Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "310-202" Exam

Sun Certified System Administrator for the Solaris 10 OS, Part II

 Question 262.
Swap space in Solaris 10 OS is managed by the swapfs file system.

Which two statements accurately describe swapfs? (Choose two.)

A. The swap file system consists only of swap slices and swap files.
B. The swap file system might consist of physical RAM, swap slices, and swap files.
C. The swapfs provides real physical swap space addresses in response to swap space 
     reservation requests.
D. The swap slices and swap files managed by swapfs need to be twice as large as physical 
     RAM on the system.
E. The swapfs provides virtual swap space addresses, thus decreasing the need for physical 
     swap on systems with large, available memory.

Answer: B, E

Question 263.
The security team requests that NFS logging be enabled. They supply you with the
configuration parameters that they want.
In which file do you need to place the configuration parameters?

A. /etc/default/lognfs
B. /etc/default/nfslogd
C. /etc/default/nfs_log
D. /etc/default/nfs/nfslogd

Answer: B

Question 264.
If the auto mounter is used, which client file no longer needs to be updated to allow
the automatic mounting of NFS resources upon reboot of the client?

A. /etc/vfstab
B. /etc/default/fs
C. /etc/dfs/dfstab
D. /etc/dfs/fstypes
E. /etc/dfs/sharetab

Answer: A

Question 265.
You run an IT department and are responsible for purchasing hardware. Certain data that you have housed in a series of traditional disk slices are critical and must not be lost due to disk failure.

The amount of data is large (720 gigabytes) and is read and written to frequently. 

The performance for both read and write operations needs improvement. You have plenty of money in your budget.

Which two approaches will meet your business needs? (Choose two.)

A. secure the data using RAID 0
B. secure the data using RAID 1
C. secure the data using RAID 5
D. secure the data using RAID 0+1
E. secure the data using RAID 1+0

Answer: D, E

Question 266.
You must set up three users to administer the artwork department. These users will be launching several applications with the EUID of department administrator. 

Using the RBAC mechanism, what is the sequence of events to execute this process?

A. create entries for the applications in the RBAC profile database, associate a role with the new 
    profile entry, and give the three users access to the role
B. update the $HOME/.rbac_privs file for each user to point to applications in question and 
     amend the user attribute database to use the admin EUID with these applications
C. create entries for the applications in the RBAC policy attributes database, associate a profile 
    with the new policy entry, associate a role with this profile, and give the three users access to 
    the role
D. create entries for the applications in the RBAC execution attributes database, associate a 
    profile with the new execution entry, associate a role with this profile, and give the three users 
    access to the role

Answer: D

Question 267.
Which two commands list all the authorizations assigned to user john? (Choose two.)

A. auths john 
B. su john -c auths
C. grep -w john /etc/user_attr
D. grep john /etc/security/auth_attr
E. grep -w john /etc/security/auth_attr 

Answer: A, B

Question 268.
A Solaris 10 OS is configured to log to the /var/adm/messages file using syslog.

Which two statements are correct? (Choose two.)
f
A. The logadm utility automatically rotates the /var/adm/messages file.
B. The tail -f /var/adm/messages command can be used to monitor the /var/adm/messages file in 
     real time
C. The syslog facility automatically trims the /var/adm/messages file, deleting messages that are 
     more than twenty-four hours old.
D. The /var/adm/messages file is a DBF formatted binary file. The Solaris Management Console 
    Log Viewer GUI is the only way to monitor the /var/adm/messages file in real time.
E. The /var/adm/messages file only contains the severity of the message. The facility of the 
     message must be interpreted using the process name and ID contained in the message.

Answer: A, B

Question 269.
Sometimes a process must give up some of its memory space allocation to another process. The process has some of its pages in RAM paged out.

Which two statements accurately describe this paging process? (Choose two.)

A. All the modified data memory pages of a process are moved to a swap area.
B. Selected anonymous memory pages that contain private data or stack information are placed 
    in a swap area.
C. Unchanged file system pages are NOT placed in swap areas because file system data exist as 
    permanent storage.
D. The size of a memory page is fixed and is based on the architecture of the machine running  
    Solaris 10 OS (8192 bytes for SPARC, 4096 bytes for x86 platforms).

Answer: B, C

Question 270.
Given:
Lo0: flags=100849 mtu 8232 index 1
inet 127.0.0.1 netmask ff000000 hme0:  
flags=1000863 mtu 1500
index 2 inet 192.200.200.9 netmask ffffff00 broadcast 192.200.200.255 ether 7:1:20:8a:74:e1

What is the MAC address?

Answer: 7:1:20:8a:74:e1

Question 271.
You want to allow the NFS server saturn to share the /var/tmp directory read-only with clients pluto and mars. You also want to allow pluto to have root access to this directory.

Which line should you add to the /etc/dfs/dfstab file for saturn?

A. share -F nfs -o ro,root=pluto /var/tmp
B. share -F nfs root_access pluto /var/tmp
C. share -F nfs -o,ro=mars:pluto,root=pluto /var/tmp
D. share -F nfs -o,root=pluto,ro=mars,pluto /var/tmp
E. share -F nfs ro,root=pluto /var/tmp client=mars:pluto

Answer: C

Question 272.
During boot up, your x86-based laptop that is running the Solaris 10 OS displays the message:
NFS server arizona not responding, still trying

Which two are valid troubleshooting procedures for this problem? (Choose two.)

A. restart the NFS client-side daemons
B. verify that the nfsd daemon is running on your laptop
C. verify that your laptop is connected to the correct network
D. verify that the server arizona is up and that its network interface is up.
E. verify that the NFS client entry in /etc/inetd.conf is correct, then get inetd to reread the 
    /etc/inetd.conf

Answer: C, D

Question 273.
Which statement about RAID levels is true?

A. RAID 5 uses distributed parity
B. RAID 0+1 provides no advantage over RAID 1.
C. RAID 0 refers to striping but NOT to concatenation.
D. RAID 1 is the only RAID level providing redundancy.

Answer: A

Question 274.
Which two statements are true about hot spare usage and features? (Choose two.)

A. A hot spare can hold data NOT in immediate use.
B. A hot spare can improve the robustness of a RAID-0 volume.
C. A hot spare is a slice that is functional and available, but NOT in use.
D. A hot spare is a volume that is functional and available, but NOT in use.
E. A hot spare is on reserve to substitute for a failed slice in a sub mirror or RAID-5 volume.

Answer: C, E

Question 275.
When will Solaris Volume Manager software volumes continue to function normally in the event of the corruption of one copy of its state database?

A. when the master copy of the state database is NOT corrupted
B. when the copy of the state database on the boot disk is available
C. when more than half of the copies of the state database are available
D. when NOT more than a single copy of the state database is corrupted

Answer: C

Question 276.
Based upon the business needs of the company, highly available data are very important, but the cost of a fully mirrored data configuration is beyond the current financial resources of the company.

Which RAID configuration should you choose to hold the companies data?

A. RAID 0
B. RAID 1
C. RAID 5
D. RAID 1+0
E. RAID 0+1

Answer: C

Question 277.
You run an IT department and are responsible for purchasing hardware within a given budget. You are aware that 70 GB of data housed in a series of traditional disk slices is becoming critical to the business. You decide to mirror the data but have concerns about write performance. You can purchase the disk space to mirror the data. What is a cost-free configuration enhancement that achieves fast write performance?

A. Arranging for the mirror to consist of just two disks.
B. Using RAID 5 to hold the data in each half of the mirror.
C. Striping the data across the disks in each half the mirror.
D. Concatenating the data across the disks in each half of the mirror.

Answer: C

Question 278.
You work as a network administrator for ITCertKeys.com. You use 10 disks to form a 10-column RAID 5 volume. What proportion of space is used for housing the parity?

A. ½
B. 1/10
C. 2/10
D. 9/10

Answer: B

Question 279.
You have a 10 GB, 10 times 1GB, RAID 5. How much disk space do you lose by using RAID 5?

A. 1/10
B. 1/2
C. 1/3
D. 1/4

Answer: A

Question 280.
Which statement about an Ethernet address is true?

A. it is unique for every system
B. it has an entry in the /etc/inet/hosts file
C. It is a 32-bit address divided into four 8-bit fields
D. It is a number assigned by the system administrator

Answer: A


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for EX0-102 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "EX0-102" Exam

Microsoft Operations Framework, MOFF

 Question 1.
Which of the following is a responsibility of the Operations Role Cluster?

A. detecting intrusions and protecting against viruses
B. managing business-to-business trading interfaces
C. managing IT-procurement and purchasing functions
D. prioritizing service improvement requests and identifying gaps for future functionality

Answer: B

Question 2.
In what way does Capacity Management contribute to improving IT Service Management?

A. By identifying the major technology components, infrastructure, people and processes that 
    underpin the end-to-end delivery of service
B. By preventing interruptions to IT services as well as recovering services after an interruption 
    occurs
C. By planning and monitoring the job scheduling process according to the requirements in the 
    Operational Level Agreements (OLAs)
D. By planning the implementation of business requirements for IT Services so they are in place 
    when the business needs them

Answer: D

Question 3.
Which Service Management Function (SMF) needs to ensure that efficient incident detection and recovery tools and processes are in place to handle any service outages that do occur?

A. Availability Management
B. Release Management
C. Service Desk
D. System Administration

Answer: A

Question 4.
Which Role Cluster has a portfolio of business-aligned IT services as a quality goal?

A. Operations
B. Partner
C. Service
D. Support

Answer: C

Question 5.
Which Service Management Function deals with the day-to-day activities and tasks related to maintaining and adjusting the IT security infrastructure?

A. Availability Management
B. Security Administration
C. Security Management
D. System Administration

Answer: B

Question 6.
What is the relationship between releases and changes?

A. A change includes both changed hardware and software components and components that 
    were not changed. A release only includes changed hardware and software components.
B. Changes are incorporated into the IT environment by releases.
C. Releases and changes are incorporated into the IT environment independently of each other.
D. Releases are incorporated into the IT environment by changes.

Answer: B

Question 7.
Which of the following is a key requirement for planning service solutions?

A. a managed IT environment
B. a milestone-driven implementation process
C. take the perspective of end-to-end services
D. understanding of the business and the operational requirements

Answer: D

Question 8.
Which of the following describes the concept of Service Management Functions (SMFs)?

A. a model for measuring the performance of the process
B. a model for organizing IT staff
C. organizational units that support IT operations
D. processes, procedures and policies to deliver and support IT service solutions

Answer: D

Question 9.
What is a goal of Security Administration?

A. accessibility
B. confidentiality
C. connectivity
D. interconnectivity

Answer: B

Question 10.
Which steps in the MOF Risk Management Process follow each other immediately?

A. Analyzing and Prioritizing Risks - Planning and Scheduling Risk Actions
B. Analyzing and Prioritizing Risks - Tracking and Reporting Risks
C. Identifying Risks in Operations - Planning and Scheduling Risk Actions
D. Identifying Risks in Operations - Tracking and Reporting Risks

Answer: A


Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.