In the scripts subdirectory under your home directory there is a file named tstparse.sh. You want to set an Extended ACL so thejsmith user has all permissions to just this file. Which command will accomplish this?
A. setacl -a user:jsmith:rwx -/scripts/tstparse.sh
B. extacl -a user=jsmith:rwx -/scripts/tstparse.sh
C. modacl user=jsmith:rwx -/scripts/tstparse.sh
D. setfacl -m u:jsmith:rwx -/scripts/tstparse.sh
Explanation: The command that you would use to set an Extended ACL so that the jsmith user has all permissions to just the tstparse.sh file in your scripts subdirectory under your home directory is setfacl -m u:jsmith:rwx ~/scripts/tstparse.sh. This command will modify (or create if it does not exist) the Extended ACL for the specified file and add an entry for the jsmith user with read, write, and execute permissions. You can use getfacl ~/scripts/tstparse.sh to view the Extended ACL for the file.
What does the following command allow you to do? alias endear"
A. You can type clear to run the c command.
B. You can type c to run the clear command.
C. Nothing, since there is not a command named alias.
D. It launches a second Login Shell and allows you to rename the clear command to just c.
E. It allows you to rename the clear command to just c and then deletes the clear command.
Explanation: The command that allows you to create an alias command is alias. The alias command can be used to define a short name or abbreviation for another command or sequence of commands. The syntax of the alias command is alias name=‘command’. For example, alias c=‘clear’ will create an alias named c for the clear command. You can then type c to run the clear command. To remove an alias, you can use unalias name.
If the file1.txt file already exists in your home directory, what will the touch -7file1.txt command do if anything?
A. This command displays a message that file1.txt is a normal file.
B. This changes the access and modification times of the existing file1.txt file.
C. This will delete the existing file1.txt file and create a new zero byte file using the same name.
D. This generates an error since file1.txt already exists.
E. This causes any additional data to be appended to the existing file1.txt file.
F. This command displays a message that file1.txt is a normal file and displays the size of the file.
Explanation: If the file1.txt file already exists in your home directory, the touch -7file1.txt command will change the access and modification times of the existing file1.txt file. The touch command can be used to create new empty files or update the timestamps of existing files. The -7 option specifies that only one timestamp should be changed instead of both.
Which Network Interface type supported by SLES is used for link aggregation?
A. Basic
B. Bridge
C. VPN
D. Bond
E. Custom
Explanation: The network interface type supported by SLES that is used for link aggregation is bond. Link aggregation is a technique that combines multiple physical network interfaces into one logical interface for increased bandwidth and redundancy. A bond interface can use different modes and options to balance traffic and handle failures.
Which directory contains the initrd file?
A. /loader/grub
B. /startup/grub2
C. /boot/grub2
D. /loader
E. /boot
F. /startup
Explanation: The initrd file is an initial ramdisk image that contains the necessary drivers and tools to mount the root file system and start the boot process. It is usually located in the /boot directory along with the kernel image (vmlinuz).
Which UID does the root user have?
A. 0
B. 001
C. 100
D. 1001
E. The root user does not have an ID assigned
Explanation: The UID that the root user has is 0. The UID (user ID) is a numeric value that uniquely identifies a user on the system. The root user is the superuser or administrator who has full privileges and access to all files and commands on the system. The root user always has the UID of 0, regardless of its name or password.
Which statements about log file rotation are true? (Choose two)
A. Configuration files in the /etc/logrotate.d/ directory can override settings in /etc/logrotate.conf.
B. The /etc/logrotate.conf file controls which log files will be compressed or deleted based on some regular interval or when the log file reaches a particular size.
C. The /etc/cron.daily/logrotate file controls which log files will be compressed or deleted based on some regular interval or when the log file reaches a particular size.
D. Configuration files in the /etc/logrotate.d/ directory can override settings in /etc/cron.daily/logrotate.
E. The /usr/sbin/logrotate program is used to create and configure settings in the /etc/logrotate.conf file.
Explanation: Log file rotation is the process of compressing or deleting old log files to save disk space and improve performance. The /etc/logrotate.conf file controls the global settings for log file rotation, such as frequency, size limit, compression method, etc. The /etc/logrotate.d/ directory contains configuration files for specific log files that can override the global settings in /etc/logrotate.conf. The /usr/sbin/logrotate program is used to perform log file rotation according to the configuration files. It is usually invoked by a cron job in /etc/cron.daily/logrotate.
What is the first file executed by a bash login shell?
A. /etc/profile
B. /etc/profi le.alias
C. -/profile
D. -/.alias
E. /etc/bash
Explanation: When Bash is invoked as an interactive login shell, or as a non-interactive shell with the --
login option, it first reads and executes commands from the file /etc/profile, if that file exists.
After reading that file, it looks for ~/.bash_profile, ~/.bash_login, and ~/.profile, in that order, and reads and executes commands from the first one that exists and is readable. The --
noprofile option may be used when the shell is started to inhibit this behavior.
The first file executed by a bash login shell is /etc/profile. This file sets global environment
variables and aliases for all users. It may also source other files in /etc/profile.d/ directory.
The openSUSE Leap version of Linux is designed for which types of user environments? (Choose two)
A. Environments requiring High-Availability
B. Desktop power users
C. Users requiring only secure terminal access
D. Data Center environments
E. Developers
Explanation: The openSUSE Leap version of Linux is designed for desktop power users and developers. It is a community-driven distribution that offers a stable and reliable operating system with cutting-edge software and tools. It is suitable for personal use, development, testing, and experimentation. It is not intended for high-availability or data center environments that require enterprise-level support and security.
Which process ID is assigned to systemd?
A. it is the only process with no system ID.
B. 1
C. 1001
D. 0
Explanation: The program systemd is the process with process ID 1. It is responsible for initializing the system in the required way. systemd is started directly by the kernel and resists signal 9, which normally terminates processes. All other programs are either started directly by systemd or by one of its child processes.
Which option for zypper will list the available patches?
A. zypper showpatch
B. zypper patch
C. zypper Ip
D. zypper list-patch
E. zypper lu
Explanation: The option for zypper that will list the available patches is zypper lp. This command will display a table of patches that are applicable to your system but not yet installed. It will show the patch name, category, severity, summary, and status for each patch. You can use zypper patch to install all available patches or zypper patch-info to get more details about a specific patch.
For programs to leverage PolKit they are split into two separate processes. Which statements below are true regarding these two PolKit processes? {Choose two)
A. The Policy Agent process runs in the System Context.
B. The Policy Agent process runs in the User Session.
C. The Mechanism process runs in the System Context.
D. The Mechanism process runs in the User Session.
E. The Authentication Agent runs in the System Context.
F. The D-Bus runs in the User Session.
Explanation: For programs to leverage PolKit they are split into two separate processes.
The statements below that are true regarding these two PolKit processes are:
The Mechanism process runs in the System Context.
The Policy Agent process runs in the User Session.
The Mechanism process is responsible for performing privileged actions on behalf of
unprivileged users. It runs as root in the System Context and communicates with PolKit via
D-Bus. The Policy Agent process is responsible for requesting authorization from users
when they attempt to perform privileged actions. It runs as a normal user in the User
Session and communicates with PolKit via D-Bus.
Page 1 out of 6 Pages |