2018 Jan Oracle Official New Released 1z0-460
100% Free Download! 100% Pass Guaranteed!

Oracle Linux 6 Implementation Essentials

Question No: 1

Finding a directive issued by your organization listing several important CVEs (Common Vulnerability and Exposures), you find one for Linux OpenSSH (CVE-2006-5764), which might apply to your oracle Linux systems. What command would help ensure that a patch has been applied to close this vulnerability on an Oracle Linux 6 system running OpenSSH server?

  1. yum listcves openssh

  2. rpm -qa | grep openssh | grep 5794

  3. rpm -q – – changelog openssh | grep 5794

  4. yum sec – list cves | grep 5794

  5. yum sec – list cvesApplied

Answer: C

Explanation: *The command rpm -q -changelog rpm displays a detailed list of information (updates, configuration, modifications, etc.) about a specific package. This example shows information about the package rpm. However, only the last five change entries in the RPM database are listed. All entries (dating back the last two years) are included in the package itself. This query only works if CD 1 is mounted at /media/cdrom:

rpm -qp -changelog /media/cdrom/suse/i586/rpm-3*.rpm

*Is the patch RPM suitable for my system?

To check this, first query the installed version of the package. For pine, this can be done with

rpm -q pine pine-4.44-188

Question No: 2

Which three parameters of a network interface can you modify by using the NetworkManager tool on your Oracle Linux 6 system?

  1. IPv4 settings

  2. IPv6 settings

  3. Netconsole settings

  4. MTU settings

  5. IP Proxy settings

Ensurepass 2018 PDF and VCE

Answer: A,B,D Explanation:

http://dsilas.fedorapeople.org/deployment-guide/html/images/Network_Configuration-NM- Edit_System_eth0-Wired.png


1Right-click the NetworkManager icon in the notification area at the top-right corner of the Red Hat desktop and click quot;Edit Connections.quot;


Click the quot;System eth0quot; connection on the wired tab and click quot;Edit.quot;


Click the quot;IPv4 Settingsquot; tab.

Question No: 3

Which two statements describe the capabilities used with the Unbreakable Enterprise Kernel?

  1. Existing Red Hat Enterprise Linux 5 and 6 customers need to reinstall Oracle Linux to use the Unbreakable Enterprise Kernel.

  2. The Unbreakable Enterprise kernel is the default kernel starting with Oracle Linux 5.6.

  3. The Unbreakable Enterprise kernel is required when using multithreaded CPUs.

  4. Oracle Clusterware, OCFS2, and the Enterprise Manager pack for Linux support are included with Oracle Linux Basic and Premier support.

  5. Switching between the Red Hat Compatible kernel and the Unbreakable Enterprise kernel is simple process of changing kernels and glibc.

Answer: D,E

Explanation: *Commercial technical support is available through Oracle#39;s Oracle Linux Support program, which supports Oracle Linux, and existing RHEL or CentOS installations(i.e. without reinstallation).


*The Unbreakable Enterprise Kernel Release 2 is Oracle#39;s second major release of its heavily tested and optimized operating system kernel for Oracle Linux 5 and Oracle Linux 6.

Unbreakable Enterprise Kernel Release 2 is based on the mainline Linux kernel version

3.0.16 and boasts a wide range of new features and improvements relevant for enterprise workloads.


Not A, not B:Unbreakable Enterprise Kernel Release 2 can be installed on Oracle Linux 5 Update 8 or newer, as well as on Oracle Linux 6 Update 2 or newer.

Question No: 4

View the exhibits.

Ensurepass 2018 PDF and VCE

Ensurepass 2018 PDF and VCE

Examine the output of sar command and the top command in the Exhibits. Which statement is the correct interpretation of this data?

  1. The system is running low on swap space and memory.

  2. CPU is Idle and the system has plenty of free memory available.

  3. The CPU utilization is high and one process is using most of the CPU.

  4. The system is idle with very little memory, CPU, and I/O utilization.

Answer: C

Explanation: From the top exhibit we see that npviewer.gin uses 73.4% of the available CPU.


*sar – Collect, report, or save system activity information.

*The sar command writes to standard output the contents of selected cumulative activity counters in the operating system. The accounting system, based on the values in the count and interval parameters, writes information the specified number of times spaced at the specified intervals in seconds.

*sar -u 2 5

Report CPU utilization for each 2 seconds. 5 lines are displayed.

Question No: 5

Which three steps are involved in the installing Ksplice on servers that will be updated?

  1. You have to be logged as user “ksplice” on the server you want to prepare and install Oracle Ksplice on.

  2. The Uptrack package needs access directly or through a proxy to the Oracle public yum repository (http://public-yum.oracle.com/) to download the required packages for the uptrack-* utilities to be able to work correctly.

  3. Download the install-uptrack script using the “wget -N http://www.ksplice.com/uptrack/install-uptrack” command.

  4. You have to be logged in as user “root” on the server you want to prepare and install Oracle ksplice on.

  5. The uptrack package will set up a yum repository (/etc/yum.repos.d/ksplice- uptrack.repo) and download the required package for the uptrack-* utilities to be able to work correctly.

  6. Download the ksplice ISO image from https://edelivery.oracle.com/linux and then run the “sh install-uptrack” script from the ISO image.

Answer: B,C,D

Explanation: B:Your system must have access to the internet to install Ksplice. If you are using a proxy, set the proxy in your shell:

export http_proxy=http://proxy.company.com:port export https_proxy=http://proxy.company.com:port

CD:Once you have an access key run the following commands as root, replacing YOUR_ACCESS_KEY with the access key you received upon sign-up:

wget -N https://www.ksplice.com/uptrack/install-uptrack sh install-uptrack YOUR_ACCESS_KEY


E:If you#39;d like Ksplice Uptrack to automatically install updates as they become available, run:

sh install-uptrack YOUR_ACCESS_KEY -autoinstall

in place of the above install-uptrack command, or set quot;autoinstall = yesquot; in your

/etc/uptrack/uptrack.conf after installation. Reference: Ksplice,Installation instructions

Question No: 6

What happens when the following command is run?

# authconfig – – passalgo = md5 – – update

  1. It produces the MD5 checksum of the input data.

  2. It configures the MD5 checksum for newly authored documents

  3. It converts the stdio input to MD5 algorithm.

  4. It changes the user password hashing algorithm to MD5.

Answer: D

Explanation: To configure the Linux system to use theMD5algorithm, enter:

# authconfig -passalgo=MD5-update

Note: The default algorithm for storing password hashes in /etc/shadow is MD5. I was told to use SHA-512 hashing algorithm. How do I set password hashing using the SHA-256 and SHA-512 under CentOS or Redhat Enterprise Linux 5.4?

You need to use authconfig command to setup SHA-256/512 hashing. This command provides a simple method of configuring /etc/sysconfig/network to handle NIS, as well as

/etc/passwd and /etc/shadow, the files used for shadow password support. Basic LDAP, Kerberos 5, and SMB (authentication) client configuration is also provided.

Display Current Hashing Algorithm

Type the following command:

# authconfig -test | grep hashing Sample outputs:

password hashing algorithm is md5 Configure Linux Server To Use The SHA-512

To configure the Linux system to use the SHA-512 algorithm, enter:

# authconfig -passalgo=sha512 -update

Question No: 7

As user bob, you have logged in to the system on a terminal and issued the following command to make the top command run in the background.

[bob@host – ] topamp;

You exit from the terminal and log back as bob into the system at the same terminal. How is the background job affected?

  1. The background job gets the foreground as soon as bob logs into the system.

  2. The background job is suspended temporarily from the job and resumes when user bob logs back in to the system.

  3. The background job starts running in the background again as soon as bob logs into the system.

  4. The background job will not be affected.

  5. The background job is deleted from the job pool and does not get listed using jobs command.

Answer: E

Question No: 8

Which rpm command can be used to find the package that owns the /etc/rsyslog.conf file?

  1. rpm -query /etc/rsyslog.conf

  2. rpm -gf /etc/rsyslog.conf

  3. rpm -q1 /etc/rsyslog.conf

  4. rpm -q /etc/rsyslog.conf

Answer: B

Explanation: Package Selection Optionsinclude:

-f lt;filegt;

Query package owning lt;filegt;


rpm -q – What does it do?

One of the nice things about using RPM is that the packages you manage don#39;t end up going into some kind of black hole. Nothing would be worse than to install, upgrade, and erase several different packages and not have a clue as to what#39;s on your system. In fact, RPM#39;s query function can help you get out of sticky situations like:

*You#39;re poking around your system, and you come across a file that you just can#39;t identify. Where did it come from?

*Your friend sends you a package file, and you have no idea what the package does, what it installs, or where it originally came from.

*You know that you installed XFree86 a couple months ago, but you don#39;t know what version, and you can#39;t find any documentation on it.

The list could go on, but you get the idea. The rpm -q command is what you need. If you#39;re the kind of person that doesn#39;t like to have more options than you know what to do with, rpm -q might look imposing. But fear not. Once you have a handle on the basic structure of an RPM query, it#39;ll be a piece of cake.

Question No: 9

On your Oracle Linux 6 system, you have to configure the eth0 network interface to 100 MB/sec, half duplex without trying to autonegotiate. Which command will help you configure this requirement?

  1. # ifconfig eth0 speed 100 autoneg off duplex half

  2. # ethtool interface eth0 speed 100 autoneg off duplex half

  3. # ifconfig interface eth0 speed 100 autoneg off duplex half

  4. # ethtool -seth0speed 100 autoneg off duplex half

Answer: D

Explanation: When I have a device that is acting up, I tend to run: ethtool ethX, check the Supported link modes, the Link partner advertised link modes and the actual speed and Duplex. If my Supported link mode is set low (say 10/Half for some reason) but my switch supports 1000baseT/Full then I#39;ll use ethtool -s ethX to change my ethernet settings to 1000baseT/Full. Just about anything you see from: ethtool ethX, can be changed with ethtool -S ethX. In this case you would use the following:

ethtool -S eth0 speed 1000 duplex full autoneg on

Question No: 10

DTrace is being ported from Solaris to Oracle Linux. Which three statements are true for the DTrace tool?

  1. DTrace allows static and dynamic tracing of your applications and your kernel.

  2. DTrace tool is used to compile debug kernel modules and device drivers

  3. DTrace allows you to dynamically define probe points on the fly.

  4. DTrace probes and probe points are usually defined by the user using scripts written in a language called D.

  5. DTrace tool is based on the strace Linux tool and includes both user and kernel strace features.

Answer: A,C,D

Explanation: A:DTrace is a comprehensive dynamic tracing framework created by Sun Microsystems for troubleshooting kernel and application problems on production systems in real time.

C:Key benefits and features of DTrace on Oracle Linux include:

/Designed to work on finding performance bottlenecks

/(C)Dynamically enables the kernel with a number of probe points, improving ability to service software

/Enables maximum resource utilization and application performance

/Fast and easy to use, even on complex systems with multiple layers of software

D:Testers write tracing programs (also referred to as scripts) using the D programming language (not to be confused with other programming languages named quot;Dquot;). The language, a subset of C, includes added functions and variables specific to tracing. D programs resemble awk programs in structure; they consist of a list of one or more probes (instrumentation points), and each probe is associated with an action. These probes are comparable to a pointcut in aspect-oriented programming.

100% Free Download!
Download Free Demo:1z0-460 Demo PDF
100% Pass Guaranteed!
Download 2018 EnsurePass 1z0-460 Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2018 EnsurePass IT Certification PDF and VCE