A guy wants to get certified as a Suse administrator!
![]() |
![]() |
![]() |
Título del Test:![]() A guy wants to get certified as a Suse administrator! Descripción: SuSe Admin 2024 |




Comentarios |
---|
NO HAY REGISTROS |
Correct Which statement about the various SUSE Linux operating system products is true? (Select one). SLED and Tumbleweed are different versions of the openSUSE operating system. Both SLED and openSUSE support 32 and 64 bit processors. SLES and SLED share a Common Code Base. SLES with the Workstation Extensions installed, has the same exact functionality as the SLED operating system. SLES with the Workstation Extensions installed, has the same exact functionality as the SLED operating system. Which statements about the SUSE Software Subscription model are true? (Select all that apply). Product updates are only available to customers with a current SLE subscription. Product updates are only available to customers having an account with the SUSE Customer Center and a SLE Product Key. You must use YUM Repositories to mirror updates from the SUSE Customer Center. Subscriptions are based on the number of virtual servers. Subscriptions are based on the number of physical servers. How is the graphical version of YaST started from the command line? (Select one). yast. yast2. The graphical version of YaST cannot be started from the command line. YaST2. yast-gui. If the there is a device /dev/sdb what is the device name for the first partition on the device? Give the full path and filename. (Select one). /dev/sdb. /dev/disk/sdb1. /sys/sdb1. /sys/sdb. /mnt/sdb5. /dev/sdb1. Under which directory will SLE 15 automatically mount removable media? (Select one). /mnt/media. /tmp/local. /run/usb. /tmp/media. /run/media. /mnt/usb. What type of file does the /etc folder contain? (Select one). Network configuration files. Read-only files. Extended Transmission Control files. Files that are modified while the system is running. Configuration files for services and systems. Which shell command will display a detailed listing of the fete directory? (Select one). dir -d /etc. list /etc. ls -la /etc. ls -/etc. dir -d -/etc. Which statement describes what the following bash command does: "command1 I command2" (Select one). This construct states that command2 will execute only if command1 returns an error. The output from command1 is used as input for command2. The output from command2 is taken as the input for command1. This construct states that if command1 generates any errors that command2 will process those error messages. This statement will always generate an error because it does not employ valid syntax. What does the following command allow you to do? alias c="clear" (Select one). You can type clear to run the c command. It allows you to rename the clear command to just c and then deletes the clear command. It launches a second Login Shell and allows you to rename the clear command to just c. You can type c to run the clear command. Nothing. since there is not a command named alias. Which commands could you use to determine the proper syntax for the cp command? (Select all that apply). man cp. help cp. cp --help. doc -cp. display cp. info --cp help. info cp. I Which keystroke can be used to auto-complete a command? (Select one). Tab. Shift. Shift + Alt +T. Ctrl + ZZ. Tab + Shift. Alt + Tab. Which VIM command will save the current file without existing?. w. w!. w-no-exit. q!. wq!. What are the two main modes of VIM? (Select two). Host. Command Mode. Admin Mode. Insert Mode. View Mode. Control Mode. Which command reads the ssh host key from a remote system? (select one). ssh-keygen. ssh-getkey. ssh-keyscan. scp-keygen. keyscan-ssh. Name two utilities that can be used for remotely administering SUSE Linux Enterprise Server? (Select two). Putty. ssh. root. RDP. VNC. Which file contains configuration information for the GRUB2 menu items? (Select one). /etc/grub2/menu.cfg. /boot/grub2/menu.cfg. /boot/grub2/menu.lst. /etc/boot/grub.cfg. /boot/grub2/grub.cfg. What does systemd use to encode information about things such a service , socket, mountpoint, or device? (Select one). Unit configuration file. An init script. A target unit. A systemd config script. Files located under /etc/systemd/config. During the boot process, what runs after the root file system has been located and successfully mounted? (Select one). The udev process. The initterm script. The initd daemon. The mount_all_script. The systemd daemon. It appears to you that process 18734 is hung. Which command will kill just that process? (Select all that apply). kill -9 18734. killall 18734. kill -SIGHUP 18734. kill -SIGKILL 18734. killall -15 18734. psdel 18734. Which file is used to define system-level cron jobs? (Select one). /etc/cron.sys. /etc/cron/config. /var/opt/cron/config. /etc/crontab. /var/opt/cron/cron.sys. Which commands can be used to view the process? (Select all that apply). ps. kill. process. showpid. pstree. Which statements regarding the purpose of ACLs are true? (Select all that apply). ACLs allow for the assignment of filesystem permissions to users that are not the owner or a member of the owning group. ACLs replace the traditional permissions of the Linux filesystem. ACLs add six additional permissions to the traditional permissions of the Linux filesystem. ACLs can only be applied to files. ACLs provide an extension to the traditional permissions of the Linux filesystem. There are three classes of ACLs: minimal, normal and extended. Which commands can display the groups of which a user is a member? (Select all that apply). id. whoami. finger. groups. whoami-g. Which statements regarding using PolKit for privilege authorization are true? (Select all that apply). PolKit elevates permissions for all commands run within the user’s terminal session. PolKit leverages sudo to grant root permissions for the length of the user’s session. With PolKit, users log in using their regular user account. PolKit grants root permissions to a given action within an application. PolKit grants root permissions to an entire session. What are the three permissions available on posix file systems? (Select all that apply). All. Change. Edit. Execute. Read. Sharable. Write. What is the zypper command and options that will install the apache2 package? (Select one). zypper in apache2. zypper add apache2. zypper –in –name apache2. zypper mr apache2. zypper ar -f apache2. What are the basic components of RPM? (Select all that apply). RPM Database. RPM Package Manager. RPM Editor. RPM Compiler. RPM Packager. What is the output of the following command?: rpm –qa (Select one). Queries the RPM database and lists all available packages. Queries the RPM database and lists all locked packages. Queries the source repositories lists all available packages. Queries the RPM database and lists all installed packages. firewalld maintains two separate configurations. What are they named? (Select all that apply). Runtime. Temporary. Fixed. Permanent. Production. Static. Testing. What is the wicked command and options to bring up the interface wlan0? (Select one). wkd up wlan0. wicked up wlan0. wkd ifup wlan0. wicked ifup wlan0. wicked int=wlan0 action=up. What does the file /etc/hosts provide? (Select one). List of routes to take to remote hosts. List of domains to search. Local name resolution. A list of DNS servers to use. The hostname of this system. Which command launches a GUI used for interacting with firewalld? (Select one). SuSEFirewall2-yast. firewall-config. firewall-gui. SuSEFirewall2-config. yast-firewalld. firewalld-gui. Which command is used to manage software RAID? (Select one). raidadm. mdmgr. fdisk --raid. yast swraid. mdadm. Which filesystem is the default for the / filesystem when SLES is installed? (Select one). Btrfs. Ext3. Ext4. nfs. XFS. What does the following command do?: "mount /dev/sdb2 /source" (Select one). Mounts /source on /dev/sdb2. Shows the details of the mount point /source. Mounts the filesystem on /dev/sdb2 on the directory /source. Displays the entry in /etc/fstab for /dev/sdb2. Mounts the /source directory on a remote server to /dev/sdb2 on the local server. Which items listed below are new to the time synchronization capability in SLE 15? (Select all that apply). ntpd4-1-2c. timesyncc. chronyc. ntpd4-1-2d. timesyncd. chronyd. Which log file is a good place to start when starting the troubleshooting process? (Select one). /var/lastlog. /var/boot.log. /var/log/messages. /var/supportconfig. /var/faillog. Which statement is a correct definition of supportconfig in SLE? (Select one). supportconfig is the name of a form used by customers placing a support call with SUSE. supportconfig is a program that parses the system log looking for warning and error messages. supportconfig is the name of a paid support service from SUSE. supportconfig is the name of command line interface to the supportconfigd deamon. supportconfig is a bash script that gathers up system information into multiple text files. firewalld maintains two separate configurations. What are they named? (Select all that apply). Runtime. Temporary. Fixed. Permanent. Production. Compile From Source Code • Linux Source Code Build Tools • Works well for a single box • Many Linux open source projects utilize • Common GNU build tools. Two common GNU build tools - Automake - Autoconf. Developers use Automake and Autoconf with - makefile.am - configure.in. To create the automatic configuration file - configure. Location of the unit files: /etc/systemd/system. /etc/init.d. /var/log/. Do you need to re-install grub after running mkinitrd?. Yes - grub2-mkconfig is considered re-installation. No, mkinitrd updates the initramfs image, not the bootloader. It depends on the specific changes made with mkinitrd. How to bring up the second network interface: ifconfig eth2 up. wicked ifup eth2. nmcli connection up eth2. Location of the grub2 config file: /boot/grub/grub.conf. /boot/grub2/grub.cfg. /etc/grub2/grub.cfg. Command to create a logical volume: fdisk /dev/sdb. lvcreate. mount /dev/sdb1 /mnt/data. How to reboot into a new target only once: systemctl set-default <target>.target. init <target>. grub2-once <target>.target. What is the name of the first logical partition on the second drive: /dev/sdc1. /dev/sdb1. /dev/sdb5. How to switch to a multi-user target: init 3. systemctl isolate multi-user.target. login -f user. Which files are rsyslogd compliant configuration files? (Choose all that apply). /etc/rsyslogd.conf. /etc/syslog.conf. /etc/rsyslog.d/*.conf. /var/log/messages. /etc/rsyslog.conf. If you SSH to a host named "hostname" using ssh hostname, which username will be logged in?. The username you typed after the ssh command. The currently logged-in user on the remote host. The user with the highest privileges on the remote host. How to view the remote host's public SSH keys: cat /etc/ssh/ssh_host_rsa.pub. ssh-keyscan hostname. ssh-copy-id hostname. Where are SSH public keys of known hosts stored?. /etc/ssh/. ~/.ssh/authorized_keys. ~/.ssh/known_hosts. Can a non-privileged user increase the process priority?. Yes, with the nice command. No. With the sudo renice command. What does the command "renice 5 5678" do?. Terminates process with PID 5678. Changes the priority of process with PID 5678 to 5 (higher priority). Sets the nice value of process 5678 to 5. Which ps flags show processor utilization?. ps -e. ps aux. ps. Which of the following setfacl options removes all extended ACLs from a file?. setfacl -m u:tux:rw file (Adds read-write permissions for user 'tux'). setfacl -d file (Sets default ACL). setfacl -x file (Removes all extended ACLs). getfacl file (Lists current ACL permissions). Question on Sticky Bit, SUID, and SGID: A directory has the sticky bit set. What determines if a user, who is not the owner or root, can delete a file within that directory?. The user's group ownership of the file. The execute permission (x) for others on the file. The user's default group membership. The SGID bit set on the file itself. How are the scripts in the /etc/grub.d directory used? (Choose two). The contents of these scripts are incorporated into the /boot/grub2/grub.cfg file. This is the core function of the scripts in /etc/grub.d They provide instructions for grub2-mkconfig to build the final grub configuration file. These scripts are taken input by the grub2-mkconfig command. (grub2-mkconfig reads the scripts in /etc/grub.d and parses them to generate the /boot/grub2/grub.cfg file, which defines the boot menu entries). These scripts are taken as input by the grub2-init command. (grub2-init is not a commonly used command.) Grub uses grub2-mkconfig to generate the configuration file. The contents of these scripts are incorporated into the /etc/grub2.d/configfile. There's no standard config file within /etc/grub2.d. grub2-mkconfig reads scripts from this directory. These scripts are taken as input by the mkinitrd command. (mkinitrd deals with creating the initial ramdisk image, not the bootloader configuration). Which file contains the ntp configuration?. /etc/ntp.conf is the standard location for the NTP (Network Time Protocol) configuration file on most Unix-based systems, including Linux distributions. This file contains settings for the NTP daemon (typically ntpd), specifying pool servers to synchronize time with and other configuration options. /etc/sysconfig/ntp.conf might be used by some older Linux distributions, but /etc/ntp.conf is the more common and recommended location. /srv/ntp/ntp.conf is not a typical location for the NTP configuration file. While some specific software packages might use this location, it's not the standard. /etc/ntp.cfg is also not a standard location. The filename extension .conf is generally used for configuration files on Unix-based systems. What is the default port a VNC Client uses to connect?. DP 5801. TCP 5801. DP 5901. TCP 5901. Which directory contains the initrd file?. /boot/grub2. /loader/grub. /startup/grub2. /loader. /boot. /startup. True or false: It is not possible to open more than one file in Vim without running a second instance. False. True. When using the nice command, which of the following is the higher priority, -15 or 7?. 7. Neither since the values are not within the acceptable range. \. It depends on the system priority set by the scheduler when the task was launched. -15. Which file contains the list of DNS services SLES will contact?. /etc/resolv.conf. /etc/hostname. /etc/hosts. /etc/sysconfig/resolv.conf. /etc/sysconfig/nameservers. In the scripts subdirectory under your home directory there is a file named tstparse.sh. You want to set an Extended ACL so thejsmith user has all permissions to just this file. Which command will accomplish this?. extacl -a user=jsmith:rwx-/scripts/tstparse.sh. setacl -a user:jsmith:rwx-/scripts/tstparse.sh. setfacl -m u:jsmith:rwx-/scripts/tstparse.sh. modacl user=jsmith:rwx-/scripts/tstparse.sh. Which statements about log file rotation are true? (Choose two). The /etc/cron.daily/logrotate file controls which log files will be compressed or deleted based on some regular interval or when the log file. The /usr/sbin/logrotate program is used to create and configure settings in the /etc/logrotate.conf file. Configuration files in the /etc/logrotate.d/ directory can override settings in /etc/cron.daily/logrotate. Configuration files in the /etc/logrotate.d/ directory can override settings in /etc/logrotate.conf. The /etc/logrotate.conf file controls which log files will be compressed or deleted based on some regular interval or when the log file reaches a particular size. For programs to leverage Polkit they are split into two separate processes. Which statements below are true regarding these two Polkit processes? (Choose two). The Authentication Agent runs in the System Context. The Mechanism process runs in the User Session. The Policy Agent process runs in the User Session. The Mechanism process runs in the System Context. The Policy Agent process runs in the System Context. The D-Bus runs in the User Session. Which type of files are used for inter-process communications? (Choose two). Pipe. Redirect. Array. Character. Socket. udev. Block. Which commands can be used to terminate processes? (Choose two). psterm. ps-k. kilLall. terminate. Kill. Assume you need to make the third menu entry of your GRUB2 boot menu your default menu selection. What tasks must be completed to accomplish this? (Choose two). Run the grub2-mkconfig command. Edit the /etc/default/grub file and set GRUB_DEFAULX to 2. Edit the /boot/grub2/menu.cfg file and set MENU_DEFAULT to 3. Edit /etc/grub2/custom.cfg and set GRUB_MENU to3. Run the systemctl reload systemd command. Run the mkinitrd command. After having edited /etc/default/grub, run the following command to update the main configuration file: grub2-mkconfig -o /boot/grub2/grub.cfg The most important general options are: GRUB_DEFAULT: Sets the boot menu entry that is booted by default. Its value can be a numeric value, the complete name of a menu entry, or "saved". GRUB_DEFAULT=2 boots the third (counted from zero) boot menu entry. Which file lists each user's home directory and login shell?. /etc/sysconfig/homedir. /var/userenv. /etc/password. /etc/passwd. /var/9hare/userenv. /var/sysconf/userenv. What starts the Linux Kernel during the boot process?. BIOS or UEFI depending on the hardware architecture. systemd. The Boot Loader. The udev process. initd. You have just added a new directory to be exported via NFS. what command should you run next to make that directory available?. /etcyinit.d/nfsd -reload. /bin/nfsd-reload. systemctl restart nfsserver.service. /usr/sbin/rpc.mountd -restart. systmd -reload nfsserver.target. You want to add two new custom items to the GRUB2 boot menu. Which file should you modify to accomplish this?. /boot/grub2/menu.cfg. /boot/grub2/custom.cfg. /etc/boot/grub.cfg. /etc/default/grub. /etc/grub.d/custom.cfg. What command would be used to add new physical volumes to an existing volume group?. vgextend. pvextend. pvmodify. vgsadd. pvadd. vgmodify. What does the (x) permission on a directory mean?. Nothing - the execute permission cannot be assigned to a directory. The exclude permission on a directory means that the directory will not be displayed by the Is. The execute permission on a directory means you can use the cd command to change into the directory. The exclude permission on a directory means that the files in the directory are hidden. The examine permission on a directory means that you can see the directory's contents. The export permission on a directory means that directory can be mounted by a remote server. Which of the following configuration files have a format that is compatible with the system logging facility in SUSE Linux Enterprise? (Choose two). /etc/rsyslog.conf. /etc/syslog-ng. /etc/syslog.conf. /var/log/syslog-ng.conf. /var/log/kernel-log expand_moreedit. Which items listed below are new to the time synchronization capability in SLE 15? (Select all that apply). ntpd4-1-2c. timesyncc. chronyc. ntpd4-1-2d. timesyncd. chronyd. |