SlideShare una empresa de Scribd logo
1 de 31
1/ Consider the following statements:
Statement A: The BSD interface provides a freeware tool that helps to handle the network
load. This is achieved by using the robust network services that the BSD interface
provides through one of its distribution.
Statement B: The System V Interface is a command-line interface that enables you to use
the print services.
Which of the following is true, with respect to the above statements?
a. Statement A is true and statement B is false.
b. Statement A is false and statement B is true.
c. Both, statements A and B, are true.
d. Both, statements A and B, are false.
Correct Answer: -> c

2/ While configuring a NIS client you need to configure the ypbind service. Which of the
following files will you modify to perform this task?
a. /etc/passwd
b. /etc/sysconfig/network
c. /etc/yp.conf
d. /etc/nsswitch.conf
Correct Answer: -> c

3/ Consider the statements:
Statement A: The range of IP addresses that can be assigned to a computer are known as
a dotted quad notation.
Statement B: The number of octets that represent the network Id and host Id in the IP
addresses varies with the size of the network.
Which of the following is true, with respect to the above statements?
a. Statement A is true and statement B is false.
b. Statement A is false and statement B is true.
c. Both, statements A and B, are true.
d. Both, statements A and B, are false.
Correct Answer: -> b

4/ Steve Irvin is working as system administrator at Mountain Marketing Inc. He needs to
assign dynamic IP addresses to all the computers in the organization. For this, he decides
to configure eth1 as the DHCP client. The DHCP server is already present on the network
and the host name is Mountain Marketing. How should Steve proceed to perform the task?
a. After setting the value of the NETWORKING parameter equal to yes in the /etc/sysconfig/
network file, he needs to edit the contents of the /etc/sysconfig/network-scripts/ifcfg-eth1
file, as follows:
DEVICE=eth1
ONBOOT=no
BOOTPROTO=dhcp
b. After setting the value of the NETWORKING parameter equal to yes in the
/etc/sysconfig/network file, he needs to edit the contents of the /etc/sysconfig/network-
scripts/ifcfg-eth1 file, as follows:
DEVICE=eth1
ONBOOT=yes
BOOTPROTO=dhcp
c. After setting the value of the NETWORKING parameter equal to no in the /etc/sysconfig/
network file, he needs to edit the contents of the /etc/sysconfig/network-scripts/ifcfg-eth1
file, as follows:
DEVICE=eth1
ONBOOT=yes
BOOTPROTO=dhcp
d. After setting the value of the NETWORKING parameter equal to no in the /etc/sysconfig/
network file, he needs to edit the contents of the /etc/sysconfig/network-scripts/ifcfg-eth1
file, as follows:
DEVICE=eth1
ONBOOT=no
BOOTPROTO=dhcp
Correct Answer: -> b

5/ Pat Wilkins is working as system administrator at Global Systems Inc. Donna is working
as software developer with the company. She needs to develop some applications on the
Linux platform using Qt 3 and GTK+ 2 graphical toolkits. Therefore, Donna needs Pat to
add fonts to her system. She wants the font to be added such that they are smooth-edged.
How will Pat perform the given task?
a. To add the fonts, Pat needs to perform the following steps:
Copy the new fonts to the directory, /usr/share/fonts/local.
Run the following command for updating the font information cache:
       # fc-cache /usr/share/fonts/local
b. To add the fonts, Pat needs to perform the following steps:
Copy the new fonts to the directory, .fonts/, present in the user's home directory.
Run the following command for updating the font information cache:
       # fc-cache /usr/share/fonts/local
c. To add the fonts, Pat needs to perform the following steps:
Copy the new fonts to the Fontconfig configuration file.
Run the following command for updating the font information cache:
       # fc-cache /usr/share/fonts/local
d. To add the fonts, Pat needs to perform the following steps:
Copy the new fonts to the XFree86 configuration file.
Run the following command for updating the font information cache:
       # fc-cache /usr/share/fonts/local
Correct Answer: -> b

6/ AB Corp is an advertising company, which is working on Linux platform. Steve, the
system administrator, creates a directory, /extrauser. After creating this directory, Steve
needs to create a user named john in the /extrauser directory. Which command should
Steve use to perform the above task?
a. useradd –d /extrauser john
b. useradd –f /extrauser john
c. useradd –g /extrauser john
d. useradd –c /extrauser john
Correct Answer: -> a

7/ Steve Irving is the system administrator in Mastery Mechanics. He needs to install a
Linux server on the network of the organization. He is also required to attach a printer to
the Linux server so that all the employees of various departments can share the network
printer. For this, Steve needs to install Linux on a computer and configure it as a print
server using the CUPS daemon. However, after one week some of the employees start
complaining to Steve that they are not able to access the printer. The employees also
report that when they try to access the printer from their remote Linux system they receive
an error message, which states that the permission to access the printer is denied. What
could be the problem and how should Steve resolve it?
a. Modify the server configuration file /etc/cups/cupsd.conf, which contains the
information required to access the printer.
b. Modify the server configuration file /etc/cups/printers.conf, which contains the
information required to access the printer.
c. Modify the server configuration file /etc/cups/classes.conf, which contains the
information required to access the printer.
d. Modify the server configuration file /etc/cups/client.conf, which contains the information
required to access the printer.
Correct Answer: -> a

8/ Which of the following command performs the same task as the mkfs.ext3 /dev/hdc8
command?
a. mke2fs –l /dev/hdc8
b. mke2fs –j /dev/hdc8
c. mkfs -c ext3 /dev/hdc8
d. mke2fs –i /dev/hdc8
Correct Answer: -> b

9/ You are working as system administrator at Red Sky IT Systems. The organization has
Windows server installed on the network. You have been assigned the task of installing
Linux on all the computers in the network. Which type of installation method can you use
to install Linux in the given scenario?
a. Use an FTP Server
b. Use an NFS Server
c. Use an HTTP Server
d. Use a CD-ROM
Correct Answer: -> a

10/ Mike Womack is working as a project manager with Smart Software Developers. The
network setup of the organization is based on Linux. The organization has a remote
server, where the employees save their files. Don Allen, the system administrator of the
organization has created user accounts for all the employees of the organization. Mike is
working on a project and creates a file, teamproject.txt. Mike wants to assign read
permission to all the other users, for the file, teamproject.txt. However, Mike wants to
remove all the permissions from the other users, for any other file that he creates. Mike
also wants to assign the read and write permissions to his team members, who are
working in his project, for all the files that he will create. Which set of commands will
enable Mike Womack to set the file access permissions according to his requirement?
a. chmod a+r teamproject.txt
umask 037
b. chmod a+r teamproject.txt
umask 017
c. chmod o+r teamproject.txt
umask 017
d. chmod o+r teamproject.txt
umask 037
Correct Answer: -> c

11/ Ken Burton, the system administrator at Global Systems Inc. has joined the
organization after a long leave. During the leave period, Bill was using Ken’s computer.
Bill had replaced the hard disk of Ken’s computer with a new hard disk for personal use.
Ken had installed GRUB on the network server in order to boot the Linux operating
system. While booting his computer, Ken receives an error at Stage 1 of the loading
process and the booting process stops. Which of the following error has caused the
booting process to stop?
a. Floppy Error
b. Hard Disk Error
c. Geom Error
d. Read Error
Correct Answer: -> c

12/ The software department at Supersoft2000 requires Windows 2000 platform to develop
software. Chris, the system administrator wants to install the Windows 2000 Server on one
of the six partitions of an existing Linux server. To install Windows 2000 Server on this
partition, Chris deletes this partition. However, he does not delete the entry of this
partition in the /etc/fstab file and restarts the computer. The following error message is
displayed:

checking file systems
fsck.ext3/dev/hdc6:
The superblock could not be read or doesn’t describe a correct ext2 filesystem. If the
device is valid and it really contains an ext2 filesystem (and not swap or ufs or something
else), then the superblock is corrupt, and you might try running e2fsck with an alternate
superblock:
e2fsck –b 8193 <device>
: Bad magic number in super-block while trying to open /dev/hdc6
                        [FAILED]
* * * An error occurred during the file system check.
* * * Dropping you to a shell; the system will reboot
* * * when you leave the shell.
Give root password for maintenance
(or type Control-D to Continue):
How can Chris troubleshoot the problem?
a. Start the system in the rescue mode and delete the entry of the deleted partition in the
/etc/fstab file.
b. Start the system in the single-user mode and change the root password.
c. Start the system in the single-user mode and delete the entry of the deleted partition in
the /etc/fstab file.
d. Start the system in the rescue mode and change the root password.
Correct Answer: -> a

13/ What is the configuration requirements of the desktops used for financial services
enterprise
a. Following are the configuration requirements of the desktops used in call centres and
help desks:
Thin-client computers
Voice Over IP integration
Computer telephony integration
b. Following are the configuration requirements of the desktops used in banks and help
desks:
High storage
High security requirement
c. Following are the configuration requirements of the desktops used in banks and help
desks:
Thick client computers
Office applications
Standard quality printing device
d. Following are the configuration requirements of the desktops used in banks and help
desks:
High storage capacity
Fast processing capabilities
Correct Answer: -> b

14/ Tom Davidson is working, as a system administrator at Mountain Marketing Inc. Tom
has been assigned the task of sending the high priority jobs for printing first. Which
command will Tom execute to perform the task?
a. lpc
b. lpstat
c. lp
d. lpadmin
Correct Answer: -> c

15/ Steve is a system administrator at Deez Inc. He needs to load a module into the kernel.
He also wants to specify that a kernel module name should be provided explicitly in the
command. Which option of the insmod command will Steve use to perform the task?
a. insmod -o
b. insmod -s
c. insmod -p
d. insmod -f
Correct Answer: -> a

16/ Jim Lewis, the system administrator at Deez Inc, has installed Linux on a computer.
Jim wants to collect the information about the parameters that are passed to the kernel
during the start up of the kernel. Which file in the /proc/ directory should Jim use to
perform this task?
a. /proc/apm
b. /proc/cmdline
c. /proc/cpuinfo
d. /proc/dma
Correct Answer: -> b

17/ You are the system administrator at Deez Inc. You need to transfer the data from a
source computer over a network to the destination computer over another network. For
this, packet routing is required from one network to the other. Which feature of Linux
kernel should you use for the above task?
a. Router
b. Routing table
c. Default route
d. IP forwarding
Correct Answer: -> d

18/ Pat configures the dhcpcd daemon and starts his computer. He notices that the IP
address is not assigned to his computer. Pat verifies that the dhcpcd daemon is running.
Which command should Pat use for the IP address assignment?
a. Pat needs to execute the ifconfig command.
b. Pat needs to execute the dhcpcd command with the –f option.
c. Pat needs to check all the DHCP servers on the network
d. Pat needs to execute the route command.
Correct Answer: -> b

19/ Steve Irvin is working as system administrator at Super Software2002. The domain
administrator of the organization wants Steve to provide fonts to the X clients. He also
wants Steve to add fonts such that they do not provide support for advanced anti-aliasing
feature. Identify the correct sequence of steps that Steve needs to perform to accomplish
the given task?
a. To add fonts, Steve needs to perform the following steps:
Create a directory, /usr/share/fonts/local/, if it does not already exist.
Change to the /usr/share/fonts/local directory.
Update the font information of the system.
Copy the new font files to the /usr/share/fonts/local directory.
Execute the chkfontpath command to add the directory, /usr/share/fonts/local/ to the Xfs
FontPath as root directory.
Restart Xfs so that the X clients can use the new fonts.
b. To add fonts, Steve needs to perform the following steps:
Create a directory, /usr/share/fonts/local/, if it does not already exist.
Add the directory created in the first step to the Xfs FontPath as root directory.
Copy the new font files to the /usr/share/fonts/local directory.
Update the font information of the system.
Change to the /usr/share/fonts/local directory.
Restart Xfs so that the X clients can use the new fonts.
c. To add fonts, Steve needs to perform the following steps:
Create a directory, /usr/share/fonts/local/, if it does not already exist.
Copy the new font files to the /usr/share/fonts/local directory.
Change to the /usr/share/fonts/local directory.
Update the font information of the system.
Execute the chkfontpath command to add the directory, /usr/share/fonts/local/ to the Xfs
FontPath as root directory.
Restart Xfs so that the X clients can use the new fonts.
d. To add fonts, Steve needs to perform the following steps:
Create a directory, /usr/share/fonts/local/, if it does not already exist.
Add the directory created in the first step to the Xfs FontPath as root directory.
Change to the /usr/share/fonts/local directory.
Copy the new font files to the /usr/share/fonts/local directory.
Update the font information of the system.
Restart Xfs so that the X clients can use the new fonts.
Correct Answer: -> c

20/ Steve is working as a system administrator at the Smart Software Developers. The
company has 50 client computers and one Linux server on the network. Steve updates the
Linux server regularly by installing Linux patches. He checks the boot directory each time,
to obtain the kernel information and to make sure that the Linux patches are compatible
with the kernel version. To avoid searching the boot directory for obtaining the kernel
information, Steve wants to display this information at the login prompt. How should Steve
display the information on the login prompt?
a. Edit the rc.sysinit file to reflect the kernel information at the login prompt
b. Edit the rc.serial to reflect the kernel information at the login prompt
c. Edit the rc.local to reflect the kernel information at the login prompt
d. Edit the rc.news to reflect the kernel information at the login prompt
Correct Answer: -> c

21/ Jim Lewis a system administrator at Deez Inc. is working on Linux platform. All the
employees of the application development department are working on critical projects.
Therefore, regular backup is required to save the data of the developers. Jim is assigned
the task of taking weekly backup of data. After taking the backup of files, Jim wants to
display the list of files, which have been backed up. Which of the following command
should Jim execute to display the list of files?
a. Execute the tar –x command
b. Execute the tar –c command
c. Execute the tar –v command
d. Execute the tar –p command
Correct Answer: -> c

22/ Steve installs kernel of version 2.2 on his computer. After the installation, he notices
that one of the devices is not supported by this version of the kernel. Steve upgrades the
kernel from version 2.2 to 2.4 to get support for that device. However, after installation of
the kernel of version 2.d. Steve is unable reboot the computer. Why is Jim not able to
boot the computer and how should he solve the problem?
a. The kernel of version 2.4 has not overwritten the kernel of version 2.2.
Jim needs to boot the system in the single-user mode by using a floppy disk or a CD-ROM
to resolve the problem.
b. The kernel of version 2.4 has not overwritten the kernel of version 2.b. but it is copied
in the /root directory.
Jim needs to boot the system in the rescue mode by using a floppy disk or a CD-ROM to
resolve the problem.
c. The kernel of version 2.4 has overwritten the kernel of version 2.2 and the boot loader
configuration file is not updated accordingly.
Jim needs to boot the system in the rescue mode by using a floppy disk or a CD-ROM to
resolve the problem.
d. The kernel of version 2.4 has not overwritten the kernel of version 2.2 and the newly
compiled kernel, bzImage, is copied in the /boot directory and the boot loader
configuration file is updated accordingly.
Jim needs to boot the system in the multiuser mode by using a floppy disk or a CD-ROM
to resolve the problem.
Correct Answer: -> c

23/ Jim Lewis wants to create a filesystem so that he can access other filesystems from a
remote computer containing Linux operating system. Which type of filesystem should Jim
create?
a. ReiserFS
b. Journaled File System
c. NFS
d. SMBFS
Correct Answer: -> c

24/ Steve Irving is working as a system administrator at Super Graphics. A new user,
Michael joins Super Graphics as a software developer. Steve needs to share a filesystem
to enable Michael to access data from his computer. Steve has to opt for the type of
filesystem, which would enable Michael to access the filesystem from a remote computer
running on Windows NT Server operating system. Which type of filesystem can Steve
create?
a. SMBFS
b. NFS
c. JFS
d. ReiserFS
Correct Answer: -> a

25/ David Johnson is working as a system administrator with Super Graphics. The
employees of the organization use OpenOffice.Draw package of Linux to create graphical
designs. Jerry Smith, working as an audio-visual expert observes that his computer does
not produce good quality sound. Therefore, she asks David to change the soundcard of
her computer. David inserts a new sound card on Jerry's computer and downloads the
module for the sound card, through the Internet from the vendor's Web site. Now, David
wants to install the module for the sound card in the kernel of Jerry's computer. However,
David wants to load the module for the sound card in the kernel even if the current kernel
version installed in the computer and the version of the kernel for which the module is
created are not same. Which command should David use to perform the given task?
a. insmod -o [module_name]
b. insmod –s [module_name]
c. insmod -f [module_name]
d. insmod -p [module_name]
Correct Answer: -> c

26/ John requires some data from a file stored in a directory on a floppy disk. His
computer has Linux operating system. After finishing his work, John unmounts the floppy
disk. For this, he executes the umount command as shown below:
# umount /dev/fd0
However, the system displays an error message, “Device is busy”. Which of the following
steps will help John identify and solve the problem?
a. Determine the current directory. If the current directory is located on the floppy disk,
change to a directory that is not located on the floppy disk. Unmount the floppy disk
b. Determine the current directory. Execute the rm –r command to delete the directory on
the floppy. Unmount the floppy disk
c. Determine the current directory. Delete the file on the floppy. Unmount the floppy disk.
d. Determine the current directory. Execute the rm --r command to delete the directory on
the floppy. Unmount the floppy disk
Correct Answer: -> a

27/ Debbie Howe, an employee of SuperGraphics needs to access the file containing the
daily schedule information of the project on which he is working. This file is located on the
computer of Ken Bruton, the team leader at the company.
Ken had the dual operating system, Windows 2000 and Linux installed on his computer.
The file was created on Windows 2000. As the Windows 2000 Server has crashed on Ken’s
computer, he boots the computer using Linux. Ken tries to mount the file from Windows
2000 to Linux using the mount command. The system generates an error displaying,
‘Virtual File Allocation table (VFAT) file system is not supported’. Ken informs the system
administrator about the problem. What could be the cause of the error?
a. Ken does not have the read permissions for the files, which he wants to access.
b. Linux does not have the necessary modules required to support the Windows
filesystems.
c. The file that Ken is trying to access is not exported by the system in which it is stored.
d. Another filesystem is mounted on the same mount point as that of the filesystem, which
Ken wants to access.
Correct Answer: -> b

28/ You are working as a system administrator at Global Systems Inc. You need to create
an alternate file hierarchy in the /etc/sysconfig/networking directory on the server, which
is using ISDN network interface. Which command will you run to perform this task?
a. ifconfig
b. neat
c. mii-tool
d. netconfig
Correct Answer: -> b

29/ Chris is working as an assistant system administrator at Multi Store Inc. Chris finds
that Sendmail and IMAP services are not functioning properly. Which of the following log
files should Chris check to find out the errors that are logged?
a. Check the entries in the /var/log/message log file.
b. Check the entries in the /var/log/maillog log file.
c. Check the entries in the /var/log/htpd log file.
d. Check the entries in the /var/log/samba log file.
Correct Answer: -> b

30/ Which of the following files contain the information about the system memory that is
currently in use?
a. /system/meminfo
b. /proc/memoryinfo
c. /proc/cpuinfo
d. /proc/meminfo
Correct Answer: -> d

31/ Pat Greene is working as system administrator at Safest Software Inc. Pat is required
to monitor the systems of the company to administer the network resources efficiently in
the Linux environment. For this, Pat needs information about the processes, memory,
paging, block IO, traps, and CPU activity of the computers. In addition, he also needs to
display an updated report on the virtual memory statistics. How should Pat accomplish the
given task?
a. He needs to run the following command:
# vmstat <delay>
b. He needs to run the following command:
# iostat –v
c. He needs to run the following command:
# iostat –d
d. He needs to run the following command:
# vmstat –n
Correct Answer: -> a

32/ Ken Burton is working as system administrator at Indestructible Boxes Inc. Peter, an
employee of the company complains to Ken about the slow processing speed of his
computer. For this, Ken decides to create a swap space named /dev/hdc9 on his computer
to increase the available amount of RAM. After creating and activating the swap space,
Ken restarts the computer. Ken notices that processing speed of the computer has still
not increased. What task should Ken perform to solve the given problem?
a. Ken needs to edit the /etc/fstab file, and add the following entry to activate the swap
space, as follows:
/dev/hdc9      swap         swap defaults        00
b. Ken needs to edit the /etc/fstab file, and the following entry to activate the swap space,
as follows:
/dev/hdc9      swap         ext3 defaults       00
c. Ken needs to edit the /etc/fstab file, and add the following entry to activate the swap
space, as follows:
/dev/hdc9      swap         ext3 defaults       11
d. Ken needs to edit the /etc/fstab file, and add the following entry to activate the swap
space, as follows:
/dev/hdc9      swap         swap defaults        11
Correct Answer: -> a

33/ Steve is working as a system administrator at Smart Software Developers. The
company has 50 client computers and one Linux server on the network. The company has
opened a new branch at Houston for the Finance department. The management asks Steve
to create a file system that prevents the data loss in case of a power failure or a system
breakdown. Therefore, Steve creates the ext3 filesystem on the /dev/hdc8 partition of the
Linux server. After a few months, Steve decides to resize the partition due to some disk
space constraints. Steve uses the resize2fs disk utility to resize the partition. However,
Steve fails to resize the partition. What could be the cause of the problem?
a. Steve has not updated the /etc/fstab file to change the ext3 filesystem to the ext2
filesystem.
b. The ext3 filesystem cannot be converted into ext2 filesystem so resize2fs utility cannot
be used.
c. The ext3 supports only tune2fs command to resize the partition.
d. The ext3 file system does not support the resize2fs disk utility.
Correct Answer: -> d

34/ Debbie Howe is working as a system administrator with True Travel Services. The
organization uses a network printer across all departments. However, recently the printer
is not working properly. Debbie has been communicated reports that on accessing the
printer, it displays an error message:
bash: /dev/lp0: Permission denied.
How should Debbie troubleshoot the problem?
a. Debbie needs to provide access control to enable the users of the remote hosts to print
to the printer by performing the following steps:
Open the /etc/hosts file.
Add the IP addresses of the remote hosts.
Stop and restart the print service.
b. Debbie needs to provide access control to enable the users of the remote hosts to print
to the printer by performing the following steps:
Open the /etc/host.deny file.
Add the IP addresses of the remote hosts.
Stop and restart the print service.
c. Debbie needs to provide access control to enable the users of the remote hosts to print
to the printer by performing the following steps:
Open the /etc/printcap file.
Add the IP addresses of the remote hosts.
Stop and restart the print service.
d. Debbie needs to provide access control to enable the users of the remote hosts to print
to the printer by performing the following steps:
Open the /etc/hosts.equiv file.
Add the IP addresses of the remote hosts.
Stop and restart the print service.
Correct Answer: -> d

35/ Tom Wilkins is the system administrator at Red Sky IT Systems that uses Linux for all
business purposes. Tom has implemented a Linux based LAN in the organization and has
installed a print server on the LAN. He has also installed the LPRng service on the print
server. The employees of all the departments use the print server to print their documents.
They submit their print jobs using the lpr command. However, the employees of the
Accounts department complain that the printer is taking a long time to print the
documents. The employees request Tom to restrict the print commands given by the other
departments until the Accounts documents have been printed. How should Tom resolve
the problem?
a. Execute the lpc –disable command.
b. Edit the /etc/lpd.conf file.
c. Execute the lpc – abort command
d. Edit the /etc/printcap file.
Correct Answer: -> c

36/ Steve is assigned the task of installing Linux on a computer on which Windows 98 is
already installed. He does not have the bootable Linux CD-ROM. Which type of installation
method would Steve prefer to install Linux?
a. Use an FTP Server
b. Use the Hard Drive
c. Use an HTTP Server
d. Use a CD-ROM
Correct Answer: -> b

37/ John is recently recruited as a software developer in Smart Software Developers. He
has been assigned the task of developing an accounting application. For this, John
requires accounting package software for his computer. Chris, the system administrator at
Smart Software Developers, has been assigned the task for installing the software on
Chris’s computer. For this, Chris wants information about the directory that contains
initialization scripts related to the installed software packages. Which directory will Chris
use to perform this task?
a. /etc/profile.d
b. /etc/bashrc
c. ~/.bash_profile
d. /etc/profile
Correct Answer: -> a

38/ Jim Lewis is working as a system administrator with New Tech Books. The network
setup of the organization is based on Linux. Jim has recently installed and configured a
Linux server at a remote location. He has also created user accounts for all the employees
of the organization on the remote server. Diane Frye, the head of the Sales department is
creating the annual sales report of the organization. Diane has created a folder,
Sales_Report, in her home directory and placed all the files related to the annual sales
report of the organization in that folder. Diane has also assigned all the access permission
to the files that she has created and asked the members of her department to access the
files from the Sales_Report folder. After one week, Diane finds that someone has removed
some files from the Sales_Report folder. However, Diane does not want to change the
access permission on the files. Therefore, Diane reports the matter to Jim and asks Jim to
set such permissions on the Sales_Report folder so that no other users except her or
system administrator, can remove any files from the folder. What should Jim do to perform
the task?
a. Set setUID bit permission on the Sales_Report directory by using the command, chown
u+s Sales_Report.
b. Enable sticky bit permission on the Sales_Report directory by using the command,
chmod +t Sales_Report.
c. Set setGID bit permission on the Sales_Report directory by using the command, chown
g+s Sales_Report.
d. Remove setUID bit permission on the Sales_Report directory by using the command,
chmod u–s Sales_Report.
Correct Answer: -> b

39/ Tom Wilkins works as a network administrator at Supersoft2000. The employees of the
organization use Linux platform to work on their projects. Tom installs DHCP server on the
network to assign IP addresses to the client computers. Jim Lewis, an employee of
Supersoft2000 needs to check the IP addresses assigned to his computer. For this, Jim
executes the ifconfig command. However, the command does not show the IP addresses
of his computer. Jim informs Tom about the problem and asks him to resolve it. How can
Tom troubleshoot the problem?
a. Configure the /etc/dhcpd.conf file and restart dhcpcd daemon.
b. Execute the command,
route add –host 255.255.255.255 dev eth0
c. Execute the dhcpcd command with the –f option.
d. Check all the DHCP servers on the network, including any Microsoft Windows DHCP
server that might have assigned the IP addresses to Jim’s computers.
Correct Answer: -> a

40/ Corrine Wallace is working as an IT consultant at Blue Moon Computers. The
organization is planning to implement an IT infrastructure. The management of the
organization notices that organization requires servers at every level of business
operations to implement IT infrastructure. Therefore, organization assigns Corrine the task
of planning server solutions for business operations, such as caching services and proxy
services. The organization also asks Corrine to plan server solutions for domain naming,
directory, firewall and security services. In addition, the organization asks Corrine to
implement servers that can effectively provide services to end users in spite of the heavy
load on it. Which servers Corrine need to implement to perform the task?
a. Corrine needs to implement web and infrastructure servers. In addition, Corrine needs
to implement high-end servers, such as OLTP Med and BI servers.
b. Corrine needs to implement workgroup and infrastructure servers.
c. Corrine needs to implement web and workgroup servers.
d. Corrine needs to implement web and infrastructure servers.
Correct Answer: -> a
41/ Pat Wilkins is working as an assistant system administrator at New Tech Bookstore.
Pat wants to check whether IP forwarding is disabled or enabled on the Linux server.
Which command will Pat execute to perform the given task?
a. # ls /proc/sys/net/ipv4
b. # vi /etc/sysctl.conf
c. # echo "1" > /proc/sys/net/ipv4/ip_forward
d. # cat /proc/sys/net/ipv4/ip_forward
Correct Answer: -> d

42/ Lee is a system administrator at Countrywide Markets. John a software developer
wants a package to be installed on his computer. John asks Lee to install the required
package on his computer. However, when Lee starts installing the package, the system
displays a message that the package is already installed. Which command can Lee use to
upgrade the package?
a. rpm -e
b. rpm -h
c. rpm -I
d. rpm -F
Correct Answer: -> d

43/ Bob is working, as an assistant system administrator at Global Systems Inc. Bob
wants to invoke the services that a kernel provides for various processes running on a
computer, such as reading the contents of a file. Which kernel module, Bob should use to
perform the above task?
a. Device driver
b. System call
c. Network Driver
d. Executable Interpreter
Correct Answer: -> b

44/ Larry Williams is working as network administrator at Smart Software Developers.
Recently, the organization has been facing frequent power failures. To protect the data,
the domain administrator of the organization wants Larry to backups all the servers of the
company daily at 6:00 P.M. The domain administrator wants Larry to automate the
process. How should Larry automate the process of backing up?
a. Use /etc/at.allow configuration file
b. Use /etc/crontab file configuration file
c. Use /etc/cron.daily configuration file
d. Use /etc/at.deny files configuration file
Correct Answer: -> b

45/ Donna Johnson is working as system administrator at New Tech Books. The
employees of the New Tech Books have the ext2 filesystem implemented on the partition /
dev/hdc8 on their systems. They need to access NFS server for sharing and storing their
data. However, NFS server has the ext3 filesystem configured on it. Therefore, Steve
needs to make the ext2 filesystem compatible with the ext3 fileystem. How should Donna
troubleshoot the given problem?
a. To convert the ext2 filesystem into the ext3 filesystem, Donna needs to perform the
following steps:
 1. # /sbin/tune2fs -j /dev/hdc8 (
 2. # /sbin/e2fsck -y /dev/hdc8 (
 3. Mount the ext3 filesystem if there are no errors by using _      the following
command:
     # mount –t ext3 /dev/hdc8 /mnt/NewPartition (
 4. Update the filesystem type option in the /etc/fstab file to _  automount the
filesystem after the system is restarted.
b. To convert the ext2 filesystem into the ext3 filesystem, Donna needs to perform the
following steps:
 1. # /sbin/e2fsck -y /dev/hdc8 (
 2. # /sbin/tune2fs -j /dev/hdc8 (
 3. Mount the ext3 filesystem if there are no errors by using _       the following
command:
      # mount –t ext3 /dev/hdc8 /mnt/NewPartition (
 4. Update the filesystem type option in the /etc/fstab file to _     automount the
filesystem after the system is restarted.
c. To convert the ext2 filesystem into the ext3 filesystem, Donna needs to perform the
following steps:
 1. # /sbin/e2fsck -y /dev/hdc8 (
 2. # /sbin/tune2fs -j /dev/hdc8 (
 3. Update the filesystem type option in the /etc/fstab file to _     automount the
filesystem after the system is restarted.
 4. Log on as the root user and mount the partition, which _         contains the ext2
filesystem as follows:
        # mount /dev/hdc8 (
d. To convert the ext2 filesystem into the ext3 filesystem, Donna needs to perform the
following steps:
 1. # /sbin/e2fsck -y /dev/hdc8 (
 2. # /sbin/tune2fs -j /dev/hdc8 (
 3. Update the filesystem type option in the /etc/fstab file to _  automount the
filesystem after the system is restarted.
 4. Log on as the root user and unmount the partition, which _          contains the ext2
filesystem as follows:
        # umount /dev/hdc8 (
Correct Answer: -> a

46/ Safest Software Inc. is a leading software export organization that has opened a new
branch office at Singapore to expand their business in Asia Pacific. The branch office has
150 client computers and three servers on their network based on Linux operating system.
Steve is appointed as a system administrator at the branch office. All the clients are
working in the desired runlevel to support the applications used by the organization. The
organization has to export software that requires the multimedia-enabled computers. The
software needs to be tested on Linux computers before exporting it. John, a testing
engineer is assigned the task of testing the multimedia application, but he is unable to
open that application. John asks Steve to solve the problem. How should Steve solve the
problem?
a. Steve should set the default runlevel to 1 to start the Linux server in graphical mode.
b. Steve should set the default runlevel to 5 to start the Linux server in graphical mode.
c. Steve should set the default runlevel to 6 to start the Linux server in graphical mode.
d. Steve should set the default runlevel to 4 to start the Linux server in graphical mode.
Correct Answer: -> b

47/ Christine Turner needs to send an important file to Mary Peterson, who is working at
the head office. For this, the system administrator needs to configure a route so that the
file can be transferred to Mary’s computer, with the IP address 192.165.0.150
However, on executing the command, the computer displays an error stating gbroadcast:
Unknown host.
How should the system administrator troubleshoot the error?
a. The system administrator needs to add the name of the host in the /etc/hosts file:
192.168.0.130 gbroadcast
Next, Christine needs to execute the following command:
# route add –net gbroadcast dev eth0
b. The system administrator needs to add the name of the host in the /etc/hosts file:
192.165.0.150 gbroadcast
Next, Christine needs to execute the following command:
# route add –net gbroadcast dev eth0
c. The system administrator needs to add the name of the host in the /etc/hosts file:
192.165.0.150 broadcast
Next, Christine needs to execute the following command:
# route add –host gbroadcast dev eth0
d. The system administrator needs to add the name of the host in the /etc/hosts file:
192.165.0.150 gbroadcast
Next, Christine needs to execute the following command again:
# route add –host gbroadcast dev eth0 (
Correct Answer: -> d

48/ Jim Lewis is the system administrator with Desktop Computers. He has configured a
Linux based LAN in the organization and has installed a print server on the network. Jim
has configured both LPRng and CUPS services on the print server to manage multiple
packages that provide the same service. He needs to add a group of alternatives to the
system and specify the name of a master link. For this, Jim executes the alternatives link --
set command, and observes that the command is not working. What could be the problem
and what should Jim do to resolve the problem?
a. The set option is used only to set alternatives and its links. Jim needs to execute the
alternatives name --install command to perform the required tasks.
b. The set option is used only to set alternatives and its links. Jim needs to execute the
alternatives link --install command to perform the required tasks.
c. The link option is incorrect. Jim needs to execute the alternatives name –set command
to perform the required tasks.
d. The specified command is incorrect. Jim needs to execute the alternatives name
--display command to perform the required tasks.
Correct Answer: -> a

49/ Pat Greene is working as a system administrator at IBG Inc. Pat has created a partition
in his system to develop and save the application. The maximum file size of 2 GB is
sufficient for Pat to perform his work. The filesystem that he will be using, stores the state
of the filesystem in the superblock, and uses this state to verify whether the filesystem
contains any errors. Pat needs journaling feature in the filesystem to ensure no data is lost
due to system failure. Therefore, Pat wants to create the filesystem that supports the
above features. Which filesystem can Pat use to develop the application?
a. ext2Fs
b. ext3
c. JFS
d. SMBFS
Correct Answer: -> b

50/ Smart Solutions Corp is recruiting new employees to expand their customer base. A
new employee, Michael joins the organization and is assigned a project that was earlier
being handled by Susan. Steve, the system administrator, has changed the ownership of
files that contains the required information and set the particular option so that no error
message is displayed, if the specified file does not exist at user end. Which command
should Steve use for the task?
a. chown –R
b. chown -f
c. chown -v
d. chown -c
Correct Answer: -> b
51/ Martina is working as a system administrator in PQR Corp. Martina finds that some of
the computers are displaying an error message, lp: error –no default destination available,
while giving the command for printing the documents. Which task should Martina perform
to troubleshoot this problem?
a. Remove the paper that is stuck in the printer.
b. Insert fresh paper in the tray.
c. Switch on the power supply after checking that the plug is in the socket.
d. Install and configure the printer.
Correct Answer: -> d

52/ Donna Bard, a system administrator with Countryside Markets, uses Linux as the
operating system. She wants to view the group ID of a customer named Mike Womack.
When Donna executes the command, grep Mike Womack /etc/passwd, the system raises
an error stating “grep: Wall: no such file or directory” before displaying the required
information. How should Donna troubleshoot the problem?
a. # grep ‘Mike Womack’ /etc/passwd
b. # grep MikeWommack /etc/passwd
c. # grep "Mike Womack" /etc/passwd
d. # grep `Mike Womack` /etc/passwd
Correct Answer: -> c

53/ Donna Bard works as a network administrator at Countryside Markets. All the
employees of the organization work on Linux platform. Various DHCP servers, which
assign IP addresses to the computers, are installed on the network. Donna configures the
dhcpcd daemon, which broadcasts the request to the DHCP servers to get an IP address.
After configuring the daemon, Donna starts her computer. However, Donna notices that
the IP address is not assigned to her computer. Donna verifies whether the dhcpcd
daemon is running properly or not. She finds that the dhcpcd daemon is running fine. How
can Donna troubleshoot the problem?
a. Execute the command:
route add –host 255.255.255.255 dev eth0
b. Check whether the information in the /etc/dhcpd.conf file is correct.
c. Execute the dhcpcd command with the –r option.
d. Execute the dhcpcd command with the –f option.
Correct Answer: -> d

54/ Nancy Jones is working as a system administrator with Red Sky IT Systems. The
network setup of the organization is based on Linux. All employees of the organization
save data in their respective home directory on the Linux server. The management of the
organization has assigned Nancy the task of taking the backup. Therefore, Nancy
configures a central backup server with multiple backup tape drives. Nancy also wants to
create the backup from all the disks listed in the disklist file in the backup server using a
single command. In addition, Nancy wants the backup server to send an e-mail message
reporting the files that failed to be backed up and the files that were successfully backed
up after creating the backup. Which backup utility should Nancy implement to perform the
required task?
a. Nancy should use the Amanda utility.
b. Nancy should use the Veritas utility.
c. Nancy should use the dump/restore utilities.
d. Nancy should use the cpio utility.
Correct Answer: -> a

55/ Donna is an in-house network administrator at Multi Marketing Inc. Donna needs to
store the print queue definitions manually, instead of using the redhat-config-printer tool.
Which configuration file will Donna use to perform this task?
a. /etc/printcap
b. /etc/lpd.conf
c. /etc/lpd.perms
d. /etc/printcap.local
Correct Answer: -> d

56/ Consider the following statements:
Statement A: You can assign more then one IP address to an NIC.
Statement B: You need to create a new configuration file for each NIC that is installed on
your computer.
Which of the following is true, with respect to the above statements?
a. Statement A is true and statement B is false.
b. Statement A is false and statement B is true.
c. Both, statements A and B, are true.
d. Both, statements A and B, are false.
Correct Answer: -> c

57/ Consider the statements:
Statement A: The passwords should be easy to decipher.
Statement B: The passwords should be of adequate length.
Which of the following is true, with respect to the above statements?
a. Statement A is true and statement B is false.
b. Statement A is false and statement B is true.
c. Both, statements A and B, are true.
d. Both, statements A and B, are false.
Correct Answer: -> b

58/ You are the assistant system administrator at Deez Inc. and are required to set a
default printer, HP DeskJet on the Sales Manager’s computer. The printer should be
configured to queue the print jobs. Which command should you use for the above task?
a. lpadmin
b. lpstat
c. lp
d. lpr
Correct Answer: -> a

59/ Peter Irvin is the domain administrator at Mountain Marketing Inc. He has scheduled
tasks such as, executing scripts, backing up data and executing the echo command on his
computer, such that they are performed automatically at different timings in a day. During
the day, how should Peter view the list of the jobs that are yet to be executed?
a. atq command
b. at command
c. cron command
d. atrm command
Correct Answer: -> a

60/ Larry Williams is working as domain administrator at Technology Systems. To
automate the installation process, Larry has installed Linux on his computer with the help
of the kickstart file. Larry needs to install three group packages ServerSystem,
WindowsSystem, and WindowsSoftware and two individual packages ClientSystem and
MasterSystem on his computer. How should Larry perform the task?
a. Larry needs to make the following entries in the kickstart file:
### Package Installation
%package
@ServerSystem
@WindowsSystem
@WindowsSoftware
ClientSystem
MasterSystem
b. Larry needs to make the following entries in the kickstart file:
### Package Installation
%package
@ ServerSystem
WindowsSystem
WindowsSoftware
ClientSystem
MasterSystem
c. He needs to make the following entries in the kickstart file:
### Package Installation
%package
@ ClientSystem
@ MasterSystem
ServerSystem
WindowsSystem
WindowsSoftware
d. He needs to make the following entries in the kickstart file:
### Package Installation
%package
@ ServerSystem
@ WindowsSystem
@ WindowsSoftware
ClientSystem
MasterSystem
Correct Answer: -> d

61/ Steve Irving is working as the system administrator at Global Systems Inc., which uses
Linux for all business purposes. The organization is working on a project, which requires
the team leaders to frequently communicate with each other and with the client. The e-mail
utility is not supported efficiently by the existing operating system. Therefore, the
management has asked Steve to upgrade the operating system installed on the computers
of all the team leaders. Steve has decided to perform this task automatically using a
kickstart file.
Steve logs on to Jim, a team leader’s system and executes the command cp anaconda –
ks.cfg ks.cfg to create a kickstart file. However, the command is not working. What is the
problem and how can Steve solve it?
a. The specified root directory is incorrect. Steve should use the name, ethereal, as the
root directory.
b. The kickstart command can be created only by a root user. Steve needs to log on as the
root user and execute the specified command.
c. The command executed is incorrect. Steve needs to use the Kickstart Configurator
utility to create the kickstart file.
d. The order of specifying the kickstart sections is incorrect. The order of kickstart
sections should be command, %pre, %package, and %post.
Correct Answer: -> b

62/ The project team of the Software Development department is not able to save their
work on the server. When they try to save their work on the server, it shows an error
message that there is no space on the hard disk. Therefore, David, the system
administrator resizes a partition on the hard disk of the server, which has been allocated
for user data. After resizing the partition, when David tries to boot the server he finds that
the boot partition fails to mount the boot partition.
What is the reason that the boot partition, on the server, fails to mount the boot partition
and how should David resolve the error?
a. The problem occurs because the partition number of the boot partition, /, is changed.
To resolve the error, David needs to switch to the single-user mode and change the entry
corresponding to the path of the / partition in the /etc/fstab file.
b. The problem occurs because the partition number of the boot partition, /, is changed.
To resolve the error, David needs to switch to the emergency mode and change the entry
corresponding to the path of the / partition in the /etc/fstab file.
c. The problem occurs because the partition number of the boot partition, /, is changed.
To resolve the error, David needs to reboot the system in a runlevel and change the entry
corresponding to the path of the / partition in the /etc/fstab file.
d. The problem occurs because the partition number of the boot partition, /, is changed.
To resolve the error, David needs to boot the system in the rescue mode and change the
entry corresponding to the path of the / partition in the /etc/fstab file.
Correct Answer: -> d

63/ Steve is the system administrator with Red Sky IT Systems. The management of the
organization has assigned Steve the task of providing print service to some of the
employees of the organization. The employees of the IT department and the Accounts
department, at Red Sky IT Systems, want to install printers, locally. Steve decides to install
the various printers and configure them using the CUPS daemon to fulfill the requirements
of both the departments. Steve also wants to record the information about all the local
available printers in both the departments and the new jobs given to the printers. How can
Steve perform these tasks?
a. Steve can record the information by using the lpstat command, editing the
/etc/printcap.local file and then executing the lpadmin command.
b. Steve can record the information by using the lpstat command and editing the Info
parameter and the Accepting parameter in the /etc/cups/printers.conf file.
c. Steve can record the information by using the lpstat command and configuring the
LPRng service.
d. Steve can record the information by using the lpstat command and editing the Info
parameter and the Accepting parameter in the /etc/cups/cupsd.conf file.
Correct Answer: -> b

64/ Consider the statements:
Statement A: A parallel port sends one bit of information at a time.
Statement B: A serial port sends eight bits of information at a time.
Which of the following statements is correct?
a. Statement A is true and statement B is false.
b. Statement A is false and statement B is true.
c. Both, statements A and B, are true.
d. Both, statements A and B, are false.
Correct Answer: -> d

65/ Steve works, as a system administrator at Global Systems Inc. Steve needs to store the
data of all the employees centrally at the Linux server. He also wants to ensure that no
data is duplicated across the hard disks. For this, Steve decides to divide the data into
strips to store the data across all the hard disks in an array. Which RAID configuration
does Steve use for the preceding requirements?
a. Linear RAID
b. Level 0
c. Level 1
d. Level 5
Correct Answer: -> b

66/ Chris, the system administrator of the company adds a route from his computer to
John’s computer by executing the route add –host 192.168.16.66 dev eth0 command.
Chris’s computer raises an error, 192.168.16.66: Unknown host. Which of the following
task should Chris perform to solve this problem?
a. Add the name of the host in the /etc/hosts file of the computer.
b. Check all the DHCP servers in the network.
c. Add the dhcpcd daemon to the boot-up script, (/etc/sysconfig/network-scripts/ifup)
d. Execute the dhcpcd command with the –f option.
Correct Answer: -> a

67/ Ronald Billing works as a system administrator at Mastery Mechanics. The
organization has installed a network printer, which is used by various systems over the
network for printing the documents related to various projects. The printer is not working
properly since last couple of days. Therefore, Ronald replaces the printer with a new one,
configures it and starts the print service. However, when John, an employee of the
organization uses the printer, a problem occurs. The printer shows a staircase effect. John
informs Ronald about the problem. How can Ronald troubleshoot the problem that occurs
while printing the documents?
a. 1. Open the /etc/hosts.equiv or the /etc/hosts.lpd file.
2. Stop and restart the print service.
b. 1. Open the /etc/hosts.equiv or the /etc/hosts.lpd file.
 2. Add the IP addresses of the remote hosts.
3. Stop and restart the print service.
c. 1. In the printtool utility, edit printer entry and click on Select _ button to open the
Configure Filter dialog box.
2. Select the correct driver for your printer.
d. 1. In the printtool utility, edit printer entry and click on select _ button to open the
Configure Filter dialog box.
2. Select the Fix stair-stepping text option under the Printing _ Options section.
Correct Answer: -> d

68/ Jim Wilkins is working as a storage administrator at Blue Moon Computers. Jim
implements Integrated Device Electronics (IDE) to determine the physical limits of the
storage scalability in the organization. However, the organization wants Jim to extend a
system’s local storage beyond the limitations of IDE. Which of the following Jim can
implement to perform the task?
a. Fibre Channel–based storage
b. SCSI
c. iSCSI
a. a and b both
b. Only a
c. Only b
d. a and c both
Correct Answer: -> d

69/ Steve Irvin is working as an IT consultant at Red Eye Experts. The organization
consists of 5000 desktops running on multiple platforms, such as Linux and Windows, and
connected through LAN and WAN. Steve needs to identify a tool to automate and
centralize the management of desktops in the organization. He also needs to identify a tool
that can implement policy-based management of desktops in the organization. Which tool
should Steve select for this?
a. WebTMA
b. Unicenter’s Desktop Management Solution
c. Radmin
d. PMP 6.0
Correct Answer: -> b

70/ Which of the following activity should be performed to manage VPNs in an enterprise?
a. Use a secure remote syslog server to make it difficult for the malicious user to
manipulate the log.
b. Enforce strong authentication based on the volume of remote users and value of the
resources that are being accessed.
c. Use biometrics mechanisms to protect IT infrastructure from thefts or unauthorized
attacks.
d. Ensure that all executable files, which you receive in the organization through e-mail,
are checked and approved.
Correct Answer: -> b

71/ Donna Johnson is working as an IT Consultant in Super Software 2000. Super Software
2000 is a large organization, which is spread across many countries and functions through
distributed network system. Donna is getting complaints regarding performance problems
in Internet, intranet, and extranet resources of the organization. Which of the following tool
or solution should Donna use to monitor and troubleshoot LAN, WAN, and VLANs?
a. HP OpenView Network Management Solution
b. Unicenter Network Management Solution
c. Observer 10.1
d. LANBrowser 1.3
Correct Answer: -> b

72/ Jim Lewis is working as a system administrator at Good Graphics Inc. Jim wants to
use a multi-platform security management solution that can provide plug-in-integration
between the security tool and the solution to collect the alerts. Which one of the following
solution should Jim use to perform the required task?
a. HP OpenView Security Management Solution
b. IBM Tivoli Security Compliance Manager
c. LANBrowser 1.3
d. WebScout 2.1
Correct Answer: -> a

73/ Red Eye Systems Inc. is a software development company. The company is planning a
new software development facility in Arizona. This facility will develop system software in
C/C++ on UNIX platform. Because this is a new project the company does not want to
invest heavily in computing resources. In addition, the development process does not
require too many resource consuming tools, except for C/C++ compilers, CLI debugging
and testing tools and UNIX platform. The programmers will not be allowed to share files
and folders as the code will be integrated in the next step of the SDLC. Which of the
following computing model would you suggest to the company as a networking
consultant?
a. Centralized network computing model with thin clients
b. Centralized network computing model with thick clients
c. Distributed network computing model with thick clients
d. Collaborative network computing model
Correct Answer: -> a

74/ Which of the following can be termed as necessary services?
a. Services that must be available at peak load
b. Services essential to operation
c. Services that must be available, but can be available at reduced performance.
d. Services that can be postponed indefinitely
Correct Answer: -> c

75/ Consider the following statements:
Statement A: Optional services are the services that must be available at peak load.
Statement B: Integrity requirements of QoS maintain the definiteness of the interaction
between the server and the user.
Which of the following is correct?
a. Both, statement A and B are true
b. Statement A is true and statement B is false
c. Statement A is false and statement B is true
d. Both, statement A and B are false
Correct Answer: -> c

76/ Donna Johnson is working as an IT consultant at Red Eye Experts. The organization
needs to implement effective server solutions to increase employee productivity and
reduce operating costs. Donna is assigned the task of implementing servers that can
handle the services running in the HPC layer of the server deployment architecture of the
organization. The organization also asks Donna to implement servers for file and printing
services. Which servers Donna will implement to perform the task?
a. Donna needs to implement high-end servers, such as OLTP Med and BI servers.
b. Donna needs to implement infrastructure servers.
c. Donna needs to implement servers that have large memory, can store very large data
sets, and can take load of high transaction volumes, such as ERP Large servers, OLTP
Large servers. In addition, Donna needs to implement workgroup servers.
d. Donna needs to implement high-end servers, such as HPC servers and OLTP large.
Correct Answer: -> c

77/ Which of the following is caused by variations in queue length and the processing time
needed to reorder packets arrived out of order due to travelling over different paths?
a. Jitter
b. Throughput
c. Availability
d. Packet loss
Correct Answer: -> a

78/ Mike Womack is working as a storage administrator at Red Eye Experts. Mike is
assigned the task of selecting an efficient storage technology for the organization that
suits its requirements. The organization wants Mike to select a storage technology that
can enable multiple users to share the same storage space thus minimizing the overall
overheads by centrally managing hard disks. Which storage technology Mike should
select to perform the assigned task?
a. Redundant Array of Inexpensive Disks
b. Tape Drives
c. Storage Area Networks
d. Network-Attached Storage
Correct Answer: -> d

79/ Larry Williams is working as a network administrator in Blue Valley Consulting. Larry is
assigned the task of selecting an appropriate network technology in the enterprise. Larry
needs to set up networks within a building of the enterprise. Therefore, Larry chooses LAN
technology to be implemented in the building. Larry observes that there are too many
computers, which are required to be attached to LAN. Therefore, Larry needs a technology
that reduces the number of data packet collisions and can deliver up to 80 percent of the
maximum bandwidth available. In addition, Larry needs to decide the physical media that
have multiple pairs of wires to connect the computers and reduces network crosstalk by
negating the electro-magnetic field. Which of the following combination should Larry
choose to perform the required task?
a. Token ring and Coaxial cables
b. Ethernet and Coaxial cables
c. Token ring and Twisted pair cables
d. FDDI and Fiber optic cables
Correct Answer: -> c
80/ Global Systems Inc. is a software development organization with its three branch
offices in different parts of America. John Wilkins is working as system administrator at
the head office of the organization at Los Angeles. The employees working at the branch
offices complain to John about the poor performance of the FTP server placed at the
branch office at New York. To solve the problem, John needs to remotely monitor the CPU,
disk, and memory usage of the server. Which tool should John implement to perform the
task?
a. PMP 6.0
b. Radmin
c. Symantec ON iPatch
d. PCDuo Enterprise
Correct Answer: -> a

81/ Which of the following activity should be performed to manage internet access of an
enterprise for security?
a. Keep track of who has accessed information each time a device connects to the LAN.
b. Keep the version of the operating system updated.
c. Block the file types such as EXE, COM, BAT, VBS, and SCR that carry virus. Also block
any file type with more than one extension such as, ABC.TXT.VBS.
d. Ensure that configuration settings should not be accessible to all users. Only
designated people should be able to access them.
Correct Answer: -> c

82/ Steve Irwin is an IT Consultant in the head office of Global Systems Inc. The regional
offices of Global System Inc. are spread across north, east, south, and west regions. There
are 1000 workstations in each office, which run on Windows platform. Steve needs an
enterprise-level network management solution, which includes report scheduler for
generating deliver reports, packet capture scheduling, and monitor for network delay.
Which of the following tool or solution should Steve consider, which contains all these
features?
a. Unicenter Network Management Solution
b. LANBrowser 1.3
c. OpManager 5.5
d. Observer 10.1
Correct Answer: -> d

83/ Steve Irwin is working as a security administrator at Red Eye Experts. Steve has
configured Symantec Client Security tool to protect the enterprise client systems from
security risks and threats. Steve needs to use the tool to enhance intrusion prevention
solutions reducing the time and cost. Which of the following features will enable Steve to
perform the required task?
a. Optimized out-of-the-box firewall
b. Generic Exploit Blocking
c. Side effect repairing
d. Centralized configuration
Correct Answer: -> b

84/ Which of the following requirements represents the degree of being capable of
maintaining the service and service quality by a server?
a. Performance
b. Integrity
c. Accessibility
d. Reliability
Correct Answer: -> d
85/ Lee Johnson is a IT consultant at Red Sky IT system. Lee is assigned the task to plan
desktop solutions for the organization. Lee wants to implement the devices that have word
processors, spreadsheet applications, calendars, and E-mail clients installed on them.
Which type of device should Lee implement to perform the above task?
a. Java-based mobile devices
b. PALM-based mobile devices
c. Windows CE-based mobile devices
d. Linux based mobile devices
Correct Answer: -> a

86/ SuperSoftware Inc is planning to implement IT infrastructure in the organization. As a
part of planning IT infrastructure, SuperSoftware Inc needs to plan for effective desktop
solutions to help users to perform day-to-day operations, increase user productivity, and
improve business processes. For this, the organization asks Anne Johnson, an IT
consultant to analyze the business and technical requirements for planning desktop
solutions and identify an appropriate desktop technology on the basis of the
requirements. On analyzing the requirements, Donna notices that he needs to select
desktop technologies for the desktop users who need to work on packages involving
heavy graphics. In addition, Donna needs to select a technology having more storage
capacity than phone handsets for the mobile users of the organization. Identify the
desktop and mobile technologies that Donna need to select to perform the task?
a. Macintosh clients and Java-based mobile devices
b. Linux clients and PALM-based mobile devices
c. Macintosh clients and PALM-based mobile devices
d. Linux clients and Java-based mobile devices
Correct Answer: -> c

87/ Which of the following questions you need not answer while finalizing internal access
security?
a. What are the processes to deal with change in access permissions granted to an
employee?
b. What are the processes to evaluate the access permissions granted to an employee?
c. What are the methods to identify unauthorized access and prevent it?
d. What are the administrative levels in the organizations and what data and system
access permissions do they need?
Correct Answer: -> c

88/ Tom Wilkins is the member of the team planning for an effective storage solution in
Red Eye Experts. Red Eye Experts is a very big enterprise spanned across different areas
of world, therefore, Tom needs to plan for the storage solution that can be accessed over a
network and minimize the overall overheads by centrally managing hard disks. Keeping in
mind all these considerations, Tom plans to use NAS in the enterprise that enables
multiple users to share the same storage space. Which of the following feature will help
Tom to accomplish his task?
a. Server attached approach to data storage
b. Access to storage pool
c. 100 MB/s full duplex data transfer rates
d. Data regenerating hard disks
Correct Answer: -> a

89/ Steve Irvin is the IT consultant at Red Eye Experts. Steve needs to identify an asset
management solution that would enable the IT staff of the organization to access the asset
management and maintenance information of the desktops from any location and at any
time through the Internet. In addition, Steve needs to identify a scalable asset
management solution in which additional modules can be added in future if the
organization expands. Identify an appropriate asset management solution.
a. Radmin
b. Altiris Asset Management Suite
c. WebTMA
d. ManageEngine ServiceDesk Plus
Correct Answer: -> c

90/ Which of following network management tool can be used to secure the network from
internal attacks by monitoring event logs?
a. Observer 10.1
b. OpManager 5.5
c. Unicenter Network Management
d. LANBrowser 1.3
Correct Answer: -> b

91/ Pat Wilkins is a system administrator in the head office of Red Eye Experts, which is a
large and complex organization spread across many countries. Pat wants to remove all
kinds of complexities that are associated with network management for effective and
efficient working of the organization. Donna Johnson is the IT consultant in Red Eye
Experts. Pat assigns Donna the task of finding a multi-platform solution that discovers the
entire network and can automate several network monitoring tasks. To perform this task,
Donna wants a solution that includes WAN monitoring, server monitoring, URL
monitoring, and switch monitoring. Which of the following tool or solution is appropriate
to include all these features?
a. OpManager 5.5
b. HP OpenView Network Management Solution
c. LANBrowser 1.3
d. Unicenter Network Management Solution
Correct Answer: -> a

92/ Jim Lewis is working as a security administrator in Blue Moon Computers. Jim needs
to use a Windows-based tool that monitors and filters Internet access for Web sites and
Internet applications. Jim wants that the tool should record the bandwidth and time each
user or workstation has spent in accessing Internet on periodic basis. Which of the
following tool should Jim use to perform the required task?
a. OpManager5.5
b. Observer10.1
c. WebScout 2.1
d. Symantec Client Security
Correct Answer: -> c

93/ The management at Bluemoon Computers Inc. wants to secure its network from
external intrusions. The computers on the network are running on a number of different
operating systems, such as Windows, Solaris, Linux, and Macintosh and have software
firewalls installed on them. The management is very cost conscious and also
apprehensive that the level of security might not affect the network performance.
Therefore, it has been decided that only one extra level of security will be implemented.
Which of the following security measures will you suggest as a networking consultant?
a. Host-based Intrusion Detection System (HIDS)
b. Network-based Intrusion Detection System (NIDS)
c. Combination of NIDS and HIDS
d. No IDS is required as the computers have firewalls installed on them
Correct Answer: -> b

94/ Which of the following business factors enables you to determine the technologies
that can be used to establish network connections between different branch offices of an
organization?
a. Business processes
b. Organization structure
c. Geographical scope
d. Business applications
Correct Answer: -> c

95/ Which of the following can be termed as strategic services?
a. Services that must be available at peak load
b. Services essential to operation.
c. Services that can be postponed indefinitely.
d. Services provided by servers that must be available, but can be available at reduced
performance
Correct Answer: -> b

96/ Pat Wilkins is working as an IT Consultant at Global Softwares. Pat is assigned the
task to plan desktop solutions for the organization. Pat needs to implement devices that
have more storage capacity than phone handsets. The devices should also have the
capability to run java-based dynamic applications. Which of the following devices Pat
should implement to perform the task?
a. Windows CE-based mobile devices
b. PALM-based mobile devices
c. Java-based mobile devices
d. Linux based mobile devices
Correct Answer: -> b

97/ Corrine Wallace is working as an IT consultant at Blue Moon Computers. The
organization is planning to implement an IT infrastructure. The management of the
organization notices that organization requires servers at entry level of business
operations to implement IT infrastructure. Therefore, organization assigns Corrine the task
of planning server solutions for business operations, such as caching services and proxy
services. In addition, the organization is required to provide file and print services. Which
servers Corrine will implement to fulfil the requirement of the organization?
a. Web servers and Workgroup servers
b. Infrastructure servers and Mail servers
c. HPC servers and Infrastructure servers
d. Workgroup and HPC servers
Correct Answer: -> a

98/ Which of the following questions you need to answer while planning security for
external access?
a. What are the processes to deal with change in access permissions granted to an
employee?
b. What are the processes to evaluate the access permissions granted to an employee?
c. What are the methods to identify unauthorized access and prevent it?
d. What are the administrative levels in the organizations and what data and system
access permissions do they need?
Correct Answer: -> c

99/ Pat Wilkins is working as an IT consultant at Safest Software Inc. The organization is
planning for network solutions to facilitate faster information sharing. Pat is assigned the
task to determine the number and the type of hardware and software resources required
on a network. Pat needs to size the network to perform the task. Which of the following
factors Pat needs to consider to perform network sizing:
a. Number of Remote Users
b. Proactive Fault Management
c. Number of People Using the Network
d. Software Specifications
e. Application Performance
a. a, b, c, and e
b. a, c, and d
c. a, b, c, and d
d. b, c, d, and e
Correct Answer: -> b

100/ Pat Wilkins is working as a network administrator in Super Software Inc, which is
spread over a vast geographical area. Pat needs to use WAN communication service to
create an inter-network of networks. Pat needs to use a technology that can support very
high-speed data transfers to the tune of 640 kbps in both directions and carries high-
speed data and multimedia over telephone lines. In addition, Pat wants another
technology, which is used for Point-to-Point networks and for backup for another type of
link. Which of the following combination of WAN technologies should Pat use to complete
the required task?
a. ISDN and Frame Relay
b. ADSL and Leased lines
c. SMDS and X.25
d. ADSL and Analog modems
Correct Answer: -> d

101/ Consider the following statements:

Statement A: WebTMA and ManageEngine ServiceDesk Plus are Web-based asset
management solutions.
Statement B: The Altiris Asset Management Suite has a snap-in modular design.

Which of the following is correct about the above statements?
a. Statement A is False and Statement B is True.
b. Statement A is True and Statement B is False.
c. Both, Statement A and Statement B are True.
d. Both, Statement A and Statement B are False.
Correct Answer: -> c

102/ Consider the following statements:

Statement A: ManageEngine ServiceDesk Plus is a Web-based asset management
solution.
Statement B: ManageEngine ServiceDesk Plus provides a helpdesk for troubleshooting
desktop-related problems.

Which of the following is correct about the above statements?
a. Statement A is False and Statement B is True.
b. Statement A is True and Statement B is False.
c. Both, Statement A and Statement B are True.
d. Both, Statement A and Statement B are False.
Correct Answer: -> c

103/ Which of the following tool can be used as a network monitor and protocol analyzer
for Ethernet, wireless 802.11b/a/g, token ring, and FDDI networks?
a. Observer 10.1
b. LANBrowser 1.3
c. HP OpenView Network Management
d. Unicenter Network Management
Correct Answer: -> a
104/ Steve Irwin is an IT consultant in Blue Moon Computers. Steve wants an enterprise-
level tool for network management that helps in scanning the entire network by searching
and configuring properties of all the devices of Windows NT/2000 enterprise. The tool
should search for errors, audit information, connected users, and share permissions.
Which of the following tool do u think is appropriate to perform this task?
a. OpManager 5.5
b. Observer 10.1
c. LANBrowser
d. HP OpenView Network Management Solution
Correct Answer: -> c

105/ Corrine Wallace is working as a storage administrator at Technology Systems. The
workstations in Technology Systems are running on multi-platform systems. Corrine finds
that to manage storage devices effectively, he needs to use a tool or solution that
manages the backup and recovery tools centrally and can monitor the storage
environment remotely. Which of the following tool should Corrine use to perform the task?
a. Storix System Backup Administrator
b. BrightStor ARCserve Backup for Laptops & Desktops Release 11
c. VERITAS Backup Exec10
d. BrightStor Storage Resource Manager
Correct Answer: -> d

106/ The management at Bluemoon Computers Inc. has decided to connect it corporate
office to all of its regional offices. The local networks at regional offices are to be identified
by the different subnets of the same IP address class 172.16.0.1. The regional offices are
using different platforms for their networks, such as Windows, Linux, Macintosh, and
Solaris. Because the corporate network will be connected to all these regional offices
round the clock, it will be very essential to restrict the broadcast produced by all the
networks and filter in the ones that are specifically meant for the corporate office. Which
of the following network devices will you suggest to facilitate this connectivity as a
networking consultant?
a. Hub
b. Switch
c. Router
d. Layer 2 Switch
Correct Answer: -> c

107/ What is the configuration requirements of the desktops used in help desks?
a. Following are the configuration requirements of the desktops used in help desks
High quality printers
Voice Over IP integration
Computer telephony integration
b. Following are the configuration requirements of the desktops used in help desks
Thin-client computers
Voice Over IP integration
Computer telephony integration
c. Following are the configuration requirements of the desktops used in help desks
Thin-client computers
Voice Over IP integration
Fast processing capabilities
d. Following are the configuration requirements of the desktops used in help desks
Thick-client computers
Voice Over IP integration
Computer telephony integration
Correct Answer: -> b
108/ Corrine Wallace is working as IT consultant at Blue Moon Computers. Corrine is
assigned the task of determining the service usability and utility of servers in the
organization. For this, Corrine needs to determine the time it takes to repair a service that
has failed on the servers. Which of the following requirements Corrine needs to analyze to
perform the task?
a. Accessibility
b. Availability
c. Integrity
d. Performance
Correct Answer: -> b

109/ Safest Software wants to ensure uninterrupted execution of business activities and
increase productivity and profitability of an enterprise. For this, the organization decides
to implement server solutions in the organization to handle its routine and critical
business applications. The management of the organization notices that organization
requires servers at every level of business operations. Therefore, organization hires Pat
Wilkins, an IT consultant to analyze the business processes and requirements that needs
to be considered for planning server solutions and implement servers in the organization.
After analyzing the requirements Pat realizes that he needs to implement servers for the
following:
File and print services
Firewall and security services
Provide clustered computing system
Handling complex interactions

Which server Pat needs to implement to perform the task?
a. Workgroup server only
b. Web servers.
c. Workgroup and Infrastructure servers
d. Workgroup, Infrastructure, HPC, and high-end servers, such as ERP and Application
Tier servers.
Correct Answer: -> d

110/ Which of the following is not included in the security policy of an IT infrastructure?
a. Roles and responsibilities for various employees.
b. Establishment of trust among clients and employees to gain their confidence
c. Rules regarding the use of various organizational resources, such as computers, the
Internet, or e-mail.
d. Geographical Scope of the organization
Correct Answer: -> d

111/ Donna Johnson, a network administrator is planning for the network solutions for the
Mountain Marketing Inc. Donna needs to avoid network congestion by managing data
flows. For this _donna needs to determine QoS of the organization’s network. Which of the
following factors cannot help Donna determine QOS of the network:
a. Throughput
b. Business applications
c. Availability
d. Jitter
e. Size and Geographical Scope
a. b and e
b. d and b
c. d and e
d. d, e, and b
Correct Answer: -> a
112/ Donna Bard is working as a security administrator in Safest Software Inc. Donna
needs to deploy a security method in the enterprise that can protect IT infrastructure from
both external as well as internal attacks. Donna receives complaints that unnecessary
data, such as video and graphic files are entering the network from outside. Therefore,
Donna wants that the security method should filter out the incoming traffic to stop the
unnecessary data consuming the network bandwidth. Donna also wants to use another
software that provides encryption technologies, digital certificates, and certificate to
protect the security of their communications and business transactions on the Internet.
Which of the following combinations of security methods should Donna use to provide
enterprise-wide network security?
a. PKI and VPNs
b. VPNs and IDS
c. IDS and Firewalls
d. Firewalls and PKI
Correct Answer: -> d

113/ Which of the following tool can be used to build reports to identify the under-utilized
storage space?
a. BrightStor Storage Resource Manager
b. HP OpenView Storage Area Manager
c. BrightStor ARCserve Backup for Laptops & Desktops
d. Storix System Backup Administrator
Correct Answer: -> b

114/ Corrine Wallace is working as an IT consultant in the head office of Safest Software.
Safest Software is a large enterprise with distributed network in six branches across four
countries. The workstations in each office are running on multi-platform, such as Linux
and Windows. Steve Irwin is the system administrator of the head office. Steve assigns
Corrine the task of providing a network management solution, which combines the
software, services, support, and training to manage the network proactively by optimizing
performance and availability of the distributed network system of Blue Moon Computers.
Which of the following tool or solution should Corrine choose to perform this task?
a. HP OpenView Network Management Solution
b. Unicenter Network Management Solution
c. OpManager 5.5
d. LANBrowser 1.3
Correct Answer: -> a

115/ Pat Greene is working as a storage administrator at Blue Moon Computers. Pat is
assigned the task of managing archives in an enterprise. Pat needs to protect the data
stored in archived media from mishandling or natural disasters. Which of the following
activity should Pat perform to complete the task?
a. Ensuring that archive media does not exceed the safe limits
b. Storing the data with the same retention period
c. Maintaining a record of the archival media, files, and folders
d. Maintaining the duplicate copy of the archived data
Correct Answer: -> d

116/ Red Eye Systems Inc. wants a plan for security implementation at a new software
development facility in New York. The company wants the facility to have at least five
levels of authentications for any data that is accessed from a remote location as well as
for the data sent to a remote location. The management wants to implement both host-
based and network-based IDS and wants to put a firewall after each VPN gateway that will
be used for connecting remote users. In addition, the management has a very stringent
administrative policy, which requires even a single change in user permissions to be
approved by a hierarchy of officials. In addition, the management has decided to conduct
weekly security audits during which the network at the facility would be non-operational.
As a networking consultant, according to you which of the following business or technical
requirements will be affected because the security requirements?
a. Availability, geographical scope, and business applications
b. QoS, Performance, and availability
c. User and resource distribution
d. Security policies
Correct Answer: -> b

117/ New tech book is multinational organization with various bookstores in various parts
of USA. To expand its customer base globally and to automate its business process the
organization launches an e-commerce site on the Internet. To protect its business
processes from disruption, the organization asks Anne Donaldson to plan for the
availability of the website. Identify the considerations Anne needs to keep track of to plan
for the availability of the website.
To protect data losses in the event of disasters, the organization also asks Anne to plan
tasks for maintaining availability and backing up critical data of the website. What should
Anne do to perform the task?
a. Anne needs to keep track of the following considerations while planning for the
availability of the website:
Criticality of the data
Amount of downtime that the organization can afford
Cost of reducing downtime in the organization
In addition, Anne needs to consider the frequency of planned downtime while setting the
availability goals to plan for appropriate backup strategies and maintenance tasks to
maintain availability.
b. Anne needs to keep track of the following considerations while planning for the
availability of the website:
Amount of data that a network can carry
Amount of data that is successfully transferred over the Internet
Ratio of error-free data transmission to total transmission.
In addition, Anne needs to consider the frequency of planned downtime while setting the
availability goals to plan for appropriate backup strategies and maintenance tasks to
maintain availability
c. Anne needs to keep track of the following considerations while planning for the
availability of the website:
Criticality of the data
Amount of downtime that the organization can afford
Cost of reducing downtime in the organization
In addition, Anne needs to consider the frequency of unplanned downtime while setting
the availability goals to plan for appropriate backup strategies and maintenance tasks to
maintain availability.
d. Anne needs to keep track of the following considerations while planning for the
availability of the website:
Amount of data that a network can carry
Amount of data that is successfully transferred over the Internet
Ratio of error-free data transmission to total transmission.
In addition, Anne needs to consider the frequency of unplanned downtime while setting
the availability goals to plan for appropriate backup strategies and maintenance tasks to
maintain availability
Correct Answer: -> a

118/ _______ management enables you to manage the leased assets in an enterprise by
informing you about the end of the lease period.
a. Asset
b. Event
c. Remote
d. Desktop configuration
Correct Answer: -> a

119/ Identify the tasks performed by the help desk in an enterprise.

a. Create security policies for securing the desktops.
b. Provide an online knowledge base that provides solutions to problems.
c. Log and monitor the problems of desktop users.
d. Provide centralized support for troubleshooting problems of desktop users.

Select the correct option.
a. a, c, and d
b. a, b, and d
c. b, c, and d
d. c and d
Correct Answer: -> c

120/ Steve Irvin works in the Helpdesk department of Global Systems Inc. Currently, the
organization uses a decentralized and manual method for managing and maintaining IT
resources. The CIO of the organization notices that the decentralized and manual method
for managing and maintaining IT resources is prone to errors and requires a huge amount
of time, and effort. To solve the problem, the CIO asks Steve to identify a tool that can
keep track of the IT resources and enable the IT staff to perform the following tasks in the
organization:
Determine which IT resources are to be upgraded or replaced
Keep track of the end of the lease period of the IT resources
Keep track of the software having expired licenses
Determine which users have particular software packages installed
Centrally manage the implementation of software patches across the enterprise
Centrally manage the distributed IT resources

Identify the tool that is most appropriate to perform the preceding tasks.
a. Remote management tool
b. Event management tool
c. Asset management tool
d. Desktop standardization tool
Correct Answer: -> c

Más contenido relacionado

La actualidad más candente

La actualidad más candente (19)

101 2.2 install boot manager
101 2.2 install boot manager101 2.2 install boot manager
101 2.2 install boot manager
 
Internal commands.29to30
Internal commands.29to30Internal commands.29to30
Internal commands.29to30
 
Batch programming and Viruses
Batch programming and VirusesBatch programming and Viruses
Batch programming and Viruses
 
101 350
101 350101 350
101 350
 
Aix commands
Aix commandsAix commands
Aix commands
 
Ex200
Ex200Ex200
Ex200
 
Ubuntu installation
Ubuntu installationUbuntu installation
Ubuntu installation
 
Unix commands in etl testing
Unix commands in etl testingUnix commands in etl testing
Unix commands in etl testing
 
Batch file programming
Batch file programmingBatch file programming
Batch file programming
 
Basic shell commands by Jeremy Sanders
Basic shell commands by Jeremy SandersBasic shell commands by Jeremy Sanders
Basic shell commands by Jeremy Sanders
 
DNS Configure
DNS Configure DNS Configure
DNS Configure
 
History
HistoryHistory
History
 
2.1 design hard disk layout v2
2.1 design hard disk layout v22.1 design hard disk layout v2
2.1 design hard disk layout v2
 
Basic linux day 5
Basic linux day 5Basic linux day 5
Basic linux day 5
 
linux_Commads
linux_Commadslinux_Commads
linux_Commads
 
101 1.1 hardware settings
101 1.1 hardware settings101 1.1 hardware settings
101 1.1 hardware settings
 
101 2.1 design hard disk layout v2
101 2.1 design hard disk layout v2101 2.1 design hard disk layout v2
101 2.1 design hard disk layout v2
 
Sahul
SahulSahul
Sahul
 
File management
File managementFile management
File management
 

Similar a Linux network and system administration interview questions and answers

IT Essentials (Version 7.0) - ITE Chapter 11 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 11 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 11 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 11 Exam AnswersITExamAnswers.net
 
Handson1 6 federp
Handson1 6 federpHandson1 6 federp
Handson1 6 federpfederpmatc
 
Linux, PHP, SMS - USSD Examination
Linux, PHP,  SMS - USSD ExaminationLinux, PHP,  SMS - USSD Examination
Linux, PHP, SMS - USSD Examinationtawi123
 
Rh202 q&amp;a-demo-cert magic
Rh202 q&amp;a-demo-cert magicRh202 q&amp;a-demo-cert magic
Rh202 q&amp;a-demo-cert magicEllina Beckman
 
It04 roshan basnet
It04 roshan basnetIt04 roshan basnet
It04 roshan basnetrosu555
 
RH302 Exam-Red Hat Linux Certification
RH302 Exam-Red Hat Linux CertificationRH302 Exam-Red Hat Linux Certification
RH302 Exam-Red Hat Linux CertificationIsabella789
 
RH302 Exam-Red Hat Linux Certification
RH302 Exam-Red Hat Linux CertificationRH302 Exam-Red Hat Linux Certification
RH302 Exam-Red Hat Linux CertificationIsabella789
 
RH-302 Exam-Red Hat Certified Engineer on Redhat Enterprise Linux 4 (Labs)
RH-302 Exam-Red Hat Certified Engineer on Redhat Enterprise Linux 4 (Labs)RH-302 Exam-Red Hat Certified Engineer on Redhat Enterprise Linux 4 (Labs)
RH-302 Exam-Red Hat Certified Engineer on Redhat Enterprise Linux 4 (Labs)Isabella789
 
Interview questions
Interview questionsInterview questions
Interview questionsxavier john
 
csc3412 Assignment 1Semester 1, 2014Due Date Midnight.docx
csc3412 Assignment 1Semester 1, 2014Due Date Midnight.docxcsc3412 Assignment 1Semester 1, 2014Due Date Midnight.docx
csc3412 Assignment 1Semester 1, 2014Due Date Midnight.docxfaithxdunce63732
 
Part 4 Scripting and Virtualization (due Week 7)Objectives1. .docx
Part 4 Scripting and Virtualization (due Week 7)Objectives1. .docxPart 4 Scripting and Virtualization (due Week 7)Objectives1. .docx
Part 4 Scripting and Virtualization (due Week 7)Objectives1. .docxkarlhennesey
 
Assessment item 1 File Systems and Advanced Scripting .docx
Assessment item 1 File Systems and Advanced Scripting .docxAssessment item 1 File Systems and Advanced Scripting .docx
Assessment item 1 File Systems and Advanced Scripting .docxdavezstarr61655
 
Install and configure linux
Install and configure linuxInstall and configure linux
Install and configure linuxVicent Selfa
 

Similar a Linux network and system administration interview questions and answers (20)

Lab 1 Essay
Lab 1 EssayLab 1 Essay
Lab 1 Essay
 
IT Essentials (Version 7.0) - ITE Chapter 11 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 11 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 11 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 11 Exam Answers
 
Handson1 6 federp
Handson1 6 federpHandson1 6 federp
Handson1 6 federp
 
Linux, PHP, SMS - USSD Examination
Linux, PHP,  SMS - USSD ExaminationLinux, PHP,  SMS - USSD Examination
Linux, PHP, SMS - USSD Examination
 
000 235
000 235000 235
000 235
 
linux installation.pdf
linux installation.pdflinux installation.pdf
linux installation.pdf
 
Rh202 q&amp;a-demo-cert magic
Rh202 q&amp;a-demo-cert magicRh202 q&amp;a-demo-cert magic
Rh202 q&amp;a-demo-cert magic
 
000 236
000 236000 236
000 236
 
It04 roshan basnet
It04 roshan basnetIt04 roshan basnet
It04 roshan basnet
 
RH302 Exam-Red Hat Linux Certification
RH302 Exam-Red Hat Linux CertificationRH302 Exam-Red Hat Linux Certification
RH302 Exam-Red Hat Linux Certification
 
RH302 Exam-Red Hat Linux Certification
RH302 Exam-Red Hat Linux CertificationRH302 Exam-Red Hat Linux Certification
RH302 Exam-Red Hat Linux Certification
 
Linux
LinuxLinux
Linux
 
RH-302 Exam-Red Hat Certified Engineer on Redhat Enterprise Linux 4 (Labs)
RH-302 Exam-Red Hat Certified Engineer on Redhat Enterprise Linux 4 (Labs)RH-302 Exam-Red Hat Certified Engineer on Redhat Enterprise Linux 4 (Labs)
RH-302 Exam-Red Hat Certified Engineer on Redhat Enterprise Linux 4 (Labs)
 
Interview questions
Interview questionsInterview questions
Interview questions
 
csc3412 Assignment 1Semester 1, 2014Due Date Midnight.docx
csc3412 Assignment 1Semester 1, 2014Due Date Midnight.docxcsc3412 Assignment 1Semester 1, 2014Due Date Midnight.docx
csc3412 Assignment 1Semester 1, 2014Due Date Midnight.docx
 
Part 4 Scripting and Virtualization (due Week 7)Objectives1. .docx
Part 4 Scripting and Virtualization (due Week 7)Objectives1. .docxPart 4 Scripting and Virtualization (due Week 7)Objectives1. .docx
Part 4 Scripting and Virtualization (due Week 7)Objectives1. .docx
 
Sandy Report
Sandy ReportSandy Report
Sandy Report
 
Assessment item 1 File Systems and Advanced Scripting .docx
Assessment item 1 File Systems and Advanced Scripting .docxAssessment item 1 File Systems and Advanced Scripting .docx
Assessment item 1 File Systems and Advanced Scripting .docx
 
Ch23 system administration
Ch23 system administration Ch23 system administration
Ch23 system administration
 
Install and configure linux
Install and configure linuxInstall and configure linux
Install and configure linux
 

Último

What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 

Último (20)

What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 

Linux network and system administration interview questions and answers

  • 1. 1/ Consider the following statements: Statement A: The BSD interface provides a freeware tool that helps to handle the network load. This is achieved by using the robust network services that the BSD interface provides through one of its distribution. Statement B: The System V Interface is a command-line interface that enables you to use the print services. Which of the following is true, with respect to the above statements? a. Statement A is true and statement B is false. b. Statement A is false and statement B is true. c. Both, statements A and B, are true. d. Both, statements A and B, are false. Correct Answer: -> c 2/ While configuring a NIS client you need to configure the ypbind service. Which of the following files will you modify to perform this task? a. /etc/passwd b. /etc/sysconfig/network c. /etc/yp.conf d. /etc/nsswitch.conf Correct Answer: -> c 3/ Consider the statements: Statement A: The range of IP addresses that can be assigned to a computer are known as a dotted quad notation. Statement B: The number of octets that represent the network Id and host Id in the IP addresses varies with the size of the network. Which of the following is true, with respect to the above statements? a. Statement A is true and statement B is false. b. Statement A is false and statement B is true. c. Both, statements A and B, are true. d. Both, statements A and B, are false. Correct Answer: -> b 4/ Steve Irvin is working as system administrator at Mountain Marketing Inc. He needs to assign dynamic IP addresses to all the computers in the organization. For this, he decides to configure eth1 as the DHCP client. The DHCP server is already present on the network and the host name is Mountain Marketing. How should Steve proceed to perform the task? a. After setting the value of the NETWORKING parameter equal to yes in the /etc/sysconfig/ network file, he needs to edit the contents of the /etc/sysconfig/network-scripts/ifcfg-eth1 file, as follows: DEVICE=eth1 ONBOOT=no BOOTPROTO=dhcp b. After setting the value of the NETWORKING parameter equal to yes in the /etc/sysconfig/network file, he needs to edit the contents of the /etc/sysconfig/network- scripts/ifcfg-eth1 file, as follows: DEVICE=eth1 ONBOOT=yes BOOTPROTO=dhcp c. After setting the value of the NETWORKING parameter equal to no in the /etc/sysconfig/ network file, he needs to edit the contents of the /etc/sysconfig/network-scripts/ifcfg-eth1 file, as follows: DEVICE=eth1 ONBOOT=yes BOOTPROTO=dhcp d. After setting the value of the NETWORKING parameter equal to no in the /etc/sysconfig/
  • 2. network file, he needs to edit the contents of the /etc/sysconfig/network-scripts/ifcfg-eth1 file, as follows: DEVICE=eth1 ONBOOT=no BOOTPROTO=dhcp Correct Answer: -> b 5/ Pat Wilkins is working as system administrator at Global Systems Inc. Donna is working as software developer with the company. She needs to develop some applications on the Linux platform using Qt 3 and GTK+ 2 graphical toolkits. Therefore, Donna needs Pat to add fonts to her system. She wants the font to be added such that they are smooth-edged. How will Pat perform the given task? a. To add the fonts, Pat needs to perform the following steps: Copy the new fonts to the directory, /usr/share/fonts/local. Run the following command for updating the font information cache: # fc-cache /usr/share/fonts/local b. To add the fonts, Pat needs to perform the following steps: Copy the new fonts to the directory, .fonts/, present in the user's home directory. Run the following command for updating the font information cache: # fc-cache /usr/share/fonts/local c. To add the fonts, Pat needs to perform the following steps: Copy the new fonts to the Fontconfig configuration file. Run the following command for updating the font information cache: # fc-cache /usr/share/fonts/local d. To add the fonts, Pat needs to perform the following steps: Copy the new fonts to the XFree86 configuration file. Run the following command for updating the font information cache: # fc-cache /usr/share/fonts/local Correct Answer: -> b 6/ AB Corp is an advertising company, which is working on Linux platform. Steve, the system administrator, creates a directory, /extrauser. After creating this directory, Steve needs to create a user named john in the /extrauser directory. Which command should Steve use to perform the above task? a. useradd –d /extrauser john b. useradd –f /extrauser john c. useradd –g /extrauser john d. useradd –c /extrauser john Correct Answer: -> a 7/ Steve Irving is the system administrator in Mastery Mechanics. He needs to install a Linux server on the network of the organization. He is also required to attach a printer to the Linux server so that all the employees of various departments can share the network printer. For this, Steve needs to install Linux on a computer and configure it as a print server using the CUPS daemon. However, after one week some of the employees start complaining to Steve that they are not able to access the printer. The employees also report that when they try to access the printer from their remote Linux system they receive an error message, which states that the permission to access the printer is denied. What could be the problem and how should Steve resolve it? a. Modify the server configuration file /etc/cups/cupsd.conf, which contains the information required to access the printer. b. Modify the server configuration file /etc/cups/printers.conf, which contains the information required to access the printer. c. Modify the server configuration file /etc/cups/classes.conf, which contains the information required to access the printer. d. Modify the server configuration file /etc/cups/client.conf, which contains the information
  • 3. required to access the printer. Correct Answer: -> a 8/ Which of the following command performs the same task as the mkfs.ext3 /dev/hdc8 command? a. mke2fs –l /dev/hdc8 b. mke2fs –j /dev/hdc8 c. mkfs -c ext3 /dev/hdc8 d. mke2fs –i /dev/hdc8 Correct Answer: -> b 9/ You are working as system administrator at Red Sky IT Systems. The organization has Windows server installed on the network. You have been assigned the task of installing Linux on all the computers in the network. Which type of installation method can you use to install Linux in the given scenario? a. Use an FTP Server b. Use an NFS Server c. Use an HTTP Server d. Use a CD-ROM Correct Answer: -> a 10/ Mike Womack is working as a project manager with Smart Software Developers. The network setup of the organization is based on Linux. The organization has a remote server, where the employees save their files. Don Allen, the system administrator of the organization has created user accounts for all the employees of the organization. Mike is working on a project and creates a file, teamproject.txt. Mike wants to assign read permission to all the other users, for the file, teamproject.txt. However, Mike wants to remove all the permissions from the other users, for any other file that he creates. Mike also wants to assign the read and write permissions to his team members, who are working in his project, for all the files that he will create. Which set of commands will enable Mike Womack to set the file access permissions according to his requirement? a. chmod a+r teamproject.txt umask 037 b. chmod a+r teamproject.txt umask 017 c. chmod o+r teamproject.txt umask 017 d. chmod o+r teamproject.txt umask 037 Correct Answer: -> c 11/ Ken Burton, the system administrator at Global Systems Inc. has joined the organization after a long leave. During the leave period, Bill was using Ken’s computer. Bill had replaced the hard disk of Ken’s computer with a new hard disk for personal use. Ken had installed GRUB on the network server in order to boot the Linux operating system. While booting his computer, Ken receives an error at Stage 1 of the loading process and the booting process stops. Which of the following error has caused the booting process to stop? a. Floppy Error b. Hard Disk Error c. Geom Error d. Read Error Correct Answer: -> c 12/ The software department at Supersoft2000 requires Windows 2000 platform to develop software. Chris, the system administrator wants to install the Windows 2000 Server on one
  • 4. of the six partitions of an existing Linux server. To install Windows 2000 Server on this partition, Chris deletes this partition. However, he does not delete the entry of this partition in the /etc/fstab file and restarts the computer. The following error message is displayed: checking file systems fsck.ext3/dev/hdc6: The superblock could not be read or doesn’t describe a correct ext2 filesystem. If the device is valid and it really contains an ext2 filesystem (and not swap or ufs or something else), then the superblock is corrupt, and you might try running e2fsck with an alternate superblock: e2fsck –b 8193 <device> : Bad magic number in super-block while trying to open /dev/hdc6 [FAILED] * * * An error occurred during the file system check. * * * Dropping you to a shell; the system will reboot * * * when you leave the shell. Give root password for maintenance (or type Control-D to Continue): How can Chris troubleshoot the problem? a. Start the system in the rescue mode and delete the entry of the deleted partition in the /etc/fstab file. b. Start the system in the single-user mode and change the root password. c. Start the system in the single-user mode and delete the entry of the deleted partition in the /etc/fstab file. d. Start the system in the rescue mode and change the root password. Correct Answer: -> a 13/ What is the configuration requirements of the desktops used for financial services enterprise a. Following are the configuration requirements of the desktops used in call centres and help desks: Thin-client computers Voice Over IP integration Computer telephony integration b. Following are the configuration requirements of the desktops used in banks and help desks: High storage High security requirement c. Following are the configuration requirements of the desktops used in banks and help desks: Thick client computers Office applications Standard quality printing device d. Following are the configuration requirements of the desktops used in banks and help desks: High storage capacity Fast processing capabilities Correct Answer: -> b 14/ Tom Davidson is working, as a system administrator at Mountain Marketing Inc. Tom has been assigned the task of sending the high priority jobs for printing first. Which command will Tom execute to perform the task? a. lpc b. lpstat c. lp
  • 5. d. lpadmin Correct Answer: -> c 15/ Steve is a system administrator at Deez Inc. He needs to load a module into the kernel. He also wants to specify that a kernel module name should be provided explicitly in the command. Which option of the insmod command will Steve use to perform the task? a. insmod -o b. insmod -s c. insmod -p d. insmod -f Correct Answer: -> a 16/ Jim Lewis, the system administrator at Deez Inc, has installed Linux on a computer. Jim wants to collect the information about the parameters that are passed to the kernel during the start up of the kernel. Which file in the /proc/ directory should Jim use to perform this task? a. /proc/apm b. /proc/cmdline c. /proc/cpuinfo d. /proc/dma Correct Answer: -> b 17/ You are the system administrator at Deez Inc. You need to transfer the data from a source computer over a network to the destination computer over another network. For this, packet routing is required from one network to the other. Which feature of Linux kernel should you use for the above task? a. Router b. Routing table c. Default route d. IP forwarding Correct Answer: -> d 18/ Pat configures the dhcpcd daemon and starts his computer. He notices that the IP address is not assigned to his computer. Pat verifies that the dhcpcd daemon is running. Which command should Pat use for the IP address assignment? a. Pat needs to execute the ifconfig command. b. Pat needs to execute the dhcpcd command with the –f option. c. Pat needs to check all the DHCP servers on the network d. Pat needs to execute the route command. Correct Answer: -> b 19/ Steve Irvin is working as system administrator at Super Software2002. The domain administrator of the organization wants Steve to provide fonts to the X clients. He also wants Steve to add fonts such that they do not provide support for advanced anti-aliasing feature. Identify the correct sequence of steps that Steve needs to perform to accomplish the given task? a. To add fonts, Steve needs to perform the following steps: Create a directory, /usr/share/fonts/local/, if it does not already exist. Change to the /usr/share/fonts/local directory. Update the font information of the system. Copy the new font files to the /usr/share/fonts/local directory. Execute the chkfontpath command to add the directory, /usr/share/fonts/local/ to the Xfs FontPath as root directory. Restart Xfs so that the X clients can use the new fonts. b. To add fonts, Steve needs to perform the following steps: Create a directory, /usr/share/fonts/local/, if it does not already exist.
  • 6. Add the directory created in the first step to the Xfs FontPath as root directory. Copy the new font files to the /usr/share/fonts/local directory. Update the font information of the system. Change to the /usr/share/fonts/local directory. Restart Xfs so that the X clients can use the new fonts. c. To add fonts, Steve needs to perform the following steps: Create a directory, /usr/share/fonts/local/, if it does not already exist. Copy the new font files to the /usr/share/fonts/local directory. Change to the /usr/share/fonts/local directory. Update the font information of the system. Execute the chkfontpath command to add the directory, /usr/share/fonts/local/ to the Xfs FontPath as root directory. Restart Xfs so that the X clients can use the new fonts. d. To add fonts, Steve needs to perform the following steps: Create a directory, /usr/share/fonts/local/, if it does not already exist. Add the directory created in the first step to the Xfs FontPath as root directory. Change to the /usr/share/fonts/local directory. Copy the new font files to the /usr/share/fonts/local directory. Update the font information of the system. Restart Xfs so that the X clients can use the new fonts. Correct Answer: -> c 20/ Steve is working as a system administrator at the Smart Software Developers. The company has 50 client computers and one Linux server on the network. Steve updates the Linux server regularly by installing Linux patches. He checks the boot directory each time, to obtain the kernel information and to make sure that the Linux patches are compatible with the kernel version. To avoid searching the boot directory for obtaining the kernel information, Steve wants to display this information at the login prompt. How should Steve display the information on the login prompt? a. Edit the rc.sysinit file to reflect the kernel information at the login prompt b. Edit the rc.serial to reflect the kernel information at the login prompt c. Edit the rc.local to reflect the kernel information at the login prompt d. Edit the rc.news to reflect the kernel information at the login prompt Correct Answer: -> c 21/ Jim Lewis a system administrator at Deez Inc. is working on Linux platform. All the employees of the application development department are working on critical projects. Therefore, regular backup is required to save the data of the developers. Jim is assigned the task of taking weekly backup of data. After taking the backup of files, Jim wants to display the list of files, which have been backed up. Which of the following command should Jim execute to display the list of files? a. Execute the tar –x command b. Execute the tar –c command c. Execute the tar –v command d. Execute the tar –p command Correct Answer: -> c 22/ Steve installs kernel of version 2.2 on his computer. After the installation, he notices that one of the devices is not supported by this version of the kernel. Steve upgrades the kernel from version 2.2 to 2.4 to get support for that device. However, after installation of the kernel of version 2.d. Steve is unable reboot the computer. Why is Jim not able to boot the computer and how should he solve the problem? a. The kernel of version 2.4 has not overwritten the kernel of version 2.2. Jim needs to boot the system in the single-user mode by using a floppy disk or a CD-ROM to resolve the problem. b. The kernel of version 2.4 has not overwritten the kernel of version 2.b. but it is copied
  • 7. in the /root directory. Jim needs to boot the system in the rescue mode by using a floppy disk or a CD-ROM to resolve the problem. c. The kernel of version 2.4 has overwritten the kernel of version 2.2 and the boot loader configuration file is not updated accordingly. Jim needs to boot the system in the rescue mode by using a floppy disk or a CD-ROM to resolve the problem. d. The kernel of version 2.4 has not overwritten the kernel of version 2.2 and the newly compiled kernel, bzImage, is copied in the /boot directory and the boot loader configuration file is updated accordingly. Jim needs to boot the system in the multiuser mode by using a floppy disk or a CD-ROM to resolve the problem. Correct Answer: -> c 23/ Jim Lewis wants to create a filesystem so that he can access other filesystems from a remote computer containing Linux operating system. Which type of filesystem should Jim create? a. ReiserFS b. Journaled File System c. NFS d. SMBFS Correct Answer: -> c 24/ Steve Irving is working as a system administrator at Super Graphics. A new user, Michael joins Super Graphics as a software developer. Steve needs to share a filesystem to enable Michael to access data from his computer. Steve has to opt for the type of filesystem, which would enable Michael to access the filesystem from a remote computer running on Windows NT Server operating system. Which type of filesystem can Steve create? a. SMBFS b. NFS c. JFS d. ReiserFS Correct Answer: -> a 25/ David Johnson is working as a system administrator with Super Graphics. The employees of the organization use OpenOffice.Draw package of Linux to create graphical designs. Jerry Smith, working as an audio-visual expert observes that his computer does not produce good quality sound. Therefore, she asks David to change the soundcard of her computer. David inserts a new sound card on Jerry's computer and downloads the module for the sound card, through the Internet from the vendor's Web site. Now, David wants to install the module for the sound card in the kernel of Jerry's computer. However, David wants to load the module for the sound card in the kernel even if the current kernel version installed in the computer and the version of the kernel for which the module is created are not same. Which command should David use to perform the given task? a. insmod -o [module_name] b. insmod –s [module_name] c. insmod -f [module_name] d. insmod -p [module_name] Correct Answer: -> c 26/ John requires some data from a file stored in a directory on a floppy disk. His computer has Linux operating system. After finishing his work, John unmounts the floppy disk. For this, he executes the umount command as shown below: # umount /dev/fd0 However, the system displays an error message, “Device is busy”. Which of the following
  • 8. steps will help John identify and solve the problem? a. Determine the current directory. If the current directory is located on the floppy disk, change to a directory that is not located on the floppy disk. Unmount the floppy disk b. Determine the current directory. Execute the rm –r command to delete the directory on the floppy. Unmount the floppy disk c. Determine the current directory. Delete the file on the floppy. Unmount the floppy disk. d. Determine the current directory. Execute the rm --r command to delete the directory on the floppy. Unmount the floppy disk Correct Answer: -> a 27/ Debbie Howe, an employee of SuperGraphics needs to access the file containing the daily schedule information of the project on which he is working. This file is located on the computer of Ken Bruton, the team leader at the company. Ken had the dual operating system, Windows 2000 and Linux installed on his computer. The file was created on Windows 2000. As the Windows 2000 Server has crashed on Ken’s computer, he boots the computer using Linux. Ken tries to mount the file from Windows 2000 to Linux using the mount command. The system generates an error displaying, ‘Virtual File Allocation table (VFAT) file system is not supported’. Ken informs the system administrator about the problem. What could be the cause of the error? a. Ken does not have the read permissions for the files, which he wants to access. b. Linux does not have the necessary modules required to support the Windows filesystems. c. The file that Ken is trying to access is not exported by the system in which it is stored. d. Another filesystem is mounted on the same mount point as that of the filesystem, which Ken wants to access. Correct Answer: -> b 28/ You are working as a system administrator at Global Systems Inc. You need to create an alternate file hierarchy in the /etc/sysconfig/networking directory on the server, which is using ISDN network interface. Which command will you run to perform this task? a. ifconfig b. neat c. mii-tool d. netconfig Correct Answer: -> b 29/ Chris is working as an assistant system administrator at Multi Store Inc. Chris finds that Sendmail and IMAP services are not functioning properly. Which of the following log files should Chris check to find out the errors that are logged? a. Check the entries in the /var/log/message log file. b. Check the entries in the /var/log/maillog log file. c. Check the entries in the /var/log/htpd log file. d. Check the entries in the /var/log/samba log file. Correct Answer: -> b 30/ Which of the following files contain the information about the system memory that is currently in use? a. /system/meminfo b. /proc/memoryinfo c. /proc/cpuinfo d. /proc/meminfo Correct Answer: -> d 31/ Pat Greene is working as system administrator at Safest Software Inc. Pat is required to monitor the systems of the company to administer the network resources efficiently in the Linux environment. For this, Pat needs information about the processes, memory,
  • 9. paging, block IO, traps, and CPU activity of the computers. In addition, he also needs to display an updated report on the virtual memory statistics. How should Pat accomplish the given task? a. He needs to run the following command: # vmstat <delay> b. He needs to run the following command: # iostat –v c. He needs to run the following command: # iostat –d d. He needs to run the following command: # vmstat –n Correct Answer: -> a 32/ Ken Burton is working as system administrator at Indestructible Boxes Inc. Peter, an employee of the company complains to Ken about the slow processing speed of his computer. For this, Ken decides to create a swap space named /dev/hdc9 on his computer to increase the available amount of RAM. After creating and activating the swap space, Ken restarts the computer. Ken notices that processing speed of the computer has still not increased. What task should Ken perform to solve the given problem? a. Ken needs to edit the /etc/fstab file, and add the following entry to activate the swap space, as follows: /dev/hdc9 swap swap defaults 00 b. Ken needs to edit the /etc/fstab file, and the following entry to activate the swap space, as follows: /dev/hdc9 swap ext3 defaults 00 c. Ken needs to edit the /etc/fstab file, and add the following entry to activate the swap space, as follows: /dev/hdc9 swap ext3 defaults 11 d. Ken needs to edit the /etc/fstab file, and add the following entry to activate the swap space, as follows: /dev/hdc9 swap swap defaults 11 Correct Answer: -> a 33/ Steve is working as a system administrator at Smart Software Developers. The company has 50 client computers and one Linux server on the network. The company has opened a new branch at Houston for the Finance department. The management asks Steve to create a file system that prevents the data loss in case of a power failure or a system breakdown. Therefore, Steve creates the ext3 filesystem on the /dev/hdc8 partition of the Linux server. After a few months, Steve decides to resize the partition due to some disk space constraints. Steve uses the resize2fs disk utility to resize the partition. However, Steve fails to resize the partition. What could be the cause of the problem? a. Steve has not updated the /etc/fstab file to change the ext3 filesystem to the ext2 filesystem. b. The ext3 filesystem cannot be converted into ext2 filesystem so resize2fs utility cannot be used. c. The ext3 supports only tune2fs command to resize the partition. d. The ext3 file system does not support the resize2fs disk utility. Correct Answer: -> d 34/ Debbie Howe is working as a system administrator with True Travel Services. The organization uses a network printer across all departments. However, recently the printer is not working properly. Debbie has been communicated reports that on accessing the printer, it displays an error message: bash: /dev/lp0: Permission denied. How should Debbie troubleshoot the problem? a. Debbie needs to provide access control to enable the users of the remote hosts to print
  • 10. to the printer by performing the following steps: Open the /etc/hosts file. Add the IP addresses of the remote hosts. Stop and restart the print service. b. Debbie needs to provide access control to enable the users of the remote hosts to print to the printer by performing the following steps: Open the /etc/host.deny file. Add the IP addresses of the remote hosts. Stop and restart the print service. c. Debbie needs to provide access control to enable the users of the remote hosts to print to the printer by performing the following steps: Open the /etc/printcap file. Add the IP addresses of the remote hosts. Stop and restart the print service. d. Debbie needs to provide access control to enable the users of the remote hosts to print to the printer by performing the following steps: Open the /etc/hosts.equiv file. Add the IP addresses of the remote hosts. Stop and restart the print service. Correct Answer: -> d 35/ Tom Wilkins is the system administrator at Red Sky IT Systems that uses Linux for all business purposes. Tom has implemented a Linux based LAN in the organization and has installed a print server on the LAN. He has also installed the LPRng service on the print server. The employees of all the departments use the print server to print their documents. They submit their print jobs using the lpr command. However, the employees of the Accounts department complain that the printer is taking a long time to print the documents. The employees request Tom to restrict the print commands given by the other departments until the Accounts documents have been printed. How should Tom resolve the problem? a. Execute the lpc –disable command. b. Edit the /etc/lpd.conf file. c. Execute the lpc – abort command d. Edit the /etc/printcap file. Correct Answer: -> c 36/ Steve is assigned the task of installing Linux on a computer on which Windows 98 is already installed. He does not have the bootable Linux CD-ROM. Which type of installation method would Steve prefer to install Linux? a. Use an FTP Server b. Use the Hard Drive c. Use an HTTP Server d. Use a CD-ROM Correct Answer: -> b 37/ John is recently recruited as a software developer in Smart Software Developers. He has been assigned the task of developing an accounting application. For this, John requires accounting package software for his computer. Chris, the system administrator at Smart Software Developers, has been assigned the task for installing the software on Chris’s computer. For this, Chris wants information about the directory that contains initialization scripts related to the installed software packages. Which directory will Chris use to perform this task? a. /etc/profile.d b. /etc/bashrc c. ~/.bash_profile d. /etc/profile
  • 11. Correct Answer: -> a 38/ Jim Lewis is working as a system administrator with New Tech Books. The network setup of the organization is based on Linux. Jim has recently installed and configured a Linux server at a remote location. He has also created user accounts for all the employees of the organization on the remote server. Diane Frye, the head of the Sales department is creating the annual sales report of the organization. Diane has created a folder, Sales_Report, in her home directory and placed all the files related to the annual sales report of the organization in that folder. Diane has also assigned all the access permission to the files that she has created and asked the members of her department to access the files from the Sales_Report folder. After one week, Diane finds that someone has removed some files from the Sales_Report folder. However, Diane does not want to change the access permission on the files. Therefore, Diane reports the matter to Jim and asks Jim to set such permissions on the Sales_Report folder so that no other users except her or system administrator, can remove any files from the folder. What should Jim do to perform the task? a. Set setUID bit permission on the Sales_Report directory by using the command, chown u+s Sales_Report. b. Enable sticky bit permission on the Sales_Report directory by using the command, chmod +t Sales_Report. c. Set setGID bit permission on the Sales_Report directory by using the command, chown g+s Sales_Report. d. Remove setUID bit permission on the Sales_Report directory by using the command, chmod u–s Sales_Report. Correct Answer: -> b 39/ Tom Wilkins works as a network administrator at Supersoft2000. The employees of the organization use Linux platform to work on their projects. Tom installs DHCP server on the network to assign IP addresses to the client computers. Jim Lewis, an employee of Supersoft2000 needs to check the IP addresses assigned to his computer. For this, Jim executes the ifconfig command. However, the command does not show the IP addresses of his computer. Jim informs Tom about the problem and asks him to resolve it. How can Tom troubleshoot the problem? a. Configure the /etc/dhcpd.conf file and restart dhcpcd daemon. b. Execute the command, route add –host 255.255.255.255 dev eth0 c. Execute the dhcpcd command with the –f option. d. Check all the DHCP servers on the network, including any Microsoft Windows DHCP server that might have assigned the IP addresses to Jim’s computers. Correct Answer: -> a 40/ Corrine Wallace is working as an IT consultant at Blue Moon Computers. The organization is planning to implement an IT infrastructure. The management of the organization notices that organization requires servers at every level of business operations to implement IT infrastructure. Therefore, organization assigns Corrine the task of planning server solutions for business operations, such as caching services and proxy services. The organization also asks Corrine to plan server solutions for domain naming, directory, firewall and security services. In addition, the organization asks Corrine to implement servers that can effectively provide services to end users in spite of the heavy load on it. Which servers Corrine need to implement to perform the task? a. Corrine needs to implement web and infrastructure servers. In addition, Corrine needs to implement high-end servers, such as OLTP Med and BI servers. b. Corrine needs to implement workgroup and infrastructure servers. c. Corrine needs to implement web and workgroup servers. d. Corrine needs to implement web and infrastructure servers. Correct Answer: -> a
  • 12. 41/ Pat Wilkins is working as an assistant system administrator at New Tech Bookstore. Pat wants to check whether IP forwarding is disabled or enabled on the Linux server. Which command will Pat execute to perform the given task? a. # ls /proc/sys/net/ipv4 b. # vi /etc/sysctl.conf c. # echo "1" > /proc/sys/net/ipv4/ip_forward d. # cat /proc/sys/net/ipv4/ip_forward Correct Answer: -> d 42/ Lee is a system administrator at Countrywide Markets. John a software developer wants a package to be installed on his computer. John asks Lee to install the required package on his computer. However, when Lee starts installing the package, the system displays a message that the package is already installed. Which command can Lee use to upgrade the package? a. rpm -e b. rpm -h c. rpm -I d. rpm -F Correct Answer: -> d 43/ Bob is working, as an assistant system administrator at Global Systems Inc. Bob wants to invoke the services that a kernel provides for various processes running on a computer, such as reading the contents of a file. Which kernel module, Bob should use to perform the above task? a. Device driver b. System call c. Network Driver d. Executable Interpreter Correct Answer: -> b 44/ Larry Williams is working as network administrator at Smart Software Developers. Recently, the organization has been facing frequent power failures. To protect the data, the domain administrator of the organization wants Larry to backups all the servers of the company daily at 6:00 P.M. The domain administrator wants Larry to automate the process. How should Larry automate the process of backing up? a. Use /etc/at.allow configuration file b. Use /etc/crontab file configuration file c. Use /etc/cron.daily configuration file d. Use /etc/at.deny files configuration file Correct Answer: -> b 45/ Donna Johnson is working as system administrator at New Tech Books. The employees of the New Tech Books have the ext2 filesystem implemented on the partition / dev/hdc8 on their systems. They need to access NFS server for sharing and storing their data. However, NFS server has the ext3 filesystem configured on it. Therefore, Steve needs to make the ext2 filesystem compatible with the ext3 fileystem. How should Donna troubleshoot the given problem? a. To convert the ext2 filesystem into the ext3 filesystem, Donna needs to perform the following steps: 1. # /sbin/tune2fs -j /dev/hdc8 ( 2. # /sbin/e2fsck -y /dev/hdc8 ( 3. Mount the ext3 filesystem if there are no errors by using _ the following command: # mount –t ext3 /dev/hdc8 /mnt/NewPartition ( 4. Update the filesystem type option in the /etc/fstab file to _ automount the
  • 13. filesystem after the system is restarted. b. To convert the ext2 filesystem into the ext3 filesystem, Donna needs to perform the following steps: 1. # /sbin/e2fsck -y /dev/hdc8 ( 2. # /sbin/tune2fs -j /dev/hdc8 ( 3. Mount the ext3 filesystem if there are no errors by using _ the following command: # mount –t ext3 /dev/hdc8 /mnt/NewPartition ( 4. Update the filesystem type option in the /etc/fstab file to _ automount the filesystem after the system is restarted. c. To convert the ext2 filesystem into the ext3 filesystem, Donna needs to perform the following steps: 1. # /sbin/e2fsck -y /dev/hdc8 ( 2. # /sbin/tune2fs -j /dev/hdc8 ( 3. Update the filesystem type option in the /etc/fstab file to _ automount the filesystem after the system is restarted. 4. Log on as the root user and mount the partition, which _ contains the ext2 filesystem as follows: # mount /dev/hdc8 ( d. To convert the ext2 filesystem into the ext3 filesystem, Donna needs to perform the following steps: 1. # /sbin/e2fsck -y /dev/hdc8 ( 2. # /sbin/tune2fs -j /dev/hdc8 ( 3. Update the filesystem type option in the /etc/fstab file to _ automount the filesystem after the system is restarted. 4. Log on as the root user and unmount the partition, which _ contains the ext2 filesystem as follows: # umount /dev/hdc8 ( Correct Answer: -> a 46/ Safest Software Inc. is a leading software export organization that has opened a new branch office at Singapore to expand their business in Asia Pacific. The branch office has 150 client computers and three servers on their network based on Linux operating system. Steve is appointed as a system administrator at the branch office. All the clients are working in the desired runlevel to support the applications used by the organization. The organization has to export software that requires the multimedia-enabled computers. The software needs to be tested on Linux computers before exporting it. John, a testing engineer is assigned the task of testing the multimedia application, but he is unable to open that application. John asks Steve to solve the problem. How should Steve solve the problem? a. Steve should set the default runlevel to 1 to start the Linux server in graphical mode. b. Steve should set the default runlevel to 5 to start the Linux server in graphical mode. c. Steve should set the default runlevel to 6 to start the Linux server in graphical mode. d. Steve should set the default runlevel to 4 to start the Linux server in graphical mode. Correct Answer: -> b 47/ Christine Turner needs to send an important file to Mary Peterson, who is working at the head office. For this, the system administrator needs to configure a route so that the file can be transferred to Mary’s computer, with the IP address 192.165.0.150 However, on executing the command, the computer displays an error stating gbroadcast: Unknown host. How should the system administrator troubleshoot the error? a. The system administrator needs to add the name of the host in the /etc/hosts file: 192.168.0.130 gbroadcast Next, Christine needs to execute the following command: # route add –net gbroadcast dev eth0
  • 14. b. The system administrator needs to add the name of the host in the /etc/hosts file: 192.165.0.150 gbroadcast Next, Christine needs to execute the following command: # route add –net gbroadcast dev eth0 c. The system administrator needs to add the name of the host in the /etc/hosts file: 192.165.0.150 broadcast Next, Christine needs to execute the following command: # route add –host gbroadcast dev eth0 d. The system administrator needs to add the name of the host in the /etc/hosts file: 192.165.0.150 gbroadcast Next, Christine needs to execute the following command again: # route add –host gbroadcast dev eth0 ( Correct Answer: -> d 48/ Jim Lewis is the system administrator with Desktop Computers. He has configured a Linux based LAN in the organization and has installed a print server on the network. Jim has configured both LPRng and CUPS services on the print server to manage multiple packages that provide the same service. He needs to add a group of alternatives to the system and specify the name of a master link. For this, Jim executes the alternatives link -- set command, and observes that the command is not working. What could be the problem and what should Jim do to resolve the problem? a. The set option is used only to set alternatives and its links. Jim needs to execute the alternatives name --install command to perform the required tasks. b. The set option is used only to set alternatives and its links. Jim needs to execute the alternatives link --install command to perform the required tasks. c. The link option is incorrect. Jim needs to execute the alternatives name –set command to perform the required tasks. d. The specified command is incorrect. Jim needs to execute the alternatives name --display command to perform the required tasks. Correct Answer: -> a 49/ Pat Greene is working as a system administrator at IBG Inc. Pat has created a partition in his system to develop and save the application. The maximum file size of 2 GB is sufficient for Pat to perform his work. The filesystem that he will be using, stores the state of the filesystem in the superblock, and uses this state to verify whether the filesystem contains any errors. Pat needs journaling feature in the filesystem to ensure no data is lost due to system failure. Therefore, Pat wants to create the filesystem that supports the above features. Which filesystem can Pat use to develop the application? a. ext2Fs b. ext3 c. JFS d. SMBFS Correct Answer: -> b 50/ Smart Solutions Corp is recruiting new employees to expand their customer base. A new employee, Michael joins the organization and is assigned a project that was earlier being handled by Susan. Steve, the system administrator, has changed the ownership of files that contains the required information and set the particular option so that no error message is displayed, if the specified file does not exist at user end. Which command should Steve use for the task? a. chown –R b. chown -f c. chown -v d. chown -c Correct Answer: -> b
  • 15. 51/ Martina is working as a system administrator in PQR Corp. Martina finds that some of the computers are displaying an error message, lp: error –no default destination available, while giving the command for printing the documents. Which task should Martina perform to troubleshoot this problem? a. Remove the paper that is stuck in the printer. b. Insert fresh paper in the tray. c. Switch on the power supply after checking that the plug is in the socket. d. Install and configure the printer. Correct Answer: -> d 52/ Donna Bard, a system administrator with Countryside Markets, uses Linux as the operating system. She wants to view the group ID of a customer named Mike Womack. When Donna executes the command, grep Mike Womack /etc/passwd, the system raises an error stating “grep: Wall: no such file or directory” before displaying the required information. How should Donna troubleshoot the problem? a. # grep ‘Mike Womack’ /etc/passwd b. # grep MikeWommack /etc/passwd c. # grep "Mike Womack" /etc/passwd d. # grep `Mike Womack` /etc/passwd Correct Answer: -> c 53/ Donna Bard works as a network administrator at Countryside Markets. All the employees of the organization work on Linux platform. Various DHCP servers, which assign IP addresses to the computers, are installed on the network. Donna configures the dhcpcd daemon, which broadcasts the request to the DHCP servers to get an IP address. After configuring the daemon, Donna starts her computer. However, Donna notices that the IP address is not assigned to her computer. Donna verifies whether the dhcpcd daemon is running properly or not. She finds that the dhcpcd daemon is running fine. How can Donna troubleshoot the problem? a. Execute the command: route add –host 255.255.255.255 dev eth0 b. Check whether the information in the /etc/dhcpd.conf file is correct. c. Execute the dhcpcd command with the –r option. d. Execute the dhcpcd command with the –f option. Correct Answer: -> d 54/ Nancy Jones is working as a system administrator with Red Sky IT Systems. The network setup of the organization is based on Linux. All employees of the organization save data in their respective home directory on the Linux server. The management of the organization has assigned Nancy the task of taking the backup. Therefore, Nancy configures a central backup server with multiple backup tape drives. Nancy also wants to create the backup from all the disks listed in the disklist file in the backup server using a single command. In addition, Nancy wants the backup server to send an e-mail message reporting the files that failed to be backed up and the files that were successfully backed up after creating the backup. Which backup utility should Nancy implement to perform the required task? a. Nancy should use the Amanda utility. b. Nancy should use the Veritas utility. c. Nancy should use the dump/restore utilities. d. Nancy should use the cpio utility. Correct Answer: -> a 55/ Donna is an in-house network administrator at Multi Marketing Inc. Donna needs to store the print queue definitions manually, instead of using the redhat-config-printer tool. Which configuration file will Donna use to perform this task? a. /etc/printcap
  • 16. b. /etc/lpd.conf c. /etc/lpd.perms d. /etc/printcap.local Correct Answer: -> d 56/ Consider the following statements: Statement A: You can assign more then one IP address to an NIC. Statement B: You need to create a new configuration file for each NIC that is installed on your computer. Which of the following is true, with respect to the above statements? a. Statement A is true and statement B is false. b. Statement A is false and statement B is true. c. Both, statements A and B, are true. d. Both, statements A and B, are false. Correct Answer: -> c 57/ Consider the statements: Statement A: The passwords should be easy to decipher. Statement B: The passwords should be of adequate length. Which of the following is true, with respect to the above statements? a. Statement A is true and statement B is false. b. Statement A is false and statement B is true. c. Both, statements A and B, are true. d. Both, statements A and B, are false. Correct Answer: -> b 58/ You are the assistant system administrator at Deez Inc. and are required to set a default printer, HP DeskJet on the Sales Manager’s computer. The printer should be configured to queue the print jobs. Which command should you use for the above task? a. lpadmin b. lpstat c. lp d. lpr Correct Answer: -> a 59/ Peter Irvin is the domain administrator at Mountain Marketing Inc. He has scheduled tasks such as, executing scripts, backing up data and executing the echo command on his computer, such that they are performed automatically at different timings in a day. During the day, how should Peter view the list of the jobs that are yet to be executed? a. atq command b. at command c. cron command d. atrm command Correct Answer: -> a 60/ Larry Williams is working as domain administrator at Technology Systems. To automate the installation process, Larry has installed Linux on his computer with the help of the kickstart file. Larry needs to install three group packages ServerSystem, WindowsSystem, and WindowsSoftware and two individual packages ClientSystem and MasterSystem on his computer. How should Larry perform the task? a. Larry needs to make the following entries in the kickstart file: ### Package Installation %package @ServerSystem @WindowsSystem @WindowsSoftware
  • 17. ClientSystem MasterSystem b. Larry needs to make the following entries in the kickstart file: ### Package Installation %package @ ServerSystem WindowsSystem WindowsSoftware ClientSystem MasterSystem c. He needs to make the following entries in the kickstart file: ### Package Installation %package @ ClientSystem @ MasterSystem ServerSystem WindowsSystem WindowsSoftware d. He needs to make the following entries in the kickstart file: ### Package Installation %package @ ServerSystem @ WindowsSystem @ WindowsSoftware ClientSystem MasterSystem Correct Answer: -> d 61/ Steve Irving is working as the system administrator at Global Systems Inc., which uses Linux for all business purposes. The organization is working on a project, which requires the team leaders to frequently communicate with each other and with the client. The e-mail utility is not supported efficiently by the existing operating system. Therefore, the management has asked Steve to upgrade the operating system installed on the computers of all the team leaders. Steve has decided to perform this task automatically using a kickstart file. Steve logs on to Jim, a team leader’s system and executes the command cp anaconda – ks.cfg ks.cfg to create a kickstart file. However, the command is not working. What is the problem and how can Steve solve it? a. The specified root directory is incorrect. Steve should use the name, ethereal, as the root directory. b. The kickstart command can be created only by a root user. Steve needs to log on as the root user and execute the specified command. c. The command executed is incorrect. Steve needs to use the Kickstart Configurator utility to create the kickstart file. d. The order of specifying the kickstart sections is incorrect. The order of kickstart sections should be command, %pre, %package, and %post. Correct Answer: -> b 62/ The project team of the Software Development department is not able to save their work on the server. When they try to save their work on the server, it shows an error message that there is no space on the hard disk. Therefore, David, the system administrator resizes a partition on the hard disk of the server, which has been allocated for user data. After resizing the partition, when David tries to boot the server he finds that the boot partition fails to mount the boot partition. What is the reason that the boot partition, on the server, fails to mount the boot partition and how should David resolve the error?
  • 18. a. The problem occurs because the partition number of the boot partition, /, is changed. To resolve the error, David needs to switch to the single-user mode and change the entry corresponding to the path of the / partition in the /etc/fstab file. b. The problem occurs because the partition number of the boot partition, /, is changed. To resolve the error, David needs to switch to the emergency mode and change the entry corresponding to the path of the / partition in the /etc/fstab file. c. The problem occurs because the partition number of the boot partition, /, is changed. To resolve the error, David needs to reboot the system in a runlevel and change the entry corresponding to the path of the / partition in the /etc/fstab file. d. The problem occurs because the partition number of the boot partition, /, is changed. To resolve the error, David needs to boot the system in the rescue mode and change the entry corresponding to the path of the / partition in the /etc/fstab file. Correct Answer: -> d 63/ Steve is the system administrator with Red Sky IT Systems. The management of the organization has assigned Steve the task of providing print service to some of the employees of the organization. The employees of the IT department and the Accounts department, at Red Sky IT Systems, want to install printers, locally. Steve decides to install the various printers and configure them using the CUPS daemon to fulfill the requirements of both the departments. Steve also wants to record the information about all the local available printers in both the departments and the new jobs given to the printers. How can Steve perform these tasks? a. Steve can record the information by using the lpstat command, editing the /etc/printcap.local file and then executing the lpadmin command. b. Steve can record the information by using the lpstat command and editing the Info parameter and the Accepting parameter in the /etc/cups/printers.conf file. c. Steve can record the information by using the lpstat command and configuring the LPRng service. d. Steve can record the information by using the lpstat command and editing the Info parameter and the Accepting parameter in the /etc/cups/cupsd.conf file. Correct Answer: -> b 64/ Consider the statements: Statement A: A parallel port sends one bit of information at a time. Statement B: A serial port sends eight bits of information at a time. Which of the following statements is correct? a. Statement A is true and statement B is false. b. Statement A is false and statement B is true. c. Both, statements A and B, are true. d. Both, statements A and B, are false. Correct Answer: -> d 65/ Steve works, as a system administrator at Global Systems Inc. Steve needs to store the data of all the employees centrally at the Linux server. He also wants to ensure that no data is duplicated across the hard disks. For this, Steve decides to divide the data into strips to store the data across all the hard disks in an array. Which RAID configuration does Steve use for the preceding requirements? a. Linear RAID b. Level 0 c. Level 1 d. Level 5 Correct Answer: -> b 66/ Chris, the system administrator of the company adds a route from his computer to John’s computer by executing the route add –host 192.168.16.66 dev eth0 command. Chris’s computer raises an error, 192.168.16.66: Unknown host. Which of the following
  • 19. task should Chris perform to solve this problem? a. Add the name of the host in the /etc/hosts file of the computer. b. Check all the DHCP servers in the network. c. Add the dhcpcd daemon to the boot-up script, (/etc/sysconfig/network-scripts/ifup) d. Execute the dhcpcd command with the –f option. Correct Answer: -> a 67/ Ronald Billing works as a system administrator at Mastery Mechanics. The organization has installed a network printer, which is used by various systems over the network for printing the documents related to various projects. The printer is not working properly since last couple of days. Therefore, Ronald replaces the printer with a new one, configures it and starts the print service. However, when John, an employee of the organization uses the printer, a problem occurs. The printer shows a staircase effect. John informs Ronald about the problem. How can Ronald troubleshoot the problem that occurs while printing the documents? a. 1. Open the /etc/hosts.equiv or the /etc/hosts.lpd file. 2. Stop and restart the print service. b. 1. Open the /etc/hosts.equiv or the /etc/hosts.lpd file. 2. Add the IP addresses of the remote hosts. 3. Stop and restart the print service. c. 1. In the printtool utility, edit printer entry and click on Select _ button to open the Configure Filter dialog box. 2. Select the correct driver for your printer. d. 1. In the printtool utility, edit printer entry and click on select _ button to open the Configure Filter dialog box. 2. Select the Fix stair-stepping text option under the Printing _ Options section. Correct Answer: -> d 68/ Jim Wilkins is working as a storage administrator at Blue Moon Computers. Jim implements Integrated Device Electronics (IDE) to determine the physical limits of the storage scalability in the organization. However, the organization wants Jim to extend a system’s local storage beyond the limitations of IDE. Which of the following Jim can implement to perform the task? a. Fibre Channel–based storage b. SCSI c. iSCSI a. a and b both b. Only a c. Only b d. a and c both Correct Answer: -> d 69/ Steve Irvin is working as an IT consultant at Red Eye Experts. The organization consists of 5000 desktops running on multiple platforms, such as Linux and Windows, and connected through LAN and WAN. Steve needs to identify a tool to automate and centralize the management of desktops in the organization. He also needs to identify a tool that can implement policy-based management of desktops in the organization. Which tool should Steve select for this? a. WebTMA b. Unicenter’s Desktop Management Solution c. Radmin d. PMP 6.0 Correct Answer: -> b 70/ Which of the following activity should be performed to manage VPNs in an enterprise? a. Use a secure remote syslog server to make it difficult for the malicious user to
  • 20. manipulate the log. b. Enforce strong authentication based on the volume of remote users and value of the resources that are being accessed. c. Use biometrics mechanisms to protect IT infrastructure from thefts or unauthorized attacks. d. Ensure that all executable files, which you receive in the organization through e-mail, are checked and approved. Correct Answer: -> b 71/ Donna Johnson is working as an IT Consultant in Super Software 2000. Super Software 2000 is a large organization, which is spread across many countries and functions through distributed network system. Donna is getting complaints regarding performance problems in Internet, intranet, and extranet resources of the organization. Which of the following tool or solution should Donna use to monitor and troubleshoot LAN, WAN, and VLANs? a. HP OpenView Network Management Solution b. Unicenter Network Management Solution c. Observer 10.1 d. LANBrowser 1.3 Correct Answer: -> b 72/ Jim Lewis is working as a system administrator at Good Graphics Inc. Jim wants to use a multi-platform security management solution that can provide plug-in-integration between the security tool and the solution to collect the alerts. Which one of the following solution should Jim use to perform the required task? a. HP OpenView Security Management Solution b. IBM Tivoli Security Compliance Manager c. LANBrowser 1.3 d. WebScout 2.1 Correct Answer: -> a 73/ Red Eye Systems Inc. is a software development company. The company is planning a new software development facility in Arizona. This facility will develop system software in C/C++ on UNIX platform. Because this is a new project the company does not want to invest heavily in computing resources. In addition, the development process does not require too many resource consuming tools, except for C/C++ compilers, CLI debugging and testing tools and UNIX platform. The programmers will not be allowed to share files and folders as the code will be integrated in the next step of the SDLC. Which of the following computing model would you suggest to the company as a networking consultant? a. Centralized network computing model with thin clients b. Centralized network computing model with thick clients c. Distributed network computing model with thick clients d. Collaborative network computing model Correct Answer: -> a 74/ Which of the following can be termed as necessary services? a. Services that must be available at peak load b. Services essential to operation c. Services that must be available, but can be available at reduced performance. d. Services that can be postponed indefinitely Correct Answer: -> c 75/ Consider the following statements: Statement A: Optional services are the services that must be available at peak load. Statement B: Integrity requirements of QoS maintain the definiteness of the interaction between the server and the user.
  • 21. Which of the following is correct? a. Both, statement A and B are true b. Statement A is true and statement B is false c. Statement A is false and statement B is true d. Both, statement A and B are false Correct Answer: -> c 76/ Donna Johnson is working as an IT consultant at Red Eye Experts. The organization needs to implement effective server solutions to increase employee productivity and reduce operating costs. Donna is assigned the task of implementing servers that can handle the services running in the HPC layer of the server deployment architecture of the organization. The organization also asks Donna to implement servers for file and printing services. Which servers Donna will implement to perform the task? a. Donna needs to implement high-end servers, such as OLTP Med and BI servers. b. Donna needs to implement infrastructure servers. c. Donna needs to implement servers that have large memory, can store very large data sets, and can take load of high transaction volumes, such as ERP Large servers, OLTP Large servers. In addition, Donna needs to implement workgroup servers. d. Donna needs to implement high-end servers, such as HPC servers and OLTP large. Correct Answer: -> c 77/ Which of the following is caused by variations in queue length and the processing time needed to reorder packets arrived out of order due to travelling over different paths? a. Jitter b. Throughput c. Availability d. Packet loss Correct Answer: -> a 78/ Mike Womack is working as a storage administrator at Red Eye Experts. Mike is assigned the task of selecting an efficient storage technology for the organization that suits its requirements. The organization wants Mike to select a storage technology that can enable multiple users to share the same storage space thus minimizing the overall overheads by centrally managing hard disks. Which storage technology Mike should select to perform the assigned task? a. Redundant Array of Inexpensive Disks b. Tape Drives c. Storage Area Networks d. Network-Attached Storage Correct Answer: -> d 79/ Larry Williams is working as a network administrator in Blue Valley Consulting. Larry is assigned the task of selecting an appropriate network technology in the enterprise. Larry needs to set up networks within a building of the enterprise. Therefore, Larry chooses LAN technology to be implemented in the building. Larry observes that there are too many computers, which are required to be attached to LAN. Therefore, Larry needs a technology that reduces the number of data packet collisions and can deliver up to 80 percent of the maximum bandwidth available. In addition, Larry needs to decide the physical media that have multiple pairs of wires to connect the computers and reduces network crosstalk by negating the electro-magnetic field. Which of the following combination should Larry choose to perform the required task? a. Token ring and Coaxial cables b. Ethernet and Coaxial cables c. Token ring and Twisted pair cables d. FDDI and Fiber optic cables Correct Answer: -> c
  • 22. 80/ Global Systems Inc. is a software development organization with its three branch offices in different parts of America. John Wilkins is working as system administrator at the head office of the organization at Los Angeles. The employees working at the branch offices complain to John about the poor performance of the FTP server placed at the branch office at New York. To solve the problem, John needs to remotely monitor the CPU, disk, and memory usage of the server. Which tool should John implement to perform the task? a. PMP 6.0 b. Radmin c. Symantec ON iPatch d. PCDuo Enterprise Correct Answer: -> a 81/ Which of the following activity should be performed to manage internet access of an enterprise for security? a. Keep track of who has accessed information each time a device connects to the LAN. b. Keep the version of the operating system updated. c. Block the file types such as EXE, COM, BAT, VBS, and SCR that carry virus. Also block any file type with more than one extension such as, ABC.TXT.VBS. d. Ensure that configuration settings should not be accessible to all users. Only designated people should be able to access them. Correct Answer: -> c 82/ Steve Irwin is an IT Consultant in the head office of Global Systems Inc. The regional offices of Global System Inc. are spread across north, east, south, and west regions. There are 1000 workstations in each office, which run on Windows platform. Steve needs an enterprise-level network management solution, which includes report scheduler for generating deliver reports, packet capture scheduling, and monitor for network delay. Which of the following tool or solution should Steve consider, which contains all these features? a. Unicenter Network Management Solution b. LANBrowser 1.3 c. OpManager 5.5 d. Observer 10.1 Correct Answer: -> d 83/ Steve Irwin is working as a security administrator at Red Eye Experts. Steve has configured Symantec Client Security tool to protect the enterprise client systems from security risks and threats. Steve needs to use the tool to enhance intrusion prevention solutions reducing the time and cost. Which of the following features will enable Steve to perform the required task? a. Optimized out-of-the-box firewall b. Generic Exploit Blocking c. Side effect repairing d. Centralized configuration Correct Answer: -> b 84/ Which of the following requirements represents the degree of being capable of maintaining the service and service quality by a server? a. Performance b. Integrity c. Accessibility d. Reliability Correct Answer: -> d
  • 23. 85/ Lee Johnson is a IT consultant at Red Sky IT system. Lee is assigned the task to plan desktop solutions for the organization. Lee wants to implement the devices that have word processors, spreadsheet applications, calendars, and E-mail clients installed on them. Which type of device should Lee implement to perform the above task? a. Java-based mobile devices b. PALM-based mobile devices c. Windows CE-based mobile devices d. Linux based mobile devices Correct Answer: -> a 86/ SuperSoftware Inc is planning to implement IT infrastructure in the organization. As a part of planning IT infrastructure, SuperSoftware Inc needs to plan for effective desktop solutions to help users to perform day-to-day operations, increase user productivity, and improve business processes. For this, the organization asks Anne Johnson, an IT consultant to analyze the business and technical requirements for planning desktop solutions and identify an appropriate desktop technology on the basis of the requirements. On analyzing the requirements, Donna notices that he needs to select desktop technologies for the desktop users who need to work on packages involving heavy graphics. In addition, Donna needs to select a technology having more storage capacity than phone handsets for the mobile users of the organization. Identify the desktop and mobile technologies that Donna need to select to perform the task? a. Macintosh clients and Java-based mobile devices b. Linux clients and PALM-based mobile devices c. Macintosh clients and PALM-based mobile devices d. Linux clients and Java-based mobile devices Correct Answer: -> c 87/ Which of the following questions you need not answer while finalizing internal access security? a. What are the processes to deal with change in access permissions granted to an employee? b. What are the processes to evaluate the access permissions granted to an employee? c. What are the methods to identify unauthorized access and prevent it? d. What are the administrative levels in the organizations and what data and system access permissions do they need? Correct Answer: -> c 88/ Tom Wilkins is the member of the team planning for an effective storage solution in Red Eye Experts. Red Eye Experts is a very big enterprise spanned across different areas of world, therefore, Tom needs to plan for the storage solution that can be accessed over a network and minimize the overall overheads by centrally managing hard disks. Keeping in mind all these considerations, Tom plans to use NAS in the enterprise that enables multiple users to share the same storage space. Which of the following feature will help Tom to accomplish his task? a. Server attached approach to data storage b. Access to storage pool c. 100 MB/s full duplex data transfer rates d. Data regenerating hard disks Correct Answer: -> a 89/ Steve Irvin is the IT consultant at Red Eye Experts. Steve needs to identify an asset management solution that would enable the IT staff of the organization to access the asset management and maintenance information of the desktops from any location and at any time through the Internet. In addition, Steve needs to identify a scalable asset management solution in which additional modules can be added in future if the organization expands. Identify an appropriate asset management solution.
  • 24. a. Radmin b. Altiris Asset Management Suite c. WebTMA d. ManageEngine ServiceDesk Plus Correct Answer: -> c 90/ Which of following network management tool can be used to secure the network from internal attacks by monitoring event logs? a. Observer 10.1 b. OpManager 5.5 c. Unicenter Network Management d. LANBrowser 1.3 Correct Answer: -> b 91/ Pat Wilkins is a system administrator in the head office of Red Eye Experts, which is a large and complex organization spread across many countries. Pat wants to remove all kinds of complexities that are associated with network management for effective and efficient working of the organization. Donna Johnson is the IT consultant in Red Eye Experts. Pat assigns Donna the task of finding a multi-platform solution that discovers the entire network and can automate several network monitoring tasks. To perform this task, Donna wants a solution that includes WAN monitoring, server monitoring, URL monitoring, and switch monitoring. Which of the following tool or solution is appropriate to include all these features? a. OpManager 5.5 b. HP OpenView Network Management Solution c. LANBrowser 1.3 d. Unicenter Network Management Solution Correct Answer: -> a 92/ Jim Lewis is working as a security administrator in Blue Moon Computers. Jim needs to use a Windows-based tool that monitors and filters Internet access for Web sites and Internet applications. Jim wants that the tool should record the bandwidth and time each user or workstation has spent in accessing Internet on periodic basis. Which of the following tool should Jim use to perform the required task? a. OpManager5.5 b. Observer10.1 c. WebScout 2.1 d. Symantec Client Security Correct Answer: -> c 93/ The management at Bluemoon Computers Inc. wants to secure its network from external intrusions. The computers on the network are running on a number of different operating systems, such as Windows, Solaris, Linux, and Macintosh and have software firewalls installed on them. The management is very cost conscious and also apprehensive that the level of security might not affect the network performance. Therefore, it has been decided that only one extra level of security will be implemented. Which of the following security measures will you suggest as a networking consultant? a. Host-based Intrusion Detection System (HIDS) b. Network-based Intrusion Detection System (NIDS) c. Combination of NIDS and HIDS d. No IDS is required as the computers have firewalls installed on them Correct Answer: -> b 94/ Which of the following business factors enables you to determine the technologies that can be used to establish network connections between different branch offices of an organization?
  • 25. a. Business processes b. Organization structure c. Geographical scope d. Business applications Correct Answer: -> c 95/ Which of the following can be termed as strategic services? a. Services that must be available at peak load b. Services essential to operation. c. Services that can be postponed indefinitely. d. Services provided by servers that must be available, but can be available at reduced performance Correct Answer: -> b 96/ Pat Wilkins is working as an IT Consultant at Global Softwares. Pat is assigned the task to plan desktop solutions for the organization. Pat needs to implement devices that have more storage capacity than phone handsets. The devices should also have the capability to run java-based dynamic applications. Which of the following devices Pat should implement to perform the task? a. Windows CE-based mobile devices b. PALM-based mobile devices c. Java-based mobile devices d. Linux based mobile devices Correct Answer: -> b 97/ Corrine Wallace is working as an IT consultant at Blue Moon Computers. The organization is planning to implement an IT infrastructure. The management of the organization notices that organization requires servers at entry level of business operations to implement IT infrastructure. Therefore, organization assigns Corrine the task of planning server solutions for business operations, such as caching services and proxy services. In addition, the organization is required to provide file and print services. Which servers Corrine will implement to fulfil the requirement of the organization? a. Web servers and Workgroup servers b. Infrastructure servers and Mail servers c. HPC servers and Infrastructure servers d. Workgroup and HPC servers Correct Answer: -> a 98/ Which of the following questions you need to answer while planning security for external access? a. What are the processes to deal with change in access permissions granted to an employee? b. What are the processes to evaluate the access permissions granted to an employee? c. What are the methods to identify unauthorized access and prevent it? d. What are the administrative levels in the organizations and what data and system access permissions do they need? Correct Answer: -> c 99/ Pat Wilkins is working as an IT consultant at Safest Software Inc. The organization is planning for network solutions to facilitate faster information sharing. Pat is assigned the task to determine the number and the type of hardware and software resources required on a network. Pat needs to size the network to perform the task. Which of the following factors Pat needs to consider to perform network sizing: a. Number of Remote Users b. Proactive Fault Management c. Number of People Using the Network
  • 26. d. Software Specifications e. Application Performance a. a, b, c, and e b. a, c, and d c. a, b, c, and d d. b, c, d, and e Correct Answer: -> b 100/ Pat Wilkins is working as a network administrator in Super Software Inc, which is spread over a vast geographical area. Pat needs to use WAN communication service to create an inter-network of networks. Pat needs to use a technology that can support very high-speed data transfers to the tune of 640 kbps in both directions and carries high- speed data and multimedia over telephone lines. In addition, Pat wants another technology, which is used for Point-to-Point networks and for backup for another type of link. Which of the following combination of WAN technologies should Pat use to complete the required task? a. ISDN and Frame Relay b. ADSL and Leased lines c. SMDS and X.25 d. ADSL and Analog modems Correct Answer: -> d 101/ Consider the following statements: Statement A: WebTMA and ManageEngine ServiceDesk Plus are Web-based asset management solutions. Statement B: The Altiris Asset Management Suite has a snap-in modular design. Which of the following is correct about the above statements? a. Statement A is False and Statement B is True. b. Statement A is True and Statement B is False. c. Both, Statement A and Statement B are True. d. Both, Statement A and Statement B are False. Correct Answer: -> c 102/ Consider the following statements: Statement A: ManageEngine ServiceDesk Plus is a Web-based asset management solution. Statement B: ManageEngine ServiceDesk Plus provides a helpdesk for troubleshooting desktop-related problems. Which of the following is correct about the above statements? a. Statement A is False and Statement B is True. b. Statement A is True and Statement B is False. c. Both, Statement A and Statement B are True. d. Both, Statement A and Statement B are False. Correct Answer: -> c 103/ Which of the following tool can be used as a network monitor and protocol analyzer for Ethernet, wireless 802.11b/a/g, token ring, and FDDI networks? a. Observer 10.1 b. LANBrowser 1.3 c. HP OpenView Network Management d. Unicenter Network Management Correct Answer: -> a
  • 27. 104/ Steve Irwin is an IT consultant in Blue Moon Computers. Steve wants an enterprise- level tool for network management that helps in scanning the entire network by searching and configuring properties of all the devices of Windows NT/2000 enterprise. The tool should search for errors, audit information, connected users, and share permissions. Which of the following tool do u think is appropriate to perform this task? a. OpManager 5.5 b. Observer 10.1 c. LANBrowser d. HP OpenView Network Management Solution Correct Answer: -> c 105/ Corrine Wallace is working as a storage administrator at Technology Systems. The workstations in Technology Systems are running on multi-platform systems. Corrine finds that to manage storage devices effectively, he needs to use a tool or solution that manages the backup and recovery tools centrally and can monitor the storage environment remotely. Which of the following tool should Corrine use to perform the task? a. Storix System Backup Administrator b. BrightStor ARCserve Backup for Laptops & Desktops Release 11 c. VERITAS Backup Exec10 d. BrightStor Storage Resource Manager Correct Answer: -> d 106/ The management at Bluemoon Computers Inc. has decided to connect it corporate office to all of its regional offices. The local networks at regional offices are to be identified by the different subnets of the same IP address class 172.16.0.1. The regional offices are using different platforms for their networks, such as Windows, Linux, Macintosh, and Solaris. Because the corporate network will be connected to all these regional offices round the clock, it will be very essential to restrict the broadcast produced by all the networks and filter in the ones that are specifically meant for the corporate office. Which of the following network devices will you suggest to facilitate this connectivity as a networking consultant? a. Hub b. Switch c. Router d. Layer 2 Switch Correct Answer: -> c 107/ What is the configuration requirements of the desktops used in help desks? a. Following are the configuration requirements of the desktops used in help desks High quality printers Voice Over IP integration Computer telephony integration b. Following are the configuration requirements of the desktops used in help desks Thin-client computers Voice Over IP integration Computer telephony integration c. Following are the configuration requirements of the desktops used in help desks Thin-client computers Voice Over IP integration Fast processing capabilities d. Following are the configuration requirements of the desktops used in help desks Thick-client computers Voice Over IP integration Computer telephony integration Correct Answer: -> b
  • 28. 108/ Corrine Wallace is working as IT consultant at Blue Moon Computers. Corrine is assigned the task of determining the service usability and utility of servers in the organization. For this, Corrine needs to determine the time it takes to repair a service that has failed on the servers. Which of the following requirements Corrine needs to analyze to perform the task? a. Accessibility b. Availability c. Integrity d. Performance Correct Answer: -> b 109/ Safest Software wants to ensure uninterrupted execution of business activities and increase productivity and profitability of an enterprise. For this, the organization decides to implement server solutions in the organization to handle its routine and critical business applications. The management of the organization notices that organization requires servers at every level of business operations. Therefore, organization hires Pat Wilkins, an IT consultant to analyze the business processes and requirements that needs to be considered for planning server solutions and implement servers in the organization. After analyzing the requirements Pat realizes that he needs to implement servers for the following: File and print services Firewall and security services Provide clustered computing system Handling complex interactions Which server Pat needs to implement to perform the task? a. Workgroup server only b. Web servers. c. Workgroup and Infrastructure servers d. Workgroup, Infrastructure, HPC, and high-end servers, such as ERP and Application Tier servers. Correct Answer: -> d 110/ Which of the following is not included in the security policy of an IT infrastructure? a. Roles and responsibilities for various employees. b. Establishment of trust among clients and employees to gain their confidence c. Rules regarding the use of various organizational resources, such as computers, the Internet, or e-mail. d. Geographical Scope of the organization Correct Answer: -> d 111/ Donna Johnson, a network administrator is planning for the network solutions for the Mountain Marketing Inc. Donna needs to avoid network congestion by managing data flows. For this _donna needs to determine QoS of the organization’s network. Which of the following factors cannot help Donna determine QOS of the network: a. Throughput b. Business applications c. Availability d. Jitter e. Size and Geographical Scope a. b and e b. d and b c. d and e d. d, e, and b Correct Answer: -> a
  • 29. 112/ Donna Bard is working as a security administrator in Safest Software Inc. Donna needs to deploy a security method in the enterprise that can protect IT infrastructure from both external as well as internal attacks. Donna receives complaints that unnecessary data, such as video and graphic files are entering the network from outside. Therefore, Donna wants that the security method should filter out the incoming traffic to stop the unnecessary data consuming the network bandwidth. Donna also wants to use another software that provides encryption technologies, digital certificates, and certificate to protect the security of their communications and business transactions on the Internet. Which of the following combinations of security methods should Donna use to provide enterprise-wide network security? a. PKI and VPNs b. VPNs and IDS c. IDS and Firewalls d. Firewalls and PKI Correct Answer: -> d 113/ Which of the following tool can be used to build reports to identify the under-utilized storage space? a. BrightStor Storage Resource Manager b. HP OpenView Storage Area Manager c. BrightStor ARCserve Backup for Laptops & Desktops d. Storix System Backup Administrator Correct Answer: -> b 114/ Corrine Wallace is working as an IT consultant in the head office of Safest Software. Safest Software is a large enterprise with distributed network in six branches across four countries. The workstations in each office are running on multi-platform, such as Linux and Windows. Steve Irwin is the system administrator of the head office. Steve assigns Corrine the task of providing a network management solution, which combines the software, services, support, and training to manage the network proactively by optimizing performance and availability of the distributed network system of Blue Moon Computers. Which of the following tool or solution should Corrine choose to perform this task? a. HP OpenView Network Management Solution b. Unicenter Network Management Solution c. OpManager 5.5 d. LANBrowser 1.3 Correct Answer: -> a 115/ Pat Greene is working as a storage administrator at Blue Moon Computers. Pat is assigned the task of managing archives in an enterprise. Pat needs to protect the data stored in archived media from mishandling or natural disasters. Which of the following activity should Pat perform to complete the task? a. Ensuring that archive media does not exceed the safe limits b. Storing the data with the same retention period c. Maintaining a record of the archival media, files, and folders d. Maintaining the duplicate copy of the archived data Correct Answer: -> d 116/ Red Eye Systems Inc. wants a plan for security implementation at a new software development facility in New York. The company wants the facility to have at least five levels of authentications for any data that is accessed from a remote location as well as for the data sent to a remote location. The management wants to implement both host- based and network-based IDS and wants to put a firewall after each VPN gateway that will be used for connecting remote users. In addition, the management has a very stringent administrative policy, which requires even a single change in user permissions to be
  • 30. approved by a hierarchy of officials. In addition, the management has decided to conduct weekly security audits during which the network at the facility would be non-operational. As a networking consultant, according to you which of the following business or technical requirements will be affected because the security requirements? a. Availability, geographical scope, and business applications b. QoS, Performance, and availability c. User and resource distribution d. Security policies Correct Answer: -> b 117/ New tech book is multinational organization with various bookstores in various parts of USA. To expand its customer base globally and to automate its business process the organization launches an e-commerce site on the Internet. To protect its business processes from disruption, the organization asks Anne Donaldson to plan for the availability of the website. Identify the considerations Anne needs to keep track of to plan for the availability of the website. To protect data losses in the event of disasters, the organization also asks Anne to plan tasks for maintaining availability and backing up critical data of the website. What should Anne do to perform the task? a. Anne needs to keep track of the following considerations while planning for the availability of the website: Criticality of the data Amount of downtime that the organization can afford Cost of reducing downtime in the organization In addition, Anne needs to consider the frequency of planned downtime while setting the availability goals to plan for appropriate backup strategies and maintenance tasks to maintain availability. b. Anne needs to keep track of the following considerations while planning for the availability of the website: Amount of data that a network can carry Amount of data that is successfully transferred over the Internet Ratio of error-free data transmission to total transmission. In addition, Anne needs to consider the frequency of planned downtime while setting the availability goals to plan for appropriate backup strategies and maintenance tasks to maintain availability c. Anne needs to keep track of the following considerations while planning for the availability of the website: Criticality of the data Amount of downtime that the organization can afford Cost of reducing downtime in the organization In addition, Anne needs to consider the frequency of unplanned downtime while setting the availability goals to plan for appropriate backup strategies and maintenance tasks to maintain availability. d. Anne needs to keep track of the following considerations while planning for the availability of the website: Amount of data that a network can carry Amount of data that is successfully transferred over the Internet Ratio of error-free data transmission to total transmission. In addition, Anne needs to consider the frequency of unplanned downtime while setting the availability goals to plan for appropriate backup strategies and maintenance tasks to maintain availability Correct Answer: -> a 118/ _______ management enables you to manage the leased assets in an enterprise by informing you about the end of the lease period. a. Asset
  • 31. b. Event c. Remote d. Desktop configuration Correct Answer: -> a 119/ Identify the tasks performed by the help desk in an enterprise. a. Create security policies for securing the desktops. b. Provide an online knowledge base that provides solutions to problems. c. Log and monitor the problems of desktop users. d. Provide centralized support for troubleshooting problems of desktop users. Select the correct option. a. a, c, and d b. a, b, and d c. b, c, and d d. c and d Correct Answer: -> c 120/ Steve Irvin works in the Helpdesk department of Global Systems Inc. Currently, the organization uses a decentralized and manual method for managing and maintaining IT resources. The CIO of the organization notices that the decentralized and manual method for managing and maintaining IT resources is prone to errors and requires a huge amount of time, and effort. To solve the problem, the CIO asks Steve to identify a tool that can keep track of the IT resources and enable the IT staff to perform the following tasks in the organization: Determine which IT resources are to be upgraded or replaced Keep track of the end of the lease period of the IT resources Keep track of the software having expired licenses Determine which users have particular software packages installed Centrally manage the implementation of software patches across the enterprise Centrally manage the distributed IT resources Identify the tool that is most appropriate to perform the preceding tasks. a. Remote management tool b. Event management tool c. Asset management tool d. Desktop standardization tool Correct Answer: -> c