option
Cuestiones
ayuda
daypo
buscar.php

Oracle Linux 8 System Administrator

COMENTARIOS ESTADÍSTICAS RÉCORDS
REALIZAR TEST
Título del Test:
Oracle Linux 8 System Administrator

Descripción:
Oracle Linux 8 System Administrator

Fecha de Creación: 2024/10/12

Categoría: Informática

Número Preguntas: 60

Valoración:(0)
COMPARTE EL TEST
Nuevo ComentarioNuevo Comentario
Comentarios
NO HAY REGISTROS
Temario:

Which two statements are true about the GRUB 2 bootloader?. Its configuration can be changed by editing /etc/default/grub2 and executing grub2-mkconfig to regenerate grub2.cfg. It can load many free operating systems directly and chain-load proprietary operating systems. Its configuration file is /boot/grub2/grub2.conf on BIOS-based systems. It understands file systems and kernel executable formats, allowing the loading of operating systems without recording the on-disk physical location of the kernel.

Which mdadm command creates a RAID-1 device consisting of two block volumes and one spare device?. mdadm “create /dev/md0 “level=5 “raid-devices=2 /dev/xvdd1 /dev/xvdd2 “spare-devices=1/dev/xvdd3. mdadm “create /dev/md0 “level=1 “raid-devices=2 /dev/xvdd1 /dev/xvdd2. mdadm “create /dev/md0 “level=1 “raid-devices=2 /dev/xvdd1 /dev/xvdd2 “spare-devices=1/dev/xvdd3. mdadm “create /dev/md0 “level=0 “raid-devices=2 /dev/xvdd1 /dev/xvdd2 “spare-devices=1/dev/xvdd3.

Which two statements are true about naming network interfaces?. Consistent device naming is enabled by default. The udev device manager generates device names based on a series of schemes. The udev device manager uses a random number if all other schemes fail. Device names cannot be manually configured. Device names incorporate the physical location and hot plug slot index number.

Which two default user account settings are contained in /etc/login.defs?. Decryption method used to decrypt passwords. User hashed passwords. Group hashed passwords. Password aging controls. Encryption method used to encrypt passwords.

Examine these commands, which execute successfully: # firewall-cmd --zone=public --add-service=cockpit --permanent # firewall-cmd --zone=public --add-port=1313/tcp --permanent # firewall-cmd --reload Which are true upon execution?. The Cockpit service is added only to the public zone. Egress traffic is allowed for the Cockpit service only when using port 1313. Runtime firewall configuration is not lost when the firewalld process is restarted or the system is rebooted. Port 1313 blocks all traffic for the public zone except for ingress traffic to the Cockpit service. The custom Cockpit service configuration file is updated in /usr/lib/firewalld/services.

Examine this command and output: # mdadm --detail /dev/md0 /dev/md0: Version: 1.2 Creation Time: Tue Oct 27 16:53:38 2020 Raid Level: raid5 Array Size: 207872 (203.03 MiB 212.86 MB) Used Dev Size: 103936 (101.52 MiB 106.43 MB) Raid Devices: 3 Total Devices: 3 Persistence : Superblock is persistent Update Time: Tue Oct 27 16:53:38 2020 State: clean, degraded, recovering Active Devices: 2 Working Devices: 3 Failed Devices: 0 Spare Devices: 1 Layout: left-symmetric Chunk Size: 512K Rebuild Status: 60% complete Name: ol8.example.com:0 (local to host ol8.example.com) UUID: 70f8bd2f:0505d92d:750a781e:c224508d Events: 66 Number Major Minor RaidDevice State 0 8 49 0 active sync /dev/sdd1 1 8 65 1 active sync /dev/sde1 3 8 81 2 spare rebuilding /dev/sdf1 Which two are true?. A RAID device failed and has returned to normal operating status. The RAID set read and write performance is currently sub-optimal. A new RAID device was just added to replace a failed one. An extra device was added to this RAID set to increase its size. Only write performance is currently sub-optimal on this RAID set.

Which two statements are true about the proc and sys file systems?. proc contains information about memory and CPUs. sys contains a list of running processes. sys contains information about memory and CPUs. proc contains a list of network drivers. sys contains a list of mounted devices.

Examine the contents of the /etc/exports file on an NFS server: /status *(rw,async) /usr/shared/tools *(all-squash,anonuid=501,anongid=501,ro) /projects/big *(ro) pteam(rw) The NFS server exports /usr/shared/tools to NFS clients. Which statement is true?. All clients except those with a local 501 user can mount /usr/shared/tools read-only. All clients can mount /usr/shared/tools read-only and NFS explicitly maps all requests to the UID and GID of the privileged local 501 user. All clients can mount /usr/shared/tools read-only and NFS explicitly maps all requests to the UID and GID of the unprivileged local 501 user. All clients can mount /usr/shared/tools read-only and all-squash overrides explicit mapping of the UID and GID defined by anonuid and anongid. All clients can mount /usr/shared/tools read-only and NFS ignores the directives defined by the anonuid and anongid options.

You must add an additional swap device and you add this entry to /etc/fstab: /.swapfile none swap defaults 0 0 Examine these commands and output: # dd if=/dev/zero of=/.swapfile bs=1024 count=1048576 1048576+0 records in 1048576+0 records out 1073741824 bytes (1.1 GB, 1.0 GiB) copied, 4.32499 s, 248 MB/s # swapon -a swapon: /.swapfile: insecure permissions 0644, 0600 suggested. swapon: /.swapfile: read swap header failed Which two actions must you perform to add this swap device?. Initialize the .swapfile file by using the mkswap command. Execute swapon -all. Change defaults to user in the /etc/fstab entry. Assign a label to the .swapfile file by using the swaplabel command. Execute swapon -L swapfile /.swapfile after adding a label. Use a physical disk partition type of 82 (Linux swap).

Examine this output: Last metadata expiration check: 4:30:21 ago on Mon 26 Oct 2020 03:09:52 PM GMT Installed Packages Name : gzip Version : 1.9 Release : 9.el8 Architecture : x86_64 Size : 412 k Source : gzip-1.9-9.el8.src.rpm Repository : @System From repo : anaconda Summary : The GNU data compression program URL : http://www.gzip.org/ License : GPLv3+ and GFDL Description : The gzip package contains the popular GNU gzip data compression program. Gzipped files have a .gz extension. Gzip should be installed on your system, because it is a very commonly used data compression program. Which command generated it?. dnf list /usr/bin/gzip. dnf provides /usr/bin/gzip. dnf info /usr/bin/gzip. dnf search /usr/bin/gzip.

Examine this command and output: $ ftp host01.example.com Connected to host01.example.com (192.168.40.131). 220 (vsFTPd 3.0.2) Name (host01.example.com:oracle): After entering a carriage return, this error message is displayed: 530 Permission denied Login Failed ftp> Why is the oracle user denied access to the FTP server on host01.example.com?. The oracle user does not exist on host01.example.com. LOCAL_ENABLE is set to NO in /etc/vsftpd/vsftpd.conf. The oracle user is listed in /etc/vsftpd/user_list and USERLIST_ENABLE is set to NO in /etc/vsftpd/vsftpd.conf. The oracle user is listed in /etc/vsftpd/ftpusers. The oracle user is listed in /etc/vsftpd/user_list and USERLIST_ENABLE is set to YES in /etc/vsftpd/vsftpd.conf.

Examine these requirements for a host with a user oracle: Network services must run in a confined domain. The oracle user must be confined. The oracle user must be able to use Mozilla Firefox. Access to files and directories must be granted based only on SELinux contexts. The SELinux configuration must be persistent across system restarts. Users must be able to publish private HTML content. Now examine these commands and output: # sestatus SELinux status: enabled SELinuxfs mount: /sys/fs/selinux SELinux root directory: /etc/selinux Loaded policy name: targeted Current mode: permissive Mode from config file: permissive Policy MLS status: enabled Policy deny_unknown status: allowed Memory protection checking: actual (secure) Max Kernel policy version: 31 # setenforce enforcing # semanage login -a -s guest_u oracle # setsebool -P http_enable_homedirs on Which requirements are satisfied?. 1, 2, 4, 5, 6. 1, 2, 3, 4, 5, 6. 1, 2, 3, 5, 6. 1, 2, 6. 1, 2, 4, 6. 1, 2, 3, 6.

Examine this command: # cryptsetup luksOpen /dev/xvdd1 cryptfs What happens upon execution?. It creates the /dev/mapper/cryptfs device mapping file. It creates the LUKS partition on /dev/xvdd1. It creates the /dev/mapper/xvdd1 device mapping file. It creates the /dev/mapper/xvdd1/cryptfs device mapping file. It creates the /dev/mapper/xvdd1-cryptfs device mapping file.

Which two statements are true about fdisk?. It understands GPT, MBR, and HFS partition tables. fdisk -l displays disk size information for all disks. It can partition disks larger than 2 TB by using a GPT partition table. It can divide logical devices into one or more block disks called partitions. It cannot partition disks larger than 2 TB by using a GPT partition table.

Examine this command and output: # ausearch -k mkdir type=SYSCALL msg=audit(1604360199.719:44733): arch=c000003e syscall=83 success=no a0=55dec0b47400 a1=lc0 a2=0 a3=0 items=2 ppid=1354 pid=284632 auid=4294967295 uid=996 gid=996 euid=998 suid=998 fsuid=998 egid=996 sgid=996 fsgid=996 tty=(none) ses=429 comm="pkla-check-auth" exe="/usr/bin/pkla-check-authorization" subj=system_u:system_r:policykit_auth_t:s0 key="mkdir" Which command displays the syscall in text format instead of numerical format?. ausearch -a 83 -k mkdir. ausearch -I -k mkdir. ausearch -sc 83 -k mkdir. ausearch --format text -k mkdir. ausearch -r -k mkdir.

Which two statements are true about container technology?. A container application built on a bare metal system cannot run on virtual machines or cloud instances. A container application is dependent on the host operating system and kernel version. Containers package an application with the individual runtime stack. Podman, Buildah, and Skopeo are independent tools to create, run, and manage container applications across compatible Oracle Linux systems. Podman requires a running daemon to function and to enable containers to start and run without root permissions.

Which two methods of changing kernel parameters can you use to modify values for the running system?. Issuing the sysctl -w command to write values to specific files in the /proc/sys directory. Using the echo command to write values to specific files in the /proc/sys directory. Issuing the sysctl -w command to write values to specific files in the /sys directory. Using the echo command to write values to specific files in the /sys directory. Adding to or modifying parameters and values in the /etc/sysctl.conf file followed by issuing the sysctl -p command.

Which two statements are true about the Oracle Linux 8 boot process?. The bootloader loads the initramfs file into memory and extracts the vmlinuz file into a temporary file system (tmpfs). The kernel loads driver modules from vmlinuz that are required to access the root file system. The bootloader loads the initramfs file into memory and extracts the vmlinuz file into the /boot file system. The kernel loads driver modules from initramfs that are required to access the root file system. Both the vmlinuz file and the initramfs file are located in the /boot directory.

Which is true about the /etc/sysconfig directory in an Oracle Linux 8 system?. It is used to access device and device driver information. Files in this directory hierarchy contain information about running processes. Its contents depend on the packages installed on the system. Files in this directory hierarchy contain information about system hardware.

Which two statements are true about the Linux Auditing System?. Auditing rules can log administrator attempts to access user home directories. Auditing system call rules can affect system performance depending on the amount of information that is logged. Auditing modes include permissive, enforcing, and disabled. Auditing can scan for Common Vulnerabilities and Exposures (CVE) and automatically apply needed patches to a system. Auditing includes security policies, each of which includes security rules, or checks, which are checked when you run a security scan.

Examine this command: # nft add rule inet filter input tcp dport 80 drop Which two statements are true upon execution?. The rule is applied to both IPv4 and IPv6 packets. The rule updates the configuration on disk. All traffic inbound on port 80 is dropped. The rule applies to the input table. TCP packets inbound on port 80 are dropped. TCP packets outbound on port 80 are dropped.

Examine this udev device naming rule which gets processed successfully: makefile KERNEL=="hdb", DRIVER=="ide-disk", SYMLINK+="sparedisk" Which two statements are true?. Symbolic link /dev/sparedisk is created linking to /dev/hdb and with an ide-disk device driver, thus overwriting existing symbolic links. The matching device will be named /dev/sparedisk. Symbolic link /dev/sparedisk is created for a device named /dev/hdb which has an ide-disk device driver if such a device is discovered. The matching device will have the kernel device name /dev/hdb. Symbolic link /dev/sparedisk is created for a device named /dev/hdb or one that has an ide-disk device driver, whichever is discovered first.

Examine this command: # useradd -m -s /bin/bash alice Which statement is true about the account?. It is a member of the wheel group. It is assigned a shell but without a password. It is assigned a home directory and a password. It is not assigned a home directory.

Which are three of the network bonding modes supported in Oracle Linux 8?. Multicast. Round-robin. Split Horizon. 802.3ad. Poison Reverse. Active Backup. Passive Backup.

Which statement is true about slice units?. A slice unit is a concept for hierarchically managing resources in a group of processes. Processes in a slice unit are named at the same level as scopes and services. The system.slice contains all system services and user sessions. A slice unit accepts multiple names by the creation of additional symlinks to the unit file.

Which two statements are true about kernel boot parameters?. Boot parameters are defined as values for the GRUB_CMDLINE_LINUX directive in the /etc/default/grub file. Boot parameters defined as values for the GRUB_BOOT command-line interface are persistent and apply to all subsequent reboots. Each kernel version's boot parameters are stored in independent configuration files in /boot/loader/entries. Parameters passed to the kernel from the GRUB 2 menu are persistent and apply to all subsequent reboots.

Which two types of reports does iostat generate?. Storage Utilization Report. Device Utilization Report. Memory Utilization Report. Swap Utilization Report. CPU Utilization Report.

Which two statements are true about systemd system and service manager?. systemd service units expose kernel devices and can be used to implement device-based activation. systemd is the first process that starts after the system boots and is the final process left running before the system shuts down. systemd is backward-compatible with the System V init scripts that were used in earlier versions of Oracle Linux. systemd reads /etc/system to determine which services to start. The service command is used to start and stop system service units.

Examine these Kubernetes components: Which option correctly matches the components with their description?. 1-d, 2-f, 3-e, 4-a, 5-c, 6-b. 1-b, 2-a, 3-e, 4-c, 5-f, 6-d. 1-a, 2-d, 3-b, 4-c, 5-e, 6-f. 1-c, 2-f, 3-d, 4-b, 5-e, 6-a. 1-d, 2-f, 3-c, 4-e, 5-a, 6-b.

Which two statements are true about the at and batch commands?. batch schedules the execution of recurring tasks. at schedules the execution of recurring tasks. Both at and batch read from standard input, or you can specify a file and execute the commands with the -f option. batch executes a task when the system load average is greater than 0.8. at executes a one-time task to run at a specific time.

Which command produces human-readable timestamps in kernel ring buffer messages?. dmesg -t. dmesg -x. dmesg -T. dmesg -W.

Examine the access privileges on this directory: drwx------ 2 user1 test 4096 Nov 6 10:12 my_directory/ You must enable another user to read and navigate to my_directory. Which command will do this?. setfacl --default --modify user:user2:rw- my_directory. setfacl --modify user:user2:r-- my_directory. setfacl -x user:user2 my_directory. setfacl --modify user:user2:r-x my_directory. setfacl --modify group:test:r-- my_directory.

Which two directories store PAM authentication modules?. /lib64/security. /etc/pam.d. /usr/lib. /lib/security. /var/lib.

Examine this segment of /etc/rsyslog.conf: # Log all kernel messages to the console. # Logging much else clutters up the screen. #kern.* /dev/console # Log anything (except mail) of level info or higher. # Dont log private authentication messages! *.info;mail.none;authpriv.none;cron.none /var/log/messages # The authpriv file has restricted access. authpriv.* /var/log/secure # Log all the mail messages in one place. mail.* -/var/log/maillog # Log cron stuff cron.* /var/log/cron # Everybody gets emergency messages *.emerg :omusrmsg:* Now examine this log output: less Nov 9 20:32:16 server02 sudo[4570]: pam_unix(sudo:session): session opened for user opc (uid=0) Nov 9 20:32:17 server02 sudo[4570]: pam_unix(sudo:session): session closed Nov 9 20:32:24 server02 unix_chkpwd[4661]: password check failed for user Nov 9 20:32:24 server02 su[4581]: pam_unix(su:auth): authentication failed; logname= uid=1000 euid=0 tty=pts/0 ruser=opc rhost= user=root Which setting enabled the reporting of this log file output?. authpriv.* /var/log/auth. *.emerg *. *.info;mail.none;authpriv.none;cron.none /var/log/messages. #kern.* /dev/sssd/sssd.log. cron.* /var/log/cron.

Examine this content from /etc/chrony.conf: ... pool pool.ntp.org offline driftfile /var/lib/chrony/drift keyfile /etc/chrony.keys ...Which statement is true about pool.ntp.org?. chronyd polls a maximum of 3 sources from pool.ntp.org after it is enabled. chronyd does not poll pool.ntp.org until it is enabled to do so by chronyd. chronyd takes pool.ntp.org offline automatically when sending a request to the pool fails. chronyd does not poll pool.ntp.org until it is enabled to do so by chronyc.

Which two statements are true about control groups (cgroups) in Oracle Linux 8?. Oracle Linux 8 implements cgroups v2 by default. A cgroup is a collection of processes bound to a set of limits or parameters defined in the cgroups filesystem. Different controllers from cgroups version 1 and cgroups version 2 cannot be used at the same time. The cgroups filesystem allows limits to be overwritten in the lower levels of the hierarchy. Cgroups allow processes to be organized into hierarchical groups whose resource usage cannot be limited and monitored.

The ss command was invoked with options to: limit output to all listening and non-listening TCP ports display ports instead of the protocols that typically use those ports display all available internal TCP information display only connections whose source or destination port is 80 Which two results are produced by the command?. UNCONN 0 0 [::1]:323 [::]:*. tcp CLOSE-WAIT 32 0 server.example.com:44732 12.21.0.15:https. ESTAB 0 0 10.12.18.92:50384 169.254.169.254:80 cubic wscale:9,7 rto:201 rtt: 0.226/0.113 ato:40 mss:8948 pmtu:9000 rcvmss:1728 advmss:8948 cwnd:10 bytes_sent:142 bytes_acked:143 bytes_received:1728 segs_out:4 segs_in:3 data_segs_out:1 data_segs_in:1 send 3167433628bps lastsnd:11351 lastrcv: 11351 lastack:11351 pacing_rate 6334867256bps delivery_rate 504112672bps delivered:2 app_limited rcv_space:62720 rcv_ssthresh:56588 minrtt:0.142. LISTEN 0 511 *:80 *:* cubic cwnd:10. icmp6 UNCONN 0 0 *:58 *:*.

Which two statements are true about removing a physical volume (PV) from a volume group (VG)?. It can be removed only after removing it from its VG by using vgreduce. It can be removed when an active VG has mounted file systems by running vgexport. It cannot be removed when it is part of an active VG. It can be removed when an inactive logical volume is on the VG. It can be removed when it is part of an active VG.

Examine this command: # auditctl -w /etc/passwd -p w -k pass Which two statements are true upon execution?. A write occurs to /etc/audit/rules.d/audit.rules. An audit rule is defined that creates a log entry every time /etc/passwd is read. An audit rule is defined with the keyword pass. An audit is defined that creates a log entry every time a write occurs to /etc/passwd. A write occurs to /etc/audit/audit.rules.

Examine this command and output: # cat deployment.yaml apiVersion: apps/v1 kind: Deployment metadata: name: nginx-deployment spec: selector: matchLabels: app: nginx replicas: 2 template: metadata: labels: app: nginx spec: containers: - name: nginx image: nginx:1.14.2 ports: - containerPort: 80 Now examine this command which executes successfully: $ kubectl create -f deployment.yaml Which two statements are true?. The command creates and guarantees the availability of a specified number of identical pods. The command creates a deployment named nginx. The command creates a pod named nginx. The command specifies port 80 as the port that the container exposes. The command specifies nginx image version 1.14.2 and will fail if the image version is not available.

Which three are features of the btrfs file system?. Block devices mirroring. Copy-on-write metadata. Cluster file system. Efficient storage for small files. Online resizing. General-purpose volume manager. Automatic defragmentation.

Examine this network configuration: NAME="ens4" DEVICE="ens4" ONBOOT=no NETBOOT=yes IPV6INIT=yes BOOTPROTO=none IPADDR=192.168.2.5 PREFIX=24 GATEWAY=192.168.2.1 TYPE=Ethernet Which two statements are true after executing nmcli con mod ens4 ipv4.method auto?. Interface ens4 automatically starts on boot. BOOTPROTO value is set to dhcp. ONBOOT value is set to yes. IPADDR value is considered null. ONBOOT value is set to dhcp. Interface ens4 is assigned an IP address of 192.168.2.5.

Examine these commands executed by root: # mkdir -p /jail /jail/bin /jail/lib64 cp $(which bash) /jail/bin/ # ldd $(which bash) linux-vdso.so.1 (0x00007ffd574f5000) libtinfo.so.6 => /lib64/libtinfo.so.6 (0x00007fb458c2c000) libdl.so.2 => /lib64/libdl.so.2 (0x00007fb458a28000) libc.so.6 => /lib64/libc.so.6 (0x00007fb458666000) /lib64/ld-linux-x86-64.so.2 (0x00007fb459177000) # cp /lib64/libtinfo.so.6 /jail/lib64/ # cp /lib64/libdl.so.2 /jail/lib64/ # cp /lib64/libc.so.6 /jail/lib64/ # cp /lib64/ld-linux-x86-64.so.2 /jail/lib64/ # chroot /jail What is the output from the cd, pwd, and ls commands?. bash-4.4# cd bash: cd: /root: No such file or directory bash-4.4# pwd / bash-4.4# ls bin lib64. bash-4.4# cd bash: cd: /root: Unable to access chrooted file or directory /root bash-4.4# pwd / bash-4.4# ls bin lib64. bash-4.4# cd bash: cd: /root: No such file or directory bash-4.4# pwd /root bash-4.4# ls bash: ls: command not found. bash-4.4# cd bash: cd: command not found bash-4.4# pwd bash: pwd: command not found bash-4.4# ls bash: ls: command not found.

Examine this command: # ssh -L 5011:127.0.0.1:80 bob@10.10.2.20 -f sleep 30 Which two are true upon execution?. A reverse tunnel is created back to the local host on port 80. A local port forward is created between client and server. A socket remains open for 30 minutes unless a connection is established. A web server is listening on port 5011. An SSH connection process is forked to the background.

You must prevent Ksplice from reapplying updates at the next system reboot. Which two commands or parameters can do this?. uptrack-upgrade -n. nouptrack. uptrack-remove --all. uptrack=0. touch /etc/uptrack/disable.

Which two components are used for creating a new rsyslog rule?. filter. action. parser. module. security policy.

Which two are true about using Ksplice?. Ksplice can be used without a network connection. It can patch the kernel without shutting down the system. Yum cannot upgrade a kernel patched by Ksplice. Ksplice has two clients; each can run in three different modes. The Ksplice client is freely available to all customers.

Which two features does a user private group provide?. Provision of a unique group. Capability to create new group users. Capability to execute sudo. Ability for only a groups users to read files in a new directory. Capability to prevent other users from modifying a file.

Which command configures a fully functional and accessible interface on VLAN 800?. modprobe 8021q ip link add link eth0 name eth0.800 type vlan id 800 ip link set eth0.800 up. modprobe 8021q ip link add link eth0 name eth0.800 VLAN 800 ip address add 10.135.1.120 dev eth0.800 ip link set eth0.800 up. modprobe 8021q ip link add link eth0 name eth0.800 type vlan id 800 ip address add 10.135.1.120 dev eth0.800 ip link set eth0.800 up. modprobe 8021q ip address add 10.135.1.120 dev eth0.800 ip link set eth0.800 up.

Which two commands relabel an SELinux system after a reboot?. Set kernel parameter autorelabel=0. fixfiles -F relabel. echo oerelabel=1 > /.selinux. touch /.autorelabel. Set kernel parameter selinux=0. fixfiles -F onboot.

Which takes precedence for ssh program configuration?. /etc/ssh/ssh_config. ~/.ssh/config. Command line. /etc/ssh/sshd_config.

Examine this command, which executes successfully: # nmcli con add con-name eth2 type ethernet ifname eth2 \ Ipv6.address 2804:14c:110:ab2f:c3lb:1212:7917:708a \ Ipv6.gateway 2804:14c:110:ab2f::1003 \ Ipv4.address 192.168.0.5 ipv4.gateway 192.168.0.254 The eth2 connection does not exist. Which two statements are true?. Ethernet connection eth2 is created. The configuration is saved in /etc/sysconfig/network. A static IP address is assigned to the eth2 connection. It configures an automatic IPV6 address.

Examine /etc/anacrontab: SHELL=/bin/sh PATH=/sbin:/bin:/usr/sbin:/usr/bin MAILTO=root # the maximal random delay added to the base delay of the jobs RANDOM_DELAY=45 # the jobs are started during the following hours only START_HOURS_RANGE=3-22 # period in days delay in minutes job-identifier command 1 5 dailyjob nice run-parts /etc/cron.daily 7 25 weeklyjob nice run-parts /etc/cron.weekly @monthly 45 monthlyjob nice run-parts /etc/cron.monthly Which two statements are true about the jobs scheduled in this file?. Scripts run by the first job are delayed between 11 and 45 minutes. Jobs defined in this anacrontab file can be executed between 15:00 and 22:00. Scripts run by the third job are delayed between 45 and 90 minutes. Jobs defined in this anacrontab file are randomly delayed by up to 51 minutes. Scripts run by the second job are delayed between 31 and 70 minutes.

Which two statements are true about the configuration and use of cron or anacron?. cron jobs may run only once a minute. All crontabs are held in the /etc/cron.d directory. The crond daemon looks for jobs only in /etc/crontab. anacron jobs may run only once a day. anacron jobs are used to run cron jobs if the system was powered off when they were scheduled to run.

Which three statements are true about the journalctl command?. journalctl -bl -p err fails if journal persistence is not configured. journalctl -p err shows only error log level. journalctl -p notice..warning shows all messages from notice to warning log level since the last boot. journalctl -k shows kernel logs since the last boot. journalctl -p 6 shows all info log level messages and above.

Which three statements are true about DNF modules?. Modules are a group of packages that are installed together along with dependencies. Installing a module allows a user to select a specific stream. Profiles are used to provide alternate versions of the same module. Streams are used to define optional configurations of modules. Streams cannot declare dependencies on the streams of other modules. Packages exist in multiple streams, where each stream contains a different version. Switching an enabled module stream automatically changes installed packages.

Examine these commands and output: # cat /etc/auto.master /net -hosts /- auto.direct ro # cat /etc/auto.direct /nfs1 host01:/export/share1 /nfs2 -sync host01:/export/share2 /nfs3 host02:/export/share3 Automounter must be used to mount these filesystems. Which mount options will it use?. /nfs1 and /nfs3 are mounted read-only, async while /nfs2 is mounted read-only, sync. All three filesystems are mounted read-write, sync. All three filesystems are mounted read-only, sync. All three filesystems are mounted read-only, async. /nfs1 and /nfs3 are mounted read-only, async while /nfs2 is mounted read-write, sync.

As root you configured a file system using AutoFS with default settings. In the first session, you changed to a directory under AutoFS control. In a second session, you changed to /etc. Now the idle time for the session expires. Which two statements are true about the status of the file system mounted in the first session?. It remains mounted as long as the system is running. It remains mounted until you log out from the first session. It was unmounted from the first session when the timer expired. It was unmounted when the second session began. It remains mounted until you switch to a directory outside the current mount point.

Which two actions are performed by the logrotate utility?. rotating log files as specified. encrypted log files. compressing log files. duplicating log files. hashing log files.

Examine this command: $ podman run “name=oracleshell -it oraclelinux:8 -slim Which two statements are true upon execution?. The container creates and starts an interactive shell. The container named oracleshell must already exist; otherwise, the command fails. The command fails if the oraclelinux:8 -slim image does not exist on the local machine. The container is created and started in a single command. The container is removed by typing exit at the bash shell prompt.

Denunciar Test