11.11 Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

1z0-106 Exam Dumps - Oracle Linux 8 Advanced System Administration

Question # 4

Examine this command:

# useradd -m -s /bin/bash alice

Which statement is true about the account?

A.

It is a member of the wheel group.

B.

It is assigned a shell but without a password.

C.

It is assigned a home directory and a password.

D.

It is not assigned a home directory.

Full Access
Question # 5

Which two statements are true about the at and batch commands?

A.

batch schedules the execution of recurring tasks.

B.

at schedules the execution of recurring tasks.

C.

Both at and batch read from standard input, or you can specify a file and execute the commands with the -f option.

D.

batch executes a task when the system load average is greater than 0.8.

E.

at executes a one-time task to run at a specific time.

Full Access
Question # 6

Examine /etc/anacrontab:

SHELL=/bin/sh

PATH=/sbin:/bin:/usr/sbin:/usr/bin

MAILTO=root

# the maximal random delay added to the base delay of the jobs

RANDOM_DELAY=45

# the jobs are started during the following hours only

START_HOURS_RANGE=3-22

# period in days delay in minutes job-identifier command

1 5 dailyjob nice run-parts /etc/cron.daily

7 25 weeklyjob nice run-parts /etc/cron.weekly

@monthly 45 monthlyjob nice run-parts /etc/cron.monthly

Which two statements are true about the jobs scheduled in this file?

A.

Scripts run by the first job are delayed between 11 and 45 minutes.

B.

Jobs defined in this anacrontab file can be executed between 15:00 and 22:00

C.

Scripts run by the third job are delayed between 45 and 90 minutes.

D.

Jobs defined in this anacrontab file are randomly delayed by up to 51 minutes.

E.

Scripts run by the second job are delayed between 31 and 70 minutes.

Full Access
Question # 7

Which two statements are true about the Linux Auditing System?

A.

Auditing rules can log administrator attempts to access user home directories.

B.

Auditing system call rules can affect system performance depending on the amount of information that is logged.

C.

Auditing modes include permissive, enforcing, and disabled.

D.

Auditing can scan for Common Vulnerabilities and Exposures (CVE) and automatically apply needed patches to a system.

E.

Auditing includes security policies, each of which includes security rules, or checks, which are checked when you run a security scan.

Full Access
Question # 8

Which two statements are true about removing a physical volume (PV) from a volume group (VG)?

A.

It can be removed only after removing it from its VG by using vgreduce.

B.

It can be removed when an active VG has mounted file systems by running vgexport.

C.

It cannot be removed when it is part of an active VG.

D.

It can be removed when an inactive logical volume is on the VG.

E.

It can be removed when it is part of an active VG.

Full Access
Question # 9

Examine these commands executed by root:

# mkdir -p /jail /jail/bin /jail/lib64

# cp $(which bash) /jail/bin/

# ldd $(which bash)

linux-vdso.so.1 (0x00007ffd574f5000)

libtinfo.so.6 => /lib64/libtinfo.so.6 (0x00007fb458c2c000)

libdl.so.2 => /lib64/libdl.so.2 (0x00007fb458a28000)

libc.so.6 => /lib64/libc.so.6 (0x00007fb458666000)

/lib64/ld-linux-x86-64.so.2 (0x00007fb459177000)

# cp /lib64/libtinfo.so.6 /jail/lib64/

# cp /lib64/libdl.so.2 /jail/lib64/

# cp /lib64/libc.so.6 /jail/lib64/

# cp /lib64/ld-linux-x86-64.so.2 /jail/lib64/

# chroot /jail

What is the output from the cd, pwd, and ls commands?

A.

bash-4.4# cd

bash: cd: /root: No such file or directory

bash-4.4# pwd

/

bash-4.4# ls

bin lib64

B.

bash-4.4# cd

bash: cd: /root: Unable to access chrooted file or directory /root

bash-4.4# pwd

/

bash-4.4# ls

bin lib64

C.

bash-4.4# cd

bash: cd: /root: No such file or directory

bash-4.4# pwd

/root

bash-4.4# ls

bash: ls: command not found

D.

bash-4.4# cd

bash: cd: command not found

bash-4.4# pwd

bash: pwd: command not found

bash-4.4# ls

bash: ls: command not found

Full Access
Question # 10

Examine this command:

# cryptsetup luksOpen /dev/xvdd1 cryptfs

What happens upon execution?

A.

It creates the /dev/mapper/cryptfs device mapping file.

B.

It creates the LUKS partition on /dev/xvdd1.

C.

It creates the /dev/mapper/xvdd1 device mapping file.

D.

It creates the /dev/mapper/xvdd1/cryptfs device mapping file.

E.

It creates the /dev/mapper/xvdd1-cryptfs device mapping file.

Full Access
Question # 11

Which mdadm command creates a RAID-1 device consisting of two block volumes and one spare device?

A.

mdadm –create /dev/md0 –level=5 –raid-devices=2 /dev/xvdd1 /dev/xvdd2 –spare-devices=1 /dev/xvdd3

B.

mdadm –create /dev/md0 –level=1 –raid-devices=2 /dev/xvdd1 /dev/xvdd2

C.

mdadm –create /dev/md0 –level=1 –raid-devices=2 /dev/xvdd1 /dev/xvdd2 –spare-devices=1 /dev/xvdd3

D.

mdadm –create /dev/md0 –level=0 –raid-devices=2 /dev/xvdd1 /dev/xvdd2 –spare-devices=1 /dev/xvdd3

Full Access
Question # 12

Which two statements are true about the configuration and use of cron or anacron?

A.

cron jobs may run only once a minute.

B.

All crontabs are held in the /etc/cron.d directory.

C.

The crond daemon looks for jobs only in /etc/crontab.

D.

anacron jobs may run only once a day.

E.

anacron jobs are used to run cron jobs if the system was powered off when they were scheduled to run.

Full Access
Question # 13

Which two features does a user private group provide?

A.

Provision of a unique group.

B.

Capability to create new group users

C.

Capability to execute sudo

D.

Ability for only a group’s users to read files in a new directory

E.

Capability to prevent other users from modifying a file

Full Access
Question # 14

Which two statements are true about naming network interfaces?

A.

Consistent device naming is enabled by default.

B.

The udev device manager generates device names based on a series of schemes.

C.

The udev device manager uses a random number if all other schemes fail.

D.

Device names cannot be manually configured.

E.

Device names incorporate the physical location and hot plug slot index number.

Full Access
Question # 15

As root you configured a file system using AutoFS with default settings. In the first session, you changed to a directory under AutoFS control. In a second session, you changed to /etc. Now the idle time for the session expires. Which two statements are true about the status of the file system mounted in the first session?

A.

It remains mounted as long as the system is running.

B.

It remains mounted until you log out from the first session.

C.

It was unmounted from the first session when the timer expired.

D.

It was unmounted when the second session began.

E.

It remains mounted until you switch to a directory outside the current mount point.

Full Access
Question # 16

Which two default user account settings are contained in /etc/login.defs?

A.

Decryption method used to decrypt passwords.

B.

User hashed passwords.

C.

Group hashed passwords.

D.

Password aging controls.

E.

Encryption method used to encrypt passwords.

Full Access
Question # 17

Which command configures a fully functional and accessible interface on VLAN 800?

A.

modprobe 8021q ip link add link eth0 name eth0.800 type vlan id 800 ip link set eth0.800 up

B.

modprobe 8021q ip link add link eth0 name eth0.800 VLAN 800 ip address add 10.135.1.120/24 dev eth0.800 ip link set eth0.800 up

C.

modprobe 8021q ip link add link eth0 name eth0.800 type vlan id 800 ip address add 10.135.1.120/24 dev eth0.800 ip link set eth0.800 up

D.

modprobe 8021q ip address add 10.135.1.120/24 dev eth0.800 ip link set eth0.800 up

Full Access
Question # 18

Which are three of the network bonding modes supported in Oracle Linux 8?

A.

Multicast

B.

Round-robin

C.

Split Horizon

D.

802.3ad

E.

Poison Reverse

F.

Active Backup

G.

Passive Backup

Full Access