New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

PDF 1z0-106 Study Guide

Page: 4 / 4
Question 16

Examine these commands, which execute successfully:

# firewall-cmd --zone=public --add-service=cockpit --permanent

# firewall-cmd --zone=public --add-port=1313/tcp --permanent

# firewall-cmd --reload

Which are true upon execution?

Options:

A.

The Cockpit service is added only to the public zone.

B.

Egress traffic is allowed for the Cockpit service only when using port 1313.

C.

Runtime firewall configuration is not lost when the firewalld process is restarted or the system is rebooted.

D.

Port 1313 blocks all traffic for the public zone except for ingress traffic to the Cockpit service.

E.

The custom Cockpit service configuration file is updated in /usr/lib/firewalld/services.

Question 17

Examine this output:

Last metadata expiration check: 4:30:21 ago on Mon 26 Oct 2020 03:09:52 PM GMT

Installed Packages

Name : gzip

Version : 1.9

Release : 9.el8

Architecture : x86_64

Size : 412 k

Source : gzip-1.9-9.el8.src.rpm

Repository : @System

From repo : anaconda

Summary : The GNU data compression program

URL :

License : GPLv3+ and GFDL

Description : The gzip package contains the popular GNU gzip data compression

program. Gzipped files have a .gz extension.

Gzip should be installed on your system, because it is a very

commonly used data compression program.

Which command generated it?

Options:

A.

dnf list /usr/bin/gzip

B.

dnf provides /usr/bin/gzip

C.

dnf info /usr/bin/gzip

D.

dnf search /usr/bin/gzip

Question 18

Examine this segment of /etc/rsyslog.conf:

# Log all kernel messages to the console.

# Logging much else clutters up the screen.

#kern.* /dev/console

# Log anything (except mail) of level info or higher.

# Don’t log private authentication messages!

*.info;mail.none;authpriv.none;cron.none /var/log/messages

# The authpriv file has restricted access.

authpriv.* /var/log/secure

# Log all the mail messages in one place.

mail.* -/var/log/maillog

# Log cron stuff

cron.* /var/log/cron

# Everybody gets emergency messages

*.emerg :omusrmsg:*

Now examine this log output:

less

Nov 9 20:32:16 server02 sudo[4570]: pam_unix(sudo:session): session opened for user opc (uid=0)

Nov 9 20:32:17 server02 sudo[4570]: pam_unix(sudo:session): session closed

Nov 9 20:32:24 server02 unix_chkpwd[4661]: password check failed for user

Nov 9 20:32:24 server02 su[4581]: pam_unix(su:auth): authentication failed; logname= uid=1000 euid=0 tty=pts/0 ruser=opc rhost= user=root

Which setting enabled the reporting of this log file output?

Options:

A.

authpriv.* /var/log/auth

B.

*.emerg *

C.

*.info;mail.none;authpriv.none;cron.none /var/log/messages

D.

#kern.* /dev/sssd/sssd.log

E.

cron.* /var/log/cron

Page: 4 / 4
Exam Code: 1z0-106
Exam Name: Oracle Linux 8 Advanced System Administration
Last Update: Dec 23, 2024
Questions: 60
1z0-106 pdf

1z0-106 PDF

$25.5  $84.99
1z0-106 Engine

1z0-106 Testing Engine

$28.5  $94.99
1z0-106 PDF + Engine

1z0-106 PDF + Testing Engine

$40.5  $134.99