|
Question 1. What is the purpose of the file command? A. The file command is used to transfer files between file systems. B. The file command attempts to classify the file type based on the file’s content. C. The file command reports on file size, file ownership, and access permissions. D. The file command is used to search binary data streams for references to readable ASCII files. Answer: B Explanation: It is used to determine the type of a file. It can take –b option, meaning do not follow symbolic links, or –f ffile, ffile is file containing a list of the file to be examined. Examples: $file /tmp /tmp: directory $ file /usr/bin/cp /usr/bin/cp: ELF 32-bit MSB executable SPARC Version 1. Question 2. What is the result of using the following command? # mkdir –p dir1/dir2/dir3 A. It creates three directories, named dir1, dir1/dir2, and dir1/dir2/dir3 respectively. B. It creates three directories, named dir1, dir2 and dir3, using the current working directory as the parent directory. C. It attempts to create dir1/dir2/dir3, but posts appropriate error messages if the parent directory of dir1 or dir1/dir2 do not exist. D. It creates three directories, named dir1, dir2 and dir3, and overrides the permission modifications created by the file mode creation mask. Answer: A. Explanation: The –p option tells mkdir to create an entire new structure at once (even the dir1 is not exist yet) Watch out the wording – it tried to trick you! Question 3. Which vi character sequence replaces all occurrences of the string Solaris with the string Solaris Operating Environment in the current file? A. :s/Solaris Operating Environment/Solaris/ B. :r/Solaris/Solaris Operating Environment/g C. :%s/Solaris/Solaris Operating Environment/ D. :%s/Solaris/Solaris Operating Environment/g Answer: D. Explanation: To change all occurrences of text “old” to text “new”: :% s/old/new/gor :1,$ s/old/new/g Question 4. Which three characters can be entered from command mode in the vi to change the last line mode? (Choose three) A. : B. ; C. ^ D. / E. + F. ? G. $ H. % Answer: A, D, F Question 5. Which vi command is used to copy three lines of text to memory and then paste theses lines above the current line? A. 3cP B. 3yyP C. 3yyp D. :3c/p E. copy:3pp Answer: B Explanation: yy is to yank the current line. You can add N before that(yy) to make N line yank. To put the yanked buffer before the current line (above the line), you have to use P. “p” is to put the yanked buffer after the current line. Question 6. Which command should be used to uninstall patch 106793-01? A. patchrm 106793-01 B. patchdel 106793-01 C. patchadd –d 106793-01 D. patchinfo –d 106793-01 Answer: A Explanation: To remove a patch, you should use – patchrm [options] patch_id. Question 7. Which three statements about the permfile permissions are true? (Choose three) A. The sticky bit is set. B. The file has the SUID bit set. C. Mandatory locking is enabled. D. The file is not executable by any user. E. The associated group has read and write permissions. F. The associated group has read, write, and execute permissions. Answer: C, D, E Explanation: chmod 20#0 – if the # is 7,5,3, or 1 then Set group id on execution. If the # is 6,4,2 then Mandatory locking is set. And 0666 means rw- for owner, group and others. (Sticky bit is set by 1000. Set userid on execution is 4000)* Question 8. Which single character is a Regular Expression denotes “zero or more occurrences of the previous”. Answer: * Explanation: Three metacharacter – 1. ? - matches any single character. 2. * - matches zero or more (0-N) occurrences of any character. 3. [..] - represents a set of characters of which any one can match. Ex. [a-z], [A-Z], [0-9]. Question 9. Which command displays an Access Control List for a file? A. 1sac1 B. getac1 C. aclget D. faclget E. getfacl Answer: E – getfacl. setfacl is to set ACL list. Other commands do not exist. Explanation: The following example sets the file owner permissions to read/write/execute, file group permissions to read only, other permissions to none, and the ACL mask permissions to read on the ch2.doc file. In addition, the user george is given read/write permissions; however, due to the ACL mask, the effective permissions for george are read only. $ setfacl -s u::7,g::4,o:0,m:4,u:george:7 ch2.doc $ getfacl ch2.doc # file: ch2.doc # owner: nathan # group: sysadmin user::rwx user:george:rwx #effective:r-- group::r-- #effective:r-- mask:r-- other:--- Question 10. Given: $ 1s –1d telephone drwxrwsrwx 2 lesley sp 512 Aug 3 17:28 telephone Which command clears the SGID-bit causing this behavior? A. chmod g-1 telephone B. chmod g-s telephone C. chmod 767 telephone D. chmod 0777 telephone E. chmod 0767 telephone Answer: B Explanation: chmod “+” is to add permissions; “-“ is to take away, and “=” is to assign permissions. Question 11. Your umask value is set to 022 and you create a file. Which set of permissions are associated with this file? A. rw-r--r-- B. rwxr--r-- C. ----w--w- D. rw-rw-rw- E. rwxrwxrwx Answer: A. Explanation: Remember that the permissions for created files will always be the numeric value 666 minus the umask value. (666 – 022 = 644) Important Points: to make permanent change, change the umask value in user’s .profile or .cshrc. If you just change it on the current shell session, the effect is only temporary! (Next time, you log in, it will be lost!) Question 12. Which command string displays the file and directory names that begin with the characters a, b, or c and that end with number 1? A. ls –d abc*1 B. ls [a-c*1] C. ls –ld [abc]*1 D. ls {a,b,c}/* Answer: C. Explanation: Please refer to Question 2. Question 13. Your current working directory is the /export/home_a/user1 directory. Which two command strings put you into the /export/home_b/user20 directory? (Choose two) A. cd ../user20 B. cd../home_b/user20 C. cd../../home_b/user20 D. cd /export/home_b/user20 Answer: C ********D. C is correct, because it use relative path. D is correct, it use absolute path. cd ../ once, will go up to home_a dir. another cd ../ will go up to export directory. Explanation: the directory structure is like this: /export----/home_a/user1 you are here (working dir- “pwd”) ----/home_b/user20 Question 14. Your current working directory contains: ./ ../ .tst dir1/ file1 file2 file3 file4 Which command copies the .tst file into the dir1 directory? A. cp * dir1 B. cp .* dir1 C. cp *.* dir1 D. cp .tst dir1 Answer: D. Explanation: Only D copies .tst file to dir1. A will copy all files to dir1. B will copy all hidden files (.profile etc) to dir1. C will copy all files too. Question 15. Which three configuration parameters are set up during the Solaris 8 Operating Environment custom installation procedure? (Choose three) A. 64-bit support. B. File system layout C. User disk usage quotas. D. System printer selection. E. Software Cluster configuration. Answer: B, C, E. Explanation: File system layout, user disk usage quotas, and software cluster configuration are the three parameters that are set up during the Solaris 9 OS Environment custom installation procedure.
|
Question 1. ITCertKeys.com wants to use distinct security policies for different departments. What must be configured? A. individual security level for each department B. separate ACL group for each department C. distinct VLAN for each department D. unique firewall context for each department Answer: D Question 2. Exhibit: You work as a network administrator at ITCertKeys.com. You study the exhibit carefully. ITCertKeysA, ITCertKeysB, C, and ITCertKeys4 each represents a model for placement of a default gateway. Which model allows the maximum number of application and security services? A. model ITCertKeysB B. model C C. model ITCertKeysA D. model ITCertKeysD Answer: B Question 3. Which of the following attack types should be mitigated in the data center core layer? A. IP spoofing B. MAC address spoofing C. port scans D. DDoS attacks Answer: D Question 4. Exhibit: You work as a network administrator at ITCertKeys.com. You study the exhibit carefully. A failure occurs on one of the access layer uplinks. Which Layer 2 topology can cause a break in connectivity between the FWSMs? A. looped triangle B. loop-free inverted U C. loop-free U D. looped square Answer: C Question 5. Which type of HPC application requires low latency? A. financial analytics B. seismic and geophysical modeling C. digital image rendering D. finite element analysis Answer: D Question 6. Which statement best describes the data center core layer? A. provides a resilient Layer 2 routed fabric B. load balances traffic between the core and aggregation layers C. is typically merged with the campus core layer D. connects to the campus aggregation layer Answer: B Question 7. Which data center network-architecture change is a result of the adoption of blade and 1-RU server technologies? A. Layer 3 fault domains growing smaller B. Layer 2 fault domains growing larger C. Layer 2 fault domains growing smaller D. Layer 3 fault domains growing larger Answer: B Question 8. What advantage does InfiniBand have over Gigabit Ethernet in HPC environments? A. simpler cabling B. longer distance support C. more sophisticated traffic management D. lower latency Answer: D Question 9. Exhibit: You work as a network administrator at ITCertKeys.com. You study the exhibit carefully. Where is Layer 2 adjacency required? A. server-to-server only B. aggregation-to-access only C. aggregation-to-access and access-to-server D. access-to-server only Answer: D Question 10. According to the Cisco Network Foundation Protection model, which security feature is recommended for the data center core layer? A. prefix filtering B. Dynamic ARP Inspection C. traffic rate limiting D. control plane protection Answer: D
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.