Linux
Upcoming SlideShare
Loading in...5
×
 

Linux

on

  • 318 views

qfx q8

qfx q8

Statistics

Views

Total Views
318
Views on SlideShare
318
Embed Views
0

Actions

Likes
0
Downloads
5
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft Word

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Linux Linux Document Transcript

    • 1/ Consider the following statements:Statement A: The BSD interface provides a freeware tool that helps to handle the networkload. This is achieved by using the robust network services that the BSD interfaceprovides through one of its distribution.Statement B: The System V Interface is a command-line interface that enables you to usethe print services.Which of the following is true, with respect to the above statements?a. Statement A is true and statement B is false.b. Statement A is false and statement B is true.c. Both, statements A and B, are true.d. Both, statements A and B, are false.Correct Answer: -> c2/ While configuring a NIS client you need to configure the ypbind service. Which of thefollowing files will you modify to perform this task?a. /etc/passwdb. /etc/sysconfig/networkc. /etc/yp.confd. /etc/nsswitch.confCorrect Answer: -> c3/ Consider the statements:Statement A: The range of IP addresses that can be assigned to a computer are known asa dotted quad notation.Statement B: The number of octets that represent the network Id and host Id in the IPaddresses varies with the size of the network.Which of the following is true, with respect to the above statements?a. Statement A is true and statement B is false.b. Statement A is false and statement B is true.c. Both, statements A and B, are true.d. Both, statements A and B, are false.Correct Answer: -> b4/ Steve Irvin is working as system administrator at Mountain Marketing Inc. He needs toassign dynamic IP addresses to all the computers in the organization. For this, he decidesto configure eth1 as the DHCP client. The DHCP server is already present on the networkand the host name is Mountain Marketing. How should Steve proceed to perform the task?a. After setting the value of the NETWORKING parameter equal to yes in the /etc/sysconfig/network file, he needs to edit the contents of the /etc/sysconfig/network-scripts/ifcfg-eth1file, as follows:DEVICE=eth1ONBOOT=noBOOTPROTO=dhcpb. After setting the value of the NETWORKING parameter equal to yes in the/etc/sysconfig/network file, he needs to edit the contents of the /etc/sysconfig/network-scripts/ifcfg-eth1 file, as follows:DEVICE=eth1ONBOOT=yesBOOTPROTO=dhcpc. After setting the value of the NETWORKING parameter equal to no in the /etc/sysconfig/network file, he needs to edit the contents of the /etc/sysconfig/network-scripts/ifcfg-eth1file, as follows:DEVICE=eth1ONBOOT=yesBOOTPROTO=dhcpd. After setting the value of the NETWORKING parameter equal to no in the /etc/sysconfig/
    • network file, he needs to edit the contents of the /etc/sysconfig/network-scripts/ifcfg-eth1file, as follows:DEVICE=eth1ONBOOT=noBOOTPROTO=dhcpCorrect Answer: -> b5/ Pat Wilkins is working as system administrator at Global Systems Inc. Donna is workingas software developer with the company. She needs to develop some applications on theLinux platform using Qt 3 and GTK+ 2 graphical toolkits. Therefore, Donna needs Pat toadd fonts to her system. She wants the font to be added such that they are smooth-edged.How will Pat perform the given task?a. To add the fonts, Pat needs to perform the following steps:Copy the new fonts to the directory, /usr/share/fonts/local.Run the following command for updating the font information cache: # fc-cache /usr/share/fonts/localb. To add the fonts, Pat needs to perform the following steps:Copy the new fonts to the directory, .fonts/, present in the users home directory.Run the following command for updating the font information cache: # fc-cache /usr/share/fonts/localc. To add the fonts, Pat needs to perform the following steps:Copy the new fonts to the Fontconfig configuration file.Run the following command for updating the font information cache: # fc-cache /usr/share/fonts/locald. To add the fonts, Pat needs to perform the following steps:Copy the new fonts to the XFree86 configuration file.Run the following command for updating the font information cache: # fc-cache /usr/share/fonts/localCorrect Answer: -> b6/ AB Corp is an advertising company, which is working on Linux platform. Steve, thesystem administrator, creates a directory, /extrauser. After creating this directory, Steveneeds to create a user named john in the /extrauser directory. Which command shouldSteve use to perform the above task?a. useradd –d /extrauser johnb. useradd –f /extrauser johnc. useradd –g /extrauser johnd. useradd –c /extrauser johnCorrect Answer: -> a7/ Steve Irving is the system administrator in Mastery Mechanics. He needs to install aLinux server on the network of the organization. He is also required to attach a printer tothe Linux server so that all the employees of various departments can share the networkprinter. For this, Steve needs to install Linux on a computer and configure it as a printserver using the CUPS daemon. However, after one week some of the employees startcomplaining to Steve that they are not able to access the printer. The employees alsoreport that when they try to access the printer from their remote Linux system they receivean error message, which states that the permission to access the printer is denied. Whatcould be the problem and how should Steve resolve it?a. Modify the server configuration file /etc/cups/cupsd.conf, which contains theinformation required to access the printer.b. Modify the server configuration file /etc/cups/printers.conf, which contains theinformation required to access the printer.c. Modify the server configuration file /etc/cups/classes.conf, which contains theinformation required to access the printer.d. Modify the server configuration file /etc/cups/client.conf, which contains the information
    • required to access the printer.Correct Answer: -> a8/ Which of the following command performs the same task as the mkfs.ext3 /dev/hdc8command?a. mke2fs –l /dev/hdc8b. mke2fs –j /dev/hdc8c. mkfs -c ext3 /dev/hdc8d. mke2fs –i /dev/hdc8Correct Answer: -> b9/ You are working as system administrator at Red Sky IT Systems. The organization hasWindows server installed on the network. You have been assigned the task of installingLinux on all the computers in the network. Which type of installation method can you useto install Linux in the given scenario?a. Use an FTP Serverb. Use an NFS Serverc. Use an HTTP Serverd. Use a CD-ROMCorrect Answer: -> a10/ Mike Womack is working as a project manager with Smart Software Developers. Thenetwork setup of the organization is based on Linux. The organization has a remoteserver, where the employees save their files. Don Allen, the system administrator of theorganization has created user accounts for all the employees of the organization. Mike isworking on a project and creates a file, teamproject.txt. Mike wants to assign readpermission to all the other users, for the file, teamproject.txt. However, Mike wants toremove all the permissions from the other users, for any other file that he creates. Mikealso wants to assign the read and write permissions to his team members, who areworking in his project, for all the files that he will create. Which set of commands willenable Mike Womack to set the file access permissions according to his requirement?a. chmod a+r teamproject.txtumask 037b. chmod a+r teamproject.txtumask 017c. chmod o+r teamproject.txtumask 017d. chmod o+r teamproject.txtumask 037Correct Answer: -> c11/ Ken Burton, the system administrator at Global Systems Inc. has joined theorganization after a long leave. During the leave period, Bill was using Ken’s computer.Bill had replaced the hard disk of Ken’s computer with a new hard disk for personal use.Ken had installed GRUB on the network server in order to boot the Linux operatingsystem. While booting his computer, Ken receives an error at Stage 1 of the loadingprocess and the booting process stops. Which of the following error has caused thebooting process to stop?a. Floppy Errorb. Hard Disk Errorc. Geom Errord. Read ErrorCorrect Answer: -> c12/ The software department at Supersoft2000 requires Windows 2000 platform to developsoftware. Chris, the system administrator wants to install the Windows 2000 Server on one
    • of the six partitions of an existing Linux server. To install Windows 2000 Server on thispartition, Chris deletes this partition. However, he does not delete the entry of thispartition in the /etc/fstab file and restarts the computer. The following error message isdisplayed:checking file systemsfsck.ext3/dev/hdc6:The superblock could not be read or doesn’t describe a correct ext2 filesystem. If thedevice is valid and it really contains an ext2 filesystem (and not swap or ufs or somethingelse), then the superblock is corrupt, and you might try running e2fsck with an alternatesuperblock:e2fsck –b 8193 <device>: Bad magic number in super-block while trying to open /dev/hdc6 [FAILED]* * * An error occurred during the file system check.* * * Dropping you to a shell; the system will reboot* * * when you leave the shell.Give root password for maintenance(or type Control-D to Continue):How can Chris troubleshoot the problem?a. Start the system in the rescue mode and delete the entry of the deleted partition in the/etc/fstab file.b. Start the system in the single-user mode and change the root password.c. Start the system in the single-user mode and delete the entry of the deleted partition inthe /etc/fstab file.d. Start the system in the rescue mode and change the root password.Correct Answer: -> a13/ What is the configuration requirements of the desktops used for financial servicesenterprisea. Following are the configuration requirements of the desktops used in call centres andhelp desks:Thin-client computersVoice Over IP integrationComputer telephony integrationb. Following are the configuration requirements of the desktops used in banks and helpdesks:High storageHigh security requirementc. Following are the configuration requirements of the desktops used in banks and helpdesks:Thick client computersOffice applicationsStandard quality printing deviced. Following are the configuration requirements of the desktops used in banks and helpdesks:High storage capacityFast processing capabilitiesCorrect Answer: -> b14/ Tom Davidson is working, as a system administrator at Mountain Marketing Inc. Tomhas been assigned the task of sending the high priority jobs for printing first. Whichcommand will Tom execute to perform the task?a. lpcb. lpstatc. lp
    • d. lpadminCorrect Answer: -> c15/ Steve is a system administrator at Deez Inc. He needs to load a module into the kernel.He also wants to specify that a kernel module name should be provided explicitly in thecommand. Which option of the insmod command will Steve use to perform the task?a. insmod -ob. insmod -sc. insmod -pd. insmod -fCorrect Answer: -> a16/ Jim Lewis, the system administrator at Deez Inc, has installed Linux on a computer.Jim wants to collect the information about the parameters that are passed to the kernelduring the start up of the kernel. Which file in the /proc/ directory should Jim use toperform this task?a. /proc/apmb. /proc/cmdlinec. /proc/cpuinfod. /proc/dmaCorrect Answer: -> b17/ You are the system administrator at Deez Inc. You need to transfer the data from asource computer over a network to the destination computer over another network. Forthis, packet routing is required from one network to the other. Which feature of Linuxkernel should you use for the above task?a. Routerb. Routing tablec. Default routed. IP forwardingCorrect Answer: -> d18/ Pat configures the dhcpcd daemon and starts his computer. He notices that the IPaddress is not assigned to his computer. Pat verifies that the dhcpcd daemon is running.Which command should Pat use for the IP address assignment?a. Pat needs to execute the ifconfig command.b. Pat needs to execute the dhcpcd command with the –f option.c. Pat needs to check all the DHCP servers on the networkd. Pat needs to execute the route command.Correct Answer: -> b19/ Steve Irvin is working as system administrator at Super Software2002. The domainadministrator of the organization wants Steve to provide fonts to the X clients. He alsowants Steve to add fonts such that they do not provide support for advanced anti-aliasingfeature. Identify the correct sequence of steps that Steve needs to perform to accomplishthe given task?a. To add fonts, Steve needs to perform the following steps:Create a directory, /usr/share/fonts/local/, if it does not already exist.Change to the /usr/share/fonts/local directory.Update the font information of the system.Copy the new font files to the /usr/share/fonts/local directory.Execute the chkfontpath command to add the directory, /usr/share/fonts/local/ to the XfsFontPath as root directory.Restart Xfs so that the X clients can use the new fonts.b. To add fonts, Steve needs to perform the following steps:Create a directory, /usr/share/fonts/local/, if it does not already exist.
    • Add the directory created in the first step to the Xfs FontPath as root directory.Copy the new font files to the /usr/share/fonts/local directory.Update the font information of the system.Change to the /usr/share/fonts/local directory.Restart Xfs so that the X clients can use the new fonts.c. To add fonts, Steve needs to perform the following steps:Create a directory, /usr/share/fonts/local/, if it does not already exist.Copy the new font files to the /usr/share/fonts/local directory.Change to the /usr/share/fonts/local directory.Update the font information of the system.Execute the chkfontpath command to add the directory, /usr/share/fonts/local/ to the XfsFontPath as root directory.Restart Xfs so that the X clients can use the new fonts.d. To add fonts, Steve needs to perform the following steps:Create a directory, /usr/share/fonts/local/, if it does not already exist.Add the directory created in the first step to the Xfs FontPath as root directory.Change to the /usr/share/fonts/local directory.Copy the new font files to the /usr/share/fonts/local directory.Update the font information of the system.Restart Xfs so that the X clients can use the new fonts.Correct Answer: -> c20/ Steve is working as a system administrator at the Smart Software Developers. Thecompany has 50 client computers and one Linux server on the network. Steve updates theLinux server regularly by installing Linux patches. He checks the boot directory each time,to obtain the kernel information and to make sure that the Linux patches are compatiblewith the kernel version. To avoid searching the boot directory for obtaining the kernelinformation, Steve wants to display this information at the login prompt. How should Stevedisplay the information on the login prompt?a. Edit the rc.sysinit file to reflect the kernel information at the login promptb. Edit the rc.serial to reflect the kernel information at the login promptc. Edit the rc.local to reflect the kernel information at the login promptd. Edit the rc.news to reflect the kernel information at the login promptCorrect Answer: -> c21/ Jim Lewis a system administrator at Deez Inc. is working on Linux platform. All theemployees of the application development department are working on critical projects.Therefore, regular backup is required to save the data of the developers. Jim is assignedthe task of taking weekly backup of data. After taking the backup of files, Jim wants todisplay the list of files, which have been backed up. Which of the following commandshould Jim execute to display the list of files?a. Execute the tar –x commandb. Execute the tar –c commandc. Execute the tar –v commandd. Execute the tar –p commandCorrect Answer: -> c22/ Steve installs kernel of version 2.2 on his computer. After the installation, he noticesthat one of the devices is not supported by this version of the kernel. Steve upgrades thekernel from version 2.2 to 2.4 to get support for that device. However, after installation ofthe kernel of version 2.d. Steve is unable reboot the computer. Why is Jim not able toboot the computer and how should he solve the problem?a. The kernel of version 2.4 has not overwritten the kernel of version 2.2.Jim needs to boot the system in the single-user mode by using a floppy disk or a CD-ROMto resolve the problem.b. The kernel of version 2.4 has not overwritten the kernel of version 2.b. but it is copied
    • in the /root directory.Jim needs to boot the system in the rescue mode by using a floppy disk or a CD-ROM toresolve the problem.c. The kernel of version 2.4 has overwritten the kernel of version 2.2 and the boot loaderconfiguration file is not updated accordingly.Jim needs to boot the system in the rescue mode by using a floppy disk or a CD-ROM toresolve the problem.d. The kernel of version 2.4 has not overwritten the kernel of version 2.2 and the newlycompiled kernel, bzImage, is copied in the /boot directory and the boot loaderconfiguration file is updated accordingly.Jim needs to boot the system in the multiuser mode by using a floppy disk or a CD-ROMto resolve the problem.Correct Answer: -> c23/ Jim Lewis wants to create a filesystem so that he can access other filesystems from aremote computer containing Linux operating system. Which type of filesystem should Jimcreate?a. ReiserFSb. Journaled File Systemc. NFSd. SMBFSCorrect Answer: -> c24/ Steve Irving is working as a system administrator at Super Graphics. A new user,Michael joins Super Graphics as a software developer. Steve needs to share a filesystemto enable Michael to access data from his computer. Steve has to opt for the type offilesystem, which would enable Michael to access the filesystem from a remote computerrunning on Windows NT Server operating system. Which type of filesystem can Stevecreate?a. SMBFSb. NFSc. JFSd. ReiserFSCorrect Answer: -> a25/ David Johnson is working as a system administrator with Super Graphics. Theemployees of the organization use OpenOffice.Draw package of Linux to create graphicaldesigns. Jerry Smith, working as an audio-visual expert observes that his computer doesnot produce good quality sound. Therefore, she asks David to change the soundcard ofher computer. David inserts a new sound card on Jerrys computer and downloads themodule for the sound card, through the Internet from the vendors Web site. Now, Davidwants to install the module for the sound card in the kernel of Jerrys computer. However,David wants to load the module for the sound card in the kernel even if the current kernelversion installed in the computer and the version of the kernel for which the module iscreated are not same. Which command should David use to perform the given task?a. insmod -o [module_name]b. insmod –s [module_name]c. insmod -f [module_name]d. insmod -p [module_name]Correct Answer: -> c26/ John requires some data from a file stored in a directory on a floppy disk. Hiscomputer has Linux operating system. After finishing his work, John unmounts the floppydisk. For this, he executes the umount command as shown below:# umount /dev/fd0However, the system displays an error message, “Device is busy”. Which of the following
    • steps will help John identify and solve the problem?a. Determine the current directory. If the current directory is located on the floppy disk,change to a directory that is not located on the floppy disk. Unmount the floppy diskb. Determine the current directory. Execute the rm –r command to delete the directory onthe floppy. Unmount the floppy diskc. Determine the current directory. Delete the file on the floppy. Unmount the floppy disk.d. Determine the current directory. Execute the rm --r command to delete the directory onthe floppy. Unmount the floppy diskCorrect Answer: -> a27/ Debbie Howe, an employee of SuperGraphics needs to access the file containing thedaily schedule information of the project on which he is working. This file is located on thecomputer of Ken Bruton, the team leader at the company.Ken had the dual operating system, Windows 2000 and Linux installed on his computer.The file was created on Windows 2000. As the Windows 2000 Server has crashed on Ken’scomputer, he boots the computer using Linux. Ken tries to mount the file from Windows2000 to Linux using the mount command. The system generates an error displaying,‘Virtual File Allocation table (VFAT) file system is not supported’. Ken informs the systemadministrator about the problem. What could be the cause of the error?a. Ken does not have the read permissions for the files, which he wants to access.b. Linux does not have the necessary modules required to support the Windowsfilesystems.c. The file that Ken is trying to access is not exported by the system in which it is stored.d. Another filesystem is mounted on the same mount point as that of the filesystem, whichKen wants to access.Correct Answer: -> b28/ You are working as a system administrator at Global Systems Inc. You need to createan alternate file hierarchy in the /etc/sysconfig/networking directory on the server, whichis using ISDN network interface. Which command will you run to perform this task?a. ifconfigb. neatc. mii-toold. netconfigCorrect Answer: -> b29/ Chris is working as an assistant system administrator at Multi Store Inc. Chris findsthat Sendmail and IMAP services are not functioning properly. Which of the following logfiles should Chris check to find out the errors that are logged?a. Check the entries in the /var/log/message log file.b. Check the entries in the /var/log/maillog log file.c. Check the entries in the /var/log/htpd log file.d. Check the entries in the /var/log/samba log file.Correct Answer: -> b30/ Which of the following files contain the information about the system memory that iscurrently in use?a. /system/meminfob. /proc/memoryinfoc. /proc/cpuinfod. /proc/meminfoCorrect Answer: -> d31/ Pat Greene is working as system administrator at Safest Software Inc. Pat is requiredto monitor the systems of the company to administer the network resources efficiently inthe Linux environment. For this, Pat needs information about the processes, memory,
    • paging, block IO, traps, and CPU activity of the computers. In addition, he also needs todisplay an updated report on the virtual memory statistics. How should Pat accomplish thegiven task?a. He needs to run the following command:# vmstat <delay>b. He needs to run the following command:# iostat –vc. He needs to run the following command:# iostat –dd. He needs to run the following command:# vmstat –nCorrect Answer: -> a32/ Ken Burton is working as system administrator at Indestructible Boxes Inc. Peter, anemployee of the company complains to Ken about the slow processing speed of hiscomputer. For this, Ken decides to create a swap space named /dev/hdc9 on his computerto increase the available amount of RAM. After creating and activating the swap space,Ken restarts the computer. Ken notices that processing speed of the computer has stillnot increased. What task should Ken perform to solve the given problem?a. Ken needs to edit the /etc/fstab file, and add the following entry to activate the swapspace, as follows:/dev/hdc9 swap swap defaults 00b. Ken needs to edit the /etc/fstab file, and the following entry to activate the swap space,as follows:/dev/hdc9 swap ext3 defaults 00c. Ken needs to edit the /etc/fstab file, and add the following entry to activate the swapspace, as follows:/dev/hdc9 swap ext3 defaults 11d. Ken needs to edit the /etc/fstab file, and add the following entry to activate the swapspace, as follows:/dev/hdc9 swap swap defaults 11Correct Answer: -> a33/ Steve is working as a system administrator at Smart Software Developers. Thecompany has 50 client computers and one Linux server on the network. The company hasopened a new branch at Houston for the Finance department. The management asks Steveto create a file system that prevents the data loss in case of a power failure or a systembreakdown. Therefore, Steve creates the ext3 filesystem on the /dev/hdc8 partition of theLinux server. After a few months, Steve decides to resize the partition due to some diskspace constraints. Steve uses the resize2fs disk utility to resize the partition. However,Steve fails to resize the partition. What could be the cause of the problem?a. Steve has not updated the /etc/fstab file to change the ext3 filesystem to the ext2filesystem.b. The ext3 filesystem cannot be converted into ext2 filesystem so resize2fs utility cannotbe used.c. The ext3 supports only tune2fs command to resize the partition.d. The ext3 file system does not support the resize2fs disk utility.Correct Answer: -> d34/ Debbie Howe is working as a system administrator with True Travel Services. Theorganization uses a network printer across all departments. However, recently the printeris not working properly. Debbie has been communicated reports that on accessing theprinter, it displays an error message:bash: /dev/lp0: Permission denied.How should Debbie troubleshoot the problem?a. Debbie needs to provide access control to enable the users of the remote hosts to print
    • to the printer by performing the following steps:Open the /etc/hosts file.Add the IP addresses of the remote hosts.Stop and restart the print service.b. Debbie needs to provide access control to enable the users of the remote hosts to printto the printer by performing the following steps:Open the /etc/host.deny file.Add the IP addresses of the remote hosts.Stop and restart the print service.c. Debbie needs to provide access control to enable the users of the remote hosts to printto the printer by performing the following steps:Open the /etc/printcap file.Add the IP addresses of the remote hosts.Stop and restart the print service.d. Debbie needs to provide access control to enable the users of the remote hosts to printto the printer by performing the following steps:Open the /etc/hosts.equiv file.Add the IP addresses of the remote hosts.Stop and restart the print service.Correct Answer: -> d35/ Tom Wilkins is the system administrator at Red Sky IT Systems that uses Linux for allbusiness purposes. Tom has implemented a Linux based LAN in the organization and hasinstalled a print server on the LAN. He has also installed the LPRng service on the printserver. The employees of all the departments use the print server to print their documents.They submit their print jobs using the lpr command. However, the employees of theAccounts department complain that the printer is taking a long time to print thedocuments. The employees request Tom to restrict the print commands given by the otherdepartments until the Accounts documents have been printed. How should Tom resolvethe problem?a. Execute the lpc –disable command.b. Edit the /etc/lpd.conf file.c. Execute the lpc – abort commandd. Edit the /etc/printcap file.Correct Answer: -> c36/ Steve is assigned the task of installing Linux on a computer on which Windows 98 isalready installed. He does not have the bootable Linux CD-ROM. Which type of installationmethod would Steve prefer to install Linux?a. Use an FTP Serverb. Use the Hard Drivec. Use an HTTP Serverd. Use a CD-ROMCorrect Answer: -> b37/ John is recently recruited as a software developer in Smart Software Developers. Hehas been assigned the task of developing an accounting application. For this, Johnrequires accounting package software for his computer. Chris, the system administrator atSmart Software Developers, has been assigned the task for installing the software onChris’s computer. For this, Chris wants information about the directory that containsinitialization scripts related to the installed software packages. Which directory will Chrisuse to perform this task?a. /etc/profile.db. /etc/bashrcc. ~/.bash_profiled. /etc/profile
    • Correct Answer: -> a38/ Jim Lewis is working as a system administrator with New Tech Books. The networksetup of the organization is based on Linux. Jim has recently installed and configured aLinux server at a remote location. He has also created user accounts for all the employeesof the organization on the remote server. Diane Frye, the head of the Sales department iscreating the annual sales report of the organization. Diane has created a folder,Sales_Report, in her home directory and placed all the files related to the annual salesreport of the organization in that folder. Diane has also assigned all the access permissionto the files that she has created and asked the members of her department to access thefiles from the Sales_Report folder. After one week, Diane finds that someone has removedsome files from the Sales_Report folder. However, Diane does not want to change theaccess permission on the files. Therefore, Diane reports the matter to Jim and asks Jim toset such permissions on the Sales_Report folder so that no other users except her orsystem administrator, can remove any files from the folder. What should Jim do to performthe task?a. Set setUID bit permission on the Sales_Report directory by using the command, chownu+s Sales_Report.b. Enable sticky bit permission on the Sales_Report directory by using the command,chmod +t Sales_Report.c. Set setGID bit permission on the Sales_Report directory by using the command, chowng+s Sales_Report.d. Remove setUID bit permission on the Sales_Report directory by using the command,chmod u–s Sales_Report.Correct Answer: -> b39/ Tom Wilkins works as a network administrator at Supersoft2000. The employees of theorganization use Linux platform to work on their projects. Tom installs DHCP server on thenetwork to assign IP addresses to the client computers. Jim Lewis, an employee ofSupersoft2000 needs to check the IP addresses assigned to his computer. For this, Jimexecutes the ifconfig command. However, the command does not show the IP addressesof his computer. Jim informs Tom about the problem and asks him to resolve it. How canTom troubleshoot the problem?a. Configure the /etc/dhcpd.conf file and restart dhcpcd daemon.b. Execute the command,route add –host 255.255.255.255 dev eth0c. Execute the dhcpcd command with the –f option.d. Check all the DHCP servers on the network, including any Microsoft Windows DHCPserver that might have assigned the IP addresses to Jim’s computers.Correct Answer: -> a40/ Corrine Wallace is working as an IT consultant at Blue Moon Computers. Theorganization is planning to implement an IT infrastructure. The management of theorganization notices that organization requires servers at every level of businessoperations to implement IT infrastructure. Therefore, organization assigns Corrine the taskof planning server solutions for business operations, such as caching services and proxyservices. The organization also asks Corrine to plan server solutions for domain naming,directory, firewall and security services. In addition, the organization asks Corrine toimplement servers that can effectively provide services to end users in spite of the heavyload on it. Which servers Corrine need to implement to perform the task?a. Corrine needs to implement web and infrastructure servers. In addition, Corrine needsto implement high-end servers, such as OLTP Med and BI servers.b. Corrine needs to implement workgroup and infrastructure servers.c. Corrine needs to implement web and workgroup servers.d. Corrine needs to implement web and infrastructure servers.Correct Answer: -> a
    • 41/ Pat Wilkins is working as an assistant system administrator at New Tech Bookstore.Pat wants to check whether IP forwarding is disabled or enabled on the Linux server.Which command will Pat execute to perform the given task?a. # ls /proc/sys/net/ipv4b. # vi /etc/sysctl.confc. # echo "1" > /proc/sys/net/ipv4/ip_forwardd. # cat /proc/sys/net/ipv4/ip_forwardCorrect Answer: -> d42/ Lee is a system administrator at Countrywide Markets. John a software developerwants a package to be installed on his computer. John asks Lee to install the requiredpackage on his computer. However, when Lee starts installing the package, the systemdisplays a message that the package is already installed. Which command can Lee use toupgrade the package?a. rpm -eb. rpm -hc. rpm -Id. rpm -FCorrect Answer: -> d43/ Bob is working, as an assistant system administrator at Global Systems Inc. Bobwants to invoke the services that a kernel provides for various processes running on acomputer, such as reading the contents of a file. Which kernel module, Bob should use toperform the above task?a. Device driverb. System callc. Network Driverd. Executable InterpreterCorrect Answer: -> b44/ Larry Williams is working as network administrator at Smart Software Developers.Recently, the organization has been facing frequent power failures. To protect the data,the domain administrator of the organization wants Larry to backups all the servers of thecompany daily at 6:00 P.M. The domain administrator wants Larry to automate theprocess. How should Larry automate the process of backing up?a. Use /etc/at.allow configuration fileb. Use /etc/crontab file configuration filec. Use /etc/cron.daily configuration filed. Use /etc/at.deny files configuration fileCorrect Answer: -> b45/ Donna Johnson is working as system administrator at New Tech Books. Theemployees of the New Tech Books have the ext2 filesystem implemented on the partition /dev/hdc8 on their systems. They need to access NFS server for sharing and storing theirdata. However, NFS server has the ext3 filesystem configured on it. Therefore, Steveneeds to make the ext2 filesystem compatible with the ext3 fileystem. How should Donnatroubleshoot the given problem?a. To convert the ext2 filesystem into the ext3 filesystem, Donna needs to perform thefollowing steps: 1. # /sbin/tune2fs -j /dev/hdc8 ( 2. # /sbin/e2fsck -y /dev/hdc8 ( 3. Mount the ext3 filesystem if there are no errors by using _ the followingcommand: # mount –t ext3 /dev/hdc8 /mnt/NewPartition ( 4. Update the filesystem type option in the /etc/fstab file to _ automount the
    • filesystem after the system is restarted.b. To convert the ext2 filesystem into the ext3 filesystem, Donna needs to perform thefollowing steps: 1. # /sbin/e2fsck -y /dev/hdc8 ( 2. # /sbin/tune2fs -j /dev/hdc8 ( 3. Mount the ext3 filesystem if there are no errors by using _ the followingcommand: # mount –t ext3 /dev/hdc8 /mnt/NewPartition ( 4. Update the filesystem type option in the /etc/fstab file to _ automount thefilesystem after the system is restarted.c. To convert the ext2 filesystem into the ext3 filesystem, Donna needs to perform thefollowing steps: 1. # /sbin/e2fsck -y /dev/hdc8 ( 2. # /sbin/tune2fs -j /dev/hdc8 ( 3. Update the filesystem type option in the /etc/fstab file to _ automount thefilesystem after the system is restarted. 4. Log on as the root user and mount the partition, which _ contains the ext2filesystem as follows: # mount /dev/hdc8 (d. To convert the ext2 filesystem into the ext3 filesystem, Donna needs to perform thefollowing steps: 1. # /sbin/e2fsck -y /dev/hdc8 ( 2. # /sbin/tune2fs -j /dev/hdc8 ( 3. Update the filesystem type option in the /etc/fstab file to _ automount thefilesystem after the system is restarted. 4. Log on as the root user and unmount the partition, which _ contains the ext2filesystem as follows: # umount /dev/hdc8 (Correct Answer: -> a46/ Safest Software Inc. is a leading software export organization that has opened a newbranch office at Singapore to expand their business in Asia Pacific. The branch office has150 client computers and three servers on their network based on Linux operating system.Steve is appointed as a system administrator at the branch office. All the clients areworking in the desired runlevel to support the applications used by the organization. Theorganization has to export software that requires the multimedia-enabled computers. Thesoftware needs to be tested on Linux computers before exporting it. John, a testingengineer is assigned the task of testing the multimedia application, but he is unable toopen that application. John asks Steve to solve the problem. How should Steve solve theproblem?a. Steve should set the default runlevel to 1 to start the Linux server in graphical mode.b. Steve should set the default runlevel to 5 to start the Linux server in graphical mode.c. Steve should set the default runlevel to 6 to start the Linux server in graphical mode.d. Steve should set the default runlevel to 4 to start the Linux server in graphical mode.Correct Answer: -> b47/ Christine Turner needs to send an important file to Mary Peterson, who is working atthe head office. For this, the system administrator needs to configure a route so that thefile can be transferred to Mary’s computer, with the IP address 192.165.0.150However, on executing the command, the computer displays an error stating gbroadcast:Unknown host.How should the system administrator troubleshoot the error?a. The system administrator needs to add the name of the host in the /etc/hosts file:192.168.0.130 gbroadcastNext, Christine needs to execute the following command:# route add –net gbroadcast dev eth0
    • b. The system administrator needs to add the name of the host in the /etc/hosts file:192.165.0.150 gbroadcastNext, Christine needs to execute the following command:# route add –net gbroadcast dev eth0c. The system administrator needs to add the name of the host in the /etc/hosts file:192.165.0.150 broadcastNext, Christine needs to execute the following command:# route add –host gbroadcast dev eth0d. The system administrator needs to add the name of the host in the /etc/hosts file:192.165.0.150 gbroadcastNext, Christine needs to execute the following command again:# route add –host gbroadcast dev eth0 (Correct Answer: -> d48/ Jim Lewis is the system administrator with Desktop Computers. He has configured aLinux based LAN in the organization and has installed a print server on the network. Jimhas configured both LPRng and CUPS services on the print server to manage multiplepackages that provide the same service. He needs to add a group of alternatives to thesystem and specify the name of a master link. For this, Jim executes the alternatives link --set command, and observes that the command is not working. What could be the problemand what should Jim do to resolve the problem?a. The set option is used only to set alternatives and its links. Jim needs to execute thealternatives name --install command to perform the required tasks.b. The set option is used only to set alternatives and its links. Jim needs to execute thealternatives link --install command to perform the required tasks.c. The link option is incorrect. Jim needs to execute the alternatives name –set commandto perform the required tasks.d. The specified command is incorrect. Jim needs to execute the alternatives name--display command to perform the required tasks.Correct Answer: -> a49/ Pat Greene is working as a system administrator at IBG Inc. Pat has created a partitionin his system to develop and save the application. The maximum file size of 2 GB issufficient for Pat to perform his work. The filesystem that he will be using, stores the stateof the filesystem in the superblock, and uses this state to verify whether the filesystemcontains any errors. Pat needs journaling feature in the filesystem to ensure no data is lostdue to system failure. Therefore, Pat wants to create the filesystem that supports theabove features. Which filesystem can Pat use to develop the application?a. ext2Fsb. ext3c. JFSd. SMBFSCorrect Answer: -> b50/ Smart Solutions Corp is recruiting new employees to expand their customer base. Anew employee, Michael joins the organization and is assigned a project that was earlierbeing handled by Susan. Steve, the system administrator, has changed the ownership offiles that contains the required information and set the particular option so that no errormessage is displayed, if the specified file does not exist at user end. Which commandshould Steve use for the task?a. chown –Rb. chown -fc. chown -vd. chown -cCorrect Answer: -> b
    • 51/ Martina is working as a system administrator in PQR Corp. Martina finds that some ofthe computers are displaying an error message, lp: error –no default destination available,while giving the command for printing the documents. Which task should Martina performto troubleshoot this problem?a. Remove the paper that is stuck in the printer.b. Insert fresh paper in the tray.c. Switch on the power supply after checking that the plug is in the socket.d. Install and configure the printer.Correct Answer: -> d52/ Donna Bard, a system administrator with Countryside Markets, uses Linux as theoperating system. She wants to view the group ID of a customer named Mike Womack.When Donna executes the command, grep Mike Womack /etc/passwd, the system raisesan error stating “grep: Wall: no such file or directory” before displaying the requiredinformation. How should Donna troubleshoot the problem?a. # grep ‘Mike Womack’ /etc/passwdb. # grep MikeWommack /etc/passwdc. # grep "Mike Womack" /etc/passwdd. # grep `Mike Womack` /etc/passwdCorrect Answer: -> c53/ Donna Bard works as a network administrator at Countryside Markets. All theemployees of the organization work on Linux platform. Various DHCP servers, whichassign IP addresses to the computers, are installed on the network. Donna configures thedhcpcd daemon, which broadcasts the request to the DHCP servers to get an IP address.After configuring the daemon, Donna starts her computer. However, Donna notices thatthe IP address is not assigned to her computer. Donna verifies whether the dhcpcddaemon is running properly or not. She finds that the dhcpcd daemon is running fine. Howcan Donna troubleshoot the problem?a. Execute the command:route add –host 255.255.255.255 dev eth0b. Check whether the information in the /etc/dhcpd.conf file is correct.c. Execute the dhcpcd command with the –r option.d. Execute the dhcpcd command with the –f option.Correct Answer: -> d54/ Nancy Jones is working as a system administrator with Red Sky IT Systems. Thenetwork setup of the organization is based on Linux. All employees of the organizationsave data in their respective home directory on the Linux server. The management of theorganization has assigned Nancy the task of taking the backup. Therefore, Nancyconfigures a central backup server with multiple backup tape drives. Nancy also wants tocreate the backup from all the disks listed in the disklist file in the backup server using asingle command. In addition, Nancy wants the backup server to send an e-mail messagereporting the files that failed to be backed up and the files that were successfully backedup after creating the backup. Which backup utility should Nancy implement to perform therequired task?a. Nancy should use the Amanda utility.b. Nancy should use the Veritas utility.c. Nancy should use the dump/restore utilities.d. Nancy should use the cpio utility.Correct Answer: -> a55/ Donna is an in-house network administrator at Multi Marketing Inc. Donna needs tostore the print queue definitions manually, instead of using the redhat-config-printer tool.Which configuration file will Donna use to perform this task?a. /etc/printcap
    • b. /etc/lpd.confc. /etc/lpd.permsd. /etc/printcap.localCorrect Answer: -> d56/ Consider the following statements:Statement A: You can assign more then one IP address to an NIC.Statement B: You need to create a new configuration file for each NIC that is installed onyour computer.Which of the following is true, with respect to the above statements?a. Statement A is true and statement B is false.b. Statement A is false and statement B is true.c. Both, statements A and B, are true.d. Both, statements A and B, are false.Correct Answer: -> c57/ Consider the statements:Statement A: The passwords should be easy to decipher.Statement B: The passwords should be of adequate length.Which of the following is true, with respect to the above statements?a. Statement A is true and statement B is false.b. Statement A is false and statement B is true.c. Both, statements A and B, are true.d. Both, statements A and B, are false.Correct Answer: -> b58/ You are the assistant system administrator at Deez Inc. and are required to set adefault printer, HP DeskJet on the Sales Manager’s computer. The printer should beconfigured to queue the print jobs. Which command should you use for the above task?a. lpadminb. lpstatc. lpd. lprCorrect Answer: -> a59/ Peter Irvin is the domain administrator at Mountain Marketing Inc. He has scheduledtasks such as, executing scripts, backing up data and executing the echo command on hiscomputer, such that they are performed automatically at different timings in a day. Duringthe day, how should Peter view the list of the jobs that are yet to be executed?a. atq commandb. at commandc. cron commandd. atrm commandCorrect Answer: -> a60/ Larry Williams is working as domain administrator at Technology Systems. Toautomate the installation process, Larry has installed Linux on his computer with the helpof the kickstart file. Larry needs to install three group packages ServerSystem,WindowsSystem, and WindowsSoftware and two individual packages ClientSystem andMasterSystem on his computer. How should Larry perform the task?a. Larry needs to make the following entries in the kickstart file:### Package Installation%package@ServerSystem@WindowsSystem@WindowsSoftware
    • ClientSystemMasterSystemb. Larry needs to make the following entries in the kickstart file:### Package Installation%package@ ServerSystemWindowsSystemWindowsSoftwareClientSystemMasterSystemc. He needs to make the following entries in the kickstart file:### Package Installation%package@ ClientSystem@ MasterSystemServerSystemWindowsSystemWindowsSoftwared. He needs to make the following entries in the kickstart file:### Package Installation%package@ ServerSystem@ WindowsSystem@ WindowsSoftwareClientSystemMasterSystemCorrect Answer: -> d61/ Steve Irving is working as the system administrator at Global Systems Inc., which usesLinux for all business purposes. The organization is working on a project, which requiresthe team leaders to frequently communicate with each other and with the client. The e-mailutility is not supported efficiently by the existing operating system. Therefore, themanagement has asked Steve to upgrade the operating system installed on the computersof all the team leaders. Steve has decided to perform this task automatically using akickstart file.Steve logs on to Jim, a team leader’s system and executes the command cp anaconda –ks.cfg ks.cfg to create a kickstart file. However, the command is not working. What is theproblem and how can Steve solve it?a. The specified root directory is incorrect. Steve should use the name, ethereal, as theroot directory.b. The kickstart command can be created only by a root user. Steve needs to log on as theroot user and execute the specified command.c. The command executed is incorrect. Steve needs to use the Kickstart Configuratorutility to create the kickstart file.d. The order of specifying the kickstart sections is incorrect. The order of kickstartsections should be command, %pre, %package, and %post.Correct Answer: -> b62/ The project team of the Software Development department is not able to save theirwork on the server. When they try to save their work on the server, it shows an errormessage that there is no space on the hard disk. Therefore, David, the systemadministrator resizes a partition on the hard disk of the server, which has been allocatedfor user data. After resizing the partition, when David tries to boot the server he finds thatthe boot partition fails to mount the boot partition.What is the reason that the boot partition, on the server, fails to mount the boot partitionand how should David resolve the error?
    • a. The problem occurs because the partition number of the boot partition, /, is changed.To resolve the error, David needs to switch to the single-user mode and change the entrycorresponding to the path of the / partition in the /etc/fstab file.b. The problem occurs because the partition number of the boot partition, /, is changed.To resolve the error, David needs to switch to the emergency mode and change the entrycorresponding to the path of the / partition in the /etc/fstab file.c. The problem occurs because the partition number of the boot partition, /, is changed.To resolve the error, David needs to reboot the system in a runlevel and change the entrycorresponding to the path of the / partition in the /etc/fstab file.d. The problem occurs because the partition number of the boot partition, /, is changed.To resolve the error, David needs to boot the system in the rescue mode and change theentry corresponding to the path of the / partition in the /etc/fstab file.Correct Answer: -> d63/ Steve is the system administrator with Red Sky IT Systems. The management of theorganization has assigned Steve the task of providing print service to some of theemployees of the organization. The employees of the IT department and the Accountsdepartment, at Red Sky IT Systems, want to install printers, locally. Steve decides to installthe various printers and configure them using the CUPS daemon to fulfill the requirementsof both the departments. Steve also wants to record the information about all the localavailable printers in both the departments and the new jobs given to the printers. How canSteve perform these tasks?a. Steve can record the information by using the lpstat command, editing the/etc/printcap.local file and then executing the lpadmin command.b. Steve can record the information by using the lpstat command and editing the Infoparameter and the Accepting parameter in the /etc/cups/printers.conf file.c. Steve can record the information by using the lpstat command and configuring theLPRng service.d. Steve can record the information by using the lpstat command and editing the Infoparameter and the Accepting parameter in the /etc/cups/cupsd.conf file.Correct Answer: -> b64/ Consider the statements:Statement A: A parallel port sends one bit of information at a time.Statement B: A serial port sends eight bits of information at a time.Which of the following statements is correct?a. Statement A is true and statement B is false.b. Statement A is false and statement B is true.c. Both, statements A and B, are true.d. Both, statements A and B, are false.Correct Answer: -> d65/ Steve works, as a system administrator at Global Systems Inc. Steve needs to store thedata of all the employees centrally at the Linux server. He also wants to ensure that nodata is duplicated across the hard disks. For this, Steve decides to divide the data intostrips to store the data across all the hard disks in an array. Which RAID configurationdoes Steve use for the preceding requirements?a. Linear RAIDb. Level 0c. Level 1d. Level 5Correct Answer: -> b66/ Chris, the system administrator of the company adds a route from his computer toJohn’s computer by executing the route add –host 192.168.16.66 dev eth0 command.Chris’s computer raises an error, 192.168.16.66: Unknown host. Which of the following
    • task should Chris perform to solve this problem?a. Add the name of the host in the /etc/hosts file of the computer.b. Check all the DHCP servers in the network.c. Add the dhcpcd daemon to the boot-up script, (/etc/sysconfig/network-scripts/ifup)d. Execute the dhcpcd command with the –f option.Correct Answer: -> a67/ Ronald Billing works as a system administrator at Mastery Mechanics. Theorganization has installed a network printer, which is used by various systems over thenetwork for printing the documents related to various projects. The printer is not workingproperly since last couple of days. Therefore, Ronald replaces the printer with a new one,configures it and starts the print service. However, when John, an employee of theorganization uses the printer, a problem occurs. The printer shows a staircase effect. Johninforms Ronald about the problem. How can Ronald troubleshoot the problem that occurswhile printing the documents?a. 1. Open the /etc/hosts.equiv or the /etc/hosts.lpd file.2. Stop and restart the print service.b. 1. Open the /etc/hosts.equiv or the /etc/hosts.lpd file. 2. Add the IP addresses of the remote hosts.3. Stop and restart the print service.c. 1. In the printtool utility, edit printer entry and click on Select _ button to open theConfigure Filter dialog box.2. Select the correct driver for your printer.d. 1. In the printtool utility, edit printer entry and click on select _ button to open theConfigure Filter dialog box.2. Select the Fix stair-stepping text option under the Printing _ Options section.Correct Answer: -> d68/ Jim Wilkins is working as a storage administrator at Blue Moon Computers. Jimimplements Integrated Device Electronics (IDE) to determine the physical limits of thestorage scalability in the organization. However, the organization wants Jim to extend asystem’s local storage beyond the limitations of IDE. Which of the following Jim canimplement to perform the task?a. Fibre Channel–based storageb. SCSIc. iSCSIa. a and b bothb. Only ac. Only bd. a and c bothCorrect Answer: -> d69/ Steve Irvin is working as an IT consultant at Red Eye Experts. The organizationconsists of 5000 desktops running on multiple platforms, such as Linux and Windows, andconnected through LAN and WAN. Steve needs to identify a tool to automate andcentralize the management of desktops in the organization. He also needs to identify a toolthat can implement policy-based management of desktops in the organization. Which toolshould Steve select for this?a. WebTMAb. Unicenter’s Desktop Management Solutionc. Radmind. PMP 6.0Correct Answer: -> b70/ Which of the following activity should be performed to manage VPNs in an enterprise?a. Use a secure remote syslog server to make it difficult for the malicious user to
    • manipulate the log.b. Enforce strong authentication based on the volume of remote users and value of theresources that are being accessed.c. Use biometrics mechanisms to protect IT infrastructure from thefts or unauthorizedattacks.d. Ensure that all executable files, which you receive in the organization through e-mail,are checked and approved.Correct Answer: -> b71/ Donna Johnson is working as an IT Consultant in Super Software 2000. Super Software2000 is a large organization, which is spread across many countries and functions throughdistributed network system. Donna is getting complaints regarding performance problemsin Internet, intranet, and extranet resources of the organization. Which of the following toolor solution should Donna use to monitor and troubleshoot LAN, WAN, and VLANs?a. HP OpenView Network Management Solutionb. Unicenter Network Management Solutionc. Observer 10.1d. LANBrowser 1.3Correct Answer: -> b72/ Jim Lewis is working as a system administrator at Good Graphics Inc. Jim wants touse a multi-platform security management solution that can provide plug-in-integrationbetween the security tool and the solution to collect the alerts. Which one of the followingsolution should Jim use to perform the required task?a. HP OpenView Security Management Solutionb. IBM Tivoli Security Compliance Managerc. LANBrowser 1.3d. WebScout 2.1Correct Answer: -> a73/ Red Eye Systems Inc. is a software development company. The company is planning anew software development facility in Arizona. This facility will develop system software inC/C++ on UNIX platform. Because this is a new project the company does not want toinvest heavily in computing resources. In addition, the development process does notrequire too many resource consuming tools, except for C/C++ compilers, CLI debuggingand testing tools and UNIX platform. The programmers will not be allowed to share filesand folders as the code will be integrated in the next step of the SDLC. Which of thefollowing computing model would you suggest to the company as a networkingconsultant?a. Centralized network computing model with thin clientsb. Centralized network computing model with thick clientsc. Distributed network computing model with thick clientsd. Collaborative network computing modelCorrect Answer: -> a74/ Which of the following can be termed as necessary services?a. Services that must be available at peak loadb. Services essential to operationc. Services that must be available, but can be available at reduced performance.d. Services that can be postponed indefinitelyCorrect Answer: -> c75/ Consider the following statements:Statement A: Optional services are the services that must be available at peak load.Statement B: Integrity requirements of QoS maintain the definiteness of the interactionbetween the server and the user.
    • Which of the following is correct?a. Both, statement A and B are trueb. Statement A is true and statement B is falsec. Statement A is false and statement B is trued. Both, statement A and B are falseCorrect Answer: -> c76/ Donna Johnson is working as an IT consultant at Red Eye Experts. The organizationneeds to implement effective server solutions to increase employee productivity andreduce operating costs. Donna is assigned the task of implementing servers that canhandle the services running in the HPC layer of the server deployment architecture of theorganization. The organization also asks Donna to implement servers for file and printingservices. Which servers Donna will implement to perform the task?a. Donna needs to implement high-end servers, such as OLTP Med and BI servers.b. Donna needs to implement infrastructure servers.c. Donna needs to implement servers that have large memory, can store very large datasets, and can take load of high transaction volumes, such as ERP Large servers, OLTPLarge servers. In addition, Donna needs to implement workgroup servers.d. Donna needs to implement high-end servers, such as HPC servers and OLTP large.Correct Answer: -> c77/ Which of the following is caused by variations in queue length and the processing timeneeded to reorder packets arrived out of order due to travelling over different paths?a. Jitterb. Throughputc. Availabilityd. Packet lossCorrect Answer: -> a78/ Mike Womack is working as a storage administrator at Red Eye Experts. Mike isassigned the task of selecting an efficient storage technology for the organization thatsuits its requirements. The organization wants Mike to select a storage technology thatcan enable multiple users to share the same storage space thus minimizing the overalloverheads by centrally managing hard disks. Which storage technology Mike shouldselect to perform the assigned task?a. Redundant Array of Inexpensive Disksb. Tape Drivesc. Storage Area Networksd. Network-Attached StorageCorrect Answer: -> d79/ Larry Williams is working as a network administrator in Blue Valley Consulting. Larry isassigned the task of selecting an appropriate network technology in the enterprise. Larryneeds to set up networks within a building of the enterprise. Therefore, Larry chooses LANtechnology to be implemented in the building. Larry observes that there are too manycomputers, which are required to be attached to LAN. Therefore, Larry needs a technologythat reduces the number of data packet collisions and can deliver up to 80 percent of themaximum bandwidth available. In addition, Larry needs to decide the physical media thathave multiple pairs of wires to connect the computers and reduces network crosstalk bynegating the electro-magnetic field. Which of the following combination should Larrychoose to perform the required task?a. Token ring and Coaxial cablesb. Ethernet and Coaxial cablesc. Token ring and Twisted pair cablesd. FDDI and Fiber optic cablesCorrect Answer: -> c
    • 80/ Global Systems Inc. is a software development organization with its three branchoffices in different parts of America. John Wilkins is working as system administrator atthe head office of the organization at Los Angeles. The employees working at the branchoffices complain to John about the poor performance of the FTP server placed at thebranch office at New York. To solve the problem, John needs to remotely monitor the CPU,disk, and memory usage of the server. Which tool should John implement to perform thetask?a. PMP 6.0b. Radminc. Symantec ON iPatchd. PCDuo EnterpriseCorrect Answer: -> a81/ Which of the following activity should be performed to manage internet access of anenterprise for security?a. Keep track of who has accessed information each time a device connects to the LAN.b. Keep the version of the operating system updated.c. Block the file types such as EXE, COM, BAT, VBS, and SCR that carry virus. Also blockany file type with more than one extension such as, ABC.TXT.VBS.d. Ensure that configuration settings should not be accessible to all users. Onlydesignated people should be able to access them.Correct Answer: -> c82/ Steve Irwin is an IT Consultant in the head office of Global Systems Inc. The regionaloffices of Global System Inc. are spread across north, east, south, and west regions. Thereare 1000 workstations in each office, which run on Windows platform. Steve needs anenterprise-level network management solution, which includes report scheduler forgenerating deliver reports, packet capture scheduling, and monitor for network delay.Which of the following tool or solution should Steve consider, which contains all thesefeatures?a. Unicenter Network Management Solutionb. LANBrowser 1.3c. OpManager 5.5d. Observer 10.1Correct Answer: -> d83/ Steve Irwin is working as a security administrator at Red Eye Experts. Steve hasconfigured Symantec Client Security tool to protect the enterprise client systems fromsecurity risks and threats. Steve needs to use the tool to enhance intrusion preventionsolutions reducing the time and cost. Which of the following features will enable Steve toperform the required task?a. Optimized out-of-the-box firewallb. Generic Exploit Blockingc. Side effect repairingd. Centralized configurationCorrect Answer: -> b84/ Which of the following requirements represents the degree of being capable ofmaintaining the service and service quality by a server?a. Performanceb. Integrityc. Accessibilityd. ReliabilityCorrect Answer: -> d
    • 85/ Lee Johnson is a IT consultant at Red Sky IT system. Lee is assigned the task to plandesktop solutions for the organization. Lee wants to implement the devices that have wordprocessors, spreadsheet applications, calendars, and E-mail clients installed on them.Which type of device should Lee implement to perform the above task?a. Java-based mobile devicesb. PALM-based mobile devicesc. Windows CE-based mobile devicesd. Linux based mobile devicesCorrect Answer: -> a86/ SuperSoftware Inc is planning to implement IT infrastructure in the organization. As apart of planning IT infrastructure, SuperSoftware Inc needs to plan for effective desktopsolutions to help users to perform day-to-day operations, increase user productivity, andimprove business processes. For this, the organization asks Anne Johnson, an ITconsultant to analyze the business and technical requirements for planning desktopsolutions and identify an appropriate desktop technology on the basis of therequirements. On analyzing the requirements, Donna notices that he needs to selectdesktop technologies for the desktop users who need to work on packages involvingheavy graphics. In addition, Donna needs to select a technology having more storagecapacity than phone handsets for the mobile users of the organization. Identify thedesktop and mobile technologies that Donna need to select to perform the task?a. Macintosh clients and Java-based mobile devicesb. Linux clients and PALM-based mobile devicesc. Macintosh clients and PALM-based mobile devicesd. Linux clients and Java-based mobile devicesCorrect Answer: -> c87/ Which of the following questions you need not answer while finalizing internal accesssecurity?a. What are the processes to deal with change in access permissions granted to anemployee?b. What are the processes to evaluate the access permissions granted to an employee?c. What are the methods to identify unauthorized access and prevent it?d. What are the administrative levels in the organizations and what data and systemaccess permissions do they need?Correct Answer: -> c88/ Tom Wilkins is the member of the team planning for an effective storage solution inRed Eye Experts. Red Eye Experts is a very big enterprise spanned across different areasof world, therefore, Tom needs to plan for the storage solution that can be accessed over anetwork and minimize the overall overheads by centrally managing hard disks. Keeping inmind all these considerations, Tom plans to use NAS in the enterprise that enablesmultiple users to share the same storage space. Which of the following feature will helpTom to accomplish his task?a. Server attached approach to data storageb. Access to storage poolc. 100 MB/s full duplex data transfer ratesd. Data regenerating hard disksCorrect Answer: -> a89/ Steve Irvin is the IT consultant at Red Eye Experts. Steve needs to identify an assetmanagement solution that would enable the IT staff of the organization to access the assetmanagement and maintenance information of the desktops from any location and at anytime through the Internet. In addition, Steve needs to identify a scalable assetmanagement solution in which additional modules can be added in future if theorganization expands. Identify an appropriate asset management solution.
    • a. Radminb. Altiris Asset Management Suitec. WebTMAd. ManageEngine ServiceDesk PlusCorrect Answer: -> c90/ Which of following network management tool can be used to secure the network frominternal attacks by monitoring event logs?a. Observer 10.1b. OpManager 5.5c. Unicenter Network Managementd. LANBrowser 1.3Correct Answer: -> b91/ Pat Wilkins is a system administrator in the head office of Red Eye Experts, which is alarge and complex organization spread across many countries. Pat wants to remove allkinds of complexities that are associated with network management for effective andefficient working of the organization. Donna Johnson is the IT consultant in Red EyeExperts. Pat assigns Donna the task of finding a multi-platform solution that discovers theentire network and can automate several network monitoring tasks. To perform this task,Donna wants a solution that includes WAN monitoring, server monitoring, URLmonitoring, and switch monitoring. Which of the following tool or solution is appropriateto include all these features?a. OpManager 5.5b. HP OpenView Network Management Solutionc. LANBrowser 1.3d. Unicenter Network Management SolutionCorrect Answer: -> a92/ Jim Lewis is working as a security administrator in Blue Moon Computers. Jim needsto use a Windows-based tool that monitors and filters Internet access for Web sites andInternet applications. Jim wants that the tool should record the bandwidth and time eachuser or workstation has spent in accessing Internet on periodic basis. Which of thefollowing tool should Jim use to perform the required task?a. OpManager5.5b. Observer10.1c. WebScout 2.1d. Symantec Client SecurityCorrect Answer: -> c93/ The management at Bluemoon Computers Inc. wants to secure its network fromexternal intrusions. The computers on the network are running on a number of differentoperating systems, such as Windows, Solaris, Linux, and Macintosh and have softwarefirewalls installed on them. The management is very cost conscious and alsoapprehensive that the level of security might not affect the network performance.Therefore, it has been decided that only one extra level of security will be implemented.Which of the following security measures will you suggest as a networking consultant?a. Host-based Intrusion Detection System (HIDS)b. Network-based Intrusion Detection System (NIDS)c. Combination of NIDS and HIDSd. No IDS is required as the computers have firewalls installed on themCorrect Answer: -> b94/ Which of the following business factors enables you to determine the technologiesthat can be used to establish network connections between different branch offices of anorganization?
    • a. Business processesb. Organization structurec. Geographical scoped. Business applicationsCorrect Answer: -> c95/ Which of the following can be termed as strategic services?a. Services that must be available at peak loadb. Services essential to operation.c. Services that can be postponed indefinitely.d. Services provided by servers that must be available, but can be available at reducedperformanceCorrect Answer: -> b96/ Pat Wilkins is working as an IT Consultant at Global Softwares. Pat is assigned thetask to plan desktop solutions for the organization. Pat needs to implement devices thathave more storage capacity than phone handsets. The devices should also have thecapability to run java-based dynamic applications. Which of the following devices Patshould implement to perform the task?a. Windows CE-based mobile devicesb. PALM-based mobile devicesc. Java-based mobile devicesd. Linux based mobile devicesCorrect Answer: -> b97/ Corrine Wallace is working as an IT consultant at Blue Moon Computers. Theorganization is planning to implement an IT infrastructure. The management of theorganization notices that organization requires servers at entry level of businessoperations to implement IT infrastructure. Therefore, organization assigns Corrine the taskof planning server solutions for business operations, such as caching services and proxyservices. In addition, the organization is required to provide file and print services. Whichservers Corrine will implement to fulfil the requirement of the organization?a. Web servers and Workgroup serversb. Infrastructure servers and Mail serversc. HPC servers and Infrastructure serversd. Workgroup and HPC serversCorrect Answer: -> a98/ Which of the following questions you need to answer while planning security forexternal access?a. What are the processes to deal with change in access permissions granted to anemployee?b. What are the processes to evaluate the access permissions granted to an employee?c. What are the methods to identify unauthorized access and prevent it?d. What are the administrative levels in the organizations and what data and systemaccess permissions do they need?Correct Answer: -> c99/ Pat Wilkins is working as an IT consultant at Safest Software Inc. The organization isplanning for network solutions to facilitate faster information sharing. Pat is assigned thetask to determine the number and the type of hardware and software resources requiredon a network. Pat needs to size the network to perform the task. Which of the followingfactors Pat needs to consider to perform network sizing:a. Number of Remote Usersb. Proactive Fault Managementc. Number of People Using the Network
    • d. Software Specificationse. Application Performancea. a, b, c, and eb. a, c, and dc. a, b, c, and dd. b, c, d, and eCorrect Answer: -> b100/ Pat Wilkins is working as a network administrator in Super Software Inc, which isspread over a vast geographical area. Pat needs to use WAN communication service tocreate an inter-network of networks. Pat needs to use a technology that can support veryhigh-speed data transfers to the tune of 640 kbps in both directions and carries high-speed data and multimedia over telephone lines. In addition, Pat wants anothertechnology, which is used for Point-to-Point networks and for backup for another type oflink. Which of the following combination of WAN technologies should Pat use to completethe required task?a. ISDN and Frame Relayb. ADSL and Leased linesc. SMDS and X.25d. ADSL and Analog modemsCorrect Answer: -> d101/ Consider the following statements:Statement A: WebTMA and ManageEngine ServiceDesk Plus are Web-based assetmanagement solutions.Statement B: The Altiris Asset Management Suite has a snap-in modular design.Which of the following is correct about the above statements?a. Statement A is False and Statement B is True.b. Statement A is True and Statement B is False.c. Both, Statement A and Statement B are True.d. Both, Statement A and Statement B are False.Correct Answer: -> c102/ Consider the following statements:Statement A: ManageEngine ServiceDesk Plus is a Web-based asset managementsolution.Statement B: ManageEngine ServiceDesk Plus provides a helpdesk for troubleshootingdesktop-related problems.Which of the following is correct about the above statements?a. Statement A is False and Statement B is True.b. Statement A is True and Statement B is False.c. Both, Statement A and Statement B are True.d. Both, Statement A and Statement B are False.Correct Answer: -> c103/ Which of the following tool can be used as a network monitor and protocol analyzerfor Ethernet, wireless 802.11b/a/g, token ring, and FDDI networks?a. Observer 10.1b. LANBrowser 1.3c. HP OpenView Network Managementd. Unicenter Network ManagementCorrect Answer: -> a
    • 104/ Steve Irwin is an IT consultant in Blue Moon Computers. Steve wants an enterprise-level tool for network management that helps in scanning the entire network by searchingand configuring properties of all the devices of Windows NT/2000 enterprise. The toolshould search for errors, audit information, connected users, and share permissions.Which of the following tool do u think is appropriate to perform this task?a. OpManager 5.5b. Observer 10.1c. LANBrowserd. HP OpenView Network Management SolutionCorrect Answer: -> c105/ Corrine Wallace is working as a storage administrator at Technology Systems. Theworkstations in Technology Systems are running on multi-platform systems. Corrine findsthat to manage storage devices effectively, he needs to use a tool or solution thatmanages the backup and recovery tools centrally and can monitor the storageenvironment remotely. Which of the following tool should Corrine use to perform the task?a. Storix System Backup Administratorb. BrightStor ARCserve Backup for Laptops & Desktops Release 11c. VERITAS Backup Exec10d. BrightStor Storage Resource ManagerCorrect Answer: -> d106/ The management at Bluemoon Computers Inc. has decided to connect it corporateoffice to all of its regional offices. The local networks at regional offices are to be identifiedby the different subnets of the same IP address class 172.16.0.1. The regional offices areusing different platforms for their networks, such as Windows, Linux, Macintosh, andSolaris. Because the corporate network will be connected to all these regional officesround the clock, it will be very essential to restrict the broadcast produced by all thenetworks and filter in the ones that are specifically meant for the corporate office. Whichof the following network devices will you suggest to facilitate this connectivity as anetworking consultant?a. Hubb. Switchc. Routerd. Layer 2 SwitchCorrect Answer: -> c107/ What is the configuration requirements of the desktops used in help desks?a. Following are the configuration requirements of the desktops used in help desksHigh quality printersVoice Over IP integrationComputer telephony integrationb. Following are the configuration requirements of the desktops used in help desksThin-client computersVoice Over IP integrationComputer telephony integrationc. Following are the configuration requirements of the desktops used in help desksThin-client computersVoice Over IP integrationFast processing capabilitiesd. Following are the configuration requirements of the desktops used in help desksThick-client computersVoice Over IP integrationComputer telephony integrationCorrect Answer: -> b
    • 108/ Corrine Wallace is working as IT consultant at Blue Moon Computers. Corrine isassigned the task of determining the service usability and utility of servers in theorganization. For this, Corrine needs to determine the time it takes to repair a service thathas failed on the servers. Which of the following requirements Corrine needs to analyze toperform the task?a. Accessibilityb. Availabilityc. Integrityd. PerformanceCorrect Answer: -> b109/ Safest Software wants to ensure uninterrupted execution of business activities andincrease productivity and profitability of an enterprise. For this, the organization decidesto implement server solutions in the organization to handle its routine and criticalbusiness applications. The management of the organization notices that organizationrequires servers at every level of business operations. Therefore, organization hires PatWilkins, an IT consultant to analyze the business processes and requirements that needsto be considered for planning server solutions and implement servers in the organization.After analyzing the requirements Pat realizes that he needs to implement servers for thefollowing:File and print servicesFirewall and security servicesProvide clustered computing systemHandling complex interactionsWhich server Pat needs to implement to perform the task?a. Workgroup server onlyb. Web servers.c. Workgroup and Infrastructure serversd. Workgroup, Infrastructure, HPC, and high-end servers, such as ERP and ApplicationTier servers.Correct Answer: -> d110/ Which of the following is not included in the security policy of an IT infrastructure?a. Roles and responsibilities for various employees.b. Establishment of trust among clients and employees to gain their confidencec. Rules regarding the use of various organizational resources, such as computers, theInternet, or e-mail.d. Geographical Scope of the organizationCorrect Answer: -> d111/ Donna Johnson, a network administrator is planning for the network solutions for theMountain Marketing Inc. Donna needs to avoid network congestion by managing dataflows. For this _donna needs to determine QoS of the organization’s network. Which of thefollowing factors cannot help Donna determine QOS of the network:a. Throughputb. Business applicationsc. Availabilityd. Jittere. Size and Geographical Scopea. b and eb. d and bc. d and ed. d, e, and bCorrect Answer: -> a
    • 112/ Donna Bard is working as a security administrator in Safest Software Inc. Donnaneeds to deploy a security method in the enterprise that can protect IT infrastructure fromboth external as well as internal attacks. Donna receives complaints that unnecessarydata, such as video and graphic files are entering the network from outside. Therefore,Donna wants that the security method should filter out the incoming traffic to stop theunnecessary data consuming the network bandwidth. Donna also wants to use anothersoftware that provides encryption technologies, digital certificates, and certificate toprotect the security of their communications and business transactions on the Internet.Which of the following combinations of security methods should Donna use to provideenterprise-wide network security?a. PKI and VPNsb. VPNs and IDSc. IDS and Firewallsd. Firewalls and PKICorrect Answer: -> d113/ Which of the following tool can be used to build reports to identify the under-utilizedstorage space?a. BrightStor Storage Resource Managerb. HP OpenView Storage Area Managerc. BrightStor ARCserve Backup for Laptops & Desktopsd. Storix System Backup AdministratorCorrect Answer: -> b114/ Corrine Wallace is working as an IT consultant in the head office of Safest Software.Safest Software is a large enterprise with distributed network in six branches across fourcountries. The workstations in each office are running on multi-platform, such as Linuxand Windows. Steve Irwin is the system administrator of the head office. Steve assignsCorrine the task of providing a network management solution, which combines thesoftware, services, support, and training to manage the network proactively by optimizingperformance and availability of the distributed network system of Blue Moon Computers.Which of the following tool or solution should Corrine choose to perform this task?a. HP OpenView Network Management Solutionb. Unicenter Network Management Solutionc. OpManager 5.5d. LANBrowser 1.3Correct Answer: -> a115/ Pat Greene is working as a storage administrator at Blue Moon Computers. Pat isassigned the task of managing archives in an enterprise. Pat needs to protect the datastored in archived media from mishandling or natural disasters. Which of the followingactivity should Pat perform to complete the task?a. Ensuring that archive media does not exceed the safe limitsb. Storing the data with the same retention periodc. Maintaining a record of the archival media, files, and foldersd. Maintaining the duplicate copy of the archived dataCorrect Answer: -> d116/ Red Eye Systems Inc. wants a plan for security implementation at a new softwaredevelopment facility in New York. The company wants the facility to have at least fivelevels of authentications for any data that is accessed from a remote location as well asfor the data sent to a remote location. The management wants to implement both host-based and network-based IDS and wants to put a firewall after each VPN gateway that willbe used for connecting remote users. In addition, the management has a very stringentadministrative policy, which requires even a single change in user permissions to be
    • approved by a hierarchy of officials. In addition, the management has decided to conductweekly security audits during which the network at the facility would be non-operational.As a networking consultant, according to you which of the following business or technicalrequirements will be affected because the security requirements?a. Availability, geographical scope, and business applicationsb. QoS, Performance, and availabilityc. User and resource distributiond. Security policiesCorrect Answer: -> b117/ New tech book is multinational organization with various bookstores in various partsof USA. To expand its customer base globally and to automate its business process theorganization launches an e-commerce site on the Internet. To protect its businessprocesses from disruption, the organization asks Anne Donaldson to plan for theavailability of the website. Identify the considerations Anne needs to keep track of to planfor the availability of the website.To protect data losses in the event of disasters, the organization also asks Anne to plantasks for maintaining availability and backing up critical data of the website. What shouldAnne do to perform the task?a. Anne needs to keep track of the following considerations while planning for theavailability of the website:Criticality of the dataAmount of downtime that the organization can affordCost of reducing downtime in the organizationIn addition, Anne needs to consider the frequency of planned downtime while setting theavailability goals to plan for appropriate backup strategies and maintenance tasks tomaintain availability.b. Anne needs to keep track of the following considerations while planning for theavailability of the website:Amount of data that a network can carryAmount of data that is successfully transferred over the InternetRatio of error-free data transmission to total transmission.In addition, Anne needs to consider the frequency of planned downtime while setting theavailability goals to plan for appropriate backup strategies and maintenance tasks tomaintain availabilityc. Anne needs to keep track of the following considerations while planning for theavailability of the website:Criticality of the dataAmount of downtime that the organization can affordCost of reducing downtime in the organizationIn addition, Anne needs to consider the frequency of unplanned downtime while settingthe availability goals to plan for appropriate backup strategies and maintenance tasks tomaintain availability.d. Anne needs to keep track of the following considerations while planning for theavailability of the website:Amount of data that a network can carryAmount of data that is successfully transferred over the InternetRatio of error-free data transmission to total transmission.In addition, Anne needs to consider the frequency of unplanned downtime while settingthe availability goals to plan for appropriate backup strategies and maintenance tasks tomaintain availabilityCorrect Answer: -> a118/ _______ management enables you to manage the leased assets in an enterprise byinforming you about the end of the lease period.a. Asset
    • b. Eventc. Remoted. Desktop configurationCorrect Answer: -> a119/ Identify the tasks performed by the help desk in an enterprise.a. Create security policies for securing the desktops.b. Provide an online knowledge base that provides solutions to problems.c. Log and monitor the problems of desktop users.d. Provide centralized support for troubleshooting problems of desktop users.Select the correct option.a. a, c, and db. a, b, and dc. b, c, and dd. c and dCorrect Answer: -> c120/ Steve Irvin works in the Helpdesk department of Global Systems Inc. Currently, theorganization uses a decentralized and manual method for managing and maintaining ITresources. The CIO of the organization notices that the decentralized and manual methodfor managing and maintaining IT resources is prone to errors and requires a huge amountof time, and effort. To solve the problem, the CIO asks Steve to identify a tool that cankeep track of the IT resources and enable the IT staff to perform the following tasks in theorganization:Determine which IT resources are to be upgraded or replacedKeep track of the end of the lease period of the IT resourcesKeep track of the software having expired licensesDetermine which users have particular software packages installedCentrally manage the implementation of software patches across the enterpriseCentrally manage the distributed IT resourcesIdentify the tool that is most appropriate to perform the preceding tasks.a. Remote management toolb. Event management toolc. Asset management toold. Desktop standardization toolCorrect Answer: -> c