Review Q8 Network

advertisement
Review Q8 Network
1/ Consider the following statements:
Statement A: The BSD interface provides a freeware tool that helps to handle the network load.
This is achieved by using the robust network services that the BSD interface provides through
one of its distribution.
Statement B: The System V Interface is a command-line interface that enables you to use the
print services.
Which of the following is true, with respect to the above statements?
a. Statement A is true and statement B is false.
b. Statement A is false and statement B is true.
c. Both, statements A and B, are true.
d. Both, statements A and B, are false.
Correct Answer: -> c
2/ While configuring a NIS client you need to configure the ypbind service. Which of the following
files will you modify to perform this task?
a. /etc/passwd
b. /etc/sysconfig/network
c. /etc/yp.conf
d. /etc/nsswitch.conf
Correct Answer: -> c
3/ Consider the statements:
Statement A: The range of IP addresses that can be assigned to a computer are known as a
dotted quad notation.
Statement B: The number of octets that represent the network Id and host Id in the IP addresses
varies with the size of the network.
Which of the following is true, with respect to the above statements?
a. Statement A is true and statement B is false.
b. Statement A is false and statement B is true.
c. Both, statements A and B, are true.
d. Both, statements A and B, are false.
Correct Answer: -> b
4/ Steve Irvin is working as system administrator at Mountain Marketing Inc. He needs to assign
dynamic IP addresses to all the computers in the organization. For this, he decides to configure
eth1 as the DHCP client. The DHCP server is already present on the network and the host name
is Mountain Marketing. How should Steve proceed to perform the task?
a. After setting the value of the NETWORKING parameter equal to yes in the
/etc/sysconfig/network file, he needs to edit the contents of the /etc/sysconfig/networkscripts/ifcfg-eth1 file, as follows:
DEVICE=eth1
ONBOOT=no
BOOTPROTO=dhcp
b. After setting the value of the NETWORKING parameter equal to yes in the
/etc/sysconfig/network file, he needs to edit the contents of the /etc/sysconfig/networkscripts/ifcfg-eth1 file, as follows:
DEVICE=eth1
ONBOOT=yes
BOOTPROTO=dhcp
c. After setting the value of the NETWORKING parameter equal to no in the
/etc/sysconfig/network file, he needs to edit the contents of the /etc/sysconfig/networkscripts/ifcfg-eth1 file, as follows:
DEVICE=eth1
ONBOOT=yes
BOOTPROTO=dhcp
d. After setting the value of the NETWORKING parameter equal to no in the
/etc/sysconfig/network file, he needs to edit the contents of the /etc/sysconfig/networkscripts/ifcfg-eth1 file, as follows:
DEVICE=eth1
ONBOOT=no
BOOTPROTO=dhcp
Correct Answer: -> b
5/ Pat Wilkins is working as system administrator at Global Systems Inc. Donna is working as
software developer with the company. She needs to develop some applications on the Linux
platform using Qt 3 and GTK+ 2 graphical toolkits. Therefore, Donna needs Pat to add fonts to
her system. She wants the font to be added such that they are smooth-edged. How will Pat
perform the given task?
a. To add the fonts, Pat needs to perform the following steps:
Copy the new fonts to the directory, /usr/share/fonts/local.
Run the following command for updating the font information cache:
# fc-cache /usr/share/fonts/local
b. To add the fonts, Pat needs to perform the following steps:
Copy the new fonts to the directory, .fonts/, present in the user's home directory.
Run the following command for updating the font information cache:
# fc-cache /usr/share/fonts/local
c. To add the fonts, Pat needs to perform the following steps:
Copy the new fonts to the Fontconfig configuration file.
Run the following command for updating the font information cache:
# fc-cache /usr/share/fonts/local
d. To add the fonts, Pat needs to perform the following steps:
Copy the new fonts to the XFree86 configuration file.
Run the following command for updating the font information cache:
# fc-cache /usr/share/fonts/local
Correct Answer: -> b
6/ AB Corp is an advertising company, which is working on Linux platform. Steve, the system
administrator, creates a directory, /extrauser. After creating this directory, Steve needs to create a
user named john in the /extrauser directory. Which command should Steve use to perform the
above task?
a. useradd –d /extrauser john
b. useradd –f /extrauser john
c. useradd –g /extrauser john
d. useradd –c /extrauser john
Correct Answer: -> a
7/ Steve Irving is the system administrator in Mastery Mechanics. He needs to install a Linux
server on the network of the organization. He is also required to attach a printer to the Linux
server so that all the employees of various departments can share the network printer. For this,
Steve needs to install Linux on a computer and configure it as a print server using the CUPS
daemon. However, after one week some of the employees start complaining to Steve that they
are not able to access the printer. The employees also report that when they try to access the
printer from their remote Linux system they receive an error message, which states that the
permission to access the printer is denied. What could be the problem and how should Steve
resolve it?
a. Modify the server configuration file /etc/cups/cupsd.conf, which contains the information
required to access the printer.
b. Modify the server configuration file /etc/cups/printers.conf, which contains the information
required to access the printer.
c. Modify the server configuration file /etc/cups/classes.conf, which contains the information
required to access the printer.
d. Modify the server configuration file /etc/cups/client.conf, which contains the information
required to access the printer.
Correct Answer: -> a
8/ Which of the following command performs the same task as the mkfs.ext3 /dev/hdc8
command?
a. mke2fs –l /dev/hdc8
b. mke2fs –j /dev/hdc8
c. mkfs -c ext3 /dev/hdc8
d. mke2fs –i /dev/hdc8
Correct Answer: -> b
9/ You are working as system administrator at Red Sky IT Systems. The organization has
Windows server installed on the network. You have been assigned the task of installing Linux on
all the computers in the network. Which type of installation method can you use to install Linux in
the given scenario?
a. Use an FTP Server
b. Use an NFS Server
c. Use an HTTP Server
d. Use a CD-ROM
Correct Answer: -> a
10/ Mike Womack is working as a project manager with Smart Software Developers. The network
setup of the organization is based on Linux. The organization has a remote server, where the
employees save their files. Don Allen, the system administrator of the organization has created
user accounts for all the employees of the organization. Mike is working on a project and creates
a file, teamproject.txt. Mike wants to assign read permission to all the other users, for the file,
teamproject.txt. However, Mike wants to remove all the permissions from the other users, for any
other file that he creates. Mike also wants to assign the read and write permissions to his team
members, who are working in his project, for all the files that he will create. Which set of
commands will enable Mike Womack to set the file access permissions according to his
requirement?
a. chmod a+r teamproject.txt
umask 037
b. chmod a+r teamproject.txt
umask 017
c. chmod o+r teamproject.txt
umask 017
d. chmod o+r teamproject.txt
umask 037
Correct Answer: -> c
11/ Ken Burton, the system administrator at Global Systems Inc. has joined the organization after
a long leave. During the leave period, Bill was using Ken’s computer. Bill had replaced the hard
disk of Ken’s computer with a new hard disk for personal use. Ken had installed GRUB on the
network server in order to boot the Linux operating system. While booting his computer, Ken
receives an error at Stage 1 of the loading process and the booting process stops. Which of the
following error has caused the booting process to stop?
a. Floppy Error
b. Hard Disk Error
c. Geom Error
d. Read Error
Correct Answer: -> c
12/ The software department at Supersoft2000 requires Windows 2000 platform to develop
software. Chris, the system administrator wants to install the Windows 2000 Server on one of the
six partitions of an existing Linux server. To install Windows 2000 Server on this partition, Chris
deletes this partition. However, he does not delete the entry of this partition in the /etc/fstab file
and restarts the computer. The following error message is displayed:
checking file systems
fsck.ext3/dev/hdc6:
The superblock could not be read or doesn’t describe a correct ext2 filesystem. If the device is
valid and it really contains an ext2 filesystem (and not swap or ufs or something else), then the
superblock is corrupt, and you might try running e2fsck with an alternate superblock:
e2fsck –b 8193 <device>
: Bad magic number in super-block while trying to open /dev/hdc6
[FAILED]
* * * An error occurred during the file system check.
* * * Dropping you to a shell; the system will reboot
* * * when you leave the shell.
Give root password for maintenance
(or type Control-D to Continue):
How can Chris troubleshoot the problem?
a. Start the system in the rescue mode and delete the entry of the deleted partition in the
/etc/fstab file.
b. Start the system in the single-user mode and change the root password.
c. Start the system in the single-user mode and delete the entry of the deleted partition in the
/etc/fstab file.
d. Start the system in the rescue mode and change the root password.
Correct Answer: -> a
13/ What is the configuration requirements of the desktops used for financial services enterprise
a. Following are the configuration requirements of the desktops used in call centres and help
desks:
Thin-client computers
Voice Over IP integration
Computer telephony integration
b. Following are the configuration requirements of the desktops used in banks and help desks:
High storage
High security requirement
c. Following are the configuration requirements of the desktops used in banks and help desks:
Thick client computers
Office applications
Standard quality printing device
d. Following are the configuration requirements of the desktops used in banks and help desks:
High storage capacity
Fast processing capabilities
Correct Answer: -> b
14/ Tom Davidson is working, as a system administrator at Mountain Marketing Inc. Tom has
been assigned the task of sending the high priority jobs for printing first. Which command will
Tom execute to perform the task?
a. lpc
b. lpstat
c. lp
d. lpadmin
Correct Answer: -> c
15/ Steve is a system administrator at Deez Inc. He needs to load a module into the kernel. He
also wants to specify that a kernel module name should be provided explicitly in the command.
Which option of the insmod command will Steve use to perform the task?
a. insmod -o
b. insmod -s
c. insmod -p
d. insmod -f
Correct Answer: -> a
16/ Jim Lewis, the system administrator at Deez Inc, has installed Linux on a computer. Jim
wants to collect the information about the parameters that are passed to the kernel during the
start up of the kernel. Which file in the /proc/ directory should Jim use to perform this task?
a. /proc/apm
b. /proc/cmdline
c. /proc/cpuinfo
d. /proc/dma
Correct Answer: -> b
17/ You are the system administrator at Deez Inc. You need to transfer the data from a source
computer over a network to the destination computer over another network. For this, packet
routing is required from one network to the other. Which feature of Linux kernel should you use
for the above task?
a. Router
b. Routing table
c. Default route
d. IP forwarding
Correct Answer: -> d
18/ Pat configures the dhcpcd daemon and starts his computer. He notices that the IP address is
not assigned to his computer. Pat verifies that the dhcpcd daemon is running. Which command
should Pat use for the IP address assignment?
a. Pat needs to execute the ifconfig command.
b. Pat needs to execute the dhcpcd command with the –f option.
c. Pat needs to check all the DHCP servers on the network
d. Pat needs to execute the route command.
Correct Answer: -> b
19/ Steve Irvin is working as system administrator at Super Software2002. The domain
administrator of the organization wants Steve to provide fonts to the X clients. He also wants
Steve to add fonts such that they do not provide support for advanced anti-aliasing feature.
Identify the correct sequence of steps that Steve needs to perform to accomplish the given task?
a. To add fonts, Steve needs to perform the following steps:
Create a directory, /usr/share/fonts/local/, if it does not already exist.
Change to the /usr/share/fonts/local directory.
Update the font information of the system.
Copy the new font files to the /usr/share/fonts/local directory.
Execute the chkfontpath command to add the directory, /usr/share/fonts/local/ to the Xfs FontPath
as root directory.
Restart Xfs so that the X clients can use the new fonts.
b. To add fonts, Steve needs to perform the following steps:
Create a directory, /usr/share/fonts/local/, if it does not already exist.
Add the directory created in the first step to the Xfs FontPath as root directory.
Copy the new font files to the /usr/share/fonts/local directory.
Update the font information of the system.
Change to the /usr/share/fonts/local directory.
Restart Xfs so that the X clients can use the new fonts.
c. To add fonts, Steve needs to perform the following steps:
Create a directory, /usr/share/fonts/local/, if it does not already exist.
Copy the new font files to the /usr/share/fonts/local directory.
Change to the /usr/share/fonts/local directory.
Update the font information of the system.
Execute the chkfontpath command to add the directory, /usr/share/fonts/local/ to the Xfs FontPath
as root directory.
Restart Xfs so that the X clients can use the new fonts.
d. To add fonts, Steve needs to perform the following steps:
Create a directory, /usr/share/fonts/local/, if it does not already exist.
Add the directory created in the first step to the Xfs FontPath as root directory.
Change to the /usr/share/fonts/local directory.
Copy the new font files to the /usr/share/fonts/local directory.
Update the font information of the system.
Restart Xfs so that the X clients can use the new fonts.
Correct Answer: -> c
20/ Steve is working as a system administrator at the Smart Software Developers. The company
has 50 client computers and one Linux server on the network. Steve updates the Linux server
regularly by installing Linux patches. He checks the boot directory each time, to obtain the kernel
information and to make sure that the Linux patches are compatible with the kernel version. To
avoid searching the boot directory for obtaining the kernel information, Steve wants to display this
information at the login prompt. How should Steve display the information on the login prompt?
a. Edit the rc.sysinit file to reflect the kernel information at the login prompt
b. Edit the rc.serial to reflect the kernel information at the login prompt
c. Edit the rc.local to reflect the kernel information at the login prompt
d. Edit the rc.news to reflect the kernel information at the login prompt
Correct Answer: -> c
21/ Jim Lewis a system administrator at Deez Inc. is working on Linux platform. All the employees
of the application development department are working on critical projects. Therefore, regular
backup is required to save the data of the developers. Jim is assigned the task of taking weekly
backup of data. After taking the backup of files, Jim wants to display the list of files, which have
been backed up. Which of the following command should Jim execute to display the list of files?
a. Execute the tar –x command
b. Execute the tar –c command
c. Execute the tar –v command
d. Execute the tar –p command
Correct Answer: -> c
22/ Steve installs kernel of version 2.2 on his computer. After the installation, he notices that one
of the devices is not supported by this version of the kernel. Steve upgrades the kernel from
version 2.2 to 2.4 to get support for that device. However, after installation of the kernel of version
2.d. Steve is unable reboot the computer. Why is Jim not able to boot the computer and how
should he solve the problem?
a. The kernel of version 2.4 has not overwritten the kernel of version 2.2.
Jim needs to boot the system in the single-user mode by using a floppy disk or a CD-ROM to
resolve the problem.
b. The kernel of version 2.4 has not overwritten the kernel of version 2.b. but it is copied in the
/root directory.
Jim needs to boot the system in the rescue mode by using a floppy disk or a CD-ROM to resolve
the problem.
c. The kernel of version 2.4 has overwritten the kernel of version 2.2 and the boot loader
configuration file is not updated accordingly.
Jim needs to boot the system in the rescue mode by using a floppy disk or a CD-ROM to resolve
the problem.
d. The kernel of version 2.4 has not overwritten the kernel of version 2.2 and the newly compiled
kernel, bzImage, is copied in the /boot directory and the boot loader configuration file is updated
accordingly.
Jim needs to boot the system in the multiuser mode by using a floppy disk or a CD-ROM to
resolve the problem.
Correct Answer: -> c
23/ Jim Lewis wants to create a filesystem so that he can access other filesystems from a remote
computer containing Linux operating system. Which type of filesystem should Jim create?
a. ReiserFS
b. Journaled File System
c. NFS
d. SMBFS
Correct Answer: -> c
24/ Steve Irving is working as a system administrator at Super Graphics. A new user, Michael
joins Super Graphics as a software developer. Steve needs to share a filesystem to enable
Michael to access data from his computer. Steve has to opt for the type of filesystem, which
would enable Michael to access the filesystem from a remote computer running on Windows NT
Server operating system. Which type of filesystem can Steve create?
a. SMBFS
b. NFS
c. JFS
d. ReiserFS
Correct Answer: -> a
25/ David Johnson is working as a system administrator with Super Graphics. The employees of
the organization use OpenOffice.Draw package of Linux to create graphical designs. Jerry Smith,
working as an audio-visual expert observes that his computer does not produce good quality
sound. Therefore, she asks David to change the soundcard of her computer. David inserts a new
sound card on Jerry's computer and downloads the module for the sound card, through the
Internet from the vendor's Web site. Now, David wants to install the module for the sound card in
the kernel of Jerry's computer. However, David wants to load the module for the sound card in
the kernel even if the current kernel version installed in the computer and the version of the kernel
for which the module is created are not same. Which command should David use to perform the
given task?
a. insmod -o [module_name]
b. insmod –s [module_name]
c. insmod -f [module_name]
d. insmod -p [module_name]
Correct Answer: -> c
26/ John requires some data from a file stored in a directory on a floppy disk. His computer has
Linux operating system. After finishing his work, John unmounts the floppy disk. For this, he
executes the umount command as shown below:
# umount /dev/fd0
However, the system displays an error message, “Device is busy”. Which of the following steps
will help John identify and solve the problem?
a. Determine the current directory. If the current directory is located on the floppy disk, change to
a directory that is not located on the floppy disk. Unmount the floppy disk
b. Determine the current directory. Execute the rm –r command to delete the directory on the
floppy. Unmount the floppy disk
c. Determine the current directory. Delete the file on the floppy. Unmount the floppy disk.
d. Determine the current directory. Execute the rm --r command to delete the directory on the
floppy. Unmount the floppy disk
Correct Answer: -> a
27/ Debbie Howe, an employee of SuperGraphics needs to access the file containing the daily
schedule information of the project on which he is working. This file is located on the computer of
Ken Bruton, the team leader at the company.
Ken had the dual operating system, Windows 2000 and Linux installed on his computer. The file
was created on Windows 2000. As the Windows 2000 Server has crashed on Ken’s computer, he
boots the computer using Linux. Ken tries to mount the file from Windows 2000 to Linux using the
mount command. The system generates an error displaying, ‘Virtual File Allocation table (VFAT)
file system is not supported’. Ken informs the system administrator about the problem. What
could be the cause of the error?
a. Ken does not have the read permissions for the files, which he wants to access.
b. Linux does not have the necessary modules required to support the Windows filesystems.
c. The file that Ken is trying to access is not exported by the system in which it is stored.
d. Another filesystem is mounted on the same mount point as that of the filesystem, which Ken
wants to access.
Correct Answer: -> b
28/ You are working as a system administrator at Global Systems Inc. You need to create an
alternate file hierarchy in the /etc/sysconfig/networking directory on the server, which is using
ISDN network interface. Which command will you run to perform this task?
a. ifconfig
b. neat
c. mii-tool
d. netconfig
Correct Answer: -> b
29/ Chris is working as an assistant system administrator at Multi Store Inc. Chris finds that
Sendmail and IMAP services are not functioning properly. Which of the following log files should
Chris check to find out the errors that are logged?
a. Check the entries in the /var/log/message log file.
b. Check the entries in the /var/log/maillog log file.
c. Check the entries in the /var/log/htpd log file.
d. Check the entries in the /var/log/samba log file.
Correct Answer: -> b
30/ Which of the following files contain the information about the system memory that is currently
in use?
a. /system/meminfo
b. /proc/memoryinfo
c. /proc/cpuinfo
d. /proc/meminfo
Correct Answer: -> d
31/ Pat Greene is working as system administrator at Safest Software Inc. Pat is required to
monitor the systems of the company to administer the network resources efficiently in the Linux
environment. For this, Pat needs information about the processes, memory, paging, block IO,
traps, and CPU activity of the computers. In addition, he also needs to display an updated report
on the virtual memory statistics. How should Pat accomplish the given task?
a. He needs to run the following command:
# vmstat <delay>
b. He needs to run the following command:
# iostat –v
c. He needs to run the following command:
# iostat –d
d. He needs to run the following command:
# vmstat –n
Correct Answer: -> a
32/ Ken Burton is working as system administrator at Indestructible Boxes Inc. Peter, an
employee of the company complains to Ken about the slow processing speed of his computer.
For this, Ken decides to create a swap space named /dev/hdc9 on his computer to increase the
available amount of RAM. After creating and activating the swap space, Ken restarts the
computer. Ken notices that processing speed of the computer has still not increased. What task
should Ken perform to solve the given problem?
a. Ken needs to edit the /etc/fstab file, and add the following entry to activate the swap space, as
follows:
/dev/hdc9
swap
swap defaults
00
b. Ken needs to edit the /etc/fstab file, and the following entry to activate the swap space, as
follows:
/dev/hdc9
swap
ext3 defaults
00
c. Ken needs to edit the /etc/fstab file, and add the following entry to activate the swap space, as
follows:
/dev/hdc9
swap
ext3 defaults
11
d. Ken needs to edit the /etc/fstab file, and add the following entry to activate the swap space, as
follows:
/dev/hdc9
swap
swap defaults
11
Correct Answer: -> a
33/ Steve is working as a system administrator at Smart Software Developers. The company has
50 client computers and one Linux server on the network. The company has opened a new
branch at Houston for the Finance department. The management asks Steve to create a file
system that prevents the data loss in case of a power failure or a system breakdown. Therefore,
Steve creates the ext3 filesystem on the /dev/hdc8 partition of the Linux server. After a few
months, Steve decides to resize the partition due to some disk space constraints. Steve uses the
resize2fs disk utility to resize the partition. However, Steve fails to resize the partition. What could
be the cause of the problem?
a. Steve has not updated the /etc/fstab file to change the ext3 filesystem to the ext2 filesystem.
b. The ext3 filesystem cannot be converted into ext2 filesystem so resize2fs utility cannot be
used.
c. The ext3 supports only tune2fs command to resize the partition.
d. The ext3 file system does not support the resize2fs disk utility.
Correct Answer: -> d
34/ Debbie Howe is working as a system administrator with True Travel Services. The
organization uses a network printer across all departments. However, recently the printer is not
working properly. Debbie has been communicated reports that on accessing the printer, it
displays an error message:
bash: /dev/lp0: Permission denied.
How should Debbie troubleshoot the problem?
a. Debbie needs to provide access control to enable the users of the remote hosts to print to the
printer by performing the following steps:
Open the /etc/hosts file.
Add the IP addresses of the remote hosts.
Stop and restart the print service.
b. Debbie needs to provide access control to enable the users of the remote hosts to print to the
printer by performing the following steps:
Open the /etc/host.deny file.
Add the IP addresses of the remote hosts.
Stop and restart the print service.
c. Debbie needs to provide access control to enable the users of the remote hosts to print to the
printer by performing the following steps:
Open the /etc/printcap file.
Add the IP addresses of the remote hosts.
Stop and restart the print service.
d. Debbie needs to provide access control to enable the users of the remote hosts to print to the
printer by performing the following steps:
Open the /etc/hosts.equiv file.
Add the IP addresses of the remote hosts.
Stop and restart the print service.
Correct Answer: -> d
35/ Tom Wilkins is the system administrator at Red Sky IT Systems that uses Linux for all
business purposes. Tom has implemented a Linux based LAN in the organization and has
installed a print server on the LAN. He has also installed the LPRng service on the print server.
The employees of all the departments use the print server to print their documents. They submit
their print jobs using the lpr command. However, the employees of the Accounts department
complain that the printer is taking a long time to print the documents. The employees request
Tom to restrict the print commands given by the other departments until the Accounts documents
have been printed. How should Tom resolve the problem?
a. Execute the lpc –disable command.
b. Edit the /etc/lpd.conf file.
c. Execute the lpc – abort command
d. Edit the /etc/printcap file.
Correct Answer: -> c
36/ Steve is assigned the task of installing Linux on a computer on which Windows 98 is already
installed. He does not have the bootable Linux CD-ROM. Which type of installation method would
Steve prefer to install Linux?
a. Use an FTP Server
b. Use the Hard Drive
c. Use an HTTP Server
d. Use a CD-ROM
Correct Answer: -> b
37/ John is recently recruited as a software developer in Smart Software Developers. He has
been assigned the task of developing an accounting application. For this, John requires
accounting package software for his computer. Chris, the system administrator at Smart Software
Developers, has been assigned the task for installing the software on Chris’s computer. For this,
Chris wants information about the directory that contains initialization scripts related to the
installed software packages. Which directory will Chris use to perform this task?
a. /etc/profile.d
b. /etc/bashrc
c. ~/.bash_profile
d. /etc/profile
Correct Answer: -> a
38/ Jim Lewis is working as a system administrator with New Tech Books. The network setup of
the organization is based on Linux. Jim has recently installed and configured a Linux server at a
remote location. He has also created user accounts for all the employees of the organization on
the remote server. Diane Frye, the head of the Sales department is creating the annual sales
report of the organization. Diane has created a folder, Sales_Report, in her home directory and
placed all the files related to the annual sales report of the organization in that folder. Diane has
also assigned all the access permission to the files that she has created and asked the members
of her department to access the files from the Sales_Report folder. After one week, Diane finds
that someone has removed some files from the Sales_Report folder. However, Diane does not
want to change the access permission on the files. Therefore, Diane reports the matter to Jim and
asks Jim to set such permissions on the Sales_Report folder so that no other users except her or
system administrator, can remove any files from the folder. What should Jim do to perform the
task?
a. Set setUID bit permission on the Sales_Report directory by using the command, chown u+s
Sales_Report.
b. Enable sticky bit permission on the Sales_Report directory by using the command, chmod +t
Sales_Report.
c. Set setGID bit permission on the Sales_Report directory by using the command, chown g+s
Sales_Report.
d. Remove setUID bit permission on the Sales_Report directory by using the command, chmod
u–s Sales_Report.
Correct Answer: -> b
39/ Tom Wilkins works as a network administrator at Supersoft2000. The employees of the
organization use Linux platform to work on their projects. Tom installs DHCP server on the
network to assign IP addresses to the client computers. Jim Lewis, an employee of
Supersoft2000 needs to check the IP addresses assigned to his computer. For this, Jim executes
the ifconfig command. However, the command does not show the IP addresses of his computer.
Jim informs Tom about the problem and asks him to resolve it. How can Tom troubleshoot the
problem?
a. Configure the /etc/dhcpd.conf file and restart dhcpcd daemon.
b. Execute the command,
route add –host 255.255.255.255 dev eth0
c. Execute the dhcpcd command with the –f option.
d. Check all the DHCP servers on the network, including any Microsoft Windows DHCP server
that might have assigned the IP addresses to Jim’s computers.
Correct Answer: -> a
40/ Corrine Wallace is working as an IT consultant at Blue Moon Computers. The organization is
planning to implement an IT infrastructure. The management of the organization notices that
organization requires servers at every level of business operations to implement IT infrastructure.
Therefore, organization assigns Corrine the task of planning server solutions for business
operations, such as caching services and proxy services. The organization also asks Corrine to
plan server solutions for domain naming, directory, firewall and security services. In addition, the
organization asks Corrine to implement servers that can effectively provide services to end users
in spite of the heavy load on it. Which servers Corrine need to implement to perform the task?
a. Corrine needs to implement web and infrastructure servers. In addition, Corrine needs to
implement high-end servers, such as OLTP Med and BI servers.
b. Corrine needs to implement workgroup and infrastructure servers.
c. Corrine needs to implement web and workgroup servers.
d. Corrine needs to implement web and infrastructure servers.
Correct Answer: -> a
41/ Pat Wilkins is working as an assistant system administrator at New Tech Bookstore. Pat
wants to check whether IP forwarding is disabled or enabled on the Linux server. Which
command will Pat execute to perform the given task?
a. # ls /proc/sys/net/ipv4
b. # vi /etc/sysctl.conf
c. # echo "1" > /proc/sys/net/ipv4/ip_forward
d. # cat /proc/sys/net/ipv4/ip_forward
Correct Answer: -> d
42/ Lee is a system administrator at Countrywide Markets. John a software developer wants a
package to be installed on his computer. John asks Lee to install the required package on his
computer. However, when Lee starts installing the package, the system displays a message that
the package is already installed. Which command can Lee use to upgrade the package?
a. rpm -e
b. rpm -h
c. rpm -I
d. rpm -F
Correct Answer: -> d
43/ Bob is working, as an assistant system administrator at Global Systems Inc. Bob wants to
invoke the services that a kernel provides for various processes running on a computer, such as
reading the contents of a file. Which kernel module, Bob should use to perform the above task?
a. Device driver
b. System call
c. Network Driver
d. Executable Interpreter
Correct Answer: -> b
44/ Larry Williams is working as network administrator at Smart Software Developers. Recently,
the organization has been facing frequent power failures. To protect the data, the domain
administrator of the organization wants Larry to backups all the servers of the company daily at
6:00 P.M. The domain administrator wants Larry to automate the process. How should Larry
automate the process of backing up?
a. Use /etc/at.allow configuration file
b. Use /etc/crontab file configuration file
c. Use /etc/cron.daily configuration file
d. Use /etc/at.deny files configuration file
Correct Answer: -> b
45/ Donna Johnson is working as system administrator at New Tech Books. The employees of
the New Tech Books have the ext2 filesystem implemented on the partition /dev/hdc8 on their
systems. They need to access NFS server for sharing and storing their data. However, NFS
server has the ext3 filesystem configured on it. Therefore, Steve needs to make the ext2
filesystem compatible with the ext3 fileystem. How should Donna troubleshoot the given
problem?
a. To convert the ext2 filesystem into the ext3 filesystem, Donna needs to perform the following
steps:
1. # /sbin/tune2fs -j /dev/hdc8 (
2. # /sbin/e2fsck -y /dev/hdc8 (
3. Mount the ext3 filesystem if there are no errors by using _
the following command:
# mount –t ext3 /dev/hdc8 /mnt/NewPartition (
4. Update the filesystem type option in the /etc/fstab file to _
automount the filesystem after
the system is restarted.
b. To convert the ext2 filesystem into the ext3 filesystem, Donna needs to perform the following
steps:
1. # /sbin/e2fsck -y /dev/hdc8 (
2. # /sbin/tune2fs -j /dev/hdc8 (
3. Mount the ext3 filesystem if there are no errors by using _
the following command:
# mount –t ext3 /dev/hdc8 /mnt/NewPartition (
4. Update the filesystem type option in the /etc/fstab file to _
automount the filesystem
after the system is restarted.
c. To convert the ext2 filesystem into the ext3 filesystem, Donna needs to perform the following
steps:
1. # /sbin/e2fsck -y /dev/hdc8 (
2. # /sbin/tune2fs -j /dev/hdc8 (
3. Update the filesystem type option in the /etc/fstab file to _
automount the filesystem
after the system is restarted.
4. Log on as the root user and mount the partition, which _
contains the ext2 filesystem
as follows:
# mount /dev/hdc8 (
d. To convert the ext2 filesystem into the ext3 filesystem, Donna needs to perform the following
steps:
1. # /sbin/e2fsck -y /dev/hdc8 (
2. # /sbin/tune2fs -j /dev/hdc8 (
3. Update the filesystem type option in the /etc/fstab file to _
the system is restarted.
4. Log on as the root user and unmount the partition, which _
filesystem as follows:
# umount /dev/hdc8 (
Correct Answer: -> a
automount the filesystem after
contains the ext2
46/ Safest Software Inc. is a leading software export organization that has opened a new branch
office at Singapore to expand their business in Asia Pacific. The branch office has 150 client
computers and three servers on their network based on Linux operating system. Steve is
appointed as a system administrator at the branch office. All the clients are working in the desired
runlevel to support the applications used by the organization. The organization has to export
software that requires the multimedia-enabled computers. The software needs to be tested on
Linux computers before exporting it. John, a testing engineer is assigned the task of testing the
multimedia application, but he is unable to open that application. John asks Steve to solve the
problem. How should Steve solve the problem?
a. Steve should set the default runlevel to 1 to start the Linux server in graphical mode.
b. Steve should set the default runlevel to 5 to start the Linux server in graphical mode.
c. Steve should set the default runlevel to 6 to start the Linux server in graphical mode.
d. Steve should set the default runlevel to 4 to start the Linux server in graphical mode.
Correct Answer: -> b
47/ Christine Turner needs to send an important file to Mary Peterson, who is working at the head
office. For this, the system administrator needs to configure a route so that the file can be
transferred to Mary’s computer, with the IP address 192.165.0.150
However, on executing the command, the computer displays an error stating gbroadcast:
Unknown host.
How should the system administrator troubleshoot the error?
a. The system administrator needs to add the name of the host in the /etc/hosts file:
192.168.0.130 gbroadcast
Next, Christine needs to execute the following command:
# route add –net gbroadcast dev eth0
b. The system administrator needs to add the name of the host in the /etc/hosts file:
192.165.0.150 gbroadcast
Next, Christine needs to execute the following command:
# route add –net gbroadcast dev eth0
c. The system administrator needs to add the name of the host in the /etc/hosts file:
192.165.0.150 broadcast
Next, Christine needs to execute the following command:
# route add –host gbroadcast dev eth0
d. The system administrator needs to add the name of the host in the /etc/hosts file:
192.165.0.150 gbroadcast
Next, Christine needs to execute the following command again:
# route add –host gbroadcast dev eth0 (
Correct Answer: -> d
48/ Jim Lewis is the system administrator with Desktop Computers. He has configured a Linux
based LAN in the organization and has installed a print server on the network. Jim has configured
both LPRng and CUPS services on the print server to manage multiple packages that provide the
same service. He needs to add a group of alternatives to the system and specify the name of a
master link. For this, Jim executes the alternatives link --set command, and observes that the
command is not working. What could be the problem and what should Jim do to resolve the
problem?
a. The set option is used only to set alternatives and its links. Jim needs to execute the
alternatives name --install command to perform the required tasks.
b. The set option is used only to set alternatives and its links. Jim needs to execute the
alternatives link --install command to perform the required tasks.
c. The link option is incorrect. Jim needs to execute the alternatives name –set command to
perform the required tasks.
d. The specified command is incorrect. Jim needs to execute the alternatives name --display
command to perform the required tasks.
Correct Answer: -> a
49/ Pat Greene is working as a system administrator at IBG Inc. Pat has created a partition in his
system to develop and save the application. The maximum file size of 2 GB is sufficient for Pat to
perform his work. The filesystem that he will be using, stores the state of the filesystem in the
superblock, and uses this state to verify whether the filesystem contains any errors. Pat needs
journaling feature in the filesystem to ensure no data is lost due to system failure. Therefore, Pat
wants to create the filesystem that supports the above features. Which filesystem can Pat use to
develop the application?
a. ext2Fs
b. ext3
c. JFS
d. SMBFS
Correct Answer: -> b
50/ Smart Solutions Corp is recruiting new employees to expand their customer base. A new
employee, Michael joins the organization and is assigned a project that was earlier being handled
by Susan. Steve, the system administrator, has changed the ownership of files that contains the
required information and set the particular option so that no error message is displayed, if the
specified file does not exist at user end. Which command should Steve use for the task?
a. chown –R
b. chown -f
c. chown -v
d. chown -c
Correct Answer: -> b
51/ Martina is working as a system administrator in PQR Corp. Martina finds that some of the
computers are displaying an error message, lp: error –no default destination available, while
giving the command for printing the documents. Which task should Martina perform to
troubleshoot this problem?
a. Remove the paper that is stuck in the printer.
b. Insert fresh paper in the tray.
c. Switch on the power supply after checking that the plug is in the socket.
d. Install and configure the printer.
Correct Answer: -> d
52/ Donna Bard, a system administrator with Countryside Markets, uses Linux as the operating
system. She wants to view the group ID of a customer named Mike Womack. When Donna
executes the command, grep Mike Womack /etc/passwd, the system raises an error stating
“grep: Wall: no such file or directory” before displaying the required information. How should
Donna troubleshoot the problem?
a. # grep ‘Mike Womack’ /etc/passwd
b. # grep MikeWommack /etc/passwd
c. # grep "Mike Womack" /etc/passwd
d. # grep `Mike Womack` /etc/passwd
Correct Answer: -> c
53/ Donna Bard works as a network administrator at Countryside Markets. All the employees of
the organization work on Linux platform. Various DHCP servers, which assign IP addresses to
the computers, are installed on the network. Donna configures the dhcpcd daemon, which
broadcasts the request to the DHCP servers to get an IP address. After configuring the daemon,
Donna starts her computer. However, Donna notices that the IP address is not assigned to her
computer. Donna verifies whether the dhcpcd daemon is running properly or not. She finds that
the dhcpcd daemon is running fine. How can Donna troubleshoot the problem?
a. Execute the command:
route add –host 255.255.255.255 dev eth0
b. Check whether the information in the /etc/dhcpd.conf file is correct.
c. Execute the dhcpcd command with the –r option.
d. Execute the dhcpcd command with the –f option.
Correct Answer: -> d
54/ Nancy Jones is working as a system administrator with Red Sky IT Systems. The network
setup of the organization is based on Linux. All employees of the organization save data in their
respective home directory on the Linux server. The management of the organization has
assigned Nancy the task of taking the backup. Therefore, Nancy configures a central backup
server with multiple backup tape drives. Nancy also wants to create the backup from all the disks
listed in the disklist file in the backup server using a single command. In addition, Nancy wants
the backup server to send an e-mail message reporting the files that failed to be backed up and
the files that were successfully backed up after creating the backup. Which backup utility should
Nancy implement to perform the required task?
a. Nancy should use the Amanda utility.
b. Nancy should use the Veritas utility.
c. Nancy should use the dump/restore utilities.
d. Nancy should use the cpio utility.
Correct Answer: -> a
55/ Donna is an in-house network administrator at Multi Marketing Inc. Donna needs to store the
print queue definitions manually, instead of using the redhat-config-printer tool. Which
configuration file will Donna use to perform this task?
a. /etc/printcap
b. /etc/lpd.conf
c. /etc/lpd.perms
d. /etc/printcap.local
Correct Answer: -> d
56/ Consider the following statements:
Statement A: You can assign more then one IP address to an NIC.
Statement B: You need to create a new configuration file for each NIC that is installed on your
computer.
Which of the following is true, with respect to the above statements?
a. Statement A is true and statement B is false.
b. Statement A is false and statement B is true.
c. Both, statements A and B, are true.
d. Both, statements A and B, are false.
Correct Answer: -> c
57/ Consider the statements:
Statement A: The passwords should be easy to decipher.
Statement B: The passwords should be of adequate length.
Which of the following is true, with respect to the above statements?
a. Statement A is true and statement B is false.
b. Statement A is false and statement B is true.
c. Both, statements A and B, are true.
d. Both, statements A and B, are false.
Correct Answer: -> b
58/ You are the assistant system administrator at Deez Inc. and are required to set a default
printer, HP DeskJet on the Sales Manager’s computer. The printer should be configured to queue
the print jobs. Which command should you use for the above task?
a. lpadmin
b. lpstat
c. lp
d. lpr
Correct Answer: -> a
59/ Peter Irvin is the domain administrator at Mountain Marketing Inc. He has scheduled tasks
such as, executing scripts, backing up data and executing the echo command on his computer,
such that they are performed automatically at different timings in a day. During the day, how
should Peter view the list of the jobs that are yet to be executed?
a. atq command
b. at command
c. cron command
d. atrm command
Correct Answer: -> a
60/ Larry Williams is working as domain administrator at Technology Systems. To automate the
installation process, Larry has installed Linux on his computer with the help of the kickstart file.
Larry needs to install three group packages ServerSystem, WindowsSystem, and
WindowsSoftware and two individual packages ClientSystem and MasterSystem on his
computer. How should Larry perform the task?
a. Larry needs to make the following entries in the kickstart file:
### Package Installation
%package
@ServerSystem
@WindowsSystem
@WindowsSoftware
ClientSystem
MasterSystem
b. Larry needs to make the following entries in the kickstart file:
### Package Installation
%package
@ ServerSystem
WindowsSystem
WindowsSoftware
ClientSystem
MasterSystem
c. He needs to make the following entries in the kickstart file:
### Package Installation
%package
@ ClientSystem
@ MasterSystem
ServerSystem
WindowsSystem
WindowsSoftware
d. He needs to make the following entries in the kickstart file:
### Package Installation
%package
@ ServerSystem
@ WindowsSystem
@ WindowsSoftware
ClientSystem
MasterSystem
Correct Answer: -> d
61/ Steve Irving is working as the system administrator at Global Systems Inc., which uses Linux
for all business purposes. The organization is working on a project, which requires the team
leaders to frequently communicate with each other and with the client. The e-mail utility is not
supported efficiently by the existing operating system. Therefore, the management has asked
Steve to upgrade the operating system installed on the computers of all the team leaders. Steve
has decided to perform this task automatically using a kickstart file.
Steve logs on to Jim, a team leader’s system and executes the command cp anaconda –ks.cfg
ks.cfg to create a kickstart file. However, the command is not working. What is the problem and
how can Steve solve it?
a. The specified root directory is incorrect. Steve should use the name, ethereal, as the root
directory.
b. The kickstart command can be created only by a root user. Steve needs to log on as the root
user and execute the specified command.
c. The command executed is incorrect. Steve needs to use the Kickstart Configurator utility to
create the kickstart file.
d. The order of specifying the kickstart sections is incorrect. The order of kickstart sections should
be command, %pre, %package, and %post.
Correct Answer: -> b
62/ The project team of the Software Development department is not able to save their work on
the server. When they try to save their work on the server, it shows an error message that there is
no space on the hard disk. Therefore, David, the system administrator resizes a partition on the
hard disk of the server, which has been allocated for user data. After resizing the partition, when
David tries to boot the server he finds that the boot partition fails to mount the boot partition.
What is the reason that the boot partition, on the server, fails to mount the boot partition and how
should David resolve the error?
a. The problem occurs because the partition number of the boot partition, /, is changed.
To resolve the error, David needs to switch to the single-user mode and change the entry
corresponding to the path of the / partition in the /etc/fstab file.
b. The problem occurs because the partition number of the boot partition, /, is changed.
To resolve the error, David needs to switch to the emergency mode and change the entry
corresponding to the path of the / partition in the /etc/fstab file.
c. The problem occurs because the partition number of the boot partition, /, is changed.
To resolve the error, David needs to reboot the system in a runlevel and change the entry
corresponding to the path of the / partition in the /etc/fstab file.
d. The problem occurs because the partition number of the boot partition, /, is changed.
To resolve the error, David needs to boot the system in the rescue mode and change the entry
corresponding to the path of the / partition in the /etc/fstab file.
Correct Answer: -> d
63/ Steve is the system administrator with Red Sky IT Systems. The management of the
organization has assigned Steve the task of providing print service to some of the employees of
the organization. The employees of the IT department and the Accounts department, at Red Sky
IT Systems, want to install printers, locally. Steve decides to install the various printers and
configure them using the CUPS daemon to fulfill the requirements of both the departments. Steve
also wants to record the information about all the local available printers in both the departments
and the new jobs given to the printers. How can Steve perform these tasks?
a. Steve can record the information by using the lpstat command, editing the /etc/printcap.local
file and then executing the lpadmin command.
b. Steve can record the information by using the lpstat command and editing the Info parameter
and the Accepting parameter in the /etc/cups/printers.conf file.
c. Steve can record the information by using the lpstat command and configuring the LPRng
service.
d. Steve can record the information by using the lpstat command and editing the Info parameter
and the Accepting parameter in the /etc/cups/cupsd.conf file.
Correct Answer: -> b
64/ Consider the statements:
Statement A: A parallel port sends one bit of information at a time.
Statement B: A serial port sends eight bits of information at a time.
Which of the following statements is correct?
a. Statement A is true and statement B is false.
b. Statement A is false and statement B is true.
c. Both, statements A and B, are true.
d. Both, statements A and B, are false.
Correct Answer: -> d
65/ Steve works, as a system administrator at Global Systems Inc. Steve needs to store the data
of all the employees centrally at the Linux server. He also wants to ensure that no data is
duplicated across the hard disks. For this, Steve decides to divide the data into strips to store the
data across all the hard disks in an array. Which RAID configuration does Steve use for the
preceding requirements?
a. Linear RAID
b. Level 0
c. Level 1
d. Level 5
Correct Answer: -> b
66/ Chris, the system administrator of the company adds a route from his computer to John’s
computer by executing the route add –host 192.168.16.66 dev eth0 command. Chris’s computer
raises an error, 192.168.16.66: Unknown host. Which of the following task should Chris perform
to solve this problem?
a. Add the name of the host in the /etc/hosts file of the computer.
b. Check all the DHCP servers in the network.
c. Add the dhcpcd daemon to the boot-up script, (/etc/sysconfig/network-scripts/ifup)
d. Execute the dhcpcd command with the –f option.
Correct Answer: -> a
67/ Ronald Billing works as a system administrator at Mastery Mechanics. The organization has
installed a network printer, which is used by various systems over the network for printing the
documents related to various projects. The printer is not working properly since last couple of
days. Therefore, Ronald replaces the printer with a new one, configures it and starts the print
service. However, when John, an employee of the organization uses the printer, a problem
occurs. The printer shows a staircase effect. John informs Ronald about the problem. How can
Ronald troubleshoot the problem that occurs while printing the documents?
a. 1. Open the /etc/hosts.equiv or the /etc/hosts.lpd file.
2. Stop and restart the print service.
b. 1. Open the /etc/hosts.equiv or the /etc/hosts.lpd file.
2. Add the IP addresses of the remote hosts.
3. Stop and restart the print service.
c. 1. In the printtool utility, edit printer entry and click on Select _ button to open the Configure
Filter dialog box.
2. Select the correct driver for your printer.
d. 1. In the printtool utility, edit printer entry and click on select _ button to open the Configure
Filter dialog box.
2. Select the Fix stair-stepping text option under the Printing _ Options section.
Correct Answer: -> d
68/ Jim Wilkins is working as a storage administrator at Blue Moon Computers. Jim implements
Integrated Device Electronics (IDE) to determine the physical limits of the storage scalability in
the organization. However, the organization wants Jim to extend a system’s local storage beyond
the limitations of IDE. Which of the following Jim can implement to perform the task?
a. Fibre Channel–based storage
b. SCSI
c. iSCSI
a. a and b both
b. Only a
c. Only b
d. a and c both
Correct Answer: -> d
69/ Steve Irvin is working as an IT consultant at Red Eye Experts. The organization consists of
5000 desktops running on multiple platforms, such as Linux and Windows, and connected
through LAN and WAN. Steve needs to identify a tool to automate and centralize the
management of desktops in the organization. He also needs to identify a tool that can implement
policy-based management of desktops in the organization. Which tool should Steve select for
this?
a. WebTMA
b. Unicenter’s Desktop Management Solution
c. Radmin
d. PMP 6.0
Correct Answer: -> b
70/ Which of the following activity should be performed to manage VPNs in an enterprise?
a. Use a secure remote syslog server to make it difficult for the malicious user to manipulate the
log.
b. Enforce strong authentication based on the volume of remote users and value of the resources
that are being accessed.
c. Use biometrics mechanisms to protect IT infrastructure from thefts or unauthorized attacks.
d. Ensure that all executable files, which you receive in the organization through e-mail, are
checked and approved.
Correct Answer: -> b
71/ Donna Johnson is working as an IT Consultant in Super Software 2000. Super Software 2000
is a large organization, which is spread across many countries and functions through distributed
network system. Donna is getting complaints regarding performance problems in Internet,
intranet, and extranet resources of the organization. Which of the following tool or solution should
Donna use to monitor and troubleshoot LAN, WAN, and VLANs?
a. HP OpenView Network Management Solution
b. Unicenter Network Management Solution
c. Observer 10.1
d. LANBrowser 1.3
Correct Answer: -> b
72/ Jim Lewis is working as a system administrator at Good Graphics Inc. Jim wants to use a
multi-platform security management solution that can provide plug-in-integration between the
security tool and the solution to collect the alerts. Which one of the following solution should Jim
use to perform the required task?
a. HP OpenView Security Management Solution
b. IBM Tivoli Security Compliance Manager
c. LANBrowser 1.3
d. WebScout 2.1
Correct Answer: -> a
73/ Red Eye Systems Inc. is a software development company. The company is planning a new
software development facility in Arizona. This facility will develop system software in C/C++ on
UNIX platform. Because this is a new project the company does not want to invest heavily in
computing resources. In addition, the development process does not require too many resource
consuming tools, except for C/C++ compilers, CLI debugging and testing tools and UNIX
platform. The programmers will not be allowed to share files and folders as the code will be
integrated in the next step of the SDLC. Which of the following computing model would you
suggest to the company as a networking consultant?
a. Centralized network computing model with thin clients
b. Centralized network computing model with thick clients
c. Distributed network computing model with thick clients
d. Collaborative network computing model
Correct Answer: -> a
74/ Which of the following can be termed as necessary services?
a. Services that must be available at peak load
b. Services essential to operation
c. Services that must be available, but can be available at reduced performance.
d. Services that can be postponed indefinitely
Correct Answer: -> c
75/ Consider the following statements:
Statement A: Optional services are the services that must be available at peak load.
Statement B: Integrity requirements of QoS maintain the definiteness of the interaction between
the server and the user.
Which of the following is correct?
a. Both, statement A and B are true
b. Statement A is true and statement B is false
c. Statement A is false and statement B is true
d. Both, statement A and B are false
Correct Answer: -> c
76/ Donna Johnson is working as an IT consultant at Red Eye Experts. The organization needs to
implement effective server solutions to increase employee productivity and reduce operating
costs. Donna is assigned the task of implementing servers that can handle the services running in
the HPC layer of the server deployment architecture of the organization. The organization also
asks Donna to implement servers for file and printing services. Which servers Donna will
implement to perform the task?
a. Donna needs to implement high-end servers, such as OLTP Med and BI servers.
b. Donna needs to implement infrastructure servers.
c. Donna needs to implement servers that have large memory, can store very large data sets,
and can take load of high transaction volumes, such as ERP Large servers, OLTP Large servers.
In addition, Donna needs to implement workgroup servers.
d. Donna needs to implement high-end servers, such as HPC servers and OLTP large.
Correct Answer: -> c
77/ Which of the following is caused by variations in queue length and the processing time
needed to reorder packets arrived out of order due to travelling over different paths?
a. Jitter
b. Throughput
c. Availability
d. Packet loss
Correct Answer: -> a
78/ Mike Womack is working as a storage administrator at Red Eye Experts. Mike is assigned the
task of selecting an efficient storage technology for the organization that suits its requirements.
The organization wants Mike to select a storage technology that can enable multiple users to
share the same storage space thus minimizing the overall overheads by centrally managing hard
disks. Which storage technology Mike should select to perform the assigned task?
a. Redundant Array of Inexpensive Disks
b. Tape Drives
c. Storage Area Networks
d. Network-Attached Storage
Correct Answer: -> d
79/ Larry Williams is working as a network administrator in Blue Valley Consulting. Larry is
assigned the task of selecting an appropriate network technology in the enterprise. Larry needs to
set up networks within a building of the enterprise. Therefore, Larry chooses LAN technology to
be implemented in the building. Larry observes that there are too many computers, which are
required to be attached to LAN. Therefore, Larry needs a technology that reduces the number of
data packet collisions and can deliver up to 80 percent of the maximum bandwidth available. In
addition, Larry needs to decide the physical media that have multiple pairs of wires to connect the
computers and reduces network crosstalk by negating the electro-magnetic field. Which of the
following combination should Larry choose to perform the required task?
a. Token ring and Coaxial cables
b. Ethernet and Coaxial cables
c. Token ring and Twisted pair cables
d. FDDI and Fiber optic cables
Correct Answer: -> c
80/ Global Systems Inc. is a software development organization with its three branch offices in
different parts of America. John Wilkins is working as system administrator at the head office of
the organization at Los Angeles. The employees working at the branch offices complain to John
about the poor performance of the FTP server placed at the branch office at New York. To solve
the problem, John needs to remotely monitor the CPU, disk, and memory usage of the server.
Which tool should John implement to perform the task?
a. PMP 6.0
b. Radmin
c. Symantec ON iPatch
d. PCDuo Enterprise
Correct Answer: -> a
81/ Which of the following activity should be performed to manage internet access of an
enterprise for security?
a. Keep track of who has accessed information each time a device connects to the LAN.
b. Keep the version of the operating system updated.
c. Block the file types such as EXE, COM, BAT, VBS, and SCR that carry virus. Also block any
file type with more than one extension such as, ABC.TXT.VBS.
d. Ensure that configuration settings should not be accessible to all users. Only designated
people should be able to access them.
Correct Answer: -> c
82/ Steve Irwin is an IT Consultant in the head office of Global Systems Inc. The regional offices
of Global System Inc. are spread across north, east, south, and west regions. There are 1000
workstations in each office, which run on Windows platform. Steve needs an enterprise-level
network management solution, which includes report scheduler for generating deliver reports,
packet capture scheduling, and monitor for network delay. Which of the following tool or solution
should Steve consider, which contains all these features?
a. Unicenter Network Management Solution
b. LANBrowser 1.3
c. OpManager 5.5
d. Observer 10.1
Correct Answer: -> d
83/ Steve Irwin is working as a security administrator at Red Eye Experts. Steve has configured
Symantec Client Security tool to protect the enterprise client systems from security risks and
threats. Steve needs to use the tool to enhance intrusion prevention solutions reducing the time
and cost. Which of the following features will enable Steve to perform the required task?
a. Optimized out-of-the-box firewall
b. Generic Exploit Blocking
c. Side effect repairing
d. Centralized configuration
Correct Answer: -> b
84/ Which of the following requirements represents the degree of being capable of maintaining
the service and service quality by a server?
a. Performance
b. Integrity
c. Accessibility
d. Reliability
Correct Answer: -> d
85/ Lee Johnson is a IT consultant at Red Sky IT system. Lee is assigned the task to plan
desktop solutions for the organization. Lee wants to implement the devices that have word
processors, spreadsheet applications, calendars, and E-mail clients installed on them. Which type
of device should Lee implement to perform the above task?
a. Java-based mobile devices
b. PALM-based mobile devices
c. Windows CE-based mobile devices
d. Linux based mobile devices
Correct Answer: -> a
86/ SuperSoftware Inc is planning to implement IT infrastructure in the organization. As a part of
planning IT infrastructure, SuperSoftware Inc needs to plan for effective desktop solutions to help
users to perform day-to-day operations, increase user productivity, and improve business
processes. For this, the organization asks Anne Johnson, an IT consultant to analyze the
business and technical requirements for planning desktop solutions and identify an appropriate
desktop technology on the basis of the requirements. On analyzing the requirements, Donna
notices that he needs to select desktop technologies for the desktop users who need to work on
packages involving heavy graphics. In addition, Donna needs to select a technology having more
storage capacity than phone handsets for the mobile users of the organization. Identify the
desktop and mobile technologies that Donna need to select to perform the task?
a. Macintosh clients and Java-based mobile devices
b. Linux clients and PALM-based mobile devices
c. Macintosh clients and PALM-based mobile devices
d. Linux clients and Java-based mobile devices
Correct Answer: -> c
87/ Which of the following questions you need not answer while finalizing internal access
security?
a. What are the processes to deal with change in access permissions granted to an employee?
b. What are the processes to evaluate the access permissions granted to an employee?
c. What are the methods to identify unauthorized access and prevent it?
d. What are the administrative levels in the organizations and what data and system access
permissions do they need?
Correct Answer: -> c
88/ Tom Wilkins is the member of the team planning for an effective storage solution in Red Eye
Experts. Red Eye Experts is a very big enterprise spanned across different areas of world,
therefore, Tom needs to plan for the storage solution that can be accessed over a network and
minimize the overall overheads by centrally managing hard disks. Keeping in mind all these
considerations, Tom plans to use NAS in the enterprise that enables multiple users to share the
same storage space. Which of the following feature will help Tom to accomplish his task?
a. Server attached approach to data storage
b. Access to storage pool
c. 100 MB/s full duplex data transfer rates
d. Data regenerating hard disks
Correct Answer: -> a
89/ Steve Irvin is the IT consultant at Red Eye Experts. Steve needs to identify an asset
management solution that would enable the IT staff of the organization to access the asset
management and maintenance information of the desktops from any location and at any time
through the Internet. In addition, Steve needs to identify a scalable asset management solution in
which additional modules can be added in future if the organization expands. Identify an
appropriate asset management solution.
a. Radmin
b. Altiris Asset Management Suite
c. WebTMA
d. ManageEngine ServiceDesk Plus
Correct Answer: -> c
90/ Which of following network management tool can be used to secure the network from internal
attacks by monitoring event logs?
a. Observer 10.1
b. OpManager 5.5
c. Unicenter Network Management
d. LANBrowser 1.3
Correct Answer: -> b
91/ Pat Wilkins is a system administrator in the head office of Red Eye Experts, which is a large
and complex organization spread across many countries. Pat wants to remove all kinds of
complexities that are associated with network management for effective and efficient working of
the organization. Donna Johnson is the IT consultant in Red Eye Experts. Pat assigns Donna the
task of finding a multi-platform solution that discovers the entire network and can automate
several network monitoring tasks. To perform this task, Donna wants a solution that includes
WAN monitoring, server monitoring, URL monitoring, and switch monitoring. Which of the
following tool or solution is appropriate to include all these features?
a. OpManager 5.5
b. HP OpenView Network Management Solution
c. LANBrowser 1.3
d. Unicenter Network Management Solution
Correct Answer: -> a
92/ Jim Lewis is working as a security administrator in Blue Moon Computers. Jim needs to use a
Windows-based tool that monitors and filters Internet access for Web sites and Internet
applications. Jim wants that the tool should record the bandwidth and time each user or
workstation has spent in accessing Internet on periodic basis. Which of the following tool should
Jim use to perform the required task?
a. OpManager5.5
b. Observer10.1
c. WebScout 2.1
d. Symantec Client Security
Correct Answer: -> c
93/ The management at Bluemoon Computers Inc. wants to secure its network from external
intrusions. The computers on the network are running on a number of different operating
systems, such as Windows, Solaris, Linux, and Macintosh and have software firewalls installed
on them. The management is very cost conscious and also apprehensive that the level of security
might not affect the network performance. Therefore, it has been decided that only one extra level
of security will be implemented. Which of the following security measures will you suggest as a
networking consultant?
a. Host-based Intrusion Detection System (HIDS)
b. Network-based Intrusion Detection System (NIDS)
c. Combination of NIDS and HIDS
d. No IDS is required as the computers have firewalls installed on them
Correct Answer: -> b
94/ Which of the following business factors enables you to determine the technologies that can be
used to establish network connections between different branch offices of an organization?
a. Business processes
b. Organization structure
c. Geographical scope
d. Business applications
Correct Answer: -> c
95/ Which of the following can be termed as strategic services?
a. Services that must be available at peak load
b. Services essential to operation.
c. Services that can be postponed indefinitely.
d. Services provided by servers that must be available, but can be available at reduced
performance
Correct Answer: -> b
96/ Pat Wilkins is working as an IT Consultant at Global Softwares. Pat is assigned the task to
plan desktop solutions for the organization. Pat needs to implement devices that have more
storage capacity than phone handsets. The devices should also have the capability to run javabased dynamic applications. Which of the following devices Pat should implement to perform the
task?
a. Windows CE-based mobile devices
b. PALM-based mobile devices
c. Java-based mobile devices
d. Linux based mobile devices
Correct Answer: -> b
97/ Corrine Wallace is working as an IT consultant at Blue Moon Computers. The organization is
planning to implement an IT infrastructure. The management of the organization notices that
organization requires servers at entry level of business operations to implement IT infrastructure.
Therefore, organization assigns Corrine the task of planning server solutions for business
operations, such as caching services and proxy services. In addition, the organization is required
to provide file and print services. Which servers Corrine will implement to fulfil the requirement of
the organization?
a. Web servers and Workgroup servers
b. Infrastructure servers and Mail servers
c. HPC servers and Infrastructure servers
d. Workgroup and HPC servers
Correct Answer: -> a
98/ Which of the following questions you need to answer while planning security for external
access?
a. What are the processes to deal with change in access permissions granted to an employee?
b. What are the processes to evaluate the access permissions granted to an employee?
c. What are the methods to identify unauthorized access and prevent it?
d. What are the administrative levels in the organizations and what data and system access
permissions do they need?
Correct Answer: -> c
99/ Pat Wilkins is working as an IT consultant at Safest Software Inc. The organization is planning
for network solutions to facilitate faster information sharing. Pat is assigned the task to determine
the number and the type of hardware and software resources required on a network. Pat needs to
size the network to perform the task. Which of the following factors Pat needs to consider to
perform network sizing:
a. Number of Remote Users
b. Proactive Fault Management
c. Number of People Using the Network
d. Software Specifications
e. Application Performance
a. a, b, c, and e
b. a, c, and d
c. a, b, c, and d
d. b, c, d, and e
Correct Answer: -> b
100/ Pat Wilkins is working as a network administrator in Super Software Inc, which is spread
over a vast geographical area. Pat needs to use WAN communication service to create an internetwork of networks. Pat needs to use a technology that can support very high-speed data
transfers to the tune of 640 kbps in both directions and carries high-speed data and multimedia
over telephone lines. In addition, Pat wants another technology, which is used for Point-to-Point
networks and for backup for another type of link. Which of the following combination of WAN
technologies should Pat use to complete the required task?
a. ISDN and Frame Relay
b. ADSL and Leased lines
c. SMDS and X.25
d. ADSL and Analog modems
Correct Answer: -> d
101/ Consider the following statements:
Statement A: WebTMA and ManageEngine ServiceDesk Plus are Web-based asset management
solutions.
Statement B: The Altiris Asset Management Suite has a snap-in modular design.
Which of the following is correct about the above statements?
a. Statement A is False and Statement B is True.
b. Statement A is True and Statement B is False.
c. Both, Statement A and Statement B are True.
d. Both, Statement A and Statement B are False.
Correct Answer: -> c
102/ Consider the following statements:
Statement A: ManageEngine ServiceDesk Plus is a Web-based asset management solution.
Statement B: ManageEngine ServiceDesk Plus provides a helpdesk for troubleshooting desktoprelated problems.
Which of the following is correct about the above statements?
a. Statement A is False and Statement B is True.
b. Statement A is True and Statement B is False.
c. Both, Statement A and Statement B are True.
d. Both, Statement A and Statement B are False.
Correct Answer: -> c
103/ Which of the following tool can be used as a network monitor and protocol analyzer for
Ethernet, wireless 802.11b/a/g, token ring, and FDDI networks?
a. Observer 10.1
b. LANBrowser 1.3
c. HP OpenView Network Management
d. Unicenter Network Management
Correct Answer: -> a
104/ Steve Irwin is an IT consultant in Blue Moon Computers. Steve wants an enterprise-level
tool for network management that helps in scanning the entire network by searching and
configuring properties of all the devices of Windows NT/2000 enterprise. The tool should search
for errors, audit information, connected users, and share permissions. Which of the following tool
do u think is appropriate to perform this task?
a. OpManager 5.5
b. Observer 10.1
c. LANBrowser
d. HP OpenView Network Management Solution
Correct Answer: -> c
105/ Corrine Wallace is working as a storage administrator at Technology Systems. The
workstations in Technology Systems are running on multi-platform systems. Corrine finds that to
manage storage devices effectively, he needs to use a tool or solution that manages the backup
and recovery tools centrally and can monitor the storage environment remotely. Which of the
following tool should Corrine use to perform the task?
a. Storix System Backup Administrator
b. BrightStor ARCserve Backup for Laptops & Desktops Release 11
c. VERITAS Backup Exec10
d. BrightStor Storage Resource Manager
Correct Answer: -> d
106/ The management at Bluemoon Computers Inc. has decided to connect it corporate office to
all of its regional offices. The local networks at regional offices are to be identified by the different
subnets of the same IP address class 172.16.0.1. The regional offices are using different
platforms for their networks, such as Windows, Linux, Macintosh, and Solaris. Because the
corporate network will be connected to all these regional offices round the clock, it will be very
essential to restrict the broadcast produced by all the networks and filter in the ones that are
specifically meant for the corporate office. Which of the following network devices will you
suggest to facilitate this connectivity as a networking consultant?
a. Hub
b. Switch
c. Router
d. Layer 2 Switch
Correct Answer: -> c
107/ What is the configuration requirements of the desktops used in help desks?
a. Following are the configuration requirements of the desktops used in help desks
High quality printers
Voice Over IP integration
Computer telephony integration
b. Following are the configuration requirements of the desktops used in help desks
Thin-client computers
Voice Over IP integration
Computer telephony integration
c. Following are the configuration requirements of the desktops used in help desks
Thin-client computers
Voice Over IP integration
Fast processing capabilities
d. Following are the configuration requirements of the desktops used in help desks
Thick-client computers
Voice Over IP integration
Computer telephony integration
Correct Answer: -> b
108/ Corrine Wallace is working as IT consultant at Blue Moon Computers. Corrine is assigned
the task of determining the service usability and utility of servers in the organization. For this,
Corrine needs to determine the time it takes to repair a service that has failed on the servers.
Which of the following requirements Corrine needs to analyze to perform the task?
a. Accessibility
b. Availability
c. Integrity
d. Performance
Correct Answer: -> b
109/ Safest Software wants to ensure uninterrupted execution of business activities and increase
productivity and profitability of an enterprise. For this, the organization decides to implement
server solutions in the organization to handle its routine and critical business applications. The
management of the organization notices that organization requires servers at every level of
business operations. Therefore, organization hires Pat Wilkins, an IT consultant to analyze the
business processes and requirements that needs to be considered for planning server solutions
and implement servers in the organization. After analyzing the requirements Pat realizes that he
needs to implement servers for the following:
File and print services
Firewall and security services
Provide clustered computing system
Handling complex interactions
Which server Pat needs to implement to perform the task?
a. Workgroup server only
b. Web servers.
c. Workgroup and Infrastructure servers
d. Workgroup, Infrastructure, HPC, and high-end servers, such as ERP and Application Tier
servers.
Correct Answer: -> d
110/ Which of the following is not included in the security policy of an IT infrastructure?
a. Roles and responsibilities for various employees.
b. Establishment of trust among clients and employees to gain their confidence
c. Rules regarding the use of various organizational resources, such as computers, the Internet,
or e-mail.
d. Geographical Scope of the organization
Correct Answer: -> d
111/ Donna Johnson, a network administrator is planning for the network solutions for the
Mountain Marketing Inc. Donna needs to avoid network congestion by managing data flows. For
this _donna needs to determine QoS of the organization’s network. Which of the following factors
cannot help Donna determine QOS of the network:
a. Throughput
b. Business applications
c. Availability
d. Jitter
e. Size and Geographical Scope
a. b and e
b. d and b
c. d and e
d. d, e, and b
Correct Answer: -> a
112/ Donna Bard is working as a security administrator in Safest Software Inc. Donna needs to
deploy a security method in the enterprise that can protect IT infrastructure from both external as
well as internal attacks. Donna receives complaints that unnecessary data, such as video and
graphic files are entering the network from outside. Therefore, Donna wants that the security
method should filter out the incoming traffic to stop the unnecessary data consuming the network
bandwidth. Donna also wants to use another software that provides encryption technologies,
digital certificates, and certificate to protect the security of their communications and business
transactions on the Internet. Which of the following combinations of security methods should
Donna use to provide enterprise-wide network security?
a. PKI and VPNs
b. VPNs and IDS
c. IDS and Firewalls
d. Firewalls and PKI
Correct Answer: -> d
113/ Which of the following tool can be used to build reports to identify the under-utilized storage
space?
a. BrightStor Storage Resource Manager
b. HP OpenView Storage Area Manager
c. BrightStor ARCserve Backup for Laptops & Desktops
d. Storix System Backup Administrator
Correct Answer: -> b
114/ Corrine Wallace is working as an IT consultant in the head office of Safest Software. Safest
Software is a large enterprise with distributed network in six branches across four countries. The
workstations in each office are running on multi-platform, such as Linux and Windows. Steve
Irwin is the system administrator of the head office. Steve assigns Corrine the task of providing a
network management solution, which combines the software, services, support, and training to
manage the network proactively by optimizing performance and availability of the distributed
network system of Blue Moon Computers. Which of the following tool or solution should Corrine
choose to perform this task?
a. HP OpenView Network Management Solution
b. Unicenter Network Management Solution
c. OpManager 5.5
d. LANBrowser 1.3
Correct Answer: -> a
115/ Pat Greene is working as a storage administrator at Blue Moon Computers. Pat is assigned
the task of managing archives in an enterprise. Pat needs to protect the data stored in archived
media from mishandling or natural disasters. Which of the following activity should Pat perform to
complete the task?
a. Ensuring that archive media does not exceed the safe limits
b. Storing the data with the same retention period
c. Maintaining a record of the archival media, files, and folders
d. Maintaining the duplicate copy of the archived data
Correct Answer: -> d
116/ Red Eye Systems Inc. wants a plan for security implementation at a new software
development facility in New York. The company wants the facility to have at least five levels of
authentications for any data that is accessed from a remote location as well as for the data sent
to a remote location. The management wants to implement both host-based and network-based
IDS and wants to put a firewall after each VPN gateway that will be used for connecting remote
users. In addition, the management has a very stringent administrative policy, which requires
even a single change in user permissions to be approved by a hierarchy of officials. In addition,
the management has decided to conduct weekly security audits during which the network at the
facility would be non-operational. As a networking consultant, according to you which of the
following business or technical requirements will be affected because the security requirements?
a. Availability, geographical scope, and business applications
b. QoS, Performance, and availability
c. User and resource distribution
d. Security policies
Correct Answer: -> b
117/ New tech book is multinational organization with various bookstores in various parts of USA.
To expand its customer base globally and to automate its business process the organization
launches an e-commerce site on the Internet. To protect its business processes from disruption,
the organization asks Anne Donaldson to plan for the availability of the website. Identify the
considerations Anne needs to keep track of to plan for the availability of the website.
To protect data losses in the event of disasters, the organization also asks Anne to plan tasks for
maintaining availability and backing up critical data of the website. What should Anne do to
perform the task?
a. Anne needs to keep track of the following considerations while planning for the availability of
the website:
Criticality of the data
Amount of downtime that the organization can afford
Cost of reducing downtime in the organization
In addition, Anne needs to consider the frequency of planned downtime while setting the
availability goals to plan for appropriate backup strategies and maintenance tasks to maintain
availability.
b. Anne needs to keep track of the following considerations while planning for the availability of
the website:
Amount of data that a network can carry
Amount of data that is successfully transferred over the Internet
Ratio of error-free data transmission to total transmission.
In addition, Anne needs to consider the frequency of planned downtime while setting the
availability goals to plan for appropriate backup strategies and maintenance tasks to maintain
availability
c. Anne needs to keep track of the following considerations while planning for the availability of
the website:
Criticality of the data
Amount of downtime that the organization can afford
Cost of reducing downtime in the organization
In addition, Anne needs to consider the frequency of unplanned downtime while setting the
availability goals to plan for appropriate backup strategies and maintenance tasks to maintain
availability.
d. Anne needs to keep track of the following considerations while planning for the availability of
the website:
Amount of data that a network can carry
Amount of data that is successfully transferred over the Internet
Ratio of error-free data transmission to total transmission.
In addition, Anne needs to consider the frequency of unplanned downtime while setting the
availability goals to plan for appropriate backup strategies and maintenance tasks to maintain
availability
Correct Answer: -> a
118/ _______ management enables you to manage the leased assets in an enterprise by
informing you about the end of the lease period.
a. Asset
b. Event
c. Remote
d. Desktop configuration
Correct Answer: -> a
119/ Identify the tasks performed by the help desk in an enterprise.
a. Create security policies for securing the desktops.
b. Provide an online knowledge base that provides solutions to problems.
c. Log and monitor the problems of desktop users.
d. Provide centralized support for troubleshooting problems of desktop users.
Select the correct option.
a. a, c, and d
b. a, b, and d
c. b, c, and d
d. c and d
Correct Answer: -> c
120/ Steve Irvin works in the Helpdesk department of Global Systems Inc. Currently, the
organization uses a decentralized and manual method for managing and maintaining IT
resources. The CIO of the organization notices that the decentralized and manual method for
managing and maintaining IT resources is prone to errors and requires a huge amount of time,
and effort. To solve the problem, the CIO asks Steve to identify a tool that can keep track of the
IT resources and enable the IT staff to perform the following tasks in the organization:
Determine which IT resources are to be upgraded or replaced
Keep track of the end of the lease period of the IT resources
Keep track of the software having expired licenses
Determine which users have particular software packages installed
Centrally manage the implementation of software patches across the enterprise
Centrally manage the distributed IT resources
Identify the tool that is most appropriate to perform the preceding tasks.
a. Remote management tool
b. Event management tool
c. Asset management tool
d. Desktop standardization tool
Correct Answer: -> c
Download