Identify the option with two files that are found in the /etc/sysconfig directory.
A. /etc/sysconfig/autofs and/etc/sysconfig/authconfig
B. /etc/sysconfig/ifcfg-eth0 and/etc/sysconfig/atd
C. /etc/sysconfig/resolv.conf and/etc/sysconfig/network
D. /etc/sysconfig/resolv.conf and/etc/sysconfig/grub.conf
Correct Answer: A
*
The /etc/sysconfig/autofs file defines custom options for the automatic mounting of devices.
*
The /etc/sysconfig/authconfig file sets the kind of authorization to be used on the host.
Note: * /etc/sysconfig/network
Used to configure networking options.
Incorrect: Not C, Not D:
* The program that resolves hostnames to IP addresses reads a file called resolv.conf. This file is located in /etc/resolv.conf directory.
Question 62:
DTrace is being ported from Solaris to Oracle Linux. Which three statements are true for the DTrace tool?
A. DTrace allows static and dynamic tracing of your applications and your kernel.
B. DTrace tool is used to compile debug kernel modules and device drivers
C. DTrace allows you to dynamically define probe points on the fly.
D. DTrace probes and probe points are usually defined by the user using scripts written in a language called D.
E. DTrace tool is based on the strace Linux tool and includes both user and kernel strace features.
Correct Answer: ACD
A: DTrace is a comprehensive dynamic tracing framework created by Sun Microsystems for troubleshooting kernel and application problems on production systems in real time.
C: Key benefits and features of DTrace on Oracle Linux include:
/ Designed to work on finding performance bottlenecks / (C) Dynamically enables the kernel with a number of probe points, improving ability to service software / Enables maximum resource utilization and application performance / Fast and easy to use, even on complex systems with multiple layers of software
D: Testers write tracing programs (also referred to as scripts) using the D programming language (not to be confused with other programming languages named "D"). The language, a subset of C, includes added functions and variables specific to tracing. D programs resemble awk programs in structure; they consist of a list of one or more probes (instrumentation points), and each probe is associated with an action. These probes are comparable to a pointcut in aspect-oriented programming.
Question 63:
On your Oracle Linux 6 system, you have to configure the eth0 network interface to 100 MB/sec, half duplex without trying to autonegotiate. Which command will help you configure this requirement?
A. # ifconfig eth0 speed 100 autoneg off duplex half
B. # ethtool interface eth0 speed 100 autoneg off duplex half
C. # ifconfig interface eth0 speed 100 autoneg off duplex half
D. # ethtool s eth0 speed 100 autoneg off duplex half
Correct Answer: D
When I have a device that is acting up, I tend to run: ethtool ethX, check the Supported link modes, the Link partner advertised link modes and the actual speed and Duplex. If my Supported link mode is set low (say 10/Half for some reason) but my switch supports 1000baseT/Full then I'll use ethtool -s ethX to change my ethernet settings to 1000baseT/Full. Just about anything you see from: ethtool ethX, can be changed with ethtool -S ethX. In this case you would use the following:
ethtool -S eth0 speed 1000 duplex full autoneg on
Question 64:
As user bob, you have logged in to the system on a terminal and issued the following command to make the top command run in the background.
[bob@host - ] topand
You exit from the terminal and log back as bob into the system at the same terminal. How is the background job affected?
A. The background job gets the foreground as soon as bob logs into the system.
B. The background job is suspended temporarily from the job and resumes when user bob logs back in to the system.
C. The background job starts running in the background again as soon as bob logs into the system.
D. The background job will not be affected.
E. The background job is deleted from the job pool and does not get listed using jobs command.
Correct Answer: E
Question 65:
Which rpm command can be used to find the package that owns the /etc/rsyslog.conf file?
A. rpm query /etc/rsyslog.conf
B. rpm gf /etc/rsyslog.conf
C. rpm q1 /etc/rsyslog.conf
D. rpm q /etc/rsyslog.conf
Correct Answer: B
Package Selection Options include:
-f [file]
Query package owning [file]
Note:
rpm -q -- What does it do?
One of the nice things about using RPM is that the packages you manage don't end up going into some
kind of black hole. Nothing would be worse than to install, upgrade, and erase several different packages
and not have a clue as to what's on your system. In fact, RPM's query function can help you get out of
sticky situations like:
*
You're poking around your system, and you come across a file that you just can't identify. Where did it come from?
*
Your friend sends you a package file, and you have no idea what the package does, what it installs, or where it originally came from.
*
You know that you installed XFree86 a couple months ago, but you don't know what version, and you can't find any documentation on it.
The list could go on, but you get the idea. The rpm -q command is what you need. If you're the kind of person that doesn't like to have more options than you know what to do with, rpm -q might look imposing. But fear not. Once you have a handle on the basic structure of an RPM query, it'll be a piece of cake.
Question 66:
View the exhibits.
Examine the output of sar command and the top command in the Exhibits. Which statement is the correct interpretation of this data?
A. The system is running low on swap space and memory.
B. CPU is Idle and the system has plenty of free memory available.
C. The CPU utilization is high and one process is using most of the CPU.
D. The system is idle with very little memory, CPU, and I/O utilization.
Correct Answer: C
From the top exhibit we see that npviewer.gin uses 73.4% of the available CPU.
Note:
*
sar - Collect, report, or save system activity information.
*
The sar command writes to standard output the contents of selected cumulative activity counters in the
operating system. The accounting system, based on the values in the count and interval parameters,
writes information the specified number of times spaced at the specified intervals in seconds.
*
sar u 2 5
Report CPU utilization for each 2 seconds. 5 lines are displayed.
Question 67:
Which three steps are involved in the installing Ksplice on servers that will be updated?
A. You have to be logged as user "ksplice" on the server you want to prepare and install Oracle Ksplice on.
B. The Uptrack package needs access directly or through a proxy to the Oracle public yum repository (http://public-yum.oracle.com/) to download the required packages for the uptrack-* utilities to be able to work correctly.
C. Download the install-uptrack script using the "wget N http://www.ksplice.com/uptrack/install-uptrack" command.
D. You have to be logged in as user "root" on the server you want to prepare and install Oracle ksplice on.
E. The uptrack package will set up a yum repository (/etc/yum.repos.d/ksplice-uptrack.repo) and download the required package for the uptrack-* utilities to be able to work correctly.
F. Download the ksplice ISO image from https://edelivery.oracle.com/linux and then run the "sh installuptrack" script from the ISO image.
Correct Answer: BCD
B: Your system must have access to the internet to install Ksplice. If you are using a proxy, set the proxy in your shell:
CD: Once you have an access key run the following commands as root, replacing YOUR_ACCESS_KEY with the access key you received upon sign-up:
wget -N https://www.ksplice.com/uptrack/install-uptrack sh install-uptrack YOUR_ACCESS_KEY uptrack-upgrade y
E: If you'd like Ksplice Uptrack to automatically install updates as they become available, run:
sh install-uptrack YOUR_ACCESS_KEY --autoinstall in place of the above install-uptrack command, or set "autoinstall = yes" in your /etc/uptrack/uptrack.conf after installation.
Reference: Ksplice, Installation instructions
Question 68:
What happens when the following command is run?
# authconfig - - passalgo = md5 - - update
A. It produces the MD5 checksum of the input data.
B. It configures the MD5 checksum for newly authored documents
C. It converts the stdio input to MD5 algorithm.
D. It changes the user password hashing algorithm to MD5.
Correct Answer: D
To configure the Linux system to use the MD5 algorithm, enter: # authconfig --passalgo=MD5 --update
Note: The default algorithm for storing password hashes in /etc/shadow is MD5. I was told to use SHA-512 hashing algorithm. How do I set password hashing using the SHA-256 and SHA-512 under CentOS or Redhat Enterprise Linux 5.4?
You need to use authconfig command to setup SHA-256/512 hashing. This command provides a simple method of configuring /etc/sysconfig/network to handle NIS, as well as /etc/passwd and /etc/shadow, the files used for shadow password support. Basic LDAP, Kerberos 5, and SMB (authentication) client configuration is also provided.
Display Current Hashing Algorithm
Type the following command: # authconfig --test | grep hashing
Sample outputs:
password hashing algorithm is md5 Configure Linux Server To Use The SHA-512 To configure the Linux system to use the SHA-512 algorithm, enter: # authconfig --passalgo=sha512 --update
Question 69:
Finding a directive issued by your organization listing several important CVEs (Common Vulnerability and Exposures), you find one for Linux OpenSSH (CVE-2006-5764), which might apply to your oracle Linux systems. What command would help ensure that a patch has been applied to close this vulnerability on an Oracle Linux 6 system running OpenSSH server?
A. yum listcves openssh
B. rpm qa | grep openssh | grep 5794
C. rpm q - - changelog openssh | grep 5794
D. yum sec list cves | grep 5794
E. yum sec list cvesApplied
Correct Answer: C
*
The command rpm -q --changelog rpm displays a detailed list of information (updates, configuration, modifications, etc.) about a specific package. This example shows information about the package rpm. However, only the last five change entries in the RPM database are listed. All entries (dating back the last two years) are included in the package itself. This query only works if CD 1 is mounted at /media/cdrom:
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Oracle exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 1Z0-460 exam preparations and Oracle certification application, do not hesitate to visit our Vcedump.com to find your solutions here.