Вы находитесь на странице: 1из 59

IT Essentials 2: Module questions and answers

Module 1: Study questions

1 From which Windows configuration tool can a user perform hardware and network
configurations?
Window Manager
My Computer
Control Panel
Task Manager

2 When compared to a command line interface, what is a major disadvantage of a GUI?


It requires an understanding of commands.
It requires more memory and storage space.
It is more difficult to use.
Most server operating systems do not support a GUI.

3 What is a beneficial feature of preemptive multitasking?


Applications share the use of the processor by time slicing.
The processor dynamically adjusts the amount of memory needed by the application
programs.
Application programs share memory addresses and exchange information.
The operating system controls the allocation of processor time.

4 Though obsolete in current desktop environments, what are three valid reasons for the
continued use of MS-DOS? (Choose three.)
MS-DOS supports legacy applications.
MS-DOS is an intuitive, high-overhead operating system.
MS-DOS rarely crashes because it is a multitasking operating system.
MS-DOS is relatively easy to use.
MS-DOS can run on inexpensive hardware.

5 Which acronyms describe the two general categories of OS user interfaces?


DOS and UNIX
DOS and GUI
UNIX and GUI
CLI and GUI
6 Which of the following is a valid concern for a company considering a move from
Windows to Linux?
Linux generally allows companies to recycle old hardware and software.
Users may need special training to become productive with Linux.
Special third party software may be necessary to secure and configure Linux.
Linux generally requires more disk space than Windows.

7 What is meant by the statement, "We have to support our legacy system"?
Support must be provided for the newest Linux system.
Support must be provided for the system called legacy.
Support must be provided for the newest Microsoft system.
Support must be provided for outdated software.

8 Which three of the following file systems does Windows 2000 use? (Choose three.)
EXT2
FAT16
FAT32
NTFS
HPFS

9 Windows and Linux both use a file system that resembles an upside-down tree. What is
the name of this type of file structure?
binary
hierarchical
empirical
subsystem

10 Which part of the OS, loaded into memory at boot time, controls memory allocation?
user interface
application software
kernel
file system

11 What is the main reason FAT32 was created?


New operating systems required the use of filenames greater than eight
characters.
Earlier versions of FAT used disk space inefficiently.
FAT32 was needed to support drives up to 4 GB.
The maximum length of file extensions needed to be increased to three characters.
12 Which of the following is generally regarded as the standard GUI for Linux?
Red Hat Desktop
CDE
GNOME
Star Office

13 Which two of the following statements are true? (Choose two.)


Linux is a true 16-bit operating system that uses preemptive multitasking.
Linux supports all Windows applications through the use of cooperative
multitasking.
Linux operating system code is available for anyone to modify and use.
Linux is a true 48-bit operating system that uses minimal virtual memory.
Linux is a true 32-bit operating system that uses preemptive multitasking.

14 Which command is entered in the Run dialog box of a Windows XP system to open a
command prompt window?
run
start
cmd
dosprompt

15 Which two statements describe the security features of Linux? (Choose two.)
Compared to Windows, Linux is virtually virus-free.
Users must have a valid username and password to log into a Linux system, by
default.
Linux security is one dimensional.
Most security features for Linux must be purchased from a third party.

16 Which two of the following shells are commonly available for Linux? (Choose two.)
Bore shell
Korn shell
Cash shell
C shell
PC shell
17 With the FAT file system, what is the basic unit of logical storage on a disk?
megabyte
cluster
directory
logical drive

18 Which two statements describe security in the Windows operating system? (Choose
two.)
Windows is less susceptible to viruses than Linux.
By default, users must have a username and password to log into Windows.
Windows security is generally one dimensional.
Windows security is improved through the use of third-party applications.
Windows can securely support multiple users with the Terminal service installed by
default on personal computers.

19 What are three reasons why a company may choose Linux over Windows as an
operating system? (Choose three.)
The entire Linux installation can be completed using either a GUI or CLI.
The entire Windows installation can be completed using either a GUI or CLI.
Windows can be run entirely from a CD.
Compared to Windows, Linux is virtually virus-free.
Linux is a true multi-user system.
Linux has superior one-dimensional security.

20 Network operating systems were designed to provide which of the following tasks?
(Select three.)
file security
multitasking
user privileges
resource access for a single user
resource sharing among multiple users
Module 2: Study questions

1 What does the term media access control describe?


the rules for coordinating the use of the medium
a list of users allowed to use the network
the system administrator's role in controlling access to the network
how to determine which media type is best for a network

2 Which two types of cabling will support 100BASE-X? (Choose two.)


Category 2
Category 5
two-strand fiber-optic
50-ohm coaxial

3 What is one disadvantage of a client/server network?


It can have a single point of failure.
It does not scale well to large networks.
It requires each user to be trained to perform administrative tasks.
It is less secure than a peer-to-peer network.

4 Peer-to-peer and client/server networks share many characteristics. What is unique to


the client/server environment?
Passwords may be required to access shared resources.
Local data files and devices can be shared by several users.
Computers typically communicate using request/response protocols.
Security and resource management scales easily as the network grows.

5 Why are open source technologies appealing to many people?


A more organized source of funding and development is available.
Proprietary technologies involve cooperation between many companies.
De facto standards allow for more choice.
Users are not bound by copyright laws.

6 Which of the following statements best describes full-duplex transmission?


Data can be sent across bus hubs and switches.
Data can be simultaneously sent and received.
Data can only be sent in one direction.
Data can be sent and then received.
7 Which access control method is specified in the IEEE 802.3 standard?
CSMA/CA
CSMA/CD
token passing
store and forward

8 What is the physical topology when all the computers in a network connect to a central
point?
point-to-point
star
ring
bus

9 Which of the following statements is true of print sharing?


It requires a company to purchase more printers.
It makes it more difficult for an administrator to control printers.
It allows for more efficient use of printers.
It limits the user to a single network printer.

10 Which statement is true of peer-to-peer networks?


They scale easily as the size of the network grows.
Security is easily maintained.
Computers may change roles from client to server as needed.
At least one computer functions as a dedicated server.

11 What is a major advantage of UTP?


It is inexpensive.
It is highly resistant to electromagnetic interference.
It limits the number of hosts on a network.
It is an inexpensive way to interconnect remote locations.

12 Which technology provides the best support for upload-intensive Internet tasks?
ISDN
cable modem service
analog modem service
ADSL
13 What do transport layer protocols use to identify the application needed to process
data?
ports
MAC addresses
IP addresses
DNS
flags

14 Which statement best describes a serial link?


Bits of information are transmitted across the link one after another.
Bits of information are randomly transmitted across the link.
Bits of information are sent across a dedicated link in one direction only.
Bits of information are only sent using dial-up or ISDN lines.

15 What is one advantage of directory and name services?


All directories are kept in a single location.
User names have a standardized format.
Text names are easier to remember than numeric addresses.
Network resources are bound to a physical location.

16 What is an advantage of Linux?


Linux is easy to use.
With copyrights, Linux experiences fast technological growth.
Linux is free for public use.
Linux has an organized source of development.

17 What is the purpose of protocols?


to provide a controlled sequence of messages between systems
to define which users have access to the network
to allow the network administrator to decentralize control
to limit access to network resources

18 Which of the following is the most popular physical LAN topology?


ring
star
bus
fiber
19 Which DSL technology is most commonly used?
SDSL
ADSL
VDSL
IDSL

20 Which network layer protocol enables routers to discover the best path between
networks using hop count?
IP
RIP
ARP
OSPF

21 Which of the following works as a "storage and retrieval" application?


Telnet
e-mail
DNS
SNMP

22 Which features are LANs generally designed to accommodate?


many users, high speed, limited geographical area
many users, high speed, broad geographical area
few users, low speed, limited geographical area
few users, low speed, broad geographical area

23 What are two advantages of Windows over Linux? (Choose two.)


Windows can be used publicly for free.
Windows is easier to use than Linux.
Unlike Linux, Windows is standardized through the efforts of many independent
sources.
Unlike Linux, Windows has an organized source of funding and development.
Module 3: Study questions

1 Which list indicates advantages associated with fiber-optic cable?


capable of running long distances, inexpensive to install, not susceptible to
electromagnetic interference
not susceptible to electromagnetic interference, expensive to install, lower data rates
not susceptible to electromagnetic interference, higher data rates, capable of running
long distances
lower data rates, inexpensive to install, capable of running long distances

2 Which term refers to the path that signals take from one point on a network to another?
address resolution
logical topology
dynamic host configuration
physical topology

3 Which data link layer device can segment a network into different collision domains?
a router
a switch
a gateway
a transceiver

4 What is the function of a DHCP server?


It stores websites that are used frequently.
It dynamically assigns IP addresses to hosts.
It determines the subnet mask of a network.
It serves as a "first line of defense" firewall.

5 Which of the following statements best describes DNS?


DNS servers are used to map an IP address to a physical address.
DNS servers are used to map a name to an IP address.
DNS servers are used to configure logical address information for host computers.
DNS servers are used to translate from private addresses to public addresses.
6 Which three of the following items can a DHCP server provide to a host computer? (Choose
three.)
subnet mask
MAC address
default gateway
IP address
DHCP server address

7 Which two devices are at the core of wireless communications? (Choose two.)
satellites
light emitting diodes
transmitters
receivers
modulators

8 How many bits are in an IP address?


16
64
32
48

9 What is the main function of the DNS?


to scan the network for viruses
to translate computer names to their corresponding IP addresses
to assign IP addresses to nodes on the network
to provide names to all the nodes on a network

10 What are three important considerations when selecting a NIC? (Choose three.)
network type
operating system
system bus
network media
number of network users
11 Which list contains important considerations when selecting a NIC to use on a network?
type of network, type of RAM, type of system bus
type of media, type of system bus, type of RAM
type of network, type of media, type of system bus
type of system bus, processor speed, type of media

12 What are the two most common wireless networking technologies? (Choose two.)
radio frequency
microwave
laser
infrared
satellite wavelength

13 What is the purpose of the twists in Category 5/5e UTP cable?


to prevent the cable from breaking
to make the cable easier to install and terminate properly
to make the cable cheaper to produce
to limit signal degradation caused by cross talk

14 Which of the following options correctly describes APIPA?


APIPA allows a privately addressed host to assign itself a public IP address in order to
access a remote network.
APIPA enables a computer to assign itself an IP address if it cannot contact a DHCP
server.
APIPA is fault-tolerant feature that allows a server to mirror another server on a local
network.
APIPA enables a computer to translate domain names into IP addresses if it cannot
contact a DNS server.

15 What are three options for assigning logical addresses to hosts? (Choose three.)
static
dynamic
negotiation
automatic
holistic
16 Which of the following devices is used to segment a network into different broadcast
domains?
switch
active hub
bridge
router

17 What is a major disadvantage of the bus topology?


It is expensive.
It requires a lot of cabling.
A break in any one part of the cable brings down the entire network.
All computers must be placed in a straight line.

18 What is the most commonly used architecture in Ethernet LANs?


bus
star
mesh
ring

19 What are two advantages of using dynamic address assignment instead of manual address
assignment? (Choose two.)
On a large network, manually assigning addresses can be very time consuming.
Manual address assignment requires network administrators to understand physical
addressing.
Dynamic address assignment can help segment a large network.
Manual address assignment requires network administrators to understand logical
addressing.

20 Which two of the following statements accurately describe a default gateway? (Choose two.)
A default gateway is used when a host transfers data to another host on the same
network segment.
A default gateway is the IP address assigned to the near-side router interface.
A default gateway is the IP address assigned to the near-side switch interface.
A default gateway is used when a host transfers data to a host on another network
segment.
Module 4: Study questions

1 What must a computer have when connected to a network?


one unique name per function
one unique address per service
one unique address per connection point
one unique network

2 What is the range of numbers in the first octet of a Class C address?


1-127
192-223
128-191
224-255

3 A technician needs to log into a remote Linux PC to perform some maintenance. Which
application layer protocol could be used?
Telnet
FTP
HTTP
SNMP

4 Which protocol is used to translate a domain name into an IP address?


ARP
DNS
UDP
NetBIOS

5 Which classes of IP addresses are used by commercial organizations for host


addressing?
A,C,D
B,C,D
C,D,E
A,B,C

6 Which of the following rely on ICMP?


sending an Echo Request
logging in to a remote host
mapping an IP address to a MAC address
resolving a host name
7 What is subnetting?
dividing large networks into smaller ones using the same network number
allowing several small networks to communicate over the common carrier
infrastructure
combining several networks into a single larger network
allowing separate companies to share an IP address by taking turns using it

8 How would a technician permanently change the IP address of an Ethernet card on a


Red Hat Linux PC to 192.168.34.4?
use the command ifconfig eth0 192.168.34.4
use the command route add default IP 192.168.34.4 dev eth0
use the command ping 192.168.34.4
edit the IPADDRESS line in the file /etc/sysconfig/network-scripts/ifcfg-eth0

9 Which utility is used in Windows and Linux to view network connections and protocol
statistics?
arp
netstat
nbstat
ipconfig

10 What is a unique characteristic of the IP addressing scheme?


flat addressing
hierarchical addressing
internetwork addressing
single-octet addressing

11 In which layer of the TCP/IP model does ICMP operate?


Application
Transport
Internet
Network Access

12 Which address class contains the IP address 168.12.0.0?


A
B
C
D
13 How many octets are contained in an IP address?
1
2
4
8

14 Which Linux command is used to temporarily change the default gateway of a host?
arp
ifconfig
netstat
route
ping

15 What is the primary function of NAT?


convert a MAC address to a domain name
translate between a local IP address and a global IP address
allocate IP addresses to commercial organizations
determine the best route through a network

16 Which service is used to enable individual computers to automatically obtain an IP


address?
WINS
DNS
ARP
DHCP

17 Which service does ARP provide?


It resolves a physical address to a TCP port number.
It resolves a broadcast address to an IP address.
It resolves an IP address to a MAC address.
It resolves a URL to a MAC address.

18 What is the range of numbers that can be used in the first octet of a Class A network?
1-126
128-191
192-223
1-255
19 Which IP address range, as indicated by the first octet, is reserved for testing, and
includes the loopback address?
127.x.x.x
168.x.x.x
255.x.x.x
192.x.x.x

20 The performance of a network has dropped. Which command should an administrator


use in a Linux system to determine which routers are causing the problem?
ping
traceroute
tracert
route
ifconfig
Module 5: Study questions

1 Which statement correctly describes an NIS slave?


An NIS slave is another name for an NIS client.
An NIS slave is where the NIS database is maintained.
An NIS slave is where the NIS database is created.
An NIS slave contains a copy of the NIS database.
An NIS slave contains the portions of the NIS database needed by the clients it
serves.

2 What are three characteristics of an intranet? (Choose three.)


communication with outside business partners
firewalls
multiple networks across the company
public access
local area network only
web servers

3Which version of Directory Service does Linux use?


NDS
NIS
NFS
NDAP

4Which two protocols are used to control the transfer of web resources from a web server
to a client browser? (Choose two.)
ASP
FTP
HTML
HTTP
HTTPS
IP

5 Which TCP/IP protocol is responsible for file sharing?


DNS
NFS
UDP
IPX
6 Which popular web server software is only available for Windows operating systems?
Apache
Firefox
Internet Explorer
Internet Information Server
Netscape Server
Opera

7Which scripting language can be used on a Linux server to notify users that a print job
is complete?
batch script
JavaScript
JScript
shell script
VBScript

8What is the default order in which print jobs are processed when using a FIFO queue?
The last job placed in the queue is the first to be printed.
The oldest job in the queue is printed first.
Smaller jobs are printed before larger jobs.
Larger jobs are printed before smaller jobs.
The network administrator determines which jobs are printed first.

9 Which of the following is a list of common FTP commands?


get, put, cd, bye
download, upload, dir, chdir, exit
send, receive, dir, cd, exit
transfer [from | to], list, dir, exit

10 What are two common uses of scripting languages? (Choose two.)


automate administrative tasks, such as cycling log files
provide user interaction with a compiled program
run scheduled tasks at user login
deliver files to remote users on request
download required drivers to printers

11 Which protocol controls web page transmission?


FTP
HTTP
SMTP
DNS

12 A network administrator is operating in the GNOME desktop environment. Which


application would the administrator start in order to establish a command line
session with a remote server?
gFTP
Mozilla
Star Office
xterm

13 Which syntax is invalid for opening an FTP connection?


ftp connect hostname
ftp <hostname | IP_address>
ftp 192.127.34.219
ftp computer.company.com

14 Which protocol was designed for file sharing on the Internet?


HTTP
FTP
SMTP
TCP

15 Where do print jobs wait to be printed?


print list
print queue
wait list
print job roster

16 What is the purpose of a directory service?


It increases the need for redundant logins.
It provides administrators with centralized control of users and resources
across the network.
It impairs network security and must therefore be used with a firewall.
It keeps track of the home addresses and phone numbers of all users.

17 Which of the following is a list of popular scripting languages?


X Window script, vi script, Gnome script
XML script, Sequel, Gnomepad
UNIX shell script, pico script, EmacsScript
VBScript, Linux shell script, JavaScript
Module 6: Practice questions

1Which Linux distribution was built solely for nonprofit uses?


Debian GNU/Linux
Caldera eDesktop and eServer
SuSE Linux
LinuxPPC

2Which of the following is open source?


all versions of UNIX
Windows 2000
all versions of NetWare
Linux

3What are two benefits of having more than one processor in a system?
support for remote locations and automatic job queuing
faster speeds and increased work capacity
reduced need for IP addresses and decreased boot time
reduced need for IP addresses and increased manageability

4Why might the administrator of a small company choose Windows 2000 Server instead of
Windows 2000 Professional?
The operating system is to run on a dual-processor system.
The system is to act as a DNS server.
The company needs an intranet based on a small web server.
The server will be accessed by up to ten simultaneous users.

5How is redundancy built into a server system?


by including additional hardware components that can take over if other components fail
by including a tape back-up system to preserve data
by adding redundancy software to the system
by keeping duplicates of all data

6Which of the following is a better choice than Telnet for Remote Login Servers on a Linux
system?
SSL
SSH
Kerberos
Remote Access
7In a Windows NT environment, what is the meaning of the term domain?
a dedicated server containing the database of all IP and MAC addresses on the network
a group of computers located in a specific physical or geographic region
the OU that contains all user accounts
groups of computers, users, and resources that form an administrative boundary

8Which program, running on a Linux server, allows Windows-based clients to see the Linux
file system without installing client software?
NFS
Apache
Samba
KDE

9 What are two important features provided by security on a NOS?


authentication and encryption
reliable performance and account management
virus protection and prevention from spamming
processor balance and sustained work load

10Which type of authentication security does Windows 2000 Professional support?


Secure Socket Layer
Kerberos
Samba
Apache

11How many Primary Domain Controllers (PDCs) are allowed in a Windows NT environment?
1
2
4
9

12Which of the following criteria must software meet in order to display the Open Source
Initiative trademark?
It must be easily altered and adapted to all major operating systems and source code
must be limited.
It must be compatible with third party add-ons and use standard source code.
It must be provided in multiple languages and cost must be minimal.
It must be freely distributed without restriction and the source code must be available.
13Which client/server file system is used by most varieties of Linux file servers?
FAT32
NFS
NT
SMB

14What are two popular Desktop Environments that run on Linux?


GNOME and KDE
Apache and Samba
Xfree86 and GNOME
Apache and KDE

15What are three important considerations when selecting a Linux distribution? (Choose
three.)
whether the computer will be used as a client or a server
whether or not the computer will be connected to a network
whether or not a GUI interface is required
whether or not a command line user interface is required
the experience level of the user

16Windows 2000 Professional supports plug-and-play technology. What is one of the major
advantages of this technology?
An administrator can add devices from any manufacturer to the system and they will
work.
Devices no longer need software drivers to interact with the system.
Components will interact with the system if plugged in prior to system boot.
An administrator or user can easily add components to the system without manual
configuration.

17Which one of the following office tools is available for both Linux and Windows?
ClarisWorks
ApplixWare
Lyx
StarOffice
18Which statement accurately describes the Slackware Linux distribution?
It is designed for Linux novices.
It has a range of user interfaces and uses RPM.
It is designed for advanced users and uses text-based configuration tools.
It is intended solely for non-profit organizations and uses the Debian package
manager.

19A user account on a server enables the server to do which of the following?
automatically download appropriate applications and print queues to that user
authenticate that user and allocate those resources the user is allowed to access
assign a specific IP and MAC address to the user's workstation
assign the user to a specific domain and user group
Module 7: study questions

1 What must be done when setting up a RAID array in Linux?


All the disks must be partitioned as primary partitions.
All the partitions need an extended partition.
The disks must be mounted using LVM.
The disks must be formatted using NFS.

2 What are two valid file systems for a Linux partition? (Choose two.)
ext1
ext2
ext3
HFS
boot
FAT

3 Which Windows file performs the same function as the Linux LILO files?
HAL
NTLDR
NTDETECT
NTOSKRNL

The figure shows a section of the display from Device Manager. What does it
show about the laser printer?
The network cable is unplugged.
Windows recognized the device but could not locate a suitable driver.
Windows does not know the proper name of the device.
Windows could not locate the device in the expected location.
5 When setting up a hard disk, what are the three possible types of partitions?
primary, secondary, and logical
primary, logical, and extended
C, D, and E
boot, program, and data

6 How is the root partition identified in Linux?


?
Root
/root
/

7 How many partitions can an MS-DOS-type partition table describe?


one
two
four
eight

8 Most NOSs will only run on certain hardware configurations. For which four
items are minimum requirements specified? (Choose four.)
CPU speed
CPU type
RAM
CD-ROM drive
hard disk space
NIC

9 A technician is trying to configure a PC to dual boot with Windows XP and


Linux. XP has already been installed and configured in one partition. Linux
has been installed in another partition. The technician wishes to replace the
LILO loader with grub but is having problems. What is the most likely cause
of the problem?
The technician did not remove the LILO files first.
Grub will not work with XP.
Linux should have been loaded first.
The technician did not run /sbin/grub-install.
10 The ping command is used to test network connectivity. What is the best IP
address to ping for this test?
the DNS address
the loopback address
the local NIC address
the default gateway address

11 Which of the following Windows file systems is the most appropriate for a
network file server?
FAT16
FAT32
NTFS
HFS

12 Which four items of information are required for TCP/IP network


configuration? (Choose four.)
IP address of host
subnet mask
MAC address
IP address of default gateway
IP address of DNS server
host name

13 Which task should be performed before installing a NOS?


Change the system hardware and peripherals before beginning.
Verify that the NOS supports all application software that will run on the
server.
Run the evaluator software prior to loading to establish hardware
settings.
Be familiar with the NOS so configuration questions can be ignored.

14 Linux systems typically dedicate an entire partition to virtual memory. What


is this partition called?
the RAM partition
the swap partition
the pagefile partition
the page partition
the memory partition
15 Which Windows utility can be used to perform a hardware inventory?
Administrative Tools
ScanDisk
Windows Explorer
Device Manager

16 ext3 introduced journaling capabilities to Linux file systems. What is an


advantage of a journaling file system?
It reduces the time spent recovering a file system after a crash.
It allows administrators to determine the owners of files created on the
system.
It keeps file clusters attached to the files to which they are allocated.
It enables Linux systems to interoperate with Windows systems.

17 What is the best source of hardware compatibility information?


the World Wide Web
a hardware manual
a software manual
the CD-ROM readme document

18 What is the first step every computer will perform when it is turned on,
regardless of the operating system?
boot
RAM
POST
SCSI
Module 8: Study questions

1 Which method should an administrator use to provide for securely sharing


files on a larger network?
arrange for each host on the network to share files with the other hosts
on the network to distribute the load
only allow clients used by trusted users to share files with others on the
network
require users to map to a network drive on a network file server on the
LAN
set up an area on a web server that can then be accessed from
anywhere through web browsers

2 An administrator has written a script in VBScript and saved the file. What
must the administrator do to ensure that WSH is aware that this is a
VBScript file?
The first line of the script file must be VBS.
The WSH configuration file needs to be updated with the name of the
new script file.
The file must have the extension .vbs.
WSH must be informed that it is a VBScript file when it is loaded.

3Which command can be used in Windows 2000 to capture the output from a printer
port and redirect it to a network printer?
net use
capture
lpt1 > net
netprint

4An administrator needs an account that can be used to manage all the computers in a
domain. What is the name of the group that Windows 2000 provides to allow the
administrator to perform this function?
Root
Admin
Domain Admins
Enterprise Admins
Administrator

5 What are three desirable characteristics of a print server? (Choose three.)


good graphics
fast processor
adequate RAM
adequate disk space
adequate tape backup
6 In Windows 2000, what is the best way to restore a deleted user account?
Select undelete from the popup menu.
Create a new account with the same user name.
Select undo from the Edit menu.
Delete cannot be undone.

7 Which component of Windows 2000 accommodates many types of scripting


languages?
VBScript
JScript
WSH
ShellScript

8 When installing Windows 2000 Professional on a new machine, what must you do
to boot from the CD?
Nothing, it will automatically boot from the CD.
Select the correct install device option from the menu.
Enter the CMOS setup and set the boot sequence to boot from the CD-ROM
drive first.
Insert the Windows 2000 CD in the CD-ROM drive and press Enter.

9 In Windows 2000, which of the following is a required field when creating a new user
account?
the full name
the password
the user name
he description

10 What is the main reason that NTFS is the preferred file system for a Windows 2000
partition?
It is the only file system that is available to a Windows 2000 administrator.
It cannot be accessed by Linux systems.
It supports a bigger file system than any of the alternatives.
It offers better security than any of the alternatives.
Most Windows 2000 administrators are trained to use NTFS.
11 What is the purpose of the user's full name in the New User account box?
It is informational only.
It authenticates the username.
It allows the user to logon.
It matches the user to permissions.

12 What is the default method of authentication used by Telnet in a Windows 2000


environment?
plain text
NTLM
kerberos
ND5
.net passport

13Which two of the following statements about passwords are correct? (Choose two.)
No two users should have the same password.
Passwords should be at least five characters long.
Passwords should contain at least one non-alphabetic character.
Passwords should be easy to remember such as a favorite sports team.

14In Windows 2000, what is the name of the HTTP web service located in the
Administrative Tools menu?
Default FTP Site
Default Web Site
Default Web Service
Default Internet Information Service

15An administrator has just finished setting up a Windows 2000 PC. What should the
administrator do first to ensure that the NIC has been correctly configured?
run the ifconfig -a command
run the ipconfig /all command
ping the local host
ping the default gateway
16Which two statements about computer names in Windows 2000 are correct? (Choose
two.)
A computer name is optional.
The maximum length for a computer name is 15 characters.
The maximum length for a computer name is 255 characters.
There is a default computer name based on the organization name.
Computer names on a network do not need to be unique if they have unique IP
addresses.

17In the Windows 2000 NOS, which tools must be loaded to run FTP services?
FTP Services
Network Services
Internet Information Services
Site Services

18 A network administrator is setting up a web presence for a small company. The


company plans to use the address www.thecompany.com but has not created a DNS
entry for the server yet. The administrator has set up a new web server on a networked
machine with the IP address 111.111.111.111. What should the administrator initially
do to determine if the web server is functioning?
Run a web browser on the server machine and enter the address http://127.0.0.1.
Run a web browser on a host connected to the same network and enter the address
http://111.111.111.111.
Ask someone outside the organization to try to access the website using the
address http://111.111.111.111.
Ask someone outside the organization to try to access the website using the
address http://www.thecompany.com.
Run a web browser on a host connected to the same network and enter the address
http://www.thecompany.com.

19 Which Windows tool allows an administrator to easily view or navigate a file system?
Internet Explorer
Windows Explorer
WinNT Explorer
File Explorer

20 Which three of the following groups can be created in Windows 2000? (Choose
three.)
local groups
global groups
domain local groups
domain global groups
audit groups
21 What must a Windows 2000 client do in order to assign a logical drive letter to a
shared folder on a network file server?
map to the network drive
link to the file server
share the network folder
create a path to the file server

22 Which two of the following tasks are performed before the Setup wizard stage of a
Windows 2000 installation? (Choose two.)
reconfigure hard disk partitions if necessary
enter the product registration key
format the disk
configure networking
Module 9: Study questions

1 You would like to install the samba program on your Linux machine. You have located
the file samba-2.0.7.tar.gz. Which command should you use to completely unpack the
files in this package?
gunzip samba-2.0.7.tar.gz
tar -xvf samba-2.0.7.tar.gz
tar -xvzf samba-2.0.7.tar.gz
gunzip -xvf samba-2.0.7.tar.gz

2 When is the root account typically created in Linux?


at first login
during NOS installation
when configuring NOS user accounts
after user accounts are created

3 Which term describes the Linux superuser account?


sys
root
power user
wheel
daemon

4 What is the name of the X Window package that is supplied with most distributions of
Linux?
X Window
Xfree86
Xfree386
Xlib86
Xlib386
5 Which of the following are valid boot loader options for most Linux installations? (Choose
two.)
BOOT.INI
AUTOEXEC.BAT
LILO
GRUB
Loadlite
RPM Loader

6 A user wishes to install Linux on a PC with an Intel compatible Pentium class processor
and 64 MB of RAM. What is the recommended minimum amount of free space on the
hard drive to complete the installation?
200 MB
500 MB
900 MB
1 GB
2 GB

7 Which of the following commands would assign a default gateway of 172.16.5.3 to the
local host?
ifconfig eth0 def-gate 172.16.5.3
ifconfig eth0 gw 172.16.5.3
ifconfig eth0 default gw 172.16.5.3
route add def-gate 172.16.5.3
route add gw 172.16.5.3
route add default gw 172.16.5.3

8 You have formatted a drive while doing a Linux installation for a production server. The
formatting revealed that there were several bad blocks. You see that the bad blocks make
up about four percent of the total disk. Which of the following would be the best course of
action?
reformat the drive with a high level format
reformat the drive with a low level format
replace the drive
mark the blocks as "bad" and continue the installation
9 Which three statements are correct when describing the ifconfig command? (Choose
three.)
Settings must be saved following this command or they will be lost when the
computer is rebooted.
Printers can be shared using this command.
The NIC card can be set up and configured using this command.
The IP address of the local host can be assigned using this command.
The hardware address of the local host can be assigned using this command.

10 You are installing RedHat 7.2 and have decided to use the installation class called
"Workstation". Which of the following packages will not be installed? (Select two.)
X Windows
Telnet daemon
HTTP daemon
Vi editor
Sendmail daemon
Browser

11Which of the following would be standard file system types that Linux would use during
an installation? (Select two.)
NTFS
FAT16
FAT32
ext2
ext3
VFAT

12Which of the following can be set within the LILO configuration file?
an option to ask for a DNS server
an option to clear the /tmp directory at boot
an option to boot to runlevel 5
an option to use DHCP

13 You would like to perform a high-level format on a hard disk. Which of the following
Linux commands will accomplish this?
format
fdformat
hformat
mkfs
mkhfs
14 Which of the following directories stores the package database for the Red Hat Package
Manager?
/etc/var/rpm
/var/lib/rpm
/etc/lib/rpm
/var/rpm/db

15A technician is setting up a Linux workstation to automatically get all of the correct IP
settings as soon as it boots. Which protocol should be configured on the workstation to
accomplish this?
DNS
ARP
DHCP
NetBEUI
default gateway

16Which of the following is the most widely supported package type available in Linux?
RPMs
DPMs
tarballs
gzip

17 You have decided to install your new Linux distribution by using the bootable CD that
came with it. What must be configured before you can boot from the CD?
CMOS
NVRAM
BIOS
Hard drive

18You have tried to install a particular RedHat package but it keeps telling you that it has
a "failed dependency". What would cause this error?
The package depends on certain user input.
The package depends on operating system input.
The package depends on another package being installed.
The package depends on hardware that is not present in the computer.
19A file system is written to a partition when a hard drive is formatted. Which three of the
following file systems can be used in a typical Linux installation? (Choose three.)
NTFS
ext2
ext3
FAT
FAT32
Reiser
Module 10: Study questions

1 Which of the following commands will allow only the owner of a file named
programs to execute the file?
chmod 664 programs
chmod 544 programs
chmod 422 programs
chmod 462 programs

2 In Linux, which command allows users to learn more about any command?
cal
man
help
doskey

3 In Linux, which command is used to switch from the X Window GUI to the CLI?
Ctrl+Alt+(F1-F6)
Shift+Ctrl+(F1-F6)
Shift+Alt+(F1-F6)
Ctrl+Delete+(F1-F6)

4 Which of the following is a translator that allows Linux and UNIX systems using
PostScript to print to non-PostScript printers?
Printcap
Chatscript
Linuxscript
Ghostscript
Printscript

5 A user wants to disable the Telnet and FTP services in Linux. In the configuration
file, which character would the user place at the beginning of the Telnet or FTP
line?
x
?
#
!
6 Which file must be edited by the Linux administrator to manually disable a user's
password?
/etc/passwd
/user/shadow
/etc/shadow
/root/shadow

7 In which file does the activation of the Linux FTP service take place?
/etc/conf/init.d
/etc/conf.d
/etc/rc.d/init.d/xinetd
/etc/activate/inetd

8 Which command character allows users to enter the vi edit mode?


#
i
e
>

9 Which of the following Linux daemons listens for incoming requests and forwards
each request to the appropriate daemon?
HTTPD
LPD
crond
syslogd
inetd

10 What is X Window?
It is server software to setup web services in Linux.
It is software that allows users to set the number of open Telnet windows in
Linux.
It is a GUI interface for Linux.
It is mail client software for Linux.

11 What are Pico and vi?


versions of Linux
Linux CLI commands
text editors
user desktop environments
12 Which file is used by a Linux computer to determine which printers are online and
available for printing?
/etc/printcap
/etc/lpd
/etc/print/lpr
/etc/lprd

13 Which of the following configuration files determines the default runlevel at system
startup?
/etc/rc/init
/etc/inittab
/etc/init/rc.d
/etc/rc.d/inittab

14 Which of the following files can be edited to allow a user other than root to use the
umount command?
/etc/lilo.conf
/etc/fstab
/etc/var/mnt
/var/mnt

15 On a computer running Linux, which attribute prevents anyone other than the
owner of a file, the directory owner, or root from renaming or removing files in a
directory?"
owner bit
no override
lock
sticky bit

16 In the path /etc/rc.d/rc#.d, what is specified by the #?


the number of columns in the file
the priority associated with the file in the directory
the runlevel associated with the file
the number of users who can concurrently access the file
17 In Linux, which command is used to rename a directory?
mv
cd
dir
mkdir

18 In Linux, which command is used to create a new directory?


md
mdir
dir
mkdir

19 Which of the following indicates only read and write permissions when used with
the chmod command?
4
5
6
7

20 Which service can be deployed as a more secure alternative to Telnet?


FTP
NFS
SSH
TFTP

21 Which Linux process will automatically run scheduled tasks at a specified time?
run
crond
sched
auto

22 Which scripting language is basic to the Linux OS?


VBScript
shell script
JavaScript
Perl Script
23 On a Linux system, which configuration files contain user account information?
(Choose two.)
\etc\shadow
/etc/passwd
/etc/user/passwd
\etc\passwd
/etc/shadow
/etc/user/passwd
Module 11: Study questions

1 Which Linux command is used to create partitions on a hard disk?


mkdev
fdisk
mkfs
fsck

2 What are two guidelines that an administrator should follow to maintain a healthy hard
drive? (Choose two.)
limit the amount of RAM available to individual users
defragment the hard drive regularly
allow users to use all available storage with no limits
continually manage available disk space
do not limit the size of user home directories

3 Which statement is true when the SUID bit is set as the root account for a program?
Root cannot execute the program.
Only root can execute the program.
Any user can execute the program using root account permission.
Users can execute the program only if they belong to the same group as the owner
of the program.
Only the owner of the program can execute the program.

4 Which setting determines if a program will run with the permissions of its assigned
group or the permissions of the user's groups?
SUID
GUID
SSID
SGID

5 What are three key concepts when analyzing and optimizing network performance?
bottlenecks, baselines, and best practices
baselines, base logs, and best practices
best practices, base logs, and bottlenecks
baseline, bottlenecks, and backups
6 Which of the following can be used to monitor system resources in Windows XP and
Windows 2000?
Event Viewer
Scandisk
Performance Tool
Task Scheduler
Checkdisk

7 What is the function of the /etc/crontab file in Linux?


to schedule system jobs
to schedule user jobs
to validate created processes
to remove cron jobs

8 Linux administrators have several CLI commands available to display information on


system resources. What is the output associated with using the du command?
a display of disk usage for a file system
a display of disk usage for a directory
a display of disk usage for file information
a display of the user's remaining disk space

9 Which Linux command can be used to terminate processes that are consuming too
many system resources?
at
stop
kill
term
kip

10 Which output does the df command produce when executed from the Linux CLI?
detailed information about the file system
detailed information about the top-level directory
detailed information about CPU and RAM usage
detailed information about the data stored on the disk
11 Which file can be studied by programmers to determine the potential cause of a
program crash?
Core Dump
Script Debugger
Process Tracker
Trace File
Error Pack

12 Which of the following statements is true about the use of Performance Tool?
Performance Tool is only available for use on Linux computers.
Performance Tool should be used sparingly since it uses valuable system resources.
Performance Tool can only be used to monitor network computers.
Performance Tool can only be used in conjunction with a pre-established baseline.

13 A system unexpectedly shuts down due to power failure. As a result, the file system is
damaged. Which Linux command could be used to repair the file system?
mkfs
fsck
diskcheck
filrep
ps

14 Which of the following can be used to execute a series of Linux commands at a


specified time?
which
run
time
at
when

15 When should a baseline reading of network performance be made?


at the busiest time of day
when the network is running normally
at the least busy time of day
when the network is not in use
16 Which of the following tools can be used to analyze Linux system log files?
Logcheck
Regscan
Filecheck
Scanfile

17 Which Linux command can be used to terminate a group of processes that have the
same name instead of terminating them with their PID numbers?
term
stop
killall
halt

18 Which Linux command is used to create filesystems on a partition?


mkdev
fdisk
mkfs
fsck

19 Which disk management tool is available to limit the amount of data a user can store
on a network?
disk quota
disk ceiling
disk limit
disk wall
disk container
Module 12: Study questions

1 Which version of the Linux kernel includes ISA PnP support that does not require the isapnp
program?
2.1.x
2.2.x
2.3.x
2.4.x

2 Which insmod option will automatically unload the module when it is no longer being used?
-s
-p
-f
-k

3 Which of the following is an OS-independent component that is responsible for basic


hardware and resource configuration before the OS loads?
USB ports
SCSI
BIOS
CPU

4 What would be the most important feature to consider when selecting a video card for a
workstation based on performance?
warranty
amount of on-board RAM
manufacturer
price

5 Which two steps should a technician perform first when troubleshooting a new EIDE hard
drive installation that a computer does not recognize? (Choose two.)
check CMOS to ensure that the hard drive settings are correct
ensure that the drive has the correct master or slave jumper settings
ensure that the kernel contains the correct drivers for the drive
make sure the device number and termination are correct
6 Which option of the insmod program will send output to a log file instead of the console?
-s
-p
-f
-k

7 A new EIDE hard drive has been added to a Linux workstation. The hard drive is functioning
but performance is poor. What should the administrator do first to check the installation?
ensure that the ribbon cable connector being used is the one closest to the motherboard
ensure that the jumpers on the hard disk are set to configure it as the master drive on
EIDE channel 1
repartition the disk to create smaller partitions
use the hdparm utility to test the disk and set options

8 What is the most common cause of core system hardware failure?


static discharge
overheating
incorrect drivers
excessive use and age
physical damage

9 Some PCMCIA driver packages allow drivers to be mounted while a device is installed and
unmounted when the device is removed from a laptop. Which feature makes this possible?
ACPI
Card Services
lsmod
mount
sleep
umount

10 Which insmod option will instruct the program to load the module even if the module was
compiled for a different kernel?
-s
-p
-f
-k
11 What is the main concept to be aware of when installing hardware on a Linux system?
price
type of device
compatibility
number of slots available

12 Which Linux file needs to be edited to specify an IRQ for an Ethernet card?
/lilo.conf
/irq.conf
/etc/lilo.conf
etc/loli.conf
/etc/irq.conf

13 A technician is adding an internal PnP modem to a system, but a check of system resources
shows that all available IRQs are reserved or being used by other devices. What could the
technician do to get the device to work?
manually assign the IRQ of another device that is not expected to be used at the same
time as the modem
use trial and error to find an IRQ that will work with the modem
configure the modem to work without an IRQ
change CMOS settings to allow the BIOS to free up an unused IRQ
configure the modem to use a DMA address instead of an IRQ

14 Which two of the following statements about SCSI devices and configuration are true?
(Choose two.)
The SCSI controller needs to be terminated if it is at the end of a chain.
A forked chain occurs when two SCSI cables are connected to a single controller.
Throughput can be reduced if all SCSI devices are not the same variant.
All SCSI devices in a chain must have the same device number.

15 Which program is used to insert a single module into the Linux kernel?
imsmod
smod
ismod
insmod
16 How is PnP handled in a Linux system? (Choose two.)
isapnp program
iopnp program
ISA configuration option in control panel
ISA configuration option in the Linux kernel

17 Which of the following factors should be considered when installing a SCSI drive to ensure
system compatibility? (Choose three.)
variant
RPM
ID
termination
drive size
average seek time

18 A module needs to be loaded. However, confirmation that the Linux kernel can load the
module is important. Which of the following options of the insmod program will accomplish
this task?
-s
-p
-f
-k

19 Which of the following Linux files can be viewed to see resource allocations? (Choose three.)
/proc/interrupt
/proc/dma
/proc/imports
/proc/ioports
/proc/alloc

20 On a Linux system, which of the following files will show the interrupt request number
allocation?
/dev/interrupt
/proc/interrupt
/interrupt
/var/interrupt
Module 13: Study questions

1 An administrator is responsible for a mixed Linux/Windows network. The administrator has


configured a new computer with the Windows XP operating system. The administrator then
attempts to ping it from a Linux computer but fails. What should the administrator do next?
try to ping the Windows computer from another Windows computer
run ifconfig on the Linux machine and specify the IP address of the Windows computer
run ipconfig on the Windows machine to ensure it is set up correctly
run ping 127.0.0.1 on the Windows system

2 Which command is used to determine the active TCP connections on a computer?


ping
ICMP
ifconfig
traceroute
netstat

3 In a Linux system, the set of recent kernel messages is known as the kernel ring buffer.
Which command displays these messages?
dmesg
imesg
kmsg
rmesg

4 What is the simplest and most recommended method of creating a custom emergency boot
disk for Linux?
Run the btdisk command.
Modify one of the existing boot disks.
Copy individual boot files to a floppy.
Download a custom configuration from a Web site.

5 Which type of files can be helpful in identifying several types of problems in a Linux server?
security files
user data files
log files
text files
6 What is the easiest way to stop a non-responsive process in a Linux system?
issue the stop command
issue the kill command
log out and log back in again
press Ctrl-Alt-Del and click Stop when the Task Manager appears

7 Which two files are commonly used to access the tape backup devices? (Choose two.)
/dev/ht0
/dev/hd0
/dev/nst0
/dev/tp0

8 Why is it necessary to use the appropriate Sys V script to stop some processes?
It is the only way to stop some services.
It is the best way to stop zombie processes.
It will prevent lock files from causing error messages.
It will save the data that has been processed.

9 While booting a Linux server, the booting process has stopped. Upon troubleshooting, an 'L'
error code is discovered. What does this indicate?
No part of LILO loaded.
The second stage of LILO did not load.
The first and second stages both loaded, but the second stage will not run.
The disk descriptor table (/boot/map) is corrupt.

10 Which statement best describes the LOADLIN program?


It is a text editor.
It is an MS-DOS utility used to load a Linux kernel.
It is a command line interpreter.
It is a Linux kernel program that loads and executes applications.

11 Which parameter can be used with tar to list the contents of an archive?
-a
-i
-l
-t
12 In Linux, what is the first program that takes control of the boot process from the BIOS?
kernel
LILO
config.sys
linux.sys

13 What is the loopback address that a technician would ping to verify that TCP/IP is correctly
installed?
192.0.0.1
127.0.0.1
168.0.0.1
223.0.0.1

14 What is the best way for an administrator to determine if a server is overloaded?


ask users if the service has declined
keep a record of the frequency of server crashes
monitor the network load and note when it becomes very high
check the server log files

15 Which Linux log file is most likely to contain the word oops?
/var/log/messages
/var/log/error
/var/log/syslog
/var/log/secure
Module 14: Study questions

1 Which two options accurately describe network security? (Choose two.)


As security increases, the level of accessibility increases.
As security increases, the level of accessibility decreases.
Users want more accessibility and administrators want more security.
The level of security required is the same for all organizations.

2 According to SANS, which three of the following services are among the top ten security
vulnerabilities of Linux? (Choose three.)
Remote Procedure Calls
Dynamic Host Configuration Protocol
MySQL
Secure Shell
Apache Web Server
RMON

3 Several computers on a network are running slow and many user tasks are timing out. The
administrator checks the network and finds duplicate copies of program code in the active
memory of each computer. Which of the following options best describes this self-
replicating code?
virus
Trojan horse
worm
bug

4 Which three of the following terms refer to the public network that acts as a buffer area
between a firewall and a boundary router? (Choose three.)
Internet
DMZ
extranet
sacrificial LAN
dirty LAN
demarcation zone
5 Which directory should be used for decompressing LSAT?
/usr/bin
/etc/bin
/usr/local/bin
/usr/sbin
/etc/local/bin

6 Which three of the following items should be included in a security policy to increase the
level of password control? (Choose three.)
Passwords should expire after random periods of time.
Passwords should be familiar names or words, so that users will not have to keep
written reminders near computers.
Passwords should be a combination of letters and numbers.
Written rules should be distributed to advise users of password expiration and lockout
policies.
All passwords should be changed by the user after a specified period of time.

7 Which of the following options best describes Network Address Translation?


Network Address Translation usually replaces proxy services and packet filters.
Network Address Translation uses private addressing to hide inside hosts from
outsiders.
Network Address Translation is used to alter the destination address of packets leaving
a secure network.
Network Address Translation allows packets to be filtered as they enter or leave the
network.

8 Which three OSI model layers are used for packet filtering? (Choose three.)
Layer 2
Layer 3
Layer 4
Layer 5
Layer 6
Layer 7

9 Which statement accurately describes a Smurf attack?


The IP headers of ping requests are spoofed so that replies will overwhelm the target
host.
The IP headers of SYN requests are spoofed so that a target will attempt to reply to
itself.
This DoS attack overflows buffers by sending illegally large ping requests to the target.
This attack exploits the three-way handshake used with TCP.
10 Which of the following options refers to a software-based, real-time network IDS that is
designed for smaller networks?
PIX
Snort
Smurf
proxy server

11 Which statement is true about username and password standards?


Complex usernames are less important than complex passwords.
Standards should only be applied to passwords. Users should select their own
usernames.
Usernames should expire every three months.
Passwords should be simple and easy to remember.

12 How can developing an e-mail policy protect a network from viruses?


An e-mail policy will state what can be sent and received so that users will no longer
need to be made aware of security issues.
An e-mail policy will make it safe for users to open all attachments.
An e-mail policy will define what can be sent and received to make users more aware
of security issues on the network.
An e-mail policy will require users to notify the other users on the network as soon as
a threat is suspected.

13 Which two of the following options provide a basic firewall solution by using rules to
control network traffic? (Choose two.)
proxy services
ip masquerade
packet filters
Network Address Translation
access control lists

14 Which two of the following protocols are used by IPSec? (Choose two.)
Encrypted Secure Header
Encapsulating Security Payload
Authentication Header
Authenticated Secure Header
15 Which of the following options best describes the characteristics of an IDS?
hardware, inspects all network activity, denies or permits access using filters, signals
an alarm
hardware or software, limits access to prevent intrusion, inspects all network traffic
software, designed to identify intrusion using a set of patterns, signals an alert
inspects all network activity, identifies suspicious patterns, signals an alert

16 Which three of the following vulnerabilities have been overcome in newer versions of
operating system software? (Choose three.)
ping of death attack
land attack
Teardrop
buffer overflow

17 Which three of the following options are necessary to protect against the threat of viruses?
(Choose three.)
Outgoing traffic should be filtered at all gateways.
Incoming traffic should be filtered at all gateways.
Current virus protection software should only be installed on incoming gateways.
One administrator should issue all virus warnings.
Policies should be created to control outgoing e-mail.
Virus protection software should be current on all computers.

18 Which two of the following statements correctly describe audit trails? (Choose two.)
Audit trails secure a network.
Audit trails help maintain security on a network.
Audit trails back up data on a network.
Audit trails are used to recover lost data.
Audit trails are used to allocate network resources.

19 To create a security policy, which of the following actions should occur first?
All servers should be placed in a secure, central location.
All users should be surveyed to identify potential security threats.
All users should receive written guidelines of what is acceptable and allowed on the
network.
All users should receive instructions outlining how to install and upgrade virus
software.
20 Which DoS attack uses fragments with overlapping reassembly information to take
advantage of the way IP handles fragmentation?
SYN attack
Teardrop
ping of death
land

Вам также может понравиться