Oracle Linux 5 and 6 System Administration
Question No: 21
Consider the output shown:
#rpm -i sendmail-cf-8.14.4-8.e16.noarch.rpm Error: Failed dependencies:
Sendmail = 7.14.4-8.e16 is needed by sendmail-cf-8.e16.noarch
# rpm -i sendmail-8.14.4-8.e16.x86_64.rpm
# rpm -i sendmail-cf-8.14.4-8.e16.noarch.rpm
# rpm -q sendmail sendmail-cf Sendmail-8.14.4-8.e16.x86_64 Sendmail-cf-8.e16_64
# rpm -e sendmail
Which statement is true about the execution of the rpm -e sendmail command?
It erases the sendmail package without errors.
It fails with an error because the package version is not supplied on the command line.
It fails with an error because the sendmail-cf package depends on the sendmail package.
It erases the sendmail package and raises an error because the sendmail package depends on the sendmail package.
It erases both the sendmail and sendmail-cf packages because the sendmail-cf package depends on the sendmail package.
Question No: 22
Examine the output of a bonded interface configuration from which one network cable has been unplugged:
# cat /proc.net/bonding/bond0
Ethernet Channel Bonding Driver: v3.6.0 (September 26, 2009) Bonding Mode: fault-tolerance (active-backup)
Primary Slave: None Currently Active Slave: eth2 MII Status: up
MII poling interval (ms): 100
Up Delay (ms): 0 Down Delay (ms): 0 Slave Interface: eth1 MII status: down Link Failure Count: 1
Permanent HW addr: 00:0c:29:7b:3c:
Slave Queue ID: 0 Slave Interface: eth2 MII Status: up
Link Failure Count: 0
Permanent HW addr: 00:0c:29:7b:3s:7b
WA.hTichhessttaatteums eonf tthisetrsulaevwe hinetneryfaocuepeluthg1inchthaengeeths1toneutpwoarnkdciasbplero?moted to the active slave and eth2 becomes the backup slave.
The status of the slave interface eth1 changes to up and becomes a second active slave.
The status of the slave interface eth1 changes to up but must be manually assigned the active or backup slave role.
The status of the slave interface eth1 changes to up and becomes the backup slave.
Question No: 23
Examine the routing table:
Which three statements are true concerning the routing of IP packets?
Traffic to 192.168.180.180 is routed via eth1.
Traffic to 192.168.180.240 is routed via eth1.
Traffic to 192.168.0.42 is routed via eth2.
Traffic to 192.168.42.42 is routed via eth2.
Traffic to 192.168.42.42 is routed via eth0.
Traffic to 192.168.180.180 is routed via eth0.
Question No: 24
Your Oracle Linux server has a network interface eth0 but the ifcfg-eth0 file is missing from the /etc/sysconfig/network-scripts directly.
To set the IP address for the interface, you run this command as root: [root@station1]# ifconfig eth0 192.168.0.1 up
What is the effect of the command?
The IP address 192.168.0.1 is not assigned to eth0 because the netmask is not specified.
The IP address 192.168.0.1 is assigned to eth0, but the interface is not activated until the network service is reloaded.
The IP address 192.168.0.1 is assigned to eth0, but the interface is not activated until the network service is restarted.
The IP address 192.168.0.1 is assigned to echo with the default netmask for that address, and the interface is activated immediately.
Question No: 25
Which two Statements are true concerning the configuration and use of cron and anacron?
Anacron jobs are used to make sure cron jobs run if the system had been down when they were meant to run.
All crontabs are held in the /etc/cron.d directory.
Cron jobs may run as frequently as once a minute.
Anacron jobs may run as frequently as once a minute.
The crond daemon looks for jobs only in /etc/crontab.
Question No: 26
Which four statements correctly describe the contents of the sysfs filesystem?
It contains kernel parameter files.
It contains metadata on all block devices.
It contains metadata on firmware.
It contains metadata on all loaded modules in the kernel.
It contains metadata on device classes.
It contains metadata on system uptime.
Reference: https://www.kernel.org/pub/linux/kernel/people/mochel/doc/papers/ols- 2005/mochel.pdf
Question No: 27
Examine the commands and output when trying to start OSWatcher Black Box.
Identify two recommended solutions to this problem.
Edit the startOSWbb.sh script to specify your proffered shell, ensuring that it is started in POSIX compliance mode.
Install ksh on the system, if not currently installed.
Create a Symbolic link /usr/bin/ksh that points to /bin/bash.
Ensure that ksh is accessible with the path /usr/bin/ksh. Create a symbolic link if necessary.
Create a shell alias called /usr/bin/ksh that expands to /bin/bash.
Question No: 28
You must remove a Physical Volume (PV) from a Volume Group (VG) containing one Logical Volume (LV) without compromising data availability.
What must you do before using the vgreduce command, to remove the PV?
Move allocated physical Extents (PE) from /dev/sdd to other physical volumes using the pvmove command.
Remove the /dev/sdd PV using the pvremove command.
Resize the /dev/sdd PV to zero using the pvresize command.
Move allocated physical Extents (PE) from /dev/sdd to other physical volumes by using the 1vvonvert – – replace command.
Explanation: https://access.redhat.com/documentation/en- US/Red_Hat_Enterprise_Linux/5/html/Logical_Volume_Manager_Administration/VG_remo ve_PV.html
Question No: 29
Match the following symbolic notations of the file permissions with their numeric values:
->– – – S – – – – – – a) 5000
->– – – – – – S – – – b) 4100
->– – – – – – – – – – tc) 7101
->– – – S – – – – – Td) 1001
->– – – S – – S – – te) 7040
->S – – S r – – – Tf) 2010
A. 1-d, 2-f, 3-b, 4-e, 5-c, 6-a
B. 1-b, 2-f, 3-d, 4-a, 5-c, 6-e
C. 1-f, 2-a, 3-c, 4-b, 5-e, 6-d
D. 1-b, 2-d, 3-f, 4-a, 5-e, 6-c
Question No: 30
Which three statements are true about the configuration of OpenLdap secure encrypted connections?
TLS and ldaps should not both be selected.
To enable idaps, you must download the Certifying Authority (CA) Certificate.
To enable TLS, you must download the Certifying Authority (CA) Certificate.
The certificate is needed to verify ownership of the secret key used for encryption.
There is a command-line alternative to the Authentication Configuration Tool to enable
the encrypted LDAP communication.
Explanation: Transport Layer Security (TLS) can be used to provide data integrity and confidentiality protection. OpenLDAP supports negotiation of TLS (SSL) via both StartTLS and ldaps://.
|Lowest Price Guarantee||Yes||No||No|
|Free VCE Simulator||Yes||No||No|