Вы находитесь на странице: 1из 49

1/ Consider the following statements: Statement A: The BSD interface provides a freeware tool that helps to handle the

network load. This is achieved by using the robust network services that the BSD interface provides through one of its distribution. Statement B: The System V Interface is a command-line interface that enables you to use the print services. Which of the following is true, with respect to the above statements? a. Statement A is true and statement B is false. b. Statement A is false and statement B is true. c. Both, statements A and B, are true. d. Both, statements A and B, are false. Correct Answer: -> c 2/ While configuring a NIS client you need to configure the ypbind service. Which of the following files will you modify to perform this task? a. /etc/passwd b. /etc/sysconfig/network c. /etc/yp.conf d. /etc/nsswitch.conf Correct Answer: -> c 3/ Consider the statements: Statement A: The range of IP addresses that can be assigned to a computer are known as a dotted quad notation. Statement B: The number of octets that represent the network Id and host Id in the IP addresses varies with the size of the network. Which of the following is true, with respect to the above statements? a. Statement A is true and statement B is false. b. Statement A is false and statement B is true. c. Both, statements A and B, are true. d. Both, statements A and B, are false. Correct Answer: -> b 4/ Steve Irvin is working as system administrator at Mountain Marketing Inc. He needs to assign dynamic IP addresses to all the computers in the organization. For this, he decides to configure eth1 as the DHCP client. The DHCP server is already present on the network and the host name is Mountain Marketing. How should Steve proceed to perform the task? a. After setting the value of the NETWORKING parameter equal to yes in the /etc/sysconfig/network file, he needs to edit the contents of the /etc/sysconfig/network-scripts/ifcfg-eth1 file, as follows: DEVICE=eth1 ONBOOT=no BOOTPROTO=dhcp b. After setting the value of the NETWORKING parameter equal to yes in the /etc/sysconfig/network file, he needs to edit the contents of the /etc/sysconfig/network-scripts/ifcfg-eth1 file, as follows: DEVICE=eth1 ONBOOT=yes BOOTPROTO=dhcp c. After setting the value of the NETWORKING parameter equal to no in the /etc/sysconfig/network file, he needs to edit the contents of the /etc/sysconfig/network-scripts/ifcfg-eth1 file, as follows: DEVICE=eth1 ONBOOT=yes BOOTPROTO=dhcp d. After setting the value of the NETWORKING parameter equal to no in the /etc/sysconfig/network file, he needs to edit the contents of the /etc/sysconfig/network-scripts/ifcfg-eth1 file, as follows: DEVICE=eth1 ONBOOT=no

BOOTPROTO=dhcp Correct Answer: -> b 5/ Pat Wilkins is working as system administrator at Global Systems Inc. Donna is working as software developer with the company. She needs to develop some applications on the Linux platform using Qt 3 and GTK+ 2 graphical toolkits. Therefore, Donna needs Pat to add fonts to her system. She wants the font to be added such that they are smooth-edged. How will Pat perform the given task? a. To add the fonts, Pat needs to perform the following steps: Copy the new fonts to the directory, /usr/share/fonts/local. Run the following command for updating the font information cache: # fc-cache /usr/share/fonts/local b. To add the fonts, Pat needs to perform the following steps: Copy the new fonts to the directory, .fonts/, present in the user's home directory. Run the following command for updating the font information cache: # fc-cache /usr/share/fonts/local c. To add the fonts, Pat needs to perform the following steps: Copy the new fonts to the Fontconfig configuration file. Run the following command for updating the font information cache: # fc-cache /usr/share/fonts/local d. To add the fonts, Pat needs to perform the following steps: Copy the new fonts to the XFree86 configuration file. Run the following command for updating the font information cache: # fc-cache /usr/share/fonts/local Correct Answer: -> b 6/ AB Corp is an advertising company, which is working on Linux platform. Steve, the system administrator, creates a directory, /extrauser. After creating this directory, Steve needs to create a user named john in the /extrauser directory. Which command should Steve use to perform the above task? a. useradd d /extrauser john b. useradd f /extrauser john c. useradd g /extrauser john d. useradd c /extrauser john Correct Answer: -> a 7/ Steve Irving is the system administrator in Mastery Mechanics. He needs to install a Linux server on the network of the organization. He is also required to attach a printer to the Linux server so that all the employees of various departments can share the network printer. For this, Steve needs to install Linux on a computer and configure it as a print server using the CUPS daemon. However, after one week some of the employees start complaining to Steve that they are not able to access the printer. The employees also report that when they try to access the printer from their remote Linux system they receive an error message, which states that the permission to access the printer is denied. What could be the problem and how should Steve resolve it? a. Modify the server configuration file /etc/cups/cupsd.conf, which contains the information required to access the printer. b. Modify the server configuration file /etc/cups/printers.conf, which contains the information required to access the printer. c. Modify the server configuration file /etc/cups/classes.conf, which contains the information required to access the printer. d. Modify the server configuration file /etc/cups/client.conf, which contains the information required to access the printer. Correct Answer: -> a 8/ Which of the following command performs the same task as the mkfs.ext3 /dev/hdc8 command? a. mke2fs l /dev/hdc8

b. mke2fs j /dev/hdc8 c. mkfs -c ext3 /dev/hdc8 d. mke2fs i /dev/hdc8 Correct Answer: -> b 9/ You are working as system administrator at Red Sky IT Systems. The organization has Windows server installed on the network. You have been assigned the task of installing Linux on all the computers in the network. Which type of installation method can you use to install Linux in the given scenario? a. Use an FTP Server b. Use an NFS Server c. Use an HTTP Server d. Use a CD-ROM Correct Answer: -> a 10/ Mike Womack is working as a project manager with Smart Software Developers. The network setup of the organization is based on Linux. The organization has a remote server, where the employees save their files. Don Allen, the system administrator of the organization has created user accounts for all the employees of the organization. Mike is working on a project and creates a file, teamproject.txt. Mike wants to assign read permission to all the other users, for the file, teamproject.txt. However, Mike wants to remove all the permissions from the other users, for any other file that he creates. Mike also wants to assign the read and write permissions to his team members, who are working in his project, for all the files that he will create. Which set of commands will enable Mike Womack to set the file access permissions according to his requirement? a. chmod a+r teamproject.txt umask 037 b. chmod a+r teamproject.txt umask 017 c. chmod o+r teamproject.txt umask 017 d. chmod o+r teamproject.txt umask 037 Correct Answer: -> c 11/ Ken Burton, the system administrator at Global Systems Inc. has joined the organization after a long leave. During the leave period, Bill was using Kens computer. Bill had replaced the hard disk of Kens computer with a new hard disk for personal use. Ken had installed GRUB on the network server in order to boot the Linux operating system. While booting his computer, Ken receives an error at Stage 1 of the loading process and the booting process stops. Which of the following error has caused the booting process to stop? a. Floppy Error b. Hard Disk Error c. Geom Error d. Read Error Correct Answer: -> c 12/ The software department at Supersoft2000 requires Windows 2000 platform to develop software. Chris, the system administrator wants to install the Windows 2000 Server on one of the six partitions of an existing Linux server. To install Windows 2000 Server on this partition, Chris deletes this partition. However, he does not delete the entry of this partition in the /etc/fstab file and restarts the computer. The following error message is displayed: checking file systems fsck.ext3/dev/hdc6: The superblock could not be read or doesnt describe a correct ext2 filesystem. If the device is valid and it really contains an ext2 filesystem (and not swap or ufs or something else), then the

superblock is corrupt, and you might try running e2fsck with an alternate superblock: e2fsck b 8193 <device> : Bad magic number in super-block while trying to open /dev/hdc6 [FAILED] * * * An error occurred during the file system check. * * * Dropping you to a shell; the system will reboot * * * when you leave the shell. Give root password for maintenance (or type Control-D to Continue): How can Chris troubleshoot the problem? a. Start the system in the rescue mode and delete the entry of the deleted partition in the /etc/fstab file. b. Start the system in the single-user mode and change the root password. c. Start the system in the single-user mode and delete the entry of the deleted partition in the /etc/fstab file. d. Start the system in the rescue mode and change the root password. Correct Answer: -> a 13/ What is the configuration requirements of the desktops used for financial services enterprise a. Following are the configuration requirements of the desktops used in call centres and help desks: Thin-client computers Voice Over IP integration Computer telephony integration b. Following are the configuration requirements of the desktops used in banks and help desks: High storage High security requirement c. Following are the configuration requirements of the desktops used in banks and help desks: Thick client computers Office applications Standard quality printing device d. Following are the configuration requirements of the desktops used in banks and help desks: High storage capacity Fast processing capabilities Correct Answer: -> b 14/ Tom Davidson is working, as a system administrator at Mountain Marketing Inc. Tom has been assigned the task of sending the high priority jobs for printing first. Which command will Tom execute to perform the task? a. lpc b. lpstat c. lp d. lpadmin Correct Answer: -> c 15/ Steve is a system administrator at Deez Inc. He needs to load a module into the kernel. He also wants to specify that a kernel module name should be provided explicitly in the command. Which option of the insmod command will Steve use to perform the task? a. insmod -o b. insmod -s c. insmod -p d. insmod -f Correct Answer: -> a 16/ Jim Lewis, the system administrator at Deez Inc, has installed Linux on a computer. Jim wants to collect the information about the parameters that are passed to the kernel during the start up of the kernel. Which file in the /proc/ directory should Jim use to perform this task?

a. /proc/apm b. /proc/cmdline c. /proc/cpuinfo d. /proc/dma Correct Answer: -> b 17/ You are the system administrator at Deez Inc. You need to transfer the data from a source computer over a network to the destination computer over another network. For this, packet routing is required from one network to the other. Which feature of Linux kernel should you use for the above task? a. Router b. Routing table c. Default route d. IP forwarding Correct Answer: -> d 18/ Pat configures the dhcpcd daemon and starts his computer. He notices that the IP address is not assigned to his computer. Pat verifies that the dhcpcd daemon is running. Which command should Pat use for the IP address assignment? a. Pat needs to execute the ifconfig command. b. Pat needs to execute the dhcpcd command with the f option. c. Pat needs to check all the DHCP servers on the network d. Pat needs to execute the route command. Correct Answer: -> b 19/ Steve Irvin is working as system administrator at Super Software2002. The domain administrator of the organization wants Steve to provide fonts to the X clients. He also wants Steve to add fonts such that they do not provide support for advanced anti-aliasing feature. Identify the correct sequence of steps that Steve needs to perform to accomplish the given task? a. To add fonts, Steve needs to perform the following steps: Create a directory, /usr/share/fonts/local/, if it does not already exist. Change to the /usr/share/fonts/local directory. Update the font information of the system. Copy the new font files to the /usr/share/fonts/local directory. Execute the chkfontpath command to add the directory, /usr/share/fonts/local/ to the Xfs FontPath as root directory. Restart Xfs so that the X clients can use the new fonts. b. To add fonts, Steve needs to perform the following steps: Create a directory, /usr/share/fonts/local/, if it does not already exist. Add the directory created in the first step to the Xfs FontPath as root directory. Copy the new font files to the /usr/share/fonts/local directory. Update the font information of the system. Change to the /usr/share/fonts/local directory. Restart Xfs so that the X clients can use the new fonts. c. To add fonts, Steve needs to perform the following steps: Create a directory, /usr/share/fonts/local/, if it does not already exist. Copy the new font files to the /usr/share/fonts/local directory. Change to the /usr/share/fonts/local directory. Update the font information of the system. Execute the chkfontpath command to add the directory, /usr/share/fonts/local/ to the Xfs FontPath as root directory. Restart Xfs so that the X clients can use the new fonts. d. To add fonts, Steve needs to perform the following steps: Create a directory, /usr/share/fonts/local/, if it does not already exist. Add the directory created in the first step to the Xfs FontPath as root directory. Change to the /usr/share/fonts/local directory.

Copy the new font files to the /usr/share/fonts/local directory. Update the font information of the system. Restart Xfs so that the X clients can use the new fonts. Correct Answer: -> c 20/ Steve is working as a system administrator at the Smart Software Developers. The company has 50 client computers and one Linux server on the network. Steve updates the Linux server regularly by installing Linux patches. He checks the boot directory each time, to obtain the kernel information and to make sure that the Linux patches are compatible with the kernel version. To avoid searching the boot directory for obtaining the kernel information, Steve wants to display this information at the login prompt. How should Steve display the information on the login prompt? a. Edit the rc.sysinit file to reflect the kernel information at the login prompt b. Edit the rc.serial to reflect the kernel information at the login prompt c. Edit the rc.local to reflect the kernel information at the login prompt d. Edit the rc.news to reflect the kernel information at the login prompt Correct Answer: -> c 21/ Jim Lewis a system administrator at Deez Inc. is working on Linux platform. All the employees of the application development department are working on critical projects. Therefore, regular backup is required to save the data of the developers. Jim is assigned the task of taking weekly backup of data. After taking the backup of files, Jim wants to display the list of files, which have been backed up. Which of the following command should Jim execute to display the list of files? a. Execute the tar x command b. Execute the tar c command c. Execute the tar v command d. Execute the tar p command Correct Answer: -> c 22/ Steve installs kernel of version 2.2 on his computer. After the installation, he notices that one of the devices is not supported by this version of the kernel. Steve upgrades the kernel from version 2.2 to 2.4 to get support for that device. However, after installation of the kernel of version 2.d. Steve is unable reboot the computer. Why is Jim not able to boot the computer and how should he solve the problem? a. The kernel of version 2.4 has not overwritten the kernel of version 2.2. Jim needs to boot the system in the single-user mode by using a floppy disk or a CD-ROM to resolve the problem. b. The kernel of version 2.4 has not overwritten the kernel of version 2.b. but it is copied in the /root directory. Jim needs to boot the system in the rescue mode by using a floppy disk or a CD-ROM to resolve the problem. c. The kernel of version 2.4 has overwritten the kernel of version 2.2 and the boot loader configuration file is not updated accordingly. Jim needs to boot the system in the rescue mode by using a floppy disk or a CD-ROM to resolve the problem. d. The kernel of version 2.4 has not overwritten the kernel of version 2.2 and the newly compiled kernel, bzImage, is copied in the /boot directory and the boot loader configuration file is updated accordingly. Jim needs to boot the system in the multiuser mode by using a floppy disk or a CD-ROM to resolve the problem. Correct Answer: -> c 23/ Jim Lewis wants to create a filesystem so that he can access other filesystems from a remote computer containing Linux operating system. Which type of filesystem should Jim create? a. ReiserFS b. Journaled File System c. NFS

d. SMBFS Correct Answer: -> c 24/ Steve Irving is working as a system administrator at Super Graphics. A new user, Michael joins Super Graphics as a software developer. Steve needs to share a filesystem to enable Michael to access data from his computer. Steve has to opt for the type of filesystem, which would enable Michael to access the filesystem from a remote computer running on Windows NT Server operating system. Which type of filesystem can Steve create? a. SMBFS b. NFS c. JFS d. ReiserFS Correct Answer: -> a 25/ David Johnson is working as a system administrator with Super Graphics. The employees of the organization use OpenOffice.Draw package of Linux to create graphical designs. Jerry Smith, working as an audio-visual expert observes that his computer does not produce good quality sound. Therefore, she asks David to change the soundcard of her computer. David inserts a new sound card on Jerry's computer and downloads the module for the sound card, through the Internet from the vendor's Web site. Now, David wants to install the module for the sound card in the kernel of Jerry's computer. However, David wants to load the module for the sound card in the kernel even if the current kernel version installed in the computer and the version of the kernel for which the module is created are not same. Which command should David use to perform the given task? a. insmod -o [module_name] b. insmod s [module_name] c. insmod -f [module_name] d. insmod -p [module_name] Correct Answer: -> c 26/ John requires some data from a file stored in a directory on a floppy disk. His computer has Linux operating system. After finishing his work, John unmounts the floppy disk. For this, he executes the umount command as shown below: # umount /dev/fd0 However, the system displays an error message, Device is busy. Which of the following steps will help John identify and solve the problem? a. Determine the current directory. If the current directory is located on the floppy disk, change to a directory that is not located on the floppy disk. Unmount the floppy disk b. Determine the current directory. Execute the rm r command to delete the directory on the floppy. Unmount the floppy disk c. Determine the current directory. Delete the file on the floppy. Unmount the floppy disk. d. Determine the current directory. Execute the rm --r command to delete the directory on the floppy. Unmount the floppy disk Correct Answer: -> a 27/ Debbie Howe, an employee of SuperGraphics needs to access the file containing the daily schedule information of the project on which he is working. This file is located on the computer of Ken Bruton, the team leader at the company. Ken had the dual operating system, Windows 2000 and Linux installed on his computer. The file was created on Windows 2000. As the Windows 2000 Server has crashed on Kens computer, he boots the computer using Linux. Ken tries to mount the file from Windows 2000 to Linux using the mount command. The system generates an error displaying, Virtual File Allocation table (VFAT) file system is not supported. Ken informs the system administrator about the problem. What could be the cause of the error? a. Ken does not have the read permissions for the files, which he wants to access. b. Linux does not have the necessary modules required to support the Windows filesystems. c. The file that Ken is trying to access is not exported by the system in which it is stored.

d. Another filesystem is mounted on the same mount point as that of the filesystem, which Ken wants to access. Correct Answer: -> b 28/ You are working as a system administrator at Global Systems Inc. You need to create an alternate file hierarchy in the /etc/sysconfig/networking directory on the server, which is using ISDN network interface. Which command will you run to perform this task? a. ifconfig b. neat c. mii-tool d. netconfig Correct Answer: -> b 29/ Chris is working as an assistant system administrator at Multi Store Inc. Chris finds that Sendmail and IMAP services are not functioning properly. Which of the following log files should Chris check to find out the errors that are logged? a. Check the entries in the /var/log/message log file. b. Check the entries in the /var/log/maillog log file. c. Check the entries in the /var/log/htpd log file. d. Check the entries in the /var/log/samba log file. Correct Answer: -> b 30/ Which of the following files contain the information about the system memory that is currently in use? a. /system/meminfo b. /proc/memoryinfo c. /proc/cpuinfo d. /proc/meminfo Correct Answer: -> d 31/ Pat Greene is working as system administrator at Safest Software Inc. Pat is required to monitor the systems of the company to administer the network resources efficiently in the Linux environment. For this, Pat needs information about the processes, memory, paging, block IO, traps, and CPU activity of the computers. In addition, he also needs to display an updated report on the virtual memory statistics. How should Pat accomplish the given task? a. He needs to run the following command: # vmstat <delay> b. He needs to run the following command: # iostat v c. He needs to run the following command: # iostat d d. He needs to run the following command: # vmstat n Correct Answer: -> a 32/ Ken Burton is working as system administrator at Indestructible Boxes Inc. Peter, an employee of the company complains to Ken about the slow processing speed of his computer. For this, Ken decides to create a swap space named /dev/hdc9 on his computer to increase the available amount of RAM. After creating and activating the swap space, Ken restarts the computer. Ken notices that processing speed of the computer has still not increased. What task should Ken perform to solve the given problem? a. Ken needs to edit the /etc/fstab file, and add the following entry to activate the swap space, as follows: /dev/hdc9 swap swap defaults 00 b. Ken needs to edit the /etc/fstab file, and the following entry to activate the swap space, as follows:

/dev/hdc9 swap ext3 defaults 00 c. Ken needs to edit the /etc/fstab file, and add the following entry to activate the swap space, as follows: /dev/hdc9 swap ext3 defaults 11 d. Ken needs to edit the /etc/fstab file, and add the following entry to activate the swap space, as follows: /dev/hdc9 swap swap defaults 11 Correct Answer: -> a 33/ Steve is working as a system administrator at Smart Software Developers. The company has 50 client computers and one Linux server on the network. The company has opened a new branch at Houston for the Finance department. The management asks Steve to create a file system that prevents the data loss in case of a power failure or a system breakdown. Therefore, Steve creates the ext3 filesystem on the /dev/hdc8 partition of the Linux server. After a few months, Steve decides to resize the partition due to some disk space constraints. Steve uses the resize2fs disk utility to resize the partition. However, Steve fails to resize the partition. What could be the cause of the problem? a. Steve has not updated the /etc/fstab file to change the ext3 filesystem to the ext2 filesystem. b. The ext3 filesystem cannot be converted into ext2 filesystem so resize2fs utility cannot be used. c. The ext3 supports only tune2fs command to resize the partition. d. The ext3 file system does not support the resize2fs disk utility. Correct Answer: -> d 34/ Debbie Howe is working as a system administrator with True Travel Services. The organization uses a network printer across all departments. However, recently the printer is not working properly. Debbie has been communicated reports that on accessing the printer, it displays an error message: bash: /dev/lp0: Permission denied. How should Debbie troubleshoot the problem? a. Debbie needs to provide access control to enable the users of the remote hosts to print to the printer by performing the following steps: Open the /etc/hosts file. Add the IP addresses of the remote hosts. Stop and restart the print service. b. Debbie needs to provide access control to enable the users of the remote hosts to print to the printer by performing the following steps: Open the /etc/host.deny file. Add the IP addresses of the remote hosts. Stop and restart the print service. c. Debbie needs to provide access control to enable the users of the remote hosts to print to the printer by performing the following steps: Open the /etc/printcap file. Add the IP addresses of the remote hosts. Stop and restart the print service. d. Debbie needs to provide access control to enable the users of the remote hosts to print to the printer by performing the following steps: Open the /etc/hosts.equiv file. Add the IP addresses of the remote hosts. Stop and restart the print service. Correct Answer: -> d 35/ Tom Wilkins is the system administrator at Red Sky IT Systems that uses Linux for all business purposes. Tom has implemented a Linux based LAN in the organization and has installed a print server on the LAN. He has also installed the LPRng service on the print server. The employees of all the departments use the print server to print their documents. They submit their print jobs using the lpr command. However, the employees of the Accounts department complain that the printer is

taking a long time to print the documents. The employees request Tom to restrict the print commands given by the other departments until the Accounts documents have been printed. How should Tom resolve the problem? a. Execute the lpc disable command. b. Edit the /etc/lpd.conf file. c. Execute the lpc abort command d. Edit the /etc/printcap file. Correct Answer: -> c 36/ Steve is assigned the task of installing Linux on a computer on which Windows 98 is already installed. He does not have the bootable Linux CD-ROM. Which type of installation method would Steve prefer to install Linux? a. Use an FTP Server b. Use the Hard Drive c. Use an HTTP Server d. Use a CD-ROM Correct Answer: -> b 37/ John is recently recruited as a software developer in Smart Software Developers. He has been assigned the task of developing an accounting application. For this, John requires accounting package software for his computer. Chris, the system administrator at Smart Software Developers, has been assigned the task for installing the software on Chriss computer. For this, Chris wants information about the directory that contains initialization scripts related to the installed software packages. Which directory will Chris use to perform this task? a. /etc/profile.d b. /etc/bashrc c. ~/.bash_profile d. /etc/profile Correct Answer: -> a 38/ Jim Lewis is working as a system administrator with New Tech Books. The network setup of the organization is based on Linux. Jim has recently installed and configured a Linux server at a remote location. He has also created user accounts for all the employees of the organization on the remote server. Diane Frye, the head of the Sales department is creating the annual sales report of the organization. Diane has created a folder, Sales_Report, in her home directory and placed all the files related to the annual sales report of the organization in that folder. Diane has also assigned all the access permission to the files that she has created and asked the members of her department to access the files from the Sales_Report folder. After one week, Diane finds that someone has removed some files from the Sales_Report folder. However, Diane does not want to change the access permission on the files. Therefore, Diane reports the matter to Jim and asks Jim to set such permissions on the Sales_Report folder so that no other users except her or system administrator, can remove any files from the folder. What should Jim do to perform the task? a. Set setUID bit permission on the Sales_Report directory by using the command, chown u+s Sales_Report. b. Enable sticky bit permission on the Sales_Report directory by using the command, chmod +t Sales_Report. c. Set setGID bit permission on the Sales_Report directory by using the command, chown g+s Sales_Report. d. Remove setUID bit permission on the Sales_Report directory by using the command, chmod us Sales_Report. Correct Answer: -> b 39/ Tom Wilkins works as a network administrator at Supersoft2000. The employees of the organization use Linux platform to work on their projects. Tom installs DHCP server on the network to assign IP addresses to the client computers. Jim Lewis, an employee of Supersoft2000 needs to check the IP addresses assigned to his computer. For this, Jim executes the ifconfig command.

However, the command does not show the IP addresses of his computer. Jim informs Tom about the problem and asks him to resolve it. How can Tom troubleshoot the problem? a. Configure the /etc/dhcpd.conf file and restart dhcpcd daemon. b. Execute the command, route add host 255.255.255.255 dev eth0 c. Execute the dhcpcd command with the f option. d. Check all the DHCP servers on the network, including any Microsoft Windows DHCP server that might have assigned the IP addresses to Jims computers. Correct Answer: -> a 40/ Corrine Wallace is working as an IT consultant at Blue Moon Computers. The organization is planning to implement an IT infrastructure. The management of the organization notices that organization requires servers at every level of business operations to implement IT infrastructure. Therefore, organization assigns Corrine the task of planning server solutions for business operations, such as caching services and proxy services. The organization also asks Corrine to plan server solutions for domain naming, directory, firewall and security services. In addition, the organization asks Corrine to implement servers that can effectively provide services to end users in spite of the heavy load on it. Which servers Corrine need to implement to perform the task? a. Corrine needs to implement web and infrastructure servers. In addition, Corrine needs to implement high-end servers, such as OLTP Med and BI servers. b. Corrine needs to implement workgroup and infrastructure servers. c. Corrine needs to implement web and workgroup servers. d. Corrine needs to implement web and infrastructure servers. Correct Answer: -> a 41/ Pat Wilkins is working as an assistant system administrator at New Tech Bookstore. Pat wants to check whether IP forwarding is disabled or enabled on the Linux server. Which command will Pat execute to perform the given task? a. # ls /proc/sys/net/ipv4 b. # vi /etc/sysctl.conf c. # echo "1" > /proc/sys/net/ipv4/ip_forward d. # cat /proc/sys/net/ipv4/ip_forward Correct Answer: -> d 42/ Lee is a system administrator at Countrywide Markets. John a software developer wants a package to be installed on his computer. John asks Lee to install the required package on his computer. However, when Lee starts installing the package, the system displays a message that the package is already installed. Which command can Lee use to upgrade the package? a. rpm -e b. rpm -h c. rpm -I d. rpm -F Correct Answer: -> d 43/ Bob is working, as an assistant system administrator at Global Systems Inc. Bob wants to invoke the services that a kernel provides for various processes running on a computer, such as reading the contents of a file. Which kernel module, Bob should use to perform the above task? a. Device driver b. System call c. Network Driver d. Executable Interpreter Correct Answer: -> b 44/ Larry Williams is working as network administrator at Smart Software Developers. Recently, the organization has been facing frequent power failures. To protect the data, the domain administrator of the organization wants Larry to backups all the servers of the company daily at 6:00 P.M. The

domain administrator wants Larry to automate the process. How should Larry automate the process of backing up? a. Use /etc/at.allow configuration file b. Use /etc/crontab file configuration file c. Use /etc/cron.daily configuration file d. Use /etc/at.deny files configuration file Correct Answer: -> b 45/ Donna Johnson is working as system administrator at New Tech Books. The employees of the New Tech Books have the ext2 filesystem implemented on the partition /dev/hdc8 on their systems. They need to access NFS server for sharing and storing their data. However, NFS server has the ext3 filesystem configured on it. Therefore, Steve needs to make the ext2 filesystem compatible with the ext3 fileystem. How should Donna troubleshoot the given problem? a. To convert the ext2 filesystem into the ext3 filesystem, Donna needs to perform the following steps: 1. # /sbin/tune2fs -j /dev/hdc8 ( 2. # /sbin/e2fsck -y /dev/hdc8 ( 3. Mount the ext3 filesystem if there are no errors by using _ the following command: # mount t ext3 /dev/hdc8 /mnt/NewPartition ( 4. Update the filesystem type option in the /etc/fstab file to _ automount the filesystem after the system is restarted. b. To convert the ext2 filesystem into the ext3 filesystem, Donna needs to perform the following steps: 1. # /sbin/e2fsck -y /dev/hdc8 ( 2. # /sbin/tune2fs -j /dev/hdc8 ( 3. Mount the ext3 filesystem if there are no errors by using _ the following command: # mount t ext3 /dev/hdc8 /mnt/NewPartition ( 4. Update the filesystem type option in the /etc/fstab file to _ automount the filesystem after the system is restarted. c. To convert the ext2 filesystem into the ext3 filesystem, Donna needs to perform the following steps: 1. # /sbin/e2fsck -y /dev/hdc8 ( 2. # /sbin/tune2fs -j /dev/hdc8 ( 3. Update the filesystem type option in the /etc/fstab file to _ automount the filesystem after the system is restarted. 4. Log on as the root user and mount the partition, which _ contains the ext2 filesystem as follows: # mount /dev/hdc8 ( d. To convert the ext2 filesystem into the ext3 filesystem, Donna needs to perform the following steps: 1. # /sbin/e2fsck -y /dev/hdc8 ( 2. # /sbin/tune2fs -j /dev/hdc8 ( 3. Update the filesystem type option in the /etc/fstab file to _ automount the filesystem after the system is restarted. 4. Log on as the root user and unmount the partition, which _ contains the ext2 filesystem as follows: # umount /dev/hdc8 ( Correct Answer: -> a 46/ Safest Software Inc. is a leading software export organization that has opened a new branch office at Singapore to expand their business in Asia Pacific. The branch office has 150 client computers and three servers on their network based on Linux operating system. Steve is appointed as a system administrator at the branch office. All the clients are working in the desired runlevel to support the applications used by the organization. The organization has to export software that requires the multimedia-enabled computers. The software needs to be tested on Linux computers before exporting it. John, a testing engineer is assigned the task of testing the multimedia

application, but he is unable to open that application. John asks Steve to solve the problem. How should Steve solve the problem? a. Steve should set the default runlevel to 1 to start the Linux server in graphical mode. b. Steve should set the default runlevel to 5 to start the Linux server in graphical mode. c. Steve should set the default runlevel to 6 to start the Linux server in graphical mode. d. Steve should set the default runlevel to 4 to start the Linux server in graphical mode. Correct Answer: -> b 47/ Christine Turner needs to send an important file to Mary Peterson, who is working at the head office. For this, the system administrator needs to configure a route so that the file can be transferred to Marys computer, with the IP address 192.165.0.150 However, on executing the command, the computer displays an error stating gbroadcast: Unknown host. How should the system administrator troubleshoot the error? a. The system administrator needs to add the name of the host in the /etc/hosts file: 192.168.0.130 gbroadcast Next, Christine needs to execute the following command: # route add net gbroadcast dev eth0 b. The system administrator needs to add the name of the host in the /etc/hosts file: 192.165.0.150 gbroadcast Next, Christine needs to execute the following command: # route add net gbroadcast dev eth0 c. The system administrator needs to add the name of the host in the /etc/hosts file: 192.165.0.150 broadcast Next, Christine needs to execute the following command: # route add host gbroadcast dev eth0 d. The system administrator needs to add the name of the host in the /etc/hosts file: 192.165.0.150 gbroadcast Next, Christine needs to execute the following command again: # route add host gbroadcast dev eth0 ( Correct Answer: -> d 48/ Jim Lewis is the system administrator with Desktop Computers. He has configured a Linux based LAN in the organization and has installed a print server on the network. Jim has configured both LPRng and CUPS services on the print server to manage multiple packages that provide the same service. He needs to add a group of alternatives to the system and specify the name of a master link. For this, Jim executes the alternatives link --set command, and observes that the command is not working. What could be the problem and what should Jim do to resolve the problem? a. The set option is used only to set alternatives and its links. Jim needs to execute the alternatives name --install command to perform the required tasks. b. The set option is used only to set alternatives and its links. Jim needs to execute the alternatives link --install command to perform the required tasks. c. The link option is incorrect. Jim needs to execute the alternatives name set command to perform the required tasks. d. The specified command is incorrect. Jim needs to execute the alternatives name --display command to perform the required tasks. Correct Answer: -> a 49/ Pat Greene is working as a system administrator at IBG Inc. Pat has created a partition in his system to develop and save the application. The maximum file size of 2 GB is sufficient for Pat to perform his work. The filesystem that he will be using, stores the state of the filesystem in the superblock, and uses this state to verify whether the filesystem contains any errors. Pat needs journaling feature in the filesystem to ensure no data is lost due to system failure. Therefore, Pat wants to create the filesystem that supports the above features. Which filesystem can Pat use to develop the application?

a. ext2Fs b. ext3 c. JFS d. SMBFS Correct Answer: -> b 50/ Smart Solutions Corp is recruiting new employees to expand their customer base. A new employee, Michael joins the organization and is assigned a project that was earlier being handled by Susan. Steve, the system administrator, has changed the ownership of files that contains the required information and set the particular option so that no error message is displayed, if the specified file does not exist at user end. Which command should Steve use for the task? a. chown R b. chown -f c. chown -v d. chown -c Correct Answer: -> b 51/ Martina is working as a system administrator in PQR Corp. Martina finds that some of the computers are displaying an error message, lp: error no default destination available, while giving the command for printing the documents. Which task should Martina perform to troubleshoot this problem? a. Remove the paper that is stuck in the printer. b. Insert fresh paper in the tray. c. Switch on the power supply after checking that the plug is in the socket. d. Install and configure the printer. Correct Answer: -> d 52/ Donna Bard, a system administrator with Countryside Markets, uses Linux as the operating system. She wants to view the group ID of a customer named Mike Womack. When Donna executes the command, grep Mike Womack /etc/passwd, the system raises an error stating grep: Wall: no such file or directory before displaying the required information. How should Donna troubleshoot the problem? a. # grep Mike Womack /etc/passwd b. # grep MikeWommack /etc/passwd c. # grep "Mike Womack" /etc/passwd d. # grep `Mike Womack` /etc/passwd Correct Answer: -> c 53/ Donna Bard works as a network administrator at Countryside Markets. All the employees of the organization work on Linux platform. Various DHCP servers, which assign IP addresses to the computers, are installed on the network. Donna configures the dhcpcd daemon, which broadcasts the request to the DHCP servers to get an IP address. After configuring the daemon, Donna starts her computer. However, Donna notices that the IP address is not assigned to her computer. Donna verifies whether the dhcpcd daemon is running properly or not. She finds that the dhcpcd daemon is running fine. How can Donna troubleshoot the problem? a. Execute the command: route add host 255.255.255.255 dev eth0 b. Check whether the information in the /etc/dhcpd.conf file is correct. c. Execute the dhcpcd command with the r option. d. Execute the dhcpcd command with the f option. Correct Answer: -> d 54/ Nancy Jones is working as a system administrator with Red Sky IT Systems. The network setup of the organization is based on Linux. All employees of the organization save data in their respective home directory on the Linux server. The management of the organization has assigned Nancy the task of taking the backup. Therefore, Nancy configures a central backup server with

multiple backup tape drives. Nancy also wants to create the backup from all the disks listed in the disklist file in the backup server using a single command. In addition, Nancy wants the backup server to send an e-mail message reporting the files that failed to be backed up and the files that were successfully backed up after creating the backup. Which backup utility should Nancy implement to perform the required task? a. Nancy should use the Amanda utility. b. Nancy should use the Veritas utility. c. Nancy should use the dump/restore utilities. d. Nancy should use the cpio utility. Correct Answer: -> a 55/ Donna is an in-house network administrator at Multi Marketing Inc. Donna needs to store the print queue definitions manually, instead of using the redhat-config-printer tool. Which configuration file will Donna use to perform this task? a. /etc/printcap b. /etc/lpd.conf c. /etc/lpd.perms d. /etc/printcap.local Correct Answer: -> d 56/ Consider the following statements: Statement A: You can assign more then one IP address to an NIC. Statement B: You need to create a new configuration file for each NIC that is installed on your computer. Which of the following is true, with respect to the above statements? a. Statement A is true and statement B is false. b. Statement A is false and statement B is true. c. Both, statements A and B, are true. d. Both, statements A and B, are false. Correct Answer: -> c 57/ Consider the statements: Statement A: The passwords should be easy to decipher. Statement B: The passwords should be of adequate length. Which of the following is true, with respect to the above statements? a. Statement A is true and statement B is false. b. Statement A is false and statement B is true. c. Both, statements A and B, are true. d. Both, statements A and B, are false. Correct Answer: -> b 58/ You are the assistant system administrator at Deez Inc. and are required to set a default printer, HP DeskJet on the Sales Managers computer. The printer should be configured to queue the print jobs. Which command should you use for the above task? a. lpadmin b. lpstat c. lp d. lpr Correct Answer: -> a 59/ Peter Irvin is the domain administrator at Mountain Marketing Inc. He has scheduled tasks such as, executing scripts, backing up data and executing the echo command on his computer, such that they are performed automatically at different timings in a day. During the day, how should Peter view the list of the jobs that are yet to be executed? a. atq command b. at command

c. cron command d. atrm command Correct Answer: -> a 60/ Larry Williams is working as domain administrator at Technology Systems. To automate the installation process, Larry has installed Linux on his computer with the help of the kickstart file. Larry needs to install three group packages ServerSystem, WindowsSystem, and WindowsSoftware and two individual packages ClientSystem and MasterSystem on his computer. How should Larry perform the task? a. Larry needs to make the following entries in the kickstart file: ### Package Installation %package @ServerSystem @WindowsSystem @WindowsSoftware ClientSystem MasterSystem b. Larry needs to make the following entries in the kickstart file: ### Package Installation %package @ ServerSystem WindowsSystem WindowsSoftware ClientSystem MasterSystem c. He needs to make the following entries in the kickstart file: ### Package Installation %package @ ClientSystem @ MasterSystem ServerSystem WindowsSystem WindowsSoftware d. He needs to make the following entries in the kickstart file: ### Package Installation %package @ ServerSystem @ WindowsSystem @ WindowsSoftware ClientSystem MasterSystem Correct Answer: -> d 61/ Steve Irving is working as the system administrator at Global Systems Inc., which uses Linux for all business purposes. The organization is working on a project, which requires the team leaders to frequently communicate with each other and with the client. The e-mail utility is not supported efficiently by the existing operating system. Therefore, the management has asked Steve to upgrade the operating system installed on the computers of all the team leaders. Steve has decided to perform this task automatically using a kickstart file. Steve logs on to Jim, a team leaders system and executes the command cp anaconda ks.cfg ks.cfg to create a kickstart file. However, the command is not working. What is the problem and how can Steve solve it? a. The specified root directory is incorrect. Steve should use the name, ethereal, as the root directory. b. The kickstart command can be created only by a root user. Steve needs to log on as the root user and execute the specified command.

c. The command executed is incorrect. Steve needs to use the Kickstart Configurator utility to create the kickstart file. d. The order of specifying the kickstart sections is incorrect. The order of kickstart sections should be command, %pre, %package, and %post. Correct Answer: -> b 62/ The project team of the Software Development department is not able to save their work on the server. When they try to save their work on the server, it shows an error message that there is no space on the hard disk. Therefore, David, the system administrator resizes a partition on the hard disk of the server, which has been allocated for user data. After resizing the partition, when David tries to boot the server he finds that the boot partition fails to mount the boot partition. What is the reason that the boot partition, on the server, fails to mount the boot partition and how should David resolve the error? a. The problem occurs because the partition number of the boot partition, /, is changed. To resolve the error, David needs to switch to the single-user mode and change the entry corresponding to the path of the / partition in the /etc/fstab file. b. The problem occurs because the partition number of the boot partition, /, is changed. To resolve the error, David needs to switch to the emergency mode and change the entry corresponding to the path of the / partition in the /etc/fstab file. c. The problem occurs because the partition number of the boot partition, /, is changed. To resolve the error, David needs to reboot the system in a runlevel and change the entry corresponding to the path of the / partition in the /etc/fstab file. d. The problem occurs because the partition number of the boot partition, /, is changed. To resolve the error, David needs to boot the system in the rescue mode and change the entry corresponding to the path of the / partition in the /etc/fstab file. Correct Answer: -> d 63/ Steve is the system administrator with Red Sky IT Systems. The management of the organization has assigned Steve the task of providing print service to some of the employees of the organization. The employees of the IT department and the Accounts department, at Red Sky IT Systems, want to install printers, locally. Steve decides to install the various printers and configure them using the CUPS daemon to fulfill the requirements of both the departments. Steve also wants to record the information about all the local available printers in both the departments and the new jobs given to the printers. How can Steve perform these tasks? a. Steve can record the information by using the lpstat command, editing the /etc/printcap.local file and then executing the lpadmin command. b. Steve can record the information by using the lpstat command and editing the Info parameter and the Accepting parameter in the /etc/cups/printers.conf file. c. Steve can record the information by using the lpstat command and configuring the LPRng service. d. Steve can record the information by using the lpstat command and editing the Info parameter and the Accepting parameter in the /etc/cups/cupsd.conf file. Correct Answer: -> b 64/ Consider the statements: Statement A: A parallel port sends one bit of information at a time. Statement B: A serial port sends eight bits of information at a time. Which of the following statements is correct? a. Statement A is true and statement B is false. b. Statement A is false and statement B is true. c. Both, statements A and B, are true. d. Both, statements A and B, are false. Correct Answer: -> d 65/ Steve works, as a system administrator at Global Systems Inc. Steve needs to store the data of all the employees centrally at the Linux server. He also wants to ensure that no data is duplicated

across the hard disks. For this, Steve decides to divide the data into strips to store the data across all the hard disks in an array. Which RAID configuration does Steve use for the preceding requirements? a. Linear RAID b. Level 0 c. Level 1 d. Level 5 Correct Answer: -> b 66/ Chris, the system administrator of the company adds a route from his computer to Johns computer by executing the route add host 192.168.16.66 dev eth0 command. Chriss computer raises an error, 192.168.16.66: Unknown host. Which of the following task should Chris perform to solve this problem? a. Add the name of the host in the /etc/hosts file of the computer. b. Check all the DHCP servers in the network. c. Add the dhcpcd daemon to the boot-up script, (/etc/sysconfig/network-scripts/ifup) d. Execute the dhcpcd command with the f option. Correct Answer: -> a 67/ Ronald Billing works as a system administrator at Mastery Mechanics. The organization has installed a network printer, which is used by various systems over the network for printing the documents related to various projects. The printer is not working properly since last couple of days. Therefore, Ronald replaces the printer with a new one, configures it and starts the print service. However, when John, an employee of the organization uses the printer, a problem occurs. The printer shows a staircase effect. John informs Ronald about the problem. How can Ronald troubleshoot the problem that occurs while printing the documents? a. 1. Open the /etc/hosts.equiv or the /etc/hosts.lpd file. 2. Stop and restart the print service. b. 1. Open the /etc/hosts.equiv or the /etc/hosts.lpd file. 2. Add the IP addresses of the remote hosts. 3. Stop and restart the print service. c. 1. In the printtool utility, edit printer entry and click on Select _ button to open the Configure Filter dialog box. 2. Select the correct driver for your printer. d. 1. In the printtool utility, edit printer entry and click on select _ button to open the Configure Filter dialog box. 2. Select the Fix stair-stepping text option under the Printing _ Options section. Correct Answer: -> d 68/ Jim Wilkins is working as a storage administrator at Blue Moon Computers. Jim implements Integrated Device Electronics (IDE) to determine the physical limits of the storage scalability in the organization. However, the organization wants Jim to extend a systems local storage beyond the limitations of IDE. Which of the following Jim can implement to perform the task? a. Fibre Channelbased storage b. SCSI c. iSCSI a. a and b both b. Only a c. Only b d. a and c both Correct Answer: -> d 69/ Steve Irvin is working as an IT consultant at Red Eye Experts. The organization consists of 5000 desktops running on multiple platforms, such as Linux and Windows, and connected through LAN and WAN. Steve needs to identify a tool to automate and centralize the management of desktops in the organization. He also needs to identify a tool that can implement policy-based management of

desktops in the organization. Which tool should Steve select for this? a. WebTMA b. Unicenters Desktop Management Solution c. Radmin d. PMP 6.0 Correct Answer: -> b 70/ Which of the following activity should be performed to manage VPNs in an enterprise? a. Use a secure remote syslog server to make it difficult for the malicious user to manipulate the log. b. Enforce strong authentication based on the volume of remote users and value of the resources that are being accessed. c. Use biometrics mechanisms to protect IT infrastructure from thefts or unauthorized attacks. d. Ensure that all executable files, which you receive in the organization through e-mail, are checked and approved. Correct Answer: -> b 71/ Donna Johnson is working as an IT Consultant in Super Software 2000. Super Software 2000 is a large organization, which is spread across many countries and functions through distributed network system. Donna is getting complaints regarding performance problems in Internet, intranet, and extranet resources of the organization. Which of the following tool or solution should Donna use to monitor and troubleshoot LAN, WAN, and VLANs? a. HP OpenView Network Management Solution b. Unicenter Network Management Solution c. Observer 10.1 d. LANBrowser 1.3 Correct Answer: -> b 72/ Jim Lewis is working as a system administrator at Good Graphics Inc. Jim wants to use a multiplatform security management solution that can provide plug-in-integration between the security tool and the solution to collect the alerts. Which one of the following solution should Jim use to perform the required task? a. HP OpenView Security Management Solution b. IBM Tivoli Security Compliance Manager c. LANBrowser 1.3 d. WebScout 2.1 Correct Answer: -> a 73/ Red Eye Systems Inc. is a software development company. The company is planning a new software development facility in Arizona. This facility will develop system software in C/C++ on UNIX platform. Because this is a new project the company does not want to invest heavily in computing resources. In addition, the development process does not require too many resource consuming tools, except for C/C++ compilers, CLI debugging and testing tools and UNIX platform. The programmers will not be allowed to share files and folders as the code will be integrated in the next step of the SDLC. Which of the following computing model would you suggest to the company as a networking consultant? a. Centralized network computing model with thin clients b. Centralized network computing model with thick clients c. Distributed network computing model with thick clients d. Collaborative network computing model Correct Answer: -> a 74/ Which of the following can be termed as necessary services? a. Services that must be available at peak load b. Services essential to operation c. Services that must be available, but can be available at reduced performance. d. Services that can be postponed indefinitely

Correct Answer: -> c 75/ Consider the following statements: Statement A: Optional services are the services that must be available at peak load. Statement B: Integrity requirements of QoS maintain the definiteness of the interaction between the server and the user. Which of the following is correct? a. Both, statement A and B are true b. Statement A is true and statement B is false c. Statement A is false and statement B is true d. Both, statement A and B are false Correct Answer: -> c 76/ Donna Johnson is working as an IT consultant at Red Eye Experts. The organization needs to implement effective server solutions to increase employee productivity and reduce operating costs. Donna is assigned the task of implementing servers that can handle the services running in the HPC layer of the server deployment architecture of the organization. The organization also asks Donna to implement servers for file and printing services. Which servers Donna will implement to perform the task? a. Donna needs to implement high-end servers, such as OLTP Med and BI servers. b. Donna needs to implement infrastructure servers. c. Donna needs to implement servers that have large memory, can store very large data sets, and can take load of high transaction volumes, such as ERP Large servers, OLTP Large servers. In addition, Donna needs to implement workgroup servers. d. Donna needs to implement high-end servers, such as HPC servers and OLTP large. Correct Answer: -> c 77/ Which of the following is caused by variations in queue length and the processing time needed to reorder packets arrived out of order due to travelling over different paths? a. Jitter b. Throughput c. Availability d. Packet loss Correct Answer: -> a 78/ Mike Womack is working as a storage administrator at Red Eye Experts. Mike is assigned the task of selecting an efficient storage technology for the organization that suits its requirements. The organization wants Mike to select a storage technology that can enable multiple users to share the same storage space thus minimizing the overall overheads by centrally managing hard disks. Which storage technology Mike should select to perform the assigned task? a. Redundant Array of Inexpensive Disks b. Tape Drives c. Storage Area Networks d. Network-Attached Storage Correct Answer: -> d 79/ Larry Williams is working as a network administrator in Blue Valley Consulting. Larry is assigned the task of selecting an appropriate network technology in the enterprise. Larry needs to set up networks within a building of the enterprise. Therefore, Larry chooses LAN technology to be implemented in the building. Larry observes that there are too many computers, which are required to be attached to LAN. Therefore, Larry needs a technology that reduces the number of data packet collisions and can deliver up to 80 percent of the maximum bandwidth available. In addition, Larry needs to decide the physical media that have multiple pairs of wires to connect the computers and reduces network crosstalk by negating the electro-magnetic field. Which of the following combination should Larry choose to perform the required task? a. Token ring and Coaxial cables

b. Ethernet and Coaxial cables c. Token ring and Twisted pair cables d. FDDI and Fiber optic cables Correct Answer: -> c 80/ Global Systems Inc. is a software development organization with its three branch offices in different parts of America. John Wilkins is working as system administrator at the head office of the organization at Los Angeles. The employees working at the branch offices complain to John about the poor performance of the FTP server placed at the branch office at New York. To solve the problem, John needs to remotely monitor the CPU, disk, and memory usage of the server. Which tool should John implement to perform the task? a. PMP 6.0 b. Radmin c. Symantec ON iPatch d. PCDuo Enterprise Correct Answer: -> a 81/ Which of the following activity should be performed to manage internet access of an enterprise for security? a. Keep track of who has accessed information each time a device connects to the LAN. b. Keep the version of the operating system updated. c. Block the file types such as EXE, COM, BAT, VBS, and SCR that carry virus. Also block any file type with more than one extension such as, ABC.TXT.VBS. d. Ensure that configuration settings should not be accessible to all users. Only designated people should be able to access them. Correct Answer: -> c 82/ Steve Irwin is an IT Consultant in the head office of Global Systems Inc. The regional offices of Global System Inc. are spread across north, east, south, and west regions. There are 1000 workstations in each office, which run on Windows platform. Steve needs an enterprise-level network management solution, which includes report scheduler for generating deliver reports, packet capture scheduling, and monitor for network delay. Which of the following tool or solution should Steve consider, which contains all these features? a. Unicenter Network Management Solution b. LANBrowser 1.3 c. OpManager 5.5 d. Observer 10.1 Correct Answer: -> d 83/ Steve Irwin is working as a security administrator at Red Eye Experts. Steve has configured Symantec Client Security tool to protect the enterprise client systems from security risks and threats. Steve needs to use the tool to enhance intrusion prevention solutions reducing the time and cost. Which of the following features will enable Steve to perform the required task? a. Optimized out-of-the-box firewall b. Generic Exploit Blocking c. Side effect repairing d. Centralized configuration Correct Answer: -> b 84/ Which of the following requirements represents the degree of being capable of maintaining the service and service quality by a server? a. Performance b. Integrity c. Accessibility d. Reliability Correct Answer: -> d

85/ Lee Johnson is a IT consultant at Red Sky IT system. Lee is assigned the task to plan desktop solutions for the organization. Lee wants to implement the devices that have word processors, spreadsheet applications, calendars, and E-mail clients installed on them. Which type of device should Lee implement to perform the above task? a. Java-based mobile devices b. PALM-based mobile devices c. Windows CE-based mobile devices d. Linux based mobile devices Correct Answer: -> a 86/ SuperSoftware Inc is planning to implement IT infrastructure in the organization. As a part of planning IT infrastructure, SuperSoftware Inc needs to plan for effective desktop solutions to help users to perform day-to-day operations, increase user productivity, and improve business processes. For this, the organization asks Anne Johnson, an IT consultant to analyze the business and technical requirements for planning desktop solutions and identify an appropriate desktop technology on the basis of the requirements. On analyzing the requirements, Donna notices that he needs to select desktop technologies for the desktop users who need to work on packages involving heavy graphics. In addition, Donna needs to select a technology having more storage capacity than phone handsets for the mobile users of the organization. Identify the desktop and mobile technologies that Donna need to select to perform the task? a. Macintosh clients and Java-based mobile devices b. Linux clients and PALM-based mobile devices c. Macintosh clients and PALM-based mobile devices d. Linux clients and Java-based mobile devices Correct Answer: -> c 87/ Which of the following questions you need not answer while finalizing internal access security? a. What are the processes to deal with change in access permissions granted to an employee? b. What are the processes to evaluate the access permissions granted to an employee? c. What are the methods to identify unauthorized access and prevent it? d. What are the administrative levels in the organizations and what data and system access permissions do they need? Correct Answer: -> c 88/ Tom Wilkins is the member of the team planning for an effective storage solution in Red Eye Experts. Red Eye Experts is a very big enterprise spanned across different areas of world, therefore, Tom needs to plan for the storage solution that can be accessed over a network and minimize the overall overheads by centrally managing hard disks. Keeping in mind all these considerations, Tom plans to use NAS in the enterprise that enables multiple users to share the same storage space. Which of the following feature will help Tom to accomplish his task? a. Server attached approach to data storage b. Access to storage pool c. 100 MB/s full duplex data transfer rates d. Data regenerating hard disks Correct Answer: -> a 89/ Steve Irvin is the IT consultant at Red Eye Experts. Steve needs to identify an asset management solution that would enable the IT staff of the organization to access the asset management and maintenance information of the desktops from any location and at any time through the Internet. In addition, Steve needs to identify a scalable asset management solution in which additional modules can be added in future if the organization expands. Identify an appropriate asset management solution. a. Radmin b. Altiris Asset Management Suite c. WebTMA

d. ManageEngine ServiceDesk Plus Correct Answer: -> c 90/ Which of following network management tool can be used to secure the network from internal attacks by monitoring event logs? a. Observer 10.1 b. OpManager 5.5 c. Unicenter Network Management d. LANBrowser 1.3 Correct Answer: -> b 91/ Pat Wilkins is a system administrator in the head office of Red Eye Experts, which is a large and complex organization spread across many countries. Pat wants to remove all kinds of complexities that are associated with network management for effective and efficient working of the organization. Donna Johnson is the IT consultant in Red Eye Experts. Pat assigns Donna the task of finding a multi-platform solution that discovers the entire network and can automate several network monitoring tasks. To perform this task, Donna wants a solution that includes WAN monitoring, server monitoring, URL monitoring, and switch monitoring. Which of the following tool or solution is appropriate to include all these features? a. OpManager 5.5 b. HP OpenView Network Management Solution c. LANBrowser 1.3 d. Unicenter Network Management Solution Correct Answer: -> a 92/ Jim Lewis is working as a security administrator in Blue Moon Computers. Jim needs to use a Windows-based tool that monitors and filters Internet access for Web sites and Internet applications. Jim wants that the tool should record the bandwidth and time each user or workstation has spent in accessing Internet on periodic basis. Which of the following tool should Jim use to perform the required task? a. OpManager5.5 b. Observer10.1 c. WebScout 2.1 d. Symantec Client Security Correct Answer: -> c 93/ The management at Bluemoon Computers Inc. wants to secure its network from external intrusions. The computers on the network are running on a number of different operating systems, such as Windows, Solaris, Linux, and Macintosh and have software firewalls installed on them. The management is very cost conscious and also apprehensive that the level of security might not affect the network performance. Therefore, it has been decided that only one extra level of security will be implemented. Which of the following security measures will you suggest as a networking consultant? a. Host-based Intrusion Detection System (HIDS) b. Network-based Intrusion Detection System (NIDS) c. Combination of NIDS and HIDS d. No IDS is required as the computers have firewalls installed on them Correct Answer: -> b 94/ Which of the following business factors enables you to determine the technologies that can be used to establish network connections between different branch offices of an organization? a. Business processes b. Organization structure c. Geographical scope d. Business applications Correct Answer: -> c

95/ Which of the following can be termed as strategic services? a. Services that must be available at peak load b. Services essential to operation. c. Services that can be postponed indefinitely. d. Services provided by servers that must be available, but can be available at reduced performance Correct Answer: -> b 96/ Pat Wilkins is working as an IT Consultant at Global Softwares. Pat is assigned the task to plan desktop solutions for the organization. Pat needs to implement devices that have more storage capacity than phone handsets. The devices should also have the capability to run java-based dynamic applications. Which of the following devices Pat should implement to perform the task? a. Windows CE-based mobile devices b. PALM-based mobile devices c. Java-based mobile devices d. Linux based mobile devices Correct Answer: -> b 97/ Corrine Wallace is working as an IT consultant at Blue Moon Computers. The organization is planning to implement an IT infrastructure. The management of the organization notices that organization requires servers at entry level of business operations to implement IT infrastructure. Therefore, organization assigns Corrine the task of planning server solutions for business operations, such as caching services and proxy services. In addition, the organization is required to provide file and print services. Which servers Corrine will implement to fulfil the requirement of the organization? a. Web servers and Workgroup servers b. Infrastructure servers and Mail servers c. HPC servers and Infrastructure servers d. Workgroup and HPC servers Correct Answer: -> a 98/ Which of the following questions you need to answer while planning security for external access? a. What are the processes to deal with change in access permissions granted to an employee? b. What are the processes to evaluate the access permissions granted to an employee? c. What are the methods to identify unauthorized access and prevent it? d. What are the administrative levels in the organizations and what data and system access permissions do they need? Correct Answer: -> c 99/ Pat Wilkins is working as an IT consultant at Safest Software Inc. The organization is planning for network solutions to facilitate faster information sharing. Pat is assigned the task to determine the number and the type of hardware and software resources required on a network. Pat needs to size the network to perform the task. Which of the following factors Pat needs to consider to perform network sizing: a. Number of Remote Users b. Proactive Fault Management c. Number of People Using the Network d. Software Specifications e. Application Performance a. a, b, c, and e b. a, c, and d c. a, b, c, and d d. b, c, d, and e Correct Answer: -> b

100/ Pat Wilkins is working as a network administrator in Super Software Inc, which is spread over a vast geographical area. Pat needs to use WAN communication service to create an inter-network of networks. Pat needs to use a technology that can support very high-speed data transfers to the tune of 640 kbps in both directions and carries high-speed data and multimedia over telephone lines. In addition, Pat wants another technology, which is used for Point-to-Point networks and for backup for another type of link. Which of the following combination of WAN technologies should Pat use to complete the required task? a. ISDN and Frame Relay b. ADSL and Leased lines c. SMDS and X.25 d. ADSL and Analog modems Correct Answer: -> d 101/ Consider the following statements: Statement A: WebTMA and ManageEngine ServiceDesk Plus are Web-based asset management solutions. Statement B: The Altiris Asset Management Suite has a snap-in modular design. Which of the following is correct about the above statements? a. Statement A is False and Statement B is True. b. Statement A is True and Statement B is False. c. Both, Statement A and Statement B are True. d. Both, Statement A and Statement B are False. Correct Answer: -> c 102/ Consider the following statements: Statement A: ManageEngine ServiceDesk Plus is a Web-based asset management solution. Statement B: ManageEngine ServiceDesk Plus provides a helpdesk for troubleshooting desktoprelated problems. Which of the following is correct about the above statements? a. Statement A is False and Statement B is True. b. Statement A is True and Statement B is False. c. Both, Statement A and Statement B are True. d. Both, Statement A and Statement B are False. Correct Answer: -> c 103/ Which of the following tool can be used as a network monitor and protocol analyzer for Ethernet, wireless 802.11b/a/g, token ring, and FDDI networks? a. Observer 10.1 b. LANBrowser 1.3 c. HP OpenView Network Management d. Unicenter Network Management Correct Answer: -> a 104/ Steve Irwin is an IT consultant in Blue Moon Computers. Steve wants an enterprise-level tool for network management that helps in scanning the entire network by searching and configuring properties of all the devices of Windows NT/2000 enterprise. The tool should search for errors, audit information, connected users, and share permissions. Which of the following tool do u think is appropriate to perform this task? a. OpManager 5.5 b. Observer 10.1 c. LANBrowser d. HP OpenView Network Management Solution

Correct Answer: -> c 105/ Corrine Wallace is working as a storage administrator at Technology Systems. The workstations in Technology Systems are running on multi-platform systems. Corrine finds that to manage storage devices effectively, he needs to use a tool or solution that manages the backup and recovery tools centrally and can monitor the storage environment remotely. Which of the following tool should Corrine use to perform the task? a. Storix System Backup Administrator b. BrightStor ARCserve Backup for Laptops & Desktops Release 11 c. VERITAS Backup Exec10 d. BrightStor Storage Resource Manager Correct Answer: -> d 106/ The management at Bluemoon Computers Inc. has decided to connect it corporate office to all of its regional offices. The local networks at regional offices are to be identified by the different subnets of the same IP address class 172.16.0.1. The regional offices are using different platforms for their networks, such as Windows, Linux, Macintosh, and Solaris. Because the corporate network will be connected to all these regional offices round the clock, it will be very essential to restrict the broadcast produced by all the networks and filter in the ones that are specifically meant for the corporate office. Which of the following network devices will you suggest to facilitate this connectivity as a networking consultant? a. Hub b. Switch c. Router d. Layer 2 Switch Correct Answer: -> c 107/ What is the configuration requirements of the desktops used in help desks? a. Following are the configuration requirements of the desktops used in help desks High quality printers Voice Over IP integration Computer telephony integration b. Following are the configuration requirements of the desktops used in help desks Thin-client computers Voice Over IP integration Computer telephony integration c. Following are the configuration requirements of the desktops used in help desks Thin-client computers Voice Over IP integration Fast processing capabilities d. Following are the configuration requirements of the desktops used in help desks Thick-client computers Voice Over IP integration Computer telephony integration Correct Answer: -> b 108/ Corrine Wallace is working as IT consultant at Blue Moon Computers. Corrine is assigned the task of determining the service usability and utility of servers in the organization. For this, Corrine needs to determine the time it takes to repair a service that has failed on the servers. Which of the following requirements Corrine needs to analyze to perform the task? a. Accessibility b. Availability c. Integrity d. Performance Correct Answer: -> b

109/ Safest Software wants to ensure uninterrupted execution of business activities and increase productivity and profitability of an enterprise. For this, the organization decides to implement server solutions in the organization to handle its routine and critical business applications. The management of the organization notices that organization requires servers at every level of business operations. Therefore, organization hires Pat Wilkins, an IT consultant to analyze the business processes and requirements that needs to be considered for planning server solutions and implement servers in the organization. After analyzing the requirements Pat realizes that he needs to implement servers for the following: File and print services Firewall and security services Provide clustered computing system Handling complex interactions Which server Pat needs to implement to perform the task? a. Workgroup server only b. Web servers. c. Workgroup and Infrastructure servers d. Workgroup, Infrastructure, HPC, and high-end servers, such as ERP and Application Tier servers. Correct Answer: -> d 110/ Which of the following is not included in the security policy of an IT infrastructure? a. Roles and responsibilities for various employees. b. Establishment of trust among clients and employees to gain their confidence c. Rules regarding the use of various organizational resources, such as computers, the Internet, or e-mail. d. Geographical Scope of the organization Correct Answer: -> d 111/ Donna Johnson, a network administrator is planning for the network solutions for the Mountain Marketing Inc. Donna needs to avoid network congestion by managing data flows. For this _donna needs to determine QoS of the organizations network. Which of the following factors cannot help Donna determine QOS of the network: a. Throughput b. Business applications c. Availability d. Jitter e. Size and Geographical Scope a. b and e b. d and b c. d and e d. d, e, and b Correct Answer: -> a 112/ Donna Bard is working as a security administrator in Safest Software Inc. Donna needs to deploy a security method in the enterprise that can protect IT infrastructure from both external as well as internal attacks. Donna receives complaints that unnecessary data, such as video and graphic files are entering the network from outside. Therefore, Donna wants that the security method should filter out the incoming traffic to stop the unnecessary data consuming the network bandwidth. Donna also wants to use another software that provides encryption technologies, digital certificates, and certificate to protect the security of their communications and business transactions on the Internet. Which of the following combinations of security methods should Donna use to provide enterprise-wide network security? a. PKI and VPNs b. VPNs and IDS c. IDS and Firewalls d. Firewalls and PKI

Correct Answer: -> d 113/ Which of the following tool can be used to build reports to identify the under-utilized storage space? a. BrightStor Storage Resource Manager b. HP OpenView Storage Area Manager c. BrightStor ARCserve Backup for Laptops & Desktops d. Storix System Backup Administrator Correct Answer: -> b 114/ Corrine Wallace is working as an IT consultant in the head office of Safest Software. Safest Software is a large enterprise with distributed network in six branches across four countries. The workstations in each office are running on multi-platform, such as Linux and Windows. Steve Irwin is the system administrator of the head office. Steve assigns Corrine the task of providing a network management solution, which combines the software, services, support, and training to manage the network proactively by optimizing performance and availability of the distributed network system of Blue Moon Computers. Which of the following tool or solution should Corrine choose to perform this task? a. HP OpenView Network Management Solution b. Unicenter Network Management Solution c. OpManager 5.5 d. LANBrowser 1.3 Correct Answer: -> a 115/ Pat Greene is working as a storage administrator at Blue Moon Computers. Pat is assigned the task of managing archives in an enterprise. Pat needs to protect the data stored in archived media from mishandling or natural disasters. Which of the following activity should Pat perform to complete the task? a. Ensuring that archive media does not exceed the safe limits b. Storing the data with the same retention period c. Maintaining a record of the archival media, files, and folders d. Maintaining the duplicate copy of the archived data Correct Answer: -> d 116/ Red Eye Systems Inc. wants a plan for security implementation at a new software development facility in New York. The company wants the facility to have at least five levels of authentications for any data that is accessed from a remote location as well as for the data sent to a remote location. The management wants to implement both host-based and network-based IDS and wants to put a firewall after each VPN gateway that will be used for connecting remote users. In addition, the management has a very stringent administrative policy, which requires even a single change in user permissions to be approved by a hierarchy of officials. In addition, the management has decided to conduct weekly security audits during which the network at the facility would be non-operational. As a networking consultant, according to you which of the following business or technical requirements will be affected because the security requirements? a. Availability, geographical scope, and business applications b. QoS, Performance, and availability c. User and resource distribution d. Security policies Correct Answer: -> b 117/ New tech book is multinational organization with various bookstores in various parts of USA. To expand its customer base globally and to automate its business process the organization launches an e-commerce site on the Internet. To protect its business processes from disruption, the organization asks Anne Donaldson to plan for the availability of the website. Identify the considerations Anne needs to keep track of to plan for the availability of the website. To protect data losses in the event of disasters, the organization also asks Anne to plan tasks for

maintaining availability and backing up critical data of the website. What should Anne do to perform the task? a. Anne needs to keep track of the following considerations while planning for the availability of the website: Criticality of the data Amount of downtime that the organization can afford Cost of reducing downtime in the organization In addition, Anne needs to consider the frequency of planned downtime while setting the availability goals to plan for appropriate backup strategies and maintenance tasks to maintain availability. b. Anne needs to keep track of the following considerations while planning for the availability of the website: Amount of data that a network can carry Amount of data that is successfully transferred over the Internet Ratio of error-free data transmission to total transmission. In addition, Anne needs to consider the frequency of planned downtime while setting the availability goals to plan for appropriate backup strategies and maintenance tasks to maintain availability c. Anne needs to keep track of the following considerations while planning for the availability of the website: Criticality of the data Amount of downtime that the organization can afford Cost of reducing downtime in the organization In addition, Anne needs to consider the frequency of unplanned downtime while setting the availability goals to plan for appropriate backup strategies and maintenance tasks to maintain availability. d. Anne needs to keep track of the following considerations while planning for the availability of the website: Amount of data that a network can carry Amount of data that is successfully transferred over the Internet Ratio of error-free data transmission to total transmission. In addition, Anne needs to consider the frequency of unplanned downtime while setting the availability goals to plan for appropriate backup strategies and maintenance tasks to maintain availability Correct Answer: -> a 118/ _______ management enables you to manage the leased assets in an enterprise by informing you about the end of the lease period. a. Asset b. Event c. Remote d. Desktop configuration Correct Answer: -> a 119/ Identify the tasks performed by the help desk in an enterprise. a. Create security policies for securing the desktops. b. Provide an online knowledge base that provides solutions to problems. c. Log and monitor the problems of desktop users. d. Provide centralized support for troubleshooting problems of desktop users. Select the correct option. a. a, c, and d b. a, b, and d c. b, c, and d d. c and d Correct Answer: -> c

120/ Steve Irvin works in the Helpdesk department of Global Systems Inc. Currently, the organization uses a decentralized and manual method for managing and maintaining IT resources. The CIO of the organization notices that the decentralized and manual method for managing and maintaining IT resources is prone to errors and requires a huge amount of time, and effort. To solve the problem, the CIO asks Steve to identify a tool that can keep track of the IT resources and enable the IT staff to perform the following tasks in the organization: Determine which IT resources are to be upgraded or replaced Keep track of the end of the lease period of the IT resources Keep track of the software having expired licenses Determine which users have particular software packages installed Centrally manage the implementation of software patches across the enterprise Centrally manage the distributed IT resources Identify the tool that is most appropriate to perform the preceding tasks. a. Remote management tool b. Event management tool c. Asset management tool d. Desktop standardization tool Correct Answer: -> c

Q8 Linux Review (77 questions)


No. Question Which of the following group is used to assign rights and permissions to members who perform similar operations and access similar resources in any domain in the forest? 1,Universal group 2,Domain local group 3,Security group 4,Distribution group Ans

Which of the following options are used with the DSMOD and DSADD commands to create user-specific profile folders? 1,$Username$ 2,CN=Username 3,%Username% 4,#Username# Which command-line tool enables you to identify user and group accounts that have not been used for the past 3 months? 1,DSMOD 2,DSQUERY 3,DSADD 4,DSGET You are the system administrator of CellGo. You want to hide one of the file server drives from the domain end users. How will you achieve it with minimum administrative cost? 1,Disable the view option from the registry of each machine. 2,Open Active Directory and remove the Share from the snap-in. 3,Share the drive with a name ending with $. 4,Share the drive with the name Admin$. James has been appointed as a junior system administrator and his boss has assigned him the responsibility of managing performance logs, counters, and alerts. When James tries to open the Performance console, an Access Denied error message is generated. Which of the following options is a possible solution to this problem? 1,James should be included in the Performance Users group. 2,James should be included in the Log and Alert Users group. 3,James should be included in the Performance Log Users group. 4,James should be included in the Performance Alert Users group. Consider the following two statements:

Statement A: In stand-alone DFS, a server stores and administers the DFS tree structure from a central location. Statement B: A domain-based DFS is hosted on several domain controllers or member servers.

Which of the following is correct about the above statements? 1,Both, Statement A and Statement B are False. 2,Both, Statement A and Statement B are True. 3,Statement A is True and Statement B is False. 4,Statement A is False and Statement B is True.

Which tab of the Advanced Security Settings dialog box enables you to view user or group permissions on files and folders? 1,Permissions 2,Auditing 3,Owner 4,Effective Permissions You are the system administrator of Fresh Juices Inc. You want that only the employees of the sales department should be able to use the laser printer. Which of the following options will enable you to ensure that only the sales department has access to the printer? 1,Create a Security group for the sales department. 2,Create a Global group for the sales department. 3,Create a Universal group for the sales department. 4,Create a Domain local group for the sales department. Which of the following options distinguishes between a user account and a user template? 1,Password never expires. 2,Account is disabled. 3,Password is disabled. 4,Account never expires. You are the system administrator of your organization. You want to create a customized console containing the following administrative tools:

Active Directory Users and Computers Computer Management Event Viewer

10

Which of the following options will enable you to perform this task with the least administrative effort? 1,Create consoles for each tool on the desktop. 2,Create a console containing the required tools using the DSMOD command-line utility. 3,Create a console containing the required tools using MMC. 4,Create a console containing the required tools using the Active Directory Users and Computers tool. Which file system provides file and folder level security? 1,FAT 2,FAT 16 3,FAT 32 4,NTFS

11

12

As a system administrator, you need to assign permissions to James so that he is able to modify the settings of GPOs. Which permissions do you need to give to James? 1,Write 2,Read and Write 3,Write and Execute 4,Apply Group Policy You are the system administrator of your organization. You are currently logged on to your computer and you want to determine the policies applied to your computer. Which of the following options will enable you to do so? 1,Run the Active Directory Users and Computers wizard. 2,Run the gpresult.exe utility from the command prompt. 3,Run Group Policy Object Editor. 4,Run the gpupdate.exe utility from the command prompt. Consider the following statements:

13

Statement A: Local GPO is stored in the %Systemroot%\System\GroupPolicy folder. Statement B: Default Domain Controllers Policy GPO is linked to the domain controllers organizational units and affects only the domain controllers. Statement C: The Default Domain Policy GPO is available only for the users in an organizations domain.

14

Which of the following options is correct about the above statements? 1,Only Statement C is True. 2,Only Statement B is True. 3,Only Statement A is True. 4,Statements A, B, and C are False. Which GPO is linked to the domain and affects all the users and computers included in the domain as well as the domain controller? 1,Default Domain Controllers policy 2,Default Domain policy 3,Default GPO based policy 4,Default Domain GPO based policy Which of the following parameters of the Gpupdate command enables you to specify any one of the user or computer Group Policy that needs to be refreshed? 1,/Target 2,/Boot 3,/Logoff 4,/Force

15

16

17

You are a system administrator in Blue Sky IT Systems. As a security measure, you want to ensure that users do not add new programs and applications from the network. Which Group Policy should you configure so that you can prevent users from installing new programs over the network? 1,Configure the Hide programs from your network option. 2,Configure the Hide applications from your network option. 3,Configure the Hide programs/applications from your network option. 4,Configure the Hide programs from your network page. Consider the following statements:

Statement A: The User Configuration node specifies Group Policies that can be applied to users, regardless of which computer they have logged on to. Statement B: GPOs can be applied to Windows 95, Windows 98, and Windows XP Professional computers.

18

Which of the following options is correct about the above statements? 1,Both, Statement A and Statement B are False. 2,Both, Statement A and Statement B are True. 3,Statement A is True and Statement B is False. 4,Statement A is False and Statement B is True. Which of the following options specifies whether a GPO is enabled or disabled? 1,Version Information 2,Status Information 3,List of extensions 4,List of GPO Which component of the Administrative Template node includes User Profiles, Scripts, Logon, Ctrl+Alt+Del Options, Group Policy, and Power Management? 1,Network 2,System 3,Windows Components 4,Computer Consider the following statements:

19

20 21

2 4

Statement A: A Group Policy is applied to a site, domain, and the forest. Statement B: The Default Domain Policy is a default GPO that is created when Active Directory is installed.

Which of the following options is correct about the above statements? 1,Statement A is True and Statement B is False. 2,Both, Statement A and Statement B are True.

3,Both, Statement A and Statement B are False. 4,Statement A is False and Statement B is True. Consider the following statements:

Statement A: Group Policy Management Console is an in-built feature of Windows Server 2003 operating system. Statement B: Group Policy Object Editor can be downloaded from www.microsoft.com.

22

Which of the following options is correct about the above statements? 1,Statement A is True and Statement B is False. 2,Both, Statement A and Statement B are True. 3,Both, Statement A and Statement B are False. 4,Statement A is False and Statement B is True. For security and performance reasons, you want that any user who has remained idle for 15 minutes should be disconnected from the Terminal Services server. In addition, you want that if the disconnected user does not reconnect within 15 minutes, his session should be terminated. Which of the following options will enable you to perform this task with least administrative effort? 1,Specify appropriate session-related settings for each user account. 2,Create a security group and specify appropriate session-related settings for the group. 3,Configure session-related settings for the Terminal Services connection. 4,Configure an alert in System Monitor that sends you a notification each time a user reaches the specified limit. You observe that each time you run the program, escape.exe, the computer slows down significantly. You decide to set the priority of the program to low. Which of the following options will enable you to perform this task? 1,Task Manager 2,System Monitor 3,Performance Console 4,Service Manager

23

24

25

When James runs the application, uinstall.exe, he observes that the computer slows down and the application hangs. James is unable to close the application by using the Close button. Which of the following options should James use to exit the application? 1,System Monitor 2,Performance Logs and Alerts 3,Task Manager 4,Performance Console You are installing Windows Server 2003 on a computer with the following configuration:

Pentium 350 MHz 128 MB RAM 4.5 GB Hard Disk During installation, setup displays the error message, ERROR_DATATYPE_MISMATCH.

26

What does this error message indicate? 1,The Windows Installer service has failed to start. 2,The data entered is invalid. 3,One of the parameters entered is invalid. 4,The data entered is of incorrect type. Consider the following statements:

Statement A: Minimum 133 MHz Pentium CPU is required for installing Windows Server 2003. Statement B: 733 MHz Pentium CPU or higher is recommended for installing Windows Server 2003.

27

Which of the following is correct about the above statements? 1,Both, Statement A and Statement B are False. 2,Both, Statement A and Statement B are True. 3,Statement A is True and Statement B is False. 4,Statement A is False and Statement B is True. Which component of Active Directory needs to be installed on an NTFS partition? 1,Active Directory log files 2,SYSVOL folder 3,Windows Server 2003 operating system 4,Active Directory database

28

29

You are the system administrator of Blue Sky Systems. You have created separate organizational units for each department and applied different Group Polices to the employees of each department. Depending on the designation and experience of employees, you have granted rights and permissions to the employees. Susan who was working as a Project Manager in the IT department has resigned and John has joined in her place. What is the best method to provide John the same access and privileges that Susan has? 1,Use Active Directory Users and Computers to create a new user account in the name of John and assign the same rights and privileges as assigned to Susan. Delete Susans user account. 2,Use Active Directory Users and Computers to rename Susans user account and reset the password. 3,Use Computer Management to add John as a new user and put him in the same group as Susan. Delete Susans user account. 4,Use Computer Management to add John as a new user and apply all the policies, rights and permissions that were applied on the user account of Susan to John one by one. Which of the following enables you to centrally administer files and applications over a network? 1,Group Policy 2,User Accounts 3,NTFS 4,Shared folder Which of the following NTFS file permissions enables you to grant permissions and take ownership of a file? 1,Write 2,Read and Execute 3,Full Control 4,Modify Which administrative shared folder is used to access the C:\WINDOWS\SYSTEM32\spool\drivers folder of Windows Server 2003 computer from the client computer? 1,Admin$ 2,Print$ 3,C$ 4,D$ Identify the NTFS folder permission that enables users to only view the names of files and subfolders contained within a folder? 1,List folder contents 2,Full Control 3,Modify 4,Read and Execute

30

31

32

33

34

Which command-line tool enables you to create domain computer accounts in Active Directory? 1,DSGET 2,DSADD 3,NETSH 4,DSRM Which group has the right to create computer accounts in an organizational unit? 1,Enterprise Admins on a server 2,Server Operators on a domain controller 3,Server Operators on a server 4,Account Operators on a domain controller Which of the following is the minimum NTFS permission required to open documents and run programs stored in a shared folder? 1,Read and Execute 2,Full Control 3,Modify 4,Write Consider the following statements:

35

36

Statement A: Security group is a group on which rights and permissions can be applied to access network resources. Statement B: Distribution group is a group created to define distribution lists for directory-enabled e-mail applications.

37

Which of the following options is correct about the above statements? 1,Both, Statement A and Statement B are False. 2,Statement A is False and Statement B is True. 3,Statement A is True and Statement B is False. 4,Both, Statement A and Statement B are True. As a system administrator, you want to apply enhanced security settings on the computers of the Sales department of your organization in addition to the security settings already applied. You want that the new security settings should define security settings for auditing of events. However, you do not want that the new security settings should interfere with the applications running on the computers of the Sales department. Which of the following security templates will enable you to perform these tasks? 1,Rootsec.inf 2,DC Secure.inf 3,Secure*.inf 4,hisec.inf

38

39

You want to promote a member server as an additional domain controller in your domain for fault tolerance. For ensuring security for this additional domain controller, you need to apply specific security policies. Which security template will you use to perform this task? 1,Secure DC.inf 2,DC security.inf 3,Secure*.inf 4,Set up DC.inf Your organization has a black-and-white printer and a color laser printer. Only the users in the marketing organizational unit are authorized to use the colour laser printer. The marketing manager complains to you that some unauthorized users are using the colour laser printer. What will you do to track the unauthorized users? 1,Monitor the Jobs object in the Print Queue counter in System Monitor. 2,Configure an audit policy for success of the colour laser printer. 3,Configure an audit policy for failure of the colour laser printer. 4,Configure a new GPO for the Marketing organizational unit and enable the auditing of success and failure of object access. You need to configure a software controlled fault tolerant system by using two hard disks. What level of RAID should you use for this purpose? 1,RAID 0 2,RAID 1 3,RAID 5 4,RAID 6 Consider the following statements:

40

41

Statement A: ASR creates a recovery disk that recovers the system and its data. Statement B: ASR creates a backup of system state data, which includes, disk signatures, volumes, and partitions that are required to start a system Statement C: ASR restores a simplified version of the Windows Server 2003 operating system.

42

Which of the following options is correct about the above statements? 1,Only Statement A is True. 2,Only Statement B is True. 3,Statements A, B, and C are True. 4,Statements A, B, and C are False.

43

You are the system administrator in CellGo Corp. All the servers in the organization are running on Windows Server 2003 having one Active Directory Service, CellGo.com. You want to have a comprehensive backup plan to ensure that the system can be restored in case of system failure. You want to backup the system state, system services, and all disks associated with the operating system components. Which recovery type should you use for this purpose? 1,Shadow copies 2,RAID 1 3,Automated system recovery 4,Synchronization tool Consider the following two statements.

Statement A: The device driver error code 1 indicates that the device is not configured properly. Statement B: The device driver error code 3 indicates that the driver for the device may be corrupt.

44

Which of the following is correct about the above statements? 1,Both, Statement A and Statement B are False. 2,Both, Statement A and Statement B are True. 3,Statement A is True and Statement B is False. 4,Statement A is False and Statement B is True. After the File Verification Signature utility is used, which of the following default files is created to show the logged results of file signature verification? 1,\windir\sigverif.txt 2,\windir\sigverif.log 3,\windir\filesigs.ncf 4,\windir\filesigs.log Consider the following statements.

45

Statement A: Using the Printer Properties dialog box, you can select the Print permission option that enables a user to pause a printer, restart a printer, share a printer, and change the printer properties. Statement B: Using the Printer Properties dialog box, you can select the Manage Documents option that enables a user to pause, restart, resume, and rearrange the documents submitted by all users.

46

Which of the following is correct about the above statements? 1,Both, Statement A and Statement B are False. 2,Both, Statement A and Statement B are True. 3,Statement A is True and Statement B is False. 4,Statement A is False and Statement B is True.

Network printer device is connected to the print server using network ______ interface. 1,RJ-40 2,RJ-45 3,RJ-50 4,RJ-55 Which of the following enables you to monitor the performance of printers? 1,Device Manager 2,Event Viewer 3,Performance Console 4,Task Manager Which of the following tool can be used to build reports to identify the under-utilized storage space? 1,BrightStor Storage Resource Manager 2,HP OpenView Storage Area Manager 3,BrightStor ARCserve Backup for Laptops & Desktops 4,Storix System Backup Administrator Donna Johnson is working as an IT Consultant in Super Software 2000. Super Software 2000 is a large organization, which is spread across many countries and functions through distributed network system. Donna is getting complaints regarding performance problems in Internet, intranet, and extranet resources of the organization. Which of the following tool or solution should Donna use to monitor and troubleshoot LAN, WAN, and VLANs? 1,HP OpenView Network Management Solution 2,Unicenter Network Management Solution 3,Observer 10.1 4,LANBrowser 1.3 Steve Irwin is an IT Consultant in the head office of Global Systems Inc. The regional offices of Global System Inc. are spread across north, east, south, and west regions. There are 1000 workstations in each office, which run on Windows platform. Steve needs an enterprise-level network management solution, which includes report scheduler for generating deliver reports, packet capture scheduling, and monitor for network delay. Which of the following tool or solution should Steve consider, which contains all these features? 1,Unicenter Network Management Solution 2,LANBrowser 1.3 3,OpManager 5.5 4,Observer 10.1

47

48

49

50

51

52

Pat Wilkins is a system administrator in the head office of Red Eye Experts, which is a large and complex organization spread across many countries. Pat wants to remove all kinds of complexities that are associated with network management for effective and efficient working of the organization. Donna Johnson is the IT consultant in Red Eye Experts. Pat assigns Donna the task of finding a multi-platform solution that discovers the entire network and can automate several network monitoring tasks. To perform this task, Donna wants a solution that includes WAN monitoring, server monitoring, URL monitoring, and switch monitoring. Which of the following tool or solution is appropriate to include all these features? 1,OpManager 5.5 2,HP OpenView Network Management Solution 3,LANBrowser 1.3 4,Unicenter Network Management Solution Jim Lewis is working as a security administrator in Blue Moon Computers. Jim needs to use a Windows-based tool that monitors and filters Internet access for Web sites and Internet applications. Jim wants that the tool should record the bandwidth and time each user or workstation has spent in accessing Internet on periodic basis. Which of the following tool should Jim use to perform the required task? 1,OpManager5.5 2,Observer10.1 3,WebScout 2.1 4,Symantec Client Security Corrine Wallace is working as a storage administrator at Technology Systems. The workstations in Technology Systems are running on multi-platform systems. Corrine finds that to manage storage devices effectively, he needs to use a tool or solution that manages the backup and recovery tools centrally and can monitor the storage environment remotely. Which of the following tool should Corrine use to perform the task? 1,Storix System Backup Administrator 2,BrightStor ARCserve Backup for Laptops & Desktops Release 11 3,VERITAS Backup Exec10 4,BrightStor Storage Resource Manager Which of the following requirements represents the degree of being capable of maintaining the service and service quality by a server? 1,Performance 2,Integrity 3,Accessibility 4,Reliability Which of the following can be termed as strategic services? 1,Services that must be available at peak load 2,Services essential to operation. 3,Services that can be postponed indefinitely. 4,Services provided by servers that must be available, but can be available at reduced performance

53

54

55

56

What is the configuration requirements of the desktops used in help desks? 1,Following are the configuration requirements of the desktops used in help desks High quality printers Voice Over IP integration Computer telephony integration 2,Following are the configuration requirements of the desktops used in help desks Thin-client computers Voice Over IP integration Computer telephony integration 3,Following are the configuration requirements of the desktops used in help desks Thin-client computers Voice Over IP integration Fast processing capabilities 4,Following are the configuration requirements of the desktops used in help desks Thick-client computers Voice Over IP integration 57 Computer telephony integration Which of the following feature is NOT evaluated when determining the performance requirements of the server? 1,Acceptable response time 2,Projected growth of the enterprise 3,The number of users connected to the server at any given time 4,User activities done during peak hours Which of the following feature is specified by the reliability of the server service? 1,Measuring the number of failures 2,Authenticating the services 3,Maintaining the correctness of the service 4,Measuring throughput Which of the following factor is NOT considered while analyzing scalability requirements of the servers? 1,Projected growth of the servers 2,Type of the servers 3,Speed of the servers 4,Services provided by servers 2

58

59

60

61

New tech book is multinational organization with various bookstores in various parts of USA. To expand its customer base globally and to automate its business process the organization launches an e-commerce site on the Internet. To protect its business processes from disruption, the organization asks Anne Donaldson to plan for the availability of the website. Identify the considerations Anne needs to keep track of to plan for the availability of the website. To protect data losses in the event of disasters, the organization also asks Anne to plan tasks for maintaining availability and backing up critical data of the website. What should Anne do to perform the task? 1,Anne needs to keep track of the following considerations while planning for the availability of the website: Criticality of the data Amount of downtime that the organization can afford Cost of reducing downtime in the organization In addition, Anne needs to consider the frequency of planned downtime while setting the availability goals to plan for appropriate backup strategies and maintenance tasks to maintain availability. 2,Anne needs to keep track of the following considerations while planning for the availability of the website: Amount of data that a network can carry Amount of data that is successfully transferred over the Internet Ratio of error-free data transmission to total transmission. In addition, Anne needs to consider the frequency of planned downtime while setting the availability goals to plan for appropriate backup strategies and maintenance tasks to maintain availability 3,Anne needs to keep track of the following considerations while planning for the availability of the website: Criticality of the data Amount of downtime that the organization can afford Cost of reducing downtime in the organization In addition, Anne needs to consider the frequency of unplanned downtime while setting the availability goals to plan for appropriate backup strategies and maintenance tasks to maintain availability. 4,Anne needs to keep track of the following considerations while planning for the availability of the website: Amount of data that a network can carry Amount of data that is successfully transferred over the Internet Ratio of error-free data transmission to total transmission.

In addition, Anne needs to consider the frequency of unplanned downtime while setting the availability goals to plan for appropriate backup strategies and maintenance tasks to maintain availability

Steve Irvin is working as an IT consultant at Global Systems Inc. The organization consists of two units, each unit deals with separate projects and performs tasks, such as accounting, marketing, and quality assurance. The organization decides to automate the accounting tasks of both the departments to reduce large amount of paper work and avoid inconsistencies in accounting data due to human errors. Global Systems Inc. decides to implement accounting software to computerize the accounting tasks. The organization asks Steve to plan for the hardware and software configuration of the client and server computers to implement the accounting software. Which of the following considerations Steve should keep track of to perform the task: a. Location of people working on the accounting software b. Business processes that are not automated by the accounting software c. Technology requirements d. Location of the data of the accounting software 1,a, b, and c 2,a, c, and d 3,a, b, and d 4,b, c, and d Which of the following is measured as a percentage of the original investment over a specific period and it defines whether or not investments met its goal? 1,TCO 2,ROI 3,Indirect costs 4,Direct costs Which of the following formula will you use to analyze the worth of an investment on IT infrastructure? 1,Net Benefit=Total costs Total benefits 2,Net Benefit=Total benefits * 100 percent 3,Net Benefits = Total benefits Total costs 4,Net Benefits = (Total benefits Total costs) / Total benefits * 100 percent Which of the following costs are included in the query resolution time cost? 1,Cost of man-hours spent on the deployment of IT infrastructure. 2,Cost incurred on the functioning of the infrastructure 3,Cost of acquiring and maintaining an asset 4,Cost of effort and time taken by employees to get acquainted to the new software applications or IT infrastructure changes. Which of the following is termed as the ratio of data throughput to transmission overhead? 1,Efficiency 2,Capacity 3,Throughput 4,Accuracy

62

63

64

65

66

67

Larry Williams is working as a network administrator in Blue Valley Consulting. Larry is assigned the task of selecting an appropriate network technology in the enterprise. Larry needs to set up networks within a building of the enterprise. Therefore, Larry chooses LAN technology to be implemented in the building. Larry observes that there are too many computers, which are required to be attached to LAN. Therefore, Larry needs a technology that reduces the number of data packet collisions and can deliver up to 80 percent of the maximum bandwidth available. In addition, Larry needs to decide the physical media that have multiple pairs of wires to connect the computers and reduces network crosstalk by negating the electro-magnetic field. Which of the following combination should Larry choose to perform the required task? 1,Token ring and Coaxial cables 2,Ethernet and Coaxial cables 3,Token ring and Twisted pair cables 4,FDDI and Fiber optic cables Pat Wilkins is working as a network administrator in Super Software Inc, which is spread over a vast geographical area. Pat needs to use WAN communication service to create an inter-network of networks. Pat needs to use a technology that can support very high-speed data transfers to the tune of 640 kbps in both directions and carries high-speed data and multimedia over telephone lines. In addition, Pat wants another technology, which is used for Point-to-Point networks and for backup for another type of link. Which of the following combination of WAN technologies should Pat use to complete the required task? 1,ISDN and Frame Relay 2,ADSL and Leased lines 3,SMDS and X.25 4,ADSL and Analog modems Steve Irwin is working as a storage administrator in Blue Moon Computers. Steve has been assigned the task of planning a storage solution in the enterprise. Steve needs a high-speed, fault-tolerant access to data for various client, server and host computers. Therefore, he plans to use a storage technology that provides great flexibility in scaling data storage capacity and server processing power. In addition, he wants to use a technology that can reduce network traffic and provide multiple paths to stored data to manage network and data flow redundancy? Which of the following solution would you suggest Steve to implement in the enterprise? 1,SAN 2,NAS 3,Tape drives 4,RAID The management at Bluemoon Computers Inc. wants to secure its network from external intrusions. The computers on the network are running on a number of different operating systems, such as Windows, Solaris, Linux, and Macintosh and have software firewalls installed on them. The management is very cost conscious and also apprehensive that the level of security might not affect the network performance. Therefore, it has been decided that only one extra level of security will be implemented. Which of the following security measures will you suggest as a networking consultant? 1,Host-based Intrusion Detection System (HIDS) 2,Network-based Intrusion Detection System (NIDS) 3,Combination of NIDS and HIDS 4,No IDS is required as the computers have firewalls installed on them

68

69

70

71

The management at Bluemoon Computers Inc. has decided to connect it corporate office to all of its regional offices. The local networks at regional offices are to be identified by the different subnets of the same IP address class 172.16.0.1. The regional offices are using different platforms for their networks, such as Windows, Linux, Macintosh, and Solaris. Because the corporate network will be connected to all these regional offices round the clock, it will be very essential to restrict the broadcast produced by all the networks and filter in the ones that are specifically meant for the corporate office. Which of the following network devices will you suggest to facilitate this connectivity as a networking consultant? 1,Hub 2,Switch 3,Router 4,Layer 2 Switch Red Eye Systems Inc. is a software development company. The company is planning a new software development facility in Arizona. This facility will develop system software in C/C++ on UNIX platform. Because this is a new project the company does not want to invest heavily in computing resources. In addition, the development process does not require too many resource consuming tools, except for C/C++ compilers, CLI debugging and testing tools and UNIX platform. The programmers will not be allowed to share files and folders as the code will be integrated in the next step of the SDLC. Which of the following computing model would you suggest to the company as a networking consultant? 1,Centralized network computing model with thin clients 2,Centralized network computing model with thick clients 3,Distributed network computing model with thick clients 4,Collaborative network computing model Identify the desktop management strategy that is used to track the software with expired licenses installed on the desktops in the enterprise. 1,Help desk 2,Remote 3,Asset 4,Desktop configuration Which of the following tasks should be performed by the help desk of an enterprise to provide support to desktop users? 1,Determine which assets of the enterprise are to be upgraded or replaced 2,Manage the leased assets in an enterprise 3,Provide an online knowledge base 4,Track the software usage remotely

72

73

74

Consider the following statements:

Statement A: ManageEngine ServiceDesk Plus is a Web-based asset management solution. Statement B: ManageEngine ServiceDesk Plus provides a helpdesk for troubleshooting desktop-related problems.

75

Which of the following is correct about the above statements? 1,Statement A is False and Statement B is True. 2,Statement A is True and Statement B is False. 3,Both, Statement A and Statement B are True. 4,Both, Statement A and Statement B are False. Pat Wilkins is the system administrator at Global Systems Inc. Pat is assigned the task of monitoring and improving server performance in the organization. To improve the performance of the servers, Pat needs to determine whether the input and output devices have reached a specific bandwidth limit. What will Pat do to perform the task? 1,Analyze the interface counts and rates 2,Monitor the number of user and system level processes 3,Analyze the number of swap ins and swap outs 4,Analyze the data transfer rates Identify the tasks performed by the help desk in an enterprise.

76

a. Create security policies for securing the desktops. b. Provide an online knowledge base that provides solutions to problems. c. Log and monitor the problems of desktop users. d. Provide centralized support for troubleshooting problems of desktop users.

77

Select the correct option. 1,a, c, and d 2,a, b, and d 3,b, c, and d 4,c and d

Вам также может понравиться