Вы находитесь на странице: 1из 53

SL.

NO Topic Questions Answers

TIS Base
1 Wintel Which of the following modules manages bindings in NDIS? Protocol manager

TIS Base
2 Wintel RAID 1 offers what type of fault tolerance? Mirroring

TIS Base
3 Wintel Which coaxial cable type would be used with Thicknet? A.RG-8

TIS Base
4 Wintel MMC is an acronym for: Microsoft Management Console

TIS Base When connecting IIS to an external data source through ODBC (Open Data
5 Wintel Base Connector), which type of ODBC DSN must be specified? System

TIS Base
6 Wintel Which of the following are Windows 2003 Executive Services? Window Manager

TIS Base
7 Wintel Which of the following operating systems is ideal for Web servers? Windows 2003 Standard Server

TIS Base
8 Wintel The gradual weakening of a signal on a wire or other medium? Attenuation

TIS Base If you are planning a dual boot system which will boot either Windows XP or
9 Wintel Windows 7, which operating system should be loaded first? Windows XP

TIS Base When installing a dual-boot configuration with Windows 7 and Windows XP Each operating system must be installed in a separate partition or disk
10 Wintel Professional? drive

TIS Base
11 Wintel Which IEEE standard defines internetworking and the OSI model? 802.1

TIS Base When using WINNT32, the file WINNT32.LOG is the default file name for the
12 Wintel parameter. /DEBUG
You are the desktop administrator for your company. All employees have
Windows XP Professional computers. Twenty engineers at the company use
portable computers. An engineer named Tom wants to install an external
parallel-port tape backup drive to use the removable storage features of
Windows XP Professional. The tape drive is included on the Hardware
Compatibility List (HCL) Tom connects the tape drive to his computer and
installs the manufacturer-provided drivers and software. When Tom attempts
to create a media library for removable storage, the tape drive is not listed as
TIS Base an available library to select. You need to enable Tom to install the driver for
13 Wintel the tape drive. What should you do? Add Tom to the local Backup Operator group on his computer
You are the desktop administrator for Wingtip Toys. Management requires
that a standard user profile be created for all domain user accounts.
Additionally, the standard profile must be protected so that domain users
cannot make permanent changes to the standard profile. You create a
company standard user profile. You require all domain us accounts to use this
profile. Later, users report that the changes they make to their desktop are
TIS Base overwriting the standard profile settings. What should you do to ensure
14 Wintel permanent changes cannot be made to the standard user profile? Open the local default user profile. Rename ntuser.dat to ntuser.man
You are the desktop administrator for your company. You install a new driver
for the network adapter card on your Windows XP Professional computer.
When you restart the computer, the monitor displays a STOP error with no
text before you are able to log on. Every time you restart the computer, a
STOP error halts the start process. You need to correct the error without
TIS Base affecting the user data on the computer. You also need to restore the original
15 Wintel network adapter driver. What should you do? Restart the computer with the last known good configuration

TIS Base
16 Wintel Which tools can be used to convert a disk from basic to dynamic? Disk management snap-in

TIS Base How do you prevent or ensure the inappropriate use of the domain
17 Wintel Administrator account. Renaming the Administrator account and change password
You want to install windows XP professional on 30 PXE-compliant computers
and 35 non-PXE-compliant computers. All 65 computers are included on the
TIS Base current hardware compatibility list (HCL). You create a RIS image. You load
18 Wintel the Image on the RIS server. You then start the 65 computers. You find that Run Rbfg.exe to create a Non-PXE-compliant startup disk
the 30 PXE-Compliant computers can connect to the RIS server. However, the
35 non-PXE-compliant computers have to connect to the RIS server. What
should you do?

You are the administrator of the corp.arborshoes.com domain. Users in the


domain run Windows XP Professional on their desktop computers. A user
named Katrin in the Sales organizational unit reports that her mouse is not
working correctly. You logon to the domain from Katrin's computer using a
domain administrative account. You use Device Manager to display the
current information for the mouse drivers. You discover that Katrin's
computer is using an older version of the mouse driver. You have a current
driver by the manufacturer of mouse. You install the current driver by the
usage of Device Manager and restart the computer. You test the mouse and it
is still not functioning correctly. You check the problem and see that the
TIS Base previous driver is still installed. You want to be able to install the correct Set the Sales OU policy for security to warn and allow the installation
19 Wintel mouse driver. What should you do? to override the local security defaults
You are using Windows Installer to deploy an application to 750 Windows XP
Professional computers on your network. The network includes an
organizational unit (OU) named Sales. A Group Policy object (GPO) is created
for the Sales OU. The software deployment of the application is unsuccessful.
During the deployment, some users in the Sales OU report that the installation
is aborting with random errors midway through the installation process. The
TIS Base remaining users in the Sales OU report that the software is installing, but is
20 Wintel giving them general protection fault errors. What should you do? Repackage and redeploy the application's .msi file to the Sales OU
You install Windows XP Professional on your portable computer. You use a
docking station for your portable computer when you are in the office. You
install an ISA-based SCSI adapter in your docking station. You insert your
computer into the docking station and start the computer. The SCSI adapter is
not detected during the startup process. You start the Add/Remove hardware
wizard, when the wizard process is finished, the SCSI adapter is not listed. You
TIS Base want to allow Windows XP Professional to detect SCSI adapter. What should Restart the Add/Remove hardware wizard. Manually add the SCSI
21 Wintel you do? adapter driver
You are the administrator of your company's network. An employee named
Mark is leaving the company. A new employee named Eric has been hired to
replace him. Mark has a local user account on a Windows XP Professional
computer. Mark has rights to multiple files and folders on the computer. You
want Eric to have the same rights and permissions that Mark has. You want to
TIS Base ensure that Mark will no longer have access to the files and folders. You want
22 Wintel to accomplish this with least administrative effort. What should you do? Rename Mark's user account to Eric and change the account password
You are the administrator of a Windows 2003 network. Your network includes
75 Windows XP professional computers. You are adding 50 new PXE-
compliant computers to the network. The hardware on each computer is
configured identically. You are using a RIS image to deploy Windows XP
Professional to the 50 computers. You successfully install Windows XP
TIS Base Professional on the first 10 computers. However, you cannot install Windows
23 Wintel XP Professional on remaining 40 computers. What should you do? Configure the DHCP scope to add additional IP addresses
You use Windows XP Professional on a desktop computer. You schedule a task
to run an MMC snap-in to perform configuration tasks to another computer.
You notice that the task is completing incorrectly. You manually start MMYou
add the snap-in and are then able to successfully run the task.You verify that
TIS Base all of your other tasks are working correctly. You want to enable your task to Use Scheduled Tasks to configure the task to run under the security
24 Wintel complete successfully. What should you do? context of your account
You configure your Windows XP Professional portable computer to redirect
you’re my Documents folder to your home folder. You want to ensure that you
TIS Base can access all of your files in you’re my Documents folder when you are not
25 Wintel connected to the network. What should you do? Use Windows Explorer to enable Offline Files
You are the desktop administrator for your company. All users have Windows
XP Professional computers. Users in the sales department have portable
computers. The portable computers are used to create customer presentations
and perform online ordering. Sales representatives want to be able to use large
external monitors to display their presentations at customer locations. These
users also want to use the displays on the portable computers to show their
speaker notes and extra datYou verify that the video adapters in the portable
computers support multiple monitor and dualview capabilities. However, the
sales representatives report that when they attach the external monitors to
their computers, the option to define separate desktop displays does not appear
TIS Base in the Display settings. You need to enable the sales representatives to display Obtain and install an updated driver from the video adapter
26 Wintel multiple desktops. What should you do? manufacturer
You are the desktop administrator for your company. Your company has
offices in Los Angeles and New York. Both offices are connected by a wide area
network (WAN) connection. The networks at both offices include Windows XP
Professional computers. The company uses a single Active Directory domain
that includes a Microsoft exchange 2003 server computer. Neither office is
connected to the Internet. Peter is a member of the marketing department in
the New York office. Peter needs to use Remote Assistance to obtain help from
another marketing employee in Los Angeles. However, when Peter attempts to
send a remote assistance invitation by using Windows Messenger, and error
message reports that he does not have a Net Passport. You need to ensure that
TIS Base Peter can send a Remote Assistance invitation by using Windows messenger.
27 Wintel How should you configure Peter’s computer? Configure Windows Messenger to log on by using an exchange account

TIS Base Telnet, FTP, SMTP, DNS, HTTP are examples of protocols that are used in
28 Wintel ____________________. application layer of OSI reference model
TIS Base
29 Wintel SNMP used the below port 161
You are the network administrator for Wipro. The network consists of a single
Active Directory domain named wipro.com. All network servers run Windows
Server 2003, and all client computers run Windows XP Professional. XML
Web services for the internal network run on a member server named
WiproSrv1, which is configured with default settings. You are a member of the
local Administrators group on WiproSrv1. You need the ability to remotely
manage WiproSrv1. You have no budget to purchase any additional licensing
TIS Base for your network until the next fiscal year. How should you reconfigure
30 Wintel WiproSrv1? In the System Properties dialog box, enable Remote Desktop.

TIS Base Which of the following OSI layers is responsible for identifying
31 Wintel communications partners Application

TIS Base
32 Wintel A Hub operates at which of the following layers of the OSI model? Physical
The manager of the finance department has two spreadsheets that contain
sensitive information. She has used Windows XP encryption to ensure the
TIS Base security of the files on her local computer. She would like to make a backup of
33 Wintel the files. What should you advise her to do? Copy the files to a network share on an NTFS volume

TIS Base Which of the following is the fastest way to view the real-time CPU Utilization
34 Wintel within a Microsoft Windows 2003 Server environment? Task Manager

TIS Base
35 Wintel Which of the following is a typical VMware virtual machine configuration file? .vmx

TIS Base
36 Wintel Which of the following is a benefit of ESX Server 3i over ESX Server? Increased Security and Reliability

TIS Base
37 Wintel TCP ICA communication port is 1494

TIS Base
38 Wintel The ICA protocol operates on the ______ layer of the OSI model presentation

When installing Presentation Server 4.5 an administrator received an error


TIS Base that the database username or password is incorrect.
39 Wintel Which service failed to start in this scenario? IMA
An administrator has been instructed to give a specific employee in the Finance
group access to Engineering
TIS Base resources. To which level should the administrator assign the policy when
40 Wintel configuring access for this employee? User
As an experienced technician, you are required to perform a tape backup every
evening. You are
thinking of an appropriate backup method so that only those files that have
beenchanged since
the last backup will be backed up. Refer to the following backup method,
TIS Base which one will enable
41 Wintel that and clear the archive bit for each file? Incremental
You are an IT professional in an international company. During your working
hours, a client calls
you and states that there is something wrong with his computer as he usually
gets the error
message of "The security log on this system is full." What's more, the prompt
message also
claims that"only an administrator can log on and fix this problem". How can
TIS Base the administrator
42 Wintel solve this problem? Event Viewer
Windows XP is a line of operating systems produced by Microsoft for use on
personal computers, including home and business desktops, laptops, and media
centers. The most common editions ofthe operating system are Windows XP
Home Edition and Windows XP Professional. Automated
System Recovery (ASR) is a recovery option that has two parts: ASR backup
TIS Base and ASR restore. If you are asked to perform an Automated System Recovery
43 Wintel restore in Windows XP, which of the following is necessary? Operating system CD
Which of the following is a utility to troubleshoot the Windows startup process,
and modifies which
programs run at startup, edits certain configuration files, and simplifies
TIS Base controls over Windows
44 Wintel services? MSCONFIG
You work as an IT professional in an international company. In your ompany,
you are responsible for infrastructure design and global configuration changes.
Right now, you are asked to find out the Domain Name System server address
in Windows XP. When you try to run winipcfg, you
TIS Base receive an error message stating that this command is unrecognizable. Which
45 Wintel of the following Run the ipconfig /all command.
method will be helpful to determine the DNS server address?

Introduction which shell execute commands using C programming language like


46 to unix syntax csh

Introduction which component handles interrupt and trap handling, system clocks,
47 to unix scheduling, file descriptor, etc. kernel

Introduction
48 to unix which is the common kernel name? genunix

Introduction
49 to unix Default shell of UNIX c,korn,bourne

Files &
50 directories The command used to see data flow in ftp hash

Files &
51 directories When you run ls -la to list the file, you find "rw-", what it means ? read and write but no execute

Access to
files and Which of the following tool/utility cannot be used to login to a Unix
52 directories system NFS

Access to
files and Lists all words that has the keyword "unnec" in the file -
53 directories what does the command "grep unnec /usr/share/dict/words" return /usr/share/dict/words

Access to
files and
54 directories what will pwd command return present working directory

Access to
files and
55 directories what happens when cd /usr is executed changes the current directory to /usr

Access to
files and
56 directories what is the octect number, with respect to permissions for rwxr-xr-- 754

Access to
files and
57 directories which command can tell you if the file has (or is ) a soft link ls

Access to
files and
58 directories what is the possible output for "cat test1" command? contents of the file called test1, if file exists

Access to
files and
59 directories which command cannot be used for seeing filesystem utilization ls

Access to
files and
60 directories Remove or delete FILE ? rm FILE

61 Editors What is the expansion of sed? stream editior

To find and replace the word "Moon" to "Sun" only the first occurance word
62 Editors in the file old is? sed '/s/Moon/Sun/' old

63 Editors The default mode of VI editor is? Command mode

64 Editors The command to save the file focefully is? :w!

65 Editors The command to quit the vi editor without saving the file is? :q

66 Editors The command 3dd in the VI editor command mode_____. Deletes three lines from current cursor position downwards
67 Editors The command to redo the change in VI editor is? ctrl-r

Another way to save your changes and exit out of VI is______, It is the simplest
68 Editors way for the same. zz

______ command deletes from current cursor position to the beginning of the
69 Editors line in VI editor. d^

The command to enter insert mode in a new line above the current cursor
70 Editors position in VI editor is? O

The command that will recover a file after an unexpected interruption in VI


71 Editors editor is? :recover

72 Print services The profile file for a bash shell is .bashrc

73 Print services The command sends a job to the queue to be printed lpr

74 Print services The service running for printing service is cupsd

75 Print services Command to print a file with multiple copies lp -n num-copies filename

76 Print services Command to print a file with multiple copies lpr # num-copies filename

77 Print services Advanced version of VI editor is vim

78 Print services The passwords are stored in the file /etc/password

79 Print services The /etc/shadow file contains encrypted password and it is a read-only file. TRUE

80 Print services The /etc/password file stores group information or defines the user groups TRUE

81 Handling IO Which of the following is used for background Jobs &

For suspending, Re-starting and terminating background jobs which of the


82 Handling IO below mentioned character can be used with %

The descriptor and the redirection operator must be written as


83 Handling IO Which of the following statement is true? consecutive characters

84 Handling IO Which of the following commands creates a Bash subshell? bash

85 Handling IO Which of the following is the descriptor of the standard input stream? 0

86 Handling IO Acronym for grep global regular expression print

87 Handling IO egrep stands for Extended grep

Which of the below option in grep can be used to print a list files that contain
88 Handling IO at least one line matching the pattern? l
89 Handling IO To select the lines beginning with an uppercase character and ending with “!” egrep ‘^[A-Z.*\!.$’ file

90 Handling IO To find out wipro is currently logged into the system, choose the correct one? $ who | grep “wipro”

91 Handling IO What is meaning of command >&2? Redirects stdout of command to stderr.

92 Handling IO How do you redirect both stdout and sderr the script to file name? command &>filename

93 Handling IO How to discard error for the command? find / -name "*" -print 2> /dev/null

Its mainly used for showing up all parameter values passed in shell
94 Handling IO What is $*? script.

Disk what is the command to list files from directory in decreasing order of their file
95 Management size. du /directory_path | sort -nr

Disk
96 Management Which command used to make driectory 'dir' private chmod 700 dir

Disk
97 Management Which command is used to limit filesizes limit

Disk
98 Management Which command displays the size of a directory? du

Disk
99 Management How do you search the a word 'unix' from a file 'file_name'? cat file_name | grep 'unix'

Disk
100 Management Which command is used to uncompress compressed file uncompress

Disk
101 Management Which command used to finds text within a file grep

Disk
102 Management Which command is used list all files having a ".txt" extension ls *.txt

Disk Which command is used reducing an existing file to a file 'somefile' with the
103 Management same name that is 0 bytes cp /dev/null somefile

Disk
104 Management How do you send a mail message to somebody? mail somebody@wipro.com -s ‘Your subject’

Disk
105 Management du stands for? disk usage

Disk
106 Management in df -h commnad what is -h means Humanreadable

Disk
107 Management If a file has permissions 000, then who can access the file? root

Disk Which command displayssummary of disk space used in all the mounted file
108 Management system? du -sk

Disk
109 Management Which utility is used to reduce size of a file? compress

Disk
110 Management Which command is used to create a new directory? mkdir
Disk
111 Management What's so special about files and directories starting with a period? The are considered as “hidden files/dirs”

Disk
112 Management Can you use > and | together? Yes

Disk
113 Management What is the command to limit filesizes inC and Turbo c shell limit

Disk creates a file "archivefile1.zip" which contains a copy of all files


114 Management What is out of this command zip archivefile1 * in the current directory in compressed form.

Process prints the process status for some or all of the running
115 Management What is "ps" command for? processes

Process
116 Management How would you kill a process? Using by kill command

Process
117 Management What are the process states in Unix? Choose the correct combination. Running,Waiting,Stopped,Zombie

Process Through inter-process communication schemes (pipes,


118 Management How can a parent and child process communicate? sockets, message queues, shared memory)

Process
119 Management Positive integer that uniquely identifies this process. process-ID

Process
120 Management It is system monitor tool. top

Process Following command can be issued to send the kill signal to all
121 Management processes. kill -9 -1

Process Which of the command displays or set scheduling parameters of


122 Management specified proces ? priocntl

Process
123 Management The fork() creates new process called ? Child process

124 Networking what is the port used for SSH ? 22

125 Networking which are the FTP commands ? get, put, mget, mput

126 Networking what is the command to view the routing table ? netstat -rn

127 Networking which protocol is used in traceroute udp

128 Networking network tool used to show the route taken by packets across an IP network ? traceroute

129 Networking what are the security concerns addressed on FTP ? Port Stealing,Sniffing

Job insert # at the beginning of the line you want to stop for a while
130 Scheduling how to disable crontab tasks ? save and exit

Job
131 Scheduling which command executesthe task at a specified time. at

Job
132 Scheduling How to set the file transfer type If the file is readable text file ? ascii
Job using a at command schedule a job to compile a C program at 11:35 a. m. on
133 Scheduling January 14 echo "cc -o foo foo.c" | at 1135 jan 14

Job
134 Scheduling Configuration file for a cron is crontab

How will you execute backup and restore using the tar
135 Unix utilities command in a single command ? tar cvf - /attachments/abc.txt | tar xvf -

136 Unix utilities Which command provides an ongoing processor activity in real time? top

You wish to restore the file memo.test which was backed up in the tarfile
137 Unix utilities mybackup.tar. What command should you type? tar -xf mybackup.tar memo.test

138 Unix utilities What utility can you use to show a dynamic listing of running processes? top

The top utility can be used to change the priority of a running process?
139 Unix utilities Another utility that can also be used to change priority is nice

What command would you type to use the cpio to create a backup called
140 Unix utilities backup.cpio of all the users' home directories? find /home | cpio -o > backup.cpio

141 Unix utilities What does iostat do? Reports about I/O activity on the server.

142 Unix utilities what is the SAR ? Displays the activity for the CPU

143 Unix utilities what is TOP ? display a continually updating report of system resource usage.

which command reports such as the system time, uptime, CPU usage, physical
144 Unix utilities ans swap memory usage, and number of processes? TOP

How do you get current CPU utilization, memory and disk space usage in
145 Unix utilities Unix? iostat.

146 Unix utilities Copies files into and out of archive storage and directories. cpio

The utility found on all UNIX systems that monitors various system functions
147 Unix utilities cpu,hard disk, process running ,terminal IO sar

148 Unix utilities what is the command to display the Interface statistics ? netstat -i

149 Unix utilities how to view only the device report using iostat command? iostat -d

The command is useful in determining whether a physical volume is becoming


150 Unix utilities a performance bottleneck and if there is potential to improve the situation. iostat

151 Unix utilities what is SAR ? System Activity Reporter

The Tool that does not impact the system performance while collecting the
152 Unix utilities performance report ? sar

153 Unix utilities what is the sar command options to check only the disk activity? sar -d

The command that reports information about processes, memory, paging,


154 Unix utilities block IO, traps, and cpu activity. vmstat
155 Unix utilities what does the command iostat -xtc 5 2 ? extended data report at 5 seconds interval 2 times

The command used to diagnose the network problems when the connectivity is
156 Unix utilities there but it is slow in response . netstat -i

157 Unix utilities what does options -d do in iostat command ? Display the device utilization report

158 Unix utilities what does options -x do in iostat command ? Display extended statistics including disk utilization

159 Unix utilities Which command (and options) will show the state of all sockets using netstat? netstat -a

160 Unix utilities what does the SIZE refers to in the Top output ? refers to the virtual memory

161 Unix utilities what does the RES refers to in the Top output ? refers to the resident memory used in the RAM

You want to create a compressed backup of the users' home directories. What
162 Unix utilities utility should you use? tar

163 Unix utilities The "tar" command stands for ? tape archive

Account What is the file name where the default user SHELL variable is stored and
164 Management used when adding a user /etc/default/useradd

Account
165 Management What does 'userdel -r User01' do ? Delete user User01 from system

Account
166 Management The gid for root group is : 0

Account
167 Management To lock an account User01 you can issue command usermod -L User01

TIS Base Which one of the following is NOT a specific roles and responsibilities
168 ITIL associated with the execution of a successful service design ? A)Change Manager

TIS Base Who is responsible for providing actual resources to support the ITSM
169 ITIL Lifecycle. A)Technical Management

TIS Base A)Through testing, to ensure that services are designed to meet
170 ITIL Which of the following is NOT an objective of Service Operation? business needs

TIS Base
171 ITIL Which of the following is NOT one of the ITIL core publications? A)Service Optimization

TIS Base
172 ITIL Which of these is NOT a recognized Service Desk structure? A)Remedial Service Desk

TIS Base In 7 Step Improvement process, each step is driven by 1. Strategic goals 2.
173 ITIL Tactical Goals 3. ? A)Operational Goals

TIS Base Setting policies and objectives is the primary concern of which of the following
174 ITIL elements of the Service Lifecycle? A)Service Strategy

TIS Base A)The ability to detect events, make sense of them and determine the
175 ITIL Which of the following BEST describes the purpose of Event Management? appropriate control action

TIS Base Which of the following statements about Supplier Management is A)Supplier Management negotiates internal and external agreements
176 ITIL INCORRECT? to support the delivery of services
TIS Base A)A definite level of utility and warranty associated with a core service
177 ITIL A Service Level Package is best described as? package

TIS Base
178 ITIL For which of these activities is the Change Manager responsible? A)Chairing the CAB

TIS Base Which one of the following is NOT a specific roles and responsibilities
179 ITIL associated with the execution of a successful service strategy ? A)Service Level Manager

TIS Base What is the CORRECT order of the first four activities in the 7 Step A)Define what you should measure, define what you can measure,
180 ITIL Improvement Process? gather data and process data

TIS Base Which of the following statements is CORRECT about patterns of demand
181 ITIL generated by the customer’s business? A)They are driven by patterns of business activity

TIS Base
182 ITIL The goal of Problem Management is: A)To prevent Problems and resulting Incidents from happening

A)To continually align and re-align IT services to the changing


TIS Base business needs by identifying and implementing improvements to IT
183 ITIL The goal of Continual Service Improvement is BEST described as: services that support business processes

A key role for Service Operation is to achieve a balance between conflicting


TIS Base sets of priorities. A fundamental conflict exists between IT and a set of A)The view in which the organization focuses only on business
184 ITIL technology components on one side and: requirements and the services delivered

A)1-Define what you should measure. 2-Define what you can measure.
TIS Base Which of the following is the CORRECT order of the activities in the 7-Step 3-Gather data. 4-Process data. 5-Analyse data. 6-Present information.
185 ITIL Improvement Process (first activity first)? 7-Implement corrective action.

TIS Base
186 ITIL What is the purpose of the Request Fulfillment Process? A)Dealing with Service Requests from the users

TIS Base The objective of the Change Management process is most accurately described A)Ensuring that all changes are recorded, managed, tested and
187 ITIL as? implemented in a controlled manner

TIS Base Which of the following statements CORRECTLY defines Insourcing and A)Insourcing relies on internal resources; outsourcing relies on
188 ITIL Outsourcing delivery model options? external organization(s) resources

TIS Base Why should monitoring and measuring be used when trying to improve
189 ITIL services? A)To validate, direct, justify and intervene

TIS Base
190 ITIL Previous knowledge of incidents and problems are stored is? A)Known Error Database

A)To build, test and deliver the capability to provide the services
TIS Base Which of the following statements fully describes the aim of Release and specified by Service Design and that will accomplish the stakeholders’
191 ITIL Deployment Management? requirements and deliver the Intended objectives

TIS Base A)A process is continuous and has no end date, whereas a project has a
192 ITIL What is the difference between a process and a project? finite lifespan.

A)To align IT security with business security and ensure that


TIS Base Which of the following best describes the goal of Information Security information security is effectively managed in all service and Service
193 ITIL Management Process? Management activities’.

TIS Base Which process manages IT service assets from the point of acquisition through
194 ITIL to disposal and manages the asset inventory? A)Service Asset and Configuration Management (SACM)

TIS Base
195 ITIL Availability Management is responsible for availability of? A)Services and Resources

196 E_Port Associated with Internal Fabric Expansion

197 Fabric Speed 4 Gbit/Sec is equal to 400 MB / Sec

198 How many no. of domain can added in a single fabric? 256
199 Multi mode fibre cable for Short Distance

200 What you mean fabric? A well designed network

201 SVC means -----? Storage Volume Controller

202 How many no. of domain can added into a single fabric? 256

203 Full volume flash copy functions are Backend Copy or No Copy

204 Metro mirror is Synchronous Mirroring

205 Fabric Speed 4 Gbit/Sec is equal to 400 MB / Sec

A LUN is presented from a Array to a Solaris Host through SAN Fabric, how
206 does it would appear in the Host Disk

207 How Many drive failures in a RAID 5 data set can be protected 1 Drive failure

208 State the benefit of the fiber channel SAN compared to DAS More flexible and scalable connectivity

In IP-SAN how many HBA ports are mandatory on Solaris host to access
209 storage 0

Two switches where connected by three ISL cables with trunking or


210 aggregation, why you need trunking or aggregation Availability

211 What is the purpose of domain ID in fabric Identifying group of switches

212 Name of the characteericstic of file level host storage access Data is accessed using NFS,CIFS, and FTP

213 Name the access method which is used for file sharing over an IP NAS

214 Which data type is NAS used ? File Level

215 Name two ways in which an IP address can be assigned the computer Dynamicall or Statically
What is the correct order of operations for array-based synchronous
replication? A: Write is received by the
source array from the host/server
B: Remote array sends acknowledgement to the source array
C: Source array signals write complete to the host/server
216 D: Write is transmitted by the source array to the remote array A, B, C, D

Which EMC product family allows for the configuration and management of
217 Fibre Channel switched fabrics? Celerra

Which category of data center management ensures business continuity by


218 eliminating single points of failure? Availability Management

All of the following are individual tasks handled by the Host during the process
of allocating storage to a new server in an existing SAN environment
219 EXCEPT: Assignment of new volumes to array front end ports
220 Which technology is designed for storage of fixed content data? CAS

Which key requirement of the Data Center infrastructure addresses the


221 concern of data on storage systems being accessible 24X7? Availability

222 Name a characteristic of file level host storage access Data is accessed suing NFS, CIFS, and FTP

223 Name the access method which is used for file sharing over an IP network NAS

State the benefit of a Fibre Channel SAN compared to DAS(Direct-Attached


224 Storage) More flexible and scalable connectivity

What is the most common use of its serial port (COMM port), for A Fibre
225 Channel switch? Assigning an IP address to the switch via CLI

226 How many no. of domain can added in a single fabric 256

227 Multi mode fibre cable for Short Distance

228 Full volume flash copy functions are Backend Copy or No Copy

229 Metro mirror is Synchronous Mirroring

A LUN is presented from a Array to a Solaris Host through SAN Fabric, how
230 does it would appear in the Host Disk

Which type of Backup, backs up all the files in a selected folder or drive
231 resetting the “archive bit” attribute? Full Backup

232 Which three backup types are considered automatic backups? (Choose three.) Full Backup

Which native utility can be used to ensure that Windows 2000 can read and
233 write to a tape drive? NTBACKUP

234 What is a correct statement when describing NAS clients? Access data irrespective of their physical locality

235 Which architecture type is Replication Manager? Client/Server

What is a critical disadvantage of DAS (Direct-Attached Storage) when


236 compared to SAN technology? Connectivity is not easily scalable

237 What is a benefit of centralizing storage using a NAS device? Can reduce the complexity of business operations

238 RAID-10 can be used on which type(s) of host system(s)? Mainframe

239 What is true of the source LUN during a reverse synchronization? Accepts all incoming I/Os

240 What describes the Buffer Credits parameter? A flow control mechanism within a FC SAN

241 Which statement about Network backup is correct? Both Metadata and Data passes over the network infrastructure
242 What is the primary purpose of iSNS? To assist with discovery of iSCSI targets

243 IEEE 802.3ad link aggregation is controlled by which protocol? LACP

IP-based gateway-to-gateway protocol that can be used for SAN


244 What describes the iFCP protocol? extension

245 What is an advantage of WWPN zoning? Existing zones remain valid even if cable connections are rearranged

246 Explain what is HVD High-Voltage Differential

247 What is ISL? Inter Switch link

248 fibre channel address is analogous to an? Ethernet address

249 Mesh Fabric advanctage? Choose 2 answers Maximum Availability

250 Which technology is designed for storage of fixed content data? CAS

Which key requirement of the Data Center infrastructure addresses the


251 concern of data on storage systems being accessible 24X7? Availability

What is the protocol used by Windows client to communicate with a NAS


252 device? CIFS

253 What best describes a Fibre Channel SAN? Dedicated storage network

254 Which Celerra component is used to manage and configure the NAS solution? Control Station

255 Which statement is true about iSCSI names? Every initiator or target has a unique iSCSI name

256 What is a requirement for a client initiated restore? Backup catalog must be available

257 What is a key management task that applies to all data center elements? Capacity management

258 What is the advantage of using multiple ISLs between two FC switches? Availability

A five disk set is configured as RAID 5. Each disk has a Mean Time Between
259 Failure (MTBF) of 500,000 hours. What is the MTBF of the set? 100,000 hours

260 What does a cache dirty bit flag? Changed data not yet written to disk

261 What failure does RAID technology guard against? Disk failure

262 What is a factor in performance for DAS? Bus type

263 What is a SAN availability management task? Configuring redundant fabrics


What is a critical design factor when deciding whether or not to deploy IP
264 SAN? Application response time

265 What do you monitor as part of an array capacity check? Allocated storage

266 Which management task eliminates single points of failure in a data center? Availability

267 Which statement describes logical volumes? May be a partition of a larger physical disk

268 What is a disadvantage of storage array based local replication? Cannot span storage arrays

A company has two SAN islands approximately one mile apart. The company
wants to create a single fabric over its public WAN connection. Which protocol
269 is recommended to connect the sites? FCIP

270 What is a purpose of iSNS? To assist with discovery of iSCSI targets

271 What is a reason for implementing single HBA zoning? Decrease reset time for any change made in the state of the fabric

272 What is a disadvantage of array based remote replication? Cannot manage log shipping

273 What is a benefit of disk mirroring compared to a single disk? Improved read performance

274 Which event is known as a head crash? A R/W head has touched the disk data area

275 What are three requirements of storage systems? Availability, Capacity, Scalability

276 What are the four components of an intelligent storage system? Back-end, cache, front-end, physical disks

IP-based gateway-to-gateway protocol that can be used for SAN


277 Which statement describes the iFCP protocol? extension

278 Which SAN topology allows IP initiators to communicate with FC targets? Bridged

279 What is a role of the backup client in a backup and recovery environment? Gather data for backup

280 What describes External DAS? Array provided device management

281 Which disk drive component is responsible for positioning the R/W heads? Actuator arm assembly

282 Which feature can mult-pathing software provide? Load balancing

The Recovery Point Objective (RPO) of a company is 2 hours. Which


283 statement is true in the event of a disaster? No more than 2 hours of production data can be lost.

284 What is a server capacity management task? Establishing user quotas

You are planning for disaster recovery of your backup and recovery
285 environment. Which backup server component must be included? Catalog
Which component in an EMC Symmetrix Array handles physical disk I/O
286 operations? Back-end adaptor
During DR planning in a two data center setup you determine that: The
remote site B will hold a copy of data that is 5 minutes behind the production
to site An additional 3 hours will be needed to power up the servers, bring up
the network and redirect users to site B can be reproductive. What is the
287 Recover Point Objective (RPO) of this plan? . Five minutes

288 What are the physical ports that interconnect two FC switches referred to as? E_Ports

289 What is a concern of NAS management? Configuring the system to meet application performance requirements

290 Which Connectrix switches can be managed using WebTools B-series

291 How many devices can a single (parallel) SCSI chain handle ? 15

SANs use these data protocols? 1.


Fibre Channel (Serial SCSI-3 over FC) 2.
292 iSCSI is Serial SCSI-3 over IP True

293 In fiber channel encoding layer uses? 8b/10b

294 What is the basic data Frame size? 2148 bytes

295 What is Point-to-Point FC Topology? Devices connected directly to each other

296 What is Arbitrated Loop FC Topology? Devices attached to a shared "loop". Analogous to Token Ring.

297 What is the number of devices in a FC-AL? 126

298 What is a Fabric? one or more switches (virtual / logical)

299 What is a logical component of a storage environment? Database

300 Name the characteristic of block-level host storage access. Storage systems present Logical Volumes or LUNs to hosts

301 Which component on an intelligent storage system provides host connectivity? Front-end

302 Which functionality is provided by multi-pathing software? Path failover

What is a disadvantage of a Fibre Channel hub when compared to a Fibre


303 Channel switch? Limited performance

304 1 Gbps multimode fibre support maximum distance? 500 M

305 What is a disadvantage of storing fixed content on tape versus CAS? Data is either offline or subject to high retrieval time

306 What is a limitation of host-based replicas? Replicas add overhead on host CPUs

307 What are two [2] advantages of Centralized Networked Storage? Consolidated data storage and retrieval
IP-based gateway-to-gateway protocol that can be used for SAN
308 What describes the iFCP protocol? extension

309 IEEE 802.3ad link aggregation is controlled by which protocol? LACP

310 What is the fundamental purpose of Zoning? To expose array ports and host HBAs to each other

311 Name the database which can be used by iSCSI initiator to discover Targets. iSNS

312 Name two ways in which an IP address can be assigned to a computer. Dynamically or Statically

Which protocol is used by open systems hosts to access storage in Fibre


313 Channel SANs? SCSI

Which two sub-components are required in a specialized NAS operating


314 system? (Choose two.) file system

Which SMI-S related acronym describes an object-oriented description of the


entities and relationships in a business management environment, divided into
315 core and common models? CIM

Which three are advantages of using a SAN in a campus environment?


316 (Choose three) Consolidate storage in a data center

What is a shared communication infrastructure device to which nodes on a


317 multi-point bus or loop are physically connected? hub

318 What are two disadvantages of using a parallel interface? as the bus length increases, the chance of skew increases

319 What is the most significant advantage of tape as a storage medium? Ideally suited for random access

320 Serial ATA cable used for? Internal DAS conectivity

321 Which one is shared storage on a network infrastructure NAS

322 which mechanisms over TCP protocol used by NFS? RPC

323 SRM stands for? storage resource management

324 ATA/IDE, SATA, and Parallel SCSI are primarily used in Internal DAS

325 External DAS could use for open systems Serial SCSI

326 what are two types of cable employed in a SAN Multi mode and single mode

327 Name server address reserved in FFFFFC

TIS Base
328 Wintel Which layer(s) of the OSI model is/are included in the NDIS specification? 2

TIS Base
329 Wintel Which RAID level is also called mirroring? 1
TIS Base
330 Wintel What is the maximum segment length on 10Base2 media? 185 meters

TIS Base
331 Wintel What is a set of rules for communication between computers called? protocol

TIS Base Which standard divides the data link layer into the LLC and the MAC
332 Wintel sublayers? 802.2

TIS Base
333 Wintel Which IRQ has a standard function as COM4? 3

TIS Base Which of the following network devices sends packets from a central point
334 Wintel based upon MAC addresses? Switch

TIS Base What is the minimum physical memory required for Windows XP
335 Wintel professional? 256MB

TIS Base You have a Corpus of 100 MB.What would be the approximate disk space The disk The disk space required to index the documents is roughly
336 Wintel required to index these documents? 40% of the Corpus.

TIS Base
337 Wintel RG-58 coaxial cable is commonly used with- Thinnet

TIS Base Write the name of layer of the OSI model that maintains a connection between
338 Wintel nodes? Session Layer

TIS Base
339 Wintel What is the another name for Raid 1? Mirroring

TIS Base
340 Wintel Which RAID level is also called duplexing? 1

TIS Base
341 Wintel During a RIS installation, after the client system boots, it initiates a- DHCP request

TIS Base
342 Wintel Which level of RAID provides mirroring only? 1

TIS Base
343 Wintel What is the minimum physical Memory required for Windows 2003? 256MB

TIS Base
344 Wintel Which IRQ has a standard function as COM3? 4
You are moving files from the folder \OLD to the folder \NEW on the same
volume. The \OLD folder is compressed using Windows XP NTFS
TIS Base compression, but the \NEW folder is not. What will the compression status of
345 Wintel the files be once the move has completed? The files are compressed
You and Stephan are the desktop administrators for your company. You
install a printer on your Windows XP Professional computer. You share his
printer on the company network. You want to ensure that only members of the
DTAdmins local group can use this printer, and that only you and Stephan can
manage the printer and all print jobs. You also want to ensure that members of Grant Allow-Print permission to the DTAdmins group. Grant Allow-
TIS Base the DTAdmins local group can manage only their own print jobs. How should Manage Documents and Allow-Manage Printers permissions to your
346 Wintel you configure security on this printer? user account and to Stephan's user account
You are the desktop administrator for your company. Initially, all employees
use Windows XP Professional computers. You upgrade all computers to
Windows 7 Professional users experience no problems after the upgrade is
complete. A new user is issued a new client computer that is identical to all
other client computer in the company.The user installs Windows 7 on this
computer from a network installation point. The user now reports that he
cannot change his Display settings to anything other than 640 x 480 resolution
with 16 color. You verify that this computer has the same video hardware as all
the other client computers. You also verify that the hardware vendor does not
currently offer a video driver for Windows 7.You need to enable the user to
TIS Base change his Display settings to higher resolution and color quality. What should Install the Windows XP Professional version of the video drivers on
347 Wintel you do? the computer
You are the desktop administrator for your company's network. All employees
use Windows XP Professional computers. All employees in the research
department use both desktop and portable computers. All computers in the
TIS Base research department have four-port USB hubs attached. A user in the research Replace the portable computer's bus-powered USB hub with a self-
348 Wintel department connects a portable USB hard disk to the USB hub attached to his powered USB hub
portable computer. However, the port on the USB hub shuts down and the
hard disk does not function.The user experiences no problem when he attaches
the same hard disk to his desktop computer's USB hub.When the user attaches
a USB mouse or keyboard to the portable computer's USB hub, the port and
device function normally. When he attaches the hard disk directly to the USB
port on his portable computer, the device functions normally. You need to
ensure that the USB hub on the user's portable computer can use the USB
hard disk. What should you do?
You are the network administrator for your company. An employee named
Bruno uses a Windows XP Professional portable computer. When he starts the
computer, Windows XP prompts him to select either a docked or an undocked
mode. Bruno primarily works out of the office and does not use a docking
station when he is in the office. He asks you to configure his portable computer
TIS Base so that it will not prompt him to select a docked or an undocked mode. What Modify the portable computer's hardware profiles, to remove the
349 Wintel should you do? Docked hardware profile
You copy the contents of the Windows XP Professional CD to a shared
network folder named \\Server1\WinXPp. You use the shared folder to
perform over-the-network installations of Windows XP Professional on new
computers purchased by your company. You receive a Windows XP Service
Pack CYou apply the Service Pack to Server1 and to the \\Server1\WinXPp
folder. You discover that the Service Pack contains several files that are
incompatible with the new computers.You want to make sure that the Service Copy the contents of the Windows XP Professional CD to
TIS Base Pack files are not installed on any new computers until the problem has been \\Server1\WinXPp again, allowing the operating system to overwrite
350 Wintel correcteWhat can you do? newer files while copying
You upgrade 6 MPS-compliant computers from Windows XP to Windows 7.
Each computer has two 550 MHz processors. The computers are used for high-
resolution graphics applications that require exceptional performance. After
TIS Base the upgrade users complain that the processing time for graphic applications is Use Device Manager to install the MPS-compliant drivers for the
351 Wintel much slower than before. What should you do? second processor
You are using Windows XP Professional on your desktop computer. You are
working on the company's financial report and you want other users on the
network to able to modify your documents for the report. You want users to
share the financial report folder on the network. Because the network contains
confidential information you want to prevent users from the enabling off line
TIS Base access for the network share that contains the financial report. What should Using Windows Explorer, disable the cache for the reports on the
352 Wintel you do? network share
You are the desktop administrator for your company’s sales department. You
need to perform a clean installation of Windows XP Professional on a
computer that currently runs Windows 2000. You start the installation. The
text-based portion of Setup finishes successfully. Before the GUIbased portion
of Setup starts, the computer stops responding. You investigate and discover
TIS Base that there is a problem with a device driver. You want to know which device is
353 Wintel causing the problem. What should you do? Modify the Boot.ini file to include the /sos switch
You and Stephan are the desktop administrators for your company. You
install a printer on your Windows XP Professional computer. You share his
printer on the company network. You want to ensure that only members of the
DTAdmins local group can use this printer, and that only you and Stephan
can manage the printer and all print jobs. You also want to ensure that Grant Allow-Print permission to the DTAdmins group. Grant Allow-
TIS Base members of the DTAdmins local group can manage only their own print jobs. Manage Documents and Allow-Manage Printers permissions to your
354 Wintel How should you configure security on this printer? user account and o Stephan's user account

After several installation failures, you determine that you need to examin a
TIS Base debug log for the setup routine. You want the setup routine to create the most
355 Wintel detailed debug log possible. Which command do you use? Winnt32 /debug4: Debug.log

TIS Base
356 Wintel The equipment that connects subnets at the Network Layer is called a: Router

TIS Base
357 Wintel FTP uses the TCP port 21

TIS Base
358 Wintel Default HTTP port is 80
. You are the network administrator for Wipro.com Active Directory domain.
The domain includes Windows Server 2003 domain controllers and Windows
XP Professional client computers. A new administrator named Sandra is hired
to assist you in deploying Windows XP Professional to 100 new computers.
Sandra installs the operating system on a new computer named Wipro11.
However, when Sandra tries to log on to the domain from Wipro11, she is
unsuccessful. The logon dialog box does now allow her to view and select the
TIS Base domain name. You need to ensure that Sandra can log on to the domain from
359 Wintel Wipro11. What should you do? Configure Wipro11 as a member of the domain.

TIS Base
360 Wintel Which type of connector does a 10BaseT Ethernet cable use? RJ-45
You are the workgroup administrator for a small office. The office contains 12
Windows XP professional computers. Each computer is assigned a private IP
address in the 172.10.X.X range. One computer has a dial-up connection to the
Internet. To enable all users to access the Internet, you enable ICS (Internet
Connection Sharing) on the computer with the dial up connection. You
TIS Base configure ICS and reboot the computer. You notice that none of the other Configure the other computers to receive their IP address
361 Wintel users can connect to the ICS computer, and the ICS computer cannot see the automatically.
other computers in the network. What could be the problem?

TIS Base What is the default share permissions when creating a new share in Microsoft
362 Wintel Windows 2003? Everyone Group will get read access.

TIS Base
363 Wintel What is the another name for Raid 1? Mirroring

TIS Base
364 Wintel Which of the following is an IP address reserved by the InterNIC? 127.0.0.1

TIS Base What is the maximum number of VMFS datastores that can be configured per
365 Wintel ESX Host? 256

TIS Base
366 Wintel Which of the following is a typical VMware virtual machine disk file? .vmdk

TIS Base
367 Wintel TCP IMA Communication Port is 2512

TIS Base What type of network is composed of a number of computers that connect to a
368 Wintel central computer for file storage, printing, and shared applications Client/Server
An administrator needs to ensure that users on Windows XP workstations
launch published applications
with 16-bit colors in a 1024X768 session window. Users in this environment are
launching published applications in
TIS Base seamless mode. Which user experience setting should the administrator use in
369 Wintel the ICAClient.ADM template? Display
An administrator would like to ensure consistency of hotfixes across all the
Citrix XenApp servers running on
TIS Base Windows Server 2008 in a farm. Which hotfix list specification should the
370 Wintel administrator use to create the hotfix list? OS platform

TIS Base In computing, ____ is a commonly used name for a command-line utility that
371 Wintel provides disk partitioning functions in an operating system. fdisk

TIS Base
372 Wintel Virtual memory is configured through which system tool? System control panel
As portable computers are used in a variety of locations, one of
thecharacteristic of Windows operating system lets a user change which
devices his computer uses when he moves it from location tolocation. For
example, a portable computer with a docking station is generally connected to
a local wired network; however, if it is used in a hotel or on an airplane, the
TIS Base portable computer willautomatically connect to a wireless network. Which of
373 Wintel the following feature enables that? Hardware profile
The Domain Name System (DNS) is a hierarchical naming system for
computers, services, or any resource connected to the Internet or a private
TIS Base network. Which of the following statement most appropriately describes the
374 Wintel function of a Domain Name System server? Provides resolution of host names to IP addresses.
You have just set up a network that will use the TCP/IP protocol, and you ant
client computers to
TIS Base automatically obtain IP configuration information. Which type of server do
375 Wintel you need for this? DHCP

The Windows XP Professional is targeted at power users, business and


TIS Base Enterprise clients. In a computer running Windows 2003, how to change its Control Panel> System> Advanced> Performance> Settings>
376 Wintel virtual memory? Advanced> Virtual Memory

Introduction
377 to unix which of the following statements is not true operating system is a substitute for firmware

Files &
378 directories What are the contents of lib directory Essential shared libraries and kernel modules

Files &
379 directories What is special about hidden files their filename begin with a dot

Access to
files and
380 directories which command will change the password of the user? passwd
Access to
files and What happens when "ls ../" command is executed when the user is
381 directories currently in /usr/local/bin It will list the content of /usr/local

Access to
files and
382 directories which command is used to change file ownership chown

Access to
files and
383 directories what method cannot be used to logout from a unix system type out at unix shell

Access to
files and
384 directories what will the below command return - find /etc -name passwd -print ? /etc/passwd

Access to
files and
385 directories what is the octect number, with respect to permissions for rwxr-xr-x 755

Access to
files and
386 directories What is most basic file systems in UNIX UFS

387 Editors To find and replace the word "Moon" to "Sun" globally in the file old is? sed '/s/Moon/Sun/g' old

388 Editors The command to delete the word "Moon" in the file old is? sed '/s/Moon//g' old

389 Editors The key to switch from Insert to Command mode is? Esc

390 Editors The command to undo most recent change in VI editor is? u

391 Editors ______ command deletes from current cursor position to the end of the line. d$

The command to enter insert mode in a new line below the current cursor
392 Editors position in VI editor is? o

393 Print services The profile files are created under Home directory of the user

394 Print services The profile files can be listed with ls option ls -a

/etc/cups/
395 Print services The configuration file for cups service is printers.conf

396 Print services Command to print a file on both sides of the paper lp -o sides=two-sided-long-edge filename

397 Print services Command to print a file on both sides of the paper lpr -o sides=two-sided-long-edge filename

398 Print services The /etc/password file contains encrypted password. FALSE

Which statement is true as for as backslash (\) The backslash character changes only one
399 Handling IO character is concerned character – the one immediately following it

400 Handling IO | is a? Operator

401 Handling IO Pipe operator symbol is |

402 Handling IO In which of the below option appends the value of data to the file named file1? date >> file1
403 Handling IO Which of the following commands displays your login shell? echo $SHELL

404 Handling IO Which of the following commands creates a C subshell? csh

405 Handling IO Which of the following is the descriptor of the standard output stream? 1

406 Handling IO In general grep writes the output to Monitor

407 Handling IO Which of the following not belongs to the grep family? rgrep

408 Handling IO Based on which criteria grep utility is working? pattern

409 Handling IO i option with grep is used for? Ignores upper/lowercase in matching text

To ignore uppercase/lowercase in the matching text, which option can be used


410 Handling IO with grep? i

411 Handling IO Most Powerful grep Utility - choose the best one egrep

In grep, which of the below is correct one of the regular expression that is the
412 Handling IO complement of the given criterion instead of the criterion itself? grep –v “pattern” file_name

To count the number of blank lines in the file called “file1”, which one is the
413 Handling IO correct answer? egrep –c ‘^$’ file1

If the regular expression contains more complex search pattern means which is
414 Handling IO the best one to use with? egrep

415 Handling IO To count the number of non-blank lines in a file, which one is the correct? egrep –c ‘.’ file

Disk The process of reducing an existing file to a file with the same name that is 0
416 Management bytes large is called truncating

Disk
417 Management What are the commands used to compress files in Unix COMPRESS, BZIP, GZIP and TAR

Disk
418 Management Which command is used to seand a mail mail

Disk
419 Management gunzip and zcat command are used to uncompress a compressed file

Disk
420 Management Which command is used to display the last part of the file. tail

Disk Which command is used to delete all files in the current directory and all its sub-
421 Management directories? rm -r *

Disk
422 Management What is the command to fetch first 10 records in a file 'file_name'? head file_name

Disk
423 Management Which command is used to Change to the home directory? cd

Disk
424 Management What is the symbol | used for? “pipe” symbol connects output of one command to another command
Disk
425 Management Which command you will use to count no of characters? wc

Process
426 Management To run a command in the background. Add the "&" character at the end of the comand line

Process
427 Management Expand the term IPC stands for ? Inter- Process Communication

Process
428 Management If kill() returns 0 This implies that a process exists with the given PID

Process
429 Management Command to change priority of a Process in Unix? nice

Process
430 Management What command can be used to wait and then resuming job execution sleep

Process
431 Management What is the command to delete a at job ? atrm or at -r option

Process
432 Management What is signal used by kill command ? SIGKILL

Process Command which pauses until execution of a background process has


433 Management ended. wait

Process
434 Management Command which kill a process by name. killall xfaces

Process Which of the command is used to change the nice number of the task
435 Management ? renice

436 Networking what is SSH ? SSH is a protocol allowing command line access to a unix

ssh data will be transfer between the systems in


437 Networking Difference between SSH and Telnet ? encrypted form ,telnet data will be transfer in alphabatical form.

ans ) Used to determine whether a route is experiencing packet loss,


438 Networking why ping command used ? and to measure latency.

439 Networking SSH connections can be authenticated using ? passphrase

ans ) PING : Packet Internet Gropper


440 Networking what is Ping stands for ? it's a diagnostic utility , which diagnose devices connectivity.

Application layer protocol which allows data to be exchanged over a secure


441 Networking channel between two computers. ssh

442 Networking which command is used to connect Remote Host telnet

443 Networking which command is used to add the default gateway IP ? route add default

444 Networking The file is used to map port numbers and protocols to service names, /etc/services

standard network protocol used to copy a file from one host to another over a
445 Networking TCP/IP-based network is FTP

Job
446 Scheduling lists the user's pending jobs,number, date, hour, job class. atq
Job
447 Scheduling Time-based job scheduler and used to automate system maintenance in unix cron

which system monitor tool that produces a updated list of processes and CPU
448 Unix utilities usage in most unix systems ? top

449 Unix utilities using the cpio command what is the syntax to copy files onto diskette cpio -ov < filenames > /dev/rfd0

450 Unix utilities what is the command to see established and open TCP/UDP sockets ? netstat -a -n -f inet

Account
451 Management What is the command used to unlock account User01 passwd -u User01

Account Which method/command is recommended when you want to execute a


452 Management command as another user - sudo

Account
453 Management Command to add existing user User01 to supplementary groups dev & test is useradd -G dev,test User01

Account
454 Management What is the significance of the -m switch with su command (su -m) do not reset shell variables
In which core publication can you find detailed descriptions of the following?
1. Service Portfolio Management
TIS Base 2. Demand Management
455 ITIL 3. Financial Management B)Service Strategy

TIS Base
456 ITIL Which of the following statements is CORRECT for all processes? B)They create value for stakeholders

TIS Base
457 ITIL What is Business Process Outsourcing? B)Outsource all the business processes

TIS Base Good Service Design is dependent on effective and efficient use of the four Ps –
458 ITIL people, processes, partners and: B)Products

TIS Base
459 ITIL "Financial Management is not responsible for which of the following - ? B)Market study

TIS Base B)Provide a logical model of the IT infrastructure, correlating IT


460 ITIL The goal of Service Asset and Configuration Management is to? services and different IT components needed to deliver the services

TIS Base B)An occurrence that is significant for the management of the IT
461 ITIL The BEST definition of an event is? infrastructure or delivery of services

A remote site has recently had its network upgraded. The users are now
TIS Base complaining of slow responses and have heard that this is due to problems with
462 ITIL capacity. Who should they contact for assistance? B)The Service Desk

TIS Base When analyzing an outcome for creation of value for customers, what
463 ITIL attributes of the service should be considered? B)Business Objectives, IT objectives, Process metrics

TIS Base
464 ITIL Which of the following is a good use of a baseline? B)A marker or starting point for later comparison

TIS Base B)Overseeing the execution and monitoring of IT operational events


465 ITIL Operations Control refers to? and activities

TIS Base B)A user calls the Service Desk because they would like to change the
466 ITIL Which of the following is NOT an example of a Service Request? functionality of an application

TIS Base Which of the following is NOT described as a function but as a process in the
467 ITIL ITIL Service Management Practices framework? B)Service Portfolio Management

TIS Base
468 ITIL ITIL is BE characterized as: B)Good practice scheme
TIS Base Which of the following is the most appropriate approach to carrying out B)Service Operations should maintain a balance between an internal
469 ITIL Service Operations? IT view and an external business view

TIS Base
470 ITIL How does an organization use Resources and Capabilities in creating value? B)They are used to create value in the form of goods and services

TIS Base
471 ITIL Demand Management is primarily used to? B)Eliminate excess capacity needs

TIS Base If something cannot be measured, it should not be documented within which of
472 ITIL the following? B)A Service Level Agreement

TIS Base
473 ITIL Which of the following statements is CORRECT about ‘good practice’? B)It is something that is in wide industry use

TIS Base Which process reviews Operational Level Agreements (OLAs) on a regular
474 ITIL basis? B)Service Level Management

TIS Base B)An organization supplying services to one or more internal


475 ITIL A Service Provider is? customers or external customers

TIS Base Information is regularly exchanged between Problem Management and


476 ITIL Change Management. What information is this? B)RFCs resulting from Known Errors

TIS Base How can an organization determine the effectiveness of the Service Level
477 ITIL Management process? B)By measuring customer satisfaction

TIS Base
478 ITIL What is a request to replace something within the IT infrastructure called? B)Request for Change

TIS Base
479 ITIL How does an organisation use Resources and Capabilities in creating value? B)They are used to create value in the form of goods and services

TIS Base
480 ITIL Demand Management is used to: B)Understand patterns of business activity
A user reports a PC problem to the Service Desk. A Service Desk
representative determines that the PC is defective and indicates that according
to the services catalogue, the PC will be replaced within three hours. Which
TIS Base ITIL process is responsible for having this user’s PC replaced within three
481 ITIL hours? B)Change Management

TIS Base
482 ITIL What is a "Known Error"? B)A Problem that has a documented root cause and a workaround.

TIS Base
483 ITIL Which is NOT a type of Service Provider? B)Co Service Provider

The array which is connected In the SAN Fabric is identified as which


484 component of SCSI Addressing Target

Four Disks of each 320GB is configured In RAID What would be the


485 maximum disk capacity available for data 960 GB
Choose the correct sequence of steps to Present a LUN to the Host.
Steps:-
1. Bind the LUN
2. Register the Host
3. Create a Storage Group
4. Create a RAID Group
Present the LUN and Host in the same Storage Group
486 Apply RAID Type on the LUN 4, 1, 2, 3, 5

Write cache for LUN 101 is disabled in its Properties. But the Write cache is
Configured and enabled for the Array. Choose the correct Write Request
487 operation Writes will be directly written to the LUN

You are in the process of Installing Emulex LP10000 HBA card in a Solaris
Host. Now you want to configure the topology for the car Which file will you
488 edit. /kernel/drv/lpfconf

You need to urgently Increase the size of a LUN and your host needs the
expanded LUN Size immediately. Which type of expansion will suit for this
489 requirement Concatenation
490 What are the copy service are available in DS4000 series storage? Flash copy, Volume copy, and remote mirror

491 Global mirror is Asynchronous Mirroring

What Is it possible to have multiple RAID Types in a RAID Group with


492 different LUNs No

The array which is connected In the SAN Fabric is identified as which


493 component of SCSI Addressing Target

Four Disks of each 320GB is configured In RAID What would be the


494 maximum disk capacity available for data 960 GB

495 What is the Name of the Port which is used to connect ISLs. E Port

496 D_ID in a fabric points to A Switch in a Fabric

Enables Distribution of Traffic over the combined bandwidth of two or


497 What is a function of ISL Aggregation more ISLs

498 Persistent binding is required for Windows Server FALSE

499 What is stored in VDMs root file system Local Groups

500 what is is the primary importance in RAID 1? fault-tolerance

With IP Version four (IPV4) addresses , How many octets make up the
501 address? 4

502 Which is not served by the Ethernet RJ45 port on fiber channel switch Block data transfer between connected hosts and storage arrays

503 Which Protocol can be used to manage multi-vendor switches SNMP

504 What are two valid types of zoning in a SAN Hard Zoning and Soft Zoning

505 What do VLANs allow administrator to do To limit traffic to specific elements of a network

506 How LUN will be detected in Solaris It will detect as normal disk

507 IP-SAN communicate to Host By using which protocol ISCSI

When compared with 10 GB Ethernet port over a LAN and SAN 4GB will give
508 better performance FALSE

509 What is fundamental purpose of zoning To expose LUNs on a storage array to different HBAs

510 what is the benfit of using hard zoning in SAN Securit at the switch port level

511 Name the protocols which uses TCP/IP to tunnel fiber channel Frames FCIP
512 Explain what is zoneset Collection of aones

513 Name the protocol in a unix enviorment which is used to share the file system NFS

Name in the windows enviorment which is used to share the file system to
514 client CIFA

515 What are five core elements of a data center infrastructure? Applications, Databases, Servers/Operating Systems, DAS, and NAS

516 Why would an iSCSI solution be implemented? Block storage over IP is much faster than FC

517 Which management task eliminates single points of failure in a data center? Capacity

Which data center infrastructure component issues read/write commands to


518 the array? Server

519 Which data center element organizes customer and product information? DBMS

520 What is the function of a bus? Interconnect between CPU, memory, and disks

521 Which event is known as a head crash? A read/write head has touched the disk data area

522 What is a metric that could be used as part of Monitoring Performance? Number of I/Os to disks in a storage array

523 What should be provided by a good end-to-end monitoring system? Identify the performance characteristics of all network components

524 What is an optional step in HBA Configuration? Installation of multi-pathing software

Which represents a common implementation of a storage network with limited


525 scalability? Fibre Channel Arbitrated Loop

526 What is the process that writes physical address information to a disk? Formatting

527 State a benefit of using hard zoning in a SAN. Security at the switch port level

528 Name the protocols which uses TCP/IP to tunnel Fibre Channel frames FCIP

529 E_Port Associated with Fabric Routing

530 Global mirror is Asynchronous Mirroring

What Is it possible to have multiple RAID Types in a RAID Group with


531 different LUNs NO

532 What are two advantages of multiplexing? (Choose two.) shorter backup time

533 Name the protocol which can be used to manage multi-vendor switches. SNMP
Explain the difference between Storage Area Networks (S and Network NAS I/O operations use filesystem level I/O protocols
534 Attached Storage (NAS). SAN I/O operations use block level I/O protocols

How many host addressable volumes are in one Parity RAID (3+1)
535 rank/group? 3

536 With IP version four (IPv4) addresses, how many octets make up the address? 4

Windows client must perform which operation to access a NAS advertised


537 connection point? Map

To ensure that host device names remain constant, even if new storage
538 What is the purpose of persistent binding on a host? targets are presented to the host

539 What do VLANs allow administrators to do? To limit traffic to specific elements of a network

540 What is a functionality of Fabric Failover policy? Provides support for back-end failover

541 In a SAN, which is a valid member of a zone? A HBA WWPN

542 What is a NetWorker remote device? A device managed by a storage node other than the NetWorker server

Zoning is a fabric function, while LUN Masking is a storage array


543 What distinguishes between Zoning and LUN Masking? function

How many memory connections are supported on each memory card in the
544 Direct Matrix Architecture? 16

What name is used to describe the largest amount of data that is written to disk
545 before moving to the next disk in a RAID Group? Element

546 Explain what is FC-AL Fibre Channel Arbitrated Loop

547 Explain what is LVD Low-Voltage Differential

548 IP SAN required fiber channel FALSE

Which conectivity allows hosts to connect via iSCSI to Fibre Channel storage
549 arrays Bridged solution

550 What is the function of FC-4 Layer mapping interface

551 Host HBA Should register which prot in switched fabic? F-Port
Data is being replicated from Site A to site B using disk buffering to create
extended distance consistent point in time copies every hour. In the event of a
site failure at A, what is the maximum amount of data that will be missing at
552 site B? 2 hours

Which represents a common implementation of a storage network with limited


553 scalability? Fibre Channel Arbitrated Loop

554 What is the process that writes physical address information to a disk? Formatting

A disk has Cylinder Head Sector (CHS) values of 1000, 4 and 25. What address
555 range will be used for the Logical Block Address (LBA) values for this disk? 0 – 99,999
Which Data Center element stores customer and product information when
556 the server is connected to an array? Database

557 Which storage method will make data most accessible? Magnetic Disk

558 When is it necessary to hold application I/O to ensure a consistent copy? Just before creating a point in time replica

559 What is an advantage of using tape over disk as the backup destination device? Portability

560 What is a reason for implementing single HBA zoning? Minimizes impact to nodes after an RSCN

561 What is a benefit of SAN? Provides secure access to data

562 What is a physical component of a storage environment? Bus

563 What is a role of the backup server in a backup and recovery environment? Maintains the backup catalog

A Copy on First Access target is being used for decision support operations.
564 When is data copied from the source to the target? A read or write issued for the first time to a location on the target

565 Which technology supports high availability of data? Clustering

566 Which task is an example of monitoring the health of a data center object? Examining the operational status of a device port
In a given environment, the peak writes are 50 MB/s and average writes are 25
MB/. Peak reads are 45 MB/s and average reads are 20 MB/s. How much
network bandwidth must be provided if asynchronous remote replication will
567 be used in this environment? 25 MB/s

568 What is an objective of SMI-S? To define a complete SAN object model

569 What is a benefit of SAN? Leverages existing investment in DAS hardware

You have a SAN environment and want to introduce NAS functionality. Which
570 NAS solution is most appropriate? Gateway NAS system solution

571 What is the process of dividing a disk into logical containers? Partitioning

572 Which statement is true about integrated NAS systems? NAS components and storage arrays are managed by NAS software

573 What is the advantage of single-mode fiber over multi-mode fiber? Enables optical connections over longer distances

574 What is a logical component of a storage environment? Bus

575 What is a fundamental characteristic of a CAS implementation? Globally unique identifier for every data object

576 How many simultaneous operations can an eight disk RAID 5 set perform? 4 reads or 8 writes

When is data copied from the source to the target using Copy on First Access
577 replica technology? A write issued for the first time to a location on the source
Which aspect of monitoring will allow you quickly respond to the failure of a
578 Host Bus Adaptor (HBA)? Health

Higher speed interconnects, data protection, multiple host I/O


579 What are three advantages of a disk array compared with JBOD? channels

Which host component is the high speed interconnect between the Central
580 Processing Unit and memory? Bus

What provides maximum data protection and availability on the back end of a
581 storage array? Dual controllers

582 How is the Content Address derived in CAS? From the contents of the object

A disk drive has a rotational speed of 100 revolutions per secon What is the
583 average rotational latency? 5 ms

584 What is a disadvantage of multi-mode fiber relative to single-mode fiber? Limited distance

585 Which statement describes the choice of cylinders used in a partition? Cylinders must be contiguous and may be in the same zone

586 What is a valid member of a zone in a SAN? A HBA WWPN


An application uses a file system. A local replica of the application is require
Business requirements demand that the application be available on a 24X7
basis. Which operation should be performed for a consistent file system
587 replica? Flush file system buffers before the creation of the replica

588 What is a disadvantage of JBOD versus disk arrays? Data is unprotected

589 What does partitioning do to a physical disk? Divides a disk into logical containers

590 Which statement applies to Internal DAS? Internally deployed parallel protocol storage

591 What distinguishes a FC director from a FC switch? Greater connectivity capacity

What does the number of files to be backed up affect in a backup and recovery
592 environment? Catalog size
What is the correct order of operations for array based synchronous
replication?
1. Write is received by the source array from host/server
2. Remote array sends acknowledgement to the source array 3.
Source array signals write complete to host/server 4.
593 Write is transmitted by source array to the remote array 1, 4, 2, 3

594 What is CIM? A language and methodology for describing management data

Which SAN management feature prevents unauthorized or accidental access to


595 volumes? LUN Masking

596 Which service is used by iSCSI initiators to discover targets? iSNS

597 What does partitioning do? Divides physical disk into logical volumes

598 What are two valid types of zoning in a SAN? Hard Zoning and Soft Zoning
Which component of an intelligent disk system provides the communication
599 between cache and the disks for Read and Write operations? Operating system

What is the protocol used by a Windows client to communicate with a NAS


600 device? CIFS

601 Which component is part of a NAS device? Optimized operating system

Offered as part of the operating system or as third-party host


602 What is an accurate statement about a Logical Volume Manager? software

603 What were two [2] problems with decentralized, client-server based storage? Difficult to enforce uniform processes

Which core element of a data center infrastructure provides the data


604 communication paths between clients and servers? Networks

What name is used to describe the largest amount of data that is written to disk
605 before moving to the next disk in a RAID Group? Element

How many memory connections are supported on each memory card in the
606 Direct Matrix Architecture? 16

607 In a SAN, which is a valid member of a zone? A HBA WWPN

608 What do VLANs allow administrators to do? To limit traffic to specific elements of a network

To ensure that host device names remain constant, even if new storage
609 What is the purpose of persistent binding on a host? targets are presented to the host

A Windows client must perform which operation to access a NAS advertised


610 connection point? Map

Name the in the Windows environment which is used to share the filesystem to
611 clients. CIFS

Name the function which is NOT served by the Ethernet (RJ45) port on a
612 Fibre Channel Switch Block data transfer between connected hosts and storage arrays

613 Name the protocols which uses TCP/IP to tunnel Fibre Channel frames. FCIP

614 What is an advantage of ATA disk drives on a CLARiiON array? Low cost backup-to-disk solution

Which architecture allows system-to-system communication and user level


DMA with as little CPU interaction as possible, most particularly for
615 clustering? FC-VI

616 Which protocol is used for backups on an ethernet based network? NDMP

617 What are the SCSI addressing components handled by the SCSI protocol? SCSI bus, target ID, logical unit

Which standards are the responsibility of the Internet Engineering Task


618 Force? SNMP

Which three are advantages of using a SAN in a campus environment?


619 (Choose three) Increase storage resource utilization

620 which environment will provides the security integration? NAS


621 NAS HTTP File Server benfit? Provides storage pooling

622 In a fiber channel analogous to the token ring which topology? FC-AL

623 what is the FC-AL connection limitiation? 127

which protocol creates virtual FC links that connect devices and fabric
624 elements FCIP

625 VLAN configuration management element used for which solution IP storage

626 what are the common applications of IP SAN technology Remote Backup and Restore

TIS Base Which component of the Windows 2003 Executive is responsible for handling
627 Wintel input and output from installed devices? The I/O Manager

TIS Base
628 Wintel Which of the following categories for UTP has the least expensive cable? 3

You have been asked to install a network of nine Windows XP professionals in


TIS Base a single department.Low cost is a goal.What kind of network should you
629 Wintel install? Peer-to-peer

TIS Base
630 Wintel Which of the following IRQs are used for the secondary IDE controller? 15

TIS Base
631 Wintel Which coaxial cable type would be used with Thinnet? RG-58

TIS Base
632 Wintel What is another name for 10Base5 ? Thicknet

TIS Base
633 Wintel What is the middle layer of the OSI reference model? Transport

TIS Base A network where each workstation can make resources available (ie files and
634 Wintel printers) to any other workstation is called as? peer-to-peer

TIS Base
635 Wintel What is the maximum segment length on 10Base5 media? 500 meters

TIS Base
636 Wintel Which protocol cannot be routed? NetBEUI

TIS Base
637 Wintel What is a MAC address in an Ethernet network? The physical address assigned by the NIC manufacturer.
You are the desktop administrator for Wide World Importers. You have
installed Windows XP Professional on a portable computer for a user named
Bruno. Bruno travels between the main office in New York and the branch
office in Tokyo. Bruno needs to create documents in the English and Japanese
languages. You need to provide an easy method for Bruno to switch between
languages. You also need to allow Bruno to create documents in the selected
TIS Base language immediately. How should you configure the Regional and Language In the Languages options, select the Install Files for East Asian
638 Wintel Options on Bruno's computer? languages check box. Add Japanese as an input language
You are the desktop administrator for your company. You are responsible for
automating the deployment of Windows XP Professional to new computers in
your company. You are preparing a Windows XP Professional computer,
which you will use to test disk imaging. You install Windows XP Professional
on the test computer and run the Sysprep utility. You use a third-party
software package to create a disk image to a new computer and then restart
the computer. Instead of completing the Windows XP Professional installation,
the computer starts the Windows Welcome program, requiring you to enter
additional setup information. Because you will be deploying a large number of Use setup manager to create a Sysprep Answer: file. Copy the Answer:
TIS Base computers, you want to ensure that the disk image can be applied without file to a floppy disk, and insert the disk into new computers when the
639 Wintel additional user interaction.What should you do? disk image is applied
You are a help desk technician for your company. Irene is a user in the human
resources department. She often works with documents that contain
confidential information. Irene creates a folder named Private on volume
Volume C is an NTFS volume on her Windows XP Professional computer.
Then she adds the confidential files to the Private folder. Whenever Irene
opens a file, any subsequent temporary files are created within the same folder
as the source document. You need to configure Irene's computer so that only Instruct Irene to modify the properties of the Private folder by
she can access the confidential documents. You also need to minimize the selecting the option to encrypt the contents of the folder. Then instruct
TIS Base impact of the configuration on her computer's performance. What should you Irene to accept the default setting on the Confirm Attributes Changes
640 Wintel do? dialog box
You are the desktop administrator of your company. A user named Andrew
has just dropped his Windows XP Professional portable computer on the floor.
Andrew reports that when he turns on his portable computer, he receives the
following message: System disk not found. You confirm that the hard disk on
Andrew's computer is functioning properly. The portable computer has an
Automated System Recovery (ASR) backup of the original system state. You
verify that Andrew had created a restore point before the accident. You need
TIS Base to ensure that Andrew's computer can start Windows XP Professional from Restart the computer by using a Windows XP Professional CPerform
641 Wintel the hard disk. What should you do? an ASR restore
You install Windows XP Professional on a Windows 2000 computer with one
hard disk. During the installation, the C drive is converted to NTFS. Later you
TIS Base decide to use the system to dual-boot with Windows 2000 You want to convert
642 Wintel the drive back to FAT32. What should you do? Reformat the partition, and restore the data from backup
You install a new AGP video adapter in your Windows XP Professional
Computer. You start the computer and notice that the video display has
retained the default setting of 16 color, 640 x 480 resolution. You install the
manufacturer's drivers for the new video adapter. You then restart the
computer. During the startup process, the monitor goes blank. After several
minutes the screen is still blank. You restart the computer and experience the
TIS Base same problem again. You want to enable Windows XP Professional to start Start the computer by using the Recovery Console. Rename the AGP
643 Wintel successfully. What should you do? driver
You are configuring five computers for Windows 7 CLients and Windows XP
Professional. Each computer has an 8 GB hard disk. You configure the hard
disk on each computer to have two 10 GB partitions. Windows 7 Clients is
installed on drive C and Windows XP Professional on drive D. In Windows XP
Professional, you configure a disk quota on drive D to prevent users from
saving work files on the disk. You restart your computer and load Windows 7
Client You notice that users can save files to drive D. You want to prevent
users from saving the files to drive D in either operating system. You also want
TIS Base to ensure that users can access both drives while using either operating system. Use Windows 7 Client to configure NTFS permissions on drive D to
644 Wintel What should you do? deny the users write permission
You recently upgraded all Windows 2000 Professional computers to Windows
XP Professional. You want to give a new employee named Maria the ability to
back up files, share resources, and install programs on a client computer that
TIS Base she shares with other users. You do not want Maria to be able to read other
645 Wintel users' files. What should you do to accomplish these goals? Add Maria's user account to the Power Users group
Your Windows XP Professional computer has a single Pentium III 400-Mhz
processor, 256 MB of RAM, and an IDE hard disk. You use your computer to
design graphics ads for web sites and newspapers. When you are working on
multiple ads simultaneously, you notice that your computer responds very
slowly. You are also experiencing long delays when loading color palettes and
TIS Base importing graphics. You want to improve the performance of your computer
646 Wintel based on the performance results. What should you do? Add a second Pentium III 400-MHz processor
You are the administrator of your company's network. You configure a local
group named Accounting to have a mandatory user profile. The mandatory
profile has been configured to include a custom logo that was saved with 16-bit
color and 1024x768 resolution.Some of the Windows XP Professional
computers in the accounting department have standard VGA video adapters,
and others have SVGA video adapters.Several users report that when they log
on to certain Windows XP Professional computers, the custom bitmap becomes
very pixilated and distorted, and does not reflect the proper color depth. You
TIS Base want users to be able to correctly view the custom bitmap on any computer in Change the custom bitmap to a 16-color bitmap that has 640x480
647 Wintel the accounting department. What should you do? resolution, and reconfigure the mandatory user profile
You have 17GB of private files on drive D on your Windows XP Professional
computer. You have shared the files as private_files. You do not want other
TIS Base users to see this share name in the browse list. You want all other share names
648 Wintel to continue to appear in the browser list. What should you do? Change the share name to private_files$
You need to create a web share on your Windows XP Professional computer
named Admin01. You create a folder named reports. Then you configure web
sharing on Reports. You name the share WebReports and allow Read
permissions on the share. You test the web share by pointing to
http://admin01/WebReports from another computer. You receive the following
TIS Base error message, 'You are not authorized to view this page.'You need to be able
649 Wintel to access the folder. What must you do? In the IIS console, enable anonymous access to WebReports

You want to use Windows Installer service to deploy software applications on


TIS Base the desktop computers. How do you configure GP so that the applications are
650 Wintel not advertised? Publish applications to users
Run the Control Panel Add/Remove Programs applet; click
Add/Remove Windows Components; and select Internet Information
TIS Base Which of the following steps should you take to install Remote Desktop Web Services, Details, World Wide Web Services (Details), Remote Desktop
651 Wintel Connection on a Windows XP Professional machine? Web Connection

TIS Base How to ensure offline files on laptop not accessible to unauthorized persons if
652 Wintel lost? GPO "Encrypt the offline file cache" on the domain level
TIS Base Which command launches the file signature verification tool that is used to
653 Wintel identify unsigned drivers installed on a windows XP Professional system? Sigverif.exe
You are the desktop administrator for your company. You install Windows XP
Professional on your portable computer. The computer is configured to use an
IEEE 1394 PC carYou use the computer to download pictures from a digital
camera while you are at the office. You attend a meeting every Monday.
During the meeting you use a battery to supply power to your portable
computer. Occasionally, the battery runs out of power during these meetings.
You need to configure the computer to conserve battery power while you
TIS Base attend your weekly meeting without affecting your power options when you use Create an additional hardware profile, and disable the IEEE 1394 PC
654 Wintel the computer at your Office. How should you configure your computer? card for this profile

You’re setting up a backup job on a computer running Windows Server 2003.


TIS Base Your want to back up the registry, startup files, and the COM+ Class
655 Wintel Registration data-base. Which backup option should you select? System State

TIS Base A DNS server that sends all name resolution requests for a specific domain to
656 Wintel another server Conditional forwarding

TIS Base
657 Wintel Which of the following commands is used to demote a domain controller? dcpromo
You install a scanner on a computer running Windows Server 2003. When you
try to restart your computer, the operating system will not start. Which of the
TIS Base following would be the least invasive recovery method to try first to restore the
658 Wintel system to operation? Safe Mode

TIS Base You have an IP of 156.233.42.56 with a subnet mask of 7 bits. How many hosts
659 Wintel and subnets are possible? 510 hosts and 126 subnets

TIS Base
660 Wintel HTTPS use the below default port 443
You are the administrator of the Wipro company network. The network
consists
of a single Active Directory domain Wipro.com. The network includes 20
servers running Windows Server 2003 and 200 client computers running
Windows XP Professional. The office uses a single class C private IP address
range.
The company announces a major expansion. Wipro will open 12 branch
offices. The 12 branch offices will connect to the existing office by direct T1
lines. Each branch office will have the same number of computers as the main
office. You need to plan the IP addressing for the new company. You want to
TIS Base assign all company IP addresses from a single classful private IP address Assign each office a subnet from a new class B private IP address
661 Wintel range. What should you do? range.

TIS Base Which of the following network topologies have each computer connected to a
662 Wintel central point? Star

TIS Base
663 Wintel A hub works in conjunction with which of the following network topologies? Star

TIS Base Which of the following devices operate at the Data Link layer of the OSI
664 Wintel model? A Switch

TIS Base Which of the following tool is available in Micrsoft Windows Server 2003 to
665 Wintel terminate processes that are unwanted or in a "not responding" state? Task Manager

TIS Base Datagrams and packets are associated with which layer of the OSI reference
666 Wintel model? Network
__________ is the fastest and most modern interface used as an
expansionmethod for external
peripherals, such as mice, web cams, scanners, and printers, and is popular on
TIS Base laptops and
667 Wintel desktops alike. USB
There are many computers in a small office. Which of the following is a
hardware device that
allows a technician to control multiple computers with a single keyboard, video
TIS Base monitor and
668 Wintel mouse? Add a KVM switch to the technician's computer.

TIS Base
669 Wintel What is the first file used in the boot-up of Windows XP? ntldr

Refer to the following descriptions, which one about the Virtual Private
TIS Base Network (VPN) is the most A VPN is a secured line of communication between two points through
670 Wintel appropriate? a public network.
TIS Base
671 Wintel In a computer running Windows XP, __ is the page file size by default. 1.5 times the physical memory
A system is malfunctioning and the technician asks the user about any recent
changes to the system. Thinking for a moment, the user says that the system
crashes after the installation of a new driver for his video adapter. Which of
TIS Base the following is applicable when a user cannot start
672 Wintel Windows XP after he makes a change to his computer? Last Known Good Configuration

Introduction which component of operating system allows the end user to interact
673 to unix with the computer directly shell

Introduction
674 to unix which is not a unix shell yp

Introduction
675 to unix what is /sbin commonly used for? system binaries

Introduction
676 to unix Which of the following is false? Default shell is always "/usr/bin/sh" and can't be modified

Files &
677 directories What does /etc directory have? host config files

Access to
files and what happens if the cd command is executed without any parameters It changes to the home directory of the user executing the
678 directories on a Unix shell command

Access to
files and
679 directories what happens when cd ~unix is executed navigates to the home directory of the user, called "unix"

Access to
files and
680 directories which option is not available directly with find command? to search based on the password of the user

Access to
files and
681 directories which is one of the property of soft link? can span across filesystems

Access to
files and
682 directories which command creates hard link ln without any option

Access to
files and
683 directories what is file command used for? gives the type of data based on code at the beginning of the file

Access to
files and read permission for the file and all parent directories above the
684 directories what is the minimum permission required to read a file directory where file resides

685 Editors What are the two modes of VI editor? Command, Insert mode

686 Editors The VI editor has how many buffers for storing pieces of text? 36

687 Editors ______ command letes from current cursor position to the end of the word. dw

688 Print services By default the profile files are Hidden

689 Print services The command to view the contents of the print queue lpq

690 Print services Command for formatting files to be printed is both a and b

691 Print services Command for formatting files to be printed is both a and b

692 Print services Setting the Number of Characters Per Inch for printing both a and b
693 Print services Setting the Number of Lines Per Inch for printing both a and b

694 Handling IO Standard error is associated with Monitor

Which of the below is termed as command


695 Handling IO substitution character $

696 Handling IO Which of the below is termed as Redirection substitution operator? >&

697 Handling IO Choose the output redirection error override from the given options who >| file1

698 Handling IO Which of the following statement is true? All the above

699 Handling IO Which of the following commands creats a Korn subshell? ksh

700 Handling IO Which of the following is the descriptor of the standard error stream? 2

701 Handling IO fgrep stands for All the above

In grep, which of the following option gives an output of inverse output i.e.,
702 Handling IO prints the lines that do not match the pattern? v

In grep Utility, to print only a count of the number of lines matching the
703 Handling IO pattern c

To show the line number before each line in the output, which option can be
704 Handling IO used with grep Utility? n

If the search criteria requires only sequence expressions, which of the grep is
705 Handling IO best Utility? fgrep

706 Handling IO To select the lines from the file called file1 that have the string OS All the above

707 Handling IO Find the odd man-out for redirecting standard output All the above

Disk
708 Management Which command will displays individual file sizes. ls -la

Disk
709 Management How to compress file 'file_name' using compress command compress file_name

Disk
710 Management Which is command is used to change permission of a file chmod

Disk
711 Management Which command is used to Copy "fileA" to "fileB" cp fileA fileB

Disk
712 Management How to display last 20 lines of a file 'file_name' tail -20 file_name

Disk archives and extracts files to and from a single file called a
713 Management What is the functionality of tar command tarfile.

Disk
714 Management Give a file myfile.zip which command should you use to unzip? unzip myfile.zip
Disk
715 Management How do you list currently running process? ps

Disk
716 Management Which command is used to display current working directory? pwd

Disk
717 Management How can you best see how much free space you have in your current directory? df .

Process
718 Management How to check all running process in the unix system? ps -ef

Process The command which displays how long a system has been running
719 Management and some information about the current load. uptime

Process
720 Management kill all your processes except your current shell session. kill -9

Process
721 Management System call responsible for splitting of a program into copies. fork()

Process
722 Management What is "waiting" process state ? The process is waiting for an event or for a resource

Process
723 Management If kill() returns 1 no process exists with the given PID

Process
724 Management What are signals in UNIX ? It is a message which can be sent to a running process

Process
725 Management What command can be used to display memory and swap use ? top

Process
726 Management What is the utility used to run a job regularly? cron

Process At system startup the cron daemon searches for cron entries in which
727 Management directory ? /var/spool/cron

Process
728 Management What is key combination causes the process to suspend execution? Ctrl-Z

Process
729 Management Signal sent to a process when its controlling terminal is closed. SIGHUP

Process Which of the command suspends program execution for a specified


730 Management period of time ? sleep

Process Which of the system call is used to create an identical copy of a


731 Management process ? fork

Process
732 Management The command which displays all the process of a user. pgrep -l -u userA

Process
733 Management Which option with ps command will list information for all processes. ans ) ps -A

Process
734 Management In the nice command increment value must be in the range. 1-19

Process Which of the option will kill the most recently created "acroread"
735 Management process ? pkill -n acroread

Process
736 Management What is the status field indicates for Zombie state? "Z"
737 Networking what is the port used for telnet ? 23

738 Networking you can ping a server, but can't telnet or ssh to it, what could be the problem? telnet ,ssh ports and services are not enable

739 Networking what is the command to set binary mode to transfer the file using FTP > ans ) bin

740 Networking How to exit from FTP > bye

741 Networking if telnet is not running ? What need to be checked ? Need to check telnet daemons,ports are running.

what is the command for printing for each data block transferred in FTP file
742 Networking transfer ? hash

How to write the file1 and file2 files to a new archive on the default tape drive
743 Unix utilities ? tar -c file1 file2

You need to view the contents of the tarfile called MyBackup.tar. What
744 Unix utilities command would you use? tar -tf MyBackup.tar

Account
745 Management What is 'su' command ? switch user

Account
746 Management The command to add dba group with gid 600 groupadd -g 600 dba

TIS Base
747 ITIL Which one of the following is not the goal of "Financial Management"? C)Manage service portfolio

The primary goal of which process is to provide the rights for users to be able
TIS Base to access a service or group of services, while preventing access to non-
748 ITIL authorized users. C)Access Management

TIS Base Which of the following best means Combination of Internal & External
749 ITIL Sourcing? C)Co-Sourcing

TIS Base
750 ITIL Which one of the following is NOT a major CI type? C)Purchase order

TIS Base
751 ITIL The wording of SLAs and OLAs should be: C)Clear and concise, leaving no room for ambiguity

TIS Base Does Problem Management depend entirely on having a mature Incident C)No, because progress can still be made on solving long-standing
752 ITIL Management process in place? Problems

To enable a new Service Desk management tool to be implemented, the


TIS Base capacity of the servers has to be extended. Who is responsible for managing the
753 ITIL request for additional capacity? C)Change Manager

TIS Base If an organization is able to become more proactive in its ITSM processes,
754 ITIL what is likely to happen to support costs? C)They are likely to gradually reduce

TIS Base C)A Service Desk that is situated in the same location as the users it
755 ITIL Which of the following BEST describes a Local Service Desk structure? serves

TIS Base Which of the following is NOT a step in the Continual Service Improvement
756 ITIL (CSI) model? C)Is there budget?

TIS Base
757 ITIL Which of the following is NOT an activity in the Change Management process? C)Change Design

TIS Base
758 ITIL Which of the following metrics types is NOT a typical type of metrics? C)Baseline metrics
TIS Base C)Service Management is a set of specialized organizational
759 ITIL Which of the following is the CORRECT definition of Service Management? capabilities for providing value to customers in the form of services.

TIS Base C)A database or structured document with information about all live
760 ITIL Which is the best description of a Service Catalogue? IT services, including those available for deployment.

TIS Base
761 ITIL The ITIL V3 core is best described as C)A Service Lifecycle

TIS Base C)The Management of the physical IT environment, such as a Data


762 ITIL Facilities Management refers to? Center

TIS Base C)A set of pre-defined steps to be followed when dealing with a known
763 ITIL What is the best definition of an Incident Model? type of Incident

TIS Base
764 ITIL Which of the following CANNOT be stored and managed by a tool? C)Wisdom

TIS Base Which ITIL process has the objective of helping to monitor the IT services by
765 ITIL maintaining a logical model of the IT infrastructure and IT services? C)Configuration Management

TIS Base Which of the following will complete the Four P's of Service Design? 1.
766 ITIL Perspectives 2. Positioning 3. Plan 4. ??? C)Patterns

Which of the following steps from the continual improvement Model is


TIS Base missing? 1. What Is the vision? 2. Where are we now? 3. Where do we want to
767 ITIL be? 4. How do we get there? 5. Did we get there? 6.? C)How do we keep the momentum going

TIS Base C)The business unit that requires the service fully funds for all its IT
768 ITIL What is "Managed Service"? services.

769 What kind of I/O flows through SAN Block I/O

770 Benefit of NAS Solution is Enables ability to share data across platforms

771 Name service Protocol used by iSCSI is iSNS

772 Which topology best suits for Availability and if cost is not a concern Full Mesh

773 What is the purpose of multipathing software? Both A & B

774 What is LUN (Logical Unit Number)? 2nd level of device identification/addressing

775 See the below figure and find out what technology is? Storage Area Network

776 What is the purpose of multipathing software? Both A & B

777 What kind of I/O flows through SAN Block I/O

778 Advantage of FC Director Over FC Switch Greater Connectivity and Availability

779 Benefit of NAS Solution is Enables ability to share data across platforms

780 Name service Protocol used by iSCSI is iSNS


781 Format of WWPN String of 8 Hex Pairs

782 Where is this data stored? Choose 2 correct answers. CDROM/DVDs

783 Explain what is iSCSI naming convention is EUI

784 Which RAID group will give better performance, redundancy and Economical RAID 5

785 What is a server capacity management task? Maintaining user logins

A LUN is created from three disks using one partition from each of the
disks.When this LUN is presented to the host, how does the host view the
786 LUN? As a concatenated partition

787 What is the failure that RAID technology guards against? Host failures

788 In an intelligent disk system, what is the role of the back-end? To move data between a host and the array cache

789 Which storage device requires the least data access time? Hard Disk

790 What is host memory? Temporary location for commands and data

791 What is a logical component of a storage environment? File system

792 What is a metric that could be used as part of Monitoring Security? Login failures

Qualified maximum number of storage ports that can be accessed by a


793 For a SAN attached array, what is a Fan-in Ratio? single initiator through SAN

Name the software component which contains backup, recovery and


794 administrative interfaces NetWorker Client

795 State the valid Fibre Channel Topology Switched Fabric

796 Benefit of NAS Solution is Enables ability to share data across platforms

797 What kind of I/O flows through SAN Block I/O

798 Advantage of FC Director Over FC Switch Greater Connectivity and Availability

799 Which three backup types are considered automatic backups? (Choose three.) User Backup

800 Which is a Snapshot benefit? Enables parallel information access

801 How many sessions are allowed per source LUN? 8

What is the maximum number of disks you can use in a RAID 1/0 RAID
802 Group? 16
803 What do VLANs reduce? The router traffic overhead in the network infrastructure

804 Each segment of an IP version 4 (IPv4) address contains how many bits? 8

Which data state represents the relationship between the Primary and
805 Secondary arrays? Consistent

Which remote mirror function allows synchronization to continue after a


806 Primary failure? Continue

UNIX client must perform which operation to access a NAS advertised


807 connection point? NFSMount

808 Explain what is ESCON Enterprise Systems Connection

809 Multimode cable can be used for short distance up to ? 500 meters

810 Fiber channel address is a ? 24 Bit

811 What are replicated in storage based remote replication? writes to source devices

812 What are two parts of cache? Data store and tag RAM

813 What do you monitor as part of server performance? Memory utilization

What is the name of the drive subassembly containing the platters and R/W
814 heads? HDA

815 What are replicated in storage based remote replication? writes to source devices

816 What is a feature of Internal DAS? Local storage provisioning

Which aspect of monitoring will allow you to predict the possible failure of FC
817 Switch ports before the ports actually fail? Performance

What are the three key data center management activities that are
818 interdependent? Provisioning, Monitoring, Reporting

A local replica of an application was created with pointer based replication


819 technology. What is a requirement to perform a successful restore? Source devices must be healthy

820 Which feature applies only to an integrated NAS device? Manages storage devices via NAS software

You have five disks in a RAID 0 set, and have assigned a stripe depth of 128
821 blocks (64kB). What is the STRIPE size (kB)? 320
A company has two SAN islands approximately one mile apart. The company
wants to link both sites over its public WAN connection. The fabrics must
remain separate but allow device access from either site. Which protocol is
822 recommended to connect the sites? iFCP

823 What does partitioning do? Divides a physical disk into logical volumes

824 Which statement applies to NAS? Specialized server for block level data access
825 Which protocol is used by a host to access block level storage over IP? iSCSI

The queued writes on the source side exceed the size of the dedicated log file.
Which remote replication technology requires a full synchronization between
826 source and target in this situation? LVM based remote replication

An identifier that uniquely addresses the content of a file and not its
827 Which statement describes Content Address (CA)? location

828 Which layer of the protocol stack re-transmits dropped packets in iSCSI? TCP

829 Which remote replication technology absolutely requires host involvement? Logical volume manager (LVM) Mirroring
An application uses ten 9 GB Devices. A pointer based replica of the
application is required every 4 hours. Each replica will be kept for 24 hours.
The data changes by 10% every 4 hours. How many replica devices are
830 required? 60

831 What describes DAS? Internally deployed block level access storage

Which tool can be used to view the logical and physical topology of an MDS
832 SAN? Fabric Manager

You have a backup and recovery solution in your environment. Several tapes
are available. You want to use different tapes for each set of backup clients.
833 Which backup component do you configure? Pool

A local replica of a database is require Business requirements demand that the


database be available 24X7. Which operation should be performed to ensure a
834 consistent replica of the database? Hold I/Os to the source devices just before the creation of the replica

The Recovery Time Objective (RTO) of a company is 4 hours. Which


835 statement below is true in the event of a disaster? Must be able to resume production within 4 hours

Which feature differentiates an integrated NAS device from a NAS Gateway


836 device? Manages storage devices via NAS software

837 What is a purpose of zoning? To logically connect array ports and host HBAs

A Copy on First Access replica has been create The source devices are being
used for production operations. When is data copied from the source to the
838 target? All write issued for the first time to a location on the source

839 What is the role of a bus? High speed interconnect among CPU, memory, and disks

Which type of front-end port is found on an intelligent storage system used in a


840 SAN? FC

841 What is a benefit of a NAS solution? Centralizes storage and simplifies the management

Applications, Databases, Servers/Operating Systems, Networks,


842 What are the five core elements of the data center infrastructure? Storage Arrays

Which sequence of activities describes a read cache hit? 1. Read data is sent
to the host 2. Host sends read request to
843 storage system 3. Cache is searched, and data is found . 2, 3, 1

844 What is stored in tag RAM? Pointers to the location of data in cache and on disk
An application uses ten 10 GB Devices. A pointer based replica of the
application is require The replica will be kept for 24 hours. The data changes
by 20% every 24 hours. How much storage should be allocated for the
845 replication? 20 GB

What channel is valid for connecting storage arrays directly to IP networks for
846 remote replication? Gigbit Ethernet
847 Which requirement is a reason for deploying NAS? Global access to data

848 What is an advantage of RAID 5 relative to RAID 1? Improved space utilization

849 Which statement is true of parity-based RAID? Parity is updated each time a write is performed

Which network technology uses time division multiplexing for sending data
850 from multiple subscribers as an optical signal? SONET

851 In which management task would you collect and analyze ISL traffic metrics? Performance

852 What is a logical component of a storage environment? Filesystem

Which aspect of monitoring will allow you to prevent a file system from
853 running out of space? Server Capacity

854 SCSI BUS can support how many devices? 40041

855 Which Storage implementation use IDE? DAS

856 In fiber channel physical layer data rate of up to? 200 MBps or 2 Gbps.

In an order processing system, which data center element manages the order
857 entry process? Application

Which term refers to the information that can be accessed on a disk drive by
858 all the heads without having to seek? cylinder

859 Which RAID type uses a single drive to maintain parity? RAID 3

860 What is a benefit of mirroring? Fast recovery from a failure

861 What are SC and LC connectors? Standard connectors for fiber optic cables

862 In a SAN-based backup environment, how does metadata travel? Over SAN

In a backup and recovery environment, what is a benefit of sending multiple


863 streams versus a single stream of backup data to tape? Improved write performance

What is an advantage of synchronous remote replication compared to


864 asynchronous replication? Lower data loss in the event of a disaster

865 Each segment of an IP version 4 (IPv4) address contains how many bits? 8

What is the maximum number of disks you can use in a RAID 1/0 RAID
866 Group? 16

867 how many disk reuqired for Raid-5? 3

Which virtualization technique requires the addition of an agent to each host


868 for the purpose of managing storage allocation? out-of-band appliance
Which three are advantages of using a SAN in a campus environment?
869 (Choose three) Decrease network traffic due to backups

870 What type of Fabric switch ports are joined to form an ISL? E_Port to E_Port

871 Which IP Storage protocol requires iSNS for discovery and management? iFCP

872 Directly connected to a single server? DAS

873 CIFS stands for? Common Internet File Systems

874 what is the interface tool for ssh? PuTTy

TIS Base
875 Wintel Which of the following IRQs are used for LPT1? 7

TIS Base
876 Wintel What is another name for 10BaseT? Twisted Pair

TIS Base
877 Wintel If a network has a Windows NT domain controller, what kind of network is it? Server-based

TIS Base Which of the following operating systems is designed for servers used in a large
878 Wintel enterprise network? Windows 2003 Enterprise

TIS Base
879 Wintel A 10BaseT network must be terminated with (?)-ohm terminators. None of the above

TIS Base
880 Wintel WDM is an acronym for Win32 Driver Model

TIS Base
881 Wintel Which IRQ has a standard function as the math coprocessor? 13

TIS Base
882 Wintel Which IRQ has a standard function as COM1? 4

TIS Base
883 Wintel Which of the following network devices translates between data formats? Gateway

TIS Base
884 Wintel Another name for 10Base2? Thinnet

TIS Base
885 Wintel Files in an EFS partition are- Encrypted

TIS Base
886 Wintel To uninstall Windows XP(?) None of the above

TIS Base
887 Wintel Windows clustering provides with of the following benefits? ansAll of the above

TIS Base In an OEM directory structure, the equivalent to the root drive on which
888 Wintel Windows XP will be installed is called- \$winnt$

TIS Base
889 Wintel What network evolved from the Defense Department's ARPANET? Internet
You are a help desk technician for your company. An employee named Marc is
attempting to open a Microsoft Word document Phonelist.doc by using
Internet Explorer. However, when he types http://Server1/Files/Phonelist.doc
TIS Base into the address bar in Internet Explorer, he receives the following error Instruct Marc to type file:\\server1\File\Phonelist.doc into the address
890 Wintel message: "404: Page not found.” You verify that Phonelist.doc exists in a bar in Internet Explorer
shared folder named Files on Server1. You need to ensure that Marc can
access Phonelist.doc by using Internet Explorer. What should you do?

Which of the following correctly identifies the files that load the kernel, the
TIS Base hardware abstraction layer (HAL), and the registry information during
891 Wintel startup on Windows XP 64-bit and Windows XP Professional machines? Windows XP 64-bit: ia64ldr.efi; Windows XP Pro: ntoskrnl.exe
You are the desktop support technician for Margie's travel. Every day, a user
named Andrea successfully faxes travel itineraries from her Windows XP
Professional computer. Andrea's computer is configured to use an external fax
device. The fax device is configured to receive faxes. However, Fax monitor
TIS Base does not Answer: any incoming calls. You need to configure Andrea's Configure the fax device to automatically Answer: incoming fax calls
892 Wintel computer to receive faxes.What should you do? after the first ring
You want to issue a command on your Windows XP Professional machine to
monitor a remote XP Pro workstation and run the execute.bat file in your
C:\bin directory whenever an event with event ID 4133 occurs with an error in
the remote machine's System event log. The remote XP system's name is
ridiculous, and it's a member of the same domain as your XP system. Your
TIS Base account has Domain Administrator access. Which of the following commands eventtriggers /create /s ridcully /tr "execute" /eid 4133 /l system /t
893 Wintel should you run? error /tk c:\bin\execute.bat

TIS Base
894 Wintel Which of the following features are available with IIS included with XP ? HTTP keep alives
You are a help desk technician for your company. Helene is a user in the sales
department who works from home. She reports a problem on her Windows XP
Professional computer. You instruct Helene to send you a Remote Assistance
invitation, and then disconnects from the ISP. You receive the invitation on
your Windows XP Professional computer and instruct Helene to reconnect to
her ISP. After you accept the invitation, you cannot connect to Helene's Instruct Helene to send a new Remote Assistance invitation and
TIS Base computer. You need to establish a Remote Assistance connection with Helene's remain connected to her ISP. From your computer, accept the new
895 Wintel computer. What should you do? invitation
You install a SCSI adapter and a SCSI tape drive on your Windows XP
Professional computer. You start the computer and Windows XP Professional
detects and installs drivers for the new SCSI devices. Later the same day, you
restart your computer. During the startup process, the computer stops loading
Windows XP Professional. You then restart the computer and it stops again.
TIS Base You want to enable your Windows XP Professional computer to start Start the computer by using the Recovery Console. Disable the SCSI
896 Wintel successfully. What should you do? adapter device driver by using the disable command
You need to install Windows XP Professional on 30 new computers. You also
need to deploy a Windows XP Professional service pack during the installation.
First, you create a network distribution folder named InstallFiles. You copy
TIS Base the i386 folder from the Windows XP Professional CD to the InstallFiles folder. From an existing client computer, run the Update -s:InstallFiles
897 Wintel What should you do? command from the service pack to the InstallFiles folder
You are the administrator of a Windows 2003 network. You replace the
uniprocessor computers in the graphics department with 25 new MPS-
compliant computers. Each computer has two 550- MHz processors.You install
the software that users need to perform their work. The software includes
Win32-, Win16-, and DOS-based applications. Users report that when they use
a Win 16-based application, they do not notice an improvement in
performance compared to using the uniprocessor computers. You want the
TIS Base users in the graphics department to be able to see a noticeable improvement in Replace the Win16-based applications with available Win32-based
898 Wintel performance. What should you do? applications
Your computer has Windows XP Professional installed. Your office has a
power outage while you are running the Windows XP disk defragmenter.
TIS Base When you restart your computer, you receive the following error message:
899 Wintel "Bad or missing operating system". What should you do? Start the computer by using the Windows XP Professional CD-ROM

TIS Base Windows XP pro on computer 192MB-RAM 4GB-HD-NTFS. Perormance


900 Wintel problem. When you select multiple file icons, performance becomes very slow. Run FSUTIL to prevent NTFS updating last access timestamps

You want to write a script that encrypts each user's My Documents folder
TIS Base using EFS. It has to be scheduled only run once. What tool must you use in the
901 Wintel script? Cipher
You are the desktop administrator for your company. All users have Windows
XP Professional or Windows 7 Client computers. Users in the accounting
department run an application that requires several hours to process financial
and accounting datUsers in the accounting department report that when they
run this application, the performance of other business applications becomes
significantly slower.You need to allow the accounting application to run with
TIS Base the least amount of performance impact on the other business applications.
902 Wintel How should you configure the users applications? Configure all accounting application to have Below Normal priority
You are a help desk technician for your Litware,InLitware, Inmaintains a
secure intranet web site at intranet litwareinc.com. All employees use Windows
XP Professional computers. A user named Katherine reports that she cannot
access the secure web site by using internet explorer. When she types
http://intranet.litware.com into the internet explorer address bar, an error
message reports that the digital certificate is not from a trusted source. You
confirm that the intranet web server is using a digital certificate issued by your
company's Enterprise Certificate Authority. The Enterprise Certificate
Authority is locate on a server named certificates.litwareinc.com You need to On Katherines computer, open Internet Explorers list of certificates.
TIS Base ensure that Katherine can access the secure intranet web site without receiving Import a copy of the certificate used by the intranet.litwareinc.com
903 Wintel an error message. What should you do? server into Katherines Trusted Publishers certificates store
TIS Base
904 Wintel Which of the following is Class C IP address? 204.67.118.54
You are the network administrator for Test.com. The Test network
contains seven application servers. Each application server runs a database
application named TestApp.
Requirements for TestApp state that when you add a new user, you must add
the user to the server that has the most available disk space.
TIS Base You need to ensure that you meet the requirements when you add new users to Use System Monitor to generate a histogram view of the LogicalDisk
905 Wintel TestApp. What should you do? object on all seven servers
You are the network administrator for Wipro.com. The sales department
stores data on a server that runs Windows Server 2003. The backup schedule
for the server includes a normal backup on Sundays and incremental backups
on every other day of the week. The sales department data includes a report
that is created by an automated process. The report is included in the standard
backup schedule for the server. The automated process runs on Wednesdays
and Sundays. The process overwrites the previous version of the report. You
need to be able to restore the report if the
standard backup is unavailable. You need to create an additional backup for
TIS Base the report. The backup for the report
906 Wintel cannot interfere with other backup jobs. What should you do? Perform a copy backup on Wednesday night and on Sunday night.

TIS Base
907 Wintel What is the binary network ID of the loopback IP address 1111111

TIS Base
908 Wintel What protocol is used between E-Mail servers SMTP

TIS Base
909 Wintel Which of the following is Class C IP address? 204.67.118.54

TIS Base
910 Wintel Disk Striping with Parity corresponds to which RAID level? RAID 5

TIS Base
911 Wintel A Router operates in which layer of the OSI model? The Network Layer

TIS Base
912 Wintel Windows clustering provides which of the following benefits? All of the above

TIS Base Which reason explains why user sessions may NOT launch seamlessly in a An administrator may have applied a policy using the ICAClient.ADM
913 Wintel Citrix XenApp environment template
Users are attempting to connect to a Presentation Server farm using Program
Neighborhood Agent.
However, they are unable to connect. An administrator suspects policies might
be causing the issue.
Through which type of connection should the administrator connect to first
TIS Base verify whether the issue is caused by a
914 Wintel Windows Group Policy setting or a Citrix Policy setting? Remote Desktop
An administrator is in the process of submitting a request for additional
budget for the upcoming year and wants to
understand the current resource constraints of the Presentation Server
TIS Base environment better.
915 Wintel Which report will provide the administrator with this information? CPU Utilization Management

TIS Base What can you do if a program is not responding to any commands andappears
916 Wintel to be locked up? Open Task Manager, select the appropriate task, and click End Task.

In Windows XP, which utility is responsible for finding, downloading, and


TIS Base installing Windows
917 Wintel service packs & Updates? Windows Update
Which of the following is a network protocol used on the Internet or localarea
networks to provide a bidirectional interactive communications facility and is
TIS Base used to establish aconnection to Transmission Control Protocol (TCP) port
918 Wintel number 23 by default? TELNET
Refer to the following Windows XP system files, which one contains
configuration options for a boot menu and allows the user to choose which
TIS Base operating system is to be loaded if it contains more han one operating system
919 Wintel entry? Boot.ini

TIS Base Which authentication method sends a challenge to the client that is encrypted
920 Wintel and then sent back to the server? CHAP

Introduction what is the core of the operating system and talks directly with the
921 to unix hardware kernel
Introduction
922 to unix which of the following is a filesystem supported in UNIX? all of the above

Introduction
923 to unix which of the following is a type of file in Unix all of the above

Introduction
924 to unix which is not a file in Unix none of the above

Access to
files and If you execute chmod 770 to a file that you own, the file permission will
925 directories be -rwxrwx---

Access to
files and
926 directories which is not a valid filename in Unix none of the above

Access to
files and which command searches the user's entire searchpath as defined in
927 directories the PATH which

Access to
files and
928 directories what is the most probable output for ls c* all files and directories beginning with c

Access to
files and
929 directories which is one of the property of hard link? cannot span across filesystems

Access to
files and
930 directories which command creates soft link ln -s

Access to
files and
931 directories what is the possible output for "echo test1" command? displays "test1" on the screen

Access to
files and
932 directories chose the odd man out from the four entries cat

Access to
files and
933 directories which of the following statement is true all of the above

The command used to change a to A and b to B simultaneously in the file old


934 Editors is? sed -e 's/a/A/' -e 's/b/B/' old

935 Editors The key to switch from Command to Insert mode is? I or i or a

936 Editors The keys used to move the cursor let, right, up and down in VI editor is? h, l, k and j

937 Editors The command to copy text in VI editor is? y

938 Editors The command to search a string in the VI editor is /string

939 Print services The profile file for a csh shell is .cshrc

940 Print services The command to removes a print job from the queue lprm or cancel jobid

941 Print services Command to list of configured printers? lpstat -a

942 Print services Gaphical version of VI editor is gvim

943 Handling IO Which of the following commands show your current shell? echo $0
944 Handling IO Odd man out for grep Variables

945 Handling IO Limitations of grep utility All the above

In grep Utility, the following option can be used to print only lines that entirely
946 Handling IO match pattern x

947 Handling IO Regular expressions in the grep family All the above

Disk
948 Management Which directory you will create for your program files and scripts. bin

Disk
949 Management Which command will display information about all mounted file systems df

Disk
950 Management What does UID and GID signify? User ID and Group ID

Disk
951 Management How to compress a file 'my_file' using gzip command? gzip myfile

Disk
952 Management How do you search for a string 'computer' inside a directory? grep computer *

Disk Which command will add the suffix .gz to the filename and remove the original
953 Management file when you compress a file gzip

Disk
954 Management cat par.3 par.4 par.5 >> report What is the output of above command Writes the contents of the all 3 files into a file called report

Disk
955 Management What is the syntax for zip command? zip file_name.zip file_name

Disk
956 Management What is the command to limit filesizes in Bash or Korn shell ulimit

Disk
957 Management Type the full command you could use to decompress the file "foo.gz" gzip -d foo.gz

Process
958 Management Which of the command sends a kill signal to PID. kill 0

Process The process is dead but have not been removed from the
959 Management What is a zombie state? process table.

Process
960 Management How can you find dead processes? ps -ef | grep zombie

Process
961 Management Command executes commands at a given time. at

Process
962 Management What is command list at jobs ? at -l

Process What is the command gives an overview of the hierarchical structure


963 Management of all running processes? ptree

Process
964 Management Choose one valid SIGHUP command. kill -HUP <processID>

Process Which of the option with uptime command will list the version
965 Management information ? uptime -V
Process
966 Management What are various IDs associated with a process? PID,PPID,UID,EUID

967 Networking what is the port used for FTP ? ans ) 21

968 Networking how to make the ethernet interface disable ifconfig eth0 down

969 Networking which protocol is used to transfer the files ans ) ftp

970 Networking what is the command to be sounded after each file transfer is completed. bell

971 Networking A system administration tool and shortly know has interface configuration ? ifconfig

You are covering for another system administrator and one of the users asks
972 Unix utilities you to restore a file for him. You locate the correct tarfile by tar tvf tarfile

Account
973 Management What is the command to delete an user account userdel -r login

Account
974 Management What is the command to create user oracle with default login group dba useradd -g dba oracle

TIS Base
975 ITIL Which one of the following is not a process in "Service Transition"? D)Service Level Management

TIS Base
976 ITIL Which is the correct sequence of events in the selection of a technology tool? D)Requirements, Selection Criteria, Evaluate Product, Select Product

TIS Base
977 ITIL Which of these best describes the purpose of Capacity Management? D)To provide cost-effective IT capacity to meet agreed service levels

TIS Base
978 ITIL Which one of the following is not a process in Continual Service Improvement? D)Service Desk

TIS Base D)Technical support staff are less likely to be interrupted to deal with
979 ITIL Which of these is a DIRECT benefit of having a Service Desk? user’s calls

TIS Base
980 ITIL At what point does an Incident turn into a Problem? D)Never

TIS Base D)To ensure that service availability matches or exceeds the agreed
981 ITIL The main objective of Availability Management is? needs of the business

TIS Base
982 ITIL Incident Management has a value to the business by? D)Contributing to the reduction of impact

TIS Base Which of the following is NOT an activity that IT Operations Management is
983 ITIL responsible for? D)Maintenance of a stable technical infrastructure.

TIS Base D)During the design stage, for each new service, major change to a
984 ITIL When should a Service Design Package be produced? service or removal of a service.

TIS Base Learning and improvement is the primary concern of which of the following
985 ITIL elements of the Service Lifecycle? D)Continual Service Improvement

TIS Base
986 ITIL Application Management is NOT responsible for? D)Developing operational functionality required by the business

TIS Base D)Customers are assured of certain levels of availability, capacity,


987 ITIL “Warranty of a service” means which of the following? continuity and security
TIS Base The objective of Service Asset and Configuration Management is most D)To define and control the components of services and infrastructure
988 ITIL accurately described as? and maintain accurate configuration records

TIS Base
989 ITIL A Service Catalogue should contain which of the following? D)Details of all operational services

TIS Base D)A process for defining what is to be measured, gathering the data,
990 ITIL The 7 Step Improvement Process can most accurately be described as? processing the data and using it to take corrective action
The spell check module of a word-processing software package contains a
number of errors. The Development department has corrected these errors in
TIS Base a new version. Which process is responsible for ensuring this updated version
991 ITIL is tested? D)Release Management

TIS Base
992 ITIL Which of the following is the process rather than a department? D)Availability Management

TIS Base Of which ITIL process are Reliability, Serviceability and Maintainability
993 ITIL components? D)Availability Management

TIS Base
994 ITIL Which of the following statements is true about the term Event? D)All of above

TIS Base
995 ITIL Which of the following statements is true about Access Management? D)All of above

996 Which Protocol is used to send data through Ethernet for Backup NDMP

997 Choose the three SCSI Addressing components Initiator, Target, LUN ID

998 The FC-HBA card in a SAN Fabric is identified or addressed using WWN

999 Size of the Content Address When the CAS Stores a Data Object 128 bit

1000 Which RAID would be best suitable for Video Streaming Applications RAID 3

What is the default authentication method used in windows Active Directory,


1001 native mode Kerberos

1002 Which RAID level provides the best performance for random write? RAID 10

1003 Which Protocol is used to send data through Ethernet for Backup NDMP

1004 Size of the Content Address When the CAS Stores a Data Object 128 bit

1005 What is implemented in storage arrays to prevent unauthorized access Lun Masking

1006 What is the fundamental unit of block storage that is provided in a SAN? Logical unit

Name the two types of storage connectivity which are associated with block
1007 level data SAN

Which three important data center management activities are


1008 interdependent? Provisioning, Monitoring, and Reporting

To ensure the components are functioning properly and are


1009 What are two [2] reasons for monitoring data center components available 24x7
1010 What is the key metric for server performance? Memory utilization

In SAN, if the primary concern is cabling flexibility, what method of zoning


1011 should be employed? WWN Zoning

In a SAN, what is implemented in storage arrays to prevent unauthorized


1012 access? LUN masking

1013 Which Protocol is used to send data through Ethernet for Backup NDMP

1014 Choose the three SCSI Addressing components Initiator, Target, LUN ID

1015 Which three backup types are considered automatic backups? (Choose three.) Differential Incremental

1016 What are two advantages of multiplexing? (Choose two.) increased drive utilization

Explain what is the fundamental unit of block storage that is provisioned, in a


1017 SAN. Logical Unit Number

In a UNIX environment, which mechanism is used to enable controlled access


1018 to resources? NIS

1019 How is an advanced file type device better than a regular file type device? Supports multiple simultaneous recoveries

A customer requires maximum availability, and cost is not a factor. Which


1020 SAN topology would best suit this environment? Full mesh

1021 What describes the Fibre Channel storage protocol (FCP)? SCSI over FC

Which data state represents the relationship between the Primary and
1022 Secondary arrays Synchronizing

1023 What does a Domain ID uniquely identify? A switch within a fabric

1024 Which statement applies to NAS friendly applications? Applications support global access to storage

1025 What describes the iSCSI protocol? SCSI over IP

Which fabric security feature is governed by the common Fibre Channel


1026 standard? Zoning

What is the process of transferring LUN ownership to the peer Storage


1027 Processor? Trespassing

Which protocol implements access to block-level storage in a traditional IP


1028 networking environment? iSCSI

1029 Which statement about NDMP backup is correct? NFS and CIFS permissions on the same file system are preserved

1030 Which type of RAID rotates parity among the group members? RAID-5

1031 Single mode cable works for distance up to ? 10KM


1032 Mesh Fabric advanctage? Choose 2 answers Medium to High Performance

In SAN, if the primary concern is cabling flexibility, what method of zoning


1033 should be employed? WWN Zoning

An application uses 9 GB devices. A full volume local replica of the application


is required every 6 hours. Each replica will be kept for 24 hours. How many
1034 replica devices are required? 40

An application uses 9 GB devices. A full volume local replica of the application


is required every 6 hours. Each replica will be kept for 24 hours. How many
1035 replica devices are required? 40

Which remote replication method is most affected by the distance between


1036 source and target? Synchronous

What is the standard layer that resides between managed objects and
1037 management software? SMI-S

1038 What is the basic unit of storage in a CAS implementation? Object

What is a disadvantage of synchronous remote replication compared to other


1039 methods of remote replication? Response time elongation

A disk is divided into three LUNs. One LUN is presented to a host. How does
1040 the LUN appear to the host? As a single disk

1041 Why would you implement an iSCSI solution? Leverages existing IP network infrastructure

What is a disadvantage of a Fibre Channel hub when compared to a Fibre


1042 Channel switch? Limited performance

A pointer based replica has been create Source devices are being used for
production operations. When is data copied from the source to the save
1043 location? First write to a location on the source

Which topology increases connectivity within the SAN while conserving overall
1044 port utilization? Core Edge

1045 Which remote replication solution has the highest bandwidth requirements? Host based asynchronous LVM Mirroring

1046 What represents the layering of protocols in a Fibre Channel SAN? SCSI over FC

How does Asynchronous remote replication improve application performance,


1047 compared to Synchronous remote replication? Writes are acknowledged immediately by the source

1048 How are nodes typically connected to a two tier Core Edge fabric? Host on Edge, storage on Core

1049 What is a benefit of reporting on storage arrays? Planning for capacity

1050 What is a primary concern when using Internal DAS? Single points of failure

1051 What is a primary concern when using Internal DAS? Single points of failure

1052 Which task is an example of monitoring the utilization of a data center object? Viewing a list of filesystems that are nearly full

A pointer based replica has been created and is being used for decision
1053 support. When is data copied from the source to the save location? First write to a location on the target
Which Data Center infrastructure component does the Array receive
1054 read/write commands from? Server

You need to consolidate a storage environment. The applications require high


bandwidth and block level I/O. Which storage solution best meets these
1055 requirements? SAN

1056 Which remote replication solution has the lowest bandwidth requirement? Log shipping over IP networks

1057 What do you monitor as part of a SAN health check? Port status change

1058 What best defines NAS? Specialized server for file level data access

If site A is 1000 miles (1600 km) away from site B, which method is NOT
1059 suitable for remotely replicating data from A to B? Synchronous

Which task is an example of monitoring the performance of a data center


1060 object? Viewing rates of data transmission of all disks

What is a benefit of tracking changes to the source and target devices after a
1061 point in time replica is created? Speeds up the re-synchronization of the source and target

What is the size of the unique Content Address when the CAS stores a data
1062 object? 128 bit

You want to ensure that your storage solution can grow with your business.
1063 Which requirement of storage systems applies to this goal? Scalability

When is data copied from the source to the save location in pointer based
1064 replica technology? First write to a location on the source

1065 Which statement describes the iSCSI protocol? SCSI over IP

You must create a chargeback system for cost recovery in the IT department.
1066 Which activity supports this goal? Reporting

1067 What does a Domain ID identify? A switch within a fabric

1068 Defines common services used in a switch? All of the above

Rotation speed of a spindle is varied to keep the head flying height


1069 What is an accurate statement that describes a disk drive? constant

1070 What is an advantage of WWPN zoning? Protects against "HBA spoofing"

When assigning CLARiiON storage space to a host, what is the order of Create the RAID groups, bind the LUNs, and assign the LUNs to the
1071 operations? host

1072 What does a serial ATA cable attach to a host? DAS disk

1073 When considering a NAS deployment, what is a challenge? Only file level access support

NAS component is managed through NAS management software and


1074 Which statement accurately describes NAS gateway systems? the storage array is managed through array management software

1075 What is a characteristic of an integrated NAS system? Offers multiple connectivity options with the back-end
1076 Which SAN topology offers the greatest degree of scalability? Switched Fabric

1077 What is a valid member of a zone in a SAN? A HBA WWPN

What are the two [2] primary reasons why businesses collect and store data
1078 over long periods of time? Regulations and compliance

1079 What were two [2] problems with decentralized, client-server based storage? Speed of access to data

Sharing of storage resources and data between different departments


1080 What are two [2] advantages of Centralized Networked Storage? in an organization

Which core element of a data center infrastructure provides the computing


1081 platform required to run the application and databases? Servers/Operating Systems

Which key requirement of storage systems refers to the ability of the storage
1082 solution to grow with the business? Scalability

1083 Which type of RAID rotates parity among the group members? RAID-5

Which protocol implements access to block-level storage in a traditional IP


1084 networking environment? iSCSI

1085 What describes the iSCSI protocol? SCSI over IP

Which data state represents the relationship between the Primary and
1086 Secondary arrays? Synchronizing.

1087 What describes the Fibre Channel storage protocol (FCP)? SCSI over FC

In a UNIX environment, which mechanism is used to enable controlled access


1088 to resources? NIS

1089 What is a valid Fibre Channel Topology? Arbitrated loop

Which two sub-components are required in a specialized NAS operating


1090 system? (Choose two.) communication protocols

What component is a configuration management element of an IP storage


1091 solution? VLAN

What is the maximum potential bandwidth of a Fibre Channel connection in a


1092 2 Gb SAN? 400 MB/s

What is the minimal iSCSI security level needed to protect against man-in-the-
1093 middle insertion, modification or deletion? digest for header and data integrity

1094 Which two RAID type use parity for data protection? RAID 5

Which characteristic differentiates an IP Storage adapter from a traditional


1095 Network Interface Card (NIC)? TCP/IP segmentation offload

1096 what are the NAS file services protocols? NFS & CIFS

Вам также может понравиться