Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "3X0-201" Exam

Core Concepts and Practices (Level 2)

 Question 1.
Which of the following statements are TRUE regarding the ext2 file system? (Choose two)

A. The fsck program is necessary to reconcile the file system.
B. There is no limit on the length of a file name.
C. It implements journaling.
D. It ignores timestamps.
E. Larger file system blocks enable larger file sizes.

Answer: A, E

Question 2.
Ann is a system administrator. She is worried that there are unauthorized programs on her system that run with root privileges. She decides that she wants to check the entire file system for files that have the potential to run as root. 

Which of the following commands will help Ann accomplish this task?

A. locate -d rootdb *root* -e /proc -f ext2
B. find / -type f -user root -pring -o -perm +4000 -print
C. find / -type f -name root -print -o -user su -print -o perm 777 -print
D. ls -aIR / | grep toot.root."
E. locate -perm -4000 -print

Answer: B

Question 3.
Emile wants to change the gdm logo. 

Which of the following line should she edit in the gdm.conf file?
Line1 [greeter]
Line2 Browser=0
Line3 DefaultFace=/usr/share/pixmaps/nobody.png
Line4 DefaultLocale=English
Line5 Exclude-bin,daemon,adm,lp,sync,shutdowm,halt,,ail,news, uucp, operator, nobody
Line6 Font=adobe-helvetica-bild-r-normal-*-*-180-*-*-*-*-*-*
Line GlobalFaceDir=/usr/share/faces
Line8 Icon=/usr/share/pixmaps/gdm.xpm
Line9 LocaleFile=/etc/X11/gdm/locale.alias
Line10 Logo=/usr/share/pixmaps/gnome-logo-large.png

A. Line 3
B. Line 4
C. Line 8
D. Line 9
E. Line 10

Answer: E

Question 4.
Sheila, a Webmaster, understands the risks associated with over clocking and has over clocked two processors on two different Web servers. 

Which of the following results should she expect to see from the system if the over clocked processors are working properly? (Choose two)

A. Increased CPU instructions speed
B. Increased RAM storage
C. Increased had drive write speed
D. Increased memory bus speed
E. Increased SCSI peripheral speed

Answer: A, D

Question 5.
A cracker has gained root access from the console. 

Which of the following would be the first location a system administrator would look to verify that an attack has occurred?

A. /var/log/httpd/access_log
B. /etc/securetty
C. /root/.bash_history
D. /dev/console

Answer: C

Question 6.
The system administrator is mining the /proc file trying to find out the speed of his processor. In which of the following files should the administrator look?

A. cpuinfo
B. cputype
C. cputime
D. cpustat
E. cpu

Answer: pending, send your comments, suggestion or feedback at feedback@itcertkeys.com

Question 7.
The system administrator would like to view the memory usage of process 1900. He decides to mine/proc for the necessary information. Which file in / proc contains such information?

A. 1900/vusage
B. 1900/smem
C. 1900/statm
D. 1900/mem

Answer: C

Question 8.
Which of the following are TRUE concerning the given directory listing? (Choose two)
prw------- 1 root root 0 May 12 04:00 /dev/drum
brw------- 1 amp root 1 Jul 17 13:53 /dev/piano
-rw-rwSrw- 1 amp users 0 Jun 21 13:00 saxophone
-rwxrwxrwxT 1 amp users 0 Jun 21 01:00 flute
srw-rw-rw- 1 root root 0 Apr 17 19:17 tuba

A. The entry "/dev/piano" refers to a character device.
B. The sticky bit is for the file "flute"
C. The entry "/dev/drum"refers to a named pipe.
D. The entry "saxophone" refers to a socket.
E. The SGID bit is set for "tuba"

Answer: B, C

Question 9.
A cracker has gained root access from the console. Which of the following would be the first location a system administrator would look to verify that attack has occurred?

A. /var/log/http/access_log
B. /etc/securetty
C. /root/.bash_history
D. /dev/console

Answer: C

Question 10.
The server responsible for running the site www.itcertkeys.com is also responsible for the DNS resolution of its specific sub domain. 

What is this responsibility called, and why is it used?

A. Super DNS resolution; it is used so that DNS lookups can achieved more quickly.
B. passing; it is used so fewer refusal messages are returned when looking up a name.
C. Caching; it is used to return names more quickly.
D. Delegation; it is used to decentralize administration on the internet

Answer: D

Question 11.
Top-level domains are located under which of the following?

A. ARPANET root
B. NIC root
C. ARP root
D. DNS root

Answer: B

Question 12.
The most common type of Linux network configuration is the ______ network, using__________

A. Ethernet, TCP/IP
B. Token ring. TCP/IP
C. Ethernet, IPX
D. Token ring, IPX

Answer: A

Question 13.
James download a variety of tools to exploit a system, including Trojan Horse programs that replace system binaries and programs that can mask the presence of system crackers. 

What did James download?

A. The Common System Administration Troubleshooting Tools(csattkit)
B. A rootkit
C. A crackkit
D. A wormkit
E. A systemmaskkit

Answer: B

Question 14.
Tom wants to put a RAID on his NIS server, chewy. Tom is concerned about the integrity of the data on chewy, and he wants to be able to sustain a one-disk failure without having to restore from backup. 

He also wants to use four hard disks. Which of the following arrays should he NOT use?

A. RAID 0
B. RAID 5
C. RAID 10
D. RAID 0+1

Answer: A

Question 15.
Backside bus speed refers to the connection between _____ and the processor.

A. Level 1 cache
B. Level 2 cache
C. The hard drive
D. Main memory
E. Peripherals

Answer: B

Question 16.
Your system appears to be running slowly. You run the "/bin/ps aux" command., and it displays all the processes currently running on your system. After analyzing the output, you notice a significant gap in the PID sequence. You issue the command "Is-al/bin/ps" and realize that the ps program has an unusual creation date. 

Which of the following best describes your altered ps program?

A. It is a virus
B. It is a program that exploits a buffer overrun.
C. It is a program that exploits a buffer overflow
D. It is a worm
E. It is a Trojan horse.

Answer: E

Question 17.
A system administrator is securing a Web server. In order to prevent local user from adding directives to the https. conf file, she decides to change the permissions on the httpd.conf. The 

Web server runs as user and group web, and no other users are in this group. 

Which of the following would be secure file permissions to set on the httpd.conf file? (Choose two)

A. -rwxrwxrwx
B. -rwx----
C. -rw-rw-rw-
D. -rw-rw-w
E. -rw---x---

Answer: B, E

Question 18.
Which of the following is NOT a characteristic of a hardware-based RAID?

A. Performance is degraded because the RAID controller competes with other devices on the 
     bus.
B. The RAID system is managed independently from the host
C. It presents the host with only one disk per RAID array.
D. It is possible for the RAID subsystem tp span over multiple SCSI channels

Answer: A

Question 19.
The Internet Cache Protocol (ICP) is used by Squid to do which of the following tasks?

A. Communicate between the cache and the client browser
B. Communicate between the cache and the remote requested location
C. Communicate between multiple cache servers
D. Communicate between the client browser and the remote requested location

Answer: C

Question 20.
The _______ translate the fully qualified domain name into the corresponding IP address.

A. Internet Name Server
B. User Name Mapping Service
C. Domain Name Service
D. NetBIOS Name Server

Answer: C


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 4A0-102 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "4A0-102" Exam

Alcatel-Lucent Border Gateway Protocol

 Question 1.
Which of the following are Link State protocols?

A. BGP
B. RIP
C. OSPF
D. IS-IS

Answer: C, D

Question 2.
ECMP supports which of the following. Choose the best answer.

A. 8 equal-cost paths per destination learned from any protocol
B. 16 equal-cost paths per destination learned from any protocol
C. 8 equal-cost paths per destination learned from the same protocol and preference
D. 16 equal-cost paths per destination learned from the same protocol and preference
E. 4 equal-cost paths per destination

Answer: D

Question 3.
Which of the following statements best describes the function of the RTM?

A. From the router's route table, select the best routes to be installed in the FIB for forwarding 
    data.
B. Based on the metrics of the routingprotocol, chose the lowest cost route to be installed in the 
    route table.
C. Apply the BGP route selection criteria to select the best route to be installed in the route table.
D. Select the preferred route from the various routing protocols to be installed as the active route 
    in the route table.
E. Apply the assigned import and export policies to determine the routes to be advertised to the 
    router's neighbors.

Answer: D

Question 4.
What items are carried in a typical classless routing update? Select the best answer.

A. Network address, mask and metric
B. Network address and metric
C. Prefix and mask
D. prefix, next-hop and metric
E. prefix and next-hop

Answer: A

Question 5.
Choose the most accurate statement about the connections between eBGP peers.

A. eBGP peers are usually directly connected to each other.
B. eBGP peers are always directly connected to each other.
C. eBGP peers are never directly connected to each other.
D. eBGP peers are usually directly connected to each other, unless they are in the same 
    autonomous system.
E. eBGP peers are usually not directly connected to each other, additional configuration is 
    required if they are.

Answer: A

Question 6.
What message is issued by a neighbor as a response to a valid Open?

A. Keepalive
B. Open
C. Exchange
D. Notification
E. Ping

Answer: A

Question 7.
Which of the following is not exchanged in a BGP Open message?

A. BGP version number
B. The local AS number
C. The hold time
D. Thekeepalive timer
E. The Router ID

Answer: D

Question 8.
The state of one BGP neighbor shows Established, which of the following is false?

A. The router has established a complete session with that neighbor.
B. BGP can exchange update, notification andkeepalive messages with that neighbor
C. If thekeepalive timer expires, the local system sends a keepalive message and restarts its 
    keepalive timer
D. If the local system receives a notification message, it changes its state toOpenConfirm
E. Established is the operational state

Answer: D

Question 9.
Which of the following is a Well Known Mandatory attribute?

A. Origin Code
B. Local Preference
C. MED
D. AS Path
E. (a) and (d)
F. (b) and (d)

Answer: E

Question 10.
Which of the following is true, based on the AS Path list shown here? 65206 65111 65100

A. AS 65206 originated the route
B. AS 65111 is a transit AS
C. AS 65100 is a transit AS
D. AS 65100 originated the route
E. (b) and (d)
F. (a) and (c)

Answer: E



Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.