Proper study guides for Abreast of the times Oracle Oracle Linux 5 and 6 System Administration certified begins with Oracle 1Z0-100 preparation products which designed to deliver the Breathing 1Z0-100 questions by making you pass the 1Z0-100 test at your first time. Try the free 1Z0-100 demo right now.

2016 Dec 1Z0-100 exam question

Q61. The dailyrun.sh shell script run by the user hr on a daily basis suddenly returns an error. 

You investigate this by running the commands manually as user hr and discovered that this line of shell cod is responsible: 1s –als > /home/prodrun/files.1st Bash: files.1st:cannot overwrite existing file What is the cause of this error? 

A. The hr user has no write permissions on the /home/prodrun/files.1st file. 

B. The hr user has no write permissions on the /home/prodrun directory. 

C. The dailyrun.sh shell script has the setuid bit turned off. 

D. The hr user environment has set on the noclobber option. 

Answer:


Q62. Examine the contents of /etc/rc.d 

Which two statements are true concerning the files contained in the run level-specific directories rc0.d through rc6.d? 

A. The files starting with S or K are links to scripts in the /ete/init.d directory. 

B. The files starting with S are always invoked by the /etc/rc.d/rc script even if the service managed by that script is already down. 

C. The files starting with S or K are added by using the chkcor.fig command. 

D. The files starting with K are always invoked by the /rc/rc,d/re script even if the service managed by that script is already up. 

E. The files starting with S are invoked before those starting with K. 

Answer: A,C 


Q63. Which three methods might be used to change kernel parameters, thereby modifying the values for running system? 

A. Using the echo command to write values to specific files in the /sys directory 

B. Issuing the sysct1 -w command to write values to specific files in the /proc/sys directory 

C. Issuing the sysct1 -w command to write values to specific files in the /sys directory 

D. Adding to or modifying parameters in /etc/sysct1.conf and issuing the sysct1 -p command 

E. Using the echo command to write values to specific files in the /proc/sys directory 

Answer: B,D,E 


Q64. You use the host command to find out about host name WAYOUT: 

Which two statements are true? 

A. Example.com is an authoritative name server. 

B. Dns1.example.com is an authoritative name server. 

C. Dns2.example.com is a Cache-only name server. 

D. Dns2.example.com is an authoritative name sever. 

E. Dns1.example.com is a cache-only name server. 

Answer: B,D 


Q65. Which three statements are true about the configuration of OpenLdap secure encrypted connections? 

A. TLS and ldaps should not both be selected. 

B. To enable idaps, you must download the Certifying Authority (CA) Certificate. 

C. To enable TLS, you must download the Certifying Authority (CA) Certificate. 

D. The certificate is needed to verify ownership of the secret key used for encryption. 

E. There is a command-line alternative to the Authentication Configuration Tool to enable the encrypted LDAP communication. 

Answer: A,C,D 

Explanation: Transport Layer Security (TLS) can be used to provide data integrity and confidentiality protection. OpenLDAP supports negotiation of TLS (SSL) via both StartTLS and ldaps://. 


Rebirth 1Z0-100 question:

Q66. Which two statements are true about the installation of certain components of asmlib in 

Oracle Linux 6? 

A. The asmlib kernel module is included in the Red Hat-compatible kernel. 

B. The asmlib kernel module is included in the Unbreakable Enterprise Kernel (UEK). 

C. The asmlib kernel module must be installed separately when using the Unbreakable Enterprise Kernel (UEK). 

D. The asmlib oracleasm-support package is installed as part of the Red Hat-compatible kernel package. 

E. The asmlib oracleasm-support package is included as part of the Unbreakable Enterprise Kernel (UEK) package. 

F. The asmlib oracleasm-support rpm must be installed separately when using the Unbreakable Enterprise Kernel (UEK). 

Answer: B,F 

Explanation: B: The oracleasm kernel driver is built into the Unbreakable Enterprise Kernel for Oracle Linux 6 and does not need to be installed manually. 

F: All ASMLib installations require the oracleasmlib and oracleasm-support packages appropriate for their machine. 

The oracleasm-support package can be downloaded from the Unbreakable Linux Network 

(ULN) if you have an active support subscription, or from http://public-yum.oracle.com if 

you do not. 

Incorrect: 

not A: The oracleasm kernel driver for the 64-bit (x86_64) Red Hat Compatible Kernel for 

Oracle Linux 6 can be installed manually. 


Q67. Examine some of the contents of the /boot/grub/grub.com file from an Oracle Linux system: 

Default=0 Timeout=5 Splashimage=(hd0, 0)/grub/splash.xpm.gz Hiddenmenu Title Oracle Linux Server (2.6.39-100.0.12.16uek.x86_64) Root (hd0, 0) Kernet /vmlinuz-2.6.39-100.0.12.e16uek.x86_64 ro root=UUIP=a4b6049b-9aa1-44b4-87cf-

aebb17alcdf9 rd_NO_LUKS re_NO_LVM rd_NO_DM.UTF-8 

SYSFONT=1atarcycreheb-sun16 KEYBOARDTYPE=PC KEYTABLE=us rhgb quiet 

numa=off 

Initrd /initramfs-2.6.39-100.0.12.e16uek.x86_64.img 

Title Oracle Linux Server (2.6.32-131.0.15.e16.x86_64) 

Root (hd0, 0) 

Kernel /vmlinuz-2.6.32-131.0.15.e16.x86_64 ro root=UUIS=a4b6049b-9aa1-44b4-87cf-

aebb17a1cdf9 rd_NO_LUKS rd_NO_LVM rd_NO_LVM re_NO_MD rd_NO_DM.UTF-8 SYSFONT=latarcyheb-sun16 KEYBOARDTYPE=PC KEYTABLE=us Crashkernel=auto rhgp quiet numa = off Initrd /initramfs-2.6.32-131.0.15.e16.x86_64.img 

Which three statements are true about the behavior and configuration of GRUB on this system? 

A. (hd0, 0) represents the first partition on device /dev/hd0. 

B. The hiddenmenu directive hides the GRUB menu only for 5 seconds after which it becomes visible again. 

C. The root directive specifies an initial root filesystem, allowing access to block device modules to mount the real root filesystem on disk. 

D. (hd0, 0) represents the first partition on the first drive detected by the BIOS. 

E. The initrd directive specifies the initamfs, an initial root filesystem in RAM, allowing access to block device modules to mount the real root filesystem. 

F. Each kernel must have an initramfs that matches the version of the kernel. 

G. Because there is an Unbreakable Enterprise Kernel installed, it must be the default 

kernel listed as shown by the default=0 directive. 

Answer: A,C,E 


Q68. Which four are among the many components included in the oracle Linux distribution? 

A. Apache Web Server 

B. Documentation 

C. X Windowing system 

D. Oracle Database Server 11g 

E. Red Hat compatible kernel 

F. Oracle WebLogic Server 11g 

Answer: A,B,C,E 


Q69. You want sendmail to deliver mail for these users: 

John.smith@acme.comto mailbox jsmith1 

John.smith@foo.comto mailbox jsmith2 

John.smith@bar.comto mailbox jsmith3 

In which sendmail configuration database can this requirement be defined? 

A. /etc/aliases 

B. /etc/mail/userdb 

C. /etc/mail/virtusertable 

D. /etc/mail/domaintable 

E. /etc/mail/genericstable 

Answer:

Explanation: /etc/mail/virtusertable 

This database file maps mail addresses for virtual domains and users to real mailboxes. 

These mailboxes can be local, remote, aliases defined in /etc/mail/aliases, or files. This 

allows multiple virtual domains to be hosted on one machine. 

The following example demonstrates how to create custom entries using that format: 

root@example.com root 

postmaster@example.com postmaster@noc.example.net 

@example.com joe 


Q70. Which two actions are the required steps to prevent: non-root ssh access to the system? 

A. Ensuring that /etc/pam.d/sshd includes: account sufficient pam_nologin.so 

B. Create the /etc/nologin/login.deny file containing a single line +all 

C. Creating the /etc/nologin.allow file containing a single line root 

D. Creating the /etc/nologin file 

E. Ensuring that /etc/pam.d/sshd includes: account requiredpam_nologin.so 

Answer: D,E 

Explanation: 

D: If the file /etc/nologin exists, only root is allowed to log in; other users are turned away 

with an error message. 

Note: 

* In some cases, the security policy may dictate additional mechanisms, such as TCP 

wrappers, Pluggable Authentication Modules (PAM), or the implementation of Security-

Enhanced Linux (SELinux).