Use Brilliant 1Z0-105 Dumps [2023] Pass Oracle 1Z0-105 Exam

Worried about not passing the Oracle 1Z0-105 exam, try our latest update 1Z0-105 dumps 2023!

PassITDump 1Z0-105 dumps 2023 has the skills you need to pass the 1Z0-105 exam and become an Operating Systems Certified Professional. 1Z0-105 dumps 2023 is an outstanding learning material with 172 practice questions and answers to help you pass easily!

Try our 1Z0-105 free dumps questions with answers

Question 1:

Examine the dtrace command:

dtrace -P syscall

Which statement is true about this command?

A. It enables all probes available in the syscall provider.

B. It lists all probes available in the syscall provider.

C. It returns an error. The command is incomplete. You must specify a probe to enable.

D. It enables all probes available in the syscall provider, and produces no output.

Correct Answer: B

Reference: http://docs.oracle.com/cd/E19253-01/819-5488/gbxwv/index.html (Example 2-7, probes by provider)


Question 2:

Examine this extract from /etc/httpd/conf/httpd.conf for virtual hosts:

ServerAdmin [email protected]

DocumentRoot /www/docs/site1.example.com

ServerName site1.example.com

ServerAdmin [email protected]

DocumentRoot /www/docs/site2.example.com

ServerName site2.example.com

Which three statements are true about the configuration extract?

A. To connect to the website, site1.example.com must resolve to a different IP address than site2.example.com.

B. site1.example.com and site2.example.com can share the same IP address.

C. The web server attempts a DHCP discover to assign one IP address per virtual host.

D. It is possible but not mandatory to have unique IP addresses for each virtual host.

E. The site1.example.com virtual host shares and error logs with site2.example.com.

Correct Answer: ACE


Question 3:

Examine the code fragment from /etc/tgt/targets.conf:

backing-store /iSCSIsharedDisk/physDisk1.img

write-cache off

backing-store / iSCSIsharedDisk/physDisk2.img

initiator-address 192.0.2.105

initiator address 192.0.2.106

write-cache off

backing-store /iSCSIsharedDisk/physDisk3.img

write-cache off

Which statement is true?

A. Only the target identified by the iqn ending with mypc:2 is visible. This target is visible to the specific clients identified by the initiator address.

B. The initiator-address syntax in not valid. The address value should be specified as an iqn, not an IP address. This causes an error, and only iqns ending with mypc:1 and mypc:3 are visible.

C. All targets are visible to prospective clients, but the target iqn ending with mypc:2 is visible exclusively to the specified IP addresses.

D. The initiator-address syntax is not valid. The address value must be specified as an iqn, not an IP address. The initiator-address parameters are ignored and all targets are visible without restriction.

Correct Answer: B


Question 4:

Examine the parameters shown using the sysctl command relating to panic situations: [root@WAYOUT etc]# sysctl 璦 |grep panic |grep -v hung kernel.panic = 0 kernel.panic_on_oops = 0 kernel.softlockup_panic = 0 kernel.unknown_nmi_panic = 0 kernel.panic_on_unrecovered_nmi = 0 kernel.panic_on_io_nmi = 0 kernel.panic_on_oom = 2 [root@WAYOUT etc]# sysctl 璦 |grep hung

kernel.hung_task_panic = 0 kernel.hung_task_chek_count ?4194304 kernel.hung_task_timeout_secs = 120 kernel.hung_task_warnings = 10

Which two statements are true about system behavior?

A. The kernel delays panic for a few seconds if a bug is encountered to allow the klogd kernel logging daemon to log the oops output.

B. The kernel panics if a kernel thread sleeps in the TASK_UNINTERRUPTABLE state for more than 120 seconds.

C. The kernel attempts to continue if a bug is encountered.

D. The kernel always panics if an out-of-memory condition arises.

E. The kernel tries to kill some memory-consuming processes to avoid a panic if an out-of- memory condition arises.

F. The kernel panics if a user thread sleeps in the TASK_UNINTERRUPTABLE state for more than 120 seconds.

Correct Answer: BF


Question 5:

After creating empty mount point /xfs1, you execute the command:

# mkfs –t xfs –L /xfs1 –l logdev=/dev/sdd1 /dev/sdh1

Which two statements are true about the effects of executing the mkfs command?

A. It fails if there is an existing XFS file system on /dev/sdh1.

B. It fails if there is an existing XFS log on /dev/sdd1.

C. It fails if there is an existing XFS file system on /dev/sdd1.

D. It fails because there is no size specified for the XFS log.

E. The xfs1 file system is mounted automatically during system startup.

F. It creates and mounts the /xfs1 file system.

Correct Answer: DF


Question 6:

Examine the contents of /etc/mail/access: This system is to be used as an MTA or mail gateway for the local LAN network address 192.168.1.0/24. Which two actions allow this mail host to route email for the network?

A. Run sendmail again; and the updated file can be accessed automatically.

B. Add this line to /etc/mail/access:

C. Add this line to /etc/mail/access:

D. Add this line to /etc/mail/access:

E. Rebuild the access database file after the source files have been modified. Restarting the sendmail service automatically rebuilds the maps.

Correct Answer: DE


Question 7:

Which two statements are true about recursive nameservers that are supported by Oracle Linux?

A. They may be authoritative.

B. They may forward requests to authoritative name servers on some occasions.

C. They may be primary nameservers.

D. They cache replies from previous name resolution requests.

E. They may be secondary nameservers.

Correct Answer: BC


Question 8:

What is function of the System Security Service Daemon (SSSD)?

A. It permits single-user accounts by maintaining credentials for back-end systems on behalf of local users.

B. It enables fingerprint reader support for Kerberos clients.

C. It enables Smart Card Authentication for Kerberos clients.

D. It permits Kerberos authentication to be done offline by caching user identities.

Correct Answer: A


Question 9:

While copying a file to the /users file system, which is located on /dev/sdd1, you receive an error:

$ cp /etc/oratab /users/oracle cp: cannot create regular file `/users/oracle/oratab\’: Disk quota exceeded You examine your assigned quota as shown: $ quota -q Disk quotas for user oracle (uid 500):

Which option represents the reason for receiving the Disk quota exceeded error?

A. The oracle user has reached its block quota.

B. The oracle user exceeded its file quota five days ago.

C. The oracle user has reached a group quota limit.

D. The /users file system is full.

E. The oracle user exceeded its block quota six days ago.

Correct Answer: C


Question 10:

Which three statements are true about accessing Windows shares from Linux with SAMBA on Oracle Linux?

A. The findsmb utility queries a file to find SAMBA servers.

B. The username required to access the SAMBA shares on Windows may be specified in the mount command.

C. FTP may be used to access SAMBA shares on Windows.

D. The password required to access SAMBA shares on Windows may be specified in the mount command.

E. The smbtree utility queries a file to find SAMBA servers.

F. The smbclient utility uses a lowercase version of the environment variable USER or LOGNAME if the username is not provided on the command line.

G. The username and password required to access SAMBA shares on Windows may be specified in /etc/ fstab.

Correct Answer: AEF

Reference: http://docs.oracle.com/cd/E37670_01/E41138/html/ol_about_samba.html#idm139784792480512


Question 11:

Which two statements are true about container template scripts?

A. They must be Bourne Shell scripts.

B. Their name must start with 1xc-.

C. They must support the –arch option.

D. They must not be interactive.

E. They must install a Linux distribution.

Correct Answer: BE

Reference: https://docs.oracle.com/cd/E52668_01/E54669/html/ol7-about-containers.html


Question 12:

For which domain or domains does the default cache-only nameserver have a list of authoritative servers in the /var/named/named. ca file?

A. the domain to which the cache only nameserver belongs

B. the root domain

C. the domains to which the local DHCP servers belong

D. the domains to which the local DNS servers belong

Correct Answer: B


Question 13:

Examine the virt-install command.

# virt-install \

–connect qemu:///system \

–virt-type kvm \

— name test \

— ram 500 \

–disk path =/var/lib/libvirt/images/test.img, size=4

–cdrom /home/user01/DownLoads/OracleLinux-R6-U5-Server-x86_64-dvd.iso \

–os-variant oe16

Which two statements are true?

A. The –connect option specifies the credentials for the hypervisor to use.

B. The –name option specifies the name of the new guest virtual machine instance.

C. The –ram option specifies the memory to allocate for a guest instance in MB.

D. The –virtype option specifies that only the keyboard, video, and mouse are fully virtualized.

E. The –disk option specifies the media to use as storage for the guest. The size of the storage will be 4 GB.

Correct Answer: AB


Question 14:

Examine the udevadm command:

udevadm info –query=all –name=/dev/sdb

What does this command display?

A. the device tree, and all properties maintained in sysfs for all parent devices in the device tree for the / dev/sdb disk device

B. all properties maintained in sysfs for the /dev/sdb kernel device, excluding parent devices

C. all properties maintained in devfs for the /dev/sdb kernel device, excluding parent devices

D. the device tree, and all properties maintained in devfs for the /dev/sdb device, including properties of all parent devices in the device tree for the /dev/sdb disk device

Correct Answer: D


Question 15:

Which two statements are true about the configuration of kdump for capturing a dump image after a kernel crash?

A. kdump uses kexec to reboot the failed kernel and then captures a dump image.

B. The crashkernel boot parameter must be added to the kernel line in the /boot/grub.conf file to enable kdump.

C. The memory used for crashkernel is always at the same physical address.

D. kdump requires no parameters because it is enabled by default.

E. kdump uses kexec to boot a second kernel, which then captures a dump image.

Correct Answer: AB