Download Oracle Linux 5 and 6 System Administration.1z0-100.ActualTests.2022-01-01.101q.vcex

Vendor: Oracle
Exam Code: 1z0-100
Exam Name: Oracle Linux 5 and 6 System Administration
Date: Jan 01, 2022
File Size: 832 KB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Purchase
Coupon: EXAM_HUB

Discount: 20%

Demo Questions

Question 1
Which statements is true concerning Oracle Linux configuration files for users and groups?
  1. The /etc/passwd file contains hashed passwords for each user.
  2. The /etc/shadow file contains hashed passwords for each user.
  3. The GECOS field in /etc/passwd file may be empty.
  4. The /etc/group file contains the group name and the hashed group password.
Correct answer: B
Explanation:
/etc/shadow file stores actual password in encrypted (one-way hashed) format for user's account with additional properties related to user password i.e. it stores secure user account information
/etc/shadow file stores actual password in encrypted (one-way hashed) format for user's account with additional properties related to user password i.e. it stores secure user account information
Question 2
Examine this extract from the /etc/ssh/sshd_config file:
  • passwordAuthentication no 
What is the effect of this parameter settings on the use of openSSH commands on both the client and server?
  1. Passwords are not required and no ssh-keygen is required either. Only passphrase are required.
  2. Client users whose keys are not in the authorized_keys file on the server are unable to use passwords to authenticate themselves to the server.
  3. The ssh daemon does not ask for a password before starting or stopping the sshd service.
  4. Client users whose keys are not in the authorized_keys file on the client are unable to use passwords to authenticate themselves to the server.
Correct answer: B
Explanation:
If you set PasswordAuthentication to no, you will no longer be able to use a login and password to authenticate and must use a login and public key instead (if PubkeyAuthentication is set to yes).
If you set PasswordAuthentication to no, you will no longer be able to use a login and password to authenticate and must use a login and public key instead (if PubkeyAuthentication is set to yes).
Question 3
This MDADM output:
  
     
Which two aspects can be determined from this output?
  1. A device failed and has been removed from this RAID set.
  2. It is no longer possible to write to this RAID set.
  3. Read and write performance is no longer optimal on this RAID set.
  4. This RAID set was built without a spare device.
  5. Only Write performance is no longer optimal on this RAID set.
Correct answer: AD
Question 4
Examine the command on its output:
  • [root@FAROUT ~] # modprobe –v nfs 
  • Insmod /lib/modules/2.6.39-100.0.12.e16uek.x86_64/kernel/fs/nfs_common/nfs_acl.ko insmod /lob/modules/2.6.39- 
  • 100.0.12.e16uek.x86_64/kernel/net/sunrpc/auth_gss/auth_rpcgss.ko 
  • Insmod /lib/modules/2.6.39-100.0.12.e16uek.x86_64/kernel/fs/fscache/fscache/ko 
  • Insmod /lib/modules/2.6.39-100.0.12.e16uek.x86_64/kernel/fs/locked.ko 
  • Insmod /lib/modules/2.6.39-100.0.12.e16uek.x86_64/kernel/fs/nfs/nfs.ko 
Which two statements are true about the modprobe command?
  1. It will load the nfs module if all the modules upon which it depends have been loaded.
  2. It displays the dependency resolution for the nfs module and loads all the modules upon which nfs depends before loading the nfs module.
  3. It verifies that the nfs module and all other modules that depend on the nfs module are installed.
  4. It displays the dependency resolution that would occur if the nfs module were to be loaded using modprobe nfs.
  5. It only loads the nfs module if all the modules upon which it depends have not been loaded yet.
Correct answer: AB
Question 5
What is the main advantage of the Oracle Unbreakable Enterprise Kernel compared with the Red Hat compatible kernel?
  1. It is more secure and, therefore, more difficult to hack.
  2. It has a lower Mean Time Between Failures.
  3. It provides higher availability for applications by reducing Mean Time to Recovery.
  4. It scales better for more CPUS, memory, and Infiniband network connections.
Correct answer: D
Explanation:
The Unbreakable Enterprise Kernel, for those who want to leverage the latest features from mainline Linux and boost performance and scalability. The Red Hat Compatible Kernel, for those who prefer strict Red Hat kernel ABI (kABI) compatibility.
The Unbreakable Enterprise Kernel, for those who want to leverage the latest features from mainline Linux and boost performance and scalability. 
The Red Hat Compatible Kernel, for those who prefer strict Red Hat kernel ABI (kABI) compatibility.
Question 6
Examine this output:
  • # df –t nfs FilesystemSizeUsedAvailUse%Mounted on o16:export30G21G7.6G74%/mnt
  • # 1s -1 /mnt/nfs.sh -rwxr-mr-x. 1 root root 22 May 8 16:37 /mnt/nfs.sh
  • # file /mnt/nfs.sh /mnt/nfs.sh: Bourne-Again shell script text executables
  • # /mnt/nfs.sh bash: /mnt/nfs.sh: Permission denied
What is the reason for the error?
  1. The file system was exported on host o16 using the ROOT_SQUASH option.
  2. The /export filesystem was mounted with the NOEXEC option on host o16.
  3. The filesystem mounted on /mnt was mounted with the NOEXEC option.
  4. The filesystem was exported on host o16 by using the NO_ROOT_SQUASH option.
Correct answer: C
Question 7
Which two software packages are prerequisites for enabling the configuration and use of a Network information Service (Nis) client?
  1. nis-tools
  2. slapi-nis
  3. ypbind
  4. nisserv
  5. nisbind
  6. yp-tools 
Correct answer: CF
Explanation:
ypbind finds the server for NIS domains and maintains the NIS binding information. The client (normaly the NIS routines in the standard C library) could get the information over RPC from ypbind or read the binding files.
ypbind finds the server for NIS domains and maintains the NIS binding information. 
The client (normaly the NIS routines in the standard C library) could get the information over RPC from ypbind or read the binding files.
Question 8
You recently updated the strace package to the latest version as shown:
     
What is the outcome of running this command?
  1. It downgrades the strace package to version 4.5.19-1.6.e16. 
  2. It downgrades strace package to version 4.5.19-1.11.e16_3.2.
  3. It fails with an error because you cannot downgrade a package using the yum command.
  4. It fails with an error because there are multiple versions available to which Yum can downgrade the strace package.
  5. It will prompt you to select a version of the strace package that you want to downgrade.
Correct answer: A
Question 9
Which statement is true concerning the /etc/sysconfig directory and its files and subdirectories?
  1. The contents are always the same for a specific version of the Oracle Linux Kernel.
  2. The file /etc/sysconfig/init is used by upstart to control the attributes of the tty devices that get started.
  3. The directory /etc/sysconfig/network-scripts contains files that must not be modified while the network is up.
  4. The files only contain default values for certain daemon processes.
Correct answer: B
Explanation:
The /etc/sysconfig/init file controls how the system appears and functions during the boot process. Note: The /etc/sysconfig directory contains files that control your system's configuration. The contents of this directory depend on the packages that you have installed on your system
The /etc/sysconfig/init file controls how the system appears and functions during the boot process. 
Note: The /etc/sysconfig directory contains files that control your system's configuration. The contents of this directory depend on the packages that you have installed on your system
Question 10
Examine the routing table:
     
Which three statements are true concerning the routing of IP packets?
  1. Traffic to 192.168.180.180 is routed via eth1.
  2. Traffic to 192.168.180.240 is routed via eth1.
  3. Traffic to 192.168.0.42 is routed via eth2.
  4. Traffic to 192.168.42.42 is routed via eth2.
  5. Traffic to 192.168.42.42 is routed via eth0.
  6. Traffic to 192.168.180.180 is routed via eth0.
Correct answer: ACD
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!