Oracle-1z0-106
Oracle-1z0-106
1z0-106
Support
If you have any questions about our product, please provide the following items:
exam code
screenshot of the question
login id/email
please contact us at support@exact2pass.com and our technical experts will provide support within 24 hours.
Copyright
The product of each order has its own encryption code, so you should use it independently. Any unauthorized
changes will inflict legal punishment. We reserve the right of final explanation for this statement.
Exact Questions Oracle - 1z0-106
Question #:1
A. /etc/ssh/ssh_config
B. ~/.ssh/config
C. Command line
D. /etc/ssh/sshd_config
Answer: C
Explanation
Explanation of Answer C:When configuring SSH, the command-line options take the highest precedence.
Any configuration specified directly on the command line will override settings in user-specific (~/.ssh
/config) or system-wide configuration files (/etc/ssh/ssh_config).
Question #:2
A. dmesg -t
B. dmesg -x
C. dmesg -T
D. dmesg -W
Answer: C
Explanation
Option C (Correct):Thedmesg -Tcommand converts the timestamps in the kernel ring buffer messages
to a human-readable format. The defaultdmesgoutput shows the timestamps in a raw format (seconds
since the kernel started), while the-Toption translates these timestamps into a human-readable date and
time.
Option A (Incorrect):The-toption is used to remove the timestamps entirely from the output.
Option B (Incorrect):The-xoption provides extended information about the message (e.g., facility,
level).
Option D (Incorrect):The-Woption waits for new messages and does not convert timestamps to a
human-readable format.
Question #:3
As root you configured a file system using AutoFS with default settings. In the first session, you changed to a
directory under AutoFS control. In a second session, you changed to /etc. Now the idle time for the session
expires. Which two statements are true about the status of the file system mounted in the first session?
B. It remains mounted until you log out from the first session.
C. It was unmounted from the first session when the timer expired.
E. It remains mounted until you switch to a directory outside the current mount point.
Answer: B E
Explanation
Understanding AutoFS Behavior:
AutoFSautomatically mounts file systems when accessed and unmounts them after a period of
inactivity (default is 5 minutes).
A file system remains mounted as long as it isactive, meaning processes are accessing files or
directories within it.
Scenario Analysis:
First Session:
Second Session:
Implications:
The mount point remainsactivebecause the shell in the first session is in the AutoFS directory.
"A file system remains mounted as long as there are open files or directories within it."
Correct Options:
Option B:The file system remains mounted until you log out from the first session.
Option E:The file system remains mounted until you switch to a directory outside the current mount
point.
Option A:Incorrect because the mount does not persist indefinitely; it's unmounted when no longer
active.
Option C:Incorrect because the mount is still active; the timer does not cause unmounting in this case.
Option D:Incorrect because the second session does not influence the mount status in the first session.
Question #:4
A. Boot parameters are defined as values for the GRUB_CMDLINE_LINUX directive in the /etc/default
/grub file.
B. Boot parameters defined as values for the GRUB_BOOT command-line interface are persistent and
apply to all subsequent reboots.
C. Each kernel version's boot parameters are stored in independent configuration files in/boot/loader
/entries.
D. Parameters passed to the kernel from the GRUB 2 menu are persistent and apply to all subsequent
reboots.
Answer: A C
Explanation
Option A (Correct):Boot parameters are set in/etc/default/grubunder
theGRUB_CMDLINE_LINUXdirective. After modifying this file, thegrub2-mkconfigcommand must
be run to apply changes.
Option B (Incorrect):Boot parameters specified at the GRUB command line are not persistent across
reboots unless added to the configuration file.
Option D (Incorrect):Parameters set from the GRUB menu are temporary and do not apply to
subsequent reboots.
Question #:5
#kern.* /dev/console
*.info;mail.none;authpriv.none;cron.none /var/log/messages
authpriv.* /var/log/secure
mail.* -/var/log/maillog
cron.* /var/log/cron
*.emerg :omusrmsg:*
less
Nov 9 20:32:16 server02 sudo[4570]: pam_unix(sudo:session): session opened for user opc (uid=0)
Nov 9 20:32:24 server02 su[4581]: pam_unix(su:auth): authentication failed; logname= uid=1000 euid=0
tty=pts/0 ruser=opc rhost= user=root
A. authpriv.* /var/log/auth
B. *.emerg *
C. *.info;mail.none;authpriv.none;cron.none /var/log/messages
D. #kern.* /dev/sssd/sssd.log
E. cron.* /var/log/cron
Answer: A
Explanation
Option A (Correct):The configuration lineauthpriv.* /var/log/authwould direct all messages of
theauthprivfacility (which includes sensitive authentication messages) to the/var/log/authfile. The log
entries provided, which include authentication-related messages from PAM (pam_unix), would be
logged due to this setting.
Option B (Incorrect):The*.emerg *setting logs emergency messages to all users, not specifically the
provided log output.
Option D (Incorrect):This setting appears to be commented out and incorrect for the logging behavior
described.
Question #:6
A. /lib64/security
B. /etc/pam.d
C.
C. /usr/lib
D. /lib/security
E. /var/lib
Answer: A D
Explanation
Option A (Correct):/lib64/securityis a common directory where PAM (Pluggable Authentication
Module) libraries are stored for 64-bit systems.
Option D (Correct):/lib/securityis another directory where PAM libraries are stored, usually on 32-bit
systems or as a fallback for 64-bit systems.
Option B (Incorrect):/etc/pam.dcontains configuration files for PAM modules but does not store the
modules themselves.
Option C (Incorrect):/usr/libis a general directory for libraries but does not specifically store PAM
modules.
Option E (Incorrect):/var/libis typically used for variable state information and is not relevant for
storing PAM modules.
Question #:7
B. fixfiles -F relabel
D. touch /.autorelabel
F. fixfiles -F onboot
Answer: D F
Explanation
Option D (Correct):Creating an empty file named.autorelabelin the root directory tells SELinux to
relabel the entire file system during the next reboot.
Option F (Correct):Thefixfiles -F onbootcommand schedules a full file system relabel on the next
reboot.
Option A, B, C, E (Incorrect):These options do not correctly set the system to relabel on reboot.
Question #:8
$ ftp host01.example.com
Name (host01.example.com:oracle):
Login Failed
ftp>
Why is the oracle user denied access to the FTP server on host01.example.com?
E. The oracle user is listed in /etc/vsftpd/user_list and USERLIST_ENABLE is set to YES in /etc/vsftpd
/vsftpd.conf.
Answer: E
Explanation
The530 Permission deniederror indicates that the user is not allowed to log in. In vsFTPd, if
theUSERLIST_ENABLEoption is set toYESin/etc/vsftpd/vsftpd.conf, and theoracleuser is listed in/etc/vsftpd
/user_list, that user is explicitly denied access to the FTP server.
Question #:9
D. It can divide logical devices into one or more block disks called partitions.
Answer: B E
Explanation
Option B (Correct):Thefdisk -lcommand lists information about all available disks, including their
sizes, partition tables, and partition details.
Option E (Correct):fdiskcannot handle disks larger than 2 TB because it is limited to the Master Boot
Record (MBR) partitioning scheme. To manage larger disks (over 2 TB), the GUID Partition Table
(GPT) is required, andfdiskdoes not fully support GPT.
Option A (Incorrect):fdiskdoes not support HFS (Hierarchical File System, used by macOS). It
primarily supports MBR and has limited support for GPT.
Option C (Incorrect):fdiskdoes not support partitioning disks larger than 2 TB with GPT;
gdiskorpartedshould be used instead.
Option D (Incorrect):fdiskdoes not divide logical devices into block disks called partitions; it operates
on physical storage devices to create partitions.
Question #:10
B. It can load many free operating systems directly and chain-load proprietary operating systems.
D. It understands file systems and kernel executable formats, allowing the loading of operating systems
without recording the on-disk physical location of the kernel.
Answer: B D
Explanation
GRUB 2 (GRand Unified Bootloader version 2) is a bootloader that is capable of loading a variety of free
operating systems directly. It also supports chain-loading, which is the process of loading other bootloaders.
This feature allows it to boot proprietary operating systems, such as Windows, by passing control to their
respective bootloaders. This flexibility makes GRUB 2 a popular choice for dual-boot or multi-boot
configurations.
Explanation of Answer D:GRUB 2 has the capability to understand multiple file systems (like ext2/3/4,
Btrfs, XFS, etc.) and kernel executable formats. This capability means GRUB 2 does not rely on the physical
location of a kernel on the disk to load an operating system. Instead, it reads the file system to locate the
kernel file. This feature adds flexibility and ease in managing boot entries and reduces the complexity
involved in locating kernels manually.
Question #:11
Answer: B E
Explanation
Explanation of Answer B:iostatis a tool used to monitor system input/output device loading by observing the
time devices are active concerning their average transfer rates. The "Device Utilization Report" provides
statistics about device utilization and throughput rates, which is critical in identifying performance bottlenecks.
Explanation of Answer E:iostatalso generates "CPU Utilization Reports." These reports provide data about
how the CPU is utilized during input/output operations, showing the percentage of CPU time used for user
processes, system processes, and the time the CPU remains idle.
Question #:12
Answer: B E
Explanation
Explanation of Answer B:The commandssh -L 5011:127.0.0.1:80 bob@10.10.2.20 -f sleep 30creates a local
port forward. This means port5011on the client machine is forwarded to port80on the remote machine
(10.10.2.20) using the SSH connection.
Explanation of Answer E:The-foption of thesshcommand causes the SSH connection process to fork to the
background after authentication is complete. Thesleep 30command keeps the SSH connection alive for 30
seconds.
Question #:13
You must add an additional swap device and you add this entry to /etc/fstab:
1048576+0 records in
1073741824 bytes (1.1 GB, 1.0 GiB) copied, 4.32499 s, 248 MB/s
# swapon -a
Which two actions must you perform to add this swap device?
Answer: A D
Explanation
To use a file as swap space, it must first be initialized with themkswapcommand. Theddcommand creates an
empty file, butmkswapformats this file to be used as swap space. This command writes the necessary swap
header to the file, making it recognizable by the system as a valid swap area.
Explanation of Answer D:After initializing the swap file withmkswap, you can optionally assign a label to
the swap file using theswaplabelcommand. This is not strictly required, but it can be useful for identifying
swap files, especially if you are using multiple swap devices.
Question #:14
D. Ksplice has two clients; each can run in three different modes.
Answer: A B
Explanation
Option A: Ksplice can be used without a network connection
Explanation:
Ksplice provides anOffline Clientspecifically designed for systems that do not have a direct
connection to the internet. This client allows administrators to download Ksplice updates on a
system with internet access and then transfer them to the offline system for installation.
This means Ksplice can be effectively used in environments with strict security policies where
network connectivity is restricted or not available.
Oracle® Linux 8: Ksplice User's Guide- Section on "Using the Ksplice Offline Client":
"The Ksplice Offline client enables you to apply Ksplice updates to systems that do not have direct access to
the Internet or to the Oracle Uptrack server."
Option B: It can patch the kernel without shutting down the system.
Explanation:
The primary purpose of Ksplice is to allow administrators to apply critical security patches to the
running kernelwithout requiring a rebootor shutting down the system. This ensures high
availability and minimizes downtime, which is crucial for production environments.
Ksplice works by performingjust-in-time (JIT) compilationof kernel patches and applying them
directly to the running kernel in memory.
"Ksplice enables you to keep your systems up to date and secure by applying important kernel security
updates without rebooting."
Explanation:
This statement is false. While Ksplice patches the running kernel in memory, yum can still
upgrade the kernel packages on disk. After a yum kernel update, a reboot would be
necessary to run the new kernel version, but yum operations are not hindered by Ksplice
patches.
"Ksplice works seamlessly with package management tools like yum and dnf. You can continue to use these
tools to manage your kernel packages."
Option D:Ksplice has two clients; each can run in three different modes.
Explanation:
While Ksplice does have two clients (the online and offline clients), the statement about
each running in three different modes is inaccurate or misleading. The clients do not
operate in "three different modes" per se.
No official documentation supports the claim of "three different modes" for each client.
Explanation:
Ksplice is a feature available to customers with an active Oracle Linux Premier Support
subscription. It is not freely available to all users.
"To use Ksplice, your system must be covered by an Oracle Linux Premier Support subscription."
Conclusion:
Options A and B are correct because Ksplice can be used without a network connection via the offline client,
and it allows patching the kernel without shutting down the system, ensuring minimal downtime.
Question #:15
Which two statements are true about control groups (cgroups) in Oracle Linux 8?
B. A cgroup is a collection of processes bound to a set of limits or parameters defined in the cgroups
filesystem.
C. Different controllers from cgroups version 1 and cgroups version 2 cannot be used at the same time.
D. The cgroups filesystem allows limits to be overwritten in the lower levels of the hierarchy.
E. Cgroups allow processes to be organized into hierarchical groups whose resource usage cannot be
limited and monitored.
Answer: A B
Explanation
Explanation of Answer A:Oracle Linux 8 uses cgroups version 2 (cgroups v2) by default. cgroups v2 is a
unified hierarchy system that introduces improvements over version 1, including a simplified interface and
better resource management capabilities.
Explanation of Answer B:A control group (cgroup) is a mechanism for grouping processes and setting limits
or parameters on their resource usage, such as CPU, memory, or I/O. These limits and parameters are
configured and managed through the cgroups filesystem.
Question #:16
You must prevent Ksplice from reapplying updates at the next system reboot. Which two commands or
parameters can do this?
A. uptrack-upgrade -n
B. nouptrack
C. uptrack-remove –all
D. uptrack=0
E. touch /etc/uptrack/disable
Answer: C E
Explanation
Explanation of Answer C:The commanduptrack-remove --allremoves all currently applied Ksplice updates,
effectively preventing them from being reapplied upon reboot.
Question #:17
/dev/md0:
Version: 1.2
Raid Devices: 3
Total Devices: 3
Active Devices: 2
Working Devices: 3
Failed Devices: 0
Spare Devices: 1
Layout: left-symmetric
UUID: 70f8bd2f:0505d92d:750a781e:c224508d
Events: 66
D. An extra device was added to this RAID set to increase its size.
Answer: B C
Explanation
Option B (Correct):The output shows that the RAID array is in a "degraded, recovering" state, which
means one of the devices failed, and the RAID is currently rebuilding with a spare device. When a
RAID-5 array is in a degraded state, its read and write performance is reduced because it cannot utilize
all disks in parallel, and data is being rebuilt.
Option C (Correct):The output indicates that/dev/sdf1is marked as "spare rebuilding." This implies
that a new spare device has been added to the RAID array to replace a previously failed device, and it is
in the process of rebuilding to restore redundancy.
Option A (Incorrect):The state of the RAID array is "degraded," which indicates that a RAID device
is still being rebuilt. The failed device has not yet returned to normal operating status.
Option D (Incorrect):No extra device was added to increase the RAID set's size. Instead, a spare
device was added to replace a failed one.
Option E (Incorrect):Both read and write performance are sub-optimal in a degraded RAID-5 state
because data is being rebuilt using the remaining active devices.
Question #:18
# nmcli con add con-name eth2 type ethernet ifname eth2 \ Ipv6.address 2804:14c:110:ab2f:c3lb:1212:7917:
708a/64 \ Ipv6.gateway 2804:14c:110:ab2f::1003 \ Ipv4.address 192.168.0.5/24 ipv4.gateway 192.168.0.254
The eth2 connection does not exist. Which two statements are true?
Answer: A C
Explanation
Explanation of Answer A:Thenmcli con addcommand is used to create a new network connection
namedeth2. The parameters specify the connection type (ethernet), the interface name (ifname eth2), and the
connection name (con-name eth2), creating a new configuration for theeth2interface.
Question #:19
display ports instead of the protocols that typically use those ports
Answer: C D
Explanation
Explanation of Answer C:Thesscommand can be used to display all available internal TCP information,
including established connections with detailed TCP metrics, which matches the output in Answer C.
Explanation of Answer D:Thesscommand can display listening ports (TCP in this case) with details like
congestion control algorithms (cubic), which aligns with Answer D. The output indicates a listening TCP
socket on port 80.
Question #:20
Which two statements are true about the at and batch commands?
C.
C. Both at and batch read from standard input, or you can specify a file and execute the commands with
the -f option.
D. batch executes a task when the system load average is greater than 0.8.
Answer: C E
Explanation
Explanation of Answer C:Bothatandbatchcan accept commands from standard input or from a file specified
using the-foption. This allows scheduling of tasks by providing the commands directly or reading them from a
file.
Explanation of Answer E:Theatcommand schedules a one-time task to run at a specified time. It is used to
execute commands once at a particular time in the future.
Question #:21
Answer: B
Explanation
Option B (Correct):Theuseraddcommand with-mcreates a home directory for the user, and the-s /bin
/bashoption assigns the Bash shell. However, no password is set when the user is created
withuseraddunless explicitly done with thepasswdcommand afterward.
Option C (Incorrect):The command does not automatically set a password; it only creates the user
account with the specified shell.
Question #:22
B. The udev device manager generates device names based on a series of schemes.
C. The udev device manager uses a random number if all other schemes fail.
E. Device names incorporate the physical location and hot plug slot index number.
Answer: A B
Explanation
Explanation of Answer A:Consistent network device naming is enabled by default in Oracle Linux 8. This
feature ensures that network interfaces retain their names across reboots, which is important for maintaining
network configuration consistency. This is managed through the Predictable Network Interface Names
feature, which is part of thesystemdproject and is implemented inudev.
Explanation of Answer B:Theudevdevice manager is responsible for dynamically managing device nodes in
the/devdirectory. It generates network interface names based on several naming schemes, such as the
interface’s physical location on the bus (likeenp0s3), MAC address, or other attributes. These schemes are
used to provide consistent and predictable names for network interfaces.
Question #:23
# cat /etc/auto.master
/net -hosts
/- auto.direct ro
# cat /etc/auto.direct
/nfs1 host01:/export/share1
/nfs3 host02:/export/share3
Automounter must be used to mount these filesystems. Which mount options will it use?
A. /nfs1 and /nfs3 are mounted read-only, async while /nfs2 is mounted read-only, sync.
E. /nfs1 and /nfs3 are mounted read-only, async while /nfs2 is mounted read-write, sync.
Answer: A
Explanation
Understanding the Automounter Configuration:
/etc/auto.master:
/net -hosts
/- auto.direct ro
Map File:auto.direct
/etc/auto.direct:
/nfs1 host01:/export/share1
/nfs3 host02:/export/share3
/nfs2:
/nfs1:
ro (from /etc/auto.master)
/nfs2:
ro (from /etc/auto.master)
/nfs3:
ro (from /etc/auto.master)
"Options specified in the master map apply to all entries in the map unless overridden by entries in the map
itself."
"By default, NFS mounts are asynchronous (async) unless the sync option is specified."
Conclusion:
Correct Option:A
Question #:24
Access to files and directories must be granted based only on SELinux contexts.
# sestatus
# setenforce enforcing
# setsebool -P http_enable_homedirs on
A. 1, 2, 4, 5, 6
B. 1, 2, 3, 4, 5, 6
C. 1, 2, 3, 5, 6
D. 1, 2, 6
E. 1, 2, 4, 6
F. 1, 2, 3, 6
Answer: A
Explanation
Explanation of Answer A:
Network services running in a confined domain: SELinux provides domain confinement for services,
ensuring they run with restricted access based on their defined policies.
The oracle user must be confined: The commandsemanage login -a -s guest_u oracleconfines
theoracleuser to theguest_uSELinux user role, which is a confined role.
Access to files and directories based only on SELinux contexts: With SELinux enabled and the
policy loaded, access is governed by SELinux contexts.
Question #:25
Which two statements are true about removing a physical volume (PV) from a volume group (VG)?
B. It can be removed when an active VG has mounted file systems by running vgexport.
Answer: A D
Explanation
To remove a physical volume (PV) from a volume group (VG), it must first be removed using
thevgreducecommand. This operation ensures that the VG no longer contains any references to the PV being
removed.
Explanation of Answer D:A physical volume can be removed if there are no active logical volumes (LVs)
on the VG that require space from that PV. If the LV is inactive, the PV can be safely removed from the VG.
Question #:26
Examine /etc/anacrontab:
SHELL=/bin/sh
PATH=/sbin:/bin:/usr/sbin:/usr/bin
MAILTO=root
# the maximal random delay added to the base delay of the jobs
RANDOM_DELAY=45
START_HOURS_RANGE=3-22
Which two statements are true about the jobs scheduled in this file?
A. Scripts run by the first job are delayed between 11 and 45 minutes.
B. Jobs defined in this anacrontab file can be executed between 15:00 and 22:00
C. Scripts run by the third job are delayed between 45 and 90 minutes.
E. Scripts run by the second job are delayed between 31 and 70 minutes.
Answer: B C
Explanation
Understanding the anacrontab Entries:
The /etc/anacrontab file contains the following variables and job definitions:
SHELL=/bin/sh
PATH=/sbin:/bin:/usr/sbin:/usr/bin
MAILTO=root
# the maximal random delay added to the base delay of the jobs
RANDOM_DELAY=45
START_HOURS_RANGE=3-22
Variables Explained:
RANDOM_DELAY=45
Specifies that arandom delaybetween 0 and 45 minutes is added to the base delay of each job.
START_HOURS_RANGE=3-22
Option B: Jobs defined in this anacrontab file can be executed between 15:00 and 22:00
Explanation:
Therefore, it's true that jobscan be executed between 15:00 (3 PM) and 22:00 (10 PM).
This statement is correct because the specified time range falls within the allowed start hours.
"The START_HOURS_RANGE variable defines the time window during which Anacron jobs can run."
Option C: Scripts run by the third job are delayed between 45 and 90 minutes.
Explanation:
"Each job's delay is calculated by adding its defined delay to a random value between 0 and
RANDOM_DELAY."
Option A:Scripts run by the first job are delayed between 11 and 45 minutes.
Explanation:
The first job (dailyjob) has a total delay between5 and 50 minutes(5-minute base delay
plus up to 45 minutes random delay).
Option D:Jobs defined in this anacrontab file are randomly delayed by up to 51 minutes.
Explanation:
Option E:Scripts run by the second job are delayed between 31 and 70 minutes.
Explanation:
The second job (weeklyjob) has a total delay between25 and 70 minutes(25-minute base
delay plus up to 45 minutes random delay).
The statement specifies a delay between31 and 70 minutes, which is incorrect because the
minimum delay is 25 minutes.
Conclusion:
Options B and C are correct based on the configuration specified in /etc/anacrontab. They accurately reflect
the possible execution times and delays for the jobs defined.
Question #:27
B. An audit rule is defined that creates a log entry every time /etc/passwd is read.
D. An audit is defined that creates a log entry every time a write occurs to /etc/passwd.
Answer: C D
Explanation
Option C (Correct):The-k passpart of theauditctlcommand defines a keyword (pass) for the audit rule.
This keyword helps in filtering and searching logs in the audit trail.
Option B (Incorrect):The rule only logs write (w) operations; it does not log read operations.
Question #:28
C. journalctl -p notice..warning shows all messages from notice to warning log level since the last boot.
Answer: B D E
Explanation
Option B: journalctl -p err shows only error log level.
Explanation:
When specifying asingle priority level, journalctl shows messagesonlyat that level.
0: emerg
1: alert
2: crit
3: err
4: warning
5: notice
6: info
7: debug
"Use the -p option to display messages from the journal that have a specific priority level."
Example:
# journalctl -p err
Explanation:
The -k or --dmesg option filters messages from the kernel, equivalent to the output of the dmesg
command.
This option implies -b, which limits the output to messages from the current boot.
"Use the journalctl -k command to display kernel messages since the last system boot."
Example:
# journalctl -k
Option E: journalctl -p 6 shows all info log level messages and above.
Explanation:
When specifying a single numeric priority, journalctl displays messages withthat priority level
and higher priority levels(i.e., lower severity).
0 (emerg)
1 (alert)
2 (crit)
3 (err)
4 (warning)
5 (notice)
6 (info)
Oracle® Linux 8: Managing Log Files- Section onFiltering Output with journalctl:
"When you specify a single priority level, journalctl shows messages at that level and higher severity."
Example:
# journalctl -p 6
Explanation:
The -b option displays messages from the current boot. This works even if journal
persistence isnotconfigured because the logs from the current boot are stored in volatile
memory (/run/log/journal).
"By default, the journal stores logs in volatile memory and does not persist logs across reboots unless
persistent storage is configured."
Option C:journalctl -p notice..warning shows all messages from notice to warning log level since the
last boot.
Explanation:
The -p option allows specifying arangeof priorities. However, the correct order for the
range should be from thehigher priority (lower number)to thelower priority (higher
number).
Also, the priorities should be specified in the correct sequence, and ranges are inclusive.
Moreover, journalctl by default shows messages from all boots unless limited by the -b
option.
Therefore, without -b, it does not limit messages to "since the last boot," making the
statement incorrect.
Correct Command:
# journalctl -p warning..notice -b
But even then, the priorities need to be specified correctly, and the command in Option C is
incorrect.
Conclusion:
OptionsB,D, andEare correct because they accurately describe the behavior of the journalctl command in
filtering and displaying log messages based on priority levels and sources.
Question #:29
Which are three of the network bonding modes supported in Oracle Linux 8?
A. Multicast
B. Round-robin
C. Split Horizon
D. 802.3ad
E. Poison Reverse
F. Active Backup
G.
G. Passive Backup
Answer: B D F
Explanation
Option B (Correct):Round-robin is a network bonding mode that distributes outgoing traffic evenly
across all active network interfaces.
Option D (Correct):802.3ad (LACP - Link Aggregation Control Protocol) is a bonding mode that
allows dynamic aggregation of links conforming to the IEEE 802.3ad standard.
Option F (Correct):Active Backup is a bonding mode where one interface is active while the other is
in standby, providing redundancy.
Options A, C, E, G (Incorrect):Multicast, Split Horizon, Poison Reverse, and Passive Backup are not
valid bonding modes in Oracle Linux 8.
Question #:30
Which two statements are true about systemd system and service manager?
A. systemd service units expose kernel devices and can be used to implement device-based activation.
B. systemd is the first process that starts after the system boots and is the final process left running before
the system shuts down.
C. systemd is backward-compatible with the System V init scripts that were used in earlier versions of
Oracle Linux.
E. The service command is used to start and stop system service units.
Answer: B C
Explanation
Explanation of Answer B:systemdis the first process to start (PID 1) after the Linux kernel has booted and is
responsible for initializing the user space and managing system services throughout the system's runtime. It is
also the last process to stop during shutdown.
Explanation of Answer C:systemdmaintains backward compatibility with older System V init scripts. It can
run and manage these scripts, ensuring legacy services are supported while providing newer functionalities
through nativesystemdunit files.
Question #:31
# ausearch -k mkdir
items=2 ppid=1354 pid=284632 auid=4294967295 uid=996 gid=996 euid=998 suid=998 fsuid=998 egid=996
sgid=996 fsgid=996
Which command displays the syscall in text format instead of numerical format?
A. ausearch -a 83 -k mkdir
B. ausearch -I -k mkdir
E. ausearch -r -k mkdir
Answer: B C
Explanation
Option B (Correct):The-Ior--interpretoption inausearchconverts the numerical system call numbers
into their corresponding text names, making the output easier to understand.
Option C (Correct):The-scoption specifies the system call by name (mkdir), which helps in finding
audit logs related to that particular system call in text format.
Option A, D, E (Incorrect):These options do not specifically translate the numeric system call
numbers into human-readable text. OptionAfilters by the numeric ID,Dis an invalid option,
andEreverses the search order but does not affect the format.
Question #:32
B. Copy-on-write metadata
E. Online resizing
G. Automatic defragmentation
Answer: B E G
Explanation
Option B (Correct):Btrfs uses a copy-on-write mechanism for both data and metadata, which ensures
that the file system is more resilient to crashes and data corruption.
Option E (Correct):Btrfs supports online resizing, meaning that you can change the size of a mounted
Btrfs file system without unmounting it.
Option A (Incorrect):While Btrfs does support mirroring, it is not strictly block device mirroring in
the traditional sense like RAID; it uses a different approach to redundancy.
Option C (Incorrect):Btrfs is not a cluster file system; it is designed for local file systems.
Option D (Incorrect):While Btrfs can store small files efficiently, it is not its primary design goal
compared to other file systems optimized specifically for small files.
Option F (Incorrect):Btrfs is a file system with integrated volume management capabilities but is not a
general-purpose volume manager like LVM.
Question #:33
Which command configures a fully functional and accessible interface on VLAN 800?
A. modprobe 8021q ip link add link eth0 name eth0.800 type vlan id 800 ip link set eth0.800 up
B.
B. modprobe 8021q ip link add link eth0 name eth0.800 VLAN 800 ip address add 10.135.1.120/24 dev
eth0.800 ip link set eth0.800 up
C. modprobe 8021q ip link add link eth0 name eth0.800 type vlan id 800 ip address add 10.135.1.120/24
dev eth0.800 ip link set eth0.800 up
D. modprobe 8021q ip address add 10.135.1.120/24 dev eth0.800 ip link set eth0.800 up
Answer: C
Explanation
Option C (Correct):This command sequence first loads the 802.1q module needed for VLAN tagging,
then creates a VLAN interface (eth0.800) on the base interface (eth0), assigns an IP address
(10.135.1.120/24), and sets the VLAN interface up.
Option A, B, D (Incorrect):These options have syntactical errors or missing parameters that make
them incorrect for setting up a fully functional and accessible VLAN interface.
Question #:34
A. Modules are a group of packages that are installed together along with dependencies.
F. Packages exist in multiple streams, where each stream contains a different version.
Answer: A B F
Explanation
Understanding DNF Modules:
DNF modules in Oracle Linux 8 provide a way to offer different versions of software (packages) to users,
allowing them to choose the version that best suits their needs. Modules help in managing multiple versions of
software by grouping packages, defining streams, and using profiles for configurations.
Option A: Modules are a group of packages that are installed together along with dependencies.
Explanation:
When you install a module, you are installing a set of packages along with their dependencies.
This grouping ensures that all necessary components are installed for the software to function
correctly.
"A module is a group of packages that represents a component, such as an application, a language runtime, or
a set of tools."
Explanation:
When installing a module, you can select a specific stream to install the desired version.
This allows users to choose between multiple versions of the same software provided within the
module.
"Each module can have one or more streams, which represent versions of the module content."
Example Command:
Option F: Packages exist in multiple streams, where each stream contains a different version.
Explanation:
Within a module, each stream can contain different versions of the packages.
This means the same package can exist in multiple streams but with different versions in each
stream.
This setup allows users to install the version of the software that meets their requirements.
"Different streams can contain different versions of the software, allowing you to select the version that best
suits your needs."
Option C: Profiles are used to provide alternate versions of the same module.
Explanation:
Profilesdefine sets of packages within a module stream for specific use cases or configurations,
not alternate versions.
Streams provide alternate versions, whereas profiles provide different package sets within a
stream.
"A profile is a list of packages that defines a particular use case for a module stream."
Explanation:
Explanation:
Explanation:
You must reset the module and install the new stream's packages manually.
"To switch to a different module stream, you must reset the module and then install the packages from the
new stream."
Conclusion:
Correct Options:A, B, F
Summary:Modules group packages with dependencies, installing a module allows selecting a specific
stream (version), and packages can exist in multiple streams with different versions.
Question #:35
A. A container application built on a bare metal system cannot run on virtual machines or cloud instances.
B. A container application is dependent on the host operating system and kernel version.
D. Podman, Buildah, and Skopeo are independent tools to create, run, and manage container applications
across compatible Oracle Linux systems.
E. Podman requires a running daemon to function and to enable containers to start and run without root
permissions.
Answer: B D
Explanation
Option B (Correct):Container applications are dependent on the host operating system's kernel
because containers share the OS kernel, unlike virtual machines, which use a hypervisor. Compatibility
of the host OS kernel version is required to run containers.
Option D (Correct):Podman, Buildah, and Skopeo are container tools for managing container
applications. Podman runs containers without requiring a daemon like Docker, Buildah is used to build
container images, and Skopeo is used for transferring container images. These tools can operate
independently of one another, providing a flexible and modular approach to container management on
Oracle Linux.
Option A (Incorrect):Container applications built on bare metal can run on virtual machines or cloud
instances as long as the environment supports the container runtime.
Option C (Incorrect):Containers do not package the entire runtime stack; they include the application
and its dependencies but rely on the host OS for the kernel.
Option E (Incorrect):Podman does not require a running daemon; one of its advantages over Docker is
that it can run containers in rootless mode without needing a persistent daemon.
Question #:36
Which two statements are true about the Oracle Linux 8 boot process?
A. The bootloader loads the initramfs file into memory and extracts the vmlinuz file into a temporary file
system (tmpfs).
B. The kernel loads driver modules from vmlinuz that are required to access the root file system.
C. The bootloader loads the initramfs file into memory and extracts the vmlinuz file into the /boot file
system.
D. The kernel loads driver modules from initramfs that are required to access the root file system.
E. Both the vmlinuz file and the initramfs file are located in the /boot directory.
Answer: D E
Explanation
Explanation of Answer D:Theinitramfs(initial RAM filesystem) is a temporary filesystem loaded into
memory during the boot process, containing essential drivers and utilities. The kernel usesinitramfsto load
necessary drivers and modules required to access the root file system, particularly if it resides on a disk that
requires special drivers.
Explanation of Answer E:Both thevmlinuz(the compressed Linux kernel image) and theinitramfsfile are
located in the/bootdirectory. The bootloader, such as GRUB, reads these files from/bootto start the system.
Question #:37
# firewall-cmd --reload
B. Egress traffic is allowed for the Cockpit service only when using port 1313.
C. Runtime firewall configuration is not lost when the firewalld process is restarted or the system is
rebooted.
D. Port 1313 blocks all traffic for the public zone except for ingress traffic to the Cockpit service.
Answer: A C
Explanation
Explanation of Answer A:The commandfirewall-cmd --zone=public --add-service=cockpit --permanentadds
the Cockpit service to the public zone permanently. This means that the service is explicitly allowed only
within the public zone, not in any other zones.
Question #:38
NAME="ens4"
DEVICE="ens4"
ONBOOT=no
NETBOOT=yes
IPV6INIT=yes
BOOTPROTO=none
IPADDR=192.168.2.5
PREFIX=24
GATEWAY=192.168.2.1
TYPE=Ethernet
Which two statements are true after executing nmcli con mod ens4 ipv4.method auto?
Answer: B D
Explanation
Explanation of Answer B:When executingnmcli con mod ens4 ipv4.method auto, theipv4.methodparameter
is set toauto, which configures the interface to obtain its IP address using DHCP. This means that
theBOOTPROTOvalue in the configuration is set todhcp.
Question #:39
E.
Answer: A
Explanation
The commandcryptsetup luksOpen /dev/xvdd1 cryptfsis used to open an encrypted LUKS partition. This
command maps the encrypted block device/dev/xvdd1to a decrypted block device that is accessible under/dev
/mapper/cryptfs.
Options B, C, D, E (Incorrect):These options are incorrect because they do not accurately reflect the
standard behavior of thecryptsetup luksOpencommand. The device created will always be in the format
/dev/mapper/<name>where<name>is the alias specified in the command.
Question #:40
B. The container named oracleshell must already exist; otherwise, the command fails.
C. The command fails if the oraclelinux:8 -slim image does not exist on the local machine.
Answer: A D
Explanation
Understanding the Command:
Explanation:
If no command is specified, it executes the default command in the image (usually /bin/bash).
"You can run a container in interactive mode using the -i and -t options together."
Explanation:
The podman run command handles both creation and starting of the container.
"The podman run command creates and starts a container in one operation."
Option B:The container does not need to pre-exist; podman run creates it if it doesn't exist.
Option C:If the image doesn't exist locally, podman will attempt to pull it from the registry.
"If you attempt to run a container with an image that does not exist locally, Podman automatically pulls the
image from a registry."
Option E:The container is not removed upon exit unless the --rm option is used.
"Use the --rm option to automatically remove the container when it exits."
Conclusion:
Correct Options:A, D
Summary:The command creates and starts a new container named oracleshell and opens an interactive
shell session inside it.
Question #:41
Last metadata expiration check: 4:30:21 ago on Mon 26 Oct 2020 03:09:52 PM GMT
Installed Packages
Name : gzip
Version : 1.9
Release : 9.el8
Architecture : x86_64
Size : 412 k
Source : gzip-1.9-9.el8.src.rpm
Repository : @System
URL :
http://www.gzip.org/
Description : The gzip package contains the popular GNU gzip data compression
Answer: C
Explanation
Thednf infocommand provides detailed information about an installed package. When used with the path of a
binary (such as/usr/bin/gzip), it shows the package that provides the binary along with detailed information
like the version, release, architecture, size, source, repository, summary, URL, and license.
Question #:42
/status *(rw,async)
/usr/shared/tools *(all-squash,anonuid=501,anongid=501,ro)
The NFS server exports /usr/shared/tools to NFS clients. Which statement is true?
A. All clients except those with a local 501 user can mount /usr/shared/tools read-only.
B. All clients can mount /usr/shared/tools read-only and NFS explicitly maps all requests to the UID and
GID of the privileged local 501 user.
C. All clients can mount /usr/shared/tools read-only and NFS explicitly maps all requests to the UID and
GID of the unprivileged local 501 user.
D. All clients can mount /usr/shared/tools read-only and all-squash overrides explicit mapping of the UID
and GID defined by anonuid and anongid.
E. All clients can mount /usr/shared/tools read-only and NFS ignores the directives defined by the anonuid
and anongid options.
Answer: C
Explanation
Option C (Correct):Theall-squashoption in the/etc/exportsfile maps all user and group requests from
remote systems to the anonymous user (nfsnobody) on the NFS server. However, because
theanonuidandanongidoptions are specified with501, all incoming requests are explicitly mapped to the
UID and GID of the unprivileged local user with UID 501 and GID 501. Thero(read-only) option
allows all clients to mount/usr/shared/toolsas read-only.
Option A (Incorrect):This is incorrect because all clients can mount the directory, but all users'
requests are squashed to UID 501. There is no exception for local 501 users.
Option B (Incorrect):The answer is incorrect because it incorrectly states "privileged local 501 user."
The UID 501 is typically an unprivileged user.
Option D (Incorrect):Theall-squashoption does not override the UID and GID explicitly defined
byanonuidandanongid. Instead, it maps all remote requests to these values.
Option E (Incorrect):Theanonuidandanongiddirectives are not ignored; they are explicitly used to map
all requests to the specified UID and GID.
Oracle Linux Reference:For more information on NFS exports and options, refer to:
Question #:43
Answer: D E
Explanation
Explanation of Answer D:The/etc/login.defsfile in Oracle Linux contains configuration settings related to
user account policies, including password aging controls. This includes settings such asPASS_MAX_DAYS,
PASS_MIN_DAYS, andPASS_WARN_AGE, which define the maximum number of days a password is
valid, the minimum number of days between password changes, and the number of days before password
expiration to warn users, respectively.
Explanation of Answer E:The/etc/login.defsfile also contains settings for the encryption method used to
encrypt user passwords. TheENCRYPT_METHODparameter specifies the hashing algorithm, such as
SHA512, that is used to encrypt user passwords stored in/etc/shadow.
Question #:44
Which two statements are true about the configuration and use of cron or anacron?
E. anacron jobs are used to run cron jobs if the system was powered off when they were scheduled to run.
Answer: D E
Explanation
Option D: anacron jobs may run only once a day.
Explanation:
Anacronis designed for systems that are not running continuously (e.g., desktops or laptops that
may be powered off at night). It ensures that scheduled tasks are executed at the specified
intervals.
Anacron jobs are defined with periods indays. The minimal unit of time for scheduling in
Anacron isone day. Therefore, Anacron can schedule jobs to runonce a dayat most.
It is not intended for tasks that need to run multiple times per day.
Option E: anacron jobs are used to run cron jobs if the system was powered off when they were
scheduled to run.
Explanation:
Anacron complements Cron by ensuring thatscheduled jobs are not missedif the system is
powered off or in standby mode at the time they were supposed to run.
When the system boots up, Anacron checks for any scheduled jobs that did not run and executes
them accordingly.
This is particularly useful for laptops or desktops that are not always on.
"Anacron is designed to run commands periodically with specified frequency, but unlike cron, it does not
assume that the system is running continuously."
Explanation:
Cron allows scheduling tasks with a minimum granularity ofone minute. However, this
means that tasks can be scheduled to runevery minute, not limited to only once a minute.
Therefore, the statement is misleading; cron jobs can runas frequently as every minute,
but notonly once a minute.
Explanation:
The /etc/cron.d directory is used for system-wide cron jobs provided by packages or
administrators.
User-specific cron jobs are stored in /var/spool/cron/ or managed via the crontab command
and not placed in /etc/cron.d.
Additionally, the system crontab file is /etc/crontab, and there are also directories like /etc
/cron.hourly, /etc/cron.daily, etc.
Explanation:
Conclusion:
OptionsDandEare correct because they accurately describe the characteristics and purposes of Anacron in the
context of scheduling tasks on an Oracle Linux system.
Question #:45
Examine this udev device naming rule which gets processed successfully:
makefile
A. Symbolic link /dev/sparedisk is created linking to /dev/hdb and with an ide-disk device driver, thus
overwriting existing symbolic links.
C. Symbolic link /dev/sparedisk is created for a device named /dev/hdb which has an ide-disk device
driver if such a device is discovered.
D. The matching device will have the kernel device name /dev/hdb.
E. Symbolic link /dev/sparedisk is created for a device named /dev/hdb or one that has an ide-disk device
driver, whichever is discovered first.
Answer: C D
Explanation
Option C (Correct):If a device named/dev/hdbwith theide-diskdriver is discovered, a symbolic link/dev
/sparediskwill be created, pointing to/dev/hdb.
Option D (Correct):TheKERNEL=="hdb"match specifies that the device will have the kernel device name
/dev/hdb.
Option A (Incorrect):This is incorrect because existing symbolic links are not overwritten unless explicitly
defined.
Option B (Incorrect):The device itself is not renamed to/dev/sparedisk; rather, a symbolic link is created.
Question #:46
B. Processes in a slice unit are named at the same level as scopes and services.
D. A slice unit accepts multiple names by the creation of additional symlinks to the unit file.
Answer: A
Explanation
Option A (Correct):A slice unit in systemd is a grouping mechanism used for hierarchical
management of resources (such as CPU, memory, and I/O) among a group of processes.
Options B, C, D (Incorrect):These options do not correctly describe the role or characteristics of slice
units in Oracle Linux 8.
Question #:47
D.
Answer: A E
Explanation
Option A (Correct):The rule is applied to both IPv4 and IPv6 packets. Theinettable is used for filtering
both IPv4 and IPv6 traffic, and since the rule is added to theinettable, it affects both IP versions.
Option E (Correct):The rule drops TCP packets inbound on port 80. The rule specifies theinputchain
in thefiltertable, and it drops (drop) all TCP traffic (tcp) destined for port 80 (dport 80), which means
any incoming TCP traffic on port 80 will be dropped.
Option B (Incorrect):The command does not automatically update the configuration on disk; the rule
is applied immediately in memory but does not persist across reboots unless explicitly saved.
Option C (Incorrect):The rule specifies TCP packets only, not all traffic. Therefore, it does not drop
traffic for protocols other than TCP.
Option D (Incorrect):Although this statement is correct, it is less specific than Option A, which is
more accurate because it mentions both IP versions.
Option F (Incorrect):The rule applies to inbound traffic, not outbound, so it does not drop outbound
traffic.
Question #:48
Which two methods of changing kernel parameters can you use to modify values for the running system?
A. Issuing the sysctl -w command to write values to specific files in the /proc/sys directory.
B. Using the echo command to write values to specific files in the /proc/sys directory.
C. Issuing the sysctl -w command to write values to specific files in the /sys directory.
D. Using the echo command to write values to specific files in the /sys directory.
E. Adding to or modifying parameters and values in the /etc/sysctl.conf file followed by issuing the sysctl -
p command.
Answer: A B
Explanation
Explanation of Answer A:Thesysctl -wcommand is used to modify kernel parameters at runtime. It allows
you to set the value of a specific parameter in the/proc/sysdirectory. For example,sysctl -w net.ipv4.
ip_forward=1will enable IP forwarding by writing the value directly to the corresponding file in/proc/sys.
Explanation of Answer B:Using theechocommand to write values directly to specific files in the/proc
/sysdirectory is another method to change kernel parameters dynamically for the running system. For instance,
echo 1 > /proc/sys/net/ipv4/ip_forwardachieves the same effect as thesysctl -wcommand.
Question #:49
Answer: A C
Explanation
Understanding logrotate:
The logrotate utility manages log files by rotating, compressing, and removing them based on
configuration.
Explanation:
logrotate rotates logs according to the specified criteria (size, time interval).
Rotation involves renaming the current log file and starting a new one.
"The logrotate utility simplifies the administration of log files by automatically rotating, compressing, and
removing log files."
Explanation:
logrotate can compress old log files after rotation to save disk space.
"You can configure logrotate to compress rotated log files by using the compress option."
Question #:50
Which mdadm command creates a RAID-1 device consisting of two block volumes and one spare device?
Answer: C
Explanation
The correct command to create a RAID-1 device (mirroring) consisting of two block volumes with one spare
device is optionC:mdadm –create /dev/md0 –level=1 –raid-devices=2 /dev/xvdd1 /dev/xvdd2 –spare-
devices=1 /dev/xvdd3.
RAID Level 1:RAID-1, also known as mirroring, involves creating an exact copy (or mirror) of a set of
data on two or more disks. This ensures data redundancy; if one disk fails, the other can still provide the
data.
--raid-devices=2: Indicates the number of active devices (two in this case) to be used in the RAID
array.
/dev/xvdd1 /dev/xvdd2: The two block devices that will form the RAID-1 array.
--spare-devices=1 /dev/xvdd3: Specifies one spare device (/dev/xvdd3). A spare device is used to
automatically replace a failed device in the RAID array.
Option Analysis:
A.Incorrect because it specifies RAID level 5 (--level=5), which requires at least three devices
and does not match the requirement for RAID-1.
C.Correct as it specifies RAID-1 (--level=1), two active devices (--raid-devices=2), and one spare
device (--spare-devices=1).
D.Incorrect because it specifies RAID level 0 (--level=0), which is a striped set (no redundancy),
not a mirrored set (RAID-1).
Oracle Linux Reference:For more detailed information aboutmdadmand RAID configurations in Oracle Linux
8, refer to the following Oracle Linux documentation:
These references provide comprehensive details on RAID levels,mdadmcommand syntax, and options for
creating and managing RAID arrays in Oracle Linux.
Question #:51
Answer: A E
Explanation
Option A (Correct):A user private group (UPG) ensures that each user has their own unique group
created with the same name and ID as the user.
Option E (Correct):The UPG model helps prevent other users from modifying files by default, as
newly created files are assigned to the user’s unique group and not to a shared group.
Option B (Incorrect):UPG does not give the capability to create new group users; this is related to
group management commands.
Option D (Incorrect):UPGs do not limit reading files to group users by default; it depends on specific
file permissions.
Question #:52
Which two statements are true about the proc and sys file systems?
Answer: A C
Explanation
Option A (Correct):The/procfile system is a pseudo-file system that contains runtime system
information (e.g., system memory, mounted devices, hardware configuration, etc.). Files such as/proc
/meminfoand/proc/cpuinfoprovide detailed information about memory and CPUs, respectively.
Option C (Correct):The/sysfile system, also known as sysfs, provides a view of the kernel's device
model. It contains information about system hardware, including CPUs and memory. For example,/sys
/devices/system/cpu/contains directories and files that provide detailed information about each CPU.
Option B (Incorrect):The/sysfile system does not contain a list of running processes. Running
processes are listed in the/procfile system, with each process having its own directory under/proc.
Option D (Incorrect):/procdoes not contain a list of network drivers specifically. Network driver
information is available under/proc/net, but this does not equate to a list of drivers.
Option E (Incorrect):The/sysfile system does not contain a list of mounted devices. Mounted devices
are listed in/proc/mountsor the/etc/mtabfile.
Question #:53
...
driftfile /var/lib/chrony/drift
keyfile /etc/chrony.keys
...
C. chronyd takes pool.ntp.org offline automatically when sending a request to the pool fails.
Answer: D
Explanation
Explanation of Answer D:The entrypool pool.ntp.org offlinein the/etc/chrony.conffile specifies that
thechronydservice should not automatically poll the NTP pool servers atpool.ntp.orguntil it is explicitly
enabled by thechronyccommand. This setting is typically used in environments where the network is not
always available (e.g., laptops or isolated systems) to avoid unnecessary polling.
Question #:54
Answer: C
Explanation
The/etc/sysconfigdirectory contains configuration files for various system services and applications. The
content of this directory depends on which packages are installed on the system. Each package may provide
one or more configuration files stored in/etc/sysconfigto control its behavior.
Question #:55
Which two components are used for creating a new rsyslog rule?
A. filter
B. action
C. parser
D. module
E. security policy
Answer: A B
Explanation
Option A (Correct):In rsyslog, afilteris used to determine which messages should be selected for
further processing. Filters can be based on different criteria such as facility, severity, or specific
message content.
Option B (Correct):Anactionin rsyslog defines what to do with messages that match a filter. Actions
can include writing to a log file, sending to a remote server, running a script, etc.
Option C (Incorrect):A parser is not typically a component for creating a new rsyslog rule; it is
involved in interpreting message formats.
Option E (Incorrect):Security policy is unrelated to the basic components used for defining rsyslog
rules.
Question #:56
You must enable another user to read and navigate to my_directory. Which command will do this?
Answer: D
Explanation
Option D (Correct):The commandsetfacl --modify user:user2:r-x my_directorysets an Access Control
List (ACL) entry that givesuser2read (r) and execute (x) permissions onmy_directory. The execute (x)
permission is required to allow navigation into the directory.
Option A (Incorrect):The--defaultoption would set the default ACL for future files or directories
created withinmy_directory, not the directory itself.
Option B (Incorrect):This option gives only read (r) permission, but without execute (x) permission,
user2cannot navigate into the directory.
Option E (Incorrect):This modifies the ACL for the grouptestinstead of the useruser2.
Question #:57
Which two statements are true about the Linux Auditing System?
A. Auditing rules can log administrator attempts to access user home directories.
B. Auditing system call rules can affect system performance depending on the amount of information that
is logged.
D. Auditing can scan for Common Vulnerabilities and Exposures (CVE) and automatically apply needed
patches to a system.
E. Auditing includes security policies, each of which includes security rules, or checks, which are checked
when you run a security scan.
Answer: A B
Explanation
The Linux Auditing System can be configured to log various activities, including administrator attempts to
access user home directories. Audit rules can be defined to monitor access to specific files or directories, and
any access attempts will be logged in the audit logs.
Explanation of Answer B:Auditing system calls can generate a large amount of log data, which may affect
system performance. The more detailed the audit rules, the greater the potential performance impact, as every
event that matches a rule must be recorded.
Question #:58
linux-vdso.so.1 (0x00007ffd574f5000)
/lib64/ld-linux-x86-64.so.2 (0x00007fb459177000)
# cp /lib64/libtinfo.so.6 /jail/lib64/
# cp /lib64/libdl.so.2 /jail/lib64/
# cp /lib64/libc.so.6 /jail/lib64/
# cp /lib64/ld-linux-x86-64.so.2 /jail/lib64/
# chroot /jail
A. bash-4.4# cd
bash-4.4# pwd
bash-4.4# ls
bin lib64
B. bash-4.4# cd
bash-4.4# pwd
bash-4.4# ls
bin lib64
C. bash-4.4# cd
bash-4.4# pwd
/root
bash-4.4# ls
D. bash-4.4# cd
bash-4.4# pwd
bash-4.4# ls
Answer: A
Explanation
Explanation of Answer A:When thechrootcommand is executed with/jail, the environment is changed to use
/jailas its new root directory. Inside this environment, only the directories and files copied into/jailare
accessible. Since/jaildoes not contain a/rootdirectory, the commandcd(which defaults to changing to the user's
home directory) will fail, displayingNo such file or directory. Thepwdcommand shows the root of the chroot
environment (/), andlsdisplays the contents of/jail, which includesbinandlib64.
Question #:59
# cat deployment.yaml
apiVersion: apps/v1
kind: Deployment
metadata:
name: nginx-deployment
spec:
selector:
matchLabels:
app: nginx
replicas: 2
template:
metadata:
labels:
app: nginx
spec:
containers:
- name: nginx
image: nginx:1.14.2
ports:
- containerPort: 80
A. The command creates and guarantees the availability of a specified number of identical pods.
D. The command specifies port 80 as the port that the container exposes.
E. The command specifies nginx image version 1.14.2 and will fail if the image version is not available.
Answer: A D
Explanation
Option A (Correct):The command creates a Kubernetes Deployment, which ensures the specified
number of replicas (pods) are running at all times. The deployment will manage the creation and
maintenance of these pods to ensure availability.
Option D (Correct):The deployment configuration specifies that the container running inside the pod
exposes port 80 (containerPort: 80).
Option C (Incorrect):The command creates a Deployment object that manages multiple pods; it does
not directly create a single pod namednginx.
Option E (Incorrect):The command specifies the nginx image version1.14.2, but it will not fail
immediately if the image version is not available. Kubernetes will attempt to pull the image, and the
failure will happen during that step if the image does not exist.
Question #:60
Answer: E
Explanation
Explanation of Answer E:This option correctly matches the Kubernetes components with their descriptions:
We help you pass any IT / Business Certification Exams with 100% Pass Guaranteed or Full Refund. Especially
Cisco, CompTIA, Citrix, EMC, HP, Oracle, VMware, Juniper, Check Point, LPI, Nortel, EXIN and so on.
We prepare state-of-the art practice tests for certification exams. You can reach us at any of the email addresses
listed below.
Sales: sales@exact2pass.com
Feedback: feedback@exact2pass.com
Support: support@exact2pass.com
Any problems about IT certification or our products, You can write us back and we will get back to you within 24
hours.