Finding a directive issued by your organization listing several important CVEs (Common Vulnerability and Exposures), you find one for Linux OpenSSH (CVE-2006-5764), which might apply to your oracle Linux systems. What command would help ensure that a patch has been applied to close this vulnerability on an Oracle Linux 6 system running OpenSSH server?
A. yum listcves openssh
B. rpm qa | grep openssh | grep 5794
C. rpm q - - changelog openssh | grep 5794
D. yum sec list cves | grep 5794
E. yum sec list cvesApplied
View the exhibits.
Examine the output of sar command and the top command in the Exhibits. Which statement is the correct interpretation of this data?
A. The system is running low on swap space and memory.
B. CPU is Idle and the system has plenty of free memory available.
C. The CPU utilization is high and one process is using most of the CPU.
D. The system is idle with very little memory, CPU, and I/O utilization.
Which three steps are involved in the installing Ksplice on servers that will be updated?
A. You have to be logged as user "ksplice" on the server you want to prepare and install Oracle Ksplice on.
B. The Uptrack package needs access directly or through a proxy to the Oracle public yum repository (http://public-yum.oracle.com/) to download the required packages for the uptrack-* utilities to be able to work correctly.
C. Download the install-uptrack script using the "wget N http://www.ksplice.com/uptrack/install-uptrack" command.
D. You have to be logged in as user "root" on the server you want to prepare and install Oracle ksplice on.
E. The uptrack package will set up a yum repository (/etc/yum.repos.d/ksplice-uptrack.repo) and download the required package for the uptrack-* utilities to be able to work correctly.
F. Download the ksplice ISO image from https://edelivery.oracle.com/linux and then run the "sh installuptrack" script from the ISO image.
What happens when the following command is run?
# authconfig - - passalgo = md5 - - update
A. It produces the MD5 checksum of the input data.
B. It configures the MD5 checksum for newly authored documents
C. It converts the stdio input to MD5 algorithm.
D. It changes the user password hashing algorithm to MD5.
DTrace is being ported from Solaris to Oracle Linux. Which three statements are true for the DTrace tool?
A. DTrace allows static and dynamic tracing of your applications and your kernel.
B. DTrace tool is used to compile debug kernel modules and device drivers
C. DTrace allows you to dynamically define probe points on the fly.
D. DTrace probes and probe points are usually defined by the user using scripts written in a language called D.
E. DTrace tool is based on the strace Linux tool and includes both user and kernel strace features.
Which three statements are true about the Kickstart installation method?
A. The Kickstart installation method helps to speed boot time after the system restarts.
B. A Kickstart file is created for every installation.
C. The Kickstart Configurator can be used to create or make changes to a kickstart file.
D. The Kickstart method allows for unattended and more standardized installations.
E. The Kickstart method of configuration is performed after the installation of the host operating system.
You want to add a README.txt file in the home directory of every new user that you create by using the useradd command on your Oracle Linux system. In which directory will you place the README.txt file so that it automatically gets copied to the new user's home directory when the user is created?
A. /home/users
B. /etc/default/useradd
C. /etc/default
D. /etc/skel
Which two commands can be used on Oracle Linux to find the routing table and default gateway information of your network?
A. netstat r
B. route show
C. cat /proc/route
D. route n
E. traceroute
Examine the following kernel boot command-line parameters.
kernel /vmlinuz-2.6.32-220.e16 ro root = /dev/VolGroup00/LogVol00 init = /bin/bash ether = 0, 0, eth1 rhgb quiet
Which two statements are true?
A. An unrecognized kernel boot command-line parameter has been used.
B. The system will boot without password.
C. Boot argument ether will force probing for a second ethernet card (NIC).
D. It will not probe for any hard drive.
The sshd service running and you execute the following command:
# chkconfig sshd off
What happens when you run this chkconfig command?
A. The sshd service disabled only for runlevel 5.
B. The sshd service id disabled for runlevels 2, 3, 4, and 5, but the ssh service is still available until the next reboot.
C. The sshd service is disabled for runlevels 2, 3, 4, and 5 and ssh service is stopped.
D. The sshd service is disabled only for current runlevel.