Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "HP0-091" Exam

Great Stuff - ITCertKeys is the best Choice to Pass 100%

 

Question 1.
If the shell variable filenames contained a list of filenames, separated by spaces, how can you extract the second name in the list into a variable called second?

A. echo $ file names | cut -f2 -d " ">second
B. second =$ -d" " $filename>second
C. cut -f2 -d" " $filenames>second
D. second ='cut -f2 -d " " $filenames'

Answer: A

Question 2.
You add a new gateway to your network that allows to a business partner's network.

Whose network number is 15. The new gateway machine has an IP address of 145.1.22.100.

What command do you need to run on client machines on your network in order to communicate with machine on your business partner's network?

A. route add net 145.1.22.100 15.0.0.0 1
B. route add net 15.0.0.0 145.1.22.100 1
C. route add net 145.1.0.0 15.0.0.0. 1
D. route add net 15.0.0.0 145.1.22.100 0

Answer: B

Question 3.
Which of the following command lines would NOT return your original login directory?

A. cd
B. cd..
C. cd~
D. cd $HOME

Answer: A, B

Question 4.
At the ftp>prompt, what command will copy files from your local machine to a remote machine?

A. oush
B. cpto
C. put
D. get

Answer: C

Question 5.
In "let" statements what action does "l" represent?

A. escape the meaning of next character
B. division
C. percentage
D. remainder

Answer: B

Question 6.
Where do you configure the HP-UX auto mounter daemon to start at boot?

A. /etc/rc.config.d/nfsconf
B. /etc/automount.conf
C. /etc/am.conf
D. /etc/rc.config.d/netconf

Answer: A

Question 7.
If you wish to access nodes beyond your local network. Your machine must have access to:

A. A./etc/hosts
B. B.DNS
C. bridge
D. a router

Answer: D

Question 8.
Which command is used to recreate the / stand/system file?

A. system_prep
B. mkkernal
C. vi system
D. frecover
E. sysgen

Answer: A

Question 9.
How do you turn a local variable into an environmental variable in the POSIX shell?

A. set variable
B. env variable
C. echo variable
D. export variable

Answer: D

Question 10.
What is the accepted method for allowing local configuration changes to be made to start-up scripts?

A. direct editing of the configuration scripts
B. configure variables defined in /etc/system.conf
C. edit files in /etc/rc.config.d
D. prompt/dev/console during state changes

Answer: C

Question 11.
Which statement is true regarding a device file's major number?

A. It is determined by its hardware address.
B. It points to the associated kernel driver.
C. It is used to allocate buffer space.
D. It determines the device's interrupt priority.
E. It sets the kernel response timeout in tics.

Answer: B

Question 12.
How do you go to single-user mode on a booted system?

A. init 0
B. reboot
C. shutdown
D. shutdown -r

Answer: C

Question 13.
Who can change a user account password? Select two

A. the root user
B. members of the administrator group
C. the account owner
D. all members of the account owners group

Answer: A, C

Question 14.
Which commands are used to list device file details? Select two

A. lssf
B. lsdev
C. ioscan -fn
D. ll -d
E. lsf -a

Answer: A, C

Question 15.
What does /etc/default set? Select three

A. password policies
B. default swap space
C. default file system type
D. disk space usage limits
E. system time zone
F. some security settings in the directory

Answer: B, D, F

Question 16.
By default, where does the cpio command send its output?

A. /tmp
B. stdout
C. cpio.out
D. $HOME

Answer: B

Question 17.
Which commands should be used to monitor disk I/O statistics? Select TWO.

A. netstat
B. iostat
C. ioscat
D. sar
E. top
F. linkloop

Answer: B, D

Question 18.
How do you set up a device swap area and ensure it is active at each system startup?

A. Start device swapping using the swapon command on an existing file system mount point.
B. Start device swapping using the swapon command on a logical volume, add an entry to the /
etc/fstab file.
C. Start device swapping using the swapon command on a logical volume, add an entry to
the/etc/sbtab file.
D. Start device swapping using the swapon command on a logical volume, add an entry to the
/etc/vfstab file.

Answer: B

Question 19.
Which statement describes differences between telnet and ssh?

A. ssh can login without a password
B. ssh has encrypted data transfer
C. telnet is more secure
D. telnet uses secure sockets

Answer: B

Question 20.
The .rhosts file resides in which directory?

A. /etc
B. /home
C. /netconf
D. $HOME
E. $NETCONF

Answer: D

Question 21.
What is the best example of a good password?

A. RobertSmith123
B. The Quick Red Fox Jumped Over The Lazy Brown Dog
C. 9874539763
D. ornY3.%dy

Answer: D

Question 22.
What is PAM (Pluggable Authentication Module)used for?

A. to encrypt and authenticate IP packets at the network layer
B. to indicate which service can run in a non secure mode
C. to tell each service which authentication module to use
D. to enable the ftp service with encryption

Answer: C

Question 23.
Which users are included in the /etc/ftpusers file?

A. those allowed ftp access
B. those not allowed ftp access
C. those allowed ftp access without a password
D. those allowed anonymous ftp access

Answer: B

Question 24.
You are trying to display a X window from an application running on a host and get an error indicating connection not allowed.

Which command will allow display on the remote host?

A. xhosts +
B. dxm -start
C. export $DISPLAY
D. display -hostname

Answer: A

Question 25.
How do you change permission on a file so the owner can modify it, the owner's group can read it, and all other users can execute it? Select TWO.

A. chmod file u+rw,g+r, o+xr file
B. chomd file 754 file
C. chmod file u+x, g+r, o+w file
D. chmod file 745 file
E. chmod file a=w, u-r, o+x

Answer: A, D

Question 26.
Which command prints the sessions of the specified users and ttys with the most recent first, indicating when the session began, the duration of the session, and the tty on which the session took place?

A. sty -w
B. last
C. who
D. cat utmp

Answer: B

Question 27.
Which Ignite command is used to make a recovery tape of all files in vgoo?

A. make_net_recovery -x inc=/dev/vgoo -d/dev/rmt/omn
B. make_tape_recovery -x inc=allvgs -d /dev/rmt/omn
C. make_tape_recovery -x inc_entire=/dev/vgoo -a /dev/emt/omn
D. make_recovery -x inc=/dev/vgoo -a /dev/rmt/omn

Answer: C

Question 28.
Information about the currently installed software for the local system is stored in which location?

A. /var/adm/sw/filesets
B. /var/adm/sw/products
C. /var/adm/sw/depot
D. /var/adm/sw/swinstall.log

Answer: B

Question 29.
What command installs an application, ny_app, from my_depot on a depot server named mickey?

A. swinstall -s my_depot on mickey -a my_app
B. swinstall -s mickey:/my_depot my_app
C. swload -s mickey:/my_depot \*
D. swinstall -s my_depot @mickey -a my_app

Answer: B

Question 30.
What is the sequence used to boot an Ignite recovery tape?

A. Stop the boot process, search, bo<tape hardware path>
B. Stop the boot process, bo pri, bo <tape hardware path>
C. Stop the boot process, bp prl, isl> hpux-tape
D. Stop the boot process, search, bo<tape mount point>

Answer: A

Question 31.
Which command displays information about software products?

A. swconfig
B. swverify
C. swlist
D. swinstall
E. swagent

Answer: C

Question 32.
What is the smallest object that you can install with swinstall?

A. product
B. sub-product
C. file
D. file set

Answer: D

Question 36.
Which file systems are mounted in single user mode by default?

A. NFS file systems
B. All local file systems
C. Root file system
D. Root and stand file systems

Answer: D

Question 37.
Which service is used for resolving host names?

A. DFS
B. NTP
C. DNS
D. NFS

Answer: C

Question 38.
What is the purpose of Media Access Control (MAC) addressing?

A. defines the internet access type for the host
B. identifies a specific network interface port
C. identifies a specific media type for internet access
D. defines the control type used for internet access

Answer: B

Question 39.
In which situation would you normally see the error "Stale File Handle"?

A. when a file has been locked by another client
B. when too many clients attempt to access a file simultaneously
C. when an NFS client can no longer access the mounted file system
D. when a client attempts to mount an already mounted BFS file system

Answer: C

Question 40.
Which configuration file determines the mail relay behavior of the send mail daemon?

A. /etc/mail/relay.conf
B. /etc/mail/sendmail.cf
C. /etc/sendmail.relay
D. /etc/re.config.d/netdaemon

Answer: B

Question 41.
What is IP multiplexing on a UNIX host?

A. binding more than one MAC address to a single network interface
B. increasing throughput on the network interface
C. binding more than one IP address to a single network interface
D. binding the same IP address to multiple network interface

Answer: C

Question 42.
What service provided by DHCP?

A. Daylight Hours Control Programming for servers
B. IP address management for network managers
C. IP address class designation for web servers
D. A HP-UX unique solution to server IP addressing

Answer: B

Question 43.
Which file contains the list of static routes to be configured at boot?

A. /etc/re.config.d/route
B. /etc/re.config.d/netconf
C. /etc/rc.config.d/netdaemon
D. /etc/route

Answer: B

Question 44.
Which file on an NFS server contains the list of currently mounted NFS file systems?

A. /etc/exports
B. /etc/xtab
C. /etc/fstab
D. /etc/exportfs

Answer: B

Question 45.
Which file should you edit to allow remote access to directories or file systems?

A. /etc/mnttab
B. /etc/exports
C. /etc/xtab
D. /etc/fstab

Answer: B

Question 46.
Which command obtains information on established sockets?

A. ifconfig
B. netstat
C. lanadmin
D. netsock

Answer: C

Question 47.
Port numbers are configured in which HP-UX file?

A. /etc/serviceports
B. /etc/hosts
C. /etc/services
D. /etc/inetd.conf
E. /etc/re.config.d/services

Answer: C

Question 48.
To display the available routes and their status, which command would you use?

A. route -s
B. routestat
C. netstat -rn
D. systat

Answer: C

Question 49.
What are standard ARPA services? Select THREE

A. ftp
B. tcp
C. rcp
D. udp
E. telnet
F. rlogin
G. bootp

Answer: C, F, G

Question 50.
The default size of a physical extent in LVM is_________

A. twice the size of a logical extent
B. the same size as the resident file system's disk block
C. 1/1024 of the total volume size
D. 1MB
E. 2MB
F. 4MB

Answer: F

Question 51.
A journaled file system intent log is used to____________

A. store user data prior to a physical write
B. log meta data changes
C. improve buffer cache performance
D. provide an audit trial
E. track mirror transactions

Answer: B

Question 52.
Which I/O bus structures are found in new (circa 2004) HP servers? Select TWO

A. ISA
B. PCI
C. HSC
D. PCI-X
E. HP-PB

Answer: C, D

Question 53.
Which list includes only VXVM objects?

A. diskdg,voldg, plex, cat_vol
B. lvol, plex, subdisk, volumes
C. vmdisk, subdisk, plex,volume
D. mirror_disk, subdisk,rootdg

Answer: A

Question 54.
What do physical volume links (pv links) provide?

A. access to a spare disk
B. automatic load balancing
C. an alternate path to a disk
D. improved RAID performance

Answer: C

Question 55.
What are the main structures inside a journal file system? Select FOUR.

A. mcells
B. intent log
C. fragment
D. inode table
E. superblock
F. cylinder group
G. allocation units

Answer: B, D, E, G

Question 56.
What is the compatible SCSI interface for a DVD-ROM attached to an RX series system?

A. Single Ended
B. Low Voltage Differential
C. Hogh Voltage Differential
D. High Voltage Single Ended

Answer: B

Question 57.
Which directory contains the HP-UX kernel?

A. /stand
B. /etc
C. /var
D. /kernel

Answer: A

Question 58.
What is the default number of workspaces for CDE?

A. 2
B. 4
C. 8
D. 16

Answer: B

Question 59.
What does a hard link between two files do?

A. allows 2 users to own the same file
B. ensures that 2 files get deleted together
C. allows data to span 2 files
D. allows multiple file names to reference the same data on disk

Answer: D

Question 60.
What is the result when a user enters the telnet command without arguments?

A. An error is returned
B. The system connects to its Domain Name Server.
C. It enters command mode.
D. The system connects to its loop back address.

Answer: C

Question 61.
Which command is used for viewing file space usage?

A. bdf
B. diskinfo
C. freedisk
D. lvdisplay

Answer: A

Question 62.
What is the correct syntax to mail the contents of a text file to a user?

A. mail user <<text file name
B. mail user>text file name
C. mail user<text file name
D. mail>text file name user

Answer: C

Question 63.
What is the functionality of cron?

A. to set carriage return on
B. to update the system clock using NTP
C. to order processes chronologically
D. to schedule execution of processes

Answer: D

Question 64.
What are the wildcard characters that represent a single character and an unlimited number of characters?

A. .and 1
B. .and*
C. ?and*
D. 1and*
E. ?and.

Answer: C

Question 65.
Which command displays the model of your system?

A. uname -r
B. modelstr
C. hostnam
D. model

Answer: D

Question 66.
Which command lists hardware devices?

A. lssf
B. dmsg
C. iomap
D. ioscan

Answer: D

Question 67.
Which filenames are matched by ab[cde]fg?

A. abfg.abcdefg
B. abcfg, abdfg, abefg
C. abcfg, abdfg, abdefg, abfg
D. abcfg, abdfg, abefg, abcdfg, abcefg, abdefg

Answer: B

Question 68.
Which command removes all files in a directory without removing the directory?

A. RM DIRECTORY
B. RM-R DIRECTORY
C. RM -A DIRECTORY
D. RM -R DIRECTORY/*

Answer: D

Question 69.
Which commands can you use to send a software termination signal to the xclock process with an id of 21484? Select THREE

A. kill -21484
B. kill -15 21484
C. kill -SIGTERM 21484
D. kill -s xclock 21484
E. kill -s SIGTERM 21484

Answer: B, C, E

Explanation:
You can use "kill pid", "kill -SIGNAL pid" or "kill -s SIGNAL pid"
Not A: This one is just wrong. "kill -pid" will just cause and error message.

Question 70.
Which environmental variable allows you to override the default directories searched for man pages?

A. PATH
B. MANPATH
C. MANPAGE
D. SEARCHPATH

Answer: B

Question 71.
What does the command touch My file do if My file exixts?

A. nothing
B. gives an error
C. sets the file size to zero
D. updates the date/time stamp

Answer: D

Question 72.
How do you find a pattern "pat" in vi?

A. *pat
B. %pat
C. /pat
D. @pat

Answer: C

Question 73.
What does a user id of zero indicate?

A. a root user
B. an invalid user
C. an anonymous user
D. a deactivated user

Answer: A

Question 74.
The which command is used to determine the _________

A. current version and release of an executable
B. absolute path for an executable
C. compiler options used to create an executable
D. pseudo terminal your session is currently logged on

Answer: B

Question 75.
What does find / -name data file return?

A. the relative path names of all files called data file in your current directory
B. the number of files called data file in your current directory
C. the path names of all files called data file
D. the relative path of files called data file from your current directory down

Answer: C

Question 76.
What are the advantages of Online JFS? Select Three

A. fast resync
B. fast recovery
C. online resizing
D. secure file deletion
E. automatic resizing
F. dynamic in odes creation

Answer: A, C, D

Question 77.
Which Statements are true for a LVM logical volume/ select two

A. It is a file system
B. It is not a file system
C. It may contain a file system
D. A logical volume contains one or more volume groups
E. A logical volume contains one or more plexes

Answer: B, C

Question 78.
When is the information in the VGRA loaded into kernel memory?

A. as a result running mount
B. during volume group activation
C. as a result of running vgscan
D. during vgcfg restore
E. as a result of running vgsnync

Answer: B

Question 79.
Which file transfer protocols are used by an ignite server? Select two

A. ftp
B. tftp
C. nfs
D. rcp
E. rsysnc

Answer: B, C

Question 80.
Which type of installation requires a reboot?

A. kernel patch
B. secure shell
C. command patch
D. dynamically loaded module

Answer: A

Question 81.
Which command lists the registered software depots on the local HP-UX server?

A. swlist -1 depot
B. swconfig -L depot
C. swinstall -1 depot
D. swlist - list bundle

Answer: A

Question 82.
On a PA-RISC system, what is the file system type for/stand?

A. LIF
B. UFS
C. HFS
D. CIFS
E. VxFS

Answer: C

Question 83.
Which methods can be used to install HP-UX from an lgnite server. Select two

A. start an sw install session, then enter the Ignite server IP address
B. boot from application CD and select "Install from Ignite server" and enter the Ignite server IP
address
C. boot from installation media and select "install from Ignite server" and enter the Ignite server IP
address
D. interrupt the boot process and select "Boot from Ignite server "then enter the Ignite server IP
address
E. interrupt the boot process and boot from LAN, then enter the Ignite server IP address

Answer: C, E

Question 84.
How can you tell if a reboot will be required during a patch installation?

A. A patch never requires a reboot.
B. A patch always requires a reboot.
C. The system will always reboot automatically, if necessary
D. Check the patch read me file to determine reboot requirements.

Answer: D

Question 85.
After setting the -async option for NFS exports, which statement would be true?

A. leads to better performance
B. leads to increased data integrity
C. would only be used on very quiet networks
D. would only be used for read-only mounts

Answer: A

Question 86.
Which actions are performed by the set_parms command? Select three

A. set the system date and time
B. configure the system to use DHCP
C. configure the system DNS settings
D. set the root password
E. configures network time protocol (NTP)

Answer: B, C, D

Question 87.
Which file on an NFS server contains a list of clients that currently have the servers NFS system mounted?

A. /etc/exports
B. /etc/nfstab
C. /etc/mnttab
D. /etc/rmtab
E. /etc/fstab

Answer: D

Question 88.
Which file is used for auto mount configuration?

A. /etc/netconf
B. /etc/nfsconf
C. /etc/automount.conf
D. /etc/re.config.d/nfsconf

Answer: D

Question 89.
Which system level service provides access to remote file systems?

A. networks services
B. remote procedure services
C. file transfer protocol (FTP)
D. auto mount

Answer: D

Question 90.
What are possible uses of the lan admin command? Select three

A. enables IP multiplexing
B. resets the network interface card
C. shows IP address for network interface card
D. shows basic I/O error for the network interface card
E. shows operational status of the network interface card

Answer: B, D, E

Question 91.
Which configuration file is used to determine the synchronization sources and operating modes of NTP?

A. /etc/rc.config.d/netdaemons
B. /etc/ntp/conf
C. /etc/rc.config.d/ntpconf
D. /etc/xntpd

Answer: B

Question 92.
Which command is used to display internet to Ethernet address translation tables identifying remote machines?

A. ifconfig
B. arp
C. Ianscan
D. Traceroute

Answer: B

Question 93.
The correct command to add a route to network 156.65 via router 200.1.1.1 would be :-

A. router add 200.1.1.1 net 156.65.0.0.0 0
B. router add net 156.65.0.0 200.1.1.1 0
C. router add 200.1.1.1 net 156. 65.0.0 1
D. router add net 156.65.0.0 200.1.1.1 1

Answer: D

Question 94.
Which file contains the information sent in response to a bootp address?

A. /etc/services
B. /etc/bootp/conf
C. /etc/bootptab
D. /etc/inetd.conf

Answer: C

Question 95.
After modifying the behavior of the internet Daemon (inetd), what should be done to initiate the changes?

A. Reboot the system.
B. Edit the /etc/inetd.conf file.
C. Run the inetd command with the –c option.
D. Use the kill -r /etc/inetd command.

Answer: C

Question 96.
Which command will display the logical to physical address for network interface cards?

A. netstat
B. lanscan
C. arp
D. nslookup
E. linkloop

Answer: C

Question 97.
How do you accomplish interoperability and file sharing between Windows and UNIX systems?

A. CIFS/9000
B. NIS
C. NFSv2.1
D. WINUFS

Answer: A

Question 98.
Which net mask is invalid for an Ipv4 Class B address? Select all that apply.

A. 255.255.255.0
B. 255.255.128.0
C. 255.255.160.0
D. 255.255.192.0
E. 255.255.254.0

Answer: E

Question 99.
Which file contains configuration data for a DNS client?

A. /etc/bind.conf
B. /etc/rc.config.d/dns/conf
C. /etc/resolv.conf
D. /etc.rc.config.d/namesvrs

Answer: D

Explanation:
Not C: This file is used to administer NIS name severs NOT DNS.
/etc/resolv.conf is used on HP-UX for configuring DNS name servers on clients.

Question 100.
What is a network socket?

A. a data buffer used during network exchanges
B. a virtual connection between two NICs
C. an encrypted network communication path
D. the connector for a twisted-pair network cable

Answer: B

Question 101.
What does the link loop command test?

A. loopback address connectivity between network cards
B. Maximum Transmission Unit (MTU) size
C. Router activity
D. MAC address connectivity between network cards

Answer: D

Question 102.
Where do system log files reside?

A. /etc
B. /tmp
C. /usr/adm
D. /var/adm

Answer: D

Question 103.
How do you change from your current directory to your home directory? Select two

A. cd
B. cd/
C. cd..
D. cdhome
E. cd $HOME
F. cd $ORIG

Answer: A, E

Explanation:
A: The cd command with no arguments defaults to the users home directory.
Not F: There is no standard variable "$ORIG

Question 104.
Which symbol is used to append error messages to a file in the POSIX shell?

A. 2>
B. >>2
C. 2<<
D. 2>>

Answer: D

Question 105.
Which statements are true regarding threads and processes? Select two

A. A thread is a component of a process.
B. A process is a component of a thread.
C. Threads and processes have nothing to do with each other.
D. A process is a representation of an entire running program.
E. A thread forces the entire process to run on a single set of resources.

Answer: A, D

Question 106.
Where does the output from background jobs go by default?

A. to stdout
B. to/dev/null
C. to $HOME/out
D. to the system console

Answer: A

Question 107.
What is the result of the command ps?

A. Print the current screen to the default printer.
B. Display the status of system processes.
C. Pauses the system.
D. Displays a status of the default print queue.

Answer: B

Question 108.
What is the default shell to use on an HP-UX 11 system?

A. C shell - /usr/bin/csh
B. Posix shell - /usr/bin/sh
C. Korn shell - /usr/bin/ksh
D. Bourne shell - /usr/bin/bsh

Answer: B

Question 109.
How do you determine the IP address of your system?

A. ipconfig
B. ifconfig
C. cat /etc/network
D. lanscan

Answer: B

Question 110.
What do the vi commands :wq! And zz do?

A. undoes any changes and stays in vi
B. cancels any changes made and quits from vi
C. writes any changes back to disk and exits from vi
D. writes any changes back to disk and continues in vi

Answer: C

Question 111.
What command is used to change password aging?

A. user ed
B. user mod
C. user add
D. user age

Answer: B

Question 112.
Which file would you edit to display a message when any user logs in?

A. /var/motd
B. /etc/motd
C. $HOME/messages
D. /var/adm/messages

Answer: B

Question 113.
What does the following command do?
Cp -r dir2 dir3

A. copies and removes the files from dir2 to dir3
B. renames the directory from dir2 to dir3
C. copies all the files and subdirectories from dir2 to dir3
D. copies all files and subdirectories from dir3 to dir2

Answer: C

Question 114.
Which commands can be used to gracefully end your current HP-UX session? Select two

A. exit
B. quit
C. end
D. logout
E. <ctrl>d

Answer: A, E

Question 115.
BIND is a Berkeley implementation of ________.

A. etc/hosts
B. NIS+Master Server
C. Domain Name Server
D. Nettime Daemon

Answer: C

Question 116.
Which command displays information about the system, hostname, and os?

A. system
B. model
C. hostname
D. uname

Answer: D

Question 117.
What does the term available memory refer to?

A. the amount of memory on the free list
B. memory available for shared memory allocation
C. the amount of memory available after the kernel has been loaded
D. the total amount of memory that passes self-test prior to loading of the kernel.

Answer: C

Question 118.
What is the command used for?

A. reformatting a file
B. making archive files
C. tagging and removing files
D. printing the contents of a file

Answer: B

Question 119.
Which command set the permissions on a file to be rwxr - xr-x? select two

A. chmodd 557 file
B. chmod 575 file
C. chmod 755 file
D. chmod u=rx,g=rwx,0=rx
E. chmod u=rwx, g=rx, o=rx file
F. chmod u=rx,g=rx,o=rwx file

Answer: C, E

Question 120.
What are the /etc/hosts.equiv and ~/.rhosts files referenced by?

A. ftp
B. tcp
C. rcp
D. rsh

Answer: C

Question 121.
Which file permissions are indicated by the value of 721? Select two

A. read, write and execute for owner
B. read, write and execute for group
C. execute only for owner
D. execute only for group
E. write only for other
F. write and execute for other
G. write only for group

Answer: A, F

Explanation:
Note: Some doubts regarding F
7=rwx=read,write,execute in this case for the owner
2=wx=write,execute for group
1=x=execute only for other

Question 122.
Which security tools are commonly used on HP-UX systems? Select two

A. DNS
B. NIS+
C. DHCP
D. Host IDS
E. Secure Shell (ssh)

Answer: D, E

Question 123.
How do you force users to change passwords on a regular basis?

A. USE PASSWORD AGING
B. USE PASSWORD ENCRYPTION
C. ASSIGN A PASSWORD ALIAS
D. ENABLE PASSWORD C2

Answer: A

Question 124.
The anonymous user (nobody) is pre-configured on HP-UX to have which user ID?

A. -65534
B. -2
C. 0
D. 2
E. 65534

Answer: B

Question 125.
What does the file /var/adm/inetd.sec do?

A. specifies extra security for anonymous ftp users
B. controls access to kernel subsystems
C. provides an extra layer of security for HP-UX systems
D. stores internet security services history

Answer: C

Question 126.
What characteristics are required for a non-root password? Select two

A. Upper and lower case letters
B. At least to alphabetical and one numeric or special character
C. More than eight character
D. At least two digits
E. 6-8 characters

Answer: B, E

Question 127.
Which files can be used to enable a login without a password? Select three

A. .rhost
B. /stc/allow
C. host.allow
D. host.equiv
E. /etc/password
F. /etc/host.aliases

Answer: C, D, E

Question 128.
Where are system startup and run-state changes controlled by scripts located?

A. /etc/rc2.d
B. /sbin/config.d
C. /sbin/init.d
D. /etc/rc.confg.d

Answer: C

Question 129.
What does a special file major number indicate?

A. the card instance number
B. LVM physical address
C. The device drive in the kernel
D. Raw device file

Answer: C

Question 130.
Comparing device block I/O and character I/O, which statements are true? Select three

A. Block I/O passes through the buffer cache.
B. Character I/O is also known as raw I/O
C. Character I/O passes through the buffer cache.
D. Serial devices always use character I/O
E. Parallel ports always use block I/O
F. All devices have both character and block drives.

Answer: A, B, D

Explanation:
Block devices are buffered, character devices are not, and serial devices are character devices.

Question 131.
Which users can run SAM on HP-UX?

A. root users
B. all users
C. all users in the groups root or sys
D. root and users authorized for restricted SAM

Answer: D
 



Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 3M0-300 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "3M0-300" Exam

3Com Certified Security Specialist Final Exam v3.0

 Question 1.
Which of the following routers supports version 2.41 router code?

A. 5231
B. 5232
C. 5640
D. 5680

Answer: B

Question 2.
Which of the following is NOT a standard port available on the Router 5012?

A. ISDN
B. Console
C. Serial WAN
D. 10/100 Ethernet

Answer: A

Question 3.
True or False: The Flexible Interface Cards (FICs) in the Router 6040 can be hot swapped.

A. True
B. False

Answer: A

Question 4.
True or False: The RPU can be hot swapped.

A. True
B. False

Answer: B

Question 5.
What kind of modules does the Router 5232 use?

A. SICs only
B. MIMs only
C. SICs and MIMs
D. SICs and FICs

Answer: B

Explanation:
 

Question 6.
Which of the following modules is a daughter card that fits onto the RPU2?

A. ATM
B. Enhanced Serial
C. Encryption Card
D. Memory Expansion

Answer: C

Question 7.
How many FIC slots does a Router 6040 have?

A. 2
B. 4
C. 6
D. 8

Answer: B

Question 8.
Which of the following features is available on both the RPU and the RPU2?

A. SFP Interface Slot
B. CF Memory Card slot
C. Gigabit Ethernet Interfaces
D. Power and Fan LED indicators

Answer: D

Question 9.
What does it indicate if the LEDs on the Power Supply of the Router 6000 are as follows? ALM (red) - OFF
RUN (green) ON
AC OK (red) - ON

A. Power is OFF or has failed
B. A Runtime error has occurred
C. Power is ON and voltage is normal
D. Power is ON but operating voltage is not within acceptable range

Answer: C

Question 10.
True or False, The Router 6080 Fans have two rotational speeds.
 

A. True
B. False

Answer: A

Question 11.
True or False: The RPU2 can support a daughter card.

A. True
B. False

Answer: A


Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.