1Z0-409 Oracle Linux Fundamentals Practice Test Set 6

You have downloaded a file called firefox.tar.gz. Which of the following commands could help you to extract the files from this tar file? (Choose all that apply.)
A. tar xjf firefox.tar.gz
B. tar xzf firefox.tar.gz
C. tar -xvjf firefox.tar.gz
D. tar --gzip -xf firefox.tar.gz 


Options are :

  • A,B
  • A,D
  • B,D (Correct)
  • C,D

Answer : B,D

Which two statements are true about the init process? (Choose two.)
A. Process ID (PID) of init is always 1.
B. Process ID (PID) of init is always 0.
C. The first process spawned by the kernel is init.
D. init uses the exec() method to spawn a new process.
E. By default, normal users can use init to change the run level.


Options are :

  • A,C (Correct)
  • A,B
  • C,D
  • D,E

Answer : A,C

Which statement is true about the command shown below? [root@server1 ~]# mount -a -O no_netdev


Options are :

  • It mounts only ext3 file systems that have the option _netdev specified in the Options field in the /etc/fstab file.
  • It mounts all file systems that have the option _netdev specified in the Options field in the /etc/fstab file.
  • It mounts only msdos file systems that have the option _netdev specified in the Options field in the /etc/fstab file
  • It mounts all file systems except those with the option _netdev specified in the Options field in the /etc/fstab file (Correct)

Answer : It mounts all file systems except those with the option _netdev specified in the Options field in the /etc/fstab file


As a system administrator, you have created the /public directory. The permission to the directory is shown below:
[root@server 1 ~]# ll -d /public/ drwxr-xr-x 3 root root 4096 Dec 17 04:35 /public/ You have a requirement that all the normal users in the system should be able to create files in the 
/public directory, but they should not be able to delete one another's files. Which command will achieve this task? 


Options are :

  • chmod 1777 /public (Correct)
  • chmod 4777 /public
  • chmod 777 /public
  • chmod 2777 /public

Answer : chmod 1777 /public

Which two commands would you use to kill all the processes owned by the user smith? (Choose two.)
A. pkill -9 -u smith
B. skill -9 -u smith
C. pkill -1 -u smith
D. skill -1 -u smith
E. pkill -19 -u smith


Options are :

  • C,D
  • B,C
  • A,E
  • A,B (Correct)

Answer : A,B

You have logged in as user smith at tty1 terminal and issued the following incomplete command at the bash prompt: [root@station1 ~]# if [ i > j ] then > The shell displays the default secondary prompt ">". What would you do to make "=>" as the default secondary prompt temporarily only for user smith and for the tty1 terminal current session?


Options are :

  • Redefine PS4=?>
  • Redefine PS2=?> (Correct)
  • Redefine PS3=?>
  • Redefine PS1=?>

Answer : Redefine PS2=?>

The GNU project was started by Free Software Foundation (FSF) with a goal to create a free UNIX Clone. What do you understand by the term free as per the terms of FSF?


Options are :

  • The source code will be provided free of cost with the software. (Correct)
  • The software is distributed free in runnable (installable) form with no cost.
  • The software is fully free and is charged only to fix breakdowns.
  • The software is distributed free but does not offer the freedom to redistribute it.

Answer : The source code will be provided free of cost with the software.

As per the Linux Documentation Project (LDP), which directory in the File System Hierarchy (FSH) holds the online distribution documentation that includes FAQs, How-to's, Web sites, and so on? 


Options are :

  • /usr/share/man/doc
  • /usr/include
  • /usr/local/share
  • /usr/share/doc (Correct)

Answer : /usr/share/doc

You want to secure the server 1 server by denying root access through ssh. Which file would you edit on server 1 to achieve this task?


Options are :

  • /etc/ssh/sshrc
  • /etc/ssh/sshd_config (Correct)
  • ~/.ssh/config
  • ~/.ssh/rc

Answer : /etc/ssh/sshd_config

Which statement is true about the command shown below? [r1@server 1 ~]$ head -15 /etc/passwd | tail 5


Options are :

  • It will display the first 15 lines of the /etc/passwd file
  • It will display the lines between 5 and 15 in the /etc/passwd file.
  • It will display the lines 11 through 15 in the /etc/passwd file (Correct)
  • It will display the last five lines of the /etc/passwd file.

Answer : It will display the lines 11 through 15 in the /etc/passwd file

Note the following command executed by the user smith on server 1. [smith@server 1 ~]$ groups apps smith sys group admins scott [smith@server 1 ~]$ touch file 1 new file [smith@server 1 ~]$ mkdir dir 1 dir 2 [smith@server 1 ~]$ ls dir 1 dir 2 file  new file
What would be the default group of the files and directories created by user smith on server1?


Options are :

  • scott
  • admins
  • smith
  • apps (Correct)

Answer : apps

As normal user scott you have generated version 2 dsa key pair using the ssh-keygen program. What are the default user permissions available for the private key?


Options are :

  • Both write and execute
  • Only read (Correct)
  • Both read and execute
  • Both read and write

Answer : Only read

You have opened file1 in the vi editor. The contents of file1 is shown below: [root@server1 ~]# vi file1 green red pink blue green pink
white green blue green blue green pink green At the vi editor command mode, you execute the following command to edit the contents of file 1: :1,$s/green/yellow/ What will be the result of this command?


Options are :

  • It will search the entire file for the first occurrence of the regex green and replace it with the word yellow (Correct)
  • It will search only the first line for the first occurrence of the regex green and replace it with the word yellow
  • It will search the entire file for all occurrences of the regular expression (regex) green and replace it with the word yellow.
  • It will search only the first line for all occurrences of the regex green and replace it with the word yellow

Answer : It will search the entire file for the first occurrence of the regex green and replace it with the word yellow

Identify two correct statements about the cp command in association with the inode table. (Choose two.)
A. Deletes the old directory entry with the old file name
B. Allocates a free inode number placing a new entry in the inode table
C. Has no impact on the inode table (except for time stamp or location of data on disk)
D. Creates a new directory entry that associates with a new name and inode number


Options are :

  • C,D
  • A,C
  • A,B
  • B,D (Correct)

Answer : B,D

Match the following Regular Expressions (RE) with their resultant actions:

1) ^RE a) anchor RE at end of line

2) RE$ b) anchor RE at start of word

3) \< RE c) anchor RE at end of word

4) RE\> d) anchor RE at start of line


Options are :

  • 1-a, 2-d, 3-c, 4-b
  • 1-c, 2-b, 3-d, 4-a
  • 1-b, 2-c, 3-a, 4-d
  • 1-d, 2-a, 3-b, 4-c (Correct)

Answer : 1-d, 2-a, 3-b, 4-c

Which file compression standards are recognized and could be decompressed by gunzip? (Choose all that apply.)
A. zip
B. gzip
C. bzip2
D. compress


Options are :

  • B,C,D
  • A,C,D
  • A,B,D (Correct)
  • A,B,C

Answer : A,B,D

Match the following symbolic notations of file permissions with their numeric values.
1) - - - s - - - - - - a) 5000
2) - - - - - - s - - - b) 4100
3) - - - - - - - - - t c) 7101
4) - - - S - - - - - T d) 1001
5) - - - s - - S - - t e) 7040
6) s - -S r - S - -T f) 2010


Options are :

  • 1-b, 2-d, 3-f, 4-a, 5-e, 6-c
  • 1-b, 2-f, 3-d, 4-a, 5-c, 6-e (Correct)
  • 1-d, 2-f, 3-b, 4-e, 5-c, 6-a
  • 1-f, 2-a, 3-c, 4-b, 5-e, 6-d

Answer : 1-b, 2-f, 3-d, 4-a, 5-c, 6-e

As a root user you have issued the following commands at the bash prompt: [root@station 1 ~]#set a b c d e f g h i j k l m n o p q r s t u v w x y z [root@station 1 ~]#shift 9 [root@station 1 ~]#echo ${10} What would be the output of the echo command? 


Options are :

  • It will print ${10} onto the standard output.
  • It will print the letter j
  • It will print $1 followed by the literal 0.
  • It will print the letter s. (Correct)

Answer : It will print the letter s.

As a user smith you executed the following command to change the default priority of the date command: [smith@station 2 ~]$ nice --10 date
nice : cannot set priority : Permission denied [smith@station 2 ~]$ What could be the reason for the error message?


Options are :

  • smith does not have the permission to change the nice value from the default to a higher value.
  • smith does not have the SUID bit set on nice.
  • smith does not have the execute permission on nice.
  • smith does not have the permission to change the nice value from the default to a lower value. (Correct)

Answer : smith does not have the permission to change the nice value from the default to a lower value.

Identify the correct statements about the tr command? (Choose all that apply.)
A. It works from STDOUT.
B. It helps in Regex pattern matching.
C. It can be used to delete a set of characters.
D. It can be used to merge multiple blank lines into one.
E. It can be used to translate one set of characters into another.


Options are :

  • A,B,C
  • B,C,D
  • C,D,E (Correct)
  • A,D,E

Answer : C,D,E

You have logged in as normal user bob with the default login shell. An attempt by bob to change the default shell to /bin/sh fails with an error. What could be the possible reason? 


Options are :

  • The /bin/sh entry is not listed in /etc/shells file (Correct)
  • The SUID bit is not set on chsh by default
  • bob does not have the permissions to change the shell by default.
  • bob does not have read permissions on the/etc/shells file by default.

Answer : The /bin/sh entry is not listed in /etc/shells file

As the root user on station 1, you are trying to administer a printer, configured on the server 1 server using CUPS, through a browser. Which two statements holds true in this context. (Choose two.)
A. CUPS uses port 630.
B. Public access provides only read access.
C. By default, CUPS accepts connections only from localhost.
D. Administering CUPS from a remote system does not require any authentication.


Options are :

  • A,B
  • A,C
  • C,D
  • B,C (Correct)

Answer : B,C

Which command could user smith use to change the time stamps of the file1 and dir1 given below, to the current system time?
[smith@server1 ~]$ ls -l -rw-rw-r-- 1 smith smith 6 Jan 20 10:01 file1 drwxrwxr-x 2 smith smith 4096 Jan 20 10:54 dir1


Options are :

  • time
  • cat
  • touch (Correct)
  • stat

Answer : touch

You execute the following command: find /home/ -name ?.jpg? -type f -user john What is the expected output of this command?


Options are :

  • A list of all regular files and directories with the pattern jpg in file names and owned by the user john, under the /home director
  • A list of all the regular files with the extension .jpg and owned by the users john and root, under the /home directory and sub directories
  • A list of all the regular files with the extension .jpg and owned by the user john, under the /home directory and sub directories (Correct)
  • A list of all the regular files with the extension .jpg and owned by the user john, under the /home directory, not in subdirectories

Answer : A list of all the regular files with the extension .jpg and owned by the user john, under the /home directory and sub directories

Which statement is true about symbolic link?


Options are :

  • It does not occupy storage space (that is, blocks).
  • It can reference nonexistent files. (Correct)
  • It cannot reference directories.
  • It cannot span file systems.

Answer : It can reference nonexistent files.

As the user smith you issue the following command: [smith@station1 ~]$ scp file1 bob@station1:~bob Enter passphrase for key '/home/smith/.ssh/id_dsa': file1 100% 0 0.0KB/s 00:00 [smith@station1 ~]$ What is the authentication method used in the node?


Options are :

  • Host-based authentication
  • Key Board-Interactive Authentication
  • Password authentication
  • Public Key Authentication (Correct)

Answer : Public Key Authentication

Match the query commands with their functions.
1. rpm -qa a. lists packages on which the package depends
2. rpm -qi b. lists all packages installed on the system
3. rpm -qR c. list of all the files in the package
4. rpm -ql d. information about the package


Options are :

  • 1-d, 2-c, 3-b, 4-d.
  • 1-b, 2-d, 3-a, 4-c. (Correct)
  • 1-b, 2-c, 3-d, 4-a.
  • 1-d, 2-c, 3-d, 4a.

Answer : 1-b, 2-d, 3-a, 4-c.

Match the process status with its definition. 

1. Running a. Waiting for some event (for example, user input)
2. Stopped b. Child not properly reaped by parent
3. Sleeping c. Still loaded in memory, but not running
4. Zombie d. Currently being allocated CPU slices 


Options are :

  • 1-d, 2-c, 3-a, 4-b (Correct)
  • 1-a, 2-b, 3-d, 4-c
  • 1-c, 2-b, 3-a, 4-d
  • 1-b, 2-c, 3-b, 4-a

Answer : 1-d, 2-c, 3-a, 4-b

Identify the true statements about sendmail. (Choose all that apply.)
A. Sendmail is a mail server.
B. Sendmail acts as an e-mail client.
C. Sendmail supports only IMAP protocol.
D. Sendmail can be used to send a file with the -t option at the command line.


Options are :

  • A,B
  • C,D
  • A,D (Correct)
  • B,C

Answer : A,D

A user issued the following command on a Linux system: find / -name passwd | cpio -o | bzip2 > passwd.cpio.bz2 What could be the purpose of issuing this command?


Options are :

  • to find the /etc/passwd file and compress it using bzip2
  • to create a compressed cpio archive of the list of all files with the name passwd
  • to find all files called passwd in the root file system ( / )
  • to create a compressed cpio archive of all files with the name passwd. (Correct)

Answer : to create a compressed cpio archive of all files with the name passwd.

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions