Last Updated on March 25, 2022 by Admin 2

050-720 : SUSE Certified Linux Administrator 11 : Part 05

  1. Which file contains information about which user was last logged in, where the user logged in, and how long the user was logged in?

    • /var/log/login
    • /var/log/lastlog
    • /var/log/access
    • /var/log/messages
    • There is no log file containing this information
  2. What does the following command do? tar -czvf /tmp/backup.tgz /etc/HOSTNAME

    • It extracts the /etc/HOSTNAME file from the /tmp/backup.tgz archive.
    • It includes the /etc/HOSTNAME file in the newly created /tmp/backup.tgz archive.
    • It produces an error message because the options are in the wrong sequence.
    • It displays a line similar to the following, but otherwise does nothing: -rw-r–r– root/root 23 2005-03-11 14:20 etc/HOSTNAME
  3. While the printers seem physically okay, you are encountering problems with CUPS. What is the best place to start looking for hints on what is wrong?

    • In the output of dmesg
    • In the /var/log/boot.msg file
    • In the /var/log/messages file
    • In the /var/log/cups/error_log file
  4. Which command can you use to set up limits for failed logins?

    • w
    • who
    • last
    • faillog
    • lastlog
  5. Which statement about symmetric encryption is correct?

    • The same key is used for encryption and decryption.
    • Symmetric keys are generally longer than asymmetric keys.
    • Asymmetric encryption is generally faster than symmetric encryption.
    • A public key and a private key are needed for symmetric encryption/decryption.
  6. From command mode in vi, what do you have to do to enter text?

    • Press e
    • Press i
    • Press k
    • Press w
  7. When you connect to an ssh server with your ssh client, the public key of the server is compared to the keys stored in a file on the client computer. Which file is this?

    • ~/.ssh/id_dsa.pub
    • ~/.ssh/id_rsa.pub
    • ~/.ssh/known_hosts
    • ~/.ssh/authorized_keys
  8. After the partitions are checked and the root file system is mounted, the /sbin/init command is executed. Which process ID is assigned to /sbin/init?

    • 0
    • 1
    • 3
    • 100
    • 1000
    • Depends
  9. Which statements about partitions are correct? (Choose 3.)

    • Extended partitions can be subdivided into logical partitions.
    • A primary partition consists of a continuous range of cylinders.
    • Logical partitions do not require entries in the main partition table.
    • If you use only primary partitions, you are limited to eight partitions per disk.
    • SUSE Linux Enterprise Server 10 can only be installed on a primary partition.
    • To install more than one operating system on a partition, the partition has to include the entire cylinder range.
  10. Which user authentication methods can be used with SLES 10? (Choose 4.)

    • NIS
    • WEP
    • SSH
    • PAM
    • LDAP
    • Handshake
    • Windows Domain
    • Local (/etc/passwd)
  11. The /etc/sysconfig/network/ifcfg-eth-id-macaddress configuration file contains a BOOTPRO option. Which are possible values of BOOTPROTO?

    • static or dhcp
    • master or slave
    • onboot, ifpluged, or manual
    • ethernet, wireless, or manual
  12. You want to copy the master boot record, the partition table, and the 2 magic bytes at the beginning of /dev/had to a file so you can restore it later. Which command accomplishes this?

    • dd if=/dev/hda of=mbr bs=512 count=1
    • dd if=mbr of=/dev/hda bs=512 count=1
    • dd of=/dev/zero if=/dev/hda bs=512 count=1
    • dd if=/dev/urandom of=/dev/hda bs=512 count=1
  13. From the command line, which command would you use to print the document.ps file on the laser printer?

    • lp -d laser document.ps
    • lpr -p laser document.ps
    • lpq -p laser document.ps
    • print -p laser document.ps
  14. How do you create a file called destination containing the same ACLs currently set for the file called source?

    • getfacl source > destination
    • getfacl -c source destination
    • getfacl source | cp destination
    • getfacl -x source > destination
  15. In which file is the name resolution configured?

    • /etc/dns.conf
    • /etc/resolv.conf
    • /etc/HOSTNAME
    • /etc/nameservers
    • /etc/sysconfig/network/dns
  16. You want to find out if files from the wget package were altered since they were installed. Which command will give you this information?

    • rpm -V wget
    • rpm -v wget
    • rpm -F wget
    • rpm -qf wget
  17. Which commands can be used if you do not find the desired information in a manual page, or find no manual page at all for a program?

    • sos program
    • info program
    • help program
    • wiki program
  18. You want to install the xyz-software-1.2.3-5.i586.rpm package, but only if a previous version is already installed. Which command will do this?

    • rpm -ivh xyz-software-1.2.3-5.i586.rpm
    • rpm -evh xyz-software-1.2.3-5.i586.rpm
    • rpm -Fvh xyz-software-1.2.3-5.i586.rpm
    • rpm -Uvh xyz-software-1.2.3-5.i586.rpm
  19. What is the difference between the /dev/st0 and /dev/nst0 devices?

    • /dev/st0 is the first SCSI CD burner; /dev/nst0 refers to the CDROM drive.
    • /dev/st0 is the first tape drive; /dev/nst0 refers to the same tape drive in non-rewinding mode.
    • /dev/st0 is the first serial console; /dev/nst0 refers to the same serial console as a block device.
    • /dev/st0 is the first SCSI hard drive; /dev/nst0 refers to the same SCSI hard drive in read-only mode.
  20. Which statements about PAM are correct? (Choose 3.)

    • To enable authentication with PAM, you need a smart cart reader.
    • Each line in a PAM configuration file contains 6 columns plus optional arguments.
    • Configuration files of PAM modules can be found in /etc/pam.d/ and /etc/security/.
    • After the PAM configuration has been adjusted for an application, this application can be used by SSH.
    • The /etc/pam.d/other file contains a default configuration if no application-specific file is found in /etc/pam.d/.
    • PAM creates a software level with defined interfaces between applications and the current authentication mechanism.