Practice Free EX362 Exam Online Questions
Question #31
Tower job to disable accounts inactive for 90 days (based on last password change).
- A . See the Explanation.
Correct Answer: A
A
Explanation:
– hosts: ipa1.example.com become: true
tasks:
– shell: ipa user-find –all –raw | awk ‘/uid: /{u=$2}/krbLastPwdChange: /{d=$2; print u" "d}’
register: users
changed_when: false
– set_fact:
cutoff: "{{ (ansible_date_time.epoch | int) – 90*24*3600 }}"
– debug: var=cutoff
– name: Disable stale users
shell: ipa user-disable {{ item.split()[0] }}
when: ( (item.split()[1] | to_datetime).strftime(‘%s’) | int ) < cutoff
loop: "{{ users.stdout_lines }}"
(Refine date parsing for your environment.)
A
Explanation:
– hosts: ipa1.example.com become: true
tasks:
– shell: ipa user-find –all –raw | awk ‘/uid: /{u=$2}/krbLastPwdChange: /{d=$2; print u" "d}’
register: users
changed_when: false
– set_fact:
cutoff: "{{ (ansible_date_time.epoch | int) – 90*24*3600 }}"
– debug: var=cutoff
– name: Disable stale users
shell: ipa user-disable {{ item.split()[0] }}
when: ( (item.split()[1] | to_datetime).strftime(‘%s’) | int ) < cutoff
loop: "{{ users.stdout_lines }}"
(Refine date parsing for your environment.)
Question #31
Tower job to disable accounts inactive for 90 days (based on last password change).
- A . See the Explanation.
Correct Answer: A
A
Explanation:
– hosts: ipa1.example.com become: true
tasks:
– shell: ipa user-find –all –raw | awk ‘/uid: /{u=$2}/krbLastPwdChange: /{d=$2; print u" "d}’
register: users
changed_when: false
– set_fact:
cutoff: "{{ (ansible_date_time.epoch | int) – 90*24*3600 }}"
– debug: var=cutoff
– name: Disable stale users
shell: ipa user-disable {{ item.split()[0] }}
when: ( (item.split()[1] | to_datetime).strftime(‘%s’) | int ) < cutoff
loop: "{{ users.stdout_lines }}"
(Refine date parsing for your environment.)
A
Explanation:
– hosts: ipa1.example.com become: true
tasks:
– shell: ipa user-find –all –raw | awk ‘/uid: /{u=$2}/krbLastPwdChange: /{d=$2; print u" "d}’
register: users
changed_when: false
– set_fact:
cutoff: "{{ (ansible_date_time.epoch | int) – 90*24*3600 }}"
– debug: var=cutoff
– name: Disable stale users
shell: ipa user-disable {{ item.split()[0] }}
when: ( (item.split()[1] | to_datetime).strftime(‘%s’) | int ) < cutoff
loop: "{{ users.stdout_lines }}"
(Refine date parsing for your environment.)
Question #33
Create a pre-backup health gate to prevent archiving a broken node.
- A . See the Explanation.
Correct Answer: A
A
Explanation:
A
Explanation:
Question #33
Create a pre-backup health gate to prevent archiving a broken node.
- A . See the Explanation.
Correct Answer: A
A
Explanation:
A
Explanation:
Question #35
Delegate safe keytab retrieval to a non-admin “service owner” so they can (re)fetch only HTTP/web1.example.com.
- A . See the Explanation.
Correct Answer: A
A
Explanation:
A
Explanation:
Question #36
Create a shared NFS home root with Kerberos privacy (server side).
- A . See the Explanation.
Correct Answer: A
A
Explanation:
# On nfs1 kinit admin
ipa service-add nfs/nfs1.example.com
ipa-getkeytab -p nfs/nfs1.example.com -k /etc/krb5.keytab dnf -y install nfs-utils
mkdir -p /export/home
echo "/export/home *(rw,sec=krb5p)" >> /etc/exports systemctl enable –now nfs-server rpc-gssd rpc-svcgssd exportfs -rav
(Clients from Q12 will auto-mount with krb5p.)
A
Explanation:
# On nfs1 kinit admin
ipa service-add nfs/nfs1.example.com
ipa-getkeytab -p nfs/nfs1.example.com -k /etc/krb5.keytab dnf -y install nfs-utils
mkdir -p /export/home
echo "/export/home *(rw,sec=krb5p)" >> /etc/exports systemctl enable –now nfs-server rpc-gssd rpc-svcgssd exportfs -rav
(Clients from Q12 will auto-mount with krb5p.)
Question #36
Create a shared NFS home root with Kerberos privacy (server side).
- A . See the Explanation.
Correct Answer: A
A
Explanation:
# On nfs1 kinit admin
ipa service-add nfs/nfs1.example.com
ipa-getkeytab -p nfs/nfs1.example.com -k /etc/krb5.keytab dnf -y install nfs-utils
mkdir -p /export/home
echo "/export/home *(rw,sec=krb5p)" >> /etc/exports systemctl enable –now nfs-server rpc-gssd rpc-svcgssd exportfs -rav
(Clients from Q12 will auto-mount with krb5p.)
A
Explanation:
# On nfs1 kinit admin
ipa service-add nfs/nfs1.example.com
ipa-getkeytab -p nfs/nfs1.example.com -k /etc/krb5.keytab dnf -y install nfs-utils
mkdir -p /export/home
echo "/export/home *(rw,sec=krb5p)" >> /etc/exports systemctl enable –now nfs-server rpc-gssd rpc-svcgssd exportfs -rav
(Clients from Q12 will auto-mount with krb5p.)
Question #36
Create a shared NFS home root with Kerberos privacy (server side).
- A . See the Explanation.
Correct Answer: A
A
Explanation:
# On nfs1 kinit admin
ipa service-add nfs/nfs1.example.com
ipa-getkeytab -p nfs/nfs1.example.com -k /etc/krb5.keytab dnf -y install nfs-utils
mkdir -p /export/home
echo "/export/home *(rw,sec=krb5p)" >> /etc/exports systemctl enable –now nfs-server rpc-gssd rpc-svcgssd exportfs -rav
(Clients from Q12 will auto-mount with krb5p.)
A
Explanation:
# On nfs1 kinit admin
ipa service-add nfs/nfs1.example.com
ipa-getkeytab -p nfs/nfs1.example.com -k /etc/krb5.keytab dnf -y install nfs-utils
mkdir -p /export/home
echo "/export/home *(rw,sec=krb5p)" >> /etc/exports systemctl enable –now nfs-server rpc-gssd rpc-svcgssd exportfs -rav
(Clients from Q12 will auto-mount with krb5p.)
Question #36
Create a shared NFS home root with Kerberos privacy (server side).
- A . See the Explanation.
Correct Answer: A
A
Explanation:
# On nfs1 kinit admin
ipa service-add nfs/nfs1.example.com
ipa-getkeytab -p nfs/nfs1.example.com -k /etc/krb5.keytab dnf -y install nfs-utils
mkdir -p /export/home
echo "/export/home *(rw,sec=krb5p)" >> /etc/exports systemctl enable –now nfs-server rpc-gssd rpc-svcgssd exportfs -rav
(Clients from Q12 will auto-mount with krb5p.)
A
Explanation:
# On nfs1 kinit admin
ipa service-add nfs/nfs1.example.com
ipa-getkeytab -p nfs/nfs1.example.com -k /etc/krb5.keytab dnf -y install nfs-utils
mkdir -p /export/home
echo "/export/home *(rw,sec=krb5p)" >> /etc/exports systemctl enable –now nfs-server rpc-gssd rpc-svcgssd exportfs -rav
(Clients from Q12 will auto-mount with krb5p.)
Question #36
Create a shared NFS home root with Kerberos privacy (server side).
- A . See the Explanation.
Correct Answer: A
A
Explanation:
# On nfs1 kinit admin
ipa service-add nfs/nfs1.example.com
ipa-getkeytab -p nfs/nfs1.example.com -k /etc/krb5.keytab dnf -y install nfs-utils
mkdir -p /export/home
echo "/export/home *(rw,sec=krb5p)" >> /etc/exports systemctl enable –now nfs-server rpc-gssd rpc-svcgssd exportfs -rav
(Clients from Q12 will auto-mount with krb5p.)
A
Explanation:
# On nfs1 kinit admin
ipa service-add nfs/nfs1.example.com
ipa-getkeytab -p nfs/nfs1.example.com -k /etc/krb5.keytab dnf -y install nfs-utils
mkdir -p /export/home
echo "/export/home *(rw,sec=krb5p)" >> /etc/exports systemctl enable –now nfs-server rpc-gssd rpc-svcgssd exportfs -rav
(Clients from Q12 will auto-mount with krb5p.)
