Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "117-202" Exam

Linux Networking Administration

 Question 1.
What is the minimum number of partitions you need to install Linux?

Answer: 1

Explanation: 
At a bare minimum, Linux requires just one partition to install and boot. This is the root partition, which is known as the / partition. However, a minimum of two partitions is recommended: one for the root partition and one for the swap partition. 

Reference: Roderick W. Smith. Sybex Linux + Study Guide: page 37. 

Question 2.
What file contains the default environment variables when using the bash shell?

A. ~/.profile
B. /bash
C. /etc/profile
D. ~/bash

Answer: C

Explanation: 
The file /etc/profile contains shell commands that are executed at login time for any user whose entry in /etc/passwd has a shell specified in the shell field whose name ends in sh.

Reference: 
http://docsrv.caldera.com/cgi-bin/man/man?profile+4

Incorrect Answers
A: The ~/.profile is the profile file stored in each user's home directory. This file contains settings that apply to that user only.
B: The default environment variables are stored in the /etc/profile file, not the /bash file.
D: The default environment variables are stored in the /etc/profile file, not the ~/bash file.

Question 3.
Exhibit:
 

You need to delete the group dataproject. Which two of the following tasks should you do first before deleting the group?

A. A and C
B. A and D
C. B and C
D. B and D

Answer: B.

Explanation: 
You can delete a group by editing the /etc/group file and removing the relevant line for the group. It's generally better to use groupdel, though, because groupdel checks to see if the group is any user's primary group. If it is, groupdel refuses to remove the group; you must change the user's primary group or delete the user account first. As with deleting users, deleting groups can leave "orphaned" files on the computer. It's usually best to delete the files or assign them other group ownership using the chown or chgrp commands.

Reference: 
Roderick W. Smith. Sybex Linux + Study Guide: page 274.

Incorrect Answers
A: It is not necessary to assign new login names to the members listed in the /etc/group file.
C: It is not necessary to assign new login names to the members listed in the /etc/group file.
D: It is only necessary to change the users' default group if the default group is the dataproject group.

Question 4.
All groups are defined in the /etc/group file. Each entry contains four fields in the following order.

A. groupname, password, GID, member list
B. GID, groupname, password, member list
C. groupname, GID, password, member list
D. GID, member list, groupname, password

Answer: A

Explanation: 
A typical line in the /etc/group file looks like the following: 
project1:x:501:sally,sam,ellen,george
Each field is separated from the others by a colon. The meanings of the four fields are as follows:
Group name The first field (project1 in the preceding example) is the name of the group.
Password The second field (x in the preceding example) is the group password. Distributions that use shadow passwords typically place an x in this field; others place the encrypted password directly in this field.
GID The group ID number goes in this field.
User list The final field is a comma-separated list of group members.

Reference: 
Roderick W. Smith. Sybex Linux + Study Guide: page 273.

Incorrect Answers
B: This is the incorrect order of fields.
C: This is the incorrect order of fields.
D: This is the incorrect order of fields.

Question 5.
You issue the following command useradd -m bobm
But the user cannot logon. What is the problem?

A. You need to assign a password to bobm's account using the passwd command.
B. You need to create bobm's home directory and set the appropriate permissions.
C. You need to edit the /etc/passwd file and assign a shell of bobm's account.
D. The username must be at least five characters long.

Answer: A

Explanation:
When you add a user, the account is disabled until you specify a password for the account. You can use the -p option with the useradd command, but that requires you to enter an encrypted password. For this reason it is easier to use the passwd command. This enables you to enter a plain text password which will then be automatically encrypted.

Reference: 
Roderick W. Smith. Sybex Linux + Study Guide: page 262.

Incorrect Answers
B: The home directory will be created automatically with the useradd command.
C: The user will use the default shell.
D: The username does not have to be five characters long.

Question 6.
You create a new user account by adding the following line to your /etc/passwd file. Bobm:baddog:501:501:Bob Morris:/home/bobm:/bin/bash
Bob calls you and tells you that he cannot logon. You verify that he is using the correct username and password. 

What is the problem?

A. The UID and GID cannot be identical.
B. You cannot have spaces in the line unless they are surrounded with double quotes.
C. You cannot directly enter the password; rather you have to use the passwd command to 
    assign a password to the user.
D. The username is too short, it must be at least six characters long.

Answer: C

Explanation: 
The password saved in the /etc/passwd file is encrypted. For this reason, you cannot directly enter the password in this file. Rather, you must use the passwd command. The passwd command will take the plain text password and save it in encrypted form in the /etc/passwd file.

Reference: 
Roderick W. Smith. Sybex Linux + Study Guide: page 262.

Incorrect Answers
A: The UID and the GID can be the same.
B: You can have spaces because each field is separated by a colon (:).
D: The username does not have to be at least six characters long.

Question 7.
Which field in the passwd file is used to define the user's default shell?

Answer: command

Explanation: 
The last field, known as the command field or login command, is used to specify what shell the user will use when he/she logs in.

Question 8.
There are seven fields in the /etc/passwd file. Which of the following lists all the fields in the correct order?

A. username, UID, password, GID, home directory, command, comment
B. username, password, UID, GID, comment, home directory, command
C. UID, username, GID, home directory, password, comment, command
D. username, password, UID, group name, GID, home directory, comment

Answer: B

Explanation: 
The first field contains the username. The second field contains the encrypted password or an 'x' if a shadow password file is used. The third field is the User ID number. The fourth field is the primary Group ID number. The fifth field is the comments field. The sixth field is the home directory field. The seventh field is the command field which specifies the user's default shell.

Reference: 
http://www.unet.univie.ac.at/aix/files/aixfiles/passwd_etc.htm

Incorrect Answers
A: The order of these fields is not correct.
C: The order of these fields is not correct.
D: The order of these fields is not correct.

Question 9.
What file defines the levels of messages written to system log files?

Answer: syslog.conf

Explanation: 
The file /etc/syslog.conf contains information used by the system log daemon, syslogd to forward a system message to appropriate log files and/or users.

Reference: 
http://www.unidata.ucar.edu/cgi-bin/man-cgi?syslog.conf+4

Question 10.
Which utility can you use to automate rotation of logs?

Answer: logrotate

Explanation: 
The logrotate utility is used to manipulate log files. This includes the rotation of log files and the creation of new log files.

Reference: 
http://www.oreillynet.com/linux/cmd/l/logrotate.html


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for JN0-140 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "JN0-140" Exam

Certified Internet Associate (JNCIA-AC) 140 Exam

 Question 1.
Which two statements are true about applying Host Checker at the realm level? (Choose two.)

A. If Evaluate is checked then the client must pass policy to get the sign-in page.
B. If Evaluate is checked then the client can fail policy and still get the sign-in page.
C. If Require and Enforce is checked then the client must pass policy to get the sign-in page.
D. If Require and Enforce is checked then the client can fail policy and still get the sign-in page.

Answer: B, C

Question 2.
Which log contains information about service restarts, system errors, warnings, and requests to check server connectivity?

A. Events log
B. System log
C. User Access log
D. Admin Access log

Answer: A

Question 3.
Which statement is correct about defining an Intranet Enforcer for use as a RADIUS Client?

A. You do not need to configure a RADIUS client policy.
B. You must know the exact model number of the Intranet Enforcer.
C. You must specify the NACN password of the device in the RADIUS client policy.
D. You do not need to designate a location group to which the Intranet Enforcer will belong.

Answer: A

Question 4.
Which configuration option can be set either in the initial console menu or the Admin UI of the Intranet Controller?

A. VLAN ID
B. Hostname
C. Domain name
D. Administrative timeout

Answer: C

Question 5.
What is the primary purpose of creating a Location Group Policy?

A. to associate more than one realm with an authentication server
B. to logically group network access devices and associate them with specific sign-in policies
C. to allow or prevent users from accessing resources in specific locations on the network
D. to define the URL that users of network access devices can use to access the Intranet Controller

Answer: B

Question 6.
What is true about the operation of the Intranet Enforcer?

A. It assigns users a set of roles.
B. It allows access based on auth table entries.
C. It verifies whether an endpoint meets security requirements.
D. It configures the UAC agent to allow or deny access to resources.

Answer: B

Question 7.
On a pre-existing OAC, which three options can the Intranet Controller overwrite when the user accesses the Intranet Controller? (Choose three.)

A. SSID
B. login name
C. MAC address
D. wired adapters
E. encryption method

Answer: A, D, E

Question 8.
What must be updated regularly to detect the newest versions of personal firewalls on endpoints?

A. Intranet Enforcer firmware
B. Intranet Controller rollback software
C. Host Security Assessment Plug-in (HSAP)
D. Endpoint Security Assessment Plug-in (ESAP)

Answer: D

Question 9.
Which three statements about dynamic filtering are true? (Choose three.)

A. Dynamic filtering creates a query statement.
B. Dynamic filtering has an option to save query.
C. Dynamic filtering can select any log field to filter.
D. Dynamic filtering permanently removes other log entries.
E. Dynamic filtering redraws the log when you select a variable link.

Answer: A, B, E

Question 10.
A customer has installed UAC in their network. They have both Windows and Linux endpoints and must choose a deployment method that everyone can use. 

Which deployment method allows for multiple platforms?

A. IPsec enforcement
B. 802.1X enforcement
C. Source IP enforcement
D. Odyssey Access Client

Answer: C


Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.