|
Question 1. When you FTP service in the sharing pane of System Preferences. __________. A. xinetd starts ftpd B. xineted notifies inetd C. xinetd starts listening on port 53 D. the /etc/xinetd.d/ftp file is modified Answer: D Question 2. Which protocols encrypt data transferred over the network? (Choose all that apply.) A. SSH B. SMTP C. SFTP D. SMB E. HTTP Answer: A, C Question 3. Which two (2) commands will display any system.log entries containing the word failed? (Choose TWO.) A. pico failed /ver/log/system.log B. grep failed /var/log/system.log C. more /ver/log/system.log I grep failed D. Is /ver/log/system.log I grep failed E. Console /var/log/system.log I grep failed Answer: B, D Question 4. Identify three (3) reasons why NFS is not as secure as other file-sharing protocols. (Choose Three) A. NFS is limited to 32-bit encryption for data transfer. B. NSF volumes cannot be mounted as read-only volume. C. NFS gives all user root privileges to the mounted volume. D. NFS dose not prompt for a password when you mount a volume. E. Access, to NFS server volume is based on the IP address of the client. F. NFS assumes user have the same UID assignments on both the xlient and server,. Answer: D, E, F Question 5. Which three (3) are Mac OS X Open Directory plug-ins that can request data from a directory service? (Choose THREE.) A. SMB B. Apple Talk C. LDAPv3 D. Rendezvous E. Active Directory F. BSD Flat File and NIS Answer: C, E, F Question 6. Your u mask is set to 026. You use touch from the command line to create a new file. What are the permission on the new file? A. 600 B. 640 C. 644 D. 751 E. 755 Answer: B Question 7. When you use Disk Utility to restore a volume from a disk image, ______. A. you must first boot the computer from the same volume from a disk image,_______. B. The disk image must be on the same computer as the volume you are restoring to C. The disk image and the volume you are restoring to must be on different computers D. You must first boot the computer from a volume other than the one you are restoring to Answer: D Question 8. An example of multi homing is when ______. A. multiple computers share a single IP address B. a single user has multiple Home folders on a serve C. multiple computers serve pages web site D. multiple IP addresses are assigned to the same network interface on the same machine Answer: D Question 9. Which command lets you view contents of the last DHCP packet a Mac OS X client received over built-in Ethernet form a DHCP server? A. cups-config B. if config get packet en0 C. ip6 config hostbits6 D. ip config get packet en0 Answer: D Question 10. What are (3) ways to supplement data that is missing from a third-party LDAP server to support Mac OS X clients? (Choose Three) A. Repurpose existing fields in the directory schema. B. Modify the server's search path to exclude /Net lnfo /root. C. Create local mapping with static and variable attributes. D. Remove unused object Classes from the local directory schema. E. Enable OPTION 95 to assure communication with the DHCP server. Answer: A, C, E Question 11. In a network of Rendezvous-enabled Mac OS X computers, ________ is the protocol that enables name-to-address lookups in the absence of a DNS server. A. SLP B. DHCP C. Apple Talk D. Multicast DNS E. Link-local addressing Answer: D Question 12. Which process runs the startup scripts? A. System Starter B. Start Script C. Startup d D. Startup p Answer: A Question 13. Which three (3) are agents that look up d can use to query user account information? (Choose Three.) A. Ni agent B. DS agent C. DNS agent D. Cache agent E. Apple talk agent F. Rendezvous agent Answer: A, B, D Question 14. You are accessing user records in a third-party directory. Other than modifying the schema, how can you provide valid mount records for network home directories? A. Create a mount record in the local LDAP directory on the Mac OS X client. B. Use Directory Access to map VFS Type to apple-user-home url on each client computer. C. Use the Active Directory schema rather than the RFC 2307 schema on the LDAP directory. D. Supplement the existing directory with a directory on Mac OS X Server to host the mount records. Answer: D Question 15. Which two (2) are online resources for security issues relevant to Mac OS X? (Choose Two.) A. CERT B. Virex C. SANA D. Apple security-announce mailing list E. Apple Security updates streaming video broadcast Answer: A, D Question 16. Which two (2) commands will capture Rendezvous packets only? (Choose Two) A. sudo tcp dump -I en0 dst port 53 B. sudo tcp dump -I en0 dst port 5375 C. sudo tcp dump -I en0 dst port 5353 D. sudo tcp dump -I en0 I grep rndz E. sudo tcp dump -I en0 I grep mdns Answer: C, E Question 17. In Printer Setup Utility, if you click on the Add icon in the toolbar while holding down the Option key, you can _______. A. export printers to Samba for Windows clients B. use the advanced feature to specify a custom PPD C. rename an existing print queue and change its printer Model type D. add a Rendezvous-enabled printer form the list of multicast addresses Answer: B Question 18. You cannot access the server one.example.com, but you can access other servers. Which step could help you identify the cause of the problem? A. Use the scutil command to display the status of the server. B. Use the arp command to determine whether the server address is busy. C. Use the domain lookup command to determine whether the one.example.com domain has been registered. D. Use the dig command to determine whether the problem is the result of an error in the domain name DNS entry, or a missing entry for the domain in the DNS files. Answer: D Question 19. Chris is logged in to Mac OS X v10.3 using a non-admin network user account on Mac OS X Server v10.3. The user account is configured to use an Open Directory password. When Chris tries to connect to an AFP server that is configured to use only Kerberos authentication, an authenticate to Kerberos dialog appear, requesting a name, realm, and password. Chris enters the user account name and password again, and clicks OK. The same dialog reappears. What can a local system administrator do to resolve Chris issue? A. Log in with a secure shadow hash. B. Enable the Kerberosv5 plug-in in Directory Access. C. Use destroy to destroy any existing tickets in the cache, then connect to the server again. D. Ensure that the date, time, and time zone on the Mac OS X client and on the KDC are synchronized. E. Cancel the authenticate to Kerberos dialog, log in as guest, and assume the connection is secure. Answer: D Question 20. To create a secure connection to server, you must _______. A. use Directory Access to disable Apple Talk services discovery B. type the mount -s command and connect to the file server manually C. enable remote Apple Events in the Sharing pane of System Preferences D. select "Secure Shell (ssh)" when using the Connect to Server command from the File menu in Terminal Answer: D
|
Question 1. A customer would like to have the functionality of "Rip and Replace" for all their x86 Microsoft Windows and Red Hat Linux server environments. Which solution fits their need? A. HPBladeSystem B. HPProLiant DL500 series C. HPProLiant DL100 series D. HP Integrity Superdome Answer: A Question 2. Which virtualization technology maximizes client connectivity uptime and security in the Proliant server platform? A. HP Auto Port Aggregation using 1000SX network card B. HP Clustered NIC in each server C. Adapter teaming in the server with VLAN functionality D. Virtual Cluster for NIC in the server Answer: C Question 3. Which two components are used to manage the HP-UX 11i Virtual Machine (VM) host system resources? (Select two.) A. Virtual Machine Manager B. Virtual Machine Management Pack C. Performance Management Pack D. System Management Homepage Answer: A, D Question 4. Which library system family introduces a fast, highly available disk-based backup solution? A. ESL B. EML C. MSL D. VLS Answer: D Question 5. Which management software is able to discover and monitor virtual machines on both Proliant and Integrity server platforms? A. HP Virtual Insight Manager B. HP System Tools Manager C. HP Systems Insight Manager D. HP Systems Consolidated Manager Answer: C Question 6. A customer needs a high-bandwidth storage area network (SAN) solution providing simultaneous communication between the servers and storage disk arrays. Which type of Fibre Channel SAN topology will meet this requirement? A. switched fabric B. private fabric C. public loop D. arbitrated loop Answer: A Question 7. What is the maximum unplanned downtime for an industry-standard server designed to 99.99% availability? A. 15 minutes B. 8 hours C. 53 minutes D. 87 hours Answer: A Question 8. An enterprise customer needs the ability to manage their HP Integrity rx8620 using more than one console. Which feature will meet this need? A. Remote Insight LightsOut Edition II (RILOE II) B. Transfer of Control (TOC) C. Management Processor LAN (iLO MP) D. Serial Port Redirection (SPR) Answer: C Question 9. Which two tape technologies provide read compatibility for two previous generations? (Select two.) A. AIT B. SDLT C. SLR D. LTO Answer: B, D Question 10. Which software tool can be used to help a customer virtualize a server environment? A. HP VirtualComputer Center B. HP Process Virtualization C. HP Virtual Node Cluster D. HP Integrity Virtual Machines Answer: D
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.