Friday, January 4, 2013

server 2008 multiple choice questions and answers

https://www.youtube.com/channel/UCQECTKWf3phX5McZIyPM0Mw/videos

1.      
You are an enterprise administrator for IIHT. The corporate network of IIHT consists of a single Active Directory forest called IIHT.com. The IIHT .com forest contains six domains under it. All DNS servers in the forest run Windows Server 2008. Which of the following actions would you choose to ensure that all public DNS queries are channeled through a single-caching-only DNS server? (Select all that apply.)

A. Configure a forwarder.
B. Enable BINDsecondaries on a DNS Server.
C. Configure the root hints.
D. Configure a Global Names host (A) record for the hostname of the caching DNS server.

Answer: A, C

2.       You are an enterprise administrator for IIHT. The corporate network of IIHT consists of a single domain called IIHT.com. The domain contains an Integrated Active Directory DNS zone the partner company of IIHT called IIHTTECH also consists of a domain called IIHTTECH.com. The IIHT .com domain also consists of an Integrated Active Directory DNS zone. Due to some network changes, the IP addresses of the DNS servers in the IIHTTECH.com need to be changed. Which of the following options would you choose to ensure the name resolution for users in IIHT.com to the resources in IIHTTECH.com?

A. On each DNS server in IIHT.com, create a stub zone for IIHTTECH.com.
B. Configure the Zone Replication Scope for IIHTTECH.com to replicate to all DNS servers in the forest.
C. Configure an application directory partition in the IIHT.com forest to enlist all DNS servers in the IIHT.com forest in the partition.
D. Configure an application directory partition in the IIHTTECH forest to enlist all DNS servers in the IIHTTECH forest in the partition.

Answer: A

3.       IIHT corporate network consists of Windows 2003 domain, wherein the client computers are Windows 2000 Professional and Windows NT Workstations. In order to have the name resolution of pre windows 2000 client’s the management and IT infrastructure team has decided to have two WINS servers in the network. Which of the following will make sure that the WINS servers update each other’s database dynamically?

A. Add LMHOST’S on each server
B. Configure each WINS server as a WINS client of the other WINS server
C. Configure a HOSTS table on each WINS Server
D. Configure each WINS server both as a push partner and as a pull partner of the other WINS server

Answer: D

4.       Which service should you use so the computers on your network can resolve NETBIOS names without any administrative work?

A. Telnet
B. DNS
C. FTP
D. HOSTS
E. WINS

Answer: E
5.       IIHT.com has servers that run Windows Server 2008. You are an administrator at IIHT.com. To assign IPs dynamically to all client computers, you install and configure a member server named IIHTDHCP as a Dynamic Host Control Protocol (DHCP) server. You configure all client computers to get their IP addresses automatically from IIHTDHCP. The users at client computers complain that their machines are not receiving IP address from IIHTDHCP. They say that their computers are getting IP addresses from 129.168.x.x range. You find out that the DHCP server has stopped. The settings on CKDHCP are configured correctly. What should you do to make sure that the CKDHCP server is not stopped and all client machines are obtaining IP addresses from CKDHCP server automatically?

A. Reconfigure the CKDHCP server to assign IP addresses to all client machines using DNS settings
B. Restart the DHCP service on CKDHCP server
C. Restart the CKDHCP server
D. Authorize the DHCP server to assign IP addresses to client computers

Answer: D

6.       You are an enterprise administrator for IIHT. The corporate network of IIHT consists of a DHCP server that runs Windows Server 2008. Which of the following options would you choose to reduce the size of the DHCP database?

A. Enable the File is ready for archiving attribute of the dhcp.mdb file, from the properties of dhcp.mdb file.
B. Enable the Compress contents to save disk space attribute of the dhcp.mdb file, from the properties of
dhcp.mdb file.
C. Reconcile the database from the DHCP snap-in.
D. Run jetpack.exe dhcp.mdb temp.mdb from the folder that contains the DHCP database.

Answer: D

7.       You are an enterprise administrator for IIHT. The company consists of a head office and a branch office. The corporate network of the company consists of a single Active Directory domain. All the servers in the domain run Windows Server 2008. Recently the branch office users have started complaining that they are unable to access shared resources in the head office. To diagnose the problem, you checked the IP addresses of the computers in the branch office and found that they have IP addresses in the range of 169.254.x.x. Which of the following options would you choose to ensure that branch office computers can connect to share resources in both the head office and the branch office? What should you do?

A. Include the head offices DHCP server address in the Broadcast Address DHCP server option
B. On a member server in the head office, configure a DHCP relay agent.
C. Include the main offices server IP addresses in the Resource Location Servers DHCP server option.
D. On a member server in the branch office, configure a DHCP relay agent.

Answer: D

8.       As a network administrator, you have upgraded all servers to Windows Server2008. You are required to configure IPv6 address to all computers in that network. The company has four departments and a global address prefix 3FFA:FF2B:4D:B0Q0::/41 is assigned. You are required to assign a subnet to each department. Which subnetted prefix will you assign to the fourth department?

A.3FFA:FF2B:4D:COOO::M3
B.3FFA:FF2B:4D:C800::/43
C.3FFA:FF2B:4D:F000::/4S
D.3FFA:rF2B:4D:B400::/43

Answer: B

9.       On a network configured to use IPv6, a Dynamic Host Configuration Protocol (DHCP) server on a server called DHCP1 running on Windows 2008 server is installed. Also, IP address and other configuration settings are not automatically allocated to DHCP clients on a subnet that does not use DHCPvG from DHCP1. In this case, how is the Managed Address Configuration flag and other stateful configuration flag configured in the root advertisement?

A.Set both Managed Address Configurations to 1 and other stateful Configuration flag to 0
B.Set Both Managed Address Configuration and Other Stateful Configuration flag to 0.
C.Set both Managed Address Configuration to 0 and Other stateful Configuration flag to 1
D.Set both Managed Address Configuration and other stateful Configuration flag to 1

Answer: B

10.   You are an enterprise administrator for IIHT. The company consists of a head office and a branch office. The corporate network of the company consists of a single Active Directory domain. All the servers in the domain run Windows Server 2008. The company’s network uses IPv4 networking. You have recently installed a new Windows Server 2008 server in the branch office and configured it with two network interfaces. Which of the following options would you choose to configure routing on the server at the branch office? (Choose two)

A. Enable the IPv4 Router Routing and Remote Access option on the server at the branch office.
B. Run the netsh ras ip set access ALL command on the server at the branch office.
C. Install the Routing and Remote Access role on the server at the branch office.
D. Run the netsh interface ipv4 enable command on the server at the branch office.

Answer: A, C

11.   Network Access Protection (NAP) will only work with certain operating systems at the time of Windows 2008 Server release. What operating systems will NAP support?

A. Window XP
B. Windows XP Service Pack 3
C. Windows Vista
D. Windows Server 2008

Answer: B, C, D

12.   The corporate network of IIHT contains a Windows Server 2008 that has the Network Policy Server (NPS) service role installed. Which of the following options would you choose to allow VPN access to only the members of a global group named IIHT Staff to the network?

A. Create a new network policy, define a group-based condition for IIHT Staff, Set the access permission to Access Granted, and set the processing order of the policy to 1.
B. Add IIHT Staff to the RAS and IAS Servers group.
C. Create a new network policy, define a group-based condition for IIHT Staff, Set the access permission to Access Granted, and set the processing order of the policy to 3.
D. Add IIHT Staff to the Network Configuration Operators group.
E. None of the above

Answer: A

13.   On the corporate network of IIHT the Network Access Protection (NAP) is configured. You have configured the 802.1x authentication to all the access points that will be used to access to the corporate network using wireless computers to ensure secure wireless access. Which of the following options would you choose to ensure that all the client computers that try to access the corporate network are evaluated by NAP?

A. Configure a Connection Request Policy having EAP-TLS as the only available authentication method.
B. Configure all access points as RADIUS clients to the Remediation Servers.
C. Configure a Network Policy having the Remote Access Server as the only available authentication method.
D. Configure all access points as RADIUS clients to the Network Policy Server (NPS).
E. None of the above

Answer: A

14.   IIHT .com has a server with Active Directory Domain and an Enterprise Root Certificate authority installed. To protect the VPN connection, IIHT.com has decided to employ Network Access Protection (NAP) on the server. You are given the task for implementing the NAP on the server. You build two servers named IIHT NPS and IIHT VPN. You configure the functions on both servers as shown in the exhibit. What should you do to ensure that the system health policy is implemented on all client computers attempting to connect to the VPN server?

A. Configure a NAP role on an Enterprise Certificate Server
B. Reconfigure IIHT NPS as a Radius Client
C. Configure a NAP role and add it to a domain controller
D. Reconfigure IIHT VPN as a Radius client

Answer: D

15.   You install a Windows Server 2008 with routing and remote access on a server at IIHT.com. You configure the server to act as a corporate VPN (Virtual Private Network) server. All the client computers at IIHT.com have Windows XP Professional, Windows 2000 professional or Windows Vista installed. The remote users of IIHT.com use this server to connect to the company’s network domain. Sensitive data is transmitted from the remote users through VPN server. The company’s security policy dictates that each user or computer should use public key infrastructure (PKI) to connect to the domain for the transmission of sensitive research data. You need to ensure that the VPN server meets those security requirements. What should you do to secure the VPN connection?

A. Use the Kerberos version 5 authentication protocol to create a custom IPSec policy
B. Use the Pre-shared authentication by creating a policy for a highly secure data transmission
C. Open the command line on the server and run secedit/refreshpolicy machine_policy
D. Implement L2TP/IPSec policy to create certificate-based authentication

Answer: D

16.   IIHT has a corporate network. Network Access Protection is configured on it. As per company policy, strict security measures are required to secure the data when it is transmitted between the servers and the clients. Users connect to the corporate network through their laptops or PCs to use network resources. You have to create a strict access requirement that will stop any other person connecting to the corporate network and using network resources. What should you do to implement the restricted access control?

A. Add and configure an IPSec Enforcement Network policy
B. Add and configure 802.1 X Enforcement Network policies
C. Add and configure a Wired Network Group policy
D. Add and configure Extensible Authentication Protocol (EAP) Enforcement

Answer: A

17.   You deploy a DFS server to the headquarters and each branch office and a DFS name is hosted on each of the DFS servers. Management needs clients to connect to their local DFS server if it is available and then connect to any other DFS server if the local DFS server is not available. Which method you will configure?

A. Random Order
B. Lowest Cost
C. Excludes targets Outside Of the clients site
D. Clients fall Back to preferred Targets

Answer: A

18.   You need to use disk quotas to send an e-mail to users when they have consumed 800Mb of disk space and prevent users from consuming more than 1 GB of disk space. How will configure it?

A. Create a hard quota with a 800mb limit and a second soft quota with a limit 1GB
B. Create a soft quota with a 800MB limit and a second quota with a 1GB limit.
C. Create a hard quota with a 1GB limit. Create a warning at 80 percent
D. Create a soft quota with a 800MB limit. Create a warning at 80 percent

Answer: C

19.   You notice that Microsoft has released a Service Pack for Windows Vista. However, when you open the
WSUS console and review updates, you do not see any service packs listed. You do see recent security updates available. What is the most probable cause that no service packs are available?

A. Microsoft does not provide the ability to deploy service packs using WSUS
B. Service packs are available only for Windows Server operating systems
C. WSUS is not properly downloading updates from Microsoft update servers
D. The Service Packs update type is not selected in the WSUS options

Answer: D

20.   You notice that a new critical security update has been released to the Microsoft update site. You want to download this update to your WSUS server and install it on all of your corporate computers as soon as possible. You approve the update for install to the All Computers computer group and set an install deadline of 11:00 p.m. of the same day. When you return to the office the next morning you notice that the update was not installed on any Computers. What is the most likely cause that the update was not installed?

A. The WSUS server lost connectivity to the Internet
B. You must approve the update for each computer individually
C. The Automatic Updates Detection Frequency is set to a period longer than the amount of time that has elapsed since you approved the update
D. The client computers need to be rebooted before the update can be installed

Answer: C









red hat linux questions and answers


1.      John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. He is working as a root user on the Linux operating system. He wants to add a soft limit quota warning for the users, in which, after exceeding the quota value, a user will receive e-mail warnings about being over quotA. Which of the following commands will John use to accomplish his task? Each correct answer represents a complete solution. Choose all that apply.

A)    repquota
B)     quotaon
C)    warnquota
D)    edquota
E)     quotaoff

Answer: C,D

2.      Which of the following commands will you run to list all files that have been modified within the last 60 minutes?

A)    find /etc -name *.txt
B)     find start -dir -min -60
C)    find start -dir -cmin -60
D)    find start -cmin -60

Answer: C

3.      You work as a System Administrator for McNeil Inc. The company has a Linux based network. You are a root user on Red Hat operating system. You have upgraded the amount of RAM in your system from 256 MB to 512 MB, but there is only 512 MB of swap space. Therefore, you want to add more swap space to /dev/hdb2 hard drive to run the applications that require a large amount of memory. Which of the following commands should you run to accomplish this task? Each correct answer represents a complete solution. Choose all that apply.

A)    mkswap /dev/hdb2
B)     swapon /dev/hdb2
C)    mount
D)    parted

Answer: A,B,D

4.      You work as a Linux Technician for Tech Perfect Inc. The company has a Linux-based network .You have configured a database server in the network. Users complain that the server has become remarkably slow. However, the previous day, the server was performing well. You know what some of the processes may be the cause of the issue. You run the PS command on the server. In the result set, which information will you look at that suggests the problematic process?

A)    A high load average
B)     A high process ID
C)    A low load average
D)    A low CPU time
E)     A high CPU time

Answer: E

5.      You want only the root access in a Linux computer for maintenance purposes. Which of the following runlevels will you use to boot the computer?

A)    2
B)     0
C)    1
D)    3

Answer: C

6.      Which of the following commands can be used to compress a file? Each correct answer represents a complete solution. Choose all that apply.

A)    gzip
B)     compress
C)    tar
D)    zip

Answer: A,B,D

7.      You work as a Network Administrator for Rick Inc. The company has a Linux-based network. You are configuring a Linux server. Which of the following boot loaders does not require to be rewritten after the configuration of the kernel has been changed?

A)    GRUB
B)     BOOTP
C)    LILO
D)    ELILO
             
Answer: A

8.      Which of the following fsck commands will you use to check all filesystems listed in /etc/fstab?

A)    fsck -P
B)     fsck -f
C)    fsck -A
D)    fsck -y

Answer: C

9.      After enabling shadowed passwords in a Linux server, where does Linux keep the passwords?

A)    /usr/shadow
B)     /etc/passwd
C)    /usr/passwd
D)    /etc/shadow

Answer: D

10.  You work as a Software Engineer for McNiel Inc. The company has a Linux-based network. The company has 150 Engineers. The root user has configured quota limits for each user. You want to view quota limits for your system. Which of the following commands will you use to accomplish this task?

A)    repquota -a
B)     quota -v
C)    quotacheck
D)    edquota

Answer: B

11.  Which of the following commands is used to create a user account for a new user?

A)    USERMOD
B)     MOUNT
C)    USERADD
D)    CRUSER

Answer: C

12.  You work as a Network Administrator for Tech Perfect Inc. The company has a Linux-based network. You are configuring a server that will be used as a file server. You want to install an RPM package, named FILELOCATOR, on the server. You want to check whether the package is already installed. Which of the following commands will you use?

A)    grep FILELOCATOR
B)     find -q rpm |grep FILELOCATOR
C)    rpm -qa | grep FILELOCATOR
D)    find FILELOCATOR

Answer: C

13.  By default, which of the following commands configures the current run level?

A)    chkconfig
B)     pstree
C)    service
D)    ntsysv

Answer: D
14.  When installing RHEL in the graphical interface, which of the following switches can be used to specify a resolution?

A)    lowers
B)     vnc
C)    resolution
D)    skipddc

Answer: C

15.  You work as a Network Administrator for Net World International. The company has a Linux-based network. You want to upgrade an RPM package and get the status during the upgrade. Which of the following commands will you use to accomplish the task?
A)    A. rpm -ivh
B)     B. rpm -evh
C)    C. rpm -qvh
D)    D. rpm -Uvh

Answer: D

16.  John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to run the cc process at runlevel three. If the order of execution of cc command is 43, which of the following commands will John use to accomplish his task?

A)    ln -s /etc/init.d/cc /etc/rc.d/rc3.d/K43cc
B)     ln -s /etc/rc.d/init.d/cc /etc/rc.d/rc3.d/K43cc
C)    ln -s /etc/rc.d/cc /etc/rc.d/rc3.d/s43cc
D)    ln -s /etc/rc.d/init.d/cc /etc/rc.d/rc3.d/S43cc

Answer: D

17.  Which of the following commands displays a module name or filename and associated information, such as the authors name, license, description, module version, dependencies, parameters, etc?

A)    modprobe
B)     lsmod
C)    modprob
D)    modinfo

Answer: D

18.  After creating the swap area, which of the following commands will you need to run to start using it?

A)    mkswap
B)     mkfs
C)    swapon
D)    swapoff

Answer: C

19.  You work as a Network Administrator for Secure Web Inc. The company has a Linux-based network. The network has a mixed set of client operating systems. You want to format a new hard disk drive. The drive will have only one partition. Both the Linux and Windows operating systems will access the partition. Which of the following file systems will you use?

A)    VFAT
B)     XFS
C)    REISER
D)    EXT3

Answer: A

20.  What is the minimum RAM requirement for installing Red Hat in GUI mode?

A)    1GB
B)     512 MB
C)    128MB
D)    64MB

Answer: C

21.  Which of the following commands can be used to modify kernel parameters at
runtime?

A)    sync
B)     sysctl
C)    mkinitrd
D)    lsdev

Answer: B

22.  You want to verify the PGP signature of all headers and signatures associated with an RPM package. Which of the following commands will you use to accomplish the task? Each correct answer represents a complete solution. Choose all that apply.

A)    rpm -e
B)     rpm -K
C)    rpm --checksig
D)    rpm -V

Answer: B,C,D

23.  Which of following options will you use to force mtr to display numeric IP numbers and not try to resolve the host names?
A)    -t
B)     -n
C)    -l
D)    -p

Answer: B

24.  Which of the following statements are true about kernel modules?  Each correct answer represents a complete solution. Choose all that apply.

A)    Kernel modules do not support executable loaders.
B)     The kernel module contains extra kernel codes that may be loaded after the loading of the base kernel. Only a minimal resident kernel is loaded into memory at boot time.
C)    Kernel modules do not support the device drivers, network drivers, and file system drivers.
D)    Whenever a user requests a feature that is not present in the resident kernel, a kernel module is dynamically loaded into memory.

Answer: B,D

25.  You want to temporarily change your primary group to another group of which you are a member. In this process, a new shell will be created, and when you exit the shell, your previous group will be reinstated. Which of the following commands will you use to accomplish this task?

A)    chgrp
B)     newgrp
C)    chmod
D)    chown

Answer: B

26.  You want to make Rick an owner of the files TRADE1.TXT and TRDREPORT.TXT. Which of the following commands will you use to accomplish this?

A)    chown rick TRADE1.TXT TRDREPORT.TXT
B)     chgrp rick TRADE1.TXT + TRDREPORT.TXT
C)    chown rick TRADE1.TXT + TRDREPORT.TXT
D)    chgrp rick TRADE1.TXT TRDREPORT.TXT

Answer: A

27.  You work as a Network Administrator for McNeil Inc. The company has a Linux-based network. You are a root user on the Linux system. You have to create a user named Trinity and deny interactive login. Which of the following should you use to accomplish the task? Each correct answer represents a part of the solution. Choose all that apply.

A)    vi /etc/passwd
B)     vi /etc/shadow
C)    useradd Trinity
D)    passwd Trinity
E)     Trinity:x:505:505::/home/Trinity:/sbin/nonlogin

Answer: A,B,C,D,E

28.  Which of the following commands can be used to check the errors of the ext2 and ext3 file systems? Each correct answer represents a complete solution. Choose two.

A)    fsck --ext2
B)     fsck.ext3
C)    fsck --ext3
D)    e2fsck

Answer: B,D

29.  Which of the following statements is true about fdisk command?

A)    It is used to build a Linux file system on a device, usually a hard disk partition.
B)     It is used to create, change, delete, or display current partitions on the hard disk.
C)    It is used to check and optionally repair one or more Linux file systems.
D)    It displays or changes thefilesystem label on the ext2 filesystem located on device.

Answer: B

30.  You have recently been appointed as a Network Administrator for Rick International Inc. The company has a Linux-based network. You have to print an important file named secure.txt urgently. You therefore want to know what printers are currently configured on your computer and how you can connect to them. Which of the following commands will you use to accomplish the task?

A)    lpstat -s
B)     lpstat -d
C)    lpr
D)    lpstat -p

Answer: A

31.  You want to uninstall an rpm package foo without verifying its dependencies. Which of the following commands will you use?

A)    rpm --erase --allmatches
B)     rpm -e --allmatches
C)    rpm -e --noscript
D)    rpm -e --nodeps

Answer: D

32.  During the boot process of a Linux computer, which of the following daemons is called after the kernel is loaded?

A)    LPD
B)     TELNETD
C)    INIT
D)    RLOGIND

Answer: C

33.  You work as a Network Administrator for McNeil Inc. The company has a Linux-based network. You have just created a directory named Sales on a file server. David, a Sales Manager, has to use this directory to keep sales reports. David reports that he is unable to save his reports in the directory. When you list the directory using the LS command, you get the following result: drwxr-xrx 2 root root 2048 Jan 2 2006 Sales What is the most likely cause?

A)    The Sales directory is not properly mounted.
B)     David is working on his local computer's login.
C)    The Sales directory has been deleted by accident.
D)    David does not have the Write permission on the directory.

Answer: D

34.  You want to shrink a Logical Volume manager partition named /dev/disk1/lvm from 4GB to 3GB. Which of the following commands can you use to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.

A)    lvreduce
B)     resize2fs
C)    lvsize
D)    reduce2fs

Answer: A,B

35.  John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. Due to some network security reasons, John wants to shut down all network interfaces just before rebooting the Linux server. Which of the following commands will he use to accomplish the task?

A)    init 3
B)     init 6
C)    init 0
D)    shutdown -r now
E)     reboot -i

Answer: E

36.  You work as a Network Administrator for Tech World Inc. The company has a Linux-based network. The permissions on a file named Report are shown below:
rwxr--r- You want to add a sticky bit to the file. Which of the following commands will you use?

A)    chmod 2744 report
B)     chmod 1744 report
C)    chmod 7744 report
D)    chmod 4744 report

Answer: B

37.  Which of the following statements is true about Linux kernel? Each correct answer represents a complete solution. Choose all that apply.

A)    It constitutes the core part of the Linux operating system.
B)     It detects hardware resources and boots up the system.
C)    It allocates memory on behalf of running process.
D)    It does not verify firewall rules

Answer: A,B,C

38.  Which of the following commands is used to make a swap active after creating a new SWAP partition?

A)    mkswap
B)     swapon
C)    fdisk
D)    mkfs

Answer: A

39.  In a Linux computer, which of the following files defines run levels for the processes to be started up during boot up?

A)    /etc/inittab
B)     /etc/syslog.conf
C)    /etc/lilo.conf
D)    /etc/runlevel

Answer: A

40.  You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You have to create user accounts for four new Management Trainees. You also have to create a group named MT and provide membership of this group to the new user accounts. How will you accomplish this?

A)    Use the ADDUSER command to create new user accounts and the MT group. Add the users account to the group.
B)     Use the USERADD command to create new user accounts and the MT group. Add the user accounts to the group.
C)    Use the GROUPADD command to create the MT group. Use the USERADD command to create the user accounts and provide them the membership of the MT group.
D)    Use the ADDGROUP command to create the MT group. Use the ADDUSER command to create the user accounts and provide them the membership of the MT group.

Answer: C

41.  John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to check the errors of an ext2 filesystem. Which of the following commands can John use to accomplish the task? Each correct answer represents a complete solution. Choose all that apply.

A)    e2fsck
B)     fsck
C)    fsck -N
D)    fsck.ext2

Answer: A,B,D

42.  You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You have received an error on your Linux server stating that the superblock is damaged.\ Which of the following commands will you use to resolve the issue?

A)    mount
B)     e2fsck
C)    fsck
D)    mkfs

Answer: B

43.  You work as a Network Administrator for Mac World Inc. The company has a Linux-based network. Your Linux computer turns off because of power outage. The UPS was unable to provide backup power. Which of the following utilities will run automatically during the next boot to scan the hard disk for the possibility of file system damage?

A)    mkfs
B)     mount
C)    scanfs
D)    fsck

Answer: D

44.  Which of the following files is used to view the current status of RAID devices in Linux?
A)    /proc/mdstat
B)     /proc/stat
C)    /proc/meminfo
D)    /proc/mounts

Answer: A

45.  45.Which of the following network protocols are used by the dhclient command to configure the IP addresses of computers on the network?

A)    Thedhclient command does not use any protocol. It statically assigns the address to the network computers.
B)     RARP and DHCP
C)    BOOTP and DHCP
D)    BOOTP and RARP

Answer: C

46.  You work as a system administrator for Tech Perfect Inc. The company has a Linux-based network. You are a root user on the Linux operating system. A user, Jetson, wants to view the speed and the duplex for his Ethernet card. His ethernet card is activated on interface eth0. Which of the following commands can you use to accomplish this task?

A)    ifup eth0
B)     ifconfig eth0
C)    ip link show eth0
D)    sudo ethtool eth0

Answer: D

47.  Which of the following files are used to activate disk quotas on a file system?
Each correct answer represents a complete solution. Choose all that apply.

A)    quotA.group
B)     quotA.user
C)    quotaon
D)    .quotaon

Answer: A,B

48.  You work as a Network Administrator for Perfect Solutions Inc. You are required to configure a hard disk for a Linux workstation. You are using the FDISK utility to configure it. Which of the following options will you use to show all the existing partitions of the hard disk?

A)    n
B)     w
C)    1
D)    p

Answer: D

49.  John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to print a file named print.txt. Which of the following commands can John use to accomplish the task? Each correct answer represents a complete solution. Choose all that apply.

A)    lpr
B)     lprm
C)    lp
D)    a2ps

Answer: A,C

50.  Which of the following run levels is used to boot a Linux computer in graphical user interface (GUI) mode?

A)    3
B)     7
C)    5
D)    9

Answer: C

51.  Which of the following commands are used to remove a package from a Linux system? Each correct answer represents a complete solution. Choose two.

A)    yum -rm packagename
B)     yum erasepackagename
C)    yum -rpackagename
D)    yum removepackagename

Answer: B,D

52.  You work as the Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You are a root user on the Red Hat operating system. You want to view all files with a size of over 50 megabytes on your system. Which of the following commands should you use to accomplish the task?

A)    find size +50M
B)     find -size 50M
C)    find -size -50M
D)    find -size +50M

Answer: D

53.  John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to change the group membership of the file foo to group bar. Which of the following commands will he use to accomplish the task?

A)    chgrp bar foo
B)     chgroup foo bar
C)    chgrp foo bar
D)    chgroup bar foo

Answer: A

54.  Which of the following files lists the file systems to be mounted automatically at startup?

A)    /etc/mtab
B)     /dev/fstab
C)    /etc/fstab
D)    /dev/mtab

Answer: C

55.  Which of the following commands is used to mount file systems?
A)    detach
B)     mount
C)    umount
D)    attach

Answer: B

56.  What command will you use to find the current runlevel of an active Linux session?

A)    runlevel
B)     init
C)    rlevel
D)    ls /etc/runlevel

Answer: A

57.  Which of the following files contains the names and locations of system log files?

A)    /etc/lilo.conf
B)     /usr/syslog.conf
C)    /etc/syslog.conf
D)    /usr/lilo.conf

Answer: C

58.  Which of the following utilities is used to set ACL for files and directories?

A)    enable acl
B)     setacl
C)    setfacl
D)    getfacl

Answer: C

59.  You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. A user complains that his Linux computer gets rebooted occasionally. Which of the following files will provide you the required information to troubleshoot the issue?

A)    /var/log/wtmp
B)     /var/log/dmesg
C)    /var/log/bootmsg
D)    /var/log/messages

Answer: D

60.  You work as a Network Administrator for Net World Inc. The company has a Linux-based network. You want to mount an SMBFS share from a Linux workstation. Which of the following commands can you use to accomplish the task? Each correct answer represents a complete solution. Choose two.

A)    smbmount
B)     smbfsmount
C)    mount smb
D)    mount -tsmbfs

Answer: A,D

61.  You work as a Network Administrator for McNeil Inc. The company has a Linux-based network. You want to know the ownership of the /etc/inittab file. Which of the following commands will you use to accomplish the task?

A)    rpm -e /etc/inittab
B)     rpm -i /etc/inittab
C)    rpm -qa /etc/inittab
D)    rpm -qf /etc/inittab

Answer: D

62.  Which of the following files is used to initialize a computer-wide environment on a Linux computer?

A)    /etc/group
B)     /etc/profile
C)    /etc/syslog.conf
D)    /etc/startup

Answer: B

63.  Which of the following commands helps an administrator to switch a Linux server to different run levels without rebooting the server?

A)    su
B)     cngrl
C)    mount
D)    init

Answer: D

64.  You work as a Network Administrator for World Perfect Inc. The company has a Linux-based network. You have configured a Linux Web server on the network. A user complains that the Web server is not responding to requests. The process list on the server shows multiple instances of the HTTPD process. You are required to stop the Web service. Which of the following commands will you use to resolve the issue?

A)    stophttpd
B)     stopall httpd
C)    kill httpd
D)    killall httpd

Answer: D

65.  John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to get the status of the modules currently loaded in the kernel. Which of the following commands will John use to accomplish his task? Each correct answer represents a complete solution. Choose all that apply.

A)    locate
B)     lsmod
C)    cat /proc/modules
D)    ls /proc

Answer: B,C

66.  Which of the following commands or command flags can be used to list the installed services and their associated runlevels?

A)    config
B)     xconfig
C)    menuconfig
D)    chkconfig

Answer: D

67.  Which of the following commands is used to list all contents of a superblock of a partition?

A)    tune2fs -c
B)     tune2fs -f
C)    tune2fs -l
D)    tune2fs -j

Answer: C

68.  You work as a Network Administrator for Tech World Inc. The company has a Linux-based network. You have installed a video card in your Linux workstation. Which of the following will you require in order to configure X?

A)    etc/videoconf
B)     root/videoconf
C)    root/x11/xf86config
D)    etc/x11/xf86config

Answer: D

69.  John works as a Network Administrator for We-are-Secure Inc. The company uses a Linux server.
John wants to give the following file permissions to the imp.c file:
l Read, Write, and Execute permissions to the owner
l Read and Write permissions to groups
l Read Only permissions to other users
Which of the following commands will John use to accomplish the task?

A)    chmod 765
B)     chmod 777
C)    chmod 712
D)    chmod 764

Answer: D

70.  Which of the following commands can be used to overwrite an existing kernel image file?

A)    mkinitrd -v
B)     mkinitrd --preload
C)    mkinitrd --builtin
D)    mkinitrd -f

Answer: D