Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the Oracle Linux Administration 1z0-106 Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam 1z0-106 Premium Access

View all detail and faqs for the 1z0-106 exam


477 Students Passed

84% Average Score

90% Same Questions
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

Examine this segment of /etc/rsyslog.conf:

# Log all kernel messages to the console.

# Logging much else clutters up the screen.

#kern.* /dev/console

# Log anything (except mail) of level info or higher.

# Don’t log private authentication messages!

*.info;mail.none;authpriv.none;cron.none /var/log/messages

# The authpriv file has restricted access.

authpriv.* /var/log/secure

# Log all the mail messages in one place.

mail.* -/var/log/maillog

# Log cron stuff

cron.* /var/log/cron

# Everybody gets emergency messages

*.emerg :omusrmsg:*

Now examine this log output:

less

Nov 9 20:32:16 server02 sudo[4570]: pam_unix(sudo:session): session opened for user opc (uid=0)

Nov 9 20:32:17 server02 sudo[4570]: pam_unix(sudo:session): session closed

Nov 9 20:32:24 server02 unix_chkpwd[4661]: password check failed for user

Nov 9 20:32:24 server02 su[4581]: pam_unix(su:auth): authentication failed; logname= uid=1000 euid=0 tty=pts/0 ruser=opc rhost= user=root

Which setting enabled the reporting of this log file output?

Options:

A.

authpriv.* /var/log/auth

B.

*.emerg *

C.

*.info;mail.none;authpriv.none;cron.none /var/log/messages

D.

#kern.* /dev/sssd/sssd.log

E.

cron.* /var/log/cron

Questions # 2:

Which two are true about using Ksplice?

Options:

A.

Ksplice can be used without a network connection

B.

It can patch the kernel without shutting down the system.

C.

Yum cannot upgrade a kernel patched by Ksplice

D.

Ksplice has two clients; each can run in three different modes.

E.

The Ksplice client is freely available to all customers.

Questions # 3:

Examine this content from /etc/chrony.conf:

...

pool pool.ntp.org offline

driftfile /var/lib/chrony/drift

keyfile /etc/chrony.keys

...

Which statement is true about pool.ntp.org?

Options:

A.

chronyd polls a maximum of 3 sources from pool.ntp.org after it is enabled.

B.

chronyd does not poll pool.ntp.org until it is enabled to do so by chronyd.

C.

chronyd takes pool.ntp.org offline automatically when sending a request to the pool fails.

D.

chronyd does not poll pool.ntp.org until it is enabled to do so by chronyc.

Questions # 4:

Which two default user account settings are contained in /etc/login.defs?

Options:

A.

Decryption method used to decrypt passwords.

B.

User hashed passwords.

C.

Group hashed passwords.

D.

Password aging controls.

E.

Encryption method used to encrypt passwords.

Questions # 5:

Examine these commands and output:

# cat /etc/auto.master

/net -hosts

/- auto.direct ro

# cat /etc/auto.direct

/nfs1 host01:/export/share1

/nfs2 -sync host01:/export/share2

/nfs3 host02:/export/share3

Automounter must be used to mount these filesystems. Which mount options will it use?

Options:

A.

/nfs1 and /nfs3 are mounted read-only, async while /nfs2 is mounted read-only, sync.

B.

All three filesystems are mounted read-write, sync.

C.

All three filesystems are mounted read-only, sync.

D.

All three filesystems are mounted read-only, async.

E.

/nfs1 and /nfs3 are mounted read-only, async while /nfs2 is mounted read-write, sync.

Questions # 6:

Examine these Kubernetes components:

Question # 6

Which option correctly matches the components with their description?

Options:

A.

1-d, 2-f, 3-e, 4-a, 5-c, 6-b

B.

1-b, 2-a, 3-e, 4-c, 5-f, 6-d

C.

1-a, 2-d, 3-b, 4-c, 5-e, 6-f

D.

1-c, 2-f, 3-d, 4-b, 5-e, 6-a

E.

1-d, 2-f, 3-c, 4-e, 5-a, 6-b

Questions # 7:

Examine this command and output:

# cat deployment.yaml

apiVersion: apps/v1

kind: Deployment

metadata:

name: nginx-deployment

spec:

selector:

matchLabels:

app: nginx

replicas: 2

template:

metadata:

labels:

app: nginx

spec:

containers:

- name: nginx

image: nginx:1.14.2

ports:

- containerPort: 80

Now examine this command which executes successfully:

$ kubectl create -f deployment.yaml

Which two statements are true?

Options:

A.

The command creates and guarantees the availability of a specified number of identical pods.

B.

The command creates a deployment named nginx.

C.

The command creates a pod named nginx.

D.

The command specifies port 80 as the port that the container exposes.

E.

The command specifies nginx image version 1.14.2 and will fail if the image version is not available.

Questions # 8:

Which three statements are true about the journalctl command?

Options:

A.

journalctl -bl -p err fails if journal persistence is not configured.

B.

journalctl -p err shows only error log level.

C.

journalctl -p notice..warning shows all messages from notice to warning log level since the last boot.

D.

journalctl -k shows kernel logs since the last boot.

E.

journalctl -p 6 shows all info log level messages and above.

Questions # 9:

Examine this command:

# ssh -L 5011:127.0.0.1:80 bob@10.10.2.20 -f sleep 30

Which two are true upon execution?

Options:

A.

A reverse tunnel is created back to the local host on port 80.

B.

A local port forward is created between client and server.

C.

A socket remains open for 30 minutes unless a connection is established.

D.

A web server is listening on port 5011.

E.

An SSH connection process is forked to the background.

Questions # 10:

Which two statements are true about container technology?

Options:

A.

A container application built on a bare metal system cannot run on virtual machines or cloud instances.

B.

A container application is dependent on the host operating system and kernel version.

C.

Containers package an application with the individual runtime stack.

D.

Podman, Buildah, and Skopeo are independent tools to create, run, and manage container applications across compatible Oracle Linux systems.

E.

Podman requires a running daemon to function and to enable containers to start and run without root permissions.

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.