Download Oracle Linux 5 and 6 System Administration.1z0-100.ActualTests.2022-01-07.121q.vcex

Vendor: Oracle
Exam Code: 1z0-100
Exam Name: Oracle Linux 5 and 6 System Administration
Date: Jan 07, 2022
File Size: 1 MB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Demo Questions

Question 1
Which statements is true concerning Oracle Linux configuration files for users and groups?
  1. The /etc/passwd file contains hashed passwords for each user.
  2. The /etc/shadow file contains hashed passwords for each user.
  3. The GECOS field in /etc/passwd file may be empty.
  4. The /etc/group file contains the group name and the hashed group password.
Correct answer: B
Explanation:
/etc/shadow file stores actual password in encrypted (one-way hashed) format for user's account with additional properties related to user password i.e. it stores secure user account information
/etc/shadow file stores actual password in encrypted (one-way hashed) format for user's account with additional properties related to user password i.e. it stores secure user account information
Question 2
Examine these statements and their output taken right after successful install of Oracle Linux:
  • [root@FAROUT /] rpm –q firstboot 
  • Firstboot -1.110.10-1.0.2.e16.x86_64 
  • [root @FAROUT /] # chkconfig - - list firstboot 
  • Firstboot 0:off 2:off 3:off 4:off 5:off 6;off
  • [root@FAROUT /] # /etc/sysconfig/firstboot 
  • RUN_FIRSTBOOT=NO 
What is the conclusion?
  1. The option to run firstboot was deselected during Oracle Linux installation.
  2. The system was installed with desktop graphical packages and rebooted and the firstboot utility ran successful.
  3. Firstboot never ran in any run level because the service is turned off for all run levels.
  4. The system was installed without selecting desktop graphical packages, thereby disabling firstboot from running.
Correct answer: C
Explanation:
Firstboot is set to off for all levels. Example:The rm command below remove or delate the firstboot file in order to make sure the firstboot program running when we restart or reboot the Fedora machine. [root@fedora ~]# rm /etc/sysconfig/firstboot rm: remove regular file `/etc/sysconfig/firstboot'? y[root@fedora ~]# Then check and make sure that firstboot program or firstboot service is run when your Fedora startup/boot up. Check firstboot services [root@fedora ~]# chkconfig --list firstboot firstboot 0:off 1:off 2:off 3:off 4:off 5:off 6:off[root@fedora ~]#
Firstboot is set to off for all levels. 
Example:
The rm command below remove or delate the firstboot file in order to make sure the firstboot program running when we restart or reboot the Fedora machine. 
[root@fedora ~]# rm /etc/sysconfig/firstboot 
rm: remove regular file `/etc/sysconfig/firstboot'? y
[root@fedora ~]# 
Then check and make sure that firstboot program or firstboot service is run when your Fedora startup/boot up. 
Check firstboot services 
[root@fedora ~]# chkconfig --list firstboot 
firstboot 0:off 1:off 2:off 3:off 4:off 5:off 6:off
[root@fedora ~]#
Question 3
Which three settings can be controlled by using the chage breemar command as the root user, to modify the parameters in the /etc/shadow file?
  1. The expiration date of the breemar account
  2. The number of days after the breemar account is locked, that it becomes expired
  3. The maximum number of days that must elapse between password changes by the user breemar before the password becomes invalid
  4. The number of days after the breemar account is locked, that it becomes unlocked
  5. The minimum number of days that must elapse between password changes by the user breemar
  6. The maximum number of failed login attempts on the breemar account before the account is locked 
Correct answer: ACE
Explanation:
A: chage -E, --expiredate EXPIRE_DATESet the date or number of days since January 1, 1970 on which the user's account will no longer be accessible. CE: You need to use chage command to setup password aging.The chage command changes the number of days between password changes and the date of the last password change. This information is used by the system to determine when a user must change his/her password.
A: chage -E, --expiredate EXPIRE_DATE
Set the date or number of days since January 1, 1970 on which the user's account will no longer be accessible. 
CE: You need to use chage command to setup password aging.
The chage command changes the number of days between password changes and the date of the last password change. 
This information is used by the system to determine when a user must change his/her password.
Question 4
Examine this extract from the /etc/ssh/sshd_config file:
  • passwordAuthentication no 
What is the effect of this parameter settings on the use of openSSH commands on both the client and server?
  1. Passwords are not required and no ssh-keygen is required either. Only passphrase are required.
  2. Client users whose keys are not in the authorized_keys file on the server are unable to use passwords to authenticate themselves to the server.
  3. The ssh daemon does not ask for a password before starting or stopping the sshd service.
  4. Client users whose keys are not in the authorized_keys file on the client are unable to use passwords to authenticate themselves to the server.
Correct answer: B
Explanation:
If you set PasswordAuthentication to no, you will no longer be able to use a login and password to authenticate and must use a login and public key instead (if PubkeyAuthentication is set to yes).
If you set PasswordAuthentication to no, you will no longer be able to use a login and password to authenticate and must use a login and public key instead (if PubkeyAuthentication is set to yes).
Question 5
Which four statements are true about software on the Oracle Public YUM server?
  1. It contains Oracle Linux installation ISO images.
  2. It contains Oracle Linux binary RPM packages.
  3. It contains Oracle Linux errata packages.
  4. It contains Oracle Linux source RPM packages.
  5. It contains beta Oracle Linux software packages.
  6. It does not contain Unbreakable Enterprise Kernel packages.
Correct answer: BCDE
Explanation:
The Oracle public yum server offers a free and convenient way to install the latest Oracle Linux packages as well as packages from the Oracle VM installation media via a yum client. Oracle provides all errata and updates for Oracle Linux via the Public Yum service, which includes updates to the base distribution, but does not include Oracle-specific software. F: By default, all new installations of Oracle Linux 6 Update 5 are automatically configured to use the public yum update service. If you subsequently register the system with ULN, the public yum service is automatically disabled. 
The Oracle public yum server offers a free and convenient way to install the latest Oracle Linux packages as well as packages from the Oracle VM installation media via a yum client. 
Oracle provides all errata and updates for Oracle Linux via the Public Yum service, which includes updates to the base distribution, but does not include Oracle-specific software. 
F: By default, all new installations of Oracle Linux 6 Update 5 are automatically configured to use the public yum update service. If you subsequently register the system with ULN, the public yum service is automatically disabled. 
Question 6
This MDADM output:
  
     
Which two aspects can be determined from this output?
  1. A device failed and has been removed from this RAID set.
  2. It is no longer possible to write to this RAID set.
  3. Read and write performance is no longer optimal on this RAID set.
  4. This RAID set was built without a spare device.
  5. Only Write performance is no longer optimal on this RAID set.
Correct answer: AD
Question 7
Examine the command on its output:
  • [root@FAROUT ~] # modprobe –v nfs 
  • Insmod /lib/modules/2.6.39-100.0.12.e16uek.x86_64/kernel/fs/nfs_common/nfs_acl.ko insmod /lob/modules/2.6.39- 
  • 100.0.12.e16uek.x86_64/kernel/net/sunrpc/auth_gss/auth_rpcgss.ko 
  • Insmod /lib/modules/2.6.39-100.0.12.e16uek.x86_64/kernel/fs/fscache/fscache/ko 
  • Insmod /lib/modules/2.6.39-100.0.12.e16uek.x86_64/kernel/fs/locked.ko 
  • Insmod /lib/modules/2.6.39-100.0.12.e16uek.x86_64/kernel/fs/nfs/nfs.ko 
Which two statements are true about the modprobe command?
  1. It will load the nfs module if all the modules upon which it depends have been loaded.
  2. It displays the dependency resolution for the nfs module and loads all the modules upon which nfs depends before loading the nfs module.
  3. It verifies that the nfs module and all other modules that depend on the nfs module are installed.
  4. It displays the dependency resolution that would occur if the nfs module were to be loaded using modprobe nfs.
  5. It only loads the nfs module if all the modules upon which it depends have not been loaded yet.
Correct answer: AB
Question 8
What is the main advantage of the Oracle Unbreakable Enterprise Kernel compared with the Red Hat compatible kernel?
  1. It is more secure and, therefore, more difficult to hack.
  2. It has a lower Mean Time Between Failures.
  3. It provides higher availability for applications by reducing Mean Time to Recovery.
  4. It scales better for more CPUS, memory, and Infiniband network connections.
Correct answer: D
Explanation:
The Unbreakable Enterprise Kernel, for those who want to leverage the latest features from mainline Linux and boost performance and scalability. The Red Hat Compatible Kernel, for those who prefer strict Red Hat kernel ABI (kABI) compatibility.
The Unbreakable Enterprise Kernel, for those who want to leverage the latest features from mainline Linux and boost performance and scalability. 
The Red Hat Compatible Kernel, for those who prefer strict Red Hat kernel ABI (kABI) compatibility.
Question 9
Examine this output:
  • # df –t nfs FilesystemSizeUsedAvailUse%Mounted on o16:export30G21G7.6G74%/mnt
  • # 1s -1 /mnt/nfs.sh -rwxr-mr-x. 1 root root 22 May 8 16:37 /mnt/nfs.sh
  • # file /mnt/nfs.sh /mnt/nfs.sh: Bourne-Again shell script text executables
  • # /mnt/nfs.sh bash: /mnt/nfs.sh: Permission denied
What is the reason for the error?
  1. The file system was exported on host o16 using the ROOT_SQUASH option.
  2. The /export filesystem was mounted with the NOEXEC option on host o16.
  3. The filesystem mounted on /mnt was mounted with the NOEXEC option.
  4. The filesystem was exported on host o16 by using the NO_ROOT_SQUASH option.
Correct answer: C
Question 10
Which two software packages are prerequisites for enabling the configuration and use of a Network information Service (Nis) client?
  1. nis-tools
  2. slapi-nis
  3. ypbind
  4. nisserv
  5. nisbind
  6. yp-tools 
Correct answer: CF
Explanation:
ypbind finds the server for NIS domains and maintains the NIS binding information. The client (normaly the NIS routines in the standard C library) could get the information over RPC from ypbind or read the binding files.
ypbind finds the server for NIS domains and maintains the NIS binding information. 
The client (normaly the NIS routines in the standard C library) could get the information over RPC from ypbind or read the binding files.
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!