Which two options prevent unauthorized access to the named service from the rndc utility on Oracle Linux?
Arunning rndc-confgen –a to generate a key that can be used by both the named service and the rndc utility
Brunning rndc-confgen –a to generate a key that can be used only by the named service
Crunning rndc –k /etc/rndc.key to generate a key to be used only by the rndc utility
Dthe presence of /etc/named.conf with the line include "/etc/rndc.key"; to allow the named service to check for a matching key from the rndc utility
After creating empty mount point /xfs1, you execute the command:
mkfs t xfs L /xfs1 l logdev=/dev/sdd1 /dev/sdh1
Which two statements are true about the effects of executing the mkfs command?
AIt fails if there is an existing XFS file system on /dev/sdh1.
BIt fails if there is an existing XFS log on /dev/sdd1.
CIt fails if there is an existing XFS file system on /dev/sdd1.
DIt fails because there is no size specified for the XFS log.
EThe xfs1 file system is mounted automatically during system startup.
FIt creates and mounts the /xfs1 file system.
Which two statements are true about recursive nameservers that are supported by Oracle Linux?
AThey may be authoritative.
BThey may forward requests to authoritative name servers on some occasions.
CThey may be primary nameservers.
DThey cache replies from previous name resolution requests.
EThey may be secondary nameservers.
Examine the contents of /etc/mail/access:
This system is to be used as an MTA or mail gateway for the local LAN network address 192.168.1.0/24.
Which two actions allow this mail host to route email for the network?
ARun sendmail again; and the updated file can be accessed automatically.
B
C
D
ERebuild the access database file after the source files have been modified. Restarting the sendmail service automatically rebuilds the maps.
Question 6
Security and Compliance
0
Question 7
OCI Pricing, Support and Operations
Question 8
Core OCI Services
Question 9
Core OCI Services
Question 10
Cloud Concepts
Question 11
Cloud Concepts
Question 12
OCI Pricing, Support and Operations
Question 13
Getting Started with OCI
Question 14
Security and Compliance
Question 15
Security and Compliance
Question 16
Core OCI Services
Question 17
Getting Started with OCI
Question 18
Core OCI Services
Question 19
OCI Pricing, Support and Operations
Question 20
Security and Compliance
Question 21
Cloud Concepts
Question 22
Getting Started with OCI
Question 23
Security and Compliance
Question 24
Core OCI Services
Question 25
Security and Compliance
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ad
Want a break from the ads?
Become a Supporter and enjoy a completely ad-free experience, plus unlock Learn Mode, Exam Mode, AstroTutor AI, and more.
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
What is function of the System Security Service Daemon (SSSD)?
AIt permits single-user accounts by maintaining credentials for back-end systems on behalf of local users.
BIt enables fingerprint reader support for Kerberos clients.
CIt enables Smart Card Authentication for Kerberos clients.
DIt permits Kerberos authentication to be done offline by caching user identities.
While copying a file to the /users file system, which is located on /dev/sdd1, you receive an error:
$ cp /etc/oratab /users/oracle
cp: cannot create regular file /users/oracle/oratab: Disk quota exceeded
You examine your assigned quota as shown:
$ quota g
Disk quotas for user oracle (uid 500):
Which option represents the reason for receiving the Disk quota exceeded error?
AThe oracle user has reached its block quota.
BThe oracle user exceeded its file quota five days ago.
CThe oracle user has reached a group quota limit.
DThe /users file system is full.
EThe oracle user exceeded its block quota six days ago.
Which three statements are true about accessing Windows shares from Linux with SAMBA on Oracle Linux?
AThe findsmb utility queries a file to find SAMBA servers.
BThe username required to access the SAMBA shares on Windows may be specified in the mount command.
CFTP may be used to access SAMBA shares on Windows.
DThe password required to access SAMBA shares on Windows may be specified in the mount command.
EThe smbtree utility queries a file to find SAMBA servers.
FThe smbclient utility uses a lowercase version of the environment variable USER or LOGNAME if the username is not provided on the command line.
Which two statements are true about container template scripts?
AThey must be Bourne Shell scripts.
BTheir name must start with 1xc-.
CThey must support the --arch option.
DThey must not be interactive.
EThey must install a Linux distribution.
For which domain or domains does the default cache-only nameserver have a list of authoritative servers in the /var/named/named. ca file?
Athe domain to which the cache only nameserver belongs
Bthe root domain
Cthe domains to which the local DHCP servers belong
Dthe domains to which the local DNS servers belong
Examine the udevadm command:
udevadm info --query=all --name=/dev/sdb
What does this command display?
Athe device tree, and all properties maintained in sysfs for all parent devices in the device tree for the /dev/sdb disk device
Ball properties maintained in sysfs for the /dev/sdb kernel device, excluding parent devices
Call properties maintained in devfs for the /dev/sdb kernel device, excluding parent devices
Dthe device tree, and all properties maintained in devfs for the /dev/sdb device, including properties of all parent devices in the device tree for the /dev/sdb
Which two statements are true about the configuration of kdump for capturing a dump image after a kernel crash?
Akdump uses kexec to reboot the failed kernel and then captures a dump image.
BThe crashkernel boot parameter must be added to the kernel line in the /boot/grub.conf file to enable kdump.
CThe memory used for crashkernel is always at the same physical address.
Dkdump requires no parameters because it is enabled by default.
Ekdump uses kexec to boot a second kernel, which then captures a dump image.
Which three statements are true about the Kickstart installation method?
AIt always requires a Kickstart file.
BThe system must be booted manually with the ks= option.
CIt automates the installation of Oracle Linux.
DIt creates a Kickstart file.
EIt requires local access to the installation media.
FIt requires a PXE boot from the network.
Examine the sequence:
sealert l dda34207-61fd-4de2-831d-039c79270864
SELinux is preventing /usr/sbin/httpd from read access on the file /var/www/manual/new_features_2_2.html.
***** Plugin restorecon (85.9 confidence) suggests *****
If you want to fix the label.
/var/www/manual/new_features_2_2.html default label should be httpd_sys_content_t.
Then you can run restorecon.
Do -
/sbin/restorecon v /var/www/manual/new_features_2_2.html
***** Plugin catchall_boolen (7.33 confidence) suggests *****
If you want to allow httpd to read user content
Then you must tell SELinux about this by enabling the httpd_read_user_content boolean. You can read user_selinux man page for more details.
Do -
setsebool P httpd_read_user_content 1
What action must you take for fix this problem?
ARelabel the file in question by using the restorecon command.
BAllow httpd to read user content by using the setsebool command.
CAllow httpd to read home directories by using the setsebool command.
DReport a bug.
EGenerate a local policy by using the audit2allow command.
Which two statements are true about SELinux in enforcing mode?
AAccess to object is based solely on user identity and ownership.
BDiscretionary Access Control is ignored.
CMandatory Access Control is checked before Discretionary Access Control.
DDiscretionary Access Control is checked before Mandatory Access Control.
EAccess is denied unless permitted by SELinux.
FAccess is permitted unless denied by SELinux.
Which two statements are true about OCFS2 heartbeats?
AA local heartbeat is started during cluster online and stopped during cluster offline commands.
BOnly one heartbeat mode can be active at a time.
CA local heartbeat refers to disk heartbeating on all shared devices.
DA local heartbeat is strongly recommended for clusters having a large number of mounted file systems.
EA list of heartbeat devices is stored in the /etc/sysctl.conf file.
FHeartbeat mode can be configured at the file system level.
Examine the udevadm command:
udevadm info --attribute-walk --name =/dev/sdb
Which two statements are true about this command/
AIt displays the device tree, and all attributes maintained in devfs for all parent devices in the device tree for the /dev/sdb disk device.
BThe attributes listed by this command can be used in udev device naming rules.
CIt displays the device naming rules that were used to name the device as /dev/sdb.
DIt displays the device tree, and all attributes maintained in sysfs for all parent devices in the device tree for the /dev/sdb disk device.
EIt displays all attributes maintained in sysfs for the /dev/sdb kernel device, excluding parent devices.
FIt displays all attributes maintained in devfs for the /dev/sdb kernel device, excluding parent devices.
Which two parameters are valid networking modes for a Linux container (LXC)?
Aveth
Bbridged
Cnat
Dmacvlan
Erouted
Which three statements are true about support for the XFS file system in Oracle Linux?
AIt is a journaling, extend-based file system.
BIt is not supported for the /boot file system.
CIt is supported for the root (/) file system.
DIt supports user and group disk quotas.
EIt is supported only when created on Logical Volumes.
FIt has a built-in volume manager.
Identify the two commands that can be used to set SELinux file labels back to their default values.
Achcon
Bfixfiles
Csemanage fcontext
Drestorecon
Ematchpathcon
Fopdate_selinux
Examine the dtrace command.
dtrace q n syscall:::
Which two statements are true?
AThe command produces minimal output, but this includes the CPU on which the probe fires, the probe ID, and the probe name.
BThe dtrace command matches with all probes in the syscall provider.
CThe -q option is invalid when not used with an explicit action, as in this case.
DThe probe name specification is incorrect and does not match with any probes. This produces an "invalid probe specifier syscall:::" error message.
EThe command produces no output.
Which statement describes the default network set up by an Oracle template script?
AThe container is isolated from the network.
BA veth device is added to libvirt's virbr0 bridge.
CA macvlan device enables DHCP from the host's network.
DA private interface is routed to Open vSwitch.
Consider the following cgroup configuration in /etc/cgconfig.conf:
ATwo cgroup hierarchies and three subsystems are defined; cgroup A1 and A2 are located in the same cgroup hierarchy.
BTwo cgroup hierarchies and three subsystems are defined; cgroup A1 and A2 are located in different cgroup hierarchies.
CThree cgroup hierarchies and three subsystems are defined; cgroup A1 and A2 are located in the same cgroup hierarchy.
DThree cgroup hierarchies and three subsystems are defined; cgroup A1 and A2 are located in different cgroup hierarchies.
EAny user who is a member of the users group is allowed to move his or her own tasks from the root cgroup to cgroup A1 or cgroup A2.
FAny user who is a member of the users group is allowed to execute tasks in cgroups A1 and A2 and change the cpu.shares parameter in cgroups A1 and A2.
You want to create a new LUN, LUN ID =1, on a new target, target ID = 2.
Inspect the current state of targets and LUNs in the output from tgt-admin s. The output is filtered to show only target and LUN associations.
[root@EDFAR9P0 init.d]# tgt-admin s | egrep i target|lun
Target 1: iqn.2013-03.com.example.mypc:1
LUN information:
LUN: 0 -
LUN: 1 -
LUN: 2 -
LUN: 3 -
You want to add a new LUN to a new target by using the /iSCSIsharedDisk/physDisk4.img disk image file.
Which two options would you use to do this?