Best 1Z0-105 Dumps to Pass Oracle Linux 6 System Administrator 1Z0-105 Exam Questions
Prepare for your 1Z0-105 test with the aid of ExamsLead 1Z0-105 Exam PDF Dumps. Visit our ExamsLead website and find our Oracle 1Z0-105 Sample Questions. This will help you pass your Oracle 1Z0-105 test with ease. Download the actual ExamsLead 1Z0-105 Exam Dumps, study our Oracle 1Z0-105 Sample Questions, and pass the Oracle 1Z0-105 exam at your first attempt. Through our dumps, you will be able to feel at ease in attaining your Oracle Linux 6 System Administrator certification. Study our sample questions and answers religiously and you'll be able to reap success in your 1Z0-105 exam. Download 1Z0-105 Dumps PDF with new questions answers and prepare your Oracle 1Z0-105 test easily. https://examslead.com/1Z0-105-practice-exam-dumps/
Prepare for your 1Z0-105 test with the aid of ExamsLead 1Z0-105 Exam PDF Dumps. Visit our ExamsLead website and find our Oracle 1Z0-105 Sample Questions. This will help you pass your Oracle 1Z0-105 test with ease. Download the actual ExamsLead 1Z0-105 Exam Dumps, study our Oracle 1Z0-105 Sample Questions, and pass the Oracle 1Z0-105 exam at your first attempt. Through our dumps, you will be able to feel at ease in attaining your Oracle Linux 6 System Administrator certification. Study our sample questions and answers religiously and you'll be able to reap success in your 1Z0-105 exam. Download 1Z0-105 Dumps PDF with new questions answers and prepare your Oracle 1Z0-105 test easily. https://examslead.com/1Z0-105-practice-exam-dumps/
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
<strong>Oracle</strong><br />
<strong>1Z0</strong>-<strong>105</strong> <strong>Exam</strong><br />
<strong>Oracle</strong> <strong>Linux</strong> 6 Advanced <strong>System</strong> Administration<br />
<strong>Questions</strong> & Answers (Demo Version)<br />
https://examslead.com/<strong>1Z0</strong>-<strong>105</strong>-practice-exam-dumps/<br />
Buy Full Product Here:
Question 1<br />
<strong>Exam</strong>ine the dtrace command:<br />
dtrace –P syscall<br />
Which statement is true about this command?<br />
A. It enables all probes available in the syscall provider, and produces output.<br />
B. It lists all probes available in the syscall provider.<br />
C. It returns an error. The command is incomplete. You must specify a probe <strong>to</strong> enable.<br />
D. It enables all probes available in the syscall provider, and produces no output.<br />
Aoswern B<br />
Explana<strong>to</strong>n:<br />
Reference:<br />
htp:::docs.oracle.com:cd:EE1925-0E:8E1-2488:gbxwv:index.html (<strong>Exam</strong>ple 9-7, probes by provider)<br />
Question 2<br />
<strong>Exam</strong>ine this extract from :etc:htpd:conf:htpd.conf for virtual hosts:<br />
<br />
ServerAdmin webmaster@suteE.example.com<br />
DocumentRoot :www:docs:siteE.example.com<br />
ServerName siteE.example.com<br />
<br />
<br />
ServerAdmin webmaster@sute9.example.com<br />
DocumentRoot :www:docs:site9.example.com<br />
ServerName site9.example.com<br />
<br />
Which three statements are true about the confgura<strong>to</strong>n extract?<br />
A. To connect <strong>to</strong> the website, siteE.example.com must resolve <strong>to</strong> a diferent IP address than<br />
site9.example.com.<br />
B. siteE.example.com and site9.example.com can share the sameIP address.<br />
C. The web server atempts a DHCP discover <strong>to</strong> assign one IP address per virtual host.<br />
D. It is possible but not manda<strong>to</strong>ry <strong>to</strong> have unique IP addresses for each virtual host.<br />
E. The siteE.example.com virtual host shares and error logs with site9.example.com.<br />
Question 3<br />
<strong>Exam</strong>ine the code fragment from :etc:tgt:targets.conf:<br />
<br />
backing-s<strong>to</strong>re :iSCSIsharedDisk:physDiskE.img<br />
write-cache of<br />
<br />
<br />
backing-s<strong>to</strong>re : iSCSIsharedDisk:physDisk9.img<br />
Aoswern A, C, E
inita<strong>to</strong>r-address E19.0.9.E02<br />
inita<strong>to</strong>r address E19.0.9.E06<br />
write-cache of<br />
<br />
<br />
backing-s<strong>to</strong>re :iSCSIsharedDisk:physDisk5.img<br />
write-cache of<br />
<br />
Which statement is true?<br />
A. Only the target identfed by the iqn ending with mypc:9 is visible. This target is visible <strong>to</strong> the specifc<br />
clients identfed by the inita<strong>to</strong>r address.<br />
B. The inita<strong>to</strong>r-address syntax in not valid. The address value should be specifed as an iqn, not an IP<br />
address. This causes an error, and only iqns ending with mypc:E and mypc:5 are visible.<br />
C. All targets are visible <strong>to</strong> prospectve clients, but the target iqn ending with mypc:9 is visible exclusively<br />
<strong>to</strong> the specifed IP addresses.<br />
D. The inita<strong>to</strong>r-address syntax is not valid. The address value must be specifed as an iqn, not an IP<br />
address. The inita<strong>to</strong>r-address parameters are ignored and all targets are visible without restric<strong>to</strong>n.<br />
Question 4<br />
Which three statements are true about an RPM SPEC fle?<br />
Aoswern B<br />
A. It is manda<strong>to</strong>ry for building a binary RPM using rpmbuild.<br />
B. It is a Shell script that can be used <strong>to</strong> build a binary RPM.<br />
C. It contains metadata that will be part of a binary RPM.<br />
D. It contains metadata and helper scripts that are required during the build process of a binary RPM.<br />
Aoswern A, B, D<br />
Explana<strong>to</strong>n:<br />
Reference:<br />
htp:::www.thegeekstuf.com:90E2:09:rpm-build-packageexample:?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%5A+TheGeekStuf+(The<br />
+Geek+Stuf)<br />
Question 5<br />
<strong>Exam</strong>ine the parameters shown using the sysctl command relatng <strong>to</strong> panic situa<strong>to</strong>ns:<br />
[root@WAYOUT etc]# sysctl –a |grep panic |grep –v hung<br />
kernel.panic = 0<br />
kernel.panic_on_oops = 0<br />
kernel.soflockup_panic = 0<br />
kernel.unknown_nmi_panic = 0<br />
kernel.panic_on_unrecovered_nmi = 0<br />
kernel.panic_on_io_nmi = 0<br />
kernel.panic_on_oom = 9<br />
[root@WAYOUT etc]# sysctl –a |grep hung<br />
kernel.hung_task_panic = 0<br />
kernel.hung_task_chek_count – 4E14504
kernel.hung_task_tmeout_secs = E90<br />
kernel.hung_task_warnings = E0<br />
Which two statements are true about system behavior?<br />
A. The kernel delays panic for a few seconds if a bug is encountered <strong>to</strong> allow the klogd kernel logging<br />
daemon <strong>to</strong> log the oops output.<br />
B. The kernel panics if a kernel thread sleeps in the TASK_UNINTERRUPTABLE state for more than E90<br />
seconds.<br />
C. The kernel atempts <strong>to</strong> contnue if a bug is encountered.<br />
D. The kernel always panics if an out-of-memory condi<strong>to</strong>n arises.<br />
E. The kernel tries <strong>to</strong> kill some memory-consuming processes <strong>to</strong> avoid a panic if an out-of-memory<br />
condi<strong>to</strong>n arises.<br />
F. The kernel panics if a user thread sleeps in the TASK_UNINTERRUPTABLE state for more than E90<br />
seconds.<br />
Question 6<br />
Aoswern B, F<br />
Which two op<strong>to</strong>ns prevent unauthorized access <strong>to</strong> the named service from the rndc utlity on <strong>Oracle</strong><br />
<strong>Linux</strong>?<br />
A. running rndc-confgen –a <strong>to</strong> generate a key that can be used by both the named service and the rndc<br />
utlity<br />
B. running rndc-confgen –a <strong>to</strong> generate a key that can be used only by the named service<br />
C. running rndc –k :etc:rndc.key <strong>to</strong> generate a key <strong>to</strong> be used only by the rndc utlity<br />
D. the presence of :etc:named.conf with the line include “:etc:rndc.key”; <strong>to</strong> allow the named service <strong>to</strong><br />
check for a matching key from the rndc utlity<br />
Aoswern A, D<br />
Explana<strong>to</strong>n:<br />
Reference:<br />
htp:::www.oracle.com:us:technologies:linux:suse-linux-<strong>to</strong>-oracle-linux-wp-E8187E0.pdf (page 41)<br />
Question 7<br />
Afer creatng empty mount point :xfsE, you execute the command:<br />
# mkfs –t xfs –L :xfsE –l logdev=:dev:sddE :dev:sdhE<br />
Which two statements are true about the efects of executng the mkfs command?<br />
A. It fails if there is an existng XFS fle system on :dev:sdhE.<br />
B. It fails if there is an existng XFS log on :dev:sddE.<br />
C. It fails if there is an existng XFS fle system on :dev:sddE.<br />
D. It fails because there is no size specifed for the XFS log.<br />
E. The xfsE fle system is mounted au<strong>to</strong>matcally during system startup.<br />
F. It creates and mounts the :xfsE fle system.<br />
Question 8<br />
Aoswern D, F
<strong>Exam</strong>ine the contents of :etc:mail:access:<br />
Connect:localhost.localdomain RELAY<br />
Connect: localhost<br />
RELAY<br />
Connect:E97.0.0.E<br />
RELAY<br />
This system is <strong>to</strong> be used as an MTA or mail gateway for the local LAN network address E19.E68.E.0:94.<br />
Which two ac<strong>to</strong>ns allow this mail host <strong>to</strong> route email for the network?<br />
A. Run sendmail again; and the updated fle can be accessed au<strong>to</strong>matcally.<br />
B. Add this line <strong>to</strong> :etc:mail:access:<br />
To:E19.E68.E<br />
RELAY<br />
C. Add this line <strong>to</strong> :etc:mail:access:<br />
Connect:E19.E68.E<br />
D. Add this line <strong>to</strong> :etc:mail:access:<br />
From:E19.E68.E.0<br />
RELAY<br />
RELAY<br />
E. Rebuild the access database fle afer the source fles have been modifed. Restartng the sendmail<br />
service au<strong>to</strong>matcally rebuilds the maps.<br />
Question 9<br />
Aoswern D, E<br />
Which two statements are true about recursive nameservers that are supported by <strong>Oracle</strong> <strong>Linux</strong>?<br />
A. They may be authoritatve.<br />
B. They may forward requests <strong>to</strong> authoritatve name servers on some occasions.<br />
C. They may be primary nameservers.<br />
D. They cache replies from previous name resolu<strong>to</strong>n requests.<br />
E. They may be secondary nameservers.<br />
Question 10<br />
What is func<strong>to</strong>n of the <strong>System</strong> Security Service Daemon (SSSD)?<br />
Aoswern B, C<br />
A. It permits single-user accounts by maintaining credentals for back-end systems on behalf of local<br />
users.<br />
B. It enables fngerprint reader support for Kerberos clients.<br />
C. It enables Smart Card Authentca<strong>to</strong>n for Kerberos clients.<br />
D. It permits Kerberos authentca<strong>to</strong>n <strong>to</strong> be done ofine by caching user identtes.<br />
Aoswern A
Buy Full Product Here: