Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "NS0-111" Exam

Network Appliance Storage Associate from ITCertkeys

 Question 1.
Which one of the following files will allow you to change the search order for hostname resolution?

A. /etc/hosts
B. /etc/resolv.conf
C. /etc/searchorder.conf
D. /etc/nsswitch.conf

Answer: D

Question 2.
Which one of the following commands is used to modify network interfaces on the storage appliance?

A. ipconfig
B. ifconfig
C. interface
D. ipset

Answer: B

Question 3.
Which one of the following is a valid VLAN interface?

A. E3-9
B. E0
C. E3a
D. All of the above

Answer: A

Question 4.
What is NDMP?

A. It is a standard protocol for controlling data transfers between primary and secondary storage 
    devices
B. It is a proprietary protocol used for controlling data transfers between the storage appliance 
    head and disk drives
C. It is a networking trace analysis tool
D. It is a network management tool for storage appliances

Answer: A

Question 5.
What are the syntax differences between the aggr copy command options and the vol copy command options?

A. Aggr copy commands are case-sensitive, but vol copy commands are not case sensitive.
B. Aggr copy options do not work at the command line.
C. Aggr copy options must be listed in alphabetical order.
D. None; the syntax for both options are the same.

Answer: D

Question 6.
LUNs can be created using Filer View.

A. True
B. False

Answer: A

Question 7.
Which one of the following console commands indicates that all expansion cards are installed in the appropriate slots on the system board?

A. config -v
B. vol status -r
C. sysconfig -c
D. sysconfig -t
E. sysconfig -m

Answer: C

Question 8.
Which one of the following statements best describes the primary value of NVRAM?

A. Data integrity and improved response time for write operations
B. RAID protection
C. Data integrity and simplified backups
D. Separate processing of the network protocol stack
E. Separate processes for the disk subsystem

Answer: A

Question 9.
Which two are key factors that make a SAN different from a NAS? (Choose two.)

A. A SAN is generally less expensive.
B. A SAN allows for loading of applications that run on the server.
C. A SAN does not use a proprietary or a slimmed down version of an operating system.
D. A SAN has a simpler setup process, generally only requiring basic network setup and adding 
    of users.

Answer: B, C

Question 10.
Which of the commands from the special boot menu will zero disks and install a new file system?

A. (1) Normal boot.
B. (2) Boot without /etc/rc.
C. (3) Change password.
D. (4) Initialize all disks.
E. (5) Maintenance mode boot.

Answer: D

Question 11.
You are performing a Data ONTAP upgrade and have loaded the system files onto the storage appliance, and have successfully issued the download command. 

What is the next command you would enter to complete the upgrade procedure?

A. version
B. sysconfig -v
C. software
D. reboot

Answer: D

Question 12.
Which command would you use to display complete hardware information for a storage appliance?

A. vol status -v
B. sysconfig -v
C. sysstat
D. disk health -v

Answer: B

Question 13.
To recover a file from a snapshot using a Windows client, what directory will a user look for?

A. snapshot
B. .snapshot
C. snap
D. ~snapshot

Answer: D

Question 14.
To recover a file from a snapshot using a UNIX client, what directory will a user look for?

A. snapshot
B. .snapshot
C. snap
D. ~snapshot

Answer: B

Question 15.
Which volume option will disable automatic snapshot creation?

A. Setting the no snap volume option to on
B. Turning off access to the .snapshot directory
C. Setting the no snap dir option to on
D. Setting snap reserve to 0%

Answer: A


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for XK0-002 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "XK0-002" Exam

Linux+ (2005)

 Question 1.
On an NIS client, the following is a portion of the output of cat /etc/passwd:
+Joe::::::::
+Sam::::::::
+:*::::::::/bin/false

Which of the following is true for all users other than Joe and Sam?

A. They have full access.
B. They are denied access.
C. They are granted limited access.
D. They gain access after being prompted for a shell.

Answer: B

Explanation: 
login denied users are displayed with + symbol at the starting of line.

Question 2.
How can a user view an X Window from a remote system on their local system?

A. from the local system:
    export DISPLAY=local:0.0
B. from the remote system:
    export DISPLAY=local:0.0
C. from the local system:
    export DISPLAY=remote:0.0
D. from the remote system:
    export DISPLAY=remote:0.0

Answer: D

Explanation: 
First Local host should give the permission to display the X Terminal on local host using xhost command. Then user can export the display from remote host.
See the example
 
Suppose you want to run application on ITCertKeys B from ITCertKeys A. ITCertKeys B in GUI Terminal:# xhost +192.168.0.1 
ITCertKeys A in GUI Terminal:# export DISPLAY=192.168.0.2:0 # xterm &
Now Terminal of ITCertKeys A will display on ITCertKeys B

Question 3.
Which of the following commands can be used to confirm that the FTP server is listening?

A. netstat -a ftp
B. netstat | grep ftp
C. netstat -u | grep ftp
D. netstat -a | grep ftp

Answer: D

Explanation: 
netstat is the multipurpose command, it can list active network connections, routing tables, interface statistics and other vital network information. Syntax: netstat [options]
Options are
-a à List listening and connected sockets
-t à List TCP connection
-u à List UDP Connection
-p à Show PID and name of the program.

Question 4.
When a RAID 5 array is configured with a hot-spare disk under Linux, which of the following is the minimum number of drives required?

A. 2
B. 3
C. 4
D. 5

Answer: C

Explanation:
RAID 5 is the most common type of RAID. By distributing parity information across some or all of an array's member disk drives, RAID 5 eliminates the write bottleneck of using one parity disk. The minimum requirements for RAID 5 is 3 disks. According to questions, 3 disks for RAID Level 5 and one spare disk so total 4.

Question 5.
A system administrator wants to see if an RPM package is installed on a user workstation. 

Which of the following commands should be used?

A. rpm -query 
B. rpmfind 
C. rpm -qa | grep 
D. find -name rpm | grep 

Answer: C

Explanation: 
RPM format packages can manage using rpm command. to query the package either installed or not,
rpm -q packagename
To list all installed package:
rpm -qa packagename

Question 6.
Which of the following can be used to determine who has scheduled a job?

A. who
B. whodo
C. at -d
D. at -l

Answer: B

Question 7.
Which of the following encryption schemes is the LEAST secure?

A. DES
B. MD5
C. AES
D. Blowfish

Answer: A

The Data Encryption Standard, a block cipher with 64-bit blocks and a 56-bit key Like MD4, it produces a 128-bit hash. For details see RFC 1321
AES ciphers use a 128-bit block and 128, 192 or 256-bit keys
A block cipher using 64-bit blocks and keys of up to 448 bits

Question 8.
A Linux machine has a local address of 192.168.1.1 with subnet mask of 255.255.255.0. All services are currently denied. 

Which of the following lines should be appended to hosts.allow file to permit access to the Web service on the local subnet.

A. httpd: 192.168.1.0/24
B. ALL: 192.168.1.255/24
C. ALL except httpd: 192.168.1.1/24
D. 192.168.1.255/255.255.255.0:httpd

Answer: A

Explanation:
The /etc/hosts.allow and /etc/hosts.deny each have two or more colon-separated fields. The first filed specifies the comma separated list of executable name . The second field contains a comma-separated list of client specifications, using IP address or host name or network name.
httpd: 192.168.1.0/24 à specified the network
vsftpd: .example.com à specified the domain.

Question 9.
A Linux administrator is about to install a Linux server. The server has 256MB of RAM. 

Which of the following sizes of the swap partition is generally recommended?

A. 128MB
B. 256MB
C. 512MB
D. 1024MB

Answer: C

Explanation:
Swap space in Linux is used when the amount of physical memory (RAM) is full. If the system needs more memory resources and the RAM is full, inactive pages in memory are moved to the swap space. While swap space can help machines with a small amount of RAM, it should not be considered a replacement for more RAM. Swap space is located on hard drives, which have a slower access time than physical memory. Swap space can be a dedicated swap partition (recommended), a swap file, or a combination of swap partitions and swap files. The size of your swap should be equal to twice your computer's physical RAM for up to 2 GB of physical RAM. For physical RAM above 2 GB, the size of your swap should be equal to the amount of physical RAM above 2 GB. The size of your swap should never less than 32 MB. Using this basic formula, a system with 2 GB of physical RAM would have 4 GB of swap, while one with 3 GB of physical RAM would have 5 GB of swap.

Question 10.
Which driver, if any, is required to support L3 cache on the system processor?

A. msr.o
B. mtrr.o
C. cache.o
D. No driver is required.

Answer: D

Explanation: 
To Support L3 cache on the system processor, no any driver is required.


Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.