Which process ID is assigned to systemd?
Answer(s): B
The program systemd is the process with process ID 1. It is responsible for initializing the system in the required way. systemd is started directly by the kernel and resists signal 9, which normally terminates processes. All other programs are either started directly by systemd or by one of its child processes.Systemd is the first process that is started by the kernel during boot. It has the process ID of 1. It is responsible for initializing and managing other processes and services on the system.
https://documentation.suse.com/sles/15-GA/html/SLES-all/cha-systemd.htmlhttps://documentation.suse.com/sles/15-SP3/html/SLES-all/cha-systemd-basics.html#sec-systemd- intro
Which file should be edited to make sure a file system is mounted each time a system boots?
The /etc/fstab file contains information about file systems that need to be mounted at boot time or on demand. It specifies the device name, mount point, file system type, mount options, dump frequency, and fsck order for each file system.
https://documentation.suse.com/sles/15- SP3/html/SLES-all/cha-storage-mounting.html#sec-storage-mounting-fstab
Which directory contains the initrd file?
Answer(s): E
The initrd file is an initial ramdisk image that contains the necessary drivers and tools to mount the root file system and start the boot process. It is usually located in the /boot directory along with the kernel image (vmlinuz).
https://documentation.suse.com/sles/15-SP3/html/SLES-all/sec- boot-initrd.html
What types of VNC sessions does SUSE Linux Enterprise Server support? (Choose two)
Answer(s): A,D
SUSE Linux Enterprise Server supports two different kinds of VNC sessions: One-time sessions that "live" as long as the VNC connection from the client is kept up, and persistent sessions that "live" until they are explicitly terminated.5.1 One-time VNC Sessions5.2 Persistent VNC Sessions
https://documentation.suse.com/sles/11-SP4/html/SLES-all/cha- vnc.html#:~:text=SUSE%20Linux%20Enterprise%20Server%20supports,until%20they%20are%20expli citly%20terminated.
Which statements about log file rotation are true? (Choose two)
Answer(s): A,B
Log file rotation is the process of compressing or deleting old log files to save disk space and improve performance. The /etc/logrotate.conf file controls the global settings for log file rotation, such as frequency, size limit, compression method, etc. The /etc/logrotate.d/ directory contains configuration files for specific log files that can override the global settings in /etc/logrotate.conf. The /usr/sbin/logrotate program is used to perform log file rotation according to the configuration files. It is usually invoked by a cron job in /etc/cron.daily/logrotate.
https://documentation.suse.com/sles/15-SP3/html/SLES-all/sec-logrotate.html
Post your Comments and Discuss SUSE SCA_SLES15 exam dumps with other Community members:
DynamoDB
S3
Cognito
RDS
EFS
/sbin/init
/etc/inittab
/etc/rc.d
/etc/init.d
/lib/init.so
/etc/rc.d/rcinit
/proc/sys/kernel/init
/boot/init
/bin/init
Amazon S3 Intelligent-Tiering
S3 Lifecycle
S3 Glacier Flexible Retrieval
Amazon Athena
Amazon EFS
EC2 instance store
ElastiCache for Redis
S3 Glacier Deep Archive
AWS Lake Formation
Amazon EMR Spark jobs
Amazon Kinesis Data Streams
Amazon DynamoDB
Defender for Endpoint
Defender for Identity
Defender for Cloud Apps
Defender for Office 365
S3 Object Lock
SFTP
AWS Transfer Family
Amazon SQS
API Gateway
Lambda
usage plan
AWS WAF
Amazon ECS
Application Load Balancer
AWS Global Accelerator
Network Load Balancer
EC2
Auto Scaling group
CloudFront
ALB
AWS PrivateLink
CRR
SSE-S3
Athena
SSE-KMS
RDS Custom for Oracle
s3:GetObject
Amazon OpenSearch Service
CloudWatch Logs
Kinesis Data Firehose
Kinesis
S3 bucket
SQS
AWS Lambda
AWS Secrets Manager
AWS Systems Manager OpsCenter
secretsmanager:GetSecretValue
seq
for h in {1..254}
for h in $(seq 1 254); do
Kinesis Data Streams
Amazon Redshift
secrets:GetSecretValue
Our website is free, but we have to fight against AI bots and content theft. We're sorry for the inconvenience caused by these security measures. You can access the rest of the SCA_SLES15 content, but please register or login to continue.