Top Banner
1/ Consider the following statements: Statement A: The BSD interface provides a freeware tool that helps to handle the network load. This is achieved by using the robust network services that the BSD interface provides through one of its distribution. Statement B: The System V Interface is a command-line interface that enables you to use the print services. Which of the following is true, with respect to the above statements? a. Statement A is true and statement B is false. b. Statement A is false and statement B is true. c. Both, statements A and B, are true. d. Both, statements A and B, are false. Correct Answer: -> c 2/ While configuring a NIS client you need to configure the ypbind service. Which of the following files will you modify to perform this task? a. /etc/passwd b. /etc/sysconfig/network c. /etc/yp.conf d. /etc/nsswitch.conf Correct Answer: -> c 3/ Consider the statements: Statement A: The range of IP addresses that can be assigned to a computer are known as a dotted quad notation. Statement B: The number of octets that represent the network Id and host Id in the IP addresses varies with the size of the network. Which of the following is true, with respect to the above statements? a. Statement A is true and statement B is false. b. Statement A is false and statement B is true. c. Both, statements A and B, are true.
55
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Test

1/ Consider the following statements:Statement A: The BSD interface provides a freeware tool that helps to handle the network load. This is achieved by using the robust network services that the BSD interface provides through one of its distribution.

Statement B: The System V Interface is a command-line interface that enables you to use the print services.

Which of the following is true, with respect to the above statements? a. Statement A is true and statement B is false. b. Statement A is false and statement B is true. c. Both, statements A and B, are true. d. Both, statements A and B, are false. Correct Answer: -> c

2/ While configuring a NIS client you need to configure the ypbind service. Which of the following files will you modify to perform this task? a. /etc/passwd b. /etc/sysconfig/network c. /etc/yp.conf d. /etc/nsswitch.conf Correct Answer: -> c

3/ Consider the statements:Statement A: The range of IP addresses that can be assigned to a computer are known as a dotted quad notation.

Statement B: The number of octets that represent the network Id and host Id in the IP addresses varies with the size of the network.

Which of the following is true, with respect to the above statements? a. Statement A is true and statement B is false. b. Statement A is false and statement B is true. c. Both, statements A and B, are true. d. Both, statements A and B, are false. Correct Answer: -> b

4/ Steve Irvin is working as system administrator at Mountain Marketing Inc. He needs to assign dynamic IP addresses to all the computers in the organization. For this, he decides to configure eth1 as the DHCP client. The DHCP server is already present on the network and the host name is Mountain Marketing. How should Steve proceed to perform the task?

a. After setting the value of the NETWORKING parameter equal to yes in the /etc/sysconfig/network file, he needs to edit the contents of the /etc/sysconfig/network-scripts/ifcfg-eth1 file, as follows:DEVICE=eth1

Page 2: Test

ONBOOT=noBOOTPROTO=dhcp

b. After setting the value of the NETWORKING parameter equal to yes in the /etc/sysconfig/network file, he needs to edit the contents of the /etc/sysconfig/network-scripts/ifcfg-eth1 file, as follows:DEVICE=eth1ONBOOT=yesBOOTPROTO=dhcp

c. After setting the value of the NETWORKING parameter equal to no in the /etc/sysconfig/network file, he needs to edit the contents of the /etc/sysconfig/network-scripts/ifcfg-eth1 file, as follows:DEVICE=eth1ONBOOT=yesBOOTPROTO=dhcp

d. After setting the value of the NETWORKING parameter equal to no in the /etc/sysconfig/network file, he needs to edit the contents of the /etc/sysconfig/network-scripts/ifcfg-eth1 file, as follows:DEVICE=eth1ONBOOT=noBOOTPROTO=dhcp Correct Answer: -> b

5/ Pat Wilkins is working as system administrator at Global Systems Inc. Donna is working as software developer with the company. She needs to develop some applications on the Linux platform using Qt 3 and GTK+ 2 graphical toolkits. Therefore, Donna needs Pat to add fonts to her system. She wants the font to be added such that they are smooth-edged. How will Pat perform the given task?

a. To add the fonts, Pat needs to perform the following steps:Copy the new fonts to the directory, /usr/share/fonts/local. Run the following command for updating the font information cache: # fc-cache /usr/share/fonts/local

b. To add the fonts, Pat needs to perform the following steps:Copy the new fonts to the directory, .fonts/, present in the user's home directory. Run the following command for updating the font information cache: # fc-cache /usr/share/fonts/local

c. To add the fonts, Pat needs to perform the following steps:Copy the new fonts to the Fontconfig configuration file. Run the following command for updating the font information cache: # fc-cache /usr/share/fonts/local

Page 3: Test

d. To add the fonts, Pat needs to perform the following steps:Copy the new fonts to the XFree86 configuration file. Run the following command for updating the font information cache: # fc-cache /usr/share/fonts/local Correct Answer: -> b

6/ AB Corp is an advertising company, which is working on Linux platform. Steve, the system administrator, creates a directory, /extrauser. After creating this directory, Steve needs to create a user named john in the /extrauser directory. Which command should Steve use to perform the above task?

a. useradd –d /extrauser john b. useradd –f /extrauser john c. useradd –g /extrauser john d. useradd –c /extrauser john Correct Answer: -> a

7/ Steve Irving is the system administrator in Mastery Mechanics. He needs to install a Linux server on the network of the organization. He is also required to attach a printer to the Linux server so that all the employees of various departments can share the network printer. For this, Steve needs to install Linux on a computer and configure it as a print server using the CUPS daemon. However, after one week some of the employees start complaining to Steve that they are not able to access the printer. The employees also report that when they try to access the printer from their remote Linux system they receive an error message, which states that the permission to access the printer is denied. What could be the problem and how should Steve resolve it?

a. Modify the server configuration file /etc/cups/cupsd.conf, which contains the information required to access the printer. b. Modify the server configuration file /etc/cups/printers.conf, which contains the information required to access the printer. c. Modify the server configuration file /etc/cups/classes.conf, which contains the information required to access the printer. d. Modify the server configuration file /etc/cups/client.conf, which contains the information required to access the printer. Correct Answer: -> a

8/ Which of the following command performs the same task as the mkfs.ext3 /dev/hdc8 command? a. mke2fs –l /dev/hdc8 b. mke2fs –j /dev/hdc8 c. mkfs -c ext3 /dev/hdc8 d. mke2fs –i /dev/hdc8 Correct Answer: -> b

Page 4: Test

9/ You are working as system administrator at Red Sky IT Systems. The organization has Windows server installed on the network. You have been assigned the task of installing Linux on all the computers in the network. Which type of installation method can you use to install Linux in the given scenario? a. Use an FTP Server b. Use an NFS Server c. Use an HTTP Server d. Use a CD-ROM Correct Answer: -> a

10/ Mike Womack is working as a project manager with Smart Software Developers. The network setup of the organization is based on Linux. The organization has a remote server, where the employees save their files. Don Allen, the system administrator of the organization has created user accounts for all the employees of the organization. Mike is working on a project and creates a file, teamproject.txt. Mike wants to assign read permission to all the other users, for the file, teamproject.txt. However, Mike wants to remove all the permissions from the other users, for any other file that he creates. Mike also wants to assign the read and write permissions to his team members, who are working in his project, for all the files that he will create. Which set of commands will enable Mike Womack to set the file access permissions according to his requirement? a. chmod a+r teamproject.txtumask 037 b. chmod a+r teamproject.txtumask 017 c. chmod o+r teamproject.txtumask 017 d. chmod o+r teamproject.txtumask 037 Correct Answer: -> c

11/ Ken Burton, the system administrator at Global Systems Inc. has joined the organization after a long leave. During the leave period, Bill was using Ken’s computer. Bill had replaced the hard disk of Ken’s computer with a new hard disk for personal use. Ken had installed GRUB on the network server in order to boot the Linux operating system. While booting his computer, Ken receives an error at Stage 1 of the loading process and the booting process stops. Which of the following error has caused the booting process to stop? a. Floppy Error b. Hard Disk Error c. Geom Error d. Read Error Correct Answer: -> c

12/ The software department at Supersoft2000 requires Windows 2000 platform to develop software. Chris, the system administrator wants to install the Windows 2000 Server on one of the six partitions of an existing Linux server. To install Windows 2000 Server on this partition, Chris deletes this partition. However, he does not delete the entry of this partition in the /etc/fstab file

Page 5: Test

and restarts the computer. The following error message is displayed:

checking file systemsfsck.ext3/dev/hdc6:The superblock could not be read or doesn’t describe a correct ext2 filesystem. If the device is valid and it really contains an ext2 filesystem (and not swap or ufs or something else), then the superblock is corrupt, and you might try running e2fsck with an alternate superblock:e2fsck –b 8193 <device>: Bad magic number in super-block while trying to open /dev/hdc6 [FAILED]* * * An error occurred during the file system check.* * * Dropping you to a shell; the system will reboot* * * when you leave the shell.Give root password for maintenance(or type Control-D to Continue):How can Chris troubleshoot the problem?

a. Start the system in the rescue mode and delete the entry of the deleted partition in the /etc/fstab file. b. Start the system in the single-user mode and change the root password. c. Start the system in the single-user mode and delete the entry of the deleted partition in the /etc/fstab file. d. Start the system in the rescue mode and change the root password. Correct Answer: -> a

13/ What is the configuration requirements of the desktops used for financial services enterprise

a. Following are the configuration requirements of the desktops used in call centres and help desks:Thin-client computersVoice Over IP integrationComputer telephony integration

b. Following are the configuration requirements of the desktops used in banks and help desks:High storageHigh security requirement

c. Following are the configuration requirements of the desktops used in banks and help desks:Thick client computersOffice applicationsStandard quality printing device

d. Following are the configuration requirements of the desktops used in banks and help desks:High storage capacityFast processing capabilities Correct Answer: -> b

Page 6: Test

14/ Tom Davidson is working, as a system administrator at Mountain Marketing Inc. Tom has been assigned the task of sending the high priority jobs for printing first. Which command will Tom execute to perform the task? a. lpc b. lpstat c. lp d. lpadmin Correct Answer: -> c

15/ Steve is a system administrator at Deez Inc. He needs to load a module into the kernel. He also wants to specify that a kernel module name should be provided explicitly in the command. Which option of the insmod command will Steve use to perform the task? a. insmod -o b. insmod -s c. insmod -p d. insmod -f Correct Answer: -> a

16/ Jim Lewis, the system administrator at Deez Inc, has installed Linux on a computer. Jim wants to collect the information about the parameters that are passed to the kernel during the start up of the kernel. Which file in the /proc/ directory should Jim use to perform this task? a. /proc/apm b. /proc/cmdline c. /proc/cpuinfo d. /proc/dma Correct Answer: -> b

17/ You are the system administrator at Deez Inc. You need to transfer the data from a source computer over a network to the destination computer over another network. For this, packet routing is required from one network to the other. Which feature of Linux kernel should you use for the above task? (GIONG DNS FORWARDER)a. Router b. Routing table c. Default route d. IP forwarding Correct Answer: -> d

18/ Pat configures the dhcpcd daemon and starts his computer. He notices that the IP address is not assigned to his computer. Pat verifies that the dhcpcd daemon is running. Which command should Pat use for the IP address assignment? a. Pat needs to execute the ifconfig command. b. Pat needs to execute the dhcpcd command with the –f option. c. Pat needs to check all the DHCP servers on the network d. Pat needs to execute the route command. Correct Answer: -> b

Page 7: Test

19/ Steve Irvin is working as system administrator at Super Software2002. The domain administrator of the organization wants Steve to provide fonts to the X clients. He also wants Steve to add fonts such that they do not provide support for advanced anti-aliasing feature. Identify the correct sequence of steps that Steve needs to perform to accomplish the given task?

a. To add fonts, Steve needs to perform the following steps:Create a directory, /usr/share/fonts/local/, if it does not already exist. Change to the /usr/share/fonts/local directory. Update the font information of the system.Copy the new font files to the /usr/share/fonts/local directory.Execute the chkfontpath command to add the directory, /usr/share/fonts/local/ to the Xfs FontPath as root directory.Restart Xfs so that the X clients can use the new fonts.

b. To add fonts, Steve needs to perform the following steps:Create a directory, /usr/share/fonts/local/, if it does not already exist. Add the directory created in the first step to the Xfs FontPath as root directory. Copy the new font files to the /usr/share/fonts/local directory. Update the font information of the system.Change to the /usr/share/fonts/local directory.Restart Xfs so that the X clients can use the new fonts.

c. To add fonts, Steve needs to perform the following steps:Create a directory, /usr/share/fonts/local/, if it does not already exist. Copy the new font files to the /usr/share/fonts/local directory. Change to the /usr/share/fonts/local directory. Update the font information of the system.Execute the chkfontpath command to add the directory, /usr/share/fonts/local/ to the Xfs FontPath as root directory.Restart Xfs so that the X clients can use the new fonts.

d. To add fonts, Steve needs to perform the following steps:Create a directory, /usr/share/fonts/local/, if it does not already exist. Add the directory created in the first step to the Xfs FontPath as root directory. Change to the /usr/share/fonts/local directory. Copy the new font files to the /usr/share/fonts/local directory.Update the font information of the system.Restart Xfs so that the X clients can use the new fonts. Correct Answer: -> c

20/ Steve is working as a system administrator at the Smart Software Developers. The company has 50 client computers and one Linux server on the network. Steve updates the Linux server regularly by installing Linux patches. He checks the boot directory each time, to obtain the kernel information and to make sure that the Linux patches are compatible with the kernel version. To avoid searching the boot directory for obtaining the kernel information, Steve wants

Page 8: Test

to display this information at the login prompt. How should Steve display the information on the login prompt? a. Edit the rc.sysinit file to reflect the kernel information at the login prompt b. Edit the rc.serial to reflect the kernel information at the login prompt c. Edit the rc.local to reflect the kernel information at the login prompt d. Edit the rc.news to reflect the kernel information at the login prompt Correct Answer: -> c

21/ Jim Lewis a system administrator at Deez Inc. is working on Linux platform. All the employees of the application development department are working on critical projects. Therefore, regular backup is required to save the data of the developers. Jim is assigned the task of taking weekly backup of data. After taking the backup of files, Jim wants to display the list of files, which have been backed up. Which of the following command should Jim execute to display the list of files? a. Execute the tar –x command b. Execute the tar –c command c. Execute the tar –v command d. Execute the tar –p command Correct Answer: -> c

22/ Steve installs kernel of version 2.2 on his computer. After the installation, he notices that one of the devices is not supported by this version of the kernel. Steve upgrades the kernel from version 2.2 to 2.4 to get support for that device. However, after installation of the kernel of version 2.d. Steve is unable reboot the computer. Why is Jim not able to boot the computer and how should he solve the problem?

a. The kernel of version 2.4 has not overwritten the kernel of version 2.2. Jim needs to boot the system in the single-user mode by using a floppy disk or a CD-ROM to resolve the problem.

b. The kernel of version 2.4 has not overwritten the kernel of version 2.b. but it is copied in the /root directory. Jim needs to boot the system in the rescue mode by using a floppy disk or a CD-ROM to resolve the problem.

c. The kernel of version 2.4 has overwritten the kernel of version 2.2 and the boot loader configuration file is not updated accordingly. Jim needs to boot the system in the rescue mode by using a floppy disk or a CD-ROM to resolve the problem.

d. The kernel of version 2.4 has not overwritten the kernel of version 2.2 and the newly compiled kernel, bzImage, is copied in the /boot directory and the boot loader configuration file is updated accordingly. Jim needs to boot the system in the multiuser mode by using a floppy disk or a CD-ROM to resolve the problem. Correct Answer: -> c

Page 9: Test

23/ Jim Lewis wants to create a filesystem so that he can access other filesystems from a remote computer containing Linux operating system. Which type of filesystem should Jim create? a. ReiserFS b. Journaled File System c. NFS d. SMBFS Correct Answer: -> c

24/ Steve Irving is working as a system administrator at Super Graphics. A new user, Michael joins Super Graphics as a software developer. Steve needs to share a filesystem to enable Michael to access data from his computer. Steve has to opt for the type of filesystem, which would enable Michael to access the filesystem from a remote computer running on Windows NT Server operating system. Which type of filesystem can Steve create? a. SMBFS b. NFS c. JFS d. ReiserFS Correct Answer: -> a

25/ David Johnson is working as a system administrator with Super Graphics. The employees of the organization use OpenOffice.Draw package of Linux to create graphical designs. Jerry Smith, working as an audio-visual expert observes that his computer does not produce good quality sound. Therefore, she asks David to change the soundcard of her computer. David inserts a new sound card on Jerry's computer and downloads the module for the sound card, through the Internet from the vendor's Web site. Now, David wants to install the module for the sound card in the kernel of Jerry's computer. However, David wants to load the module for the sound card in the kernel even if the current kernel version installed in the computer and the version of the kernel for which the module is created are not same. Which command should David use to perform the given task? a. insmod -o [module_name] b. insmod –s [module_name] c. insmod -f [module_name] d. insmod -p [module_name] Correct Answer: -> c

26/ John requires some data from a file stored in a directory on a floppy disk. His computer has Linux operating system. After finishing his work, John unmounts the floppy disk. For this, he executes the umount command as shown below:# umount /dev/fd0 However, the system displays an error message, “Device is busy”. Which of the following steps will help John identify and solve the problem?

a. Determine the current directory. If the current directory is located on the floppy disk, change to a directory that is not located on the floppy disk. Unmount the floppy disk

Page 10: Test

b. Determine the current directory. Execute the rm –r command to delete the directory on the floppy. Unmount the floppy disk

c. Determine the current directory. Delete the file on the floppy. Unmount the floppy disk.

d. Determine the current directory. Execute the rm --r command to delete the directory on the floppy. Unmount the floppy disk Correct Answer: -> a

27/ Debbie Howe, an employee of SuperGraphics needs to access the file containing the daily schedule information of the project on which he is working. This file is located on the computer of Ken Bruton, the team leader at the company.Ken had the dual operating system, Windows 2000 and Linux installed on his computer. The file was created on Windows 2000. As the Windows 2000 Server has crashed on Ken’s computer, he boots the computer using Linux. Ken tries to mount the file from Windows 2000 to Linux using the mount command. The system generates an error displaying, ‘Virtual File Allocation table (VFAT) file system is not supported’. Ken informs the system administrator about the problem. What could be the cause of the error?

a. Ken does not have the read permissions for the files, which he wants to access. b. Linux does not have the necessary modules required to support the Windows filesystems. c. The file that Ken is trying to access is not exported by the system in which it is stored. d. Another filesystem is mounted on the same mount point as that of the filesystem, which Ken wants to access. Correct Answer: -> b

28/ You are working as a system administrator at Global Systems Inc. You need to create an alternate file hierarchy in the /etc/sysconfig/networking directory on the server, which is using ISDN network interface. Which command will you run to perform this task?

a. ifconfig b. neat c. mii-tool d. netconfig Correct Answer: -> b

29/ Chris is working as an assistant system administrator at Multi Store Inc. Chris finds that Sendmail and IMAP services are not functioning properly. Which of the following log files should Chris check to find out the errors that are logged?

a. Check the entries in the /var/log/message log file. b. Check the entries in the /var/log/maillog log file. c. Check the entries in the /var/log/htpd log file. d. Check the entries in the /var/log/samba log file. Correct Answer: -> b

Page 11: Test

30/ Which of the following files contain the information about the system memory that is currently in use? a. /system/meminfo b. /proc/memoryinfo c. /proc/cpuinfo d. /proc/meminfo Correct Answer: -> d

31/ Pat Greene is working as system administrator at Safest Software Inc. Pat is required to monitor the systems of the company to administer the network resources efficiently in the Linux environment. For this, Pat needs information about the processes, memory, paging, block IO, traps, and CPU activity of the computers. In addition, he also needs to display an updated report on the virtual memory statistics. How should Pat accomplish the given task?

a. He needs to run the following command:# vmstat <delay> b. He needs to run the following command:# iostat –v c. He needs to run the following command:# iostat –d d. He needs to run the following command:# vmstat –n Correct Answer: -> a

32/ Ken Burton is working as system administrator at Indestructible Boxes Inc. Peter, an employee of the company complains to Ken about the slow processing speed of his computer. For this, Ken decides to create a swap space named /dev/hdc9 on his computer to increase the available amount of RAM. After creating and activating the swap space, Ken restarts the computer. Ken notices that processing speed of the computer has still not increased. What task should Ken perform to solve the given problem?

a. Ken needs to edit the /etc/fstab file, and add the following entry to activate the swap space, as follows:/dev/hdc9 swap swap defaults 0 0

b. Ken needs to edit the /etc/fstab file, and the following entry to activate the swap space, as follows:/dev/hdc9 swap ext3 defaults 0 0

c. Ken needs to edit the /etc/fstab file, and add the following entry to activate the swap space, as follows:/dev/hdc9 swap ext3 defaults 1 1

d. Ken needs to edit the /etc/fstab file, and add the following entry to activate the swap space, as follows:/dev/hdc9 swap swap defaults 1 1

Page 12: Test

Correct Answer: -> a

33/ Steve is working as a system administrator at Smart Software Developers. The company has 50 client computers and one Linux server on the network. The company has opened a new branch at Houston for the Finance department. The management asks Steve to create a file system that prevents the data loss in case of a power failure or a system breakdown. Therefore, Steve creates the ext3 filesystem on the /dev/hdc8 partition of the Linux server. After a few months, Steve decides to resize the partition due to some disk space constraints. Steve uses the resize2fs disk utility to resize the partition. However, Steve fails to resize the partition. What could be the cause of the problem?

a. Steve has not updated the /etc/fstab file to change the ext3 filesystem to the ext2 filesystem. b. The ext3 filesystem cannot be converted into ext2 filesystem so resize2fs utility cannot be used. c. The ext3 supports only tune2fs command to resize the partition. d. The ext3 file system does not support the resize2fs disk utility. Correct Answer: -> d

34/ Debbie Howe is working as a system administrator with True Travel Services. The organization uses a network printer across all departments. However, recently the printer is not working properly. Debbie has been communicated reports that on accessing the printer, it displays an error message: bash: /dev/lp0: Permission denied.How should Debbie troubleshoot the problem?

a. Debbie needs to provide access control to enable the users of the remote hosts to print to the printer by performing the following steps:Open the /etc/hosts file.Add the IP addresses of the remote hosts.Stop and restart the print service.

b. Debbie needs to provide access control to enable the users of the remote hosts to print to the printer by performing the following steps:Open the /etc/host.deny file.Add the IP addresses of the remote hosts.Stop and restart the print service.

c. Debbie needs to provide access control to enable the users of the remote hosts to print to the printer by performing the following steps:Open the /etc/printcap file.Add the IP addresses of the remote hosts.Stop and restart the print service.

d. Debbie needs to provide access control to enable the users of the remote hosts to print to the printer by performing the following steps:Open the /etc/hosts.equiv file.

Page 13: Test

Add the IP addresses of the remote hosts.Stop and restart the print service. Correct Answer: -> d

35/ Tom Wilkins is the system administrator at Red Sky IT Systems that uses Linux for all business purposes. Tom has implemented a Linux based LAN in the organization and has installed a print server on the LAN. He has also installed the LPRng service on the print server. The employees of all the departments use the print server to print their documents. They submit their print jobs using the lpr command. However, the employees of the Accounts department complain that the printer is taking a long time to print the documents. The employees request Tom to restrict the print commands given by the other departments until the Accounts documents have been printed. How should Tom resolve the problem? a. Execute the lpc –disable command. b. Edit the /etc/lpd.conf file. c. Execute the lpc – abort command d. Edit the /etc/printcap file. Correct Answer: -> c

36/ Steve is assigned the task of installing Linux on a computer on which Windows 98 is already installed. He does not have the bootable Linux CD-ROM. Which type of installation method would Steve prefer to install Linux? a. Use an FTP Server b. Use the Hard Drive c. Use an HTTP Server d. Use a CD-ROM Correct Answer: -> b

37/ John is recently recruited as a software developer in Smart Software Developers. He has been assigned the task of developing an accounting application. For this, John requires accounting package software for his computer. Chris, the system administrator at Smart Software Developers, has been assigned the task for installing the software on Chris’s computer. For this, Chris wants information about the directory that contains initialization scripts related to the installed software packages. Which directory will Chris use to perform this task? a. /etc/profile.d b. /etc/bashrc c. ~/.bash_profile d. /etc/profile Correct Answer: -> a

38/ Jim Lewis is working as a system administrator with New Tech Books. The network setup of the organization is based on Linux. Jim has recently installed and configured a Linux server at a remote location. He has also created user accounts for all the employees of the organization on the remote server. Diane Frye, the head of the Sales department is creating the annual sales report of the organization. Diane has created a folder, Sales_Report, in her home directory and placed all the files related to the annual sales report of the organization in that folder. Diane has also assigned all the access permission to the files that she has created and asked the members of

Page 14: Test

her department to access the files from the Sales_Report folder. After one week, Diane finds that someone has removed some files from the Sales_Report folder. However, Diane does not want to change the access permission on the files. Therefore, Diane reports the matter to Jim and asks Jim to set such permissions on the Sales_Report folder so that no other users except her or system administrator, can remove any files from the folder. What should Jim do to perform the task? a. Set setUID bit permission on the Sales_Report directory by using the command, chown u+s Sales_Report. b. Enable sticky bit permission on the Sales_Report directory by using the command, chmod +t Sales_Report. c. Set setGID bit permission on the Sales_Report directory by using the command, chown g+s Sales_Report. d. Remove setUID bit permission on the Sales_Report directory by using the command, chmod u–s Sales_Report. Correct Answer: -> b

39/ Tom Wilkins works as a network administrator at Supersoft2000. The employees of the organization use Linux platform to work on their projects. Tom installs DHCP server on the network to assign IP addresses to the client computers. Jim Lewis, an employee of Supersoft2000 needs to check the IP addresses assigned to his computer. For this, Jim executes the ifconfig command. However, the command does not show the IP addresses of his computer. Jim informs Tom about the problem and asks him to resolve it. How can Tom troubleshoot the problem? a. Configure the /etc/dhcpd.conf file and restart dhcpcd daemon. b. Execute the command,route add –host 255.255.255.255 dev eth0 c. Execute the dhcpcd command with the –f option. d. Check all the DHCP servers on the network, including any Microsoft Windows DHCP server that might have assigned the IP addresses to Jim’s computers. Correct Answer: -> a

40/ Corrine Wallace is working as an IT consultant at Blue Moon Computers. The organization is planning to implement an IT infrastructure. The management of the organization notices that organization requires servers at every level of business operations to implement IT infrastructure. Therefore, organization assigns Corrine the task of planning server solutions for business operations, such as caching services and proxy services. The organization also asks Corrine to plan server solutions for domain naming, directory, firewall and security services. In addition, the organization asks Corrine to implement servers that can effectively provide services to end users in spite of the heavy load on it. Which servers Corrine need to implement to perform the task? a. Corrine needs to implement web and infrastructure servers. In addition, Corrine needs to implement high-end servers, such as OLTP Med and BI servers. b. Corrine needs to implement workgroup and infrastructure servers. c. Corrine needs to implement web and workgroup servers. d. Corrine needs to implement web and infrastructure servers. Correct Answer: -> a

Page 15: Test

41/ Pat Wilkins is working as an assistant system administrator at New Tech Bookstore. Pat wants to check whether IP forwarding is disabled or enabled on the Linux server. Which command will Pat execute to perform the given task? a. # ls /proc/sys/net/ipv4 b. # vi /etc/sysctl.conf c. # echo "1" > /proc/sys/net/ipv4/ip_forward d. # cat /proc/sys/net/ipv4/ip_forward Correct Answer: -> d

42/ Lee is a system administrator at Countrywide Markets. John a software developer wants a package to be installed on his computer. John asks Lee to install the required package on his computer. However, when Lee starts installing the package, the system displays a message that the package is already installed. Which command can Lee use to upgrade the package? a. rpm -e b. rpm -h c. rpm -I d. rpm -F Correct Answer: -> d

43/ Bob is working, as an assistant system administrator at Global Systems Inc. Bob wants to invoke the services that a kernel provides for various processes running on a computer, such as reading the contents of a file. Which kernel module, Bob should use to perform the above task? a. Device driver b. System call c. Network Driver d. Executable Interpreter Correct Answer: -> b

44/ Larry Williams is working as network administrator at Smart Software Developers. Recently, the organization has been facing frequent power failures. To protect the data, the domain administrator of the organization wants Larry to backups all the servers of the company daily at 6:00 P.M. The domain administrator wants Larry to automate the process. How should Larry automate the process of backing up? a. Use /etc/at.allow configuration file b. Use /etc/crontab file configuration file c. Use /etc/cron.daily configuration file d. Use /etc/at.deny files configuration file Correct Answer: -> b

45/ Donna Johnson is working as system administrator at New Tech Books. The employees of the New Tech Books have the ext2 filesystem implemented on the partition /dev/hdc8 on their systems. They need to access NFS server for sharing and storing their data. However, NFS server has the ext3 filesystem configured on it. Therefore, Steve needs to make the ext2 filesystem compatible with the ext3 fileystem. How should Donna troubleshoot the given problem?

Page 16: Test

a. To convert the ext2 filesystem into the ext3 filesystem, Donna needs to perform the following steps: 1. # /sbin/tune2fs -j /dev/hdc8 ( 2. # /sbin/e2fsck -y /dev/hdc8 ( 3. Mount the ext3 filesystem if there are no errors by using _ the following command: # mount –t ext3 /dev/hdc8 /mnt/NewPartition ( 4. Update the filesystem type option in the /etc/fstab file to _ automount the filesystem after the system is restarted.

b. To convert the ext2 filesystem into the ext3 filesystem, Donna needs to perform the following steps: 1. # /sbin/e2fsck -y /dev/hdc8 ( 2. # /sbin/tune2fs -j /dev/hdc8 ( 3. Mount the ext3 filesystem if there are no errors by using _ the following command: # mount –t ext3 /dev/hdc8 /mnt/NewPartition ( 4. Update the filesystem type option in the /etc/fstab file to _ automount the filesystem after the system is restarted.

c. To convert the ext2 filesystem into the ext3 filesystem, Donna needs to perform the following steps: 1. # /sbin/e2fsck -y /dev/hdc8 ( 2. # /sbin/tune2fs -j /dev/hdc8 ( 3. Update the filesystem type option in the /etc/fstab file to _ automount the filesystem after the system is restarted. 4. Log on as the root user and mount the partition, which _ contains the ext2 filesystem as follows: # mount /dev/hdc8 (

d. To convert the ext2 filesystem into the ext3 filesystem, Donna needs to perform the following steps: 1. # /sbin/e2fsck -y /dev/hdc8 ( 2. # /sbin/tune2fs -j /dev/hdc8 ( 3. Update the filesystem type option in the /etc/fstab file to _ automount the filesystem after the system is restarted. 4. Log on as the root user and unmount the partition, which _ contains the ext2 filesystem as follows: # umount /dev/hdc8 ( Correct Answer: -> a

46/ Safest Software Inc. is a leading software export organization that has opened a new branch office at Singapore to expand their business in Asia Pacific. The branch office has 150 client computers and three servers on their network based on Linux operating system. Steve is appointed as a system administrator at the branch office. All the clients are working in the desired runlevel to support the applications used by the organization. The organization has to export software that requires the multimedia-enabled computers. The software needs to be tested on Linux computers before exporting it. John, a testing engineer is assigned the task of testing

Page 17: Test

the multimedia application, but he is unable to open that application. John asks Steve to solve the problem. How should Steve solve the problem? a. Steve should set the default runlevel to 1 to start the Linux server in graphical mode. b. Steve should set the default runlevel to 5 to start the Linux server in graphical mode. c. Steve should set the default runlevel to 6 to start the Linux server in graphical mode. d. Steve should set the default runlevel to 4 to start the Linux server in graphical mode. Correct Answer: -> b

47/ Christine Turner needs to send an important file to Mary Peterson, who is working at the head office. For this, the system administrator needs to configure a route so that the file can be transferred to Mary’s computer, with the IP address 192.165.0.150However, on executing the command, the computer displays an error stating gbroadcast: Unknown host. How should the system administrator troubleshoot the error?

a. The system administrator needs to add the name of the host in the /etc/hosts file:192.168.0.130 gbroadcastNext, Christine needs to execute the following command:# route add –net gbroadcast dev eth0

b. The system administrator needs to add the name of the host in the /etc/hosts file:192.165.0.150 gbroadcastNext, Christine needs to execute the following command:# route add –net gbroadcast dev eth0

c. The system administrator needs to add the name of the host in the /etc/hosts file:192.165.0.150 broadcastNext, Christine needs to execute the following command:# route add –host gbroadcast dev eth0

d. The system administrator needs to add the name of the host in the /etc/hosts file:192.165.0.150 gbroadcastNext, Christine needs to execute the following command again:# route add –host gbroadcast dev eth0 Correct Answer: -> d

48/ Jim Lewis is the system administrator with Desktop Computers. He has configured a Linux based LAN in the organization and has installed a print server on the network. Jim has configured both LPRng and CUPS services on the print server to manage multiple packages that provide the same service. He needs to add a group of alternatives to the system and specify the name of a master link. For this, Jim executes the alternatives link --set command, and observes that the command is not working. What could be the problem and what should Jim do to resolve the problem? a. The set option is used only to set alternatives and its links. Jim needs to execute the alternatives name --install command to perform the required tasks. b. The set option is used only to set alternatives and its links. Jim needs to execute the

Page 18: Test

alternatives link --install command to perform the required tasks. c. The link option is incorrect. Jim needs to execute the alternatives name –set command to perform the required tasks. d. The specified command is incorrect. Jim needs to execute the alternatives name --display command to perform the required tasks. Correct Answer: -> a

49/ Pat Greene is working as a system administrator at IBG Inc. Pat has created a partition in his system to develop and save the application. The maximum file size of 2 GB is sufficient for Pat to perform his work. The filesystem that he will be using, stores the state of the filesystem in the superblock, and uses this state to verify whether the filesystem contains any errors. Pat needs journaling feature in the filesystem to ensure no data is lost due to system failure. Therefore, Pat wants to create the filesystem that supports the above features. Which filesystem can Pat use to develop the application? a. ext2Fs b. ext3 c. JFS d. SMBFS Correct Answer: -> b

50/ Smart Solutions Corp is recruiting new employees to expand their customer base. A new employee, Michael joins the organization and is assigned a project that was earlier being handled by Susan. Steve, the system administrator, has changed the ownership of files that contains the required information and set the particular option so that no error message is displayed, if the specified file does not exist at user end. Which command should Steve use for the task? a. chown –R b. chown -f c. chown -v d. chown -c Correct Answer: -> b

51/ Martina is working as a system administrator in PQR Corp. Martina finds that some of the computers are displaying an error message, lp: error –no default destination available, while giving the command for printing the documents. Which task should Martina perform to troubleshoot this problem? a. Remove the paper that is stuck in the printer. b. Insert fresh paper in the tray. c. Switch on the power supply after checking that the plug is in the socket. d. Install and configure the printer. Correct Answer: -> d

52/ Donna Bard, a system administrator with Countryside Markets, uses Linux as the operating system. She wants to view the group ID of a customer named Mike Womack. When Donna executes the command, grep Mike Womack /etc/passwd, the system raises an error stating “grep: Wall: no such file or directory” before displaying the required information. How should Donna troubleshoot the problem?

Page 19: Test

a. # grep ‘Mike Womack’ /etc/passwd b. # grep MikeWommack /etc/passwd c. # grep "Mike Womack" /etc/passwd d. # grep `Mike Womack` /etc/passwd Correct Answer: -> c

53/ Donna Bard works as a network administrator at Countryside Markets. All the employees of the organization work on Linux platform. Various DHCP servers, which assign IP addresses to the computers, are installed on the network. Donna configures the dhcpcd daemon, which broadcasts the request to the DHCP servers to get an IP address. After configuring the daemon, Donna starts her computer. However, Donna notices that the IP address is not assigned to her computer. Donna verifies whether the dhcpcd daemon is running properly or not. She finds that the dhcpcd daemon is running fine. How can Donna troubleshoot the problem? a. Execute the command:route add –host 255.255.255.255 dev eth0 b. Check whether the information in the /etc/dhcpd.conf file is correct. c. Execute the dhcpcd command with the –r option. d. Execute the dhcpcd command with the –f option. Correct Answer: -> d

54/ Nancy Jones is working as a system administrator with Red Sky IT Systems. The network setup of the organization is based on Linux. All employees of the organization save data in their respective home directory on the Linux server. The management of the organization has assigned Nancy the task of taking the backup. Therefore, Nancy configures a central backup server with multiple backup tape drives. Nancy also wants to create the backup from all the disks listed in the disklist file in the backup server using a single command. In addition, Nancy wants the backup server to send an e-mail message reporting the files that failed to be backed up and the files that were successfully backed up after creating the backup. Which backup utility should Nancy implement to perform the required task?

a. Nancy should use the Amanda utility. b. Nancy should use the Veritas utility. c. Nancy should use the dump/restore utilities. d. Nancy should use the cpio utility. Correct Answer: -> a

55/ Donna is an in-house network administrator at Multi Marketing Inc. Donna needs to store the print queue definitions manually, instead of using the redhat-config-printer tool. Which configuration file will Donna use to perform this task?

a. /etc/printcap b. /etc/lpd.conf c. /etc/lpd.perms d. /etc/printcap.local Correct Answer: -> d

Page 20: Test

56/ Consider the following statements:Statement A: You can assign more then one IP address to an NIC.

Statement B: You need to create a new configuration file for each NIC that is installed on your computer.

Which of the following is true, with respect to the above statements? a. Statement A is true and statement B is false. b. Statement A is false and statement B is true. c. Both, statements A and B, are true. d. Both, statements A and B, are false. Correct Answer: -> c

57/ Consider the statements:Statement A: The passwords should be easy to decipher.

Statement B: The passwords should be of adequate length.

Which of the following is true, with respect to the above statements? a. Statement A is true and statement B is false. b. Statement A is false and statement B is true. c. Both, statements A and B, are true. d. Both, statements A and B, are false. Correct Answer: -> b

58/ You are the assistant system administrator at Deez Inc. and are required to set a default printer, HP DeskJet on the Sales Manager’s computer. The printer should be configured to queue the print jobs. Which command should you use for the above task?

a. lpadmin b. lpstat c. lp d. lpr Correct Answer: -> a

59/ Peter Irvin is the domain administrator at Mountain Marketing Inc. He has scheduled tasks such as, executing scripts, backing up data and executing the echo command on his computer, such that they are performed automatically at different timings in a day. During the day, how should Peter view the list of the jobs that are yet to be executed?

a. atq command b. at command c. cron command d. atrm command Correct Answer: -> a

Page 21: Test

60/ Larry Williams is working as domain administrator at Technology Systems. To automate the installation process, Larry has installed Linux on his computer with the help of the kickstart file. Larry needs to install three group packages ServerSystem, WindowsSystem, and WindowsSoftware and two individual packages ClientSystem and MasterSystem on his computer. How should Larry perform the task? a. Larry needs to make the following entries in the kickstart file:### Package Installation%package@ServerSystem@WindowsSystem@WindowsSoftwareClientSystem MasterSystem

b. Larry needs to make the following entries in the kickstart file:### Package Installation%package@ ServerSystemWindowsSystemWindowsSoftwareClientSystem MasterSystem

c. He needs to make the following entries in the kickstart file:### Package Installation%package@ ClientSystem @ MasterSystemServerSystemWindowsSystemWindowsSoftware

d. He needs to make the following entries in the kickstart file:### Package Installation%package@ ServerSystem@ WindowsSystem@ WindowsSoftwareClientSystem MasterSystem Correct Answer: -> d

61/ Steve Irving is working as the system administrator at Global Systems Inc., which uses Linux for all business purposes. The organization is working on a project, which requires the team leaders to frequently communicate with each other and with the client. The e-mail utility is not supported efficiently by the existing operating system. Therefore, the management has asked

Page 22: Test

Steve to upgrade the operating system installed on the computers of all the team leaders. Steve has decided to perform this task automatically using a kickstart file. Steve logs on to Jim, a team leader’s system and executes the command cp anaconda –ks.cfg ks.cfg to create a kickstart file. However, the command is not working. What is the problem and how can Steve solve it? a. The specified root directory is incorrect. Steve should use the name, ethereal, as the root directory. b. The kickstart command can be created only by a root user. Steve needs to log on as the root user and execute the specified command. c. The command executed is incorrect. Steve needs to use the Kickstart Configurator utility to create the kickstart file. d. The order of specifying the kickstart sections is incorrect. The order of kickstart sections should be command, %pre, %package, and %post. Correct Answer: -> b

62/ The project team of the Software Development department is not able to save their work on the server. When they try to save their work on the server, it shows an error message that there is no space on the hard disk. Therefore, David, the system administrator resizes a partition on the hard disk of the server, which has been allocated for user data. After resizing the partition, when David tries to boot the server he finds that the boot partition fails to mount the boot partition. What is the reason that the boot partition, on the server, fails to mount the boot partition and how should David resolve the error? a. The problem occurs because the partition number of the boot partition, /, is changed. To resolve the error, David needs to switch to the single-user mode and change the entry corresponding to the path of the / partition in the /etc/fstab file.

b. The problem occurs because the partition number of the boot partition, /, is changed. To resolve the error, David needs to switch to the emergency mode and change the entry corresponding to the path of the / partition in the /etc/fstab file.

c. The problem occurs because the partition number of the boot partition, /, is changed. To resolve the error, David needs to reboot the system in a runlevel and change the entry corresponding to the path of the / partition in the /etc/fstab file.

d. The problem occurs because the partition number of the boot partition, /, is changed. To resolve the error, David needs to boot the system in the rescue mode and change the entry corresponding to the path of the / partition in the /etc/fstab file. Correct Answer: -> d

63/ Steve is the system administrator with Red Sky IT Systems. The management of the organization has assigned Steve the task of providing print service to some of the employees of the organization. The employees of the IT department and the Accounts department, at Red Sky IT Systems, want to install printers, locally. Steve decides to install the various printers and configure them using the CUPS daemon to fulfill the requirements of both the departments. Steve also wants to record the information about all the local available printers in both the departments and the new jobs given to the printers. How can Steve perform these tasks?

Page 23: Test

a. Steve can record the information by using the lpstat command, editing the /etc/printcap.local file and then executing the lpadmin command.

b. Steve can record the information by using the lpstat command and editing the Info parameter and the Accepting parameter in the /etc/cups/printers.conf file.

c. Steve can record the information by using the lpstat command and configuring the LPRng service.

d. Steve can record the information by using the lpstat command and editing the Info parameter and the Accepting parameter in the /etc/cups/cupsd.conf file. Correct Answer: -> b

64/ Consider the statements:Statement A: A parallel port sends one bit of information at a time.

Statement B: A serial port sends eight bits of information at a time.

Which of the following statements is correct? a. Statement A is true and statement B is false. b. Statement A is false and statement B is true. c. Both, statements A and B, are true. d. Both, statements A and B, are false. Correct Answer: -> d

65/ Steve works, as a system administrator at Global Systems Inc. Steve needs to store the data of all the employees centrally at the Linux server. He also wants to ensure that no data is duplicated across the hard disks. For this, Steve decides to divide the data into strips to store the data across all the hard disks in an array. Which RAID configuration does Steve use for the preceding requirements? a. Linear RAID b. Level 0 c. Level 1 d. Level 5 Correct Answer: -> b

66/ Chris, the system administrator of the company adds a route from his computer to John’s computer by executing the route add –host 192.168.16.66 dev eth0 command. Chris’s computer raises an error, 192.168.16.66: Unknown host. Which of the following task should Chris perform to solve this problem? a. Add the name of the host in the /etc/hosts file of the computer. b. Check all the DHCP servers in the network. c. Add the dhcpcd daemon to the boot-up script, (/etc/sysconfig/network-scripts/ifup) d. Execute the dhcpcd command with the –f option. Correct Answer: -> a

Page 24: Test

67/ Ronald Billing works as a system administrator at Mastery Mechanics. The organization has installed a network printer, which is used by various systems over the network for printing the documents related to various projects. The printer is not working properly since last couple of days. Therefore, Ronald replaces the printer with a new one, configures it and starts the print service. However, when John, an employee of the organization uses the printer, a problem occurs. The printer shows a staircase effect. John informs Ronald about the problem. How can Ronald troubleshoot the problem that occurs while printing the documents? a. 1. Open the /etc/hosts.equiv or the /etc/hosts.lpd file.2. Stop and restart the print service.

b. 1. Open the /etc/hosts.equiv or the /etc/hosts.lpd file. 2. Add the IP addresses of the remote hosts.3. Stop and restart the print service.

c. 1. In the printtool utility, edit printer entry and click on Select _ button to open the Configure Filter dialog box.2. Select the correct driver for your printer.

d. 1. In the printtool utility, edit printer entry and click on select _ button to open the Configure Filter dialog box.2. Select the Fix stair-stepping text option under the Printing _ Options section. Correct Answer: -> d

68/ Jim Wilkins is working as a storage administrator at Blue Moon Computers. Jim implements Integrated Device Electronics (IDE) to determine the physical limits of the storage scalability in the organization. However, the organization wants Jim to extend a system’s local storage beyond the limitations of IDE. Which of the following Jim can implement to perform the task?a. Fibre Channel–based storageb. SCSIc. iSCSI

a. a and b both b. Only a c. Only b d. a and c both Correct Answer: -> d

69/ Steve Irvin is working as an IT consultant at Red Eye Experts. The organization consists of 5000 desktops running on multiple platforms, such as Linux and Windows, and connected through LAN and WAN. Steve needs to identify a tool to automate and centralize the management of desktops in the organization. He also needs to identify a tool that can implement policy-based management of desktops in the organization. Which tool should Steve select for this? a. WebTMA b. Unicenter’s Desktop Management Solution c. Radmin

Page 25: Test

d. PMP 6.0 Correct Answer: -> b

70/ Which of the following activity should be performed to manage VPNs in an enterprise? a. Use a secure remote syslog server to make it difficult for the malicious user to manipulate the log. b. Enforce strong authentication based on the volume of remote users and value of the resources that are being accessed. c. Use biometrics mechanisms to protect IT infrastructure from thefts or unauthorized attacks. d. Ensure that all executable files, which you receive in the organization through e-mail, are checked and approved. Correct Answer: -> b

71/ Donna Johnson is working as an IT Consultant in Super Software 2000. Super Software 2000 is a large organization, which is spread across many countries and functions through distributed network system. Donna is getting complaints regarding performance problems in Internet, intranet, and extranet resources of the organization. Which of the following tool or solution should Donna use to monitor and troubleshoot LAN, WAN, and VLANs? a. HP OpenView Network Management Solution b. Unicenter Network Management Solution c. Observer 10.1 d. LANBrowser 1.3 Correct Answer: -> b

72/ Jim Lewis is working as a system administrator at Good Graphics Inc. Jim wants to use a multi-platform security management solution that can provide plug-in-integration between the security tool and the solution to collect the alerts. Which one of the following solution should Jim use to perform the required task? a. HP OpenView Security Management Solution b. IBM Tivoli Security Compliance Manager c. LANBrowser 1.3 d. WebScout 2.1 Correct Answer: -> a

73/ Red Eye Systems Inc. is a software development company. The company is planning a new software development facility in Arizona. This facility will develop system software in C/C++ on UNIX platform. Because this is a new project the company does not want to invest heavily in computing resources. In addition, the development process does not require too many resource consuming tools, except for C/C++ compilers, CLI debugging and testing tools and UNIX platform. The programmers will not be allowed to share files and folders as the code will be integrated in the next step of the SDLC. Which of the following computing model would you suggest to the company as a networking consultant? a. Centralized network computing model with thin clients b. Centralized network computing model with thick clients c. Distributed network computing model with thick clients d. Collaborative network computing model

Page 26: Test

Correct Answer: -> a

74/ Which of the following can be termed as necessary services? a. Services that must be available at peak load b. Services essential to operation c. Services that must be available, but can be available at reduced performance. d. Services that can be postponed indefinitely Correct Answer: -> c

75/ Consider the following statements:Statement A: Optional services are the services that must be available at peak load.

Statement B: Integrity requirements of QoS maintain the definiteness of the interaction between the server and the user.

Which of the following is correct? a. Both, statement A and B are true b. Statement A is true and statement B is false c. Statement A is false and statement B is true d. Both, statement A and B are false Correct Answer: -> c

76/ Donna Johnson is working as an IT consultant at Red Eye Experts. The organization needs to implement effective server solutions to increase employee productivity and reduce operating costs. Donna is assigned the task of implementing servers that can handle the services running in the HPC layer of the server deployment architecture of the organization. The organization also asks Donna to implement servers for file and printing services. Which servers Donna will implement to perform the task? a. Donna needs to implement high-end servers, such as OLTP Med and BI servers. b. Donna needs to implement infrastructure servers. c. Donna needs to implement servers that have large memory, can store very large data sets, and can take load of high transaction volumes, such as ERP Large servers, OLTP Large servers. In addition, Donna needs to implement workgroup servers. d. Donna needs to implement high-end servers, such as HPC servers and OLTP large. Correct Answer: -> c

77/ Which of the following is caused by variations in queue length and the processing time needed to reorder packets arrived out of order due to travelling over different paths? a. Jitter b. Throughput c. Availability d. Packet loss Correct Answer: -> a

78/ Mike Womack is working as a storage administrator at Red Eye Experts. Mike is assigned the task of selecting an efficient storage technology for the organization that suits its

Page 27: Test

requirements. The organization wants Mike to select a storage technology that can enable multiple users to share the same storage space thus minimizing the overall overheads by centrally managing hard disks. Which storage technology Mike should select to perform the assigned task? a. Redundant Array of Inexpensive Disks b. Tape Drives c. Storage Area Networks d. Network-Attached Storage Correct Answer: -> d

79/ Larry Williams is working as a network administrator in Blue Valley Consulting. Larry is assigned the task of selecting an appropriate network technology in the enterprise. Larry needs to set up networks within a building of the enterprise. Therefore, Larry chooses LAN technology to be implemented in the building. Larry observes that there are too many computers, which are required to be attached to LAN. Therefore, Larry needs a technology that reduces the number of data packet collisions and can deliver up to 80 percent of the maximum bandwidth available. In addition, Larry needs to decide the physical media that have multiple pairs of wires to connect the computers and reduces network crosstalk by negating the electro-magnetic field. Which of the following combination should Larry choose to perform the required task? a. Token ring and Coaxial cables b. Ethernet and Coaxial cables c. Token ring and Twisted pair cables d. FDDI and Fiber optic cables Correct Answer: -> c

80/ Global Systems Inc. is a software development organization with its three branch offices in different parts of America. John Wilkins is working as system administrator at the head office of the organization at Los Angeles. The employees working at the branch offices complain to John about the poor performance of the FTP server placed at the branch office at New York. To solve the problem, John needs to remotely monitor the CPU, disk, and memory usage of the server. Which tool should John implement to perform the task? a. PMP 6.0 b. Radmin c. Symantec ON iPatch d. PCDuo Enterprise Correct Answer: -> a

81/ Which of the following activity should be performed to manage internet access of an enterprise for security? a. Keep track of who has accessed information each time a device connects to the LAN. b. Keep the version of the operating system updated. c. Block the file types such as EXE, COM, BAT, VBS, and SCR that carry virus. Also block any file type with more than one extension such as, ABC.TXT.VBS. d. Ensure that configuration settings should not be accessible to all users. Only designated people should be able to access them. Correct Answer: -> c

Page 28: Test

82/ Steve Irwin is an IT Consultant in the head office of Global Systems Inc. The regional offices of Global System Inc. are spread across north, east, south, and west regions. There are 1000 workstations in each office, which run on Windows platform. Steve needs an enterprise-level network management solution, which includes report scheduler for generating deliver reports, packet capture scheduling, and monitor for network delay. Which of the following tool or solution should Steve consider, which contains all these features? a. Unicenter Network Management Solution b. LANBrowser 1.3 c. OpManager 5.5 d. Observer 10.1 Correct Answer: -> d

83/ Steve Irwin is working as a security administrator at Red Eye Experts. Steve has configured Symantec Client Security tool to protect the enterprise client systems from security risks and threats. Steve needs to use the tool to enhance intrusion prevention solutions reducing the time and cost. Which of the following features will enable Steve to perform the required task? a. Optimized out-of-the-box firewall b. Generic Exploit Blocking c. Side effect repairing d. Centralized configuration Correct Answer: -> b

84/ Which of the following requirements represents the degree of being capable of maintaining the service and service quality by a server? Duy tri chat luong phuc vua. Performance b. Integrity c. Accessibility d. Reliability Correct Answer: -> d

85/ Lee Johnson is a IT consultant at Red Sky IT system. Lee is assigned the task to plan desktop solutions for the organization. Lee wants to implement the devices that have word processors, spreadsheet applications, calendars, and E-mail clients installed on them. Which type of device should Lee implement to perform the above task? a. Java-based mobile devices b. PALM-based mobile devices c. Windows CE-based mobile devices d. Linux based mobile devices Correct Answer: -> a

86/ SuperSoftware Inc is planning to implement IT infrastructure in the organization. As a part of planning IT infrastructure, SuperSoftware Inc needs to plan for effective desktop solutions to help users to perform day-to-day operations, increase user productivity, and improve business processes. For this, the organization asks Anne Johnson, an IT consultant to analyze the business and technical requirements for planning desktop solutions and identify an appropriate desktop

Page 29: Test

technology on the basis of the requirements. On analyzing the requirements, Donna notices that he needs to select desktop technologies for the desktop users who need to work on packages involving heavy graphics. In addition, Donna needs to select a technology having more storage capacity than phone handsets for the mobile users of the organization. Identify the desktop and mobile technologies that Donna need to select to perform the task? a. Macintosh clients and Java-based mobile devices b. Linux clients and PALM-based mobile devices c. Macintosh clients and PALM-based mobile devices d. Linux clients and Java-based mobile devices Correct Answer: -> c

87/ Which of the following questions you need not answer while finalizing internal access security? a. What are the processes to deal with change in access permissions granted to an employee? b. What are the processes to evaluate the access permissions granted to an employee? c. What are the methods to identify unauthorized access and prevent it? d. What are the administrative levels in the organizations and what data and system access permissions do they need? Correct Answer: -> c

88/ Tom Wilkins is the member of the team planning for an effective storage solution in Red Eye Experts. Red Eye Experts is a very big enterprise spanned across different areas of world, therefore, Tom needs to plan for the storage solution that can be accessed over a network and minimize the overall overheads by centrally managing hard disks. Keeping in mind all these considerations, Tom plans to use NAS in the enterprise that enables multiple users to share the same storage space. Which of the following feature will help Tom to accomplish his task? a. Server attached approach to data storage b. Access to storage pool c. 100 MB/s full duplex data transfer rates d. Data regenerating hard disks Correct Answer: -> a

89/ Steve Irvin is the IT consultant at Red Eye Experts. Steve needs to identify an asset management solution that would enable the IT staff of the organization to access the asset management and maintenance information of the desktops from any location and at any time through the Internet. In addition, Steve needs to identify a scalable asset management solution in which additional modules can be added in future if the organization expands. Identify an appropriate asset management solution. a. Radmin b. Altiris Asset Management Suite c. WebTMA d. ManageEngine ServiceDesk Plus Correct Answer: -> c

90/ Which of following network management tool can be used to secure the network from internal attacks by monitoring event logs?

Page 30: Test

a. Observer 10.1 b. OpManager 5.5 c. Unicenter Network Management d. LANBrowser 1.3 Correct Answer: -> b

91/ Pat Wilkins is a system administrator in the head office of Red Eye Experts, which is a large and complex organization spread across many countries. Pat wants to remove all kinds of complexities that are associated with network management for effective and efficient working of the organization. Donna Johnson is the IT consultant in Red Eye Experts. Pat assigns Donna the task of finding a multi-platform solution that discovers the entire network and can automate several network monitoring tasks. To perform this task, Donna wants a solution that includes WAN monitoring, server monitoring, URL monitoring, and switch monitoring. Which of the following tool or solution is appropriate to include all these features? a. OpManager 5.5 b. HP OpenView Network Management Solution c. LANBrowser 1.3 d. Unicenter Network Management Solution Correct Answer: -> a

92/ Jim Lewis is working as a security administrator in Blue Moon Computers. Jim needs to use a Windows-based tool that monitors and filters Internet access for Web sites and Internet applications. Jim wants that the tool should record the bandwidth and time each user or workstation has spent in accessing Internet on periodic basis. Which of the following tool should Jim use to perform the required task?

a. OpManager5.5 b. Observer10.1 c. WebScout 2.1 d. Symantec Client Security Correct Answer: -> c

93/ The management at Bluemoon Computers Inc. wants to secure its network from external intrusions. The computers on the network are running on a number of different operating systems, such as Windows, Solaris, Linux, and Macintosh and have software firewalls installed on them. The management is very cost conscious and also apprehensive that the level of security might not affect the network performance. Therefore, it has been decided that only one extra level of security will be implemented. Which of the following security measures will you suggest as a networking consultant?

a. Host-based Intrusion Detection System (HIDS) b. Network-based Intrusion Detection System (NIDS) c. Combination of NIDS and HIDS d. No IDS is required as the computers have firewalls installed on them Correct Answer: -> b

Page 31: Test

94/ Which of the following business factors enables you to determine the technologies that can be used to establish network connections between different branch offices of an organization? a. Business processes b. Organization structure c. Geographical scope d. Business applications Correct Answer: -> c

95/ Which of the following can be termed as strategic services? a. Services that must be available at peak load b. Services essential to operation. c. Services that can be postponed indefinitely. d. Services provided by servers that must be available, but can be available at reduced performance Correct Answer: -> b

96/ Pat Wilkins is working as an IT Consultant at Global Softwares. Pat is assigned the task to plan desktop solutions for the organization. Pat needs to implement devices that have more storage capacity than phone handsets. The devices should also have the capability to run java-based dynamic applications. Which of the following devices Pat should implement to perform the task? a. Windows CE-based mobile devices b. PALM-based mobile devices c. Java-based mobile devices d. Linux based mobile devices Correct Answer: -> b

97/ Corrine Wallace is working as an IT consultant at Blue Moon Computers. The organization is planning to implement an IT infrastructure. The management of the organization notices that organization requires servers at entry level of business operations to implement IT infrastructure. Therefore, organization assigns Corrine the task of planning server solutions for business operations, such as caching services and proxy services. In addition, the organization is required to provide file and print services. Which servers Corrine will implement to fulfil the requirement of the organization? a. Web servers and Workgroup servers b. Infrastructure servers and Mail servers c. HPC servers and Infrastructure servers d. Workgroup and HPC servers Correct Answer: -> a

98/ Which of the following questions you need to answer while planning security for external access? a. What are the processes to deal with change in access permissions granted to an employee? b. What are the processes to evaluate the access permissions granted to an employee? c. What are the methods to identify unauthorized access and prevent it?

Page 32: Test

d. What are the administrative levels in the organizations and what data and system access permissions do they need? Correct Answer: -> c

99/ Pat Wilkins is working as an IT consultant at Safest Software Inc. The organization is planning for network solutions to facilitate faster information sharing. Pat is assigned the task to determine the number and the type of hardware and software resources required on a network. Pat needs to size the network to perform the task. Which of the following factors Pat needs to consider to perform network sizing:a. Number of Remote Usersb. Proactive Fault Managementc. Number of People Using the Networkd. Software Specificationse. Application Performance

a. a, b, c, and e b. a, c, and d c. a, b, c, and d d. b, c, d, and e Correct Answer: -> b

100/ Pat Wilkins is working as a network administrator in Super Software Inc, which is spread over a vast geographical area. Pat needs to use WAN communication service to create an inter-network of networks. Pat needs to use a technology that can support very high-speed data transfers to the tune of 640 kbps in both directions and carries high-speed data and multimedia over telephone lines. In addition, Pat wants another technology, which is used for Point-to-Point networks and for backup for another type of link. Which of the following combination of WAN technologies should Pat use to complete the required task? a. ISDN and Frame Relay b. ADSL and Leased lines c. SMDS and X.25 d. ADSL and Analog modems Correct Answer: -> d

101/ Consider the following statements:

Statement A: WebTMA and ManageEngine ServiceDesk Plus are Web-based asset management solutions.

Statement B: The Altiris Asset Management Suite has a snap-in modular design.

Which of the following is correct about the above statements? a. Statement A is False and Statement B is True. b. Statement A is True and Statement B is False. c. Both, Statement A and Statement B are True. d. Both, Statement A and Statement B are False.

Page 33: Test

Correct Answer: -> c

102/ Consider the following statements:

Statement A: ManageEngine ServiceDesk Plus is a Web-based asset management solution.

Statement B: ManageEngine ServiceDesk Plus provides a helpdesk for troubleshooting desktop-related problems.

Which of the following is correct about the above statements? a. Statement A is False and Statement B is True. b. Statement A is True and Statement B is False. c. Both, Statement A and Statement B are True. d. Both, Statement A and Statement B are False. Correct Answer: -> c

103/ Which of the following tool can be used as a network monitor and protocol analyzer for Ethernet, wireless 802.11b/a/g, token ring, and FDDI networks? a. Observer 10.1 b. LANBrowser 1.3 c. HP OpenView Network Management d. Unicenter Network Management Correct Answer: -> a

104/ Steve Irwin is an IT consultant in Blue Moon Computers. Steve wants an enterprise-level tool for network management that helps in scanning the entire network by searching and configuring properties of all the devices of Windows NT/2000 enterprise. The tool should search for errors, audit information, connected users, and share permissions. Which of the following tool do u think is appropriate to perform this task? a. OpManager 5.5 b. Observer 10.1 c. LANBrowser d. HP OpenView Network Management Solution Correct Answer: -> c

105/ Corrine Wallace is working as a storage administrator at Technology Systems. The workstations in Technology Systems are running on multi-platform systems. Corrine finds that to manage storage devices effectively, he needs to use a tool or solution that manages the backup and recovery tools centrally and can monitor the storage environment remotely. Which of the following tool should Corrine use to perform the task?

a. Storix System Backup Administrator b. BrightStor ARCserve Backup for Laptops & Desktops Release 11 c. VERITAS Backup Exec10 d. BrightStor Storage Resource Manager Correct Answer: -> d

Page 34: Test

106/ The management at Bluemoon Computers Inc. has decided to connect it corporate office to all of its regional offices. The local networks at regional offices are to be identified by the different subnets of the same IP address class 172.16.0.1. The regional offices are using different platforms for their networks, such as Windows, Linux, Macintosh, and Solaris. Because the corporate network will be connected to all these regional offices round the clock, it will be very essential to restrict the broadcast produced by all the networks and filter in the ones that are specifically meant for the corporate office. Which of the following network devices will you suggest to facilitate this connectivity as a networking consultant? a. Hub b. Switch c. Router d. Layer 2 Switch Correct Answer: -> c

107/ What is the configuration requirements of the desktops used in help desks? a. Following are the configuration requirements of the desktops used in help desks High quality printersVoice Over IP integrationComputer telephony integration

b. Following are the configuration requirements of the desktops used in help desks Thin-client computersVoice Over IP integrationComputer telephony integration

c. Following are the configuration requirements of the desktops used in help desks Thin-client computersVoice Over IP integrationFast processing capabilities

d. Following are the configuration requirements of the desktops used in help desks Thick-client computersVoice Over IP integrationComputer telephony integration Correct Answer: -> b

108/ Corrine Wallace is working as IT consultant at Blue Moon Computers. Corrine is assigned the task of determining the service usability and utility of servers in the organization. For this, Corrine needs to determine the time it takes to repair a service that has failed on the servers. Which of the following requirements Corrine needs to analyze to perform the task? a. Accessibility b. Availability c. Integrity d. Performance Correct Answer: -> b

Page 35: Test

109/ Safest Software wants to ensure uninterrupted execution of business activities and increase productivity and profitability of an enterprise. For this, the organization decides to implement server solutions in the organization to handle its routine and critical business applications. The management of the organization notices that organization requires servers at every level of business operations. Therefore, organization hires Pat Wilkins, an IT consultant to analyze the business processes and requirements that needs to be considered for planning server solutions and implement servers in the organization. After analyzing the requirements Pat realizes that he needs to implement servers for the following:File and print servicesFirewall and security services Provide clustered computing systemHandling complex interactions

Which server Pat needs to implement to perform the task?

a. Workgroup server only b. Web servers. c. Workgroup and Infrastructure servers d. Workgroup, Infrastructure, HPC, and high-end servers, such as ERP and Application Tier servers. Correct Answer: -> d

110/ Which of the following is not included in the security policy of an IT infrastructure?

a. Roles and responsibilities for various employees.b. Establishment of trust among clients and employees to gain their confidence c. Rules regarding the use of various organizational resources, such as computers, the Internet, or e-mail. d. Geographical Scope of the organizationCorrect Answer: -> d

111/ Donna Johnson, a network administrator is planning for the network solutions for the Mountain Marketing Inc. Donna needs to avoid network congestion by managing data flows. For this _donna needs to determine QoS of the organization’s network. Which of the following factors cannot help Donna determine QOS of the network:a. Throughputb. Business applicationsc. Availabilityd. Jittere. Size and Geographical Scope

a. b and e b. d and b c. d and e d. d, e, and b

Page 36: Test

Correct Answer: -> a

112/ Donna Bard is working as a security administrator in Safest Software Inc. Donna needs to deploy a security method in the enterprise that can protect IT infrastructure from both external as well as internal attacks. Donna receives complaints that unnecessary data, such as video and graphic files are entering the network from outside. Therefore, Donna wants that the security method should filter out the incoming traffic to stop the unnecessary data consuming the network bandwidth. Donna also wants to use another software that provides encryption technologies, digital certificates, and certificate to protect the security of their communications and business transactions on the Internet. Which of the following combinations of security methods should Donna use to provide enterprise-wide network security? a. PKI and VPNs b. VPNs and IDS c. IDS and Firewalls d. Firewalls and PKI Correct Answer: -> d

113/ Which of the following tool can be used to build reports to identify the under-utilized storage space? a. BrightStor Storage Resource Manager b. HP OpenView Storage Area Manager c. BrightStor ARCserve Backup for Laptops & Desktops d. Storix System Backup Administrator Correct Answer: -> b

114/ Corrine Wallace is working as an IT consultant in the head office of Safest Software. Safest Software is a large enterprise with distributed network in six branches across four countries. The workstations in each office are running on multi-platform, such as Linux and Windows. Steve Irwin is the system administrator of the head office. Steve assigns Corrine the task of providing a network management solution, which combines the software, services, support, and training to manage the network proactively by optimizing performance and availability of the distributed network system of Blue Moon Computers. Which of the following tool or solution should Corrine choose to perform this task? a. HP OpenView Network Management Solution b. Unicenter Network Management Solution c. OpManager 5.5 d. LANBrowser 1.3 Correct Answer: -> a

115/ Pat Greene is working as a storage administrator at Blue Moon Computers. Pat is assigned the task of managing archives in an enterprise. Pat needs to protect the data stored in archived media from mishandling or natural disasters. Which of the following activity should Pat perform to complete the task? a. Ensuring that archive media does not exceed the safe limits b. Storing the data with the same retention period c. Maintaining a record of the archival media, files, and folders

Page 37: Test

d. Maintaining the duplicate copy of the archived data Correct Answer: -> d

116/ Red Eye Systems Inc. wants a plan for security implementation at a new software development facility in New York. The company wants the facility to have at least five levels of authentications for any data that is accessed from a remote location as well as for the data sent to a remote location. The management wants to implement both host-based and network-based IDS and wants to put a firewall after each VPN gateway that will be used for connecting remote users. In addition, the management has a very stringent administrative policy, which requires even a single change in user permissions to be approved by a hierarchy of officials. In addition, the management has decided to conduct weekly security audits during which the network at the facility would be non-operational. As a networking consultant, according to you which of the following business or technical requirements will be affected because the security requirements?

a. Availability, geographical scope, and business applications b. QoS, Performance, and availability c. User and resource distribution d. Security policies Correct Answer: -> b

117/ New tech book is multinational organization with various bookstores in various parts of USA. To expand its customer base globally and to automate its business process the organization launches an e-commerce site on the Internet. To protect its business processes from disruption, the organization asks Anne Donaldson to plan for the availability of the website. Identify the considerations Anne needs to keep track of to plan for the availability of the website. To protect data losses in the event of disasters, the organization also asks Anne to plan tasks for maintaining availability and backing up critical data of the website. What should Anne do to perform the task?

a. Anne needs to keep track of the following considerations while planning for the availability of the website:Criticality of the dataAmount of downtime that the organization can afford Cost of reducing downtime in the organizationIn addition, Anne needs to consider the frequency of planned downtime while setting the availability goals to plan for appropriate backup strategies and maintenance tasks to maintain availability.

b. Anne needs to keep track of the following considerations while planning for the availability of the website:Amount of data that a network can carryAmount of data that is successfully transferred over the InternetRatio of error-free data transmission to total transmission.In addition, Anne needs to consider the frequency of planned downtime while setting the availability goals to plan for appropriate backup strategies and maintenance tasks to maintain availability

Page 38: Test

c. Anne needs to keep track of the following considerations while planning for the availability of the website:Criticality of the dataAmount of downtime that the organization can afford Cost of reducing downtime in the organizationIn addition, Anne needs to consider the frequency of unplanned downtime while setting the availability goals to plan for appropriate backup strategies and maintenance tasks to maintain availability.

d. Anne needs to keep track of the following considerations while planning for the availability of the website:Amount of data that a network can carryAmount of data that is successfully transferred over the InternetRatio of error-free data transmission to total transmission.In addition, Anne needs to consider the frequency of unplanned downtime while setting the availability goals to plan for appropriate backup strategies and maintenance tasks to maintain availability Correct Answer: -> a

118/ _______ management enables you to manage the leased assets in an enterprise by informing you about the end of the lease period. a. Asset b. Event c. Remote d. Desktop configuration Correct Answer: -> a

119/ Identify the tasks performed by the help desk in an enterprise.

a. Create security policies for securing the desktops. b. Provide an online knowledge base that provides solutions to problems.c. Log and monitor the problems of desktop users.d. Provide centralized support for troubleshooting problems of desktop users.

Select the correct option. a. a, c, and d b. a, b, and d c. b, c, and d d. c and d Correct Answer: -> c

120/ Steve Irvin works in the Helpdesk department of Global Systems Inc. Currently, the organization uses a decentralized and manual method for managing and maintaining IT resources. The CIO of the organization notices that the decentralized and manual method for

Page 39: Test

managing and maintaining IT resources is prone to errors and requires a huge amount of time, and effort. To solve the problem, the CIO asks Steve to identify a tool that can keep track of the IT resources and enable the IT staff to perform the following tasks in the organization:Determine which IT resources are to be upgraded or replacedKeep track of the end of the lease period of the IT resourcesKeep track of the software having expired licenses Determine which users have particular software packages installedCentrally manage the implementation of software patches across the enterpriseCentrally manage the distributed IT resources

Identify the tool that is most appropriate to perform the preceding tasks. a. Remote management tool b. Event management tool c. Asset management tool d. Desktop standardization tool Correct Answer: -> c