Simuladão Completo e definitivo para 1Z0-409 - Oracle Enterprise Linux Fundamentals


Olá,
Segue abaixo um simuladão completo e definitivo com 230 questões sobre o exame 1Z0-409 Oracle Enterprise Linux Fundamentals


 
Na postagem http://esli-nux.com/2015/05/certificacao-oracle-enterprise-linux.html conferimos tudo sobre a certificação 1Z0-409 Oracle Enterprise Linux Fundamentals. 




  • Question: 1
You located a file created in /home successfully by using the slocate command. You found that the slocate command could locate that file even after deletion. What could be the possible solution to stop listing deleted files? (Choose all that apply.)

A. Run updatedb to update the database.
B. Run slocate -u to update the database.
C. Use the locate command instead of slocate.
D. Delete the /var/lib/slocate/slocate.db file because it buffers all search results.
E. Reboot the system so that it will update the kernel memory because the kernel stores all results in the memory.


  • Question: 2
As an administrator, you mounted the /exports/projects NFS exported directory from a server on a LAN using the default NFS settings. You find the  performance to be low. Which NFS mount options can you use to increase the performance?

A. set rsize=8192 and wsize=8192.
B. set rsize=32768 and wsize=32768.
C. set wsize=8192 and keep the read packet size at the default.
D. set rsize=8192 and keep the write packet size at the default.
E. set rsize=32768 and keep the write packet size at the default.
F. set wsize=32768 and keep the read packet size at the default.


  • Question: 3
Two users, bob on station1 and smith on station2, generated a public/private key pair using sshkeygen to enable password-less secure shell login between them. What would be their next step to accomplish the task?

A. Copy the private key of bob to station2:~smith and vice versa.
B. Copy the key pair of bob to station2:~smith/.ssh as public and private keys.
C. Copy the private key of bob to station2:~smith/.ssh/authorized_keys and vice versa.
D. Copy the public key of bob to station1:~smith/.ssh/authorized_keys and vice versa.
E. Copy the public key of bob to station2:~smith/.ssh/authorized_keys and vice versa.


  • Question: 4
View the Exhibit.












As a Linux administrator, you have to let the users smith and scott manage files and directories in the /software directory on their own, with full permissions between each other's files. What are the most essential steps needed to grant them the required privileges? (Choose all that apply.)

A. Add SUID on /software.
B. Add 777 permissions on /software.
C. Add u=--- permissions on /software.
D. Add scott as a member of the apps group.
E. Add rwx permissions for the apps group on /software.


  • Question: 5
View the Exhibit.


















A normal user bob logs in from server200 to server1 through telnet and runs the xclock command but fails with an error message as shown in the Exhibit. What could be the possible reason for the error?

A. This is because gdm is not started on the machine.
B. This is because of the temporary failure in name resolution.

C. This is because the default X access controls do not permit remote connections.
D. This is because the graphical display manager is not configured to allow TCP connections.


  • Question: 6
What is the effect of issuing ZZ and ZQ in the vi editor command mode?

A. The command ZZ will zoom in the vi editor command mode and ZQ will zoom out the view.
B. The command ZZ will thrash all changes, whereas ZQ will ask for confirmation before saving.
C. The command ZZ will save changes and exit, whereas ZQ will exit the editor without saving changes.
D. The command ZZ will exit the editor without saving changes, whereas ZQ will save changes and exit.


  • Question: 7
You have logged in as root and have invoked the mount command without any options to mount the device /dev/hda8:
mount /dev/hda8

What does mount do in this context? (Choose two.)
A. It checks the /etc/mtab for the required options to mount the device.
B. It checks the /etc/fstab for the required options and the mount point to mount the device.
C. It checks the /etc/inittab for the required options and the mount point to mount the device.
D. It reports an error message "mount point doesn't exist" if the entry for /dev/hda8 doesn't exist in the /etc/fstab file.


  • Question: 8
Which command would you use to save the name of all the users in your system in alphabetical order to a newfile file after removing the duplicate entries?
A. cut -f1 -d: /etc/passwd | sort | uniq | > newfile
B. cut -f1 -d: /etc/passwd | sort -d | uniq > newfile
C. cut -f1 -d: /etc/passwd | sort -a | uniq | newfile
D. cut -f1 -d: < /etc/passwd | sort | uniq | less < newfile


  • Question: 9
Which four statements are true about the find command in Linux? (Choose four.)
A. The user can specify how to process the files.
B. The user can specify where to search (pathname).
C. The user can specify what type of file to search for.
D. The user can specify to perform logical operations on selections.
E. The user can search and replace the contents of files with find.
F. The user cannot find recently added files or directories on the system.


  • Question: 10
The user smith wants to display the total number of lines that are 4 characters (letters and digits) long or more from the file1.txt file. Which regular expression or command should smith use?
A. egrep "^[[:alnum:]]{4,}$" file1.txt | wc -l
B. egrep "^[[:alpha:]]{4,}$" file1.txt | wc -l
C. egrep "^[[:alpha:]]{4,}$" file1.txt | wc -w
D. egrep "^[[:alnum:]]{4,}$" file1.txt | wc -c


  • Question: 11
Match the following shell special characters with their usage:
1)    \            a) used in pairs to quote other special characters so they will not be interpreted by the shell or to embed blanks
2)    ' ?         b) variable substitution
3)  { } ~      c) used to escape the special meaning of the next character
4)   $           d) wildcard file name expansion

A. 1-c, 2-b, 3-a, 4-d
B. 1-b, 2-d, 3-c, 4-a
C. 1-c, 2-a, 3-d, 4-b
D. 1-c, 2-a, 3-b, 4-d
E. 1-d, 2-a, 3-c, 4-b
F. 1-d, 2-c, 3, b, 4-a


  • Question: 12
Match the commands with their functions:
1. make a. installs the software to the target directory specified during configure, but typically defaults to /usr/local/subtree
2. configure script b. calls the compiler and linker as specified by the Makefile
3. make install c. creates the necessary Makefiles based on the user information
A. 1-c, 2-a, 3-b
B. 1-b, 2-c, 3-a
C. 1-a, 2-c, 3-b
D. 1-c, 2-b, 3-a



  • Question: 13
You have the /tools directory on a system with critical system files reserved for future use. As a Linux administrator which command would you use to protect these files from a user who might get the UID or GID as shown below?

[[email protected] ~]# ls -ld /tools/

drwxrwx--- 108 517 527 4096 Mar 26 20:00 /tools/

A. chmod o+t /tools
B. chmod u+s /tools
C. chown -R 0.0 /tools
D. chown -R nobody.nobody /tools



  • Question: 14
Identify the two main branches from the UNIX family tree, where the cross-pollination between these branches was responsible for making UNIX so powerful. (Choose two.)

A. MITB. GNU
C. BSD
D. POSIX
E. BESYS
F. System V



  • Question: 15
You want to access data relevant to some running processes in the system. Which directory contains the system information describing the system and processes (for example, PID files) since the system was booted?

A. /sys
B. /srv
C. /proc
D. /var/run
E. /var/lock



  • Question: 16
View the Exhibit.
















The root user at server1 has connected to server200 using ssh. While trying to execute remote graphical applications he receives an error as shown in the Exhibit. What could be the possible solution to get rid of this error and run remote graphical applications safely through ssh? (Choose all that apply.)

A. Use the -X option with ssh while connecting.
B. Remove the ~/.Xauthority file on both server1 and server200.
C. Set the XAuthLocation parameter correctly in /etc/ssh/ssh_config.
D. Set the X11Forwarding parameter to yes in /etc/ssh/sshd_config.



  • Question: 17
Which command would help you identify and count how many lines have the letter "w" and the letters (together) in the words.txt file?
A. grep 'w' 'is' words.txt | wc -l
B. grep w words.txt | grep is | wc -l
C. grep w words.txt | grep is | wc -c
D. grep '\.w' '\.is' words.txt | wc -l



  • Question: 18
Multiple users can share a UNIX machine. This is made possible by the OS by using one user's idle time to service other users. What is this feature of an operating system identified as?
A. data sharing
B. time sharing
C. one-time initialization
D. light weight kernel threading
E. interrupt driven process handling


  • Question: 19
User scott issued the following command at the bash prompt:
[[email protected] ~]$read -t15 -n10 -s DAX

What is the purpose of issuing this command?

A. to make the read statement provide 15 seconds to enter up to 10 characters silently (no echo to terminal) into the $DAX variable
B. to make the read statement provide 15 seconds to enter a minimum of 10 characters echoing onto the terminal
C. to make the read statement provide 15 seconds to enter a minimum of 10 characters without echoing onto the terminal
D. to make the read statement provide 15 seconds to enter up to 10 characters, echoing onto to terminal, into the $DAX variable


  • Question: 20
Match the following signal values with their description.
1. 9        a. Hangup
2. 19      b. Terminate the process and dump core
3. 11      c. Kill signal
4. 1        d. Stop the process

A. 1-c, 2-b, 3-a,4-b
B. 1-c, 2-d, 3-b, 4-a
C. 1-d, 2-b, 3-c, 4-a
D. 1-d, 2-a, 3-c, 4-b


  • Question: 21
Note the command given below:
ls -l | grep hello\.gif
Which statement is true about this command?

A. It will long-list the file hello.gif.
B. It will return an error because an escape character \ is used.
C. It will long-list the files in the hello*gif format from the current working directory.
D. It will long-list the hello.gif, hello-gif files or any file in the hello? gif format.



  • Question: 22
Identify the two true statements about FTP servers. (Choose two.)

A. FTP servers typically listen on port 21.
B. FTP servers typically listen on port 20.
C. FTP servers send data to clients on port 21.D. FTP servers send data to clients on port 20.
E. FTP servers do not provide anonymous login by default.



  • Question: 23
A new user smith wants to customize the bourne shell by creating a new alias for the ls -l command. He wants to make the new alias persistent across logouts and also reboots. What could be done to make the new alias persistent only for smith?

A. Add the new alias to ~/.bashrc.
B. Add the new alias to ~/.profile.
C. Add the new alias to /etc/profile.
D. Add the new alias to ~/bash_profile.


  • Question: 24
The user scott tries to create a directory hierarchy and encounters the following error:

[[email protected] tmp]$ mkdir test/test1/stored/all


mkdir: cannot create directory `test/test1/stored/all`: No such file or directory


[[email protected] tmp]$pwd

/tmp

Which two commands can the user scott use to create the directory hierarchy successfully? (Choose two.)
A. mkdir /test/test1/stored/all
B. mkdir -p test/test1/stored/all
C. mkdir -r test/test1/stored/all
D. mkdirhier /test/test1/stored/all
E. mkdir -r /tmp/test/test1/stored/all
F. mkdirhier /tmp/test/test1/stored/all




  • Question: 25
Examine the following output:
[[email protected]]ps -f
UID PID PPID C STIME TTY TIME CMDroot 3944 3820 1 03:32 tty1 01:57 -bash
root 3984 3944 0 03:32 tty1 01:57 ksh
root 3985 3984 0 03:32 tty1 01:57 ps -f

Which columns would you analyze to find the most recently invoked shell?
A. Analyze only the PID.
B. Analyze only the UID.
C. Analyze only the PPID.
D. Analyze both the UID and PID.
E. Analyze both the PID and PPID.
F. Analyze both the UID and PPID.


  • Question: 26
As root you have changed the default login shell to one of the shells listed in /etc/shells file. Which file entry is modified as a result of this?
A. /etc/shadow
B. /etc/shells
C. /etc/passwd
D. /etc/default/useradd


  • Question: 27
View the Exhibit.






















The shell script is executed using the default shell interpreter with the input as w. What will be the output of the script based on this input?
A. It will print the current date and time.
B. It will list all the currently logged in users.
C. It will show that the input is not a valid option.
D. It will print the currently logged in users, current date, and time.
E. It will not show any result because the case block is terminated with an esac.


  • Question: 28
Which command gives the following output?
Date 03/12/2007, Time 12:00:01 AM
A. echo "Date date +%x , Time date +%r "
B. echo "Date `date +%x` , Time `date +%r` "
C. echo "Date `date +%r` , Time `date +%x` "
D. echo "Date `time +%x` , Time `time +%r` "


  • Question: 29
Which three statements are true about screen? (Choose three.)A. screen has the ability to lock a terminal.
B. screen has the ability to monitor a session.
C. screen windows do not adhere to vt100 standards.
D. All windows in a screen are dependent on each other.
E. Each window in a screen has its own scroll-back buffer.


  • Question: 30
Which statements are true about the File Extensions? (Choose all that apply.)
A. File extensions are just part of the file name.
B. File extensions are cared by all applications.
C. File content depends upon the file extensions.
D. File extensions do not always say what the file is.
E. File extensions have no special meaning to the kernel.


  • Question: 31
As root user you have set the environment variable  HISTIGNORE="ls:man:pwd:cat" with the other history-related shell variables at their default. What impact does it have on shell history?
A. History will ignore only the commands listed in the HISTIGNORE variable.
B. History will save only the first occurrence of the commands listed in the HISTIGNORE variable.
C. History will ignore only the commands, issued with any valid switch, listed in the HISTIGNORE variable.
D. History will save only the first occurrence of the commands, issued with any valid switch, listed in the HISTIGNORE variable.



  • Question: 32
View the Exhibit.













The user smith needs to display the MAC address only of eth0.
Which command gives the desired output?
A. ifconfig eth0 | awk '/eth0/ {print $0}'
B. /sbin/ifconfig eth0 | awk '/HW/ {print $4}'
C. /sbin/ifconfig eth0 | awk '/HW/ {print $5}'
D. /sbin/ifconfig eth0 | awk '/eth0/ {print $4}'


  • Question: 33
View the Exhibit and note the permissions and ownerships of the /sysdir directory. What could be
done to let the user scott write to and copy files from the directory without listing others files and
without compromising the security of the directory?













A. Add rwx to others permissions of the /sysdir directory.
B. Add scott as a member of the admins group and set permissions to 700 on the /sysdir directory.
C. Add scott as a member of the admins group and set the group permissions wx for the /sysdir directory.
D. Add scott as a member of the admins group and set the group permissions rx for the /sysdir directory.


  • Question: 34 

The user smith has logged in to the system and his current working directory is /tmp. Which
command changes the user current working. Which command changes the user's current working
directory to the user's home directory? (Choose all that apply.)
A. cd
B. cd ..
C. cd ~
D. cd ../~
E. cd /home
F. cd $HOME


  • Question: 35
The user smith executes the following command:
awk -F: '/bash$/ {nlines++; print $1;} END {print "\n", nlines}' /etc/passwd

What could be the purpose of using this command?
A. to print all lines in /etc/passwd that ends with bash
B. to print the name of all normal users in /etc/passwd
C. to print and count the names of the users who use the bash shell
D. to print the total number of lines in /etc/passwd that ends with bash


  • Question: 36
You want to customize the default background color in an X window system using command-line options. What would you do to achieve this task?
A. Edit the ~/.xinitrc file.
B. Edit the ~/.Xdefaults file.
C. Edit the ~/.Xresources file.
D. Edit the ~/.Xauthority file.


  • Question: 37
A printer has been configured on a Linux box in a heterogeneous network using CUPS. A user sends a print job from a WINDOWS machine. Identify the  statement that holds true in this scenario.
A. The user will not able to print because he/she is on a non-UNIX system.
B. The user will not able to print because the printer is configured using CUPS.
C. The user will be able to print because the printer follows the IPP standard.
D. The user will not be able to print because WINDOWS does not support CUPS by default.



  • Question: 38
smith is trying to send a message to the local user bob using the write command and he receives an error as shown below:
[[email protected] ~]$write bob
Write: bob has messages disabled
[[email protected] ~]$

What could be done to overcome the error?
A. bob should set the logged in terminal to the tty group.
B. bob should enable talk and ntalk on his system.
C. bob should accept messages using the mesg y command.
D. smith should indicate the terminal on which bob is logged in.



  • Question: 39
User smith on station2 is trying to chat with the remote user bob on station1 using the talk  command. smith receives an error message as shown below:
[[email protected] ~]$talk [email protected]
[No connection yet]
[ Error on read from talk daemon: Connection refused ]
[[email protected] ~]$

What can the root user do to resolve the issue? (Choose two.)
A. let smith retry talk by reading from STDIN and sending to bob
B. let smith retry talk after changing the group of talk command to tty
C. let smith retry the talk request with UDP port 518 open on both systems
D. let smith retry talk after restarting the xinetd service with ntalk enabled on both systems
E. let smith retry talk after restarting the network service with the UDP port 517 blocked on both systems



  • Question: 40
What are the improvements of vim over vi? (Choose all that apply.)
A. multi-level undo
B. online help system
C. command-line completion
D. multiple windows and buffers
E. supports using arrow keys in command mode
F. search and replace operations in command mode


  • Question: 41
Match the following file redirection operators with their functions:
1) <                          a) redirects STDOUT to a file (overwrite)
2) >                          b) redirects STDIN from a file
3) >>                   c) redirects both STDOUT and STDERR
4) 2>                        d) redirects STDOUT to a file (append)
5) 2>>                 e) redirects STDERR to a file (overwrite)
6) &>               f) redirects STDERR to a file (append)
7) 2>&1           g) redirects both STDOUT and STDERR

A. 1-b, 2-a, 3-d, 4-e, 5-f, 6-c, 7-g
B. 1-b, 2-e, 3-f, 4-a, 5-d, 6-g, 7-c
C. 1-c, 2-e, 3-f, 4-a, 5-d, 6-b, 7-g
D. 1-c, 2-a, 3-d, 4-f, 5-e, 6-g, 7-b
E. 1-b, 2-a, 3-d, 4-f, 5-e, 6-c, 7-g
F. 1-b, 2-e, 3-d, 4-a, 5-f, 6-c, 7-g


  • Question: 42
The /data directory that belongs to the apps group is set with 1770 permissions. The details of the apps group members are given below.
# groups smith bob scott
smith : smith apps
scott : scott appsbob : bob apps
What are the effective permissions for each of these users on other users' files and directories in the /data directory?
A. Read, write, and execute permissions on files and directories.
B. Read permission on files and read and execute permissions on directories.
C. Read and write permissions on files and read, write, and execute permissions on directories.
D. Read permissions only because full permission is set to the owner of the files and directories only.


  • Question: 43
As root you have issued the following command :

[[email protected]]# rpmbuild --rebuild sendmail-8.12.8-9.80.src.rpm

What does the rpmbuild command do? (Choose two.)

A. It builds the sendmail source package.
B. It only installs the binary software produced from the sendmail source package.
C. It only compiles the binary software produced from the sendmail source package.
D. It does both the compilation and installation of the binary software produced from the sendmail source package.


  • Question: 44
You want to check any particular user is consuming a large amount of CPU. Which command would you use to check the CPU used by a user?
A. w
B. who
C. free
D. users
E. finger


  • Question: 45
You have issued the following command:
mkdir -p test/a{dax,connor,bryan}g/vo{in,out,tmp}

Which of the following directories will it create? (Choose all that apply.)
A. test/voin/adaxg
B. test/adaxg/voout
C. test/aconnorg/voin
D. test/adaxnnorg/voinout
E. test/aconnoyang/vointmp


  • Question: 46
The root user on your system has issued the ln -s file1.txt file2.txt command. Which two statements are true? (Choose two.)
A. file2.txt will have 777 permissions.
B. file1.txt will be symbolically linked to file2.txt.
C. file2.txt will be symbolically linked to file1.txt.
D. file2.txt and file1.txt will have the same inode number.
E. file2.txt and file1.txt should exist on the same file system.


  • Question: 47
View the Exhibit and note the directory hierarchy. How would you delete the /test1 directory hierarchy? (Choose all that apply.)


A. rm -rf /test1
B. rmdir -r /test1
C. rmdir -p /test1
D. rm -d /test1/hello/fine/documents
E. rm -rf /test1/hello/fine/documents
F. rmdir -p /test1/hello/fine/documents


  • Question: 48
What would be the default permissions on files and directories created by a user with umask 027?

A. Files will have 640 permissions and directories will have 750 permissions.
B. Files will have 639 permissions and directories will have 750 permissions.
C. Files and directories will have 000 permissions because 027 is not a valid umask.
D. Files and directories will have default permissions as of the default umask because 027 is not a valid umask.
E. Files will have 666 permissions and directories will have 777 permissions because 027 is not a valid umask.


  • Question: 49
Observe the following while loop:
while true do echo " Welcome" sleep 5 done

What does the while statement do in the script when the condition is true?
A. It executes the echo command 5 times with a sleep time of 5 minutes.
B. It executes the echo command infinitely with a sleep time of 5 minutes.
C. It executes the echo command 5 times with a sleep time of 5 seconds.
D. It executes the echo command infinitely with a sleep time of 5 seconds.


  • Question: 50
Which command is used for compilation when installing software from the source code?
A. make
B. install
C. ./configure
D. make install


  • Question: 51
The user smith has issued the command:
cut -f1,3 -d: /etc/passwd | tr a-z A-Z > file1.txt

What could be the purpose of using this command?

A. to map the username, UID, GID on the system in uppercase to file1.txt
B. to map the username along with UIDs on the system in uppercase to file1.txt
C. to map the username, UID, passwords on the system in lowercase to file1.txt
D. to map the username along with passwords on the system in uppercase to file1.txt

  • Question: 52
What is the minimum number of disk partitions required to have a successful Linux installation?
A. 2 (two)
B. 4 (four)
C. 1 (one)
D. 3 (three)


  • Question: 53
Which statements are true about a process? ( Choose all that apply.)

A. It is associated with a nice value.
B. It is associated with a Process ID (PID).
C. It does not inherit the environment from the parent process that spawns it.
D. It uses only RAM irrespective of the amount of memory available in the system.
E. Each process will normally be associated with the UID and GID of the user that launched the program.


  • Question: 54
Identify the program that runs with the real and effective UID and GID of the switched user when you switch from one user to another using su command.

A. a logout script
B. the id command
C. an interactive shell
D. the login command
E. the chroot command


  • Question: 55
You are planning to add the new printer1 print queue and also want to make it the default print queue. Which of the following two commands would help you achieve the task? (Choose two.)

A. lpadmin -d printer1.
B. lpadmin -x printer1.
C. lpadmin -p printer1 -E parallel:/dev/lp0.
D. lpadmin -p printer1 -E -v parallel:/dev/lp0.


  • Question: 56
Match the following Linux kernel virtual hierarchies with their content:
1) /proc                    a) Per process information directories and other tunables
2) /sys                       b) RAM drive for POSIX shared memory operations
3) /dev/pts                c) Kernel object data structures
4) /dev/shm               d) Auto-ownership of terminals (ttys)

A. 1-a, 2-c, 3-d, 4-b
B. 1-b, 2-a, 3-d, 4-c
C. 1-a, 2-b, 3-d, 4-c
D. 1-b, 2-a, 3-c, 4-d


  • Question: 57
What would be the output of the nested for loop given below?


for (( i=1; i<=5; i++))

do

for (( j=1; j<=5; j++))

do

echo -n "$i"

done

echo ####

done

A. 1 1 1 1 12 2 2 2 23 3 3 3 34 4 4 4 45 5 5 5 5
B. 1 2 3 4 51 2 3 4 51 2 3 4 51 2 3 4 51 2 3 4 5
C. 5 4 3 2 15 4 3 2 15 4 3 2 15 4 3 2 15 4 3 2 1
D. 5 5 5 5 54 4 4 4 43 3 3 3 32 2 2 2 21 1 1 1 1


  • Question: 58
Which statement is true about a normal user created with UID less than 500?

A. The user will not have an interactive login shell.
B. The user will have the privilege to mount and unmount file systems.
C. The user account can be used only for system service-related tasks.
D. The user will have all normal user features like home directory, shell, and so on, by default.
E. The user will be restricted from logging in to the system because the UID < 500 is reserved for system users or pseudo accounts.


  • Question: 59
You want to archive a directory and its subdirectories (excluding a list of subdirectories from a file) using the tar command. Which option would help you to do this?
A. -F
B. -X
C. -C
D. --exclude




  • Question: 60
View the Exhibit.


















What is the output of the shell script when executed at the bash shell?
A. 1223334444
B. 1121231234
C. 4444333221
D. 1234123121


  • Question: 61
As a root user you execute the commands as shown below:
[[email protected]]# a=$((10 % 4 + 6 * 2))

[[email protected]]# echo $a

What would be the output of the echo statement?
A. 2
B. 12
C. 14
D. 10



  • Question: 62
You executed the following command to verify the integrity of sendmail:

[[email protected] ~]# rpm -Va sendmail

.......T. c /etc/mail/sendmail.cf

S.5....T. c /var/log/mail/statistics

[[email protected] ~]#

What do infer about the /var/log/mail/statistics file from the output?

A. The permissions, user ownership, and file type have changed.
B. The permissions, group ownership and file type have changed.
C. The user ownership, group ownership and file type have changed.
D. The MD5 signature, file size, and modification time have changed.


  • Question: 63
You have the copy of all the rpms in the /RPMS directory on your local Linux machine. After logging in as root and changing to the /RPMS directory, you try to install the mysql package using the rpm command. You end up with an error message as shown below:
Error: Failed dependencies: Perl(DBI) is needed by mysql.
How would you overcome this error and install mysql successfully by resolving the dependencies?

A. by installing the software using rpm with the -F option
B. by installing the software using rpm with the --aid option
C. by installing the software using rpm with the --force option
D. by installing the software using rpm with the --nodeps option


  • Question: 64
View the Exhibit.



















As bob you have logged in at the tty1 terminal and run the commands as shown in the Exhibit. You want to list the background jobs in the current terminal and issue the jobs command. Which statement is true in this context?

A. The plus sign indicates the previous job.
B. The plus sign indicates the last stopped job.
C. Only the job with a minus sign can be made to run in the foreground again.
D. Only the job with a plus sign can be made to run in the foreground again.


  • Question: 65
You have opened three terminals and the Firefox browser at Graphical User Interface (GUI). How can you ensure that the same applications and windows start on your next login to GUI?

A. While logging out, save the settings in the ~/.Xresources file.
B. While logging out, use the hot key, [Control] + [Alt] + [Backspace].
C. While logging out, use the kill command with signal 12 to kill gdm-binary.
D. While logging out by selection, log out from the action menu. Click the save current setup option.



  • Question: 66
The user smith , whose primary group is smith, would like to create a file in his home directory, which belongs to the group apps. Which two statements are correct? (Choose two.)

A. SGID should be set on the destination directory to let users create files that belong to the group other than their primary group.

B. The user smith could create a file that belongs to the apps group only if his private group is the apps group as per /etc/group.

C. The user smith could use the newgrp command to log in to the apps group and his private group will be changed to apps group for a particular session if his name is listed in /etc/group as a member of apps group.

D. The user smith could use the newgrp command to log in to the apps group, but a password is required to change his private group to apps group for a particular session if his name is not listed in /etc/group as a member of apps group.


  • Question: 67
Which system help facility gives the help page exactly as using -k switch with man?
A. info
B. whatis
C. apropos
D. --help option with the command


  • Question: 68
Where do the manual (man) pages for all commands reside in the File System Hierarchy (FSH)?
A. /usr/share/man
B. /usr/share/info/man
C. /usr/man/share/locale
D. /usr/share/locale/man


  • Question: 69
Match the mpage options with their functionalities.
1. mpage -r            a. toggle printing on both sides of the paper (duplex mode)
2. mpage -t             b. print in landscape mode instead of the default portrait
3. mpage -l             c. reverse the order in which the pages are printed

A. 1-c, 2-a, 3-b
B. 1-b, 2-c, 3-a
C. 1-c, 2-b, 3-a
D. 1-b, 2-a, 3-c


  • Question: 70
What are the extra features that the Bourne Again Shell (bash) has compared to the Bourne Shell (sh)? (Choose all that apply.)

A. background exit status
B. read values from the terminal
C. combine STDOUT and STDERR
D. file name completion and command history
E. allows functions and variables with the same name
F. expansion of positional parameters beyond $9 with ${num}


  • Question: 71
Match the following arguments with their actions when used with the find command:
1) -print          a) Allows a command to be run against each matching file
2) -ls                b) Is the default action and displays matches
3) -exec           c) Displays full details on matches
4) -ok              d) Can be used when you want a confirmation prompt
A. 1-b, 2-c, 3-a, 4-d
B. 1-b, 2-a, 3-d, 4-c
C. 1-c, 2-a, 3-b, 4-d
D. 1-c, 2-d, 3-a, 4-b


  • Question: 72
Which statement is true about the privileges granted to a user with the UID of 0?
A. The system ignores privileges to modify software installed on the system.
B. Privileges are granted as per the permissions set on every file and device known to the system.
C. Privileges are granted only to read most of the configuration files and documentation files in the system directories, not modify them.
D. The system ignores all permissions when responding to commands from the user and provides read and write permissions to every file and device known to the system.



  • Question: 73
View the Exhibit.




















As the user bob, you list all the background jobs using the jobs command. You want to bring the last job stopped into the foreground. Which three commands would you use to achieve this task? (Choose three.)
A. fg
B. %2
C. %3
D. %1
E. fg 2
F. fg 3
G. fg 1


  • Question: 74
Why is a Linux operating system always developed and released under a common standard known as Linux Standard Base (LSB)?
A. to avoid interoperability
B. to avoid POSIX Compliance
C. to ensure application-level diversity
D. to ensure compatibility among distributions


  • Question: 75
Match the following Regular Expression Character classes with their class descriptions:
1) [:alnum:]           a) match all control characters
2) [:alpha:]            b) match all printable characters (not including space)
3) [:graph:]           c) match all letters and digits
4) [:print:]             d) match all letters
5) [:cntrl:]              e) match all printable characters

A. 1-d, 2-c, 3-b, 4-e, 5-a
B. 1-c, 2-d, 3-e, 4-a, 5-b
C. 1-d, 2-c, 3-e, 4-b, 5-a
D. 1-c, 2-d, 3-b, 4-e, 5-a



  • Question: 76
As user smith you want the CPU utilization of all the users logged on to server1 server. You want the information available automatically as soon as you login to the bash login shell and want the information available only to smith. What would you do on server1, which has all the default shell configuration files, to accomplish the task?

A. Add the w command to ~/.profile file.
B. Add the who command to ~/.profile file.
C. Add the w command to ~/.bash_profile file.
D. Add the who command to ~/.bash_profile file.



  • Question: 77
A normal user bob wants to get into the graphical mode and executes the startx command. Identify the statement that holds true in this context.

A. The system switches to run level 5.
B. The user is taken into the graphical mode without being prompted for a password.
C. The user is taken into the graphical mode and the system prompts for a password to log in.
D. The user is taken into the graphical mode and the system continues in the old run level and prompts for a password for the user to log in.



  • Question: 78
You have executed the following command as root user:
find /home | cpio -o -H tar -F [email protected]:/dev/nst0 --rsh-command=/usr/bin/ssh
What could be the purpose of issuing this command?

A. to archive the contents of the /home directory to the remote machine's tape drive
B. to archive the contents of the /home directory in tar format to a remote machine's tape drive
C. to archive the contents of the /home directory in cpio format to a remote machine's tape drive
D. to archive the contents of the /home directory in cpio and tar format to a remote machine's tape drive


  • Question: 79
As a Linux system administrator you want to check and print the names of the users having UID > 500, and are not using the bash or csh shell. Which two commands would help you to do so? (Choose two.)

A. awk -F: '/([^(bash|csh)])$/ {if ($3 >500) print $1}' /etc/passwd
B. awk -F: '/([(bash)]|[(csh)])$/ {if ($3 >500) print $1}' /etc/passwd
C. awk -F: '/([^(bash)]|[^(csh)])$/ {if ($3 >500) print $1}' /etc/passwd
D. awk -F: '/([^(nologin)]|[^(ksh)])$/ {if ($3 >500)print$2}' /etc/passwd



  • Question: 80
You execute the following two commands at the bash prompt in the same order as shown below:

[[email protected]]# myexpr=$((14*18))
[[email protected]]# echo $((56+$myexpr))

What would be the output of the echo command?
A. 56
B. 308
C. 252
D. $myexpr
E. $((56+$myexpr))





  • Question: 81
Match the following Regular Expression Quantifiers with their appropriate values:

1) * a) match 0 or 1 times
2) + b) match exactly n times
3) ? c) match at least n times
4) {n} d) match 0 or more times
5) {n,} e) match 1 or more times

A. 1-e, 2-d, 3-a, 4-c, 5-b
B. 1-d, 2-e, 3-a, 4-b, 5-c
C. 1-a, 2-e, 3-d, 4-c, 5-b
D. 1-d, 2-a, 3-e, 4-b, 5-c



  • Question: 82

As user smith you want to log in to a remote machine in a securely encrypted channel. Which utility
would you use for the purpose?
A. ssh
B. ftp
C. telnet
D. rlogin


  • Question: 83
The user smith issued the PS1='[\w \d \! \#]'command. What is the purpose of using this command?

A. to display the date, history number, and a "#" at his shell prompt
B. to display the week day, date, history number, and a "#" at his shell prompt
C. to display the command number, date, and "#" at his shell prompt along with the working directory
D. to display the command number and history number of the command, date, and current working directory at his shell prompt



  • Question: 84
What would be the output of the nested for loop given below?

for (( i=1; i<=5; i++ ))
do
for (( j=1; j<=i; j++ ))
do
echo -n "$j"
done
echo " "
done

A. 112123123412345
B. 123451234123121
C. 1234512345123451234512345
D. 123451234123123412345



  • Question: 85
Match the following variables available to the user that are set internally by the shell, with their descriptions:
1) $1 - $9                a) process ID of the shell
2) $*                        b) the string containing all the arguments to the shell
3) $?                       c) process ID of the last command run in the background4
) $$                         d) positional parameters
5) $!                        e) exit status of the most recently executed command

A. 1-d, 2-a, 3-e, 4-b, 5-c
B. 1-d, 2-c, 3-a, 4-b, 5-e
C. 1-d, 2-b, 3-e, 4-a, 5-c
D. 1-d, 2-a, 3-c, 4-b, 5-e



  • Question: 86
Identify the feature that is common to both the GNOME and KDE desktops.

A. Both are themeable.
B. built on the Qt library
C. built on the GTK library
D. Both are created by FSF.
E. Both use metacity as the default window manager.







  • Question: 87
You have created the user smith on your Linux machine. What is the default location of smith's mail spool on the machine?
A. ~smith/mbox.
B. /var/mail/spool/smith.
C. /var/spool/smith/mail.
D. /var/mail/smith/spool.
E. /var/spool/mail/smith.



  • Question: 88
A printer has been connected to the single available port. You execute the following command at the
prompt:

echo "This is a simple test" > /dev/lp0

What can you infer from the command?

A. The text is saved in the /dev/lp0 file.
B. The text is simply echoed on to the standard output device.
C. The text will be printed by the printer attached to/dev/lp0.
D. The text will not be printed because the printer has not been mentioned explicitly on the command line.



  • Question: 89
The user smith on server1 wants to check the IP address of the machine along with the MAC address.
View the Exhibit that shows the error message received by smith during this.
Which statement is true in this scenario?















A. He can view the IP address and the MAC address by executing the ip addr command.
B. He cannot execute the command which resides in /sbin where system binaries for root user resides.
C. He cannot view the IP address and MAC address of the machine because only root user can list network interfaces.
D. He can view the IP address and the MAC address by giving the absolute path of the command as /sbin/ifconfig.




  • Question: 90
The user scott issues the cp -f ~/file1 /tmp/dir2 command. Which of these statements are true about this command? (Choose all that apply.)

A. The /root/file1 file is copied to the /tmp/dir2 directory.
B. If /tmp/dir2 exists and is a file, it will be overwritten by file1.
C. The file1 file is copied from scott's home directory to /tmp/dir2.
D. If /tmp/dir2 does not exist, ~/file1 will be copied as /tmp/file1.



  • Question: 91

The user smith issued the egrep "^[[:upper:]]" words.txt command.
What does this command do?

A. displays all lines in the words.txt file that contains an uppercase letter
B. displays all lines in the words.txt file that begins with an uppercase letter
C. displays all lines in the words.txt file after translating uppercase letters to lowercase
D. displays all lines in the words.txt file after translating lowercase letters to uppercase




  • Question: 92
You have downloaded a DOS-formatted text file through anonymous ftp using binary transfer mode to your Linux machine. What impact does this have on the downloaded text file?

A. The text file is stripped off the carriage return.
B. The text file is stripped off the line feed character.
C. The text file gets corrupted because of incompatibility in the format.
D. The text file does not undergo any processing because of the binary transfer mode.


  • Question: 93
Your system is running in text-based mode. During the next reboot, you want it to directly boot into the graphical mode. How would you achieve this task?

A. Edit the configuration file /etc/inittab and change the default run level to 5.
B. Edit the configuration file /etc/inittab and change the default run level to 3.
C. Edit the configuration file /etc/inittab and change the default run level to 1.
D. Edit the configuration file /etc/inittab and change the default run level to 6.




  • Question: 94
The user bob on station1 wants to chat using talk with smith on station2 in the same network. Identify the statement that holds true in this scenario.

A. smith has to respond to bob only from station2.
B. smith can respond to bob from any machine within the network.
C. bob can use only the login name to send a message to smith using talk.
D. bob can use talk to chat with only the locally logged-in users on station1.



  • Question: 95
Which commands, without any options, could help a user to read the entire contents of a text file in his or her home directory? (Choose two.)

A. xxd
B. less
C. grep
D. head
E. more
F. strings


  • Question: 96
You have opened a file called newfile.txt in the vi editor and in command mode, you enter :0,$ s/hello/init/g. What could be the purpose of issuing this command?

A. to replace the word hello with the word init globally in the newfile.txt file
B. to replace the word init with the word hello globally in the newfile.txt file
C. to delete all the lines containing the word hello and init in the newfile.txt file
D. to replace the word hello with the word init from the cursor position in the newfile.txt file



  • Question: 97

The /projects directory is being shared by server1 with the share name datashare through samba. To access the shared directory as bob you issue the following command:

smbclient //server1/datashare -U 'bob%foouser'

What happens when you execute the command?

A. All the samba shares on server1 will be displayed.
B. bob will be prompted for a password to access the share.
C. All the shares on server1 accessible to bob will be displayed.
D. The share will be accessed with the credentials of bob without being prompted for a password.



  • Question: 98
Which two statements are true about Regular Expressions? (Choose two.)

A. They are build upon expressions that match multiple characters.
B. They can be used only by commands, not programming languages.
C. They help most characters, letters, and numbers match themselves.
D. They supports "<" and ">" at the beginning and end of sentences only.
E. They accept text patterns from STDIN, from a network connection or from a user supplied input.




  • Question: 99
Which statements are true about a source RPM? (Choose all that apply.)
A. Source RPM cannot be used to build a binary rpm.
B. Source RPMs can be compiled and installed directly.
C. Source RPMs allow to customize the package for a particular CPU.
D. Source RPM does not contain information about how to install the software.




  • Question: 100
You want a script to be automatically run for the default graphical desktop as soon as you log in.
What would you do to achieve this task?

A. Go to Applications > System Tools > Task Scheduler and add the absolute path of the script.

B. Go to Applications > System Settings > Add/Remove Applications and add the absolute path of the script.

C. Go to Applications > Preferences >More Preferences->Preferred Applications and add the absolute path of the script.

D. Go to Applications > Preferences > More Preferences > Sessions and add the absolute path of the script in Startup programs.






  • Question: 101

You have logged in as the root user into run level 3. What happens if you execute the xinit command?

A. The system changes to runlevel 5.
B. The system changes to runlevel 4.
C. The system continues to run in runlevel 3.
D. The system changes to runlevel 1 (single).



  • Question: 102
Identify the shareable directories according to File system Hierarchy Standard (FHS). (Choose all that apply.)
A. /etc
B. /usr
C. /var/run
D. /var/lock
E. /var/mail
F. /etc/sysconfig



  • Question: 103
Identify the files that are hard linked to each other, from the Exhibit.




























 

A. a.txt and b.txt
B. b.txt and newfile
C. file1.txt and file2.txt
D. file1.txt and config.txt
E. a.txt ,b.txt and newfile




  • Question: 104
You have a file named newbackup on the server1.example.com server. To download the file through lftp as user bob, you issued the following command:

[[email protected] ~]$ lftp ftp.server1.example.com/pub/> get newbackup &

After a while, before the download is completed, you quit lftp. Which statement about lftp holds true in this context?

A. It will continue to run in the background but stops downloading the file.
B. It ignores the quit signal and continues the download until it completes it.
C. It will continue to run in the background until the entire file has been downloaded.
D. It will run as a foreground process until the file is downloaded completely and then quits.


  • Question: 105
You have issued the following command:

echo -e "Welcome\nTo Oracle\nEnterprise\rLinux"

Why would you use the -e switch? (Choose two.)

A. to redirect the output to the standard output device
B. to remove the normal newline character from the end of the output
C. to cause echo to honor the escape sequence for the carriage return
D. to cause echo to honor the escape sequence for both the newline characters



  • Question: 106
Which two statements are true about the init process? (Choose two.)

A. Process ID (PID) of init is always 0.
B. The first process spawned by the kernel is init.
C. init uses the exec() method to spawn a new process.
D. init reads the /etc/inittab file to load the default run level.



  • Question: 107

Which statements are true about xauth? (Choose all that apply.)

A. It stores all tokens in a file on the system.
B. It must be available to use X11 forwarding.
C. It distributes token on a host-by-host basis.
D. It can be used to control token-based access control.
E. It is not possible to install just xauth without installing the entire X server.



  • Question: 108

You executed the following command on a Linux machine:

sed s/hello/fun/g file1.txt | tr A-z -Z> file2.txt

What three things would this command do? (Choose three.)

A. Save all changes to file2.txt.
B. Translate all uppercase characters to lowercase.
C. Translate all lowercase characters to uppercase.
D. Modifies file1.txt and creates file2.txt.
E. Replace all occurrences of the entry hello with the entry fun.
F. Replace all occurrences of the entry fun with the entry hello.



  • Question: 109
You have the ps program and several child processes running in the tty1 terminal. What signal will the child processes receive if the tty1 terminal is killed?

A. HUP
B. SIGINT
C. SIGSTOP
D. SIGTERM




  • Question: 110
You have logged in to your Linux box as a normal user with the default desktop. After working for a while, you plan to change your desktop to KDE. How would you change the desktop?

A. by configuring the /etc/X11/prefdm file
B. by configuring the /etc/X11/xorg.conf file
C. by configuring the /etc/sysconfig/desktop file
D. by using the switchdesk command with KDE as the argument




  • Question: 111
You have logged in at the tty1 terminal on your local machine and want to display all the child processes that have an associated terminal. Which command would help you achieve this task?

A. ps
B. ps a
C. ps -e
D. ps -a



  • Question: 112
Which statements are correct about a command shell? (Choose all that apply.)

A. It initializes synchronous interrupts.
B. It enables task automation using scripts.
C. It handles all communications with devices attached to the system.
D. It handles interaction between the user and the kernel when a user is operating at the command line.



  • Question: 113
You have executed the following command:

find . -name "prg.conf" -exec chmod o+r '{}' \;

What is the expected output of this command?

A. Locate all the files named prg.conf in the current working directory and add execute permissions for others on them.
B. Locate all the files named prg.conf only in the current working directory and process them by using the chmod o+r command.
C. Locate all the files named prg.conf in the current working directory and its subdirectories and add read permission for others.
D. Locate all the files named prg.conf in the current working directory and subdirectories and add execute permissions for others on them.



  • Question: 114
While using the vi editor in command mode, which key sequences will delete six words? (Choose all that apply.)

A. d6w
B. 6dw
C. dw6
D. wd6
E. 6dd


  • Question: 115
View the Exhibit.


















 
What are the privileges granted to the user smith on the /tmp/backup directory?

A. He can only list the contents of /tmp/backup.
B. He can only navigate to the /tmp/backup directory.
C. He can change to and copy contents from the /tmp/backup directory.
D. He can only change to and from the /tmp/backup directory but cannot list its contents.





=======================


Atenção!!


Para o post não ficar muito grande, as questões nº 116 até a nº 230, 
juntamente com o gabarito de todas as questões estão na parte 2 do simulado, 
neste link:

Mais vistos no mês:

As melhores distribuições Linux para 2017

Teste de Performance de Rede com Iperf

TuxMath - Tux, do Comando da Matemática. Ensino e diversão a crianças.

Aula #14 - Os sistemas de arquivos ext2/ext3/ext4

Modelo Firewall Completo em Iptables para pequena rede/office

DHCP - Guia Completo

OPNsense - Firewall Open Source

SSD no linux

Administração de sistema e Deploys: Ansible, Chef, Fabric, Puppet ou Salt?

Oracle Linux 7.0 Server com Xfce - Instalação e configurações iniciais