0% found this document useful (0 votes)
104 views66 pages

Oracle-1z0-106

Uploaded by

Miguel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
104 views66 pages

Oracle-1z0-106

Uploaded by

Miguel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 66

Oracle

1z0-106

Oracle Linux 8 Advanced System Administration

Web: www.exact2pass.com Version: 4.0

Email: support@exact2pass.com [ Total Questions: 60]


IMPORTANT NOTICE
Feedback
We have developed quality product and state-of-art service to ensure our customers interest. If you have any
suggestions, please feel free to contact us at feedback@exact2pass.com

Support
If you have any questions about our product, please provide the following items:

exam code
screenshot of the question
login id/email

please contact us at support@exact2pass.com and our technical experts will provide support within 24 hours.

Copyright
The product of each order has its own encryption code, so you should use it independently. Any unauthorized
changes will inflict legal punishment. We reserve the right of final explanation for this statement.
Exact Questions Oracle - 1z0-106

Question #:1

Which takes precedence for ssh program configuration?

A. /etc/ssh/ssh_config

B. ~/.ssh/config

C. Command line

D. /etc/ssh/sshd_config

Answer: C

Explanation
Explanation of Answer C:When configuring SSH, the command-line options take the highest precedence.
Any configuration specified directly on the command line will override settings in user-specific (~/.ssh
/config) or system-wide configuration files (/etc/ssh/ssh_config).

Question #:2

Which command produces human-readable timestamps in kernel ring buffer messages?

A. dmesg -t

B. dmesg -x

C. dmesg -T

D. dmesg -W

Answer: C

Explanation
Option C (Correct):Thedmesg -Tcommand converts the timestamps in the kernel ring buffer messages
to a human-readable format. The defaultdmesgoutput shows the timestamps in a raw format (seconds
since the kernel started), while the-Toption translates these timestamps into a human-readable date and
time.

Option A (Incorrect):The-toption is used to remove the timestamps entirely from the output.

Option B (Incorrect):The-xoption provides extended information about the message (e.g., facility,
level).

Option D (Incorrect):The-Woption waits for new messages and does not convert timestamps to a
human-readable format.

Oracle Linux Reference:Refer to:

Only exact questions will Pass You in Exam 1 of 63


Exact Questions Oracle - 1z0-106

man dmesgfor more details ondmesgoptions.

Question #:3

As root you configured a file system using AutoFS with default settings. In the first session, you changed to a
directory under AutoFS control. In a second session, you changed to /etc. Now the idle time for the session
expires. Which two statements are true about the status of the file system mounted in the first session?

A. It remains mounted as long as the system is running.

B. It remains mounted until you log out from the first session.

C. It was unmounted from the first session when the timer expired.

D. It was unmounted when the second session began.

E. It remains mounted until you switch to a directory outside the current mount point.

Answer: B E

Explanation
Understanding AutoFS Behavior:

AutoFSautomatically mounts file systems when accessed and unmounts them after a period of
inactivity (default is 5 minutes).

A file system remains mounted as long as it isactive, meaning processes are accessing files or
directories within it.

Scenario Analysis:

First Session:

Changed to a directory under AutoFS control (mount point is active).

Second Session:

Changed to /etc (does not affect the first session).

Idle Time Expires:

AutoFS checks for idle mounts to unmount.

Implications:

The mount point remainsactivebecause the shell in the first session is in the AutoFS directory.

AutoFS willnotunmount the file system while it is active.

Only exact questions will Pass You in Exam 2 of 63


Exact Questions Oracle - 1z0-106

Oracle Linux Reference:

Oracle® Linux 8: Configuring File Systems-Using the Automounter:

"A file system remains mounted as long as there are open files or directories within it."

Correct Options:

Option B:The file system remains mounted until you log out from the first session.

Option E:The file system remains mounted until you switch to a directory outside the current mount
point.

Why Other Options Are Incorrect:

Option A:Incorrect because the mount does not persist indefinitely; it's unmounted when no longer
active.

Option C:Incorrect because the mount is still active; the timer does not cause unmounting in this case.

Option D:Incorrect because the second session does not influence the mount status in the first session.

Question #:4

Which two statements are true about kernel boot parameters?

A. Boot parameters are defined as values for the GRUB_CMDLINE_LINUX directive in the /etc/default
/grub file.

B. Boot parameters defined as values for the GRUB_BOOT command-line interface are persistent and
apply to all subsequent reboots.

C. Each kernel version's boot parameters are stored in independent configuration files in/boot/loader
/entries.

D. Parameters passed to the kernel from the GRUB 2 menu are persistent and apply to all subsequent
reboots.

Answer: A C

Explanation
Option A (Correct):Boot parameters are set in/etc/default/grubunder
theGRUB_CMDLINE_LINUXdirective. After modifying this file, thegrub2-mkconfigcommand must
be run to apply changes.

Option C (Correct):The/boot/loader/entries/directory contains configuration files for each kernel


version, which store the boot parameters separately.

Only exact questions will Pass You in Exam 3 of 63


Exact Questions Oracle - 1z0-106

Option B (Incorrect):Boot parameters specified at the GRUB command line are not persistent across
reboots unless added to the configuration file.

Option D (Incorrect):Parameters set from the GRUB menu are temporary and do not apply to
subsequent reboots.

Oracle Linux Reference:Refer to:

Oracle® Linux 8: Configuring GRUB2

Question #:5

Examine this segment of /etc/rsyslog.conf:

# Log all kernel messages to the console.

# Logging much else clutters up the screen.

#kern.* /dev/console

# Log anything (except mail) of level info or higher.

# Don’t log private authentication messages!

*.info;mail.none;authpriv.none;cron.none /var/log/messages

# The authpriv file has restricted access.

authpriv.* /var/log/secure

# Log all the mail messages in one place.

mail.* -/var/log/maillog

# Log cron stuff

cron.* /var/log/cron

# Everybody gets emergency messages

*.emerg :omusrmsg:*

Now examine this log output:

less

Nov 9 20:32:16 server02 sudo[4570]: pam_unix(sudo:session): session opened for user opc (uid=0)

Nov 9 20:32:17 server02 sudo[4570]: pam_unix(sudo:session): session closed

Only exact questions will Pass You in Exam 4 of 63


Exact Questions Oracle - 1z0-106

Nov 9 20:32:24 server02 unix_chkpwd[4661]: password check failed for user

Nov 9 20:32:24 server02 su[4581]: pam_unix(su:auth): authentication failed; logname= uid=1000 euid=0
tty=pts/0 ruser=opc rhost= user=root

Which setting enabled the reporting of this log file output?

A. authpriv.* /var/log/auth

B. *.emerg *

C. *.info;mail.none;authpriv.none;cron.none /var/log/messages

D. #kern.* /dev/sssd/sssd.log

E. cron.* /var/log/cron

Answer: A

Explanation
Option A (Correct):The configuration lineauthpriv.* /var/log/authwould direct all messages of
theauthprivfacility (which includes sensitive authentication messages) to the/var/log/authfile. The log
entries provided, which include authentication-related messages from PAM (pam_unix), would be
logged due to this setting.

Option B (Incorrect):The*.emerg *setting logs emergency messages to all users, not specifically the
provided log output.

Option C (Incorrect):This setting logs various non-authentication-related messages to/var/log


/messages. It specifically excludesauthpriv.

Option D (Incorrect):This setting appears to be commented out and incorrect for the logging behavior
described.

Option E (Incorrect):Thecron.*setting logs cron messages, unrelated to the provided authentication


logs.

Oracle Linux Reference:Refer to:

Oracle® Linux 8: System Logging with rsyslog

Question #:6

Which two directories store PAM authentication modules?

A. /lib64/security

B. /etc/pam.d

C.

Only exact questions will Pass You in Exam 5 of 63


Exact Questions Oracle - 1z0-106

C. /usr/lib

D. /lib/security

E. /var/lib

Answer: A D

Explanation
Option A (Correct):/lib64/securityis a common directory where PAM (Pluggable Authentication
Module) libraries are stored for 64-bit systems.

Option D (Correct):/lib/securityis another directory where PAM libraries are stored, usually on 32-bit
systems or as a fallback for 64-bit systems.

Option B (Incorrect):/etc/pam.dcontains configuration files for PAM modules but does not store the
modules themselves.

Option C (Incorrect):/usr/libis a general directory for libraries but does not specifically store PAM
modules.

Option E (Incorrect):/var/libis typically used for variable state information and is not relevant for
storing PAM modules.

Oracle Linux Reference:Refer to:

Oracle® Linux 8: Managing Authentication

Question #:7

Which two commands relabel an SELinux system after a reboot?

A. Set kernel parameter autorelabel=0

B. fixfiles -F relabel

C. echo “relabel=1” > /.selinux

D. touch /.autorelabel

E. Set kernel parameter selinux=0

F. fixfiles -F onboot

Answer: D F

Explanation

Only exact questions will Pass You in Exam 6 of 63


Exact Questions Oracle - 1z0-106

Option D (Correct):Creating an empty file named.autorelabelin the root directory tells SELinux to
relabel the entire file system during the next reboot.

Option F (Correct):Thefixfiles -F onbootcommand schedules a full file system relabel on the next
reboot.

Option A, B, C, E (Incorrect):These options do not correctly set the system to relabel on reboot.

Oracle Linux Reference:Refer to:

Oracle® Linux 8: SELinux Guide

Question #:8

Examine this command and output:

$ ftp host01.example.com

Connected to host01.example.com (192.168.40.131).

220 (vsFTPd 3.0.2)

Name (host01.example.com:oracle):

After entering a carriage return, this error message is displayed:

530 Permission denied

Login Failed

ftp>

Why is the oracle user denied access to the FTP server on host01.example.com?

A. The oracle user does not exist on host01.example.com.

B. LOCAL_ENABLE is set to NO in /etc/vsftpd/vsftpd.conf.

C. The oracle user is listed in /etc/vsftpd/user_list and USERLIST_ENABLE is set to NO in /etc/vsftpd


/vsftpd.conf.

D. The oracle user is listed in /etc/vsftpd/ftpusers.

E. The oracle user is listed in /etc/vsftpd/user_list and USERLIST_ENABLE is set to YES in /etc/vsftpd
/vsftpd.conf.

Answer: E

Explanation

Only exact questions will Pass You in Exam 7 of 63


Exact Questions Oracle - 1z0-106

The530 Permission deniederror indicates that the user is not allowed to log in. In vsFTPd, if
theUSERLIST_ENABLEoption is set toYESin/etc/vsftpd/vsftpd.conf, and theoracleuser is listed in/etc/vsftpd
/user_list, that user is explicitly denied access to the FTP server.

Question #:9

Which two statements are true about fdisk?

A. It understands GPT, MBR, and HFS partition tables.

B. fdisk -l displays disk size information for all disks.

C. It can partition disks larger than 2 TB by using a GPT partition table.

D. It can divide logical devices into one or more block disks called partitions.

E. It cannot partition disks larger than 2 TB by using a GPT partition table.

Answer: B E

Explanation
Option B (Correct):Thefdisk -lcommand lists information about all available disks, including their
sizes, partition tables, and partition details.

Option E (Correct):fdiskcannot handle disks larger than 2 TB because it is limited to the Master Boot
Record (MBR) partitioning scheme. To manage larger disks (over 2 TB), the GUID Partition Table
(GPT) is required, andfdiskdoes not fully support GPT.

Option A (Incorrect):fdiskdoes not support HFS (Hierarchical File System, used by macOS). It
primarily supports MBR and has limited support for GPT.

Option C (Incorrect):fdiskdoes not support partitioning disks larger than 2 TB with GPT;
gdiskorpartedshould be used instead.

Option D (Incorrect):fdiskdoes not divide logical devices into block disks called partitions; it operates
on physical storage devices to create partitions.

Oracle Linux Reference:Refer to:

Oracle® Linux 8: Managing Disks and Partitions

man fdiskfor more details on the usage and limitations of thefdiskutility.

Question #:10

Which two statements are true about the GRUB 2 bootloader?

A. Its configuration can be changed by editing /etc/default/grub2 and executing grub2-mkconfig to


regenerate grub2.cfg.

Only exact questions will Pass You in Exam 8 of 63


Exact Questions Oracle - 1z0-106

B. It can load many free operating systems directly and chain-load proprietary operating systems.

C. Its configuration file is /boot/grub2/grub2.conf on BIOS-based systems.

D. It understands file systems and kernel executable formats, allowing the loading of operating systems
without recording the on-disk physical location of the kernel.

Answer: B D

Explanation
GRUB 2 (GRand Unified Bootloader version 2) is a bootloader that is capable of loading a variety of free
operating systems directly. It also supports chain-loading, which is the process of loading other bootloaders.
This feature allows it to boot proprietary operating systems, such as Windows, by passing control to their
respective bootloaders. This flexibility makes GRUB 2 a popular choice for dual-boot or multi-boot
configurations.

Explanation of Answer D:GRUB 2 has the capability to understand multiple file systems (like ext2/3/4,
Btrfs, XFS, etc.) and kernel executable formats. This capability means GRUB 2 does not rely on the physical
location of a kernel on the disk to load an operating system. Instead, it reads the file system to locate the
kernel file. This feature adds flexibility and ease in managing boot entries and reduces the complexity
involved in locating kernels manually.

Question #:11

Which two types of reports does iostat generate?

A. Storage Utilization Report

B. Device Utilization Report

C. Memory Utilization Report

D. Swap Utilization Report

E. CPU Utilization Report

Answer: B E

Explanation
Explanation of Answer B:iostatis a tool used to monitor system input/output device loading by observing the
time devices are active concerning their average transfer rates. The "Device Utilization Report" provides
statistics about device utilization and throughput rates, which is critical in identifying performance bottlenecks.

Explanation of Answer E:iostatalso generates "CPU Utilization Reports." These reports provide data about
how the CPU is utilized during input/output operations, showing the percentage of CPU time used for user
processes, system processes, and the time the CPU remains idle.

Question #:12

Only exact questions will Pass You in Exam 9 of 63


Exact Questions Oracle - 1z0-106

Examine this command:

# ssh -L 5011:127.0.0.1:80 bob@10.10.2.20 -f sleep 30

Which two are true upon execution?

A. A reverse tunnel is created back to the local host on port 80.

B. A local port forward is created between client and server.

C. A socket remains open for 30 minutes unless a connection is established.

D. A web server is listening on port 5011.

E. An SSH connection process is forked to the background.

Answer: B E

Explanation
Explanation of Answer B:The commandssh -L 5011:127.0.0.1:80 bob@10.10.2.20 -f sleep 30creates a local
port forward. This means port5011on the client machine is forwarded to port80on the remote machine
(10.10.2.20) using the SSH connection.

Explanation of Answer E:The-foption of thesshcommand causes the SSH connection process to fork to the
background after authentication is complete. Thesleep 30command keeps the SSH connection alive for 30
seconds.

Question #:13

You must add an additional swap device and you add this entry to /etc/fstab:

/.swapfile none swap defaults 0 0

Examine these commands and output:

# dd if=/dev/zero of=/.swapfile bs=1024 count=1048576

1048576+0 records in

1048576+0 records out

1073741824 bytes (1.1 GB, 1.0 GiB) copied, 4.32499 s, 248 MB/s

# swapon -a

swapon: /.swapfile: insecure permissions 0644, 0600 suggested.

swapon: /.swapfile: read swap header failed

Only exact questions will Pass You in Exam 10 of 63


Exact Questions Oracle - 1z0-106

Which two actions must you perform to add this swap device?

A. Initialize the .swapfile file by using the mkswap command.

B. Execute swapon -all.

C. Change defaults to user in the /etc/fstab entry.

D. Assign a label to the .swapfile file by using the swaplabel command.

E. Execute swapon -L swapfile /.swapfile after adding a label.

F. Use a physical disk partition type of 82 (Linux swap).

Answer: A D

Explanation
To use a file as swap space, it must first be initialized with themkswapcommand. Theddcommand creates an
empty file, butmkswapformats this file to be used as swap space. This command writes the necessary swap
header to the file, making it recognizable by the system as a valid swap area.

Explanation of Answer D:After initializing the swap file withmkswap, you can optionally assign a label to
the swap file using theswaplabelcommand. This is not strictly required, but it can be useful for identifying
swap files, especially if you are using multiple swap devices.

Question #:14

Which two are true about using Ksplice?

A. Ksplice can be used without a network connection

B. It can patch the kernel without shutting down the system.

C. Yum cannot upgrade a kernel patched by Ksplice

D. Ksplice has two clients; each can run in three different modes.

E. The Ksplice client is freely available to all customers.

Answer: A B

Explanation
Option A: Ksplice can be used without a network connection

Explanation:

Ksplice provides anOffline Clientspecifically designed for systems that do not have a direct
connection to the internet. This client allows administrators to download Ksplice updates on a
system with internet access and then transfer them to the offline system for installation.

Only exact questions will Pass You in Exam 11 of 63


Exact Questions Oracle - 1z0-106

This means Ksplice can be effectively used in environments with strict security policies where
network connectivity is restricted or not available.

Oracle Linux Reference:

Oracle® Linux 8: Ksplice User's Guide- Section on "Using the Ksplice Offline Client":

"The Ksplice Offline client enables you to apply Ksplice updates to systems that do not have direct access to
the Internet or to the Oracle Uptrack server."

Option B: It can patch the kernel without shutting down the system.

Explanation:

The primary purpose of Ksplice is to allow administrators to apply critical security patches to the
running kernelwithout requiring a rebootor shutting down the system. This ensures high
availability and minimizes downtime, which is crucial for production environments.

Ksplice works by performingjust-in-time (JIT) compilationof kernel patches and applying them
directly to the running kernel in memory.

Oracle Linux Reference:

Oracle® Linux 8: Ksplice User's Guide- Introduction:

"Ksplice enables you to keep your systems up to date and secure by applying important kernel security
updates without rebooting."

Why Other Options Are Not Correct:

Option C:Yum cannot upgrade a kernel patched by Ksplice

Explanation:

This statement is false. While Ksplice patches the running kernel in memory, yum can still
upgrade the kernel packages on disk. After a yum kernel update, a reboot would be
necessary to run the new kernel version, but yum operations are not hindered by Ksplice
patches.

Oracle Linux Reference:

Oracle® Linux 8: Ksplice User's Guide- Compatibility with Package Managers:

"Ksplice works seamlessly with package management tools like yum and dnf. You can continue to use these
tools to manage your kernel packages."

Option D:Ksplice has two clients; each can run in three different modes.

Explanation:

Only exact questions will Pass You in Exam 12 of 63


Exact Questions Oracle - 1z0-106

While Ksplice does have two clients (the online and offline clients), the statement about
each running in three different modes is inaccurate or misleading. The clients do not
operate in "three different modes" per se.

Oracle Linux Reference:

No official documentation supports the claim of "three different modes" for each client.

Option E:The Ksplice client is freely available to all customers.

Explanation:

Ksplice is a feature available to customers with an active Oracle Linux Premier Support
subscription. It is not freely available to all users.

Oracle Linux Reference:

Oracle® Linux 8: Ksplice User's Guide- Access Requirements:

"To use Ksplice, your system must be covered by an Oracle Linux Premier Support subscription."

Conclusion:

Options A and B are correct because Ksplice can be used without a network connection via the offline client,
and it allows patching the kernel without shutting down the system, ensuring minimal downtime.

Question #:15

Which two statements are true about control groups (cgroups) in Oracle Linux 8?

A. Oracle Linux 8 implements cgroups v2 by default.

B. A cgroup is a collection of processes bound to a set of limits or parameters defined in the cgroups
filesystem.

C. Different controllers from cgroups version 1 and cgroups version 2 cannot be used at the same time.

D. The cgroups filesystem allows limits to be overwritten in the lower levels of the hierarchy.

E. Cgroups allow processes to be organized into hierarchical groups whose resource usage cannot be
limited and monitored.

Answer: A B

Explanation
Explanation of Answer A:Oracle Linux 8 uses cgroups version 2 (cgroups v2) by default. cgroups v2 is a
unified hierarchy system that introduces improvements over version 1, including a simplified interface and
better resource management capabilities.

Only exact questions will Pass You in Exam 13 of 63


Exact Questions Oracle - 1z0-106

Explanation of Answer B:A control group (cgroup) is a mechanism for grouping processes and setting limits
or parameters on their resource usage, such as CPU, memory, or I/O. These limits and parameters are
configured and managed through the cgroups filesystem.

Question #:16

You must prevent Ksplice from reapplying updates at the next system reboot. Which two commands or
parameters can do this?

A. uptrack-upgrade -n

B. nouptrack

C. uptrack-remove –all

D. uptrack=0

E. touch /etc/uptrack/disable

Answer: C E

Explanation
Explanation of Answer C:The commanduptrack-remove --allremoves all currently applied Ksplice updates,
effectively preventing them from being reapplied upon reboot.

Explanation of Answer E:Creating a file/etc/uptrack/disabledisables Ksplice Uptrack, preventing it from


applying any updates at the next system reboot.

Question #:17

Examine this command and output:

# mdadm --detail /dev/md0

/dev/md0:

Version: 1.2

Creation Time: Tue Oct 27 16:53:38 2020

Raid Level: raid5

Array Size: 207872 (203.03 MiB 212.86 MB)

Used Dev Size: 103936 (101.52 MiB 106.43 MB)

Raid Devices: 3

Total Devices: 3

Only exact questions will Pass You in Exam 14 of 63


Exact Questions Oracle - 1z0-106

Persistence : Superblock is persistent

Update Time: Tue Oct 27 16:53:38 2020

State: clean, degraded, recovering

Active Devices: 2

Working Devices: 3

Failed Devices: 0

Spare Devices: 1

Layout: left-symmetric

Chunk Size: 512K

Rebuild Status: 60% complete

Name: ol8.example.com:0 (local to host ol8.example.com)

UUID: 70f8bd2f:0505d92d:750a781e:c224508d

Events: 66

Number Major Minor RaidDevice State

0 8 49 0 active sync /dev/sdd1

1 8 65 1 active sync /dev/sde1

3 8 81 2 spare rebuilding /dev/sdf1

Which two are true?

A. A RAID device failed and has returned to normal operating status.

B. The RAID set read and write performance is currently sub-optimal.

C. A new RAID device was just added to replace a failed one.

D. An extra device was added to this RAID set to increase its size.

E. Only write performance is currently sub-optimal on this RAID set.

Answer: B C

Explanation

Only exact questions will Pass You in Exam 15 of 63


Exact Questions Oracle - 1z0-106

Option B (Correct):The output shows that the RAID array is in a "degraded, recovering" state, which
means one of the devices failed, and the RAID is currently rebuilding with a spare device. When a
RAID-5 array is in a degraded state, its read and write performance is reduced because it cannot utilize
all disks in parallel, and data is being rebuilt.

Option C (Correct):The output indicates that/dev/sdf1is marked as "spare rebuilding." This implies
that a new spare device has been added to the RAID array to replace a previously failed device, and it is
in the process of rebuilding to restore redundancy.

Option A (Incorrect):The state of the RAID array is "degraded," which indicates that a RAID device
is still being rebuilt. The failed device has not yet returned to normal operating status.

Option D (Incorrect):No extra device was added to increase the RAID set's size. Instead, a spare
device was added to replace a failed one.

Option E (Incorrect):Both read and write performance are sub-optimal in a degraded RAID-5 state
because data is being rebuilt using the remaining active devices.

Oracle Linux Reference:For more information, refer to:

Oracle® Linux 8: Managing Storage Devices

man mdadmfor details on managing RAID arrays.

Question #:18

Examine this command, which executes successfully:

# nmcli con add con-name eth2 type ethernet ifname eth2 \ Ipv6.address 2804:14c:110:ab2f:c3lb:1212:7917:
708a/64 \ Ipv6.gateway 2804:14c:110:ab2f::1003 \ Ipv4.address 192.168.0.5/24 ipv4.gateway 192.168.0.254

The eth2 connection does not exist. Which two statements are true?

A. Ethernet connection eth2 is created.

B. The configuration is saved in /etc/sysconfig/network.

C. A static IP address is assigned to the eth2 connection

D. It configures an automatic IPV6 address.

Answer: A C

Explanation
Explanation of Answer A:Thenmcli con addcommand is used to create a new network connection
namedeth2. The parameters specify the connection type (ethernet), the interface name (ifname eth2), and the
connection name (con-name eth2), creating a new configuration for theeth2interface.

Only exact questions will Pass You in Exam 16 of 63


Exact Questions Oracle - 1z0-106

Explanation of Answer C:Theipv4.addressparameter assigns a static IPv4 address (192.168.0.5/24) to


theeth2connection. Therefore, the connection will have this static IP once created.

Question #:19

The ss command was invoked with options to:

limit output to all listening and non-listening TCP ports

display ports instead of the protocols that typically use those ports

display all available internal TCP information

display only connections whose source or destination port is 80

Which two results are produced by the command?

A. UNCONN 0 0 [::1]:323 [::]:*

B. tcp CLOSE-WAIT 32 0 server.example.com:44732 12.21.0.15:https

C. ESTAB 0 0 10.12.18.92:50384 169.254.169.254:80 cubic wscale:9,7 rto:201 rtt: 0.226/0.113 ato:40


mss:8948 pmtu:9000 rcvmss:1728 advmss:8948 cwnd:10 bytes_sent:142 bytes_acked:143
bytes_received:1728 segs_out:4 segs_in:3 data_segs_out:1 data_segs_in:1 send 3167433628bps lastsnd:
11351 lastrcv: 11351 lastack:11351 pacing_rate 6334867256bps delivery_rate 504112672bps delivered:
2 app_limited rcv_space:62720 rcv_ssthresh:56588 minrtt:0.142

D. LISTEN 0 511 *:80 *:* cubic cwnd:10

E. icmp6 UNCONN 0 0 *:58 *:*

Answer: C D

Explanation
Explanation of Answer C:Thesscommand can be used to display all available internal TCP information,
including established connections with detailed TCP metrics, which matches the output in Answer C.

Explanation of Answer D:Thesscommand can display listening ports (TCP in this case) with details like
congestion control algorithms (cubic), which aligns with Answer D. The output indicates a listening TCP
socket on port 80.

Question #:20

Which two statements are true about the at and batch commands?

A. batch schedules the execution of recurring tasks.

B. at schedules the execution of recurring tasks.

C.

Only exact questions will Pass You in Exam 17 of 63


Exact Questions Oracle - 1z0-106

C. Both at and batch read from standard input, or you can specify a file and execute the commands with
the -f option.

D. batch executes a task when the system load average is greater than 0.8.

E. at executes a one-time task to run at a specific time.

Answer: C E

Explanation
Explanation of Answer C:Bothatandbatchcan accept commands from standard input or from a file specified
using the-foption. This allows scheduling of tasks by providing the commands directly or reading them from a
file.

Explanation of Answer E:Theatcommand schedules a one-time task to run at a specified time. It is used to
execute commands once at a particular time in the future.

Question #:21

Examine this command:

# useradd -m -s /bin/bash alice

Which statement is true about the account?

A. It is a member of the wheel group.

B. It is assigned a shell but without a password.

C. It is assigned a home directory and a password.

D. It is not assigned a home directory.

Answer: B

Explanation
Option B (Correct):Theuseraddcommand with-mcreates a home directory for the user, and the-s /bin
/bashoption assigns the Bash shell. However, no password is set when the user is created
withuseraddunless explicitly done with thepasswdcommand afterward.

Option A (Incorrect):There is no mention of adding the user to thewheelgroup; theuseraddcommand


does not imply this.

Option C (Incorrect):The command does not automatically set a password; it only creates the user
account with the specified shell.

Option D (Incorrect):The-moption ensures that a home directory is created.

Only exact questions will Pass You in Exam 18 of 63


Exact Questions Oracle - 1z0-106

Oracle Linux Reference:Refer to:

Oracle® Linux 8: Managing Users and Groups

Question #:22

Which two statements are true about naming network interfaces?

A. Consistent device naming is enabled by default.

B. The udev device manager generates device names based on a series of schemes.

C. The udev device manager uses a random number if all other schemes fail.

D. Device names cannot be manually configured.

E. Device names incorporate the physical location and hot plug slot index number.

Answer: A B

Explanation
Explanation of Answer A:Consistent network device naming is enabled by default in Oracle Linux 8. This
feature ensures that network interfaces retain their names across reboots, which is important for maintaining
network configuration consistency. This is managed through the Predictable Network Interface Names
feature, which is part of thesystemdproject and is implemented inudev.

Explanation of Answer B:Theudevdevice manager is responsible for dynamically managing device nodes in
the/devdirectory. It generates network interface names based on several naming schemes, such as the
interface’s physical location on the bus (likeenp0s3), MAC address, or other attributes. These schemes are
used to provide consistent and predictable names for network interfaces.

Question #:23

Examine these commands and output:

# cat /etc/auto.master

/net -hosts

/- auto.direct ro

# cat /etc/auto.direct

/nfs1 host01:/export/share1

/nfs2 -sync host01:/export/share2

/nfs3 host02:/export/share3

Only exact questions will Pass You in Exam 19 of 63


Exact Questions Oracle - 1z0-106

Automounter must be used to mount these filesystems. Which mount options will it use?

A. /nfs1 and /nfs3 are mounted read-only, async while /nfs2 is mounted read-only, sync.

B. All three filesystems are mounted read-write, sync.

C. All three filesystems are mounted read-only, sync.

D. All three filesystems are mounted read-only, async.

E. /nfs1 and /nfs3 are mounted read-only, async while /nfs2 is mounted read-write, sync.

Answer: A

Explanation
Understanding the Automounter Configuration:

/etc/auto.master:

/net -hosts

/- auto.direct ro

The /- auto.direct ro line indicates:

Mount Point Prefix:/ (direct mounts)

Map File:auto.direct

Global Mount Options:ro (read-only)

/etc/auto.direct:

/nfs1 host01:/export/share1

/nfs2 -sync host01:/export/share2

/nfs3 host02:/export/share3

/nfs1 and /nfs3:

No specific mount options in auto.direct.

Inherit the ro option from /etc/auto.master.

/nfs2:

Specifies -sync option in auto.direct.

Inherits ro from /etc/auto.master.

Only exact questions will Pass You in Exam 20 of 63


Exact Questions Oracle - 1z0-106

Mount options are ro,sync.

Mount Options Resolution:

Global Options (ro) apply to all entries unless overridden.

Per-Entry Options in auto.direct override or supplement global options.

Effective Mount Options:

/nfs1:

ro (from /etc/auto.master)

Default NFS options (async unless sync is specified)

/nfs2:

ro (from /etc/auto.master)

sync (specified in auto.direct)

/nfs3:

ro (from /etc/auto.master)

Default NFS options (async)

Oracle Linux Reference:

Oracle® Linux 8: Configuring File Systems-Automounter Configuration:

"Options specified in the master map apply to all entries in the map unless overridden by entries in the map
itself."

NFS Default Options:

"By default, NFS mounts are asynchronous (async) unless the sync option is specified."

Conclusion:

/nfs1 and /nfs3:Mounted with ro,async.

/nfs2:Mounted with ro,sync.

Correct Option:A

Question #:24

Only exact questions will Pass You in Exam 21 of 63


Exact Questions Oracle - 1z0-106

Examine these requirements for a host with a user oracle:

Network services must run in a confined domain.

The oracle user must be confined.

The oracle user must be able to use Mozilla Firefox.

Access to files and directories must be granted based only on SELinux contexts.

The SELinux configuration must be persistent across system restarts.

Users must be able to publish private HTML content.

Now examine these commands and output:

# sestatus

SELinux status: enabled

SELinuxfs mount: /sys/fs/selinux

SELinux root directory: /etc/selinux

Loaded policy name: targeted

Current mode: permissive

Mode from config file: permissive

Policy MLS status: enabled

Policy deny_unknown status: allowed

Memory protection checking: actual (secure)

Max Kernel policy version: 31

# setenforce enforcing

# semanage login -a -s guest_u oracle

# setsebool -P http_enable_homedirs on

Which requirements are satisfied?

A. 1, 2, 4, 5, 6

B. 1, 2, 3, 4, 5, 6

C. 1, 2, 3, 5, 6

Only exact questions will Pass You in Exam 22 of 63


Exact Questions Oracle - 1z0-106

D. 1, 2, 6

E. 1, 2, 4, 6

F. 1, 2, 3, 6

Answer: A

Explanation
Explanation of Answer A:

Network services running in a confined domain: SELinux provides domain confinement for services,
ensuring they run with restricted access based on their defined policies.

The oracle user must be confined: The commandsemanage login -a -s guest_u oracleconfines
theoracleuser to theguest_uSELinux user role, which is a confined role.

Access to files and directories based only on SELinux contexts: With SELinux enabled and the
policy loaded, access is governed by SELinux contexts.

Persistent SELinux configuration across reboots: Thesetenforce enforcingcommand, combined with


the appropriate policy configuration, ensures that SELinux remains in enforcing mode across reboots.

Users able to publish private HTML content: Thesetsebool -P http_enable_homedirs oncommand


enables the use of user home directories for web content, allowing users to host personal web pages.

Question #:25

Which two statements are true about removing a physical volume (PV) from a volume group (VG)?

A. It can be removed only after removing it from its VG by using vgreduce.

B. It can be removed when an active VG has mounted file systems by running vgexport.

C. It cannot be removed when it is part of an active VG.

D. It can be removed when an inactive logical volume is on the VG.

E. It can be removed when it is part of an active VG.

Answer: A D

Explanation
To remove a physical volume (PV) from a volume group (VG), it must first be removed using
thevgreducecommand. This operation ensures that the VG no longer contains any references to the PV being
removed.

Only exact questions will Pass You in Exam 23 of 63


Exact Questions Oracle - 1z0-106

Explanation of Answer D:A physical volume can be removed if there are no active logical volumes (LVs)
on the VG that require space from that PV. If the LV is inactive, the PV can be safely removed from the VG.

Question #:26

Examine /etc/anacrontab:

SHELL=/bin/sh

PATH=/sbin:/bin:/usr/sbin:/usr/bin

MAILTO=root

# the maximal random delay added to the base delay of the jobs

RANDOM_DELAY=45

# the jobs are started during the following hours only

START_HOURS_RANGE=3-22

# period in days delay in minutes job-identifier command

1 5 dailyjob nice run-parts /etc/cron.daily

7 25 weeklyjob nice run-parts /etc/cron.weekly

@monthly 45 monthlyjob nice run-parts /etc/cron.monthly

Which two statements are true about the jobs scheduled in this file?

A. Scripts run by the first job are delayed between 11 and 45 minutes.

B. Jobs defined in this anacrontab file can be executed between 15:00 and 22:00

C. Scripts run by the third job are delayed between 45 and 90 minutes.

D. Jobs defined in this anacrontab file are randomly delayed by up to 51 minutes.

E. Scripts run by the second job are delayed between 31 and 70 minutes.

Answer: B C

Explanation
Understanding the anacrontab Entries:

The /etc/anacrontab file contains the following variables and job definitions:

Only exact questions will Pass You in Exam 24 of 63


Exact Questions Oracle - 1z0-106

SHELL=/bin/sh

PATH=/sbin:/bin:/usr/sbin:/usr/bin

MAILTO=root

# the maximal random delay added to the base delay of the jobs

RANDOM_DELAY=45

# the jobs are started during the following hours only

START_HOURS_RANGE=3-22

# period in days delay in minutes job-identifier command

1 5 dailyjob nice run-parts /etc/cron.daily

7 25 weeklyjob nice run-parts /etc/cron.weekly

@monthly 45 monthlyjob nice run-parts /etc/cron.monthly

Variables Explained:

RANDOM_DELAY=45

Specifies that arandom delaybetween 0 and 45 minutes is added to the base delay of each job.

START_HOURS_RANGE=3-22

Jobs are allowed to start only between03:00 (3 AM)and22:00 (10 PM).

Job Delays Calculated:

First Job (dailyjob):

Base Delay:5 minutes

Random Delay:0 to 45 minutes

Total Delay:5 + (0 to 45) =5 to 50 minutes

Second Job (weeklyjob):

Base Delay:25 minutes

Random Delay:0 to 45 minutes

Total Delay:25 + (0 to 45) =25 to 70 minutes

Only exact questions will Pass You in Exam 25 of 63


Exact Questions Oracle - 1z0-106

Third Job (monthlyjob):

Base Delay:45 minutes

Random Delay:0 to 45 minutes

Total Delay:45 + (0 to 45) =45 to 90 minutes

Option B: Jobs defined in this anacrontab file can be executed between 15:00 and 22:00

Explanation:

The START_HOURS_RANGE=3-22 setting allows jobs to start between03:00 and 22:00.

Therefore, it's true that jobscan be executed between 15:00 (3 PM) and 22:00 (10 PM).

This statement is correct because the specified time range falls within the allowed start hours.

Oracle Linux Reference:

Oracle® Linux 8: Scheduling Tasks- Section on "Anacron Configuration Files":

"The START_HOURS_RANGE variable defines the time window during which Anacron jobs can run."

Option C: Scripts run by the third job are delayed between 45 and 90 minutes.

Explanation:

The third job (monthlyjob) has abase delay of 45 minutes.

With a RANDOM_DELAY of up to 45 minutes, thetotal delaybefore execution is between45


and 90 minutes.

Therefore, this statement is accurate.

Oracle Linux Reference:

Oracle® Linux 8: Scheduling Tasks- Section on "Understanding Anacron Job Delays":

"Each job's delay is calculated by adding its defined delay to a random value between 0 and
RANDOM_DELAY."

Why Other Options Are Not Correct:

Option A:Scripts run by the first job are delayed between 11 and 45 minutes.

Explanation:

The first job (dailyjob) has a total delay between5 and 50 minutes(5-minute base delay
plus up to 45 minutes random delay).

Only exact questions will Pass You in Exam 26 of 63


Exact Questions Oracle - 1z0-106

Therefore, the statement specifying11 to 45 minutesis incorrect.

Option D:Jobs defined in this anacrontab file are randomly delayed by up to 51 minutes.

Explanation:

The maximum random delay is set by RANDOM_DELAY=45, so the random delay is up


to45 minutes, not 51.

Therefore, this statement is false.

Option E:Scripts run by the second job are delayed between 31 and 70 minutes.

Explanation:

The second job (weeklyjob) has a total delay between25 and 70 minutes(25-minute base
delay plus up to 45 minutes random delay).

The statement specifies a delay between31 and 70 minutes, which is incorrect because the
minimum delay is 25 minutes.

Conclusion:

Options B and C are correct based on the configuration specified in /etc/anacrontab. They accurately reflect
the possible execution times and delays for the jobs defined.

Question #:27

Examine this command:

# auditctl -w /etc/passwd -p w -k pass

Which two statements are true upon execution?

A. A write occurs to /etc/audit/rules.d/audit.rules.

B. An audit rule is defined that creates a log entry every time /etc/passwd is read.

C. An audit rule is defined with the keyword pass.

D. An audit is defined that creates a log entry every time a write occurs to /etc/passwd.

E. A write occurs to /etc/audit/audit.rules.

Answer: C D

Explanation

Only exact questions will Pass You in Exam 27 of 63


Exact Questions Oracle - 1z0-106

Option C (Correct):The-k passpart of theauditctlcommand defines a keyword (pass) for the audit rule.
This keyword helps in filtering and searching logs in the audit trail.

Option D (Correct):The-w /etc/passwd -p wpart of the command sets up a watch on the/etc/passwdfile


for write (w) operations. This audit rule will generate a log entry every time there is a write operation to
/etc/passwd.

Option A (Incorrect):This command does not write directly to/etc/audit/rules.d/audit.rules; it defines a


rule in memory that could be saved to this file later.

Option B (Incorrect):The rule only logs write (w) operations; it does not log read operations.

Option E (Incorrect):The command does not directly cause a write to/etc/audit/audit.rules.

Oracle Linux Reference:Refer to:

Oracle® Linux 8: Auditing and System Logs

man auditctlfor details on audit rules and options.

Question #:28

Which three statements are true about the journalctl command?

A. journalctl -bl -p err fails if journal persistence is not configured.

B. journalctl -p err shows only error log level.

C. journalctl -p notice..warning shows all messages from notice to warning log level since the last boot.

D. journalctl -k shows kernel logs since the last boot.

E. journalctl -p 6 shows all info log level messages and above.

Answer: B D E

Explanation
Option B: journalctl -p err shows only error log level.

Explanation:

The -p or --priority option in journalctl filters messages by their priority level.

When specifying asingle priority level, journalctl shows messagesonlyat that level.

The priority levels, as per syslog standards, are:

Only exact questions will Pass You in Exam 28 of 63


Exact Questions Oracle - 1z0-106

0: emerg

1: alert

2: crit

3: err

4: warning

5: notice

6: info

7: debug

Therefore, journalctl -p err displays messages with priorityerr (3)only.

Oracle Linux Reference:

Oracle® Linux 8: Managing Log Files- Section onFiltering Output withjournalctl:

"Use the -p option to display messages from the journal that have a specific priority level."

Example:

# journalctl -p err

Option D: journalctl -k shows kernel logs since the last boot.

Explanation:

The -k or --dmesg option filters messages from the kernel, equivalent to the output of the dmesg
command.

This option implies -b, which limits the output to messages from the current boot.

Therefore, journalctl -k displays kernel messages since the last boot.

Oracle Linux Reference:

Oracle® Linux 8: Managing Log Files- Section onViewing Kernel Messages:

"Use the journalctl -k command to display kernel messages since the last system boot."

Example:

# journalctl -k

Option E: journalctl -p 6 shows all info log level messages and above.

Only exact questions will Pass You in Exam 29 of 63


Exact Questions Oracle - 1z0-106

Explanation:

When specifying a single numeric priority, journalctl displays messages withthat priority level
and higher priority levels(i.e., lower severity).

Priority levels are ordered from 0 (highest severity) to 7 (lowest severity).

Therefore, journalctl -p 6 shows messages with priorities:

0 (emerg)

1 (alert)

2 (crit)

3 (err)

4 (warning)

5 (notice)

6 (info)

This includesinfo level messages (6)and all higher priority messages.

Oracle Linux Reference:

Oracle® Linux 8: Managing Log Files- Section onFiltering Output with journalctl:

"When you specify a single priority level, journalctl shows messages at that level and higher severity."

Example:

# journalctl -p 6

Why Other Options Are Not Correct:

Option A:journalctl -bl -p err fails if journal persistence is not configured.

Explanation:

The -b option displays messages from the current boot. This works even if journal
persistence isnotconfigured because the logs from the current boot are stored in volatile
memory (/run/log/journal).

Therefore, the command doesnot failif journal persistence is not configured.

Oracle Linux Reference:

Oracle® Linux 8: Managing Log Files- Section onJournal Volatility:

Only exact questions will Pass You in Exam 30 of 63


Exact Questions Oracle - 1z0-106

"By default, the journal stores logs in volatile memory and does not persist logs across reboots unless
persistent storage is configured."

Option C:journalctl -p notice..warning shows all messages from notice to warning log level since the
last boot.

Explanation:

The -p option allows specifying arangeof priorities. However, the correct order for the
range should be from thehigher priority (lower number)to thelower priority (higher
number).

Also, the priorities should be specified in the correct sequence, and ranges are inclusive.

Moreover, journalctl by default shows messages from all boots unless limited by the -b
option.

Therefore, without -b, it does not limit messages to "since the last boot," making the
statement incorrect.

Correct Command:

To display messages fromwarning (4)tonotice (5), the command should be:

# journalctl -p warning..notice -b

But even then, the priorities need to be specified correctly, and the command in Option C is
incorrect.

Conclusion:

OptionsB,D, andEare correct because they accurately describe the behavior of the journalctl command in
filtering and displaying log messages based on priority levels and sources.

Question #:29

Which are three of the network bonding modes supported in Oracle Linux 8?

A. Multicast

B. Round-robin

C. Split Horizon

D. 802.3ad

E. Poison Reverse

F. Active Backup

G.

Only exact questions will Pass You in Exam 31 of 63


Exact Questions Oracle - 1z0-106

G. Passive Backup

Answer: B D F

Explanation
Option B (Correct):Round-robin is a network bonding mode that distributes outgoing traffic evenly
across all active network interfaces.

Option D (Correct):802.3ad (LACP - Link Aggregation Control Protocol) is a bonding mode that
allows dynamic aggregation of links conforming to the IEEE 802.3ad standard.

Option F (Correct):Active Backup is a bonding mode where one interface is active while the other is
in standby, providing redundancy.

Options A, C, E, G (Incorrect):Multicast, Split Horizon, Poison Reverse, and Passive Backup are not
valid bonding modes in Oracle Linux 8.

Oracle Linux Reference:Refer to:

Oracle® Linux 8: Network Bonding Guide

Question #:30

Which two statements are true about systemd system and service manager?

A. systemd service units expose kernel devices and can be used to implement device-based activation.

B. systemd is the first process that starts after the system boots and is the final process left running before
the system shuts down.

C. systemd is backward-compatible with the System V init scripts that were used in earlier versions of
Oracle Linux.

D. systemd reads /etc/system to determine which services to start.

E. The service command is used to start and stop system service units.

Answer: B C

Explanation
Explanation of Answer B:systemdis the first process to start (PID 1) after the Linux kernel has booted and is
responsible for initializing the user space and managing system services throughout the system's runtime. It is
also the last process to stop during shutdown.

Explanation of Answer C:systemdmaintains backward compatibility with older System V init scripts. It can
run and manage these scripts, ensuring legacy services are supported while providing newer functionalities
through nativesystemdunit files.

Only exact questions will Pass You in Exam 32 of 63


Exact Questions Oracle - 1z0-106

Question #:31

Examine this command and output:

# ausearch -k mkdir

type=SYSCALL msg=audit(1604360199.719:44733): arch=c000003e syscall=83 success=no


a0=55dec0b47400 a1=lc0 a2=0 a3=0

items=2 ppid=1354 pid=284632 auid=4294967295 uid=996 gid=996 euid=998 suid=998 fsuid=998 egid=996
sgid=996 fsgid=996

tty=(none) ses=429 comm="pkla-check-auth" exe="/usr/bin/pkla-check-authorization" subj=system_u:


system_r:policykit_auth_t:s0 key="mkdir"

Which command displays the syscall in text format instead of numerical format?

A. ausearch -a 83 -k mkdir

B. ausearch -I -k mkdir

C. ausearch -sc 83 -k mkdir

D. ausearch --format text -k mkdir

E. ausearch -r -k mkdir

Answer: B C

Explanation
Option B (Correct):The-Ior--interpretoption inausearchconverts the numerical system call numbers
into their corresponding text names, making the output easier to understand.

Option C (Correct):The-scoption specifies the system call by name (mkdir), which helps in finding
audit logs related to that particular system call in text format.

Option A, D, E (Incorrect):These options do not specifically translate the numeric system call
numbers into human-readable text. OptionAfilters by the numeric ID,Dis an invalid option,
andEreverses the search order but does not affect the format.

Oracle Linux Reference:Refer to:

Oracle® Linux 8: Auditing and System Logs

man ausearchfor more details on audit search and interpretation commands.

Question #:32

Which three are features of the btrfs file system?

Only exact questions will Pass You in Exam 33 of 63


Exact Questions Oracle - 1z0-106

A. Block devices mirroring

B. Copy-on-write metadata

C. Cluster file system

D. Efficient storage for small files

E. Online resizing

F. General-purpose volume manager

G. Automatic defragmentation

Answer: B E G

Explanation
Option B (Correct):Btrfs uses a copy-on-write mechanism for both data and metadata, which ensures
that the file system is more resilient to crashes and data corruption.

Option E (Correct):Btrfs supports online resizing, meaning that you can change the size of a mounted
Btrfs file system without unmounting it.

Option G (Correct):Btrfs automatically defragments files in the background to maintain performance.

Option A (Incorrect):While Btrfs does support mirroring, it is not strictly block device mirroring in
the traditional sense like RAID; it uses a different approach to redundancy.

Option C (Incorrect):Btrfs is not a cluster file system; it is designed for local file systems.

Option D (Incorrect):While Btrfs can store small files efficiently, it is not its primary design goal
compared to other file systems optimized specifically for small files.

Option F (Incorrect):Btrfs is a file system with integrated volume management capabilities but is not a
general-purpose volume manager like LVM.

Oracle Linux Reference:Refer to:

Oracle® Linux 8: Btrfs File System

man btrfsfor features and management.

Question #:33

Which command configures a fully functional and accessible interface on VLAN 800?

A. modprobe 8021q ip link add link eth0 name eth0.800 type vlan id 800 ip link set eth0.800 up

B.

Only exact questions will Pass You in Exam 34 of 63


Exact Questions Oracle - 1z0-106

B. modprobe 8021q ip link add link eth0 name eth0.800 VLAN 800 ip address add 10.135.1.120/24 dev
eth0.800 ip link set eth0.800 up

C. modprobe 8021q ip link add link eth0 name eth0.800 type vlan id 800 ip address add 10.135.1.120/24
dev eth0.800 ip link set eth0.800 up

D. modprobe 8021q ip address add 10.135.1.120/24 dev eth0.800 ip link set eth0.800 up

Answer: C

Explanation
Option C (Correct):This command sequence first loads the 802.1q module needed for VLAN tagging,
then creates a VLAN interface (eth0.800) on the base interface (eth0), assigns an IP address
(10.135.1.120/24), and sets the VLAN interface up.

Option A, B, D (Incorrect):These options have syntactical errors or missing parameters that make
them incorrect for setting up a fully functional and accessible VLAN interface.

Oracle Linux Reference:Refer to:

Oracle® Linux 8: Configuring VLANs

Question #:34

Which three statements are true about DNF modules?

A. Modules are a group of packages that are installed together along with dependencies.

B. Installing a module allows a user to select a specific stream.

C. Profiles are used to provide alternate versions of the same module.

D. Streams are used to define optional configurations of modules.

E. Streams cannot declare dependencies on the streams of other modules.

F. Packages exist in multiple streams, where each stream contains a different version.

G. Switching an enabled module stream automatically changes installed packages.

Answer: A B F

Explanation
Understanding DNF Modules:

DNF modules in Oracle Linux 8 provide a way to offer different versions of software (packages) to users,
allowing them to choose the version that best suits their needs. Modules help in managing multiple versions of
software by grouping packages, defining streams, and using profiles for configurations.

Only exact questions will Pass You in Exam 35 of 63


Exact Questions Oracle - 1z0-106

Option A: Modules are a group of packages that are installed together along with dependencies.

Explanation:

Modulesare collections of packages that are grouped together to represent an application,


language runtime, or any logical set.

When you install a module, you are installing a set of packages along with their dependencies.

This grouping ensures that all necessary components are installed for the software to function
correctly.

Oracle Linux Reference:

Oracle® Linux 8: Managing Software-About Modules:

"A module is a group of packages that represents a component, such as an application, a language runtime, or
a set of tools."

Option B: Installing a module allows a user to select a specific stream.

Explanation:

Streamsin a module represent different versions of the software.

When installing a module, you can select a specific stream to install the desired version.

This allows users to choose between multiple versions of the same software provided within the
module.

Oracle Linux Reference:

Oracle® Linux 8: Managing Software-About Module Streams:

"Each module can have one or more streams, which represent versions of the module content."

Example Command:

# dnf module list nodejs

This command lists available streams for the nodejs module.

Option F: Packages exist in multiple streams, where each stream contains a different version.

Explanation:

Within a module, each stream can contain different versions of the packages.

This means the same package can exist in multiple streams but with different versions in each
stream.

Only exact questions will Pass You in Exam 36 of 63


Exact Questions Oracle - 1z0-106

This setup allows users to install the version of the software that meets their requirements.

Oracle Linux Reference:

Oracle® Linux 8: Managing Software-About Module Streams:

"Different streams can contain different versions of the software, allowing you to select the version that best
suits your needs."

Why Other Options Are Incorrect:

Option C: Profiles are used to provide alternate versions of the same module.

Explanation:

Profilesdefine sets of packages within a module stream for specific use cases or configurations,
not alternate versions.

Streams provide alternate versions, whereas profiles provide different package sets within a
stream.

Oracle Linux Reference:

Oracle® Linux 8: Managing Software-About Module Profiles:

"A profile is a list of packages that defines a particular use case for a module stream."

Option D: Streams are used to define optional configurations of modules.

Explanation:

Streams define different versions of software, not optional configurations.

Optional configurations are managed through profiles within a stream.

Oracle Linux Reference:

Profiles handle configurations, while streams handle versions.

Option E: Streams cannot declare dependencies on the streams of other modules.

Explanation:

Streams can declare dependencies on specific streams of other modules.

This allows modules to work together with compatible versions.

Oracle Linux Reference:

Oracle® Linux 8: Managing Software-Module Dependencies:

Only exact questions will Pass You in Exam 37 of 63


Exact Questions Oracle - 1z0-106

"Modules can declare dependencies on specific streams of other modules."

Option G: Switching an enabled module stream automatically changes installed packages.

Explanation:

Switching streams does not automatically change installed packages.

You must reset the module and install the new stream's packages manually.

Oracle Linux Reference:

Oracle® Linux 8: Managing Software-Switching Module Streams:

"To switch to a different module stream, you must reset the module and then install the packages from the
new stream."

Conclusion:

Correct Options:A, B, F

Summary:Modules group packages with dependencies, installing a module allows selecting a specific
stream (version), and packages can exist in multiple streams with different versions.

Question #:35

Which two statements are true about container technology?

A. A container application built on a bare metal system cannot run on virtual machines or cloud instances.

B. A container application is dependent on the host operating system and kernel version.

C. Containers package an application with the individual runtime stack.

D. Podman, Buildah, and Skopeo are independent tools to create, run, and manage container applications
across compatible Oracle Linux systems.

E. Podman requires a running daemon to function and to enable containers to start and run without root
permissions.

Answer: B D

Explanation
Option B (Correct):Container applications are dependent on the host operating system's kernel
because containers share the OS kernel, unlike virtual machines, which use a hypervisor. Compatibility
of the host OS kernel version is required to run containers.

Only exact questions will Pass You in Exam 38 of 63


Exact Questions Oracle - 1z0-106

Option D (Correct):Podman, Buildah, and Skopeo are container tools for managing container
applications. Podman runs containers without requiring a daemon like Docker, Buildah is used to build
container images, and Skopeo is used for transferring container images. These tools can operate
independently of one another, providing a flexible and modular approach to container management on
Oracle Linux.

Option A (Incorrect):Container applications built on bare metal can run on virtual machines or cloud
instances as long as the environment supports the container runtime.

Option C (Incorrect):Containers do not package the entire runtime stack; they include the application
and its dependencies but rely on the host OS for the kernel.

Option E (Incorrect):Podman does not require a running daemon; one of its advantages over Docker is
that it can run containers in rootless mode without needing a persistent daemon.

Oracle Linux Reference:Refer to:

Oracle® Linux 8: Podman and Containers Guide

man podman,man buildah,man skopeofor further details on these tools.

Question #:36

Which two statements are true about the Oracle Linux 8 boot process?

A. The bootloader loads the initramfs file into memory and extracts the vmlinuz file into a temporary file
system (tmpfs).

B. The kernel loads driver modules from vmlinuz that are required to access the root file system.

C. The bootloader loads the initramfs file into memory and extracts the vmlinuz file into the /boot file
system.

D. The kernel loads driver modules from initramfs that are required to access the root file system.

E. Both the vmlinuz file and the initramfs file are located in the /boot directory.

Answer: D E

Explanation
Explanation of Answer D:Theinitramfs(initial RAM filesystem) is a temporary filesystem loaded into
memory during the boot process, containing essential drivers and utilities. The kernel usesinitramfsto load
necessary drivers and modules required to access the root file system, particularly if it resides on a disk that
requires special drivers.

Explanation of Answer E:Both thevmlinuz(the compressed Linux kernel image) and theinitramfsfile are
located in the/bootdirectory. The bootloader, such as GRUB, reads these files from/bootto start the system.

Only exact questions will Pass You in Exam 39 of 63


Exact Questions Oracle - 1z0-106

Question #:37

Examine these commands, which execute successfully:

# firewall-cmd --zone=public --add-service=cockpit --permanent

# firewall-cmd --zone=public --add-port=1313/tcp --permanent

# firewall-cmd --reload

Which are true upon execution?

A. The Cockpit service is added only to the public zone.

B. Egress traffic is allowed for the Cockpit service only when using port 1313.

C. Runtime firewall configuration is not lost when the firewalld process is restarted or the system is
rebooted.

D. Port 1313 blocks all traffic for the public zone except for ingress traffic to the Cockpit service.

E. The custom Cockpit service configuration file is updated in /usr/lib/firewalld/services.

Answer: A C

Explanation
Explanation of Answer A:The commandfirewall-cmd --zone=public --add-service=cockpit --permanentadds
the Cockpit service to the public zone permanently. This means that the service is explicitly allowed only
within the public zone, not in any other zones.

Explanation of Answer C:Using the--permanentflag withfirewall-cmdcommands ensures that the changes


are stored in the firewalld configuration and are persistent across reboots. Therefore, when thefirewalldservice
restarts or the system reboots, the runtime configuration will not be lost, and the changes will remain in effect.

Question #:38

Examine this network configuration:

NAME="ens4"

DEVICE="ens4"

ONBOOT=no

NETBOOT=yes

IPV6INIT=yes

BOOTPROTO=none

Only exact questions will Pass You in Exam 40 of 63


Exact Questions Oracle - 1z0-106

IPADDR=192.168.2.5

PREFIX=24

GATEWAY=192.168.2.1

TYPE=Ethernet

Which two statements are true after executing nmcli con mod ens4 ipv4.method auto?

A. Interface ens4 automatically starts on boot.

B. BOOTPROTO value is set to dhcp.

C. ONBOOT value is set to yes.

D. IPADDR value is considered null.

E. ONBOOT value is set to dhcp.

F. Interface ens4 is assigned an IP address of 192.168.2.5.

Answer: B D

Explanation
Explanation of Answer B:When executingnmcli con mod ens4 ipv4.method auto, theipv4.methodparameter
is set toauto, which configures the interface to obtain its IP address using DHCP. This means that
theBOOTPROTOvalue in the configuration is set todhcp.

Explanation of Answer D:Whenipv4.methodis set toauto(DHCP), any static IP address specified


inIPADDRis considered null because the interface will now obtain its IP address from a DHCP server,
making the manually set IP address irrelevant.

Question #:39

Examine this command:

# cryptsetup luksOpen /dev/xvdd1 cryptfs

What happens upon execution?

A. It creates the /dev/mapper/cryptfs device mapping file.

B. It creates the LUKS partition on /dev/xvdd1.

C. It creates the /dev/mapper/xvdd1 device mapping file.

D. It creates the /dev/mapper/xvdd1/cryptfs device mapping file.

E.

Only exact questions will Pass You in Exam 41 of 63


Exact Questions Oracle - 1z0-106

E. It creates the /dev/mapper/xvdd1-cryptfs device mapping file.

Answer: A

Explanation
The commandcryptsetup luksOpen /dev/xvdd1 cryptfsis used to open an encrypted LUKS partition. This
command maps the encrypted block device/dev/xvdd1to a decrypted block device that is accessible under/dev
/mapper/cryptfs.

Option A (Correct):This is correct because thecryptsetup luksOpencommand creates a device mapping


under/dev/mapper/with the name specified (cryptfsin this case). This mapping allows you to access the
encrypted content of/dev/xvdd1through the decrypted virtual device/dev/mapper/cryptfs.

Options B, C, D, E (Incorrect):These options are incorrect because they do not accurately reflect the
standard behavior of thecryptsetup luksOpencommand. The device created will always be in the format
/dev/mapper/<name>where<name>is the alias specified in the command.

Oracle Linux Reference:For more information, refer to:

Oracle® Linux 8: Managing Storage Devices

man cryptsetupfor more details on theluksOpencommand and LUKS management.

Question #:40

Examine this command:

$ podman run –name=oracleshell -it oraclelinux:8 -slim

Which two statements are true upon execution?

A. The container creates and starts an interactive shell.

B. The container named oracleshell must already exist; otherwise, the command fails.

C. The command fails if the oraclelinux:8 -slim image does not exist on the local machine.

D. The container is created and started in a single command.

E. The container is removed by typing exit at the bash shell prompt.

Answer: A D

Explanation
Understanding the Command:

$ podman run --name=oracleshell -it oraclelinux:8-slim

Only exact questions will Pass You in Exam 42 of 63


Exact Questions Oracle - 1z0-106

(Note: The image is likely oraclelinux:8-slim without a space.)

podman run:Creates and starts a new container.

--name=oracleshell:Assigns the name oracleshell to the container.

-it:Runs the container in interactive mode with a pseudo-TTY.

oraclelinux:8-slim:Specifies the image to use.

Option A: The container creates and starts an interactive shell.

Explanation:

The -it option runs the container interactively.

If no command is specified, it executes the default command in the image (usually /bin/bash).

This provides an interactive shell inside the container.

Oracle Linux Reference:

Oracle® Linux 8: Managing Containers-Running Containers Interactively:

"You can run a container in interactive mode using the -i and -t options together."

Option D: The container is created and started in a single command.

Explanation:

The podman run command handles both creation and starting of the container.

There's no need to create the container separately.

Oracle Linux Reference:

Oracle® Linux 8: Managing Containers-Creating and Running Containers:

"The podman run command creates and starts a container in one operation."

Why Other Options Are Incorrect:

Option B:The container does not need to pre-exist; podman run creates it if it doesn't exist.

Option C:If the image doesn't exist locally, podman will attempt to pull it from the registry.

Oracle Linux Reference:

Oracle® Linux 8: Managing Containers-Pulling Images:

Only exact questions will Pass You in Exam 43 of 63


Exact Questions Oracle - 1z0-106

"If you attempt to run a container with an image that does not exist locally, Podman automatically pulls the
image from a registry."

Option E:The container is not removed upon exit unless the --rm option is used.

Oracle Linux Reference:

Oracle® Linux 8: Managing Containers-Automatically Removing Containers:

"Use the --rm option to automatically remove the container when it exits."

Conclusion:

Correct Options:A, D

Summary:The command creates and starts a new container named oracleshell and opens an interactive
shell session inside it.

Question #:41

Examine this output:

Last metadata expiration check: 4:30:21 ago on Mon 26 Oct 2020 03:09:52 PM GMT

Installed Packages

Name : gzip

Version : 1.9

Release : 9.el8

Architecture : x86_64

Size : 412 k

Source : gzip-1.9-9.el8.src.rpm

Repository : @System

From repo : anaconda

Summary : The GNU data compression program

URL :

http://www.gzip.org/

License : GPLv3+ and GFDL

Only exact questions will Pass You in Exam 44 of 63


Exact Questions Oracle - 1z0-106

Description : The gzip package contains the popular GNU gzip data compression

program. Gzipped files have a .gz extension.

Gzip should be installed on your system, because it is a very

commonly used data compression program.

Which command generated it?

A. dnf list /usr/bin/gzip

B. dnf provides /usr/bin/gzip

C. dnf info /usr/bin/gzip

D. dnf search /usr/bin/gzip

Answer: C

Explanation
Thednf infocommand provides detailed information about an installed package. When used with the path of a
binary (such as/usr/bin/gzip), it shows the package that provides the binary along with detailed information
like the version, release, architecture, size, source, repository, summary, URL, and license.

Question #:42

Examine the contents of the /etc/exports file on an NFS server:

/status *(rw,async)

/usr/shared/tools *(all-squash,anonuid=501,anongid=501,ro)

/projects/big *(ro) pteam(rw)

The NFS server exports /usr/shared/tools to NFS clients. Which statement is true?

A. All clients except those with a local 501 user can mount /usr/shared/tools read-only.

B. All clients can mount /usr/shared/tools read-only and NFS explicitly maps all requests to the UID and
GID of the privileged local 501 user.

C. All clients can mount /usr/shared/tools read-only and NFS explicitly maps all requests to the UID and
GID of the unprivileged local 501 user.

D. All clients can mount /usr/shared/tools read-only and all-squash overrides explicit mapping of the UID
and GID defined by anonuid and anongid.

E. All clients can mount /usr/shared/tools read-only and NFS ignores the directives defined by the anonuid
and anongid options.

Only exact questions will Pass You in Exam 45 of 63


Exact Questions Oracle - 1z0-106

Answer: C

Explanation
Option C (Correct):Theall-squashoption in the/etc/exportsfile maps all user and group requests from
remote systems to the anonymous user (nfsnobody) on the NFS server. However, because
theanonuidandanongidoptions are specified with501, all incoming requests are explicitly mapped to the
UID and GID of the unprivileged local user with UID 501 and GID 501. Thero(read-only) option
allows all clients to mount/usr/shared/toolsas read-only.

Option A (Incorrect):This is incorrect because all clients can mount the directory, but all users'
requests are squashed to UID 501. There is no exception for local 501 users.

Option B (Incorrect):The answer is incorrect because it incorrectly states "privileged local 501 user."
The UID 501 is typically an unprivileged user.

Option D (Incorrect):Theall-squashoption does not override the UID and GID explicitly defined
byanonuidandanongid. Instead, it maps all remote requests to these values.

Option E (Incorrect):Theanonuidandanongiddirectives are not ignored; they are explicitly used to map
all requests to the specified UID and GID.

Oracle Linux Reference:For more information on NFS exports and options, refer to:

Oracle® Linux 8: Managing NFS and NIS

man exportsfor details on export options.

Question #:43

Which two default user account settings are contained in /etc/login.defs?

A. Decryption method used to decrypt passwords.

B. User hashed passwords.

C. Group hashed passwords.

D. Password aging controls.

E. Encryption method used to encrypt passwords.

Answer: D E

Explanation
Explanation of Answer D:The/etc/login.defsfile in Oracle Linux contains configuration settings related to
user account policies, including password aging controls. This includes settings such asPASS_MAX_DAYS,
PASS_MIN_DAYS, andPASS_WARN_AGE, which define the maximum number of days a password is

Only exact questions will Pass You in Exam 46 of 63


Exact Questions Oracle - 1z0-106

valid, the minimum number of days between password changes, and the number of days before password
expiration to warn users, respectively.

Explanation of Answer E:The/etc/login.defsfile also contains settings for the encryption method used to
encrypt user passwords. TheENCRYPT_METHODparameter specifies the hashing algorithm, such as
SHA512, that is used to encrypt user passwords stored in/etc/shadow.

Question #:44

Which two statements are true about the configuration and use of cron or anacron?

A. cron jobs may run only once a minute.

B. All crontabs are held in the /etc/cron.d directory.

C. The crond daemon looks for jobs only in /etc/crontab.

D. anacron jobs may run only once a day.

E. anacron jobs are used to run cron jobs if the system was powered off when they were scheduled to run.

Answer: D E

Explanation
Option D: anacron jobs may run only once a day.

Explanation:

Anacronis designed for systems that are not running continuously (e.g., desktops or laptops that
may be powered off at night). It ensures that scheduled tasks are executed at the specified
intervals.

Anacron jobs are defined with periods indays. The minimal unit of time for scheduling in
Anacron isone day. Therefore, Anacron can schedule jobs to runonce a dayat most.

It is not intended for tasks that need to run multiple times per day.

Oracle Linux Reference:

Oracle® Linux 8: Scheduling Tasks- Section onAnacron Configuration Files:

"Anacron is used to run commands periodically with a frequency specified in days."

Option E: anacron jobs are used to run cron jobs if the system was powered off when they were
scheduled to run.

Explanation:

Only exact questions will Pass You in Exam 47 of 63


Exact Questions Oracle - 1z0-106

Anacron complements Cron by ensuring thatscheduled jobs are not missedif the system is
powered off or in standby mode at the time they were supposed to run.

When the system boots up, Anacron checks for any scheduled jobs that did not run and executes
them accordingly.

This is particularly useful for laptops or desktops that are not always on.

Oracle Linux Reference:

Oracle® Linux 8: Scheduling Tasks- Section onUnderstanding Anacron:

"Anacron is designed to run commands periodically with specified frequency, but unlike cron, it does not
assume that the system is running continuously."

Why Other Options Are Not Correct:

Option A:cron jobs may run only once a minute.

Explanation:

Cron allows scheduling tasks with a minimum granularity ofone minute. However, this
means that tasks can be scheduled to runevery minute, not limited to only once a minute.

Multiple cron jobs can be scheduled to run at the same minute.

Therefore, the statement is misleading; cron jobs can runas frequently as every minute,
but notonly once a minute.

Option B:All crontabs are held in the /etc/cron.d directory.

Explanation:

The /etc/cron.d directory is used for system-wide cron jobs provided by packages or
administrators.

User-specific cron jobs are stored in /var/spool/cron/ or managed via the crontab command
and not placed in /etc/cron.d.

Additionally, the system crontab file is /etc/crontab, and there are also directories like /etc
/cron.hourly, /etc/cron.daily, etc.

Option C:The crond daemon looks for jobs only in /etc/crontab.

Explanation:

The crond daemon checks multiple locations for scheduled jobs:

Only exact questions will Pass You in Exam 48 of 63


Exact Questions Oracle - 1z0-106

User crontabs managed via the crontab -e command (stored in /var/spool/cron/).

System-wide crontab file (/etc/crontab).

The /etc/cron.d/ directory.

The /etc/cron.hourly/, /etc/cron.daily/, /etc/cron.weekly/, and /etc/cron.monthly/


directories.

Therefore, crond does not look for jobsonlyin /etc/crontab.

Conclusion:

OptionsDandEare correct because they accurately describe the characteristics and purposes of Anacron in the
context of scheduling tasks on an Oracle Linux system.

Question #:45

Examine this udev device naming rule which gets processed successfully:

makefile

KERNEL=="hdb", DRIVER=="ide-disk", SYMLINK+="sparedisk"

Which two statements are true?

A. Symbolic link /dev/sparedisk is created linking to /dev/hdb and with an ide-disk device driver, thus
overwriting existing symbolic links.

B. The matching device will be named /dev/sparedisk.

C. Symbolic link /dev/sparedisk is created for a device named /dev/hdb which has an ide-disk device
driver if such a device is discovered.

D. The matching device will have the kernel device name /dev/hdb.

E. Symbolic link /dev/sparedisk is created for a device named /dev/hdb or one that has an ide-disk device
driver, whichever is discovered first.

Answer: C D

Explanation
Option C (Correct):If a device named/dev/hdbwith theide-diskdriver is discovered, a symbolic link/dev
/sparediskwill be created, pointing to/dev/hdb.

Option D (Correct):TheKERNEL=="hdb"match specifies that the device will have the kernel device name
/dev/hdb.

Only exact questions will Pass You in Exam 49 of 63


Exact Questions Oracle - 1z0-106

Option A (Incorrect):This is incorrect because existing symbolic links are not overwritten unless explicitly
defined.

Option B (Incorrect):The device itself is not renamed to/dev/sparedisk; rather, a symbolic link is created.

Option E (Incorrect):The rule specifically requires bothKERNEL=="hdb"andDRIVER=="ide-disk"to


match; it is not an either/or condition.

Question #:46

Which statement is true about slice units?

A. A slice unit is a concept for hierarchically managing resources in a group of processes.

B. Processes in a slice unit are named at the same level as scopes and services.

C. The system.slice contains all system services and user sessions.

D. A slice unit accepts multiple names by the creation of additional symlinks to the unit file.

Answer: A

Explanation
Option A (Correct):A slice unit in systemd is a grouping mechanism used for hierarchical
management of resources (such as CPU, memory, and I/O) among a group of processes.

Options B, C, D (Incorrect):These options do not correctly describe the role or characteristics of slice
units in Oracle Linux 8.

Oracle Linux Reference:Refer to:

Oracle® Linux 8: Managing Services with systemd

Question #:47

Examine this command:

# nft add rule inet filter input tcp dport 80 drop

Which two statements are true upon execution?

A. The rule is applied to both IPv4 and IPv6 packets.

B. The rule updates the configuration on disk.

C. All traffic inbound on port 80 is dropped.

D.

Only exact questions will Pass You in Exam 50 of 63


Exact Questions Oracle - 1z0-106

D. The rule applies to the input table.

E. TCP packets inbound on port 80 are dropped.

F. TCP packets outbound on port 80 are dropped.

Answer: A E

Explanation
Option A (Correct):The rule is applied to both IPv4 and IPv6 packets. Theinettable is used for filtering
both IPv4 and IPv6 traffic, and since the rule is added to theinettable, it affects both IP versions.

Option E (Correct):The rule drops TCP packets inbound on port 80. The rule specifies theinputchain
in thefiltertable, and it drops (drop) all TCP traffic (tcp) destined for port 80 (dport 80), which means
any incoming TCP traffic on port 80 will be dropped.

Option B (Incorrect):The command does not automatically update the configuration on disk; the rule
is applied immediately in memory but does not persist across reboots unless explicitly saved.

Option C (Incorrect):The rule specifies TCP packets only, not all traffic. Therefore, it does not drop
traffic for protocols other than TCP.

Option D (Incorrect):Although this statement is correct, it is less specific than Option A, which is
more accurate because it mentions both IP versions.

Option F (Incorrect):The rule applies to inbound traffic, not outbound, so it does not drop outbound
traffic.

Oracle Linux Reference:Refer to:

Oracle® Linux 8: Managing Firewall Rules with nftables

Question #:48

Which two methods of changing kernel parameters can you use to modify values for the running system?

A. Issuing the sysctl -w command to write values to specific files in the /proc/sys directory.

B. Using the echo command to write values to specific files in the /proc/sys directory.

C. Issuing the sysctl -w command to write values to specific files in the /sys directory.

D. Using the echo command to write values to specific files in the /sys directory.

E. Adding to or modifying parameters and values in the /etc/sysctl.conf file followed by issuing the sysctl -
p command.

Answer: A B

Only exact questions will Pass You in Exam 51 of 63


Exact Questions Oracle - 1z0-106

Explanation
Explanation of Answer A:Thesysctl -wcommand is used to modify kernel parameters at runtime. It allows
you to set the value of a specific parameter in the/proc/sysdirectory. For example,sysctl -w net.ipv4.
ip_forward=1will enable IP forwarding by writing the value directly to the corresponding file in/proc/sys.

Explanation of Answer B:Using theechocommand to write values directly to specific files in the/proc
/sysdirectory is another method to change kernel parameters dynamically for the running system. For instance,
echo 1 > /proc/sys/net/ipv4/ip_forwardachieves the same effect as thesysctl -wcommand.

Question #:49

Which two actions are performed by the logrotate utility?

A. rotating log files as specified

B. encrypted log files

C. compressing log files

D. duplicating log files

E. hashing log files

Answer: A C

Explanation
Understanding logrotate:

The logrotate utility manages log files by rotating, compressing, and removing them based on
configuration.

It helps prevent log files from consuming excessive disk space.

Option A: Rotating Log Files as Specified

Explanation:

logrotate rotates logs according to the specified criteria (size, time interval).

Rotation involves renaming the current log file and starting a new one.

Oracle Linux Reference:

Oracle® Linux 8: Managing Log Files-Using logrotate:

"The logrotate utility simplifies the administration of log files by automatically rotating, compressing, and
removing log files."

Only exact questions will Pass You in Exam 52 of 63


Exact Questions Oracle - 1z0-106

Option C: Compressing Log Files

Explanation:

logrotate can compress old log files after rotation to save disk space.

Compression is typically done using gzip.

Oracle Linux Reference:

Oracle® Linux 8: Managing Log Files-Configuring logrotate:

"You can configure logrotate to compress rotated log files by using the compress option."

Question #:50

Which mdadm command creates a RAID-1 device consisting of two block volumes and one spare device?

A. mdadm –create /dev/md0 –level=5 –raid-devices=2 /dev/xvdd1 /dev/xvdd2 –spare-devices=1 /dev


/xvdd3

B. mdadm –create /dev/md0 –level=1 –raid-devices=2 /dev/xvdd1 /dev/xvdd2

C. mdadm –create /dev/md0 –level=1 –raid-devices=2 /dev/xvdd1 /dev/xvdd2 –spare-devices=1 /dev


/xvdd3

D. mdadm –create /dev/md0 –level=0 –raid-devices=2 /dev/xvdd1 /dev/xvdd2 –spare-devices=1 /dev


/xvdd3

Answer: C

Explanation
The correct command to create a RAID-1 device (mirroring) consisting of two block volumes with one spare
device is optionC:mdadm –create /dev/md0 –level=1 –raid-devices=2 /dev/xvdd1 /dev/xvdd2 –spare-
devices=1 /dev/xvdd3.

RAID Level 1:RAID-1, also known as mirroring, involves creating an exact copy (or mirror) of a set of
data on two or more disks. This ensures data redundancy; if one disk fails, the other can still provide the
data.

mdadm Command Structure:Themdadmcommand is used to manage and monitor RAID devices on


Linux. To create a new RAID array, the--createoption is used, followed by several parameters:

/dev/md0: The name of the RAID device to be created.

--level=1: Specifies RAID level 1 (mirroring).

--raid-devices=2: Indicates the number of active devices (two in this case) to be used in the RAID
array.

Only exact questions will Pass You in Exam 53 of 63


Exact Questions Oracle - 1z0-106

/dev/xvdd1 /dev/xvdd2: The two block devices that will form the RAID-1 array.

--spare-devices=1 /dev/xvdd3: Specifies one spare device (/dev/xvdd3). A spare device is used to
automatically replace a failed device in the RAID array.

Option Analysis:

A.Incorrect because it specifies RAID level 5 (--level=5), which requires at least three devices
and does not match the requirement for RAID-1.

B.Incorrect because it does not include the--spare-devices=1option, meaning there is no spare


device included in this configuration.

C.Correct as it specifies RAID-1 (--level=1), two active devices (--raid-devices=2), and one spare
device (--spare-devices=1).

D.Incorrect because it specifies RAID level 0 (--level=0), which is a striped set (no redundancy),
not a mirrored set (RAID-1).

Oracle Linux Reference:For more detailed information aboutmdadmand RAID configurations in Oracle Linux
8, refer to the following Oracle Linux documentation:

Oracle® Linux 8 Managing Storage Devices - RAID Configuration

Oracle® Linux 8 mdadm Manual

These references provide comprehensive details on RAID levels,mdadmcommand syntax, and options for
creating and managing RAID arrays in Oracle Linux.

Question #:51

Which two features does a user private group provide?

A. Provision of a unique group.

B. Capability to create new group users

C. Capability to execute sudo

D. Ability for only a group’s users to read files in a new directory

E. Capability to prevent other users from modifying a file

Answer: A E

Explanation
Option A (Correct):A user private group (UPG) ensures that each user has their own unique group
created with the same name and ID as the user.

Only exact questions will Pass You in Exam 54 of 63


Exact Questions Oracle - 1z0-106

Option E (Correct):The UPG model helps prevent other users from modifying files by default, as
newly created files are assigned to the user’s unique group and not to a shared group.

Option B (Incorrect):UPG does not give the capability to create new group users; this is related to
group management commands.

Option C (Incorrect):UPG does not providesudocapabilities;sudoconfiguration is managed separately.

Option D (Incorrect):UPGs do not limit reading files to group users by default; it depends on specific
file permissions.

Oracle Linux Reference:Refer to:

Oracle® Linux 8: Managing Users and Groups

Question #:52

Which two statements are true about the proc and sys file systems?

A. proc contains information about memory and CPUs.

B. sys contains a list of running processes.

C. sys contains information about memory and CPUs.

D. proc contains a list of network drivers.

E. sys contains a list of mounted devices.

Answer: A C

Explanation
Option A (Correct):The/procfile system is a pseudo-file system that contains runtime system
information (e.g., system memory, mounted devices, hardware configuration, etc.). Files such as/proc
/meminfoand/proc/cpuinfoprovide detailed information about memory and CPUs, respectively.

Option C (Correct):The/sysfile system, also known as sysfs, provides a view of the kernel's device
model. It contains information about system hardware, including CPUs and memory. For example,/sys
/devices/system/cpu/contains directories and files that provide detailed information about each CPU.

Option B (Incorrect):The/sysfile system does not contain a list of running processes. Running
processes are listed in the/procfile system, with each process having its own directory under/proc.

Option D (Incorrect):/procdoes not contain a list of network drivers specifically. Network driver
information is available under/proc/net, but this does not equate to a list of drivers.

Option E (Incorrect):The/sysfile system does not contain a list of mounted devices. Mounted devices
are listed in/proc/mountsor the/etc/mtabfile.

Only exact questions will Pass You in Exam 55 of 63


Exact Questions Oracle - 1z0-106

Oracle Linux Reference:For more details, see:

Oracle® Linux 8: The/procand/sysFile Systems.

Question #:53

Examine this content from /etc/chrony.conf:

...

pool pool.ntp.org offline

driftfile /var/lib/chrony/drift

keyfile /etc/chrony.keys

...

Which statement is true about pool.ntp.org?

A. chronyd polls a maximum of 3 sources from pool.ntp.org after it is enabled.

B. chronyd does not poll pool.ntp.org until it is enabled to do so by chronyd.

C. chronyd takes pool.ntp.org offline automatically when sending a request to the pool fails.

D. chronyd does not poll pool.ntp.org until it is enabled to do so by chronyc.

Answer: D

Explanation
Explanation of Answer D:The entrypool pool.ntp.org offlinein the/etc/chrony.conffile specifies that
thechronydservice should not automatically poll the NTP pool servers atpool.ntp.orguntil it is explicitly
enabled by thechronyccommand. This setting is typically used in environments where the network is not
always available (e.g., laptops or isolated systems) to avoid unnecessary polling.

Question #:54

Which is true about the /etc/sysconfig directory in an Oracle Linux 8 system?

A. It is used to access device and device driver information.

B. Files in this directory hierarchy contain information about running processes.

C. Its contents depend on the packages installed on the system.

D. Files in this directory hierarchy contain information about system hardware.

Only exact questions will Pass You in Exam 56 of 63


Exact Questions Oracle - 1z0-106

Answer: C

Explanation
The/etc/sysconfigdirectory contains configuration files for various system services and applications. The
content of this directory depends on which packages are installed on the system. Each package may provide
one or more configuration files stored in/etc/sysconfigto control its behavior.

Question #:55

Which two components are used for creating a new rsyslog rule?

A. filter

B. action

C. parser

D. module

E. security policy

Answer: A B

Explanation
Option A (Correct):In rsyslog, afilteris used to determine which messages should be selected for
further processing. Filters can be based on different criteria such as facility, severity, or specific
message content.

Option B (Correct):Anactionin rsyslog defines what to do with messages that match a filter. Actions
can include writing to a log file, sending to a remote server, running a script, etc.

Option C (Incorrect):A parser is not typically a component for creating a new rsyslog rule; it is
involved in interpreting message formats.

Option D (Incorrect):A module in rsyslog is a loadable component that provides additional


capabilities, such as support for different protocols or output formats. It is not a direct component of a
logging rule.

Option E (Incorrect):Security policy is unrelated to the basic components used for defining rsyslog
rules.

Oracle Linux Reference:Refer to:

Oracle® Linux 8: Configuring Rsyslog

Question #:56

Examine the access privileges on this directory:

Only exact questions will Pass You in Exam 57 of 63


Exact Questions Oracle - 1z0-106

drwx------ 2 user1 test 4096 Nov 6 10:12 my_directory/

You must enable another user to read and navigate to my_directory. Which command will do this?

A. setfacl --default --modify user:user2:rw- my_directory

B. setfacl --modify user:user2:r-- my_directory

C. setfacl -x user:user2 my_directory

D. setfacl --modify user:user2:r-x my_directory

E. setfacl --modify group:test:r-- my_directory

Answer: D

Explanation
Option D (Correct):The commandsetfacl --modify user:user2:r-x my_directorysets an Access Control
List (ACL) entry that givesuser2read (r) and execute (x) permissions onmy_directory. The execute (x)
permission is required to allow navigation into the directory.

Option A (Incorrect):The--defaultoption would set the default ACL for future files or directories
created withinmy_directory, not the directory itself.

Option B (Incorrect):This option gives only read (r) permission, but without execute (x) permission,
user2cannot navigate into the directory.

Option C (Incorrect):The-xoption is used to remove an ACL entry, not modify it.

Option E (Incorrect):This modifies the ACL for the grouptestinstead of the useruser2.

Oracle Linux Reference:Refer to:

Oracle® Linux 8: Using Access Control Lists

Question #:57

Which two statements are true about the Linux Auditing System?

A. Auditing rules can log administrator attempts to access user home directories.

B. Auditing system call rules can affect system performance depending on the amount of information that
is logged.

C. Auditing modes include permissive, enforcing, and disabled.

D. Auditing can scan for Common Vulnerabilities and Exposures (CVE) and automatically apply needed
patches to a system.

Only exact questions will Pass You in Exam 58 of 63


Exact Questions Oracle - 1z0-106

E. Auditing includes security policies, each of which includes security rules, or checks, which are checked
when you run a security scan.

Answer: A B

Explanation
The Linux Auditing System can be configured to log various activities, including administrator attempts to
access user home directories. Audit rules can be defined to monitor access to specific files or directories, and
any access attempts will be logged in the audit logs.

Explanation of Answer B:Auditing system calls can generate a large amount of log data, which may affect
system performance. The more detailed the audit rules, the greater the potential performance impact, as every
event that matches a rule must be recorded.

Question #:58

Examine these commands executed by root:

# mkdir -p /jail /jail/bin /jail/lib64

# cp $(which bash) /jail/bin/

# ldd $(which bash)

linux-vdso.so.1 (0x00007ffd574f5000)

libtinfo.so.6 => /lib64/libtinfo.so.6 (0x00007fb458c2c000)

libdl.so.2 => /lib64/libdl.so.2 (0x00007fb458a28000)

libc.so.6 => /lib64/libc.so.6 (0x00007fb458666000)

/lib64/ld-linux-x86-64.so.2 (0x00007fb459177000)

# cp /lib64/libtinfo.so.6 /jail/lib64/

# cp /lib64/libdl.so.2 /jail/lib64/

# cp /lib64/libc.so.6 /jail/lib64/

# cp /lib64/ld-linux-x86-64.so.2 /jail/lib64/

# chroot /jail

What is the output from the cd, pwd, and ls commands?

A. bash-4.4# cd

Only exact questions will Pass You in Exam 59 of 63


Exact Questions Oracle - 1z0-106

bash: cd: /root: No such file or directory

bash-4.4# pwd

bash-4.4# ls

bin lib64

B. bash-4.4# cd

bash: cd: /root: Unable to access chrooted file or directory /root

bash-4.4# pwd

bash-4.4# ls

bin lib64

C. bash-4.4# cd

bash: cd: /root: No such file or directory

bash-4.4# pwd

/root

bash-4.4# ls

bash: ls: command not found

D. bash-4.4# cd

bash: cd: command not found

bash-4.4# pwd

bash: pwd: command not found

bash-4.4# ls

bash: ls: command not found

Answer: A

Only exact questions will Pass You in Exam 60 of 63


Exact Questions Oracle - 1z0-106

Explanation
Explanation of Answer A:When thechrootcommand is executed with/jail, the environment is changed to use
/jailas its new root directory. Inside this environment, only the directories and files copied into/jailare
accessible. Since/jaildoes not contain a/rootdirectory, the commandcd(which defaults to changing to the user's
home directory) will fail, displayingNo such file or directory. Thepwdcommand shows the root of the chroot
environment (/), andlsdisplays the contents of/jail, which includesbinandlib64.

Question #:59

Examine this command and output:

# cat deployment.yaml

apiVersion: apps/v1

kind: Deployment

metadata:

name: nginx-deployment

spec:

selector:

matchLabels:

app: nginx

replicas: 2

template:

metadata:

labels:

app: nginx

spec:

containers:

- name: nginx

image: nginx:1.14.2

ports:

- containerPort: 80

Only exact questions will Pass You in Exam 61 of 63


Exact Questions Oracle - 1z0-106

Now examine this command which executes successfully:

$ kubectl create -f deployment.yaml

Which two statements are true?

A. The command creates and guarantees the availability of a specified number of identical pods.

B. The command creates a deployment named nginx.

C. The command creates a pod named nginx.

D. The command specifies port 80 as the port that the container exposes.

E. The command specifies nginx image version 1.14.2 and will fail if the image version is not available.

Answer: A D

Explanation
Option A (Correct):The command creates a Kubernetes Deployment, which ensures the specified
number of replicas (pods) are running at all times. The deployment will manage the creation and
maintenance of these pods to ensure availability.

Option D (Correct):The deployment configuration specifies that the container running inside the pod
exposes port 80 (containerPort: 80).

Option B (Incorrect):The deployment is namednginx-deployment, notnginx.

Option C (Incorrect):The command creates a Deployment object that manages multiple pods; it does
not directly create a single pod namednginx.

Option E (Incorrect):The command specifies the nginx image version1.14.2, but it will not fail
immediately if the image version is not available. Kubernetes will attempt to pull the image, and the
failure will happen during that step if the image does not exist.

Oracle Linux Reference:Refer to:

Kubernetes Documentation on Deployments

kubectl createcommand usage details.

Question #:60

Examine these Kubernetes components:

Only exact questions will Pass You in Exam 62 of 63


Exact Questions Oracle - 1z0-106

Which option correctly matches the components with their description?

A. 1-d, 2-f, 3-e, 4-a, 5-c, 6-b

B. 1-b, 2-a, 3-e, 4-c, 5-f, 6-d

C. 1-a, 2-d, 3-b, 4-c, 5-e, 6-f

D. 1-c, 2-f, 3-d, 4-b, 5-e, 6-a

E. 1-d, 2-f, 3-c, 4-e, 5-a, 6-b

Answer: E

Explanation
Explanation of Answer E:This option correctly matches the Kubernetes components with their descriptions:

Kubectl- d. Command-line interface used to control Kubernetes

Etcd- f. Stores configuration data relating to the cluster

Kubelet- c. Agent that allows nodes to communicate with the API

Kube-proxy- e. Performs networking functions and routes network traffic

Kube-apiserver- a. Processes and validates requests and performs operations

Kube-scheduler- b. Determines where containers should run based on resource availability

Only exact questions will Pass You in Exam 63 of 63


About exact2pass.com
exact2pass.com was founded in 2007. We provide latest & high quality IT / Business Certification Training Exam
Questions, Study Guides, Practice Tests.

We help you pass any IT / Business Certification Exams with 100% Pass Guaranteed or Full Refund. Especially
Cisco, CompTIA, Citrix, EMC, HP, Oracle, VMware, Juniper, Check Point, LPI, Nortel, EXIN and so on.

View list of all certification exams: All vendors

We prepare state-of-the art practice tests for certification exams. You can reach us at any of the email addresses
listed below.

Sales: sales@exact2pass.com
Feedback: feedback@exact2pass.com
Support: support@exact2pass.com

Any problems about IT certification or our products, You can write us back and we will get back to you within 24
hours.

You might also like