Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

sca_sles15 Exam Dumps - SUSE Certified Administrator in Enterprise Linux 15 (050-754)

Question # 4

Which statements about using the -U option and the -F option when running the rpm command are true? (Choose two)

A.

The -U option will install a package whether or not a previous version of the package is already installed.

B.

The -F option will install a package whether or not a previous version of the package is already installed.

C.

The -U option remove all binaries, scripts, links, and documentation files associated with the RPM in the RPM Database.

D.

The -F option will verify (fix) a broken application based on the information in the RPM Database.

E.

The -U option will remove all the binaries in the package from the file system and update the RPM Database.

F.

The -F option will install a package only if a previous version of the package is already installed.

Full Access
Question # 5

Which statement is true regarding VFS?

A.

VFS is a set of ANs designed for BtrFS to provide portability.

B.

VFS is a high-performance journaling file system format used by default by YaST and parted.

C.

VFS is an abstraction layer in the kernel that provides the same interface to applications and the user, regardless of which file system format is used.

D.

VFS is a translation layer to allow applications written for ext2 and ReiserFS to run on ext4 file systems.

E.

VFS is a translation layer to allow applications to run on mobile platforms.

Full Access
Question # 6

firewalld maintains two separate configurations. What are they named? (Choose two)

A.

Runtime

B.

Temporary

C.

Production

D.

Permanent

E.

Static

F.

Testing

G.

Fixed

Full Access
Question # 7

By default, what does the VNC Client and the VNC server daemon use for secure communications?

A.

On SLE 15 the VNC Client assumes the server is set up as a CA.

B.

Both the VNC Client and the VNC server assume you have access to a valid 3rd party CA like Verisign.

C.

The VNC server prompts the VNC Client for a password that was configured when the VNC server was installed.

D.

VNC is based on the Telnet protocol so encrypted communication between the VNC Client and Server is not possible.

E.

A self-signed SSL certificate

Full Access
Question # 8

Which directory contains the initrd file?

A.

/loader/grub

B.

/startup/grub2

C.

/boot/grub2

D.

/loader

E.

/boot

F.

/startup

Full Access
Question # 9

True or false: It is not possible to open more than one file in Vim without running a second instance.

A.

True

B.

False

Full Access
Question # 10

How are the scripts in the /etc/grub.d directory used? (Choose two)

A.

The contents of these scripts are incorporated into the /boot/grub2/custom.cfg file.

B.

The contents of these scripts are incorporated into the /etc/grub2.d/configfiLe.

C.

The contents of these scripts are incorporated into the /boot/grub2/grub.cfg file.

D.

These scripts are taken as input by the mkinitrd command.

E.

These scriptSrare taken as input by the grub2-init command.

F.

These scripts are taken as input by the grub2-mkconfig command.

Full Access
Question # 11

Which command is used to view the manual pages?

A.

help -man

B.

doc -man

C.

man

D.

show

E.

info

Full Access
Question # 12

Which option for zypper will list the available patches?

A.

zypper showpatch

B.

zypper patch

C.

zypper Ip

D.

zypper list-patch

E.

zypper lu

Full Access
Question # 13

Which file lists each user's home directory and login shell?

A.

/etc/sysconfig/homedir

B.

/var/userenv

C.

/var/sysconf/userenv

D.

/var/9hare/userenv

E.

/etc/password

F.

/etc/passwd

Full Access
Question # 14

What starts the Linux Kernel during the boot process?

A.

initd

B.

The Boot Loader

C.

systemd

D.

The udev process

E.

BIOS or UEFI depending on the hardware architecture

Full Access
Question # 15

Which filesystem is the recommended filesystem for data volumes?

A.

Btrfs

B.

nfs

C.

Ext3

D.

Ext4

E.

XFS

Full Access
Question # 16

Which system initialization system is used in SLES 15?

A.

undev

B.

init

C.

System V

D.

systemd

E.

UEFI

Full Access
Question # 17

Which command will take a foreground process and suspend it. and then place it in the background as a stopped job?

A.

bg

B.

ctri+&

C.

Ctrl+Z

D.

fg--bg--stop

E.

&&

Full Access
Question # 18

You want to restrict access to your server via SSH to just a few specific users. What will you need to do to accomplish this?

A.

Modify the Authorized option in the /etc/ssh/sshd_config file.

B.

Modify the Permitted option in the ~/.ssh/sshd_config file

C.

Modify the Permitted option is the Assh/sshd_configfile.

D.

Modify the AllowUsers option in the /etc/ssh/sshd_config file.

E.

Modify the Authorized option in the /var/ssh/config file.

Full Access
Question # 19

If you have a service named tftp, which command and options would enable tftp to start automatically when the server starts?

A.

systemctl start tftp

B.

systemctl enable tftp

C.

chkconfig add tftp

D.

systemd start tftp

E.

systemctl enable-start tftp

Full Access
Question # 20

What is required to access updates for SLE?

A.

Software Subscription

B.

Nothing

C.

Account Registration

D.

An account with SUSE Customer Center

E.

An account with SUSE Customer Center and a SLE Product Key

Full Access
Question # 21

What does the term "action* mean when referring to system logging in SUSE Linux Enterprise?

A.

An action defines where a log message ends up such as in a regular file or database table.

B.

An action is used to define the severity of a log message.

C.

An action is used to filter out desired log messages for processing.

D.

An action is a process that the issuing facility must go through before issuing the log message.

Full Access