Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "190-737" Exam

Easiest Way To Sucess

 Easiest Way To Sucess
visit ITCertkeys
thanks


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 117-202 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "117-202" Exam

Linux Networking Administration

 Question 1.
What is the minimum number of partitions you need to install Linux?

Answer: 1

Explanation: 
At a bare minimum, Linux requires just one partition to install and boot. This is the root partition, which is known as the / partition. However, a minimum of two partitions is recommended: one for the root partition and one for the swap partition. 
Reference: Roderick W. Smith. Sybex Linux + Study Guide: page 37. 

Question 2.
What file contains the default environment variables when using the bash shell?

A. ~/.profile
B. /bash
C. /etc/profile
D. ~/bash

Answer: C

Explanation: 
The file /etc/profile contains shell commands that are executed at login time for any user whose entry in /etc/passwd has a shell specified in the shell field whose name ends in sh.

Reference: 
http://docsrv.caldera.com/cgi-bin/man/man?profile+4

Incorrect Answers
A: The ~/.profile is the profile file stored in each user's home directory. This file contains settings that apply to that user only.
B: The default environment variables are stored in the /etc/profile file, not the /bash file.
D: The default environment variables are stored in the /etc/profile file, not the ~/bash file.

Question 3.
Exhibit:
 

You need to delete the group dataproject. Which two of the following tasks should you do first before deleting the group?

A. A and C
B. A and D
C. B and C
D. B and D

Answer: B.

Explanation: 
You can delete a group by editing the /etc/group file and removing the relevant line for the group. It's generally better to use groupdel, though, because groupdel checks to see if the group is any user's primary group. If it is, groupdel refuses to remove the group; you must change the user's primary group or delete the user account first. As with deleting users, deleting groups can leave "orphaned" files on the computer. It's usually best to delete the files or assign them other group ownership using the chown or chgrp commands.

Reference: 
Roderick W. Smith. Sybex Linux + Study Guide: page 274.

Incorrect Answers
A: It is not necessary to assign new login names to the members listed in the /etc/group file.
C: It is not necessary to assign new login names to the members listed in the /etc/group file.
D: It is only necessary to change the users' default group if the default group is the dataproject group.

Question 4.
All groups are defined in the /etc/group file. Each entry contains four fields in the following order.

A. groupname, password, GID, member list
B. GID, groupname, password, member list
C. groupname, GID, password, member list
D. GID, member list, groupname, password

Answer: A

Explanation: 
A typical line in the /etc/group file looks like the following: 
project1:x:501:sally,sam,ellen,george
Each field is separated from the others by a colon. The meanings of the four fields are as follows:
Group name The first field (project1 in the preceding example) is the name of the group.
Password The second field (x in the preceding example) is the group password. Distributions that use shadow passwords typically place an x in this field; others place the encrypted password directly in this field.
GID The group ID number goes in this field.
User list The final field is a comma-separated list of group members.

Reference: 
Roderick W. Smith. Sybex Linux + Study Guide: page 273.

Incorrect Answers
B: This is the incorrect order of fields.
C: This is the incorrect order of fields.
D: This is the incorrect order of fields.

Question 5.
You issue the following command useradd -m bobm
But the user cannot logon. What is the problem?

A. You need to assign a password to bobm's account using the passwd command.
B. You need to create bobm's home directory and set the appropriate permissions.
C. You need to edit the /etc/passwd file and assign a shell of bobm's account.
D. The username must be at least five characters long.

Answer: A

Explanation:
When you add a user, the account is disabled until you specify a password for the account. You can use the -p option with the useradd command, but that requires you to enter an encrypted password. For this reason it is easier to use the passwd command. This enables you to enter a plain text password which will then be automatically encrypted.

Reference: 
Roderick W. Smith. Sybex Linux + Study Guide: page 262.

Incorrect Answers
B: The home directory will be created automatically with the useradd command.
C: The user will use the default shell.
D: The username does not have to be five characters long.

Question 6.
You create a new user account by adding the following line to your /etc/passwd file. Bobm:baddog:501:501:Bob Morris:/home/bobm:/bin/bash
Bob calls you and tells you that he cannot logon. You verify that he is using the correct username and password. 

What is the problem?

A. The UID and GID cannot be identical.
B. You cannot have spaces in the line unless they are surrounded with double quotes.
C. You cannot directly enter the password; rather you have to use the passwd command to 
    assign a password to the user.
D. The username is too short, it must be at least six characters long.

Answer: C

Explanation: 
The password saved in the /etc/passwd file is encrypted. For this reason, you cannot directly enter the password in this file. Rather, you must use the passwd command. The passwd command will take the plain text password and save it in encrypted form in the /etc/passwd file.

Reference: 
Roderick W. Smith. Sybex Linux + Study Guide: page 262.

Incorrect Answers
A: The UID and the GID can be the same.
B: You can have spaces because each field is separated by a colon (:).
D: The username does not have to be at least six characters long.

Question 7.
Which field in the passwd file is used to define the user's default shell?

Answer: command

Explanation: 
The last field, known as the command field or login command, is used to specify what shell the user will use when he/she logs in.

Question 8.
There are seven fields in the /etc/passwd file. Which of the following lists all the fields in the correct order?

A. username, UID, password, GID, home directory, command, comment
B. username, password, UID, GID, comment, home directory, command
C. UID, username, GID, home directory, password, comment, command
D. username, password, UID, group name, GID, home directory, comment

Answer: B

Explanation: 
The first field contains the username. The second field contains the encrypted password or an 'x' if a shadow password file is used. The third field is the User ID number. The fourth field is the primary Group ID number. The fifth field is the comments field. The sixth field is the home directory field. The seventh field is the command field which specifies the user's default shell.

Reference: 
http://www.unet.univie.ac.at/aix/files/aixfiles/passwd_etc.htm

Incorrect Answers
A: The order of these fields is not correct.
C: The order of these fields is not correct.
D: The order of these fields is not correct.

Question 9.
What file defines the levels of messages written to system log files?

Answer: syslog.conf

Explanation: 
The file /etc/syslog.conf contains information used by the system log daemon, syslogd to forward a system message to appropriate log files and/or users.

Reference: 
http://www.unidata.ucar.edu/cgi-bin/man-cgi?syslog.conf+4

Question 10.
Which utility can you use to automate rotation of logs?

Answer: logrotate

Explanation: 
The logrotate utility is used to manipulate log files. This includes the rotation of log files and the creation of new log files.

Reference: 
http://www.oreillynet.com/linux/cmd/l/logrotate.html


Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.