Вы находитесь на странице: 1из 4

1.-Which of the following commands should you use to add to host 192.168.0.10 a default gateway to 192.168.0.1? A.

route add default gw 192.168.0.10 192.168.0.1 B. route add default gw 192.168.0.1 C. route add 192.168.0.10 default 192.168.0.1 D. route 192.168.0.10 gw 192.168.0.1 2.-What is the purpose of the - n option to route ? A. It causes no operation to be performed; route reports what it would do if - n were omitted. B. It precedes specification of a netmask when setting the route. C. It causes machines to be identified by IP address rather than hostname in output. D. It forces interpretation of a provided address as a network address rather than a host address. 3.-You want to link four branch offices private networks to a company s central office s private network using OpenVPN. Which of the following conditions should you ensure is met to avoid problems? A. Each of the offices should use a different IP address range. B. Each of the offices should use a key from a different CA. C. Each of the offices should have approximately the same number of computers. D. Each of the offices should use DHCP on all its computers. 4.-Your computer is in the example.com domain, but you want to be able to contact the neil.tranquility.luna.edu and buzz.tranquility.luna.edu servers by typing neil or buzz as the hostnames, respectively. How can you accomplish this goal? (Choose all that apply.) A. Add the lines host neil neil.tranquility.luna.edu and host buzz buzz.tranquility.luna.edu to your bash startup script. B. Add entries for neil and buzz , linking them to their IP addresses, to /etc/hosts . C. Add the line search tranquility.luna.edu to your /etc/resolv.conf file. D. Add the line nameserver tranquility.luna.edu to your /etc/resolv.conf file. 5.-Your computer has an IP address of 192.168.21.102, with a network mask of 255.255.255.0. You re able to ping 192.168.21.7 and 192.168.21.98, but not 192.168.27.3 or 10.78.21.102. If you know that all of these addresses are valid and the computers are turned on and connected to the network, which of the following is the most probable cause of this problem? A. The name server configuration is set incorrectly on 192.168.21.102. B. The default route is set incorrectly on 192.168.21.102.

C. The DHCP servers must be activated on 192.168.27.3 and 10.78.21.102. D. The netmask is set incorrectly on 192.168.21.102. 6.-What is the effect of the following line, found within the options section of a /etc/ named.conf file? directory /home/sam/bind; A. It tells BIND to look in the /home/sam/bind directory for its zone files. B. It guarantees that the user sam will be able to edit the BIND configuration. C. It configures BIND to run as the user sam , thus improving the server s security. D. It locks BIND in a chroot jail located at /home/sam/bind . 7.-What is the effect of the following /etc/named.conf lines? listen-on port 53 { 127.0.0.1; }; listen-on-v6 port 53 { ::1; }; A. The server can be accessed only from the computer on which it s running. B. The server will run using a firewall on port 53. C. The server will be available to remote computers via both IPv4 and IPv6. D. The server will be available to remote computers via IPv6 only. 8.-You want to enable users to access the computer with the IP address of 192.168.17.198 as linus.example.com . What line would you place in the zone file for example.com to accomplish this task? A. linus IN A 192.168.17.198 B. linus IN MX 192.168.17.198 C. 198 IN TXT linus.example.com. D. 198 IN PTR linus.example.com. 9.-What is the effect of the following two DNS zone file entries? tycho.luna.edu. IN A 192.168.23.5 www IN CNAME tycho A. The same computer (192.168.23.5) may be accessed as either tycho.luna.edu or www.tycho.luna.edu . B. The same computer (192.168.23.5) may be accessed as either tycho.luna.edu or www.luna.edu . C. Email sent to the www.luna.edu domain is delivered to tycho.luna.edu . D. The server will fail to start, since a stray dot ( . ) appears at the end of the hostname tycho.luna.edu . 10.-Assuming it s properly configured, what can you say about a BIND server that has the following line in its /etc/named.conf file? allow-transfer {10.23.98.102; 10.202.79.121;); A. It s a slave that transfers data from two other computers.

B. It s a master or slave that allows zone transfers to two other computers. C. It s a slave that transfers data to two other computers. D. It s a master that transfers data on two Ethernet interfaces. 11. A Samba server ( dance ) includes a [homes] share definition but no [sammy] share definition. Assuming the relevant account exists, what will then happen when the user sammy on a client attempts to access \\dance\sammy ? A. An error message will appear because the [sammy] share doesn t exist. B. If the user enters the correct password, he ll be given access to the /home directory on the server. C. The user will be given access to the /tmp directory whether or not a correct password is entered. D. If the user enters the correct password, he ll be given access to his home directory s files on the server. 12. What does the following line in an smb.conf file mean? name resolve order = lmhosts A. Samba uses the lmhosts file preferentially for name resolution but will use other methods if necessary. B. Samba uses the lmhosts file exclusively for name resolution and does not fall back on other methods. C. Samba uses the lmhosts file as source material when it functions as a NetBIOS name server. D. Samba uses the lmhosts file s contents to determine the priority given to different clients name - resolution requests. 13.-Where does the ISC DHCP server store data on the leases it has issued? A. leases.conf , typically in /var/dhcp B. leases.log , typically in /var/log/dhcp C. dhcpd.log , typically in /var/dhcp/leases D. dhcpd.leases , typically in /var/lib/dhcp 14.- A firewall script includes the following two lines. What is their purpose? iptables -A OUTPUT -d 127.0.0.1 -o lo -j ACCEPT iptables -A INPUT -s 127.0.0.1 -i lo -j ACCEPT A. To set the default policy for all chains to ACCEPT ; subsequent rules will use DROP or REJECT B. To enable routing of localhost traffic on a computer configured as a router C. To enable communications over the localhost interface for local programs D. To set the default policy for the OUTPUT and INPUT chains to ACCEPT , leaving the FORWARD chain unaffected

15.- You want to modify some Apache settings for a single directory in your Web site s directory tree. You enter the relevant changes in a file and save that file in the relevant directory. What name should you give this file? A. .apache B. .httpd C. .htaccess D. .apache config 16.-You want to use the VirtualHost directive to define a limited number of virtual hosts on an Apache server. Furthermore, this server has two network interfaces, one for your local network ( eth0 , 172.24.21.78) and one for the Internet ( eth1 , 10.203.17.26). What directive can you include to ensure that your virtual hosts are defined only on your local network? A. VirtualHostOnly eth0 B. Bind eth0 C. NameVirtualHost 172.24.21.78 D. ExcludeVirtualHosts 10.203.17.26

Оценить