into the configuration
file:
kern.*
* Example 2:
the following rule is comprised of a selector that selects all cron syslog messages and an action
that saves them into the /var/log/cron.log log file:
cron.* /var/log/cron.log
Note:
* For those files that are controlled by the system logging daemon rsyslogd, the main configuration
file is /etc/rsyslog.conf, which contains global directives, module directives, and rules.
* The main configuration file for rsyslog is /etc/rsyslog.conf. Here, you can specify global
directives, modules, and rules that consist of filter and action parts.
* The most used and well-known way to filter syslog messages is to use the facility/priority-based
filters which filter syslog messages based on two conditions: facility and priority separated by a
comma. To create a selector, use the following syntax:
FACILITY.PRIORITY
where:
Which two statements are true concerning a GUID Partition Table (GPT)?
Posted by seenagape on July 25, 2014
No comments
No comments
Examine the extract of the /etc/nologin file and the /etc/pam.d/login file on server1:
[root@server1 ~] # cat /etc/nologin
bob
smith
[root@server1 ~] # cat /etc/pam.d/login
accountrequiredpam_nologin.so
accountincludesystem-auth
W hich statement is true about users?
A.
Which two statements correctly describe the type of Information and the behavior of files in the
proc filesystem on Oracle Linux 6?
Posted by seenagape on July 25, 2014
W hich tw o statements correctly describe the type of Information and the behavior of files in the
proc filesystem on Oracle Linux 6?
A.
No comments
E.
Each process thread has a directory named for the process thread number in the proc
files/stem.
Explanation:
B: proc/cmdline
This file shows the parameters passed to the kernel at the time it is started. A sample
/proc/cmdline file looks like the following:
ro root=/dev/VolGroup00/LogVol00 rhgb quiet 3
Note:
/proc is very special in that it is also a virtual filesystem. Its sometimes referred to as a process
information pseudo-file system. It doesnt contain real files but runtime system information (e.g.
system memory, devices mounted, hardware configuration, etc). For this reason it can be
regarded as a control and information centre for the kernel. In fact, quite a lot of system utilities are
simply calls to files in this directory.
Which four statements are true concerning the various stages of GRUB bootloader in Oracle
Linux?
Posted by seenagape on July 25, 2014
No comments
W hich four statements are true concerning the various stages of GRUB bootloader in Oracle
Linux?
A.
GRUB stage1 must alw ays load stage1_5.
B.
GRUB stage1_5 is used to process the /boot/grub/grub.conf file.
C.
GRUB stage1 provides support for several different filesystems, enabling stage1 to load
stage1_5.
F.
GRUB stage1_5 provides support for several different filesystems, enabling stage1_5 to load
stage2.
G.
1 comment
Examine the commands and output w hen trying to start OSW atcher Black Box.
Edit the startOSWbb.sh script to specify your proffered shell, ensuring that it is started in POSIX
compliance mode.
B.
1 comment
Which statement is true when you plug in the eth1 network cable?
Posted by seenagape on July 25, 2014
No comments
Examine the output of a bonded interface configuration from w hich one netw ork cable has been
unplugged:
# cat /proc.net/bonding/bond0
Ethernet Channel Bonding Driver: v3.6.0 (September 26, 2009)
Bonding Mode: fault-tolerance (active-backup)
Primary Slave: None
Currently Active Slave: eth2
MII Status: up
MII poling interval (ms): 100
Up Delay (ms): 0
Dow n Delay (ms): 0
Slave Interface: eth1
MII status: dow n
Link Failure Count: 1
Permanent HW addr: 00:0c:29:7b:3c:71
Slave Queue ID: 0
Slave Interface: eth2
MII Status: up
Link Failure Count: 0
Permanent HW addr: 00:0c:29:7b:3s:7b
W hich statement is true w hen you plug in the eth1 netw ork cable?
A.
The status of the slave interface eth1 changes to up and is promoted to the active slave and
eth2 becomes the backup slave.
B.
The status of the slave interface eth1 changes to up and becomes a second active slave.
C.
The status of the slave interface eth1 changes to up but must be manually assigned the active
or backup slave role.
D.
The status of the slave interface eth1 changes to up and becomes the backup slave.
Explanation:
Which three statements are true about the shared directories defined in the /etc/exports file?
No comments
W hich three statements are true about the shared directories defined in the /etc/exports file?
A.
By default, a directory is shared w ith no root squashed.
B.
By default, a directory is shared read w rite.
C.
Which three statements are true when using the Anaconda Installer to install Oracle Linux?
Posted by seenagape on July 25, 2014
1 comment
W hich three statements are true w hen using the Anaconda Installer to install Oracle Linux?
A.
Unattended installation is only possible if installing the Unbreakable Enterprise kernel.
B.
No comments
Which three statements are true about the configuration of OpenLdap secure encrypted
connections?
Posted by seenagape on July 25, 2014
No comments
W hich three statements are true about the configuration of OpenLdap secure encrypted
connections?
A.
To enable TLS, you must download the Certifying Authority (CA) Certificate.
D.
The certificate is needed to verify ownership of the secret key used for encryption.
E.
There is a command-line alternative to the Authentication Configuration Tool to enable the
encrypted LDAP communication.
Explanation:
Transport Layer Security (TLS) can be used to provide data integrity and
confidentiality protection. OpenLDAP supports negotiation of TLS (SSL) via both StartTLS and
ldaps://.
Which two actions should be completed when the firstboot utility runs under runlevel 5 in Oracle
Linux?
Posted by seenagape on July 25, 2014
No comments
W hich tw o actions should be completed w hen the firstboot utility runs under runlevel 5 in Oracle
Linux?
A.
setting the current date and time to be synchronized with an NTP server
E.
Configuring the dtrace facility
Explanation:
Performing FirstBoot Configuration Tasks
FirstBoot runs only after an initial installation and guides you through the various remaining
configuration tasks.
Click Forward to display the Create User window.
Click Forward to display the Date and Time window.
Click Forward to display the Kdump window.
Click Finish to complete FirstBoot configuration and display the graphical login screen
Which two statements are true about the Unbreakable Linux Network (ULN)?
Posted by seenagape on July 25, 2014
W hich tw o statements are true about the Unbreakable Linux Netw ork (ULN)?
A.
It is freely available to all Oracle Linux customers.
No comments
B.
Which two statements are true about the MD0 RAID set?
Posted by seenagape on July 25, 2014
3 comments
Which three statements are true about the logging done through these commands?
Posted by seenagape on July 25, 2014
1 comment
UPSTART logs only informational messages about warnings and errors to /var/log/messages.
D.
UPSTART logs only informational messages about w arnings to /var/log/messages.
E.
UPSTART logs event emissions to /var/log/messages.
Explanation:
1 comment
RPC.IDMAPD is used to map a UID to its username and a GID to its group name and vice
versa.
Explanation:
D: rpc.rquotad
Provides quota information for the quota command to display user quotas for remote file systems
and the edquota command to set quotas on remote file systems.
E: Setting up idmapd for static UID/GID mapping is a matter of 6 8 (at most) trivial configuration
lines in /etc/idmapd.conf
Incorrect:
not A: The mounting and locking protocols are also integrated into the NFSv4 protocol, so the
lockd and rpc.statd services are also not required.
No comments
The RPM command can detect both direct and indirect package dependencies.
C.
The YUM command can detect and resolve direct and indirect package dependencies.
D.
The YUM command can detect and resolve indirect package dependencies only within the
same repository.
E.
The YUM command can only detect and resolve direct package dependencies.
F.
3 comments
B.
This channel will not be used by YUM when searching for packages.
C.
By default, YUM w ill not use this channel but this can be overridden on the command line.
D.
This channel w ill not be used by YUM w hen it searches for packages, but YUM w ill check if
updates exist for packages already installed from this channel.
Explanation:
Disable YUM Repo (Repository)
Disable YUM Repo
Edit repo file on /etc/yum.repos.d/ as root and change enabled to 0
## Change
enabled=1
## To
enabled=0
Which three statements correctly describes the purpose of and administration of kernel boot
parameters in Oracle Linux?
Posted by seenagape on July 25, 2014
1 comment
W hich three statements correctly describes the purpose of and administration of kernel boot
parameters in Oracle Linux?
A.
Kernel boot parameters used to boot the running system may be examined after boot by
Viewing /boot/grub/grub/conf.
C.
Kernel boot parameters used to boot the running system may be examined after boot by
view ing /proc/cmdline.
D.
Additional kernel boot parameters may be specified in an administrator-specified parameter file
that is read by grub stage.
E.
Additional kernel boot parameters may be specified from the grub command line.
F.
Additional kernel boot parameters may be specified in an administrator-specified parameters
that is read by GRUB stage1_5.
Explanation:
* GRUB requires only the file name and drive partitions to load a kernel. You can
configure this information by editing the /boot/grub/grub.conf file, by using the GRUB menu, or by
entering it on the command line.
Which three options are available during the Anaconda installer disk partitioning setup stage for a
machine with only one hard disk device?
Posted by seenagape on July 25, 2014
W hich three options are available during the Anaconda installer disk partitioning setup stage for a
machine w ith only one hard disk device?
A.
Replacing of existing Linux partitions only and leaving any other partitions unchanged
D.
Replacing of existing non-Linux partitions only, and leaving any Linux partitions unchanged
E.
Manual resizing of existing partitions on all selected devices
F.
Removal of all existing partitions and creating new partitions to suit the install
Explanation:
A: Shrink Current System
Select this option to resize your current data and partitions manually and install a default Red Hat
Enterprise Linux layout in the space that is freed.
C: Replace Existing Linux System(s)
Select this option to remove only partitions created by a previous Linux installation. This does not
remove other partitions you may have on your hard drives (such as VFAT or FAT32 partitions).
No comments
Which two steps should be performed to permit using SSH, SCP, or SFTP commands by the
ORACLE account on the host FAROUT?
Posted by seenagape on July 25, 2014
1 comment
W hich tw o steps should be performed to permit using SSH, SCP, or SFTP commands by the
ORACLE account on the host FAROUT to the oracle account on the host W AYOUT w ithout
supplying a passw ord?
A.
The oracle account user on host FAROUT must issue an ssh-keygen command to generate
public and private key files in the ~ oracle/.ssh directory FAROUT.
B.
The oracle account user on the host WAYOUT must issue an ssh-keygen command to
generate public and private key files in the ~/oracle.ssh directory on WAYOUT.
C.
The Oracle account user on host FAROUT must add the contents of ~/oracle/.ssh/id_dsa.pub
or ~/oracle/.ssh/is_rsa.pub file to the ~/oracle/.ssh/authorized_keys file on host W AYOUT.
D.
The Oracle account user on host W AYOUT must add the contents of ~/oracle/.ddh/id_dsa or
~/oracle/.ssh/id_rsa.pub file to the ~/oracle/.ssh/authorized_keys file on host FAROUT.
E.
The oracle account user on host W AYOUT must set the permissions on the
~/oracle/.ssh/authorized_keys file to 644.
F.
The Oracle account user on host FAROUT must set the permissions in
~/oracle/.ssh/authorized_keys file 644.
Explanation:
2 comments
Your Oracle Linux server has a netw ork interface eth0 but the ifcfg-eth0 file is missing from the
/etc/sysconfig/netw ork-scripts directly.
To set the IP address for the interface, you run this command as root:
[root@station1]# ifconfig eth0 192.168.0.1 up
W hat is the effect of the command?
A.
The IP address 192.168.0.1 is not assigned to eth0 because the netmask is not specified.
B.
The IP address 192.168.0.1 is assigned to eth0, but the interface is not activated until the
netw ork service is reloaded.
C.
The IP address 192.168.0.1 is assigned to eth0, but the interface is not activated until the
network service is restarted.
D.
The IP address 192.168.0.1 is assigned to echo w ith the default netmask for that address, and
the interface is activated immediately.
Explanation:
Why is the oracle user denied access to the FTP server on the 016.example.com host?
Posted by seenagape on July 25, 2014
Examine this output:
$ ftp o16.example.com
Connected to o16.example.com (192.168.40.131)
220 (vsFTpd 2.2.2)
Name (o16.example.com:oracle):
A carriage return is now entered on the keyboard and the result is show n:
$ 30 permission denied.
Login failed.
ftp>
W hy is the oracle user denied access to the FTP server on the 016.example.com host?
A.
The Oracle user is listed in /etc/vsftpd/ftpusers.
B.
1 comment
The oracle user is listed in /etc/vsftpd/user_list and the USERLIST_ENABLE setting is set to
YES in /etc/vsftpd/vsftpd.conf.
C.
Which two statements are true about the installation of certain components of asmlib in Oracle
Linux 6?
Posted by seenagape on July 25, 2014
No comments
W hich tw o statements are true about the installation of certain components of asmlib in Oracle
Linux 6?
A.
The asmlib kernel module is included in the Red Hat-compatible kernel.
B.
The asmlib kernel module is included in the Unbreakable Enterprise Kernel (UEK).
C.
The asmlib kernel module must be installed separately w hen using the Unbreakable Enterprise
Kernel (UEK).
D.
The asmlib oracleasm-support package is installed as part of the Red Hat-compatible kernel
package.
E.
The asmlib oracleasm-support package is included as part of the Unbreakable Enterprise
Kernel (UEK) package.
F.
The asmlib oracleasm-support rpm must be installed separately when using the Unbreakable
Enterprise Kernel (UEK).
Explanation:
B: The oracleasm kernel driver is built into the Unbreakable Enterprise Kernel for
Oracle Linux 6 and does not need to be installed manually.
F: All ASMLib installations require the oracleasmlib and oracleasm-support packages appropriate
for their machine.
The oracleasm-support package can be downloaded from the Unbreakable Linux Network (ULN) if
you have an active support subscription, or from http://public-yum.oracle.com if you do not.
Incorrect:
not A: The oracleasm kernel driver for the 64-bit (x86_64) Red Hat Compatible Kernel for Oracle
Linux 6 can be installed manually.
Which three statements are true about administering user accounts and groups for an Oracle Linux
server in preparation for installing the Oracle Database server?
Posted by seenagape on July 25, 2014
No comments
W hich three statements are true about administering user accounts and groups for an Oracle
Linux server in preparation for installing the Oracle Database server?
A.
A Linux user who is a member of the OSDBA group may start an Oracle database instance.
E.
The /etc/sudoers file must specify that the Oracle softw are ow ner be allow ed to run commands
as root.
F.
as its primary group. It must also have the OSDBA and OSOPER groups as secondary groups.
D: The OSDBA group (dba)
You must create this group the first time you install Oracle Database software on the system. It
identifies operating system user accounts that have database administrative privileges (the
SYSDBA privilege). The default name for this group is dba.
F: The Oracle Inventory Group (typically, oinstall)
You must create this group the first time you install Oracle software on the system. The default
name chosen for this group is oinstall. This group owns the Oracle inventory that is a catalog of all
Oracle software installed on the system.
Which four are among the many components included in the oracle Linux distribution?
Posted by seenagape on July 25, 2014
2 comments
W hich four are among the many components included in the oracle Linux distribution?
A.
X Windowing system
D.
Identify four minimum steps that you should perform to successfully switch this system from RHN
to ULN.
Posted by seenagape on July 25, 2014
You are about to sw itch a Red Hat Enterprise Linux 6 (RHEL6) system from the Red Hat Netw ork
to the Unbreakable Linux Netw ork (ULN).
Consider this output:
# rpm qa *rhn*
rhnlib-2.5.22-12.e16.noarch
yum-rhn-plugin-0.9.1-36.e16.noarch
rhn-setup-1.0.0-73.e16.noarch
rhn-client-tools-1.0.0-73.e16.noarch
rhn-check-1.0.0-73.e16.noarch
rhnsd-4.9.3-2.e16.x86_64
Identify four minimum steps that you should perform to successfully sw itch this system from RHN
to ULN.
A.
Run the uln_register command as the root user and answer the prompts.
F.
No comments
# uln_register
Which three statements are true about the bash shell scripts capabilities and features?
Posted by seenagape on July 25, 2014
1 comment
W hich three statements are true about the bash shell scripts capabilities and features?
A.
The s* shell variable holds the exit status of the last command executed in the foreground.
B.
The | | operator ensures that a command is run only if the command preceding the | | operator
fails.
C.
If test SMYVAR = prod and if ["SMYVAR" *= prod ] are equivalent ways to test the value of
the MYVAR variable in a shell script.
D.
If the first line of the script begins with #!/bin/sh, then the sh shell program is unable to interpret
the script.
E.
Which three compression programs can tar use to natively filter an archive?
Posted by seenagape on July 25, 2014
1 comment
W hich three compression programs can tar use to natively filter an archive?
A.
Zip
B.
Bzip2
C.
Gzip
D.
Xz
E.
Cpio
Explanation:
Linux Archive Tools (tar, star, gzip, bzip2, zip, cpio)
Reference: http://www.usinglinux.org/archivers/
Examine this /etc/fstab entry: Identify the actions you must perform to relocate this filesystem
permanently to its new mount point?
Posted by seenagape on July 25, 2014
Examine this /etc/fstab entry:
Identify the actions you must perform to relocate this filesystem permanently to its new mount point?
A.
1, 2, 3, 4, 5, 6 and 7
B.
1 comment
1, 2, 3, 4, 5 and 6
C.
1, 2, 5 and 6
D.
1, 2, 5, 6 and 7 ^
E.
1, 2 and 6
Explanation:
2 comments
During the setup of additional sw ap space on an ext2 filessystem, you encounter an error as show n below :
Which two commands or utilities can help the root user diagnose this problem?
Posted by seenagape on July 25, 2014
Examine the command and output show n:
bash-4.1# 1s
1s: error w hile loading shared libraries: libselinux.so.1: cannot open shared object file: No such file
or directory
No files have been deleted from your system and you w ant to determine the cause of the error.
W hich tw o commands or utilities can help the root user diagnose this problem?
A.
ldd
B.
dmesg
C.
grep libselinux.so.1 /var/log/dmesg
D.
strace
E.
No comments
1 comment
The system has Oracle Linux 6 installed and the Red Hat compatible kernel is running.
B.
The system has Oracle Linux 6 installed and the Oracle Unbreakable Enterprise kernel Is
running.
C.
It is not possible to determine w hich kernel is running.
D.
This system has been booted at least once, with the Red Hat-compatible kernel and once with
the Unbreakable Enterprise kernel.
E.
The oracle-release package contains both Oracle and Red Hat release metadata.
Explanation:
Which two statements are true concerning the files contained in the run level-specific directories
rc0.d through rc6.d?
Posted by seenagape on July 25, 2014
1 comment
W hich tw o statements are true concerning the files contained in the run level-specific directories
rc0.d through rc6.d?
A.
The files starting w ith S or K are links to scripts in the /ete/init.d directory.
B.
The files starting w ith S are alw ays invoked by the /etc/rc.d/rc script even if the service
managed by that script is already dow n.
C.
The files starting w ith S or K are added by using the chkcor.fig command.
D.
The files starting with K are always invoked by the /rc/rc,d/re script even if the service managed
by that script is already up.
E.
The files starting with S are invoked before those starting with K.
Explanation:
Which three statements are true concerning the two cron jobs listed?
Posted by seenagape on July 25, 2014
2 comments
Which three statements are true configuration files and the behavior of module parameters
specified in those files, in the /etc/modprobe.d directory?
Posted by seenagape on July 25, 2014
No comments
W hich three statements are true configuration files and the behavior of module parameters
specified in those files, in the /etc/modprobe.d directory?
A.
The files may contain options to be passed to a module only when it is a dependency of a
module being inserted.
B.
The file may contain shell commands to be run instead of inserting a particular module in the
kernel.
C.
The files may contain options to be passed to a module, only when it is inserted using a
modprobe command.
D.
Which two statements are true regarding the use of the ssh-agent and ssh-add commands?
No comments
W hich tw o statements are true regarding the use of the ssh-agent and ssh-add commands?
A.
The ssh-add command asks for the passphrase only the first time a key is required by the same
user in the same shell.
E.
The ssh-add command retries the most recently saved passphrase if multiple key files are
used.
Explanation:
A (not C): If you want to omit passphrase and password entry when you are using
Solaris Secure Shell, you can use the agent daemon. Use the ssh-agent command at the
beginning of the session. Then, store your private keys with the agent by using the ssh-add
command.
D: Add your private key to the agent daemon.
The ssh-add command adds your private key to the agent daemon so that subsequent Secure
Shell activity does not prompt you for the passphrase.
myLocalHost% ssh-add
Enter passphrase for /home/johndoe/.ssh/id_rsa:
Identity added: /home/johndoe/.ssh/id_rsa(/home/johndoe/.ssh/id_rsa)
myLocalHost%
Which three commands provide more detailed information about CPU load distribution?
Posted by seenagape on July 25, 2014
No comments
Users complain that system performance is unacceptable w hen using a specific application
service running on a multiprocessor service.
You have established from the storage team that disk response times have not increased, so you
can discount there being an I/O problem.
You run vmstat to look at CPU activity and notice high average disk times on the multiprocessor
system and an average run queue of zero.
You require more detail about each CPU from w hich the vmstat figures are derived, to investigate
if the load is distributed evenly across all CPUs.
W hich three commands provide more detailed information about CPU load distribution?
A.
iostat x
B.
top
C.
mpstat
D.
vmstat
E.
sar
Explanation:
C: A useful command to get CPU related stats is mpstat. Here is an example output:
# mpstat -P ALL 5 2
Linux 2.6.9-67.ELsmp (oraclerac1) 12/20/2008
10:42:38 PM CPU %user %nice %system %iowait %irq %soft %idle intr/s
10:42:43 PM all 6.89 0.00 44.76 0.10 0.10 0.10 48.05 1121.60
10:42:43 PM 0 9.20 0.00 49.00 0.00 0.00 0.20 41.60 413.00
10:42:43 PM 1 4.60 0.00 40.60 0.00 0.20 0.20 54.60 708.40
etc.
D: When called, the grand-daddy of all memory and process related displays, vmstat, continuously
runs and posts its information. It takes two arguments:
# vmstat <interval> <count>
<interval> is the interval in seconds between two runs. <count> is the number of repetitions vmstat
makes. Here is a sample when we want vmstat to run every five seconds and stop after the tenth
run. Every line in the output comes after five seconds and shows the stats at that time.
# vmstat 5 10
procs memory- swap io- system -cpu-r b swpd free buff cache si so bi bo in cs us sy id wa
0 0 1087032 132500 15260 622488 89 19 9 3 0 0 4 10 82 5
0 0 1087032 132500 15284 622464 0 0 230 151 1095 858 1 0 98 1
0 0 1087032 132484 15300 622448 0 0 317 79 1088 905 1 0 98 0
shows up to 10 times.
The output shows a lot about the system resources.
E: sar stands for System Activity Recorder, which records the metrics of the key components of
the Linux systemCPU, Memory, Disks, Network, etc.in a special place: the directory
/var/log/sa.
The simplest way to use sar is to use it without any arguments or options. Here is an example:
# sar
Linux 2.6.9-55.0.9.ELlargesmp (prolin3) 12/27/2008
12:00:01 AM CPU %user %nice %system %iowait %idle
12:10:01 AM all 14.99 0.00 1.27 2.85 80.89
12:20:01 AM all 14.97 0.00 1.20 2.70 81.13
12:30:01 AM all 15.80 0.00 1.39 3.00 79.81
12:40:01 AM all 10.26 0.00 1.25 3.55 84.93
Incorrect:
Not A: iostat is for I/O
Which three statements are true concerning filesystems supported by Oracle Linux?
Posted by seenagape on July 25, 2014
1 comment
W hich three statements are true concerning filesystems supported by Oracle Linux?
A.
The ext3 and ext4 filesystems both support multiple journaling modes.
D.
The btrfs filesystem includes a volume manager.
E.
No comments
The SSHD service is controlled by the script in /etc/init.d/sshd, part of w hich is show n here:
[root@FAROUT ~] cat /etc/init.d/sshd
# !/bin/bash
#
# sshdStart up the OpenSSH server daemon
#
# chkconfig: 23455525
# description: SSH is a protocol for secure remite shell access. \
# This service starts up the Open SSH server daemon.
#
You issue chkconfig commands to change the sshd service:
[root@FAROUT ~] # chkconfig sshd off
[root@FAROUT ~] # chkconfig sshd reset
W hat is the result of the tw o commands issued?
A.
The sshd service configuration is restored to the settings that existed before setting it off.
B.
The sshd service configuration is restored to start In run levels 2, 3, 4 and 5.
C.
The sshd service configuration is restored to start in run levels 2 and 5 only.
D.
The sshd service configuration is restored to those that existed after the operating system was
first installed.
Explanation:
which three types of installs does the Oracle database Pre-install rpm help by installing required
software packages and setting system parameters?
Posted by seenagape on July 25, 2014
For w hich three types of installs does the Oracle database Pre-install rpm help by installing
No comments
Oracle WebLogic
C.
Oracle Database Enterprise Edition Real Application Cluster
D.
Oracle Enterprise Manager Cloud Control
E.
Which three statements are true concerning the IPTABLES Oracle Linux firewall?
Posted by seenagape on July 25, 2014
No comments
W hich three statements are true concerning the IPTABLES Oracle Linux firew all?
A.
PREROUTING, OUTPUT, and POSTROUTING are the chains associated with nat.
E.
The main rule chains are filter, nat, and mangle.
F.
Which two statements are true about signal handling in Oracle Linux?
Posted by seenagape on July 25, 2014
No comments
A process killed with the default signal always terminates gracefully if it: does not block the kill
request.
C.
The kill command sends a sigkill (signal 9) by default to the process being killed.
D.
The kill command may send a termination signal to more than one process at a time.
E.
All signals may be blocked by a process.
Explanation:
D: The kill command is used to send a termination signal to the specified process or
group.
Incorrect:
Not A: The following example shows the xscreensaver process (2609) which is to be terminated.
$ pgrep xscreen
2609
$ kill 2609
Though we use pgrep to find the PID of this process here we could have also used a PID from the
output of top or ps.
Not C: The kill command is used to send a termination signal to the specified process or group.
The default termination signal is a SIGTERM (15) signal.
Not E: When there a stubborn process trapping the kill command and refusing to terminate, the -9
(SIGKILL) signal should be used to kill the process. The -9 signal cannot be trapped by a process
and ignored.
What is the order in which the bash configuration files are read, assuming that all the files exist in
their correct location and are readable?
Posted by seenagape on July 25, 2014
No comments
Which type of nameserver is provided by the default bind configuration files on Oracle Linux?
Posted by seenagape on July 25, 2014
No comments
W hich type of nameserver is provided by the default bind configuration files on Oracle Linux?
A.
Which three statements are true concerning the use of the grub menu in Oracle Linux?
Posted by seenagape on July 25, 2014
No comments
W hich three statements are true concerning the use of the grub menu in Oracle Linux?
A.
All changes made using the grub editor at boot time are saved by default to /boot/grub/grub,
conf.
B.
Which statement is true about the execution of the rpm -e sendmail command?
Posted by seenagape on July 25, 2014
2 comments
It erases both the sendmail and sendmail-cf packages because the sendmail-cf package
depends on the sendmail package.
Explanation:
Which three statements are true about the User Private Group scheme in Oracle Linux?
Posted by seenagape on July 25, 2014
No comments
W hich three statements are true about the User Private Group scheme in Oracle Linux?
A.
If a user jules is added w ith the useradd jules command, a group called jules_grp is also
created
B.
The umask for the jules user is 002 in /etc/bashrc
C.
Users belonging to a group to w hich user jules also belongs, are automatically able to w rite to
the private group belonging to the jules user.
D.
If a user jules is added with the user add jules command, a group called jules is also added. but
no other user may be a member of that group.
E.
A directory owned by a group to which several users belong, and which has the setgid fa turned
on, has shared write access to all members of the group.
F.
E: When setgid permission is applied to a directory, files that were created in this directory belong
to the group to which the directory belongs, not the group to which the creating process belongs.
Any user who has write and execute permissions in the directory can create a file there. However,
the file belongs to the group that owns the directory, not to the users group ownership.
Which two actions are the required steps to prevent: non-root ssh access to the system?
Posted by seenagape on July 25, 2014
No comments
W hich tw o actions are the required steps to prevent: non-root ssh access to the system?
A.
Ensuring that /etc/pam.d/sshd includes:
account sufficient pam_nologin.so
B.
Create the /etc/nologin/login.deny file containing a single line +all
C.
Creating the /etc/nologin.allow file containing a single line root
D.
A RAID device failed and has been replaced with the hot spare.
B.
A new RAID device w as just added to replace a failed one.
C.
Read and w rite performance is currently not optimal on this RAID set.
D.
Only w rite performance is currently not optimal on this raid set.
No comments
E.
An extra device was added to this RAID set to increase its size.
Explanation:
Which three statements are true about the Oracle Linux Logical Volume Manager (LVM)?
Posted by seenagape on July 25, 2014
1 comment
W hich three statements are true about the Oracle Linux Logical Volume Manager (LVM)?
A.
LVM supports simple, striped, mirrored, and RAID-5 Logical Volumes (LVs).
B.
A Physical Volume (PV) can be created on a disk or a disk partition.
C.
No comments
You w ant to convert an rpm packages file into a standard format as part of a shell script and then
manipulate the contents.
W hich archive format is used by rpm?
A.
cpio
B.
tar
C.
bzip2
D.
gzip
E.
zip
Explanation:
Which four statements correctly describe the contents of the sysfs filesystem?
Posted by seenagape on July 25, 2014
No comments
W hich four statements correctly describe the contents of the sysfs filesystem?
A.
It contains kernel parameter files.
B.
1 comment
It lists all the currently mounted filesystems, if executed without any arguments
D.
It lists only the filesystems listed in /etc/fstab if executed w ithout any arguments.
E.
Only root can mount filesystems that are not listed in listed in /etc/fstab.
Explanation:
Reference:
https://access.redhat.com/site/documentation/enUS/Red_Hat_Enterprise_Linux/5/html/Deployment_Guide/chapUsing_the_mount_Command.html
Which mount options will automounter use to mount the filesystems listed in /etc/auto.direct?
Posted by seenagape on July 25, 2014
1 comment
No comments
The occurrence of user1 in the list of enabled users allows access to the website contained in
user1s public_html subdirectory, overriding the disabled directive.
C.
The configuration produces an error upon w eb server startup, because the enabled and
disabled directive conflict.
D.
Access is guaranteed because the UserDir public_html directive applies default access to all
local users on the system, overriding the enabled of disabled directive.
Explanation:
Which three Statements describe the capabilities and functions of the chkconfig command in
Oracle Linux?
Posted by seenagape on July 25, 2014
1 comment
W hich three Statements describe the capabilities and functions of the chkconfig command in
Oracle Linux?
A.
It can be used to specify the run levels for which a service is to be activated.
C.
It can be used to list all services and their run levelsD. It can be used to check the status of a service to
see if it is running.
E.
It can be used to add a service.
Explanation:
Which three statements are true concerning the use of open SSH utilities?
Posted by seenagape on July 25, 2014
No comments
W hich three statements are true concerning the use of open SSH utilities?
A.
SCP alw ays requires a passphrase to be used.
B.
SSH may be used to execute a single command on a remote host instead of executing the
login shell on the remote host.
E.
3 comments
After installing logwatch, no configuration is required to produce reports from system logs.
B.
After installing logwatch, the /usr/share/logwatch/dist.conf directory will not exist because it is
optional.
C.
After installing logwatch, you must create /etc/logwatch/conf to produce reports from system
logs.
D.
After installing logw atch, all the default directories continue to exist.
E.
To produce a report from the previous days logs, the - range yesterday parameter must be
specified.
F.
Running /usr/sbin/logw atch produces a report of the previous days log files.
Explanation:
Which three tasks should be performed to configure a host to act as an SSH server?
Posted by seenagape on July 25, 2014
W hich three tasks should be performed to configure a host to act as an SSH server?
A.
1 comment
B.
The sshd service must be started.
C.
Which three methods might be used to change kernel parameters, thereby modifying the values for
running system?
Posted by seenagape on July 25, 2014
No comments
W hich three methods might be used to change kernel parameters, thereby modifying the values
for running system?
A.
Using the echo command to w rite values to specific files in the /sys directory
B.
Issuing the sysct1 -w command to write values to specific files in the /proc/sys directory
C.
Issuing the sysct1 -w command to w rite values to specific files in the /sys directory
D.
Using the echo command to write values to specific files in the /proc/sys directory
Explanation:
Which three statements are true about the behavior and configuration of GRUB on this system?
Posted by seenagape on July 25, 2014
No comments
Examine some of the contents of the /boot/grub/grub.com file from an Oracle Linux system:
Default=0
Timeout=5
Splashimage=(hd0, 0)/grub/splash.xpm.gz
Hiddenmenu
Title Oracle Linux Server (2.6.39-100.0.12.16uek.x86_64)
Root (hd0, 0)
Kernet /vmlinuz-2.6.39-100.0.12.e16uek.x86_64 ro root=UUIP=a4b6049b-9aa1-44b4-87cfaebb17alcdf9 rd_NO_LUKS
re_NO_LVM rd_NO_DM LANG=en_US.UTF-8
SYSFONT=1atarcycreheb-sun16 KEYBOARDTYPE=PC KEYTABLE=us rhgb quiet numa=off
Initrd /initramfs-2.6.39-100.0.12.e16uek.x86_64.img
Title Oracle Linux Server (2.6.32-131.0.15.e16.x86_64)
Root (hd0, 0)
Kernel /vmlinuz-2.6.32-131.0.15.e16.x86_64 ro root=UUIS=a4b6049b-9aa1-44b4-87cfaebb17a1cdf9 rd_NO_LUKS
rd_NO_LVM rd_NO_LVM re_NO_MD rd_NO_DM
LANG=en_UD.UTF-8 SYSFONT=latarcyheb-sun16 KEYBOARDTYPE=PC KEYTABLE=us
Crashkernel=auto rhgp quiet numa = off
Initrd /initramfs-2.6.32-131.0.15.e16.x86_64.img
W hich three statements are true about the behavior and configuration of GRUB on this system?
A.
The root directive specifies an initial root filesystem, allowing access to block device modules to
mount the real root filesystem on disk.
D.
(hd0, 0) represents the first partition on the first drive detected by the BIOS.
E.
The initrd directive specifies the initamfs, an initial root filesystem in RAM, allowing access to
block device modules to mount the real root filesystem.
F.
Each kernel must have an initramfs that matches the version of the kernel.
G.
Because there is an Unbreakable Enterprise Kernel installed, it must be the default kernel listed
as show n by the default=0 directive.
Explanation:
No comments
What must you do before using the vgreduce command, to remove the PV?
Posted by seenagape on July 25, 2014
You must remove a Physical Volume (PV) from a Volume Group (VG) containing one Logical
Volume (LV) w ithout compromising data availability.
1 comment
W hat must you do before using the vgreduce command, to remove the PV?
A.
Move allocated physical Extents (PE) from /dev/sdd to other physical volumes using the
pvmove command.
B.
Remove the /dev/sdd PV using the pvremove command.
C.
Resize the /dev/sdd PV to zero using the pvresize command.
D.
Move allocated physical Extents (PE) from /dev/sdd to other physical volumes by using the
1vvonvert - replace command.
Explanation:
No comments
Only messages w ith a priority of notice from the new s facility are sent to /var/log/spooler.
C.
Messages with a priority of debug or higher from the mail facility are sent to /var/log/message
D.
Only messages w ith a priority of debug from the mail facility are sent to /var/log/messages.
Explanation:
What is the result of listing the files in /mnt/share2 on the NFS client?
Posted by seenagape on July 25, 2014
No comments
It lists any files stored in the root directory in the /dev/sdc2 partition of the NFS server.
C.
It results in a permission denied error.
D.
It results in a stale NFS handle error.
E.
It produces no output.
Explanation:
What is the effect of this command on subsequent attempts to access the web server on HOST01
using port 80?
Posted by seenagape on July 25, 2014
1 comment
Which three actions may be performed using the date command in Oracle Linux?
Posted by seenagape on July 25, 2014
W hich three actions may be performed using the date command in Oracle Linux?
A.
Setting the hardw are clock from the current system time
B.
1 comment
Match the following symbolic notations of the file permissions with their numeric values:
Posted by seenagape on July 25, 2014
No comments
Match the follow ing symbolic notations of the file permissions w ith their numeric values:
- - S - - - a) 5000
- - - S - b) 4100
- - - - - tc) 7101
- - S - - Td) 1001
- - S - S - te) 7040
S - S r - Tf) 2010
A.
1-d, 2-f, 3-b, 4-e, 5-c, 6-a
B.
1-b, 2-f, 3-d, 4-a, 5-c, 6-e
C.
1 comment
The dailyrun.sh shell script run by the user hr on a daily basis suddenly returns an error.
You investigate this by running the commands manually as user hr and discovered that this line of
shell cod is responsible:
1s als > /home/prodrun/files.1st
Bash: files.1st:cannot overw rite existing file
W hat is the cause of this error?
A.
The hr user has no w rite permissions on the /home/prodrun/files.1st file.
B.
1 comment
It creates the grid user if not already created which owns the grid infrastructure software should
that get installed.
D.
It modifies kernel parameters in /etc/sysctl.conf.
E.
It runs at the first boot after installing the packages to set a parameter indicating that is has run
once.
F.
3 comments
You installed the sendmail-cf package using the yum command as show n:
# yum Y install sendmail-cf
Loaded plugins: security
Setting up Install Process
Resolving Dependencies
- -> Running Transaction Check
- - > Package sendmail-cf.noarch 0:8.14.4-8.e16 w ill be installed
- > Processing Dependency: sendmail = 7.14.4-8.e16 for package: sendmail-cf-8.14.4-8.e16.noarch
- > Running transaction check
- > Package sendmail.x86_64 0:8.14.4-8.e16 w ill be installed
- > Finished Dependency Resolution
Dependency Resolved
It removes the sendmail packages and raises a warning about the sendmail-cf package, which
depends on the package being removed.
E.
It removes the sendmail package and prompts you for the option to remove the sendmail-cf
package.
Explanation:
No comments
The user smith, w hose primary group is smith, w ants to create a file in his home directory, w hich
belongs to the group apps.
W hich tw o statements are correct?
A.
SGID should be set on smiths home directory to let smith create files that belong to a group
that is not his primary group.
B.
The user smith can create a file that belongs to the apps group, only If his private group is the
apps group as per /etc/group.
C.
The user smith can use the newgrp command to change the primary group to apps, only if
smith is listed in /etc/group as a member of the apps group.
D.
The user smith can use the newgrp command to change the primary group to apps, but a
password is required if smith is not listed in /etc/group as a member of the apps group.
Explanation:
Which three are valid directories for cron jobs to be run at known intervals?
Posted by seenagape on July 25, 2014
W hich three are valid directories for cron jobs to be run at know n intervals?
A.
/etc/cron.hourly
B.
/etc/cron.daily
C.
/etc/cron.minutely
D.
/etc/cron.monthly
E.
/etc/cron.yearly
F.
/etc/cron.annually
Explanation:
An alternative to editing the crontab is to place executable scripts into one of the
following directories. The script will be run at the appropriate interval.
/etc/cron.hourly
/etc/cron.daily
/etc/cron.weekly
/etc/cron.monthly
This is actually using anacron, rather than cron, but it achieves a similar goal.
Reference: http://www.oracle-base.com/articles/linux/cron-on-linux.php
No comments