q7 Linux Full
-
Upload
rezapahlevi -
Category
Documents
-
view
16 -
download
0
description
Transcript of q7 Linux Full
Pat Greene is working as a network administrator at XYZ Inc.
Pat implements a directory service to store data at a centralized
location. Pat is informed that:
-The authorized users are not able to access the Directory server as
a malicious user is identifying the hardware and software environment
of the directory server.
-After identifying the capacity of the directory server, the
malicious user is sending more traffic than what the server can
handle.
Which technique does this type of attack illustrate?
SYN attack
Buffer overflow attack
Indirect resource consumption
Direct resource consumption
Jim Lewis wants to migrate a .NET application to a Linux platform. To
perform the task, Jim compiles the application on the Windows
platform. He then copies the compiled source code of the application
to the /usr/src directory of the Linux computer, on which the
application will be run. After copying the source code to the
/usr/src directory, Jim needs to compile the application source code
on the Linux platform. In addition, Jim wants to generate debugging
information and ignore the warning messages displayed during the
compilation of the source code. What should Jim do to perform the
required tasks?
Use mcs command with debug and fatal options.
Use mono command with security and v option
Use mcs command with debug and nowarn options.
Use mono command with aot and config filename options.
Technology Systems is an IT organization based at Atlanta. The
organization decides to open a new development center at Florida. The
management of the organization asks John Barrett, the network
administrator, to configure a mail server at this new center. For
this, John needs to install send-email packages. John observes that
the binary RPM package for send-email package is not available on the
network, however, the Source RPM (SRPM) package is available.
Therefore, John decides to build binary RPM package from SRPM. What
should John do to perform the task?
Execute rpmbuild –bSTAGE [options] /usr/src/redhat/SRPMS
Execute rpmbuild –bSTAGE [options] /usr/src/redhat/SPECS
Execute rpmbuild –bSTAGE [options] /usr/src/redhat/SOURCES
Execute rpmbuild –bSTAGE [options] /usr/src/redhat/BUILD
Technology Systems is a .NET applications development organization,
based in the US. The organization uses the Window platform for
developing .NET applications. To provide more security to the .NET
applications, the organization asks to Tom Wilkins, the network
administrator, to migrate the .NET applications to the Linux
platform. The organization also asks to Tom to precompile the code in
an assembly language. To perform the task, Tom compiles the source
code of the .NET application to generate the .exe file, named
temp.exe. Now, to execute the .NET application, Tom uses following
the code snippet:
# mono-config filename sample.exe
However, Tom finds that the above code snippet is not giving the
desired results. What should Tom do to solve the problem?
Tom should use the following:
# mono-V sample.exe
Tom should use the following:
# mono--aot sample.exe
Tom should use the following:
# mono--security sample.exe
Tom should use the following:
# mono--config filename sample.exe
Larry Williams is working as a system administrator at BlueMoon
Computers. Larry observes that the performance of the server is
decreasing as the users in the organization are excessively querying
one section, employee information, of the server. The management,
therefore, asks Larry to distribute the directory to improve the
performance of the server. After distributing a directory, such that
Server1 maintains the information about the organizational
information while the employee information is maintained by Server2.
Now, Larry needs to verify the correctness of the data stored in
Server2. For this, Larry executes the following command:
# slapcat -H –C ldap://Server2.bluemooncomputers.com/ -LL -x -b
"dc=bluemooncomputers,dc=com" "(ou=*)" ou
However, Larry is not able to retrieve results from the Server2,
which contains the employee information. What should Larry do to
perform the required task?
Use
# ldapsearch -H –C ldap://Server2.bluemooncomputers.com/ -LL -x -b
"dc=bluemooncomputers,dc=com" "(ou=*)" ou command
Use
# slapindex -H –C ldap://Server2.bluemooncomputers.com/ -LL -x -b
"dc=bluemooncomputers,dc=com" "(ou=*)" ou command
Use
# slapadd -H –C ldap://Server2.bluemooncomputers.com/ -LL -x -b
"dc=bluemooncomputers,dc=com" "(ou=*)" ou command
Use
# slapcat -c –H ldap://Server2.bluemooncomputers.com/ -LL -x -b
"dc=bluemooncomputers,dc=com" "(ou=*)" ou command
Ed Young is a network administrator at Global Systems. The
organization implements Linux on all its workstations and servers. Ed
wants to open a .zip file on his Linux-based workstation. The file
was compressed using the Windows WinZip utility. Therefore, he
installs WinZip on his workstation. After installing WinZip, Ed types
the following code snippet at the shell prompt to run the WinZip
utility:
$ Wine ~/.wine/Program\ Files/WinZip/WINZIP32.EXE ?
However, when Ed executes the snippet, it does not provide the
required output. What should Ed do to solve the problem?
Ed needs to write the following code snippet:
$ wine ~/.wine/drive_c/Program\ Files/WinZip/WINZIP32.TXT ?
Ed needs to write the following code snippet:
$ wine drive_c/Program\ Files/WinZip/WINZIP32.EXE ?
Ed needs to write the following code snippet:
$ wine /Program\ Files/WinZip/WINZIP32.EXE ?
Ed needs to write the following code snippet:
$ wine ~/.wine/drive_c/Program\ Files/WinZip/WINZIP32.EXE ?
Consider the statements:
Statement A:
The BOOTP server contains the information about the configuration of
the computers on which Linux needs to be installed.
Statement B:
During the Kickstart installation of Linux over a network, the
Kickstart client needs to have either the network information or the
files required for installing the Linux operating system.
Which of the following is true, with respect to the above
statements?
Both, statements A and B, are false.
Statement A is false and statement B is true.
Statement A is true and statement B is false.
Both, statements A and B, are true.
Which ACLs configuration parameter disables all the permissions of
the authorized users accessing the OpenLDAP server?
Write
Compare
Auth
None
Tom Wilkins is working as network administrator at Quality Software
Developers. All workstations and servers in the organization form a
Local Area Network (LAN). Tom wants to implement a Red Hat Network
(RHN) to manage these systems. He needs to configure a server to
enable the RHN and LAN users to exchange information, such as
software updates and solutions to software related problems, even
when the users are offline. He also wants to prevent unauthorized
access to the LAN servers. What should Tom do to accomplish this
task?
Tom should configure a Firewall server.
Tom should configure a Proxy server.
Tom should configure a Satellite server.
Tom should configure a Hosted server.
Nancy Jones the network administrator at Technology Systems is
responsible for monitoring the network of the organization. While
monitoring the network, Nancy observes that the RPM packages
installed on the Linux servers are of an older version than required
and do not provide required functionalities. Therefore, Nancy decides
to install an updated version of the RPM packages. For this, Nancy
downloads a new RPM package, but observes that the package
installation files are not executing properly. What should Nancy do
to solve the problem?
Run the ethereal command at the shell prompt
Run the strace command at the shell prompt
Run the tcpdump command at the shell prompt
Run the itrace command at the shell prompt
Technology Systems is a leading developer of computer applications.
The organization has its head office in California and two branch
offices in New York and Toronto. There are three departments in the
organization: Marketing, Programming, and Accounting. The Programming
department is divided into two groups, Windows group and Linux group.
The branch offices are connected to the head office by a 56 Kbps
leased line. Now, each branch office runs as a separate entity, with
its own network, reporting structure, and constraints. The
organization has no centralized IT management group, and separate
administrators at each branch office manage the network. Since the
organization has multiple servers but no centralized management of
the information, it faces the data-related problems, such as data
redundancy and data inconsistency.
To avoid these data-related problems in the organization, Jim Lewis,
the system administrator at the head office, decides to install and
configure the OpenLDAP Directory service. Through the use of OpenLDAP
Directory service, Jim wants to provide authentication service in the
organization.
This authentication service authenticates the employees to the
directory server by providing the employees encrypted tickets for a
short duration. During the period when the ticket is valid, an
employee can access the directory service without providing a
password.
Now, to implement the above authentication mechanism, which
prerequisite software package must be installed and configured by Jim
before installing OpenLDAP, and what is the command entered by Jim to
install the prerequisite software package?
Jim must install the Kerberos software package
Jim must enter the following command to install Kerberos:
# rpm –qa | grep krb5-server
Jim must install the Kerberos software package
Jim must enter the following commands to install Kerberos:
# rpm –ivh krb5-server-1.2.7-19.i386.rpm
# rpm –ivh pam_krb5-1.70-1.i386.rpm
# rpm –ivh krb5-libs-1.2.7-19.i386.rpm
# rpm –ivh krb5-devel-1.2.7-19.i386.rpm
# rpm –ivh krb5-workstation-1.2.7-19.i386.rpm
Jim must install the SASL software package
Jim must enter the following commands to install SASL:
# rpm –ivh cyrus-sasl-md5-2.1.15-3.i386.rpm
# rpm –ivh cyrus-sasl-plain-2.1.15-3.i386.rpm
# rpm –ivh cyrus-sasl-2.1.15-3.i386.rpm
# rpm –ivh cyrus-sasl-gssapi-2.1.15-3.i386.rpm
# rpm –ivh cyrus-sasl-devel-2.1.15-3.i386.rpm
Jim must install the OpenSSL software package.
Jim must enter the following commands to install OpenSSL:
# rpm –ivh openssl-0.9.7a-22.1.i386.rpm
# rpm –ivh openssl-devel-0.9.7a-22.1.i386.rpm
# rpm –ivh openssl096b-0.9.6b-13.i386.rpm
Which of the following Bugzilla feature helps in searching and
displaying the identified bug in the bug lists of the bug tracking
system?
Localization
Request System
Enterprise group support
Sanity check
Tom Wilkins is working as a system administrator at SSPT Corporation.
To provide communication between these branch offices, Tom needs to
provide an e-mail facility and shared Internet access in the
organization. For this, he needs to update the Linux kernel of a
server to embed the required services into the existing communication
system. After updating, he needs to configure the kernel source code,
which is of very large size. He also needs to compile the kernel
source and resolve all the dependencies after configuring the kernel
source code as required. He also wants to remove all the unused
files. What should Tom do to accomplish this task?
Tom should use the following commands:
#make oldconfig
# make zImage
# make modules_install
Tom should use the following commands:
# make oldconfig
# make xconfig
# make install
Tom should use the following commands:
# make dep
# make bzImage
Tom should use the following commands:
# make menuconfig
#make oldconfig
#make mrproper
Safest Software Co. is a multinational company that has opened its
new branch at New York. The company needs to maintain the data of all
the employees in a directory to reduce all data related problems,
such as data redundancy and to allow the employees of the company to
view the data. The company assigns the task of deploying a directory
server in the company to the system administrator, Tom Wilkins. Tom
deploys OpenLDAP server to perform the task and decides to configure
the overall performance of the OpenLDAP server, such as size of log
files and connection timeout value. Tom uses a parameter that allows
him to enable or disable a specific set of users from accessing a set
of attributes or entries on the OpenLDAP server. Which parameter does
Tom use to perform the desired task?
access to<what> [ by <who> <access> <control> ]-
access to<what> [ by <who> <access> <control> ]+
Nodefaultaccess { none | auth | compare | search | read | write}
defaultaccess { none | auth | compare | search | read | write}
Donna Bard is working as a system engineer at ABC corp. The company
uses LDAP directory schema to reduce data redundancy problems and to
maintain data integrity. This directory stores the record of
employees,such as name, age, and year of birth. Now, the company
assigns a task to Donna to design a new object class, myPerson, which
is extended from the existing object class, inetOrgPerson. The
company also asks donna to define a new attribute type, dob, in the
my Person object class. The attribute type, dob, stores the date of
birth of the employees of the company. Donna uses the following code
snippet to define the dob attribute type and the object class,
myPerson, respectively:
1.) ( dob-OID NAME DESC 'birthday day-month'
EQUALITY caseIgnoreMatch SUBSTR
caseIgnoreSubstringsmatch SYNTAX ‘bob’ 1.3.6.1.4.1.1466.115.121.1.15
)
2.)
( myPerson-OID NAME 'myPerson' DESC 'Extended person' SUP
inetOrgPerson
STRUCTURAL MAY dob )
But, Donna finds that the above code snippet is not producing the
required results. What code snippet should Donna use to perform the
task?
1.) ( dob-OID NAME 'dob' DESC 'birthday day-month'
EQUALITY caseIgnoreMatch SUBSTR
caseIgnoreSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.1
15.121.1.15 )
2.)
( myPerson-OID NAME 'myPerson' DESC 'Extended person' SUP
inetOrgPerson
STRUCTURAL MAY dob )
1.) ( dob-OID NAME 'dob' DESC EQUALITY caseIgnoreMatch
SUBSTR
caseIgnoreSubstringsMatch 1.3.6.1.4.1.1466.115.121.1.15 )
2.)
( myPerson-OID NAME 'myPerson' DESC 'Extended person' SUP
inetOrgPerson
STRUCTURAL MAY dob )
1.) ( dob-OID NAME 'dob' DESC 'birthday day-month'
EQUALITY caseIgnoreMatch SUBSTR
caseignoresubstringsmatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
2.)
( myPerson-OID NAME 'myPerson' DESC 'implementing person' SUP
inetOrgPerson
STRUCTURAL MAY dob )
1.) ( dob-OID NAME 'dob' DESC 'birthday day amd month'
EQUALITY caseIgnoreMatch SUBSTR
caseIgnoresubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
2.)
( myPerson-OID NAME DESC 'Extended person' SUP inetOrgPerson
,myname,
STRUCTURAL MAY dob )
Pat Greene is working, as a network administrator at Global Systems
inc. The LDAP directory on the network server contains the
information of the employees in the organization. Pat needs to add an
entry of an employee in the LDAP directory from an LDIF file named
temp1.ldif. Pat, therefore, uses the following command:
# slapadd –d temp1.ldif
However, he is not able to add the entry. Which of the following
commands will enable Pat to perform the required task?
# slapmodify –f temp1.ldif
# slapadd –u
# slapdelete –l temp1.ldif
# slapadd –l temp1.ldif
Pat Wilkins is a system administrator with the Red Sky IT Systems.
ABC Books, a client of the company, is an online bookstore, which
stores information about books in a directory. The directory is
accessed by multiple directory-enabled applications and accessed by
multiple users. Tom Allen, the Business Manager at ABC Books, wants
to expand company’s business in the global market. To manage the
increasing load required on the existing directory service, Tom
directs Pat to create a new directory service. To implement the
directory, Pat needs to install a software package called OpenLDAP.
However, Pat finds that he needs to install a package called OpenSSL
before installing OpenLDAP. To verify whether OpenSSL is already
installed on the node, Pat enters the following command at the shell
prompt:
# rpm –ivh openssl-0.9.7a-22.1.i386.rpm
However, Pat notices that the command is not producing required
results. What should Pat do to solve the problem?
Pat needs to enter the following command at the shell prompt:
# rpm –ivh openssl096b-0.9.6b-13.i386.rpm
Pat needs to enter the following command at the shell prompt:
# rpm –ivh openssl-devel-0.9.7a-22.1.i386.rpm
Pat needs to enter the following command at the shell prompt:
# rpm –qa | grep openssl
Pat needs to enter the following command at the shell prompt:
# rpm –qa grep openssl
Smartdevelopers is a leading software development organization. The
organization maintains an LDAP Directory server to store information
about employees of the organization. To enhance the security of the
LDAP Directory server, Ronald Billing, the system administrator,
needs to configure the LDAP Directory server to support Kerberos
authentication. For this, Ronald needs to create Kerberos service
principals for the LDAP server and extract them to a keytab file.
What should Ronald do to perform the above task?
Ronald should execute the following commands:
# kadmin addprinc –randkey ldap/smartdevelopers.com
# ktadd –k /etc/openldap/ldap.keytab ldap/smartdevelopers.com
# chgrp ldap /etc/openldap/ldap.keytab
# chmod 640 /etc/openldap/ldap.keytab
Ronald should execute the following commands:
# kadmin addprinc –randkey ldap/smartdevelopers.com
# ktadd –k /etc/openldap/ldap.keytab ldap/smartdevelopers.com
Ronald should execute the following commands:
# chgrp ldap /etc/openldap/ldap.keytab
# chmod 640 /etc/openldap/ldap.keytab
Ronald should execute the following commands:
# ktadd –k /etc/openldap/ldap.keytab ldap/smartdevelopers.com
# chgrp ldap /etc/openldap/ldap.keytab
# chmod 640 /etc/openldap/ldap.keytab
Which RPM of mono-1.1.zip file provides development support for IKVM,
for the .NET CLR?
mono-ikvm-1.1.6-1.novell.6.3.i586.rpm
mono-jscript-1.1.6-1.novell.6.3.i586.rpm
mono-locale-extras-1.1.6-1.novell.6.3.i586.rpm
mono-web-1.1.6-1.novell.6.3.i586.rpm
Ken Burton is working as a network administrator at SuperGraphics
Inc. The organization has implemented an LDAP server to enable the
access to employee information of the organization. The management
asks Ken to add entry of a new employee, Steve, to the LDAP
directory. Ken wants to specify the input file from where the entry
is added to the LDAP directory. In addition, Ken wants that new entry
be added only when the password is correctly entered. Which of the
following commands should Ken use to perform the required tasks?
ldapadd command with –c and –r option
ldapadd command with –k and –v option
ldapmodify command with –a and –b option
ldapadd command with –f filename and –W option
SmartLabs is a multi national company that has 78 branches across the
world. The company maintains a directory server for storing all the
information about the company’s product. Clients of the company
access the directory server to obtain information about the products.
The directory server has come under frequent hacking attacks in the
past few months. This has led to hackers stealing and changing the
confidential information stored on the server. Debbie Howe, the
system administrator at SmartLabs, is assigned the task to provide
security to the directory server from the hackers.
For this, Debbie divides the data into various categories depending
on the frequency of access to the data and the degree of loss to the
company if the data is modified. Now, Debbie assigns various priority
levels to the various categories of data.
Which possible security consideration is Debbie implementing to
provide security to the directory server?
Administration of Identifying the Security Requirements of a
Directory
Sensitivity of data of Identifying the Security Requirements of a
Directory
User community of Understanding the Environment of the
Organization
Directory accessibility of Understanding the Environment of the
Organization
Pat Greene, the network administrator, at InfoSuper Corp. The
organization needs to implement data encryption and authentication
protocols for user and file level security. The management,
therefore, decides to implement Linux operating system for all
business purposes. Pat installs Linux operating system on all the
computers in the network of the organization. Pat is using kickstart
installation method to automate installation. While deploying Linux
operating system Pat gets an error message stating that “ks.cfg file
not accessible”. What should Pat do to solve the problem?
Pat needs to check for the mouse parameter and mention it in your
ks.cfg file.
Pat needs to check if the CD-ROM is in readable mode and that you
have made the CD-ROM bootable.
Pat needs to use the recent version of boot image file.
Pat needs to need to check the path at root prompt or the
directory name should be correct and accurate
To set up the primary Kerberos server, you need to create the
Kerberos database. Which command do you use to create the Kerberos
database?
# /usr/kerberos/kdb5_util create –s
# /usr/kerberos/kadmin5.local –q “addprinc ronald/admin”
# /usr/kerberos/sbin/kadmin5.local –q “addprinc ronald/admin”
# /usr/kerberos/sbin/kdb5_util create –s
Certified Carriers is an established computer-training institute,
based in New Jersey. The institute has launched a new course on Linux
administration that has been very successful. Therefore, the
management wants to launch two new batches within the next week. For
this, Corrine Wallace, the network administrator, needs to set up 60
Linux workstations.
Corrine wants to use Kickstart installation that enables automatic
installation of the operating systems on several computers
simultaneously. To use Kickstart installation, Corrine needs to set
up an installation sever, such as NFS server, or Apache server. While
setting up NFS server, Corrine wants to copy the Linux installation
files to the NFS shared directory.
What of the following sequence of command, should Corrine follow to
perform the task?
Run the following command sequentially:
# mkdir /mnt/install ?
# mount /dev/cdrom /mnt/cdrom ?
# cp –ar /mnt/cdrom/RedHat /var/www/html/install ?
# cp /mnt/cdrom/.discinfo /mnt/install ?
# umount /mnt/cdrom ?
# mount /dev/cdrom /mnt/cdrom ?
# cp –ar /mnt/cdrom/RedHat/RPMS /mnt/install ?
# umount /mnt/cdrom ?
# mount /dev/cdrom /mnt/cdrom ?
# cp –ar /mnt/cdrom/RedHat/RPMS /mnt/install ?
Run the following command sequentially:
# mkdir /mnt/install ?
# mount /dev/cdrom /mnt/cdrom ?
# cp –ar /mnt/cdrom/RedHat /mnt/install ?
# cp /mnt/cdrom/.discinfo /mnt/install ?
# umount /mnt/cdrom ?
# mount /dev/cdrom /mnt/cdrom ?
# cp –ar /mnt/cdrom/RedHat/RPMS /mnt/install ?
# umount /mnt/cdrom ?
# mount /dev/cdrom /mnt/cdrom ?
# cp –ar /mnt/cdrom/RedHat/RPMS /mnt/install ?
Run the following command sequntially:
# mkdir /mnt/install ?
# mount /dev/cdrom /mnt/cdrom ?
# cp /mnt/cdrom/.discinfo /mnt/install ?
# cp /mnt/cdrom/.discinfo /mnt/install ?
# umount /mnt/cdrom ?
# mount /dev/cdrom /mnt/cdrom ?
# cp –ar /mnt/cdrom/RedHat/RPMS /mnt/install ?
# umount /mnt/cdrom ?
# mount /dev/cdrom /mnt/cdrom ?
# cp –ar /mnt/cdrom/RedHat/RPMS /mnt/install ?
Run the following command sequentially:
# mkdir /mnt/install ?
# mount /dev/cdrom /mnt/cdrom ?
# cp –ar /mnt/cdrom/RedHat /var/ftp/pub/install ?
# cp /mnt/cdrom/.discinfo /mnt/install ?
# umount /mnt/cdrom ?
# mount /dev/cdrom /mnt/cdrom ?
# cp –ar /mnt/cdrom/RedHat/RPMS /mnt/install ?
# umount /mnt/cdrom ?
# mount /dev/cdrom /mnt/cdrom ?
# cp –ar /mnt/cdrom/RedHat/RPMS /mnt/install ?
Chris Donaldson is working as a system administrator at Red-Eye
Experts. The organization uses different directories supplied by
different vendors to store the data pertaining to the clients of the
organization. The organization needs to integrate the directories
with each other to facilitate data sharing. Chris attempts to
integrate the directories, however the inconsistency and
synchronization issues between data arise. Chris finds that the
synchronization issues arise because the data stored in either of the
directories can be modified without notifying the changes to the
other directories. Therefore, the data stored in the directories
becomes inconsistent due to these changes. What should Chris do to
resolve the issues?
By replicating the data from one directory to another.
By joining and storing the information present in different
directories on different platforms in a common and logical directory
By converting one protocol format to another
By integrating the distinct, isolated information stored at
different places into one common logical volume
Global Systems is a software development organization. Pat Greene,
the network administrator, has used the Kickstart installation method
to automatically configure workstations and servers according to the
requirement of the organization. Which feature of the provisioning
module does Pat use?
Existing state provisioning
Bare metal provisioning
Configuration management
Kickstart configuration writer
Chris Donaldson is working as a system administrator at SuperGraphics
Inc. Chris needs to integrate the samba with OpenLDAP to store the
user information. Chris adds a new user Ronald in the OpenLDAP
directory. Which command should Chris use to verify the existence of
user, Ronald in the OpenLDAP directory?
# /usr/local/sbin/smbldap-usershow.pl ronald
# smbldap-usershow.pl ronald
# /usr/local/sbin/smbldap-usershow.pl
# /usr/local/sbin/smbldap-usershow ronald
Larry Williams is working as a system administrator at SSPT
Corporation, which is a leading developer of computer applications.
The organization has various departments and each department
maintains its own database for storing information about the
employees. Since information is stored in multiple data sources, the
employees need to access several data sources for searching and
retrieving information. This leads to data related problems, such as
data redundancy and data inconsistency.
To solve the data related problems, Larry decides to configure a
directory service to centrally manage the data of the organization.
Larry first creates a data design of the organization. She needs to
specify the permissions of the directory-enabled applications
installed in the organization, to update the data entries stored in
the directory. She also needs to specify the authentication level for
accessing the directory, for the various employees. What should Larry
do to perform the above tasks?
Define the data access and the data replication policies.
Define a simple process for handling exceptions to the general
policies.
Define the data sources and data elements to be included in the
Directory.
Define the data access and data modification policies for the data
stored in the Directory.
Which option can be used with the scp command to recursively copy all
subdirectories and files in the source directory to the destination
directory?
-q
-r
-p
-v
Which attribute of the migrate_common.ph file is used to customize
the mail domain in the mail attribute in the migrate_passwd.pl
script?
$DEFAULT_BASE
$EXTENDED_SCHEMA
$DEFAULT_MAIL_DOMAIN
NAMINGCONTEXT
Global Systems is a software development organization that provides
customized software solutions. The organization uses
kernel-2.4.21-4.EL on its Linux server. The management of the
organization decides to upgrade the existing kernel to kernel-2.4.24
to enhance security and to acquire new hardware support. Pat Greene,
the system administrator is assigned the task of upgrading the Linux
kernel.
After downloading the.tar.gz file containing the source code of the
kernel in /usr/src directory, Pat needs to install the kernel source
code.
What should Pat do to perform the task?
Pat needs to execute the following code snippet:
# cd /usr/src
# tar -zxcf linux-2.4.24.gz
# cd linux-2.4.24
# ls –al
Pat needs to execute the following code snippet:
# cd /src
# tar -zxvf linux-2.4.24.tar.gz
# cd linux-2.4.24
# ls –l
Pat needs to execute the following code snippet:
# cd /usr/src
# tar -zxvf linux-2.4.24.tar.gz
# cd linux-2.4.24
# ls –al
Pat needs to execute the following code snippet:
# cd /usr/src
# tar linux-2.24.tar.gz
# cd linux-2.4.24
# ls –al
Which attribute in the sambaAccount object, used to store the Samba
related information in OpenLDAP, specifies the time when the
lmpassword and ntpassword are last modified?
SambaLMPassword
SambaNTPassword
SambaPwdLastSet
SambaLogonScript
Pat Greene is working as a system administrator at InfoSuper Corp.
The management asks Pat to migrate user information from the NIS
server configured in the network of the organization to the OpenLDAP
server configured on the same host. Pat needs to add user accounts
and groups information contained in the LDIF format to the OpenLDAP
database. What should Pat do to perform the required task?
Create a file infosuper.ldif in the /tmp directory
Specify the domain and base of your network in the
/usr/share/openldap/migration/migrate_common.ph file.
Edit the values of the DEFAULT_MAIL_DOMAIN and DEFAULT_BASE
parameters
Edit the migrate_common.ph file
Which commands is used to set execute permission for /usr/bin/ssod
directory?
# mount 192.168.0.52:/list /usr/bin/ssod
# service /mnt/nfs1
# ls /mnt/nfs1
# chmod +x /usr/bin/ssod
Pat Greene is working as a network administrator at XYZ Inc.
that has many offices at different locations. Pat wants to
implement a Directory service in the company to store data at a
centralized location. This enables Pat to access different directory
services at a particular location in the network. Clients also access
the directory. For security reasons, he also wants to restrict the
clients and employees in a particular subnet from accessing important
data in the directory. He also wants to specify the time intervals
within which authorized users would be able to access the directory.
What should Pat do to accomplish this task?
Create replicas of the directory
Implement Access Control List (ACL)
Partition the directory
Implement Microsoft Metadirectory Service (MMS).
company has a network of Linux- based computers at its offices. Each
server provides a specific amount of memory space that can be shared
among multiple users. Ron needs to increase the amount of shared
memory in the server for additional users at the new branch office.
The users at the new branch office need to use the shared memory and
run processes on the servers. How should Ron modify the parameters on
the Linux server to add the users from the new branch office?
John needs to modify the min_percent parameter in the /proc/sys/vm
directory and the shmmall parameter in the /proc/sys/kernel.
John needs to modify the threads-max parameter in the
/proc/sys/kernel and the max_percent parameter in the /proc/sys/vm.
Ron needs to edit the shmmin parameter in the
/proc/sys/kernel/shmmin file and threads-max parameter, stored in the
/proc/sys/kernel.
Ron needs to edit the shmmax parameter in the
/proc/sys/kernel/shmmax file and threads-max parameter, stored in the
/proc/sys/kernel.
Don Allen is working as a network administrator at Technology Systems
that provides software solutions to its customers. The enterprise
maintains 100 database servers. Don needs to monitor free disk space
and load average on these database servers. Therefore, he configures
the Nagios monitoring tool in the enterprise and defines hosts and
services that are to be monitored on the network. However, he
observes that when any of the servers are not available on the
network, he does not get any alerts and notifications regarding these
network failures. Therefore, he is not able to resolve these failures
on time, which is affecting the network performance. What should Don
do to resolve the issue?
Don should specify the maximum number of times to recheck failures
using the max_check_attempts attribute while defining the hosts.
Don should specify the time period for notification using the
notification_period attribute while defining the hosts.
Don should specify the time period to repeat failure notifications
using the notification_interval attribute while defining the hosts.
Don should enable the host event handler using the
event_handler_enabled attribute while defining the hosts.
Don Allen is working as a system administrator at Indestructible
Boxes, Inc. The organization asks to Don to install Simple Network
Management Protocol (SNMP) on a computer in the organization to
monitor networks and systems of the organization. To install SNMP,
Don downloads the source code of SNMP available in the tar.gz file.
Now, what command should Don use to perform the task?
# cp snmp-<x>.tar.gz /usr/src ?
# cd /usr/src ?
# tar xzvf snmp-<x>.tar.gz ?
# cd /usr/src/snmp-<x> ?
# ./configure ?
# make all ?
# cp snmp-<x>.tar.gz /usr/src ?
# net-snmp-utils-5.0.8-11
# net-snmp-devel-5.0.8-11
# cd /usr/src/snmp-<x> ?
# ./configure ?
# make all ?
# cp snmp-<x>.tar.gz /usr/src ?
# mv snmpd.conf snmpd.conf.org ?
# tar xzvf snmp-<x>.tar.gz ?
# cd /usr/src/snmp-<x> ?
# service snmpd status ?
# make all ?
# cp snmp-<x>.tar.gz /usr/src ?
# cd /usr/src ?
# mv snmpd.conf snmpd.conf.org ?
# cd /usr/src/snmp-<x> ?
# ./configure ?
# make all ?
Pat Greene is working as a system administrator at SuperGraphics Inc.
Pat is assigned the task to migrate the information about the hosts
contained in NIS network to LDIF format using perl scripts. Which
perl scripts should Pat use to accomplish the task?
migrate_netgroup.pl
migrate_networks.pl
migrate_group.pl
migrate_hosts.pl
John Barrett is the network administrator at Quality Software
Developers. He needs to run the Windows applications on the Debian
Linux platform. He also needs to ensure that the execution of the
Windows applications should not stop because of the incompatible
instructions of Windows-based application with Linux applications.
Therefore, he decides to install a prepackaged version of Wine, which
is a program that translates the instructions of the Window
application into its equivalent Debian Linux instructions. Which
command should he use to perform the task?
# get-apt install wine_0.0.20050419-winehq-1_i386.deb
# apt-get install wine_0.0.20050419-winehq-1_i386.deb
# get-rpm install wine_0.0.20050419-winehq-1_i386.deb
# rpm-get install wine_0.0.20050419-winehq-1_i386.deb
Donna Bard, the system administrator at Quality Software Developers,
wants to backup sensitive data of the organization regularly. For
this, Donna decides to implement Redundant Array of Inexpensive Disks
(RAID) on the Linux server. Donna wants to delete some partitions on
the server to create the RAID disks.
Donna uses fdisk utility to delete the offline partitions and does
not delete any extended partitions. However, Donna observes that the
server is unable to delete these partitions. What should Donna Do to
solve the problem?
Donna should also delete the extended partitions.
Donna should delete all the logical partitions.
Donna should use the umount command to delete the partitions.
Donna should use any third party tool to delete the specified
partitions.
Pat Greene is working as a system administrator at SuperGraphics Inc.
Pat is assigned the task to migrate the information about the hosts
contained in NIS network to LDIF format using perl scripts. Which
perl scripts should Pat use to accomplish the task?
migrate_group.pl
migrate_netgroup.pl
migrate_hosts.pl
migrate_networks.pl
Which value for the STAGE argument in the rpmbuild command unpacks
the source code and applies patches?
b
c
p
a
Tom Wilkins works as a system administrator in EarthenWares that
provides Web services to its customers. The organization wants to
upgrade its Linux-based web servers to provide enhanced security
features. The new version of Linux does not support some of the
applications running on the web servers. It also does not provide
some security features, which are required. What should he do to
update the web servers?
Upgrade the kernel using RPM and configure kernel using make
oldconfig command
Upgrade the kernel by applying patches and configure the kernel
using make oldconfig command
Upgrade the kernel by customizing the source code of new version
and configure the kernel using make xconfig command
Upgrade the kernel by applying patches and configure the kernel
using make menuconfig command
Corrine Wallace is working as a network administrator at SSPT
Corporation. The organization has the Linux operating system
installed on its servers and workstations. The management of the
organization asks Corrine to upgrade the Linux kernel to implement
the enhanced security features available. Corrine downloads the
source code from the Internet and configures the kernel source code
on the one of the main servers.
After configuring the kernel source code, Corrine compiles the
source code and installs the kernel. However, the server fails to
boot.
What should Corrine do to solve the problem?
Use /etc/sysconfig/grub utility to specify the device from which
the server boots
Use /etc/sysconfig/syslog utility to specify the device from which
the server boots
Use /etc/sysconfig/samba utility to specify the device from which
the server boots
Use /etc/sysconfig/ sendmail utility to specify the device from
which the server boots
Smartdevelopers is a leading software development organization. The
organization maintains an LDAP Directory server to store information
about employees of the organization. To enhance the security of the
LDAP Directory server, Ronald Billing, the system administrator,
needs to configure the LDAP Directory server to support Kerberos
authentication. For this, Ronald needs to create Kerberos service
principals for the LDAP server and extract them to a keytab file.
What should Ronald do to perform the above task?
Ronald should execute the following commands:
# kadmin addprinc –randkey ldap/smartdevelopers.com
# ktadd –k /etc/openldap/ldap.keytab ldap/smartdevelopers.com
# chgrp ldap /etc/openldap/ldap.keytab
# chmod 640 /etc/openldap/ldap.keytab
Ronald should execute the following commands:
# chgrp ldap /etc/openldap/ldap.keytab
# chmod 640 /etc/openldap/ldap.keytab
Ronald should execute the following commands:
# kadmin addprinc –randkey ldap/smartdevelopers.com
# ktadd –k /etc/openldap/ldap.keytab ldap/smartdevelopers.com
Ronald should execute the following commands:
# ktadd –k /etc/openldap/ldap.keytab ldap/smartdevelopers.com
# chgrp ldap /etc/openldap/ldap.keytab
# chmod 640 /etc/openldap/ldap.keytab
Tom Wilkins is working as a network administrator at Blue Valley
Consulting. The employees of the organization’s Software Development
department develop .NET applications for their clients. Now, the
organization migrates to the Linux platform to avoid the cost of
licensing in Windows. As a result, the employees now need to migrate
the .NET applications to the Linux platform. Tom decides to use the
Mono tool to allow migration of the .NET applications to the Linux
platform. He first compiles the .NET applications on the Windows
platform. He then copies the compiled source code of the application
to the /usr/src directory on Linux platform. Now, he needs to compile
the application source code on the Linux platform. For this, he
decides to use the mcs command. During compilation, he wants to
generate the exceptions that the debugger can catch. He also wants to
generate the debugging information but ignore the warning messages.
To perform the above tasks, Tom executes the following command:
mcs –debug -nowarn:WARNLIST
However, Tom notices that the above command is not providing the
required results. What should Tom do to solve the above problem?
Tom should execute the following command:
mcs –debug –nowarn:WARNLIST –L PATH [source-files]
In this code, source-files parameter refers to the name of files
that contain the source code of .NET applications.
Tom should execute the following command:
mcs –debug –-fatal –nowarn:WARNLIST [source-files]
In this code, source-files parameter refers to the name of files
that contain the source code of .NET applications.
Tom should execute the following command:
mcs –-about –L PATH [source-files]
In this code, source-files parameter refers to the name of files
that contain the source code of .NET applications.
Tom should execute the following command:
mcs -debug --fatal [source-files]
In this code, source-files parameter refers to the name of files
that contain the source code of .NET applications.
Donna Johnson is an HR Manager at ABC Inc. Donna uses a shell script,
Attendance.sh to extract the attendance of each team member for a
particular month from the Attendance.txt file. The Attendance file
includes six columns, Employee Code, Employee Name, TL Code, TL Name,
In Time, and Out Time.
Donna needs to save and display the attendance records of team
members working on a new project. Donna also wants to run the
Attendance.sh shell script on a Windows-based machine. To perform
this task, Donna performs the following steps:
Enters the following command at the Korn shell prompt to change the
current shell directory to C drive:
$ cd \dev\fs ?
Enters the following command at the shell prompt to run the
Attendance.sh shell script:
$ sh Attendance.txt
Enters the following command at the shell prompt to display the
attendance record of the employees store in a new file,
Attendance_Report.txt, on C drive:
$ cat Attendance_Report.txt ?
However, while executing the preceding code snippets, Donna notices
that the code is not providing the required output. What should Donna
do to solve the problem?
Donna needs to use the following code snippet:
$ sh Attendance.sh ?
$ cate Attendance_Report.exe ?
Donna needs to use the following code snippet:
$ cd \dev\fs\C ?
$ sh Attendance.sh ?
$ cat Attendance_Report.txt ?
Donna needs to use the following code snippet:
$ dev\fs\C ?
$ sh Attendance.shi ?
$ cat Attendance_Report.exe ?
Donna needs to use the following code snippet:
$ cd \C ?
$ sha Attendance.sh ?
$ cat Attendance_Report.exe ?
Tom Wilkins is working as a network administrator at BlueMoon
Computers. Tom needs to search for the name of the employees with
first name ‘Steve’ from the LDAP directory containing the details of
the employees. Tom needs to specify that a maximum of 50 entries
should be retrieved as a result of search request. What should Tom do
to perform the required task?
Use the ldapadd command with -k option
Use the ldapmodify utility with –a option
Use the ldapsearch command with –l option
Use the ldapsearch command with –z option
Donna Bard is working as a system administrator at Blue Moon
Computers, which is a software development organization based in New
York. Each department of the organization maintains its own database
to store information about the employees. Since the information is
stored in multiple data sources, the employees frequently encounter
redundant data and inconsistent data. For this, Donna decides to
configure a Directory server in the organization. She first creates a
Data Design of the organization. She observes that when an employee
in a department is shifted to another department, the changes are not
reflected in the other related databases. What could be the possible
consequence of Donna’s observation?
Databases accessed by a number of database administrators at the
same time.
Databases updated without any coordination between the database
administrators.
Databases updated within short time duration.
Obsolete data stored in the databases
Consider the statements:
Statement A:
To create a Kickstart configuration file for an FTP server, you must
ensure that the authentication technique is implemented.
Statement B:
To create a Kickstart configuration file for an FTP server, you need
to install X Windows System, as the users and the administrators will
access the FTP server remotely most of the time.
Which of the following is true, with respect to the above
statements?
Statement A is false and statement B is true.
Both, statements A and B, are false.
Both, statements A and B, are true.
Statement A is true and statement B is false.
Safest Software, Inc. has recently implemented the Argus network
monitoring tool on its enterprise network to monitor and mange the
network traffic. Corrine Wallace, the network engineer, wants to
monitor Simple Mail Transfer Protocol (SMTP) and Domain Name Services
(DNS) services running on the Web servers of the enterprise from a
remote computer. Therefore, Corrine installs Argus-3.3 on a remote
computer to monitor these services from the remote location. However,
she is unable to monitor the network as Argus fails to initialize.
Corrine has verified the network and checked all connectivity tools,
which are working properly. But still she is unable to monitor the
network.
What should Corrine do in this situation?
Corrine should restart the http service using the service httpd
restart command.
Corrine should configure argus-3.3 to run the script
# . /argusd
Corrine should add the content username encrypted_password
home_obj groups in the user file.
Corrine should type the following command at the shell prompt to
extract the argus-3.3.tgz file:
tar –zxvf argus-3.3.tgz
Global Systems Inc. is a leading software development organization.
Users in RD frequently download files and packages from the database
server through the Internet. Some files and packages downloaded from
the Internet are infected with viruses, which affect computers of all
users. To overcome this virus problem, instead of installing
antivirus programs on every computer. The organization needs to
install virus-free operating systems, such as Linux. Chris, the
system administrator, automates the installation of the operating
system. Pat needs to use an operating system that provides solution
for small to medium range of servers used for the majority of
businesses, such as file servers and mail servers. He also needs to
place pre-installation scripts at the beginning of the Kickstart
configuration file. What should Chris do to perform the required
task?
Chris needs to use Red Hat Enterprise Linux operating system and
enter the following command:
# mkdir /var/ftp/pub/configfiles
Chris needs to use Mandriva Linux operating system and enter the
following command:
network --device eth0 -–bootproto dhcp ?
Chris needs to use Red Hat Enterprise Linux operating system and
enter the following command:
%pre
echo ”My kickstart installation started on ‘ /bin/date’ “ >
/etc/motd
Chris needs to use Red Hat Enterprise Linux operating system and
enter the following command:
%post --interpreter /usr/bin/python
Larry Williams is working as a network administrator at Quality
Software Developers. The employees of the Software Development
department develop applications in .NET for their clients. These are
Graphic User interface (GUI) applications and use the Oracle as a
database server. To avoid the cost of licensing, the management
decides to migrate from Windows to the Linux platform. Larry decides
to use mono tool to deploy the .NET application on Linux platform.
Now, Larry needs to install RPM packages to run .NET applications.
Larry has already installed 15 RPM packages on the computer where he
wants to run the .NET application. Now, he wants to install the
remaining RPM packages to enable Web services and support Windows
form implementation. What should Larry do to perform the required
task?
Larry needs to install the rpm packages in the following order:
mono-jscript-1.1.6-1.novell.6.3.i586.rpm
mono-web-1.1.6-1.novell.6.3.i586.rpm
mono-winforms-1.1.6-1.novell.6.3.i586.rpm
mono-locale-extras-1.1.6-1.novell.6.3.i586.rpm
Larry needs to install the rpm packages in the following order:
mono-locale-extras-1.1.6-1.novell.6.3.i586.rpm
mono-jscript-1.1.6-1.novell.6.3.i586.rpm
mono-web-1.1.6-1.novell.6.3.i586.rpm
mono-winforms-1.1.6-1.novell.6.3.i586.rpm
Larry needs to install the rpm packages in the following order:
mono-jscript-1.1.6-1.novell.6.3.i586.rpm
mono-locale-extras-1.1.6-1.novell.6.3.i586.rpm
mono-web-1.1.6-1.novell.6.3.i586.rpm
mono-winforms-1.1.6-1.novell.6.3.i586.rpm
Larry needs to install the rpm packages in the following order:
mono-jscript-1.1.6-1.novell.6.3.i586.rpm
mono-locale-extras-1.1.6-1.novell.6.3.i586.rpm
mono-winforms-1.1.6-1.novell.6.3.i586.rpm
mono-web-1.1.6-1.novell.6.3.i586.rpm
Red-Eye Experts is a leading developer of computer applications, with
its head office in New York. The organization has three departments:
HR, Research, and Development. A directory service is configured in
the HR department and all the employees in the rest of the
departments access the directory service. The organization has two
branch offices in London and Paris. These branch offices are
connected to the head office in New York through Virtual Private
Network (VPN). The directory service, in the HR department of the
head office, is also accessed by the employees in the branch offices.
So, there is a potential risk that a network failure between the head
office and the branch offices can seriously affect the employees in
the branch offices. To prevent this situation, John Barrett, the
system administrator at the head office, decides to create multiple
replicas of the directory service and configure these replicas in the
branch offices. Now, to maintain data consistency, John wants to
synchronize the data which is stored in the main directory service
and the replica servers. John wants to implement a mechanism in such
a way that when a replica server receives a write operation request
from a client, it performs the write operation. After that, the
replica server sends the modified updated entry values to all the
replica servers and the main server. On receiving the modified entry
values, the main server and the replica servers update the stored
entries accordingly. Now, which Replication Policy and Write
Operation performing strategy should be employed by John to implement
the above mechanism?
Single-Master Replication Policy using chaining
Multimaster Replication Policy using referrals
Multimaster Replication Policy
Single-Master Replication Policy using referrals
Global Systems is a leading software organization with multiple
branches spread across the world Workstations and servers across the
organization have the Windows family of operating systems configured.
The organization wants to migrate from Windows to Linux due to
enhanced security features offered by Linux. Mike Womack, the network
administrator, is assigned the task to implement Linux in text mode
across the major branches, including the corporate head office. Mike
installs Linux on existing systems which have the following hardware
configuration:
Motorola 68K processor
Industry Standard Architecture (ISA) architecture
60 MB RAM
However, the Linux installation fails on these systems. What should
Mike do to solve the problem?
Verify the security considerations for implementing Linux
Verify the architecture supported for implementing Linux
Verify the memory requirements for implementing Linux
Verify the processor required for implementing Linux
Which command is used to copy the passwd file to ssod directory
contained in the /etc/pam.d directory?
# cp /etc/pam.d/ssod /etc/pam.d/passwd
# mount etc/pam.d/ssod /etc/pam.d/passwd
# mount /etc/pam.d/passwd etc/pam.d/ssod
# cp /etc/pam.d/passwd /etc/pam.d/ssod
Supersoft2000 is a software development company that has number of
development centers all over America. Larry Williams, the system
administrator installs a Directory service to implement an identity
management system. In the identity management system, the employee
information such as name, employee code, telephone extension number,
department code, branch office, and designation, is stored and
organized. Now, the management of the company wants to expand the
business. As a result, Larry faces a problem of insufficient hardware
resources and slow read/write process of the directory server. He
wants to provide a flexible Directory service that can meet the
increasing storage space requirement of the directory service. What
should Larry do to solve this problem?
Purchase a new server with more Hard Disk storage space.
Use high-speed physical media such as fiber optic cable.
Purchase a new server with higher processing speed.
Distribute the directory server among multiple computers.
Blue Moon Computers is a multinational company, which is
manufacturing mainframe computers for a space research organization.
Blue Moon Computers has 41 branches in the US.
The organization uses a directory server to store all their
confidential information. Employees are provided a username and a
password to access the directory server. Ken Burton, a system
administrator at Blue Moon Computers, is responsible for maintaining
the security of the directory server.
Ken receives a report that some confidential data stored in the
directory server has been tampered with. Ken examines the directory
server and discovers that a malicious user has attempted to obtain
passwords of certain employees. The malicious user has tried each
possible combination to hack the passwords by using some software
tools.
What type of security threat has Ken discovered and what method has
the malicious user employed to hack the passwords?
Kind of security threat – Unauthorized Access
Method used - Dictionary attack
Kind of security threat – Denial of Service (DoS) Attack
Method used - Smurf attack
Kind of security threat – Denial of Service (DoS) Attack
Method used - Distributed denial of service (DoS) attack
Kind of security threat – Unauthorized Access
Method used - Brute-force attack
Which command is used to verify whether Samba has authenticated a
sambaAccount, Mike, stored on the OpenLDAP server?
# /usr/local/sbin/smbldap-usershow.pl Mike
# /usr/sbin/smbldap-usershow.pl Mike
# /usr/local/sbin/ldap-usershow.pl Mike
# /usr/local/smbldap-usershow.pl Mike
Quality Software developer is multinational organization. Donna Bard,
the network administrator in the organization is responsible for
monitoring the network of the organization. While monitoring the
network, Donna observes that a large number of data packets are
getting lost on the network. As a result, the employees of
organization are not able to download the file from the file server
although all the connections and protocols related to file server are
working perfectly. This is affecting the performance of the
enterprise. What should Donna do to solve the problem?
Run the itrace and strace command at the shell prompt.
Run the strace command at the shell prompt.
Run the itrace command at the shell prompt.
Run the tcpdump command at the shell prompt.
The migration perl scripts translate the system files into which file
format?
.rpm format
.doc format
.LDIF format
.conf format
Which the command is used to test the configuration of the Kerberos
client?
kadmin.local
klist
kinit
kdb5_util
Which of the following Bugzilla feature helps in searching and
displaying the identified bug in the bug lists of the bug tracking
system?
Enterprise group support
Sanity check
Request System
Localization
Tom Wilkins is working as a network administrator at Good Graphics
Inc. The management asks Tom to deploy LDAP server to provide
information and resources across the organization. Tom needs to
search for the name of the employees whose first name is “Steve”. In
addition, Tom wants that ldapsearch utility should prompt for simple
authentication. What should Tom do to perform the required task?
# ldapsearch cn=Steve* -S–d
# ldapsearch cn=Steve* -x -h
# ldapadd cn=Steve* -x -h
# ldapsearch cn=Steve* -c -h
Donna Bard is working as a network administrator at Quality Softwares
Inc based at U.S. For business expansion, the organization opens a
new branch office in California. Donna installs Red Hat Linux
operating system at the new branch office. Donna also wants to
install Wine using RPM package to enable the employees of the
organization to use existing Windows-based applications. To install
Wine, Donna executes the following command:
# apt-get install wine_0.0.20050419-winehq-1_i386.deb ?
However, Donna notices that he is cannot install Wine using the
above command. What should Donna do to solve the problem?
Use the following command
# rpm –qa | grep -i wine ?
Use the following command
# rpm –sf /usr/local/etc/wine.systemreg system.reg ?
Use the following command
# rpm –ivh <wine-package-name>.rpm ?
Use the following command
# rpm -e <wine-package_name> ?
Jim Lewis is working as a system administrator at Technology Systems.
The organization maintains different directory servers on several
platforms for running different types of applications. These
directory servers use different security mechanisms to provide access
to the directories of the directory server. The organization needs to
enable sharing and accessing of information between the directory
servers for official purposes. Jim decides to perform the task and
finds that the directory servers are unable to recognize the clients
of different platforms. As a result, the directory services of the
directory server are unable to interoperate with the non-native
clients. What should Jim do to resolve the problem?
Use cross-platform authentication services
Use push and pull synchronization agents
Use gateways
Create distributed multivendor directories
Which implementation provided by Cyrus-SASL libraries enables a
client to send and receive encrypted data from an OpenLDAP server?
DIGEST-MD5
KERBEROS_V4
CRAM-MD5
ANONYMOUS
Technology Systems, a software development organization has a number
of branch offices at different locations. The branch offices are
connected through a network, so that the employees at different
offices can communicate. Ed Young a system administrator in
Technology Systems is implementing a directory service to store
information about users, customers, and projects. Ed wants to
implement a security mechanism that can avoid a man-in-middle attack
used by a malicious user for tampering with directory data. In this
security threat, a malicious user listens the communication and
captures the data packets between the client and the Directory. Next,
the malicious user modifies the requests, which a client sends to the
directory.
Which technology should Ed use to detect this security threat?
Network Intrusion Detection System (NIDS)
Simple Authentication and Security Layer (SASL)
Log File Monitors (LFM)
System Integrity Verifiers (SIV)
Ken Burton is working as a system administrator at SuperGraphics Inc.
While replicating an LDAP server, Ken needs to configure the master
LDAP server to maintain a log of the changes made. Ken, therefore,
needs to edit the slapd.conf file to specify the details of the
replica server. He needs to specify the name of the replica server,
the partition to be replicated, the binding DN of the LDAP server,
and the binding method to bind the master LDAP server to the replica
server. Which of the following commands should Ken use to perform the
required task?
replica host=replicaser.supergraphics.com:389
tls=”dc=supergraphics,dc=com”
binddn=”cn=replicaser,dc=supergraphics,dc=com”
credentials bindmethod=simple tls=no
replica host=replicaser.supergraphics.com:389
suffix=”dc=supergraphics,dc=com”
binddn=”cn=replicaser,dc=supergraphics,dc=com”
credentials bindmethod=simple tls=no
replica host=replicaser.supergraphics.com:389
suffix=”dc=supergraphics,dc=com”
portnumber=”cn=replicaser,dc=supergraphics,dc=com”
credentials bindmethod=simple tls=no
replica host=replicaser.supergraphics.com:389
binddn=”cn=replicaser,dc=supergraphics,dc=com”
credentials bindmethod=simple tls=no
Red Sky IT Systems is an IT organization that provides software
services to its customers. One of the projects being developed at Red
Sky requires the use of advanced Perl scripts. For this, Pat Greene,
the network administrator installs RPM packages on the computers. Pat
observes that a file of RPM package is corrupted during the
installation of RPM packages. Therefore, Pat needs to verify the
corrupted file to check the attributes of the file. What should Pat
do to perform the task?
Execute # rpm –-rebuilddb ?
Execute # rpm -K squirrelmail-1.2.11-1.noarch.rpm ?
Execute # rpm –Vf /bin/umount ?
Execute # rpm --import /mnt/cdrom/RPM-GPG-KEY ?
Which RPM of mono-1.1.zip file provides development support for Mono
tool?
mono-data-sqlite
mono-data-sybase
mono-devel-1.1.6-1.novell.6.3.i586.rpm
mono-data-postgresql
Chris Donaldson is working as a system administrator at SuperGraphics
Inc. Chris needs to integrate the samba with OpenLDAP to store the
user information. Chris adds a new user Ronald in the OpenLDAP
directory. Which command should Chris use to verify the existence of
user, Ronald in the OpenLDAP directory?
# smbldap-usershow.pl ronald
# /usr/local/sbin/smbldap-usershow ronald
# /usr/local/sbin/smbldap-usershow.pl ronald
# /usr/local/sbin/smbldap-usershow.pl
Tom Wilkins is working as a system administrator at Technology
Systems. Tom needs to design a schema for a directory that contains
records of employees, such as name, phone, address, and job profile,
in the organization. Tom writes a code for the telephoneNumber
attribute type in LDAP.
2.5.4.20 NAME 'telephoneNumber' EQUALITY telephoneNumberMatch SUBSTR
telephoneNumberSubstringsMatch SYNTAX
1.3.6.1.4.1.1466.115.121.1.15{24}
Identify the OID of the attribute type and the use of
telephoneNumberMatch rule in the preceding code snippet?
The OID of the attribute type is 2.5.4.20 and the
telephoneNumberMatch rule is used for matching partial telephone
numbers.
The OID of the attribute type is 1.3.6.1.4.1.1466.115 and the
telephoneNumberMatch rule is used to specify the unique name of an
attribute.
The OID of the attribute type is 1.3.6.1.4.1.1466.115.121.1.15 and
the telephoneNumberMatch rule is used to describe the applications
that own and use the attribute.
The OID of the attribute type is 2.5.4.20 and the
telephoneNumberMatch rule is used for matching complete telephone
numbers.
Consider the statements:
Statement A: The # rpm –qa | grep -i wine command is used to
identify the installed Wine packages on the system.
Statement B: The # rpm -e <wine-package_name> command is used to
uninstall the Wine packages from the system.
Which of the following options is correct with respect to the above
statements?
Both statements A and B are true.
Statement A is false and statement B is true.
Statement A is true and statement B is false.
Both statements A and B are false.
John Barrett is working at EarthenWares as a system administrator.
EarthenWares uses the OpenLDAP server to manage data about the
employees working in the company. All the employees of the company
have access to the data included in the OpenLDAP server. As a result,
the company finds some unwanted changes made to the data contained in
the OpenLDAP directory server. The company assigns the task to John
to implement a mechanism to monitor each activity taking place on the
OpenLDAP server. For this, John needs to add the following statements
in the slapd.conf file:
include /usr/local/etc/openldap/schema/core.schema
pidfile /usr/local/var/slapd.pid
argsfile/usr/local/var/slapd.args
But, John finds that this code snippet is not working properly.
Which code snippet should John use to perform the task?
include /usr/local/etc/openldap/schema/core.schema
loglevel 1
pidfile /usr/local/var/slapd.pid
argsfile /usr/local/var/slapd.args
include /usr/local/etc/openldap/schema/core.schema
loglevel 2048
pidfile /usr/local/var/slapd.pid
argsfile /usr/local/var/slapd.args
include /usr/local/etc/openldap/schema/core.schema
loglevel -1
pidfile /usr/local/var/slapd.pid
argsfile /usr/local/var/slapd.args
include /usr/local/etc/openldap/schema/core.schema
loglevel 0
pidfile /usr/local/var/slapd.pid
argsfile /usr/local/var/slapd.args
Donna is working as a network administrator at Safest Software
Developers. The organization has three branches at different
locations. There are three departments at each branch, named
application development, quality assurance, and sales. The users of
the same department at different branches are part of a group. There
are three groups corresponding to each department, app for
application development department, qa for quality assurance
department, and sales for sales department. All the employees at
different branches use a database server at the main branch to store
data. The database server can run 100 processes at a time. The users
in the app group run a large number of processes on the database
server due to which the users in the qa and sales groups are not able
to run their processes. What should Donna do to solve this problem?
Donna needs need to add the following entries to the
/etc/security/limits.conf file:
@app soft nproc 45
@app hard nproc 50
Donna needs to add the following entries to the /etc/pam.d/login
file:
* soft nofile 85*
hard nofile 88
Donna need to add the following entry to the /etc/pam.d/login
file:
session required /lib/security/pam_limits.so
Donna needs to add the following entries to the
/etc/security/limits.conf file:
* soft file 560*
hard file 860
Technology Systems is a software development organization. Jim Lewis,
the system administrator, has implemented a NIS-based directory
containing the details of the employees of the organization. The
management of the organization decides to migrate the existing NIS
infrastructure to OpenLDAP server. Chris needs to convert system
files, stored in /etc/ directory of NIS server, into LDIF format.
Chris, therefore, needs to migrate user information from /etc/passwd
to the LDIF file. What should Chris do to perform the required task?
Use the following command:
# /usr/share/openldap/migration/migrate_group.pl /etc/group
/tmp/group.ldif
Use the following command:
# /usr/share/openldap/migration/migrate_passwd.pl /etc/
passwd
/tmp/passwd.ldif
Use the following command:
# /usr/share/openldap/migration/migrate_group.pl /etc/group
/tmp/group.ldif
Use the following command:
# /usr/share/openldap/migration/migrate_passwd.pl /etc/
/passwd.ldif
command
Don Allen is working as application developer at Safest Software
Developers. Don wants to use a software application that helps keep
track of bugs in any of software products developed. He needs to
identify and analyze errors in the programming code of software
product. While detecting the bugs, Don wants to identify the name and
component of the software product in which a bug is encountered. He
wants to define the state, such as fixed, modified, or closed of the
bug. He also wants to display a short summary about the bug. What
should Don do to perform this task?
Don should understand Bug Anatomy.
Don should use Bug Lists.
Don should Search bugs.
Don should create a Bugzilla account.
Which option can be used with the scp command to recursively copy all
subdirectories and files in the source directory to the destination
directory?
-v
-r
-p
-q
EarthenWares is a leading developer of computer applications. The
organization assigns Ken Burton, the system administrator, the task
to implement a Directory server to provide centralized storage and
management of information, such as employee records.
Ken decides to implement the LDAP Directory server in the
organization. He needs to provide a framework to protect the LDAP
Directory from unauthorized access. For this, he decides to use the
LDAP Security model to ensure that when an LDAP Directory client
tries to establish a connection with the LDAP Directory server, an
authentication protocol exchange is initiated.
This exchange consists of a series of requests and responses between
the LDAP Directory client and the LDAP Directory server. Based on the
nature of responses, authentication is performed between the LDAP
Directory client and the LDAP Directory server.
Which authentication mode does Ken implement?
Provide the LDAP client, full access to the LDAP Directory server,
in anonymous mode.
Implement passwords using TLS.
Provide the LDAP client, read only access to the LDAP Directory
server, in anonymous mode.
Secure the LDAP server using the DIGEST-MD5 authentication
mechanism.
The Satellite model grants permission to the user to download
software using physical media, such as CD and floppy. Which of the
following feature helps to accomplish this task?
Local database repository
Channel and errata cloning and their management
Complete off-network capability
Channel permissions
which provides e-commerce services to its customers. Ken is assigned
the task of monitoring and controlling the network of the enterprise.
For this, Ken configures the Nagios monitoring tool on the network
enterprise and modifies the object configuration files to specify the
hosts and services that are to be monitored. The employees of Red Eye
Experts report problems in the httpd service of some of the hosts.
Therefore, Ken decides to monitor these hosts using the Nagios tool.
However, Ken observes that he is not able to detect the hosts that
are facing the problems. What should Ken do to identify the hosts?
Ken should enable the host event handler, event_handler_enabled in
the template used for defining the hosts and hosts groups.
Ken should specify the contact group in the template used for
creating the host groups.
Ken should specify the check_command check-host-alive command in
the template used for defining the hosts and hosts groups.
Ken should specify the event_handler command in the template used
for defining the hosts and hosts groups.
Which video file format needs to be searched and saved in the
Migration folder while migrating from Windows to Linux operating
system?
AIFF
OGG
WMV
WAV
Global Systems is a software development organization that provides
customized software solutions. The organization uses
kernel-2.4.21-4.EL on its Linux server. The management of the
organization decides to upgrade the existing kernel to kernel-2.4.24
to enhance security and to acquire new hardware support. Pat Greene,
the system administrator is assigned the task of upgrading the Linux
kernel.
After downloading the.tar.gz file containing the source code of the
kernel in /usr/src directory, Pat needs to install the kernel source
code.
What should Pat do to perform the task?
Pat needs to execute the following code snippet:
# cd /usr/src
# tar -zxcf linux-2.4.24.gz
# cd linux-2.4.24
# ls –al
Pat needs to execute the following code snippet:
# cd /usr/src
# tar linux-2.24.tar.gz
# cd linux-2.4.24
# ls –al
Pat needs to execute the following code snippet:
# cd /src
# tar -zxvf linux-2.4.24.tar.gz
# cd linux-2.4.24
# ls –l
Pat needs to execute the following code snippet:
# cd /usr/src
# tar -zxvf linux-2.4.24.tar.gz
# cd linux-2.4.24
# ls –al
Which parameter in the “smb.conf” file for the OpenLDAP-enabled Samba
server specifies the domain where Samba server resides?
Workgroup
Encryption
Security
Netbios name
Corrine Wallace is working as a system administrator at Countryside
Markets. The organization runs multiple LDAP servers for storing the
data pertaining to the organization. Every department stores their
own data in their respective databases and directories, supplied by
different vendors. For official reasons, the LDAP servers need to be
integrated to share the data contained therein. However, Corrine
finds that the Integrating the Access to different Directories issue
arises because the schema design for the LDAP schema referral differs
from vendor to vendor. What should Corrine do to solve the issue?
Use push and pull agents
Create distributed multivendor directories
Use metadirectories
Use gateways
Consider the statements:
Statement A:
To create a Kickstart configuration file for an FTP server, you must
ensure that the authentication technique is implemented.
Statement B:
To create a Kickstart configuration file for an FTP server, you need
to install X Windows System, as the users and the administrators will
access the FTP server remotely most of the time.
Which of the following is true, with respect to the above
statements?
Statement A is false and statement B is true.
Statement A is true and statement B is false.
Both, statements A and B, are true.
Both, statements A and B, are false.
Global Systems Inc. is a leading software development organization.
Users in RD frequently download files and packages from the database
server through the Internet. Some files and packages downloaded from
the Internet are infected with viruses, which affect computers of all
users. To overcome this virus problem, instead of installing
antivirus programs on every computer. The organization needs to
install virus-free operating systems, such as Linux. Chris, the
system administrator, automates the installation of the operating
system. Pat needs to use an operating system that provides solution
for small to medium range of servers used for the majority of
businesses, such as file servers and mail servers. He also needs to
place pre-installation scripts at the beginning of the Kickstart
configuration file. What should Chris do to perform the required
task?
Chris needs to use Red Hat Enterprise Linux operating system and
enter the following command:
%post --interpreter /usr/bin/python
Chris needs to use Red Hat Enterprise Linux operating system and
enter the following command:
# mkdir /var/ftp/pub/configfiles
Chris needs to use Red Hat Enterprise Linux operating system and
enter the following command:
%pre
echo ”My kickstart installation started on ‘ /bin/date’ “ >
/etc/motd
Chris needs to use Mandriva Linux operating system and enter the
following command:
network --device eth0 -–bootproto dhcp ?
Smartdevelopers is a leading software development organization. The
organization maintains an LDAP Directory server to store information
about employees of the organization. To enhance the security of the
LDAP Directory server, Ronald Billing, the system administrator,
needs to configure the LDAP Directory server to support Kerberos
authentication. For this, Ronald needs to create Kerberos service
principals for the LDAP server and extract them to a keytab file.
What should Ronald do to perform the above task?
Ronald should execute the following commands:
# chgrp ldap /etc/openldap/ldap.keytab
# chmod 640 /etc/openldap/ldap.keytab
Ronald should execute the following commands:
# kadmin addprinc –randkey ldap/smartdevelopers.com
# ktadd –k /etc/openldap/ldap.keytab ldap/smartdevelopers.com
# chgrp ldap /etc/openldap/ldap.keytab
# chmod 640 /etc/openldap/ldap.keytab
Ronald should execute the following commands:
# ktadd –k /etc/openldap/ldap.keytab ldap/smartdevelopers.com
# chgrp ldap /etc/openldap/ldap.keytab
# chmod 640 /etc/openldap/ldap.keytab
Ronald should execute the following commands:
# kadmin addprinc –randkey ldap/smartdevelopers.com
# ktadd –k /etc/openldap/ldap.keytab ldap/smartdevelopers.com
Nancy Jones the network administrator at Technology Systems is
responsible for monitoring the network of the organization. While
monitoring the network, Nancy observes that the RPM packages
installed on the Linux servers are of an older version than required
and do not provide required functionalities. Therefore, Nancy decides
to install an updated version of the RPM packages. For this, Nancy
downloads a new RPM package, but observes that the package
installation files are not executing properly. What should Nancy do
to solve the problem?
Run the itrace command at the shell prompt
Run the ethereal command at the shell prompt
Run the tcpdump command at the shell prompt
Run the strace command at the shell prompt
Donna Bard is working, as a network administrator at Good Graphics
Inc. Donna needs to add entries of new employees to the LDAP
directory containing employees information. While adding the entries,
Donna needs to specify the input file from where the “ldapadd”
utility will pick up the entry and add to the LDAP directory. Which
one of the following options will Donna use to perform the required
task?
-D binddn
-U username
-f filename
-h hostname
Tom Wilkins is working as a network administrator at Good Graphics
Inc. The management asks Tom to deploy LDAP server to provide
information and resources across the organization. Tom needs to
search for the name of the employees whose first name is “Steve”. In
addition, Tom wants that ldapsearch utility should prompt for simple
authentication. What should Tom do to perform the required task?
# ldapsearch cn=Steve* -S–d
# ldapsearch cn=Steve* -c -h
# ldapsearch cn=Steve* -x -h
# ldapadd cn=Steve* -x -h
Tom Wilkins is working as a system administrator at Technology
Systems. Tom is assigned the task to migrate the NIS information to
LDAP. Therefore, Tom needs to map the NIS information stored in
/etc/passwd file to attributes of posixAccount object class. Tom
needs to translate the parameter, /bin/bash from the entry stored in
/etc/passwd file. Which of the following attribute of posixAccount
object class maps to the above parameter?
homeDirectory
LoginShell
loginShell
HOMEDIRECTORY
Donna Bard is working as system administrator with Quality Software
Developers. Sharp Clothing Inc. is a garment manufacturing
organization, which stores information about its employees,
customers, and suppliers in a directory. All the employees of the
organization and customers access the directory. Tom Allen, the
Business Manager at Sharp Clothing Inc., decides to set up new
manufacturing units at different locations. As a result the load on
the existing directory service increases. To solve this problem, Tom
directs Donna to create a new directory service. To implement the
directory, Donna wants to install a software package called OpenLDAP.
However, Donna observes that a package called SASL needs to be
installed before installing OpenLDAP. To verify whether SASL is
already installed on the server, Donna enters the following command
at the shell prompt:
# rpm –ivh openssl-0.9.7a-22.1.i386.rpm
However, Donna notices that the command is not producing required
results. What should Donna do to solve the problem?
Donna needs to enter the following command at the shell prompt:
# rpm –ivh sasl-devel-0.9.7a-22.1.i386.rpm
Donna needs to enter the following command at the shell prompt:
# rpm grep | –qa sasl
Donna needs to enter the following command at the shell prompt:
# rpm –qa grep openssl
Donna needs to enter the following command at the shell prompt:
# rpm –qa | grep sasl
Which command is used to verify that the result of # ls / >
/soft/list command has been copied to the list file?
# cat /soft
# cat /list
# cat /soft/list
# cat
Jim Lewis is working as a system administrator in AB Corp. He uses
Linux operating system at the datacentre. He upgraded the Linux
kernel-2.2 to kernel—2.4 to provide support for Oracle9i database
server. He compiled the kernel using the make modules command, but
the system was not able to boot. Identify the reason and the solution
for this problem?
Dependencies were not resolved before compiling the kernel.
Resolve all the dependencies using the make dep command.
Initial RAM disk was not created. Create RAM disk using the
mkinitrd command.
Symbolic links described in the README file were not set up
correctly. Reinstall the kernel
Unused files were not removed before compiling. Use make clean
command
The migration perl scripts translate the system files into which file
format?
.LDIF format
.rpm format
.doc format
.conf format
Identify the command that a LDAP Directory client uses to view the
list of Ticket to Get Tickets (TGTs) obtained from the Kerberos
server.
kinit
klist
kadmin.local
kdb5_util
Donna Bard is the network administrator at PQR Corp. She needs to
provide the alternative input devices, such as touchscreen and
trackball to the employees of the organization to allow them to enter
data using different input devices. She also needs to facilitate the
troubleshooting of different Windows and Linux-based applications by
providing a debugger. Therefore, she decides to install Wine using
Concurrent Versions System (CVS) Snapshot method on one of the main
servers. Which command should Donna use to download the Wine source
code tree in the wine directory on the server?
$ cvs
$ export CVSROOT=:pserver:[email protected]:/home/wine
$ cvs –z3 checkout wine
$ ./configure & make depend & make
Technology Systems is an IT organization based at Atlanta. The
organization decides to open a new development center at Florida. The
management of the organization asks John Barrett, the network
administrator, to configure a mail server at this new center. For
this, John needs to install send-email packages. John observes that
the binary RPM package for send-email package is not available on the
network, however, the Source RPM (SRPM) package is available.
Therefore, John decides to build binary RPM package from SRPM. What
should John do to perform the task?
Execute rpmbuild –bSTAGE [options] /usr/src/redhat/SOURCES
Execute rpmbuild –bSTAGE [options] /usr/src/redhat/SRPMS
Execute rpmbuild –bSTAGE [options] /usr/src/redhat/SPECS
Execute rpmbuild –bSTAGE [options] /usr/src/redhat/BUILD
Tom is working as a system engineer at ABC corp. The company assigns
a task to Donna to implement LDAP directory schema to reduce data
redundancy problems and to maintain data integrity. To perform the
task, Tom implements an attribute type, which specifies the
information that can be stored in the attribute of the directory. The
company also asks Tom to use the specification given below to
implement attribute type:
OID: 2.5.4.20 and the attribute name is telephoneNumber.
telephoneNumberMatch rule: To match complete telephone numbers
telephoneNumberSubstringMatch: To match partial telephone numbers.
The OID of the encoding rule: 1.3.6.1.4.1.1466.115.121.1.15.
Maximum length: 24
What code snippet should Tom use to perform the task?
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15, 2.5.4.20 NAME
'telephoneNumber' EQUALITY telephoneNumberMatch SUBSTR
telephoneNumberSubstringsMatch {24}
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 NAME 'telephoneNumber'
EQUALITY telephoneNumberMatch SUBSTR telephoneNumberSubstringsMatch
length 24
2.5.4.20 NAME 'telephoneNumber' EQUALITY telephoneNumberMatch
SUBSTR telephoneNumberSubstringsMatch SYNTAX
1.3.6.1.4.1.1466.115.121.1.15{24}
2.5.4.20 NAME telephoneNumber EQUALITY telephoneNumberMatch SUBSTR
telephoneNumberSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15
length 24
Red-Eye Experts is a .NET applications development organization,
based in the US. The organization uses the Windows platform for
developing .NET applications. For security reasons, Donna Bard, the
network administrator, needs to migrate .NET applications to the
Linux platform to provide file-level and user-level security to the
applications. To migrate the .NET applications to the Linux
platform, Donna needs to install the Mono tool that provides a number
of APIs that can be used to run the .NET applications on Linux. For
this, Donna installs the mono-data-1.1.6-1.novell.6.3.i586.rpm RPM
package as the first package of the tool. However, Donna finds an
error massage while installing this package. What error message does
Donna receive while installing this package?
The error message is displayed as
follows:“mono-data-oracle-1.1.6-1.novell.6.3.i586.rpm and
mono-complete-1.1.6-1.novell.6.3.i586.rpm RPM packages should already
be installed on the computer.”
The error message is displayed as follows:
“mono-core-1.1.6-1.novell.6.3.i586.rpm and
mono-basic-1.1.6-1.novell.6.3.i586.rpm RPM packages should already be
installed on the computer.”
e error message is displayed as
follows:“mono-data-oracle-1.1.6-1.novell.6.3.i586.rpm and
mono-data-postgresql-1.1.6-1.novell.6.3.i586.rpm RPM packages should
already be installed on the computer.”
The error message is displayed as
follows:“mono-extras-1.1.6-1.novell.6.3.i586.rpm and
mono-complete-1.1.6-1.novell.6.3.i586.rpm RPM packages should already
be installed on the computer.”
Blue Moon Computers is a software development organization, which has
development centers all over the US. Pat Greene, the system
administrator at Blue Moon Computers, installs a LDAP server to store
the information about the employees and projects running at different
development centers. The Internet has facilitated the growth of Blue
Moon Computers. Therefore, Pat decides to increase the accessibility
of the LDAP server to all development centers through the Internet.
According to the company’s policies, the electronic mail address for
a given employee is considered public information and the employee's
home address is considered sensitive information. It must be
protected to address employee privacy concerns. Easy accessibility to
the LDAP server allows malicious users to try and access the LDAP
server to obtain the home address and other such private and
confidential information about various employees. Therefore, the
server needs to be protected against such malicious users. Pat needs
to implement Access Control List (ACL) to grant access privileges to
the authenticated users.
Which of the following options contains the access control
requirements to accomplish this task?
-Replication and synchronization
-Managing the directory server
-Network environment
-Physical security
-Directory accessibility
-Read/Write permission
-Sestivity of data
-Administration of directory server
-User community
-The subjects accessing the LDAP server
-The objects that are accessed
-The level of authentication required
-The accessibility time of the LDAP server
-The access level to an LDAP server
Mike Womack is working as a network administrator at Super Graphics
Inc. The accounts department of the organization operates its
business processes using a. NET-based accounting application. The
organization notices that unauthorized users are accessing the
confidential data from its network. Therefore, the organization
decides to migrate the accounting application from Windows 98 to the
Linux platform to provide file and user-level security to its
network. To perform the task, Mike compiles the source code of the
.NET application to generate a .exe file. Now, he needs to execute
the application by passing the .exe file as an argument. In addition,
he wants to determine the version information of the Just in time
(JIT) compiler and activate the security manager. What should Mike do
to perform the required task?
Use the mono command with –v and security option
Use the mcs command with about and fatal option
Use the mcs command with –L PATH and debug option
Use the mono command with aot and security option
John Barrett is working as a network administrator at Blue Valley
Consulting. The organization has a number of branch offices all over
US. The employees of the organization access a centralized Linux
server located at the main branch. John has recently upgraded the
kernel of the centralized Linux server from kernel-2.4 to kernel-2.6.
John has also implemented RAID to avoid any data loss. After
implementing the RAID, John observes that the RAID acceleration is
low. As a result, the server performance is also degraded. To improve
the RAID acceleration, John needs to stabilize the speed of the RAID
device. For this, he decides to assign the value, 80000, to the
parameters specifying the speed of the RAID device. What should John
do to perform this task?
Execute the following commands at the shell prompt:
# echo 80000 > /proc/sys/dev/raid/speed_max
# echo 80000 > /proc/sys/dev/raid/speed_min
Execute the following commands at the shell prompt:
# echo 80000 > /sys/dev/raid/speed_limit_max
# echo 80000 > /sys/dev/raid/speed_limit_min
Execute the following commands at the shell prompt:
# echo 80000 > /proc/sys/dev/raid/speed_limit_max
# echo 80000 > /proc/sys/dev/raid/speed_limit_min
Execute the following commands at the shell prompt:
# echo 80000 > /proc/sys/raid/speed_limit_max
# echo 80000 > /proc/sys/raid/speed_limit_min
Which implementation provided by Cyrus-SASL libraries enables a
client to send and receive encrypted data from an OpenLDAP server?
KERBEROS_V4
CRAM-MD5
DIGEST-MD5
ANONYMOUS
Jim Lewis is a network administrator at Blue Moon Computers. All the
employees of the organization are working on the Windows platform.
Recently, the organization receives a project to develop inventory
management software based on the Linux platform. Therefore, Jim is
assigned the task to install Linux on the workstations and servers in
the software development department of the organization. However, the
employees of the company need to run some Windows-based applications
on the Linux systems. To perform this task, Jim installs the Wine
software. Now, to configure Wine, Jim writes the following code
snippet at the shell prompt:
$ mkdir ~/.wine/ ?
$ cp documentation/samples/config ~/.wine/config ?
However, while executing the preceding code snippet, Jim notices
that code snippet has many errors because of which it is not
providing the required output. What should Jim do to solve the
problem?
Jim needs to write the following code snippet:
$ mkdir ~/.wine/ ?
$ cp <dir_to_wine_source_code>/documentation/samples/config
~/.wine/config ?
Jim needs to write the following code snippet:
<dir_to_wine_source_code>/documentation/samples/config
Jim needs to write the following code snippet:
$ mkdir wine/ ?
$ cp <dir_to_wine_source_code>/documentation/samples/
Jim needs to write the following code snippet:
$ mkdir ~/.wine/ ?
<dir_to_wine_source_code>/documentation/samples/ con
Red-Eye Experts is a leading developer of educational courseware. The
organization is located in California, and has about 200 employees.
The organization is divided into three departments: Production, HR,
and Marketing. In the existing setup, an NIS server is used to
authenticate the employees. However, the organization has decided to
recruit another 300 persons in the next two months. Due to the
expansion plans, Tom Wilkins, the system administrator, has decided
to configure an OpenLDAP server in the organization with the domain
“redeye.com”, to better manage the information about the employees.
For this, Tom needs to edit the “slapd.conf” file to specify the
domain components for the LDAP domain, and to specify the location of
the OpenLDAP database. Which directives of the slapd.conf file should
Tom use and how is Tom going to edit these directives to achieve his
objective?
To specify the domain components for the LDAP domain, Tom should
edit the Suffix directive, as shown:
suffix “ dc= redeye,dc=com”
To specify the location of the OpenLDAP database, Tom should edit
the directory directive, as shown:
directory /var/lib/redeye.com
To specify the domain components for the LDAP domain, Tom should
edit the Suffix directive, as shown:
suffix “ dc= redeye, dc=com”
To specify the location of the OpenLDAP database, Tom should edit
the directory directive, as shown:
directory /var/lib/ldap/redeye.com
To specify the domain components for the LDAP domain, Tom should
edit the Suffix directive, as shown:
suffix “ dc= redeye.com”
To specify the location of the OpenLDAP database, Tom should edit
the directory directive, as shown:
directory /lib/ldap/redeye.com
To specify the domain components for the LDAP domain, Tom should
edit the Suffix directive, as shown:
suffix “ dc= redeye.com”
To specify the location of the OpenLDAP database, Tom should edit
the directory directive, as shown:
directory /var/lib/ldap/redeye.com
Technology Systems is a leading developer of computer applications.
The organization has its head office in California and two branch
offices in New York and Toronto. There are three departments in the
organization: Marketing, Programming, and Accounting. The Programming
department is divided into two groups, Windows group and Linux group.
The branch offices are connected to the head office by a 56 Kbps
leased line. Now, each branch office runs as a separate entity, with
its own network, reporting structure, and constraints. The
organization has no centralized IT management group, and separate
administrators at each branch office manage the network. Since the
organization has multiple servers but no centralized management of
the information, it faces the data-related problems, such as data
redundancy and data inconsistency.
To avoid these data-related problems in the organization, Jim Lewis,
the system administrator at the head office, decides to install and
configure the OpenLDAP Directory service. Through the use of OpenLDAP
Directory service, Jim wants to provide authentication service in the
organization.
This authentication service authenticates the employees to the
directory server by providing the employees encrypted tickets for a
short duration. During the period when the ticket is valid, an
employee can access the directory service without providing a
password.
Now, to implement the above authentication mechanism, which
prerequisite software package must be installed and configured by Jim
before installing OpenLDAP, and what is the command entered by Jim to
install the prerequisite software package?
Jim must install the SASL software package
Jim must enter the following commands to install SASL:
# rpm –ivh cyrus-sasl-md5-2.1.15-3.i386.rpm
# rpm –ivh cyrus-sasl-plain-2.1.15-3.i386.rpm
# rpm –ivh cyrus-sasl-2.1.15-3.i386.rpm
# rpm –ivh cyrus-sasl-gssapi-2.1.15-3.i386.rpm
# rpm –ivh cyrus-sasl-devel-2.1.15-3.i386.rpm
Jim must install the Kerberos software package
Jim must enter the following command to install Kerberos:
# rpm –qa | grep krb5-server
Jim must install the OpenSSL software package.
Jim must enter the following commands to install OpenSSL:
# rpm –ivh openssl-0.9.7a-22.1.i386.rpm
# rpm –ivh openssl-devel-0.9.7a-22.1.i386.rpm
# rpm –ivh openssl096b-0.9.6b-13.i386.rpm
Jim must install the Kerberos software package
Jim must enter the following commands to install Kerberos:
# rpm –ivh krb5-server-1.2.7-19.i386.rpm
# rpm –ivh pam_krb5-1.70-1.i386.rpm
# rpm –ivh krb5-libs-1.2.7-19.i386.rpm
# rpm –ivh krb5-devel-1.2.7-19.i386.rpm
# rpm –ivh krb5-workstation-1.2.7-19.i386.rpm
Ken Burton is working as a system administrator with Global Systems
Inc. Ken is assigned the task to integrate Samba with OpenLDAP. Ken
is asked to store the user information in OpenLDAP. He wants to store
the sambaAccount information for validating the Windows user, John.
Which of the following command should Ken use to accomplish the task?
# smbpasswd –s john
# smbpasswd –s john –a john124
# smbpasswd –a john –s john123
# smbpasswd –a john –S john123
Ed Young is working as a system administrator at InfoSuper Corp. Don
Allen, the Business Manager at XYZ Inc. decides to setup new offices
in US, UK, and China. So, Don directs Ed to implementa
centralizedDirectory service in the organization. To perform this
task, Ed selects and implements a directory, and tests the
reliability, redundancy, and fault tolerance of the directory. Ed
also studies the organizational environment and identifies the data
sources, directory users, and directory-enabled applications. Ed also
updates the directory to incorporate new requirements, makes backup
of directory, and monitors the performance of the directory.
Which sequence of steps should Ed follow to complete the task?
1. Test the reliability, redundancy, and fault tolerance of the
directory.
2. Update the directory
3. Examine the organizational environment.
1. Test the reliability, redundancy, and fault tolerance of the
directory.
2. Examine the organization environment
3. Update the directory
1. Examine the organizational environment.
2. Test the reliability, redundancy, and fault tolerance of the
directory.
3. Update the directory
1. Update the directory
2. Test the reliability, redundancy, and fault tolerance of the
directory.
3. Examine the organizational environment.
Don Allen is working as a system administrator at Indestructible
Boxes, Inc. The organization asks to Don to install Simple Network
Management Protocol (SNMP) on a computer in the organization to
monitor networks and systems of the organization. To install SNMP,
Don downloads the source code of SNMP available in the tar.gz file.
Now, what command should Don use to perform the task?
# cp snmp-<x>.tar.gz /usr/src ?
# mv snmpd.conf snmpd.conf.org ?
# tar xzvf snmp-<x>.tar.gz ?
# cd /usr/src/snmp-<x> ?
# service snmpd status ?
# make all ?
# cp snmp-<x>.tar.gz /usr/src ?
# cd /usr/src ?
# tar xzvf snmp-<x>.tar.gz ?
# cd /usr/src/snmp-<x> ?
# ./configure ?
# make all ?
# cp snmp-<x>.tar.gz /usr/src ?
# net-snmp-utils-5.0.8-11
# net-snmp-devel-5.0.8-11
# cd /usr/src/snmp-<x> ?
# ./configure ?
# make all ?
# cp snmp-<x>.tar.gz /usr/src ?
# cd /usr/src ?
# mv snmpd.conf snmpd.conf.org ?
# cd /usr/src/snmp-<x> ?
# ./configure ?
# make all ?
Ken Burton is working as a system administrator at SuperGraphics Inc.
While replicating an LDAP server, Ken needs to configure the master
LDAP server to maintain a log of the changes made. Ken, therefore,
needs to edit the slapd.conf file to specify the details of the
replica server. He needs to specify the name of the replica server,
the partition to be replicated, the binding DN of the LDAP server,
and the binding method to bind the master LDAP server to the replica
server. Which of the following commands should Ken use to perform the
required task?
replica host=replicaser.supergraphics.com:389
binddn=”cn=replicaser,dc=supergraphics,dc=com”
credentials bindmethod=simple tls=no
replica host=replicaser.supergraphics.com:389
tls=”dc=supergraphics,dc=com”
binddn=”cn=replicaser,dc=supergraphics,dc=com”
credentials bindmethod=simple tls=no
replica host=replicaser.supergraphics.com:389
suffix=”dc=supergraphics,dc=com”
binddn=”cn=replicaser,dc=supergraphics,dc=com”
credentials bindmethod=simple tls=no
replica host=replicaser.supergraphics.com:389
suffix=”dc=supergraphics,dc=com”
portnumber=”cn=replicaser,dc=supergraphics,dc=com”
credentials bindmethod=simple tls=no
Quality Software Developers is a software development organization,
based at Atlanta. All computer systems in the organization run on the
Windows family of operating systems. The management assigns Jim
Lewis, the system administrator, the task of enabling remote
installation of an operating system across several machines. The
operating system should:
Provide support for different services, such as Samba and FTP
Specify the maximum number of files that can be opened by a user at
a time
Support e-mail services, such as Sendmail, Qmail, and Postfix
services
Enhance the security of the organization network by providing
security services, such as VPN and firewalls in the network
What should Jim do to perform the task?
Evaluate Linux for Security Requirements and install Linux
Evaluate Linux Deployment Requirements and install Linux
Evaluate Linux for Business Requirements and install Linux
Evaluate Linux for Maintenance Requirements and install Linux
Supersoft2000, a software development organization has development
centers throughout America, which are connected through a network.
Larry Williams, a system administrator at Supersoft2000, installs a
directory service to implement an identity management system.
Employees and clients at different centers access the directory
server through the network. Larry wants to prevent unauthorized
access to the directory server. So, Larry installs a firewall on the
network of the organization such that:
The employees of the internal network are able to establish a
connection with external networks.
Incoming requests are processed first by the firewall. Next, the
firewall validates the requests and forwards them to the directory
server.
Which of the following does Larry use to perform these tasks?
SASL
SSL/TLS
CIPE
Kerberos
Jim Lewis is working as a network administrator at Smart Software
Developers. Jim has registered the Linux workstations and servers
with Red Hat Network. Jim has identified a workstation on the network
that has crashed while running a software application. For resolving
the problem, he must identify the location of this error. What should
he do to accomplish the task?
Implement a GUI to receive automatic updates from Red Hat network
Check RPM dependencies associated with each new version of the
updates
Issue a list of Errata
Ask for prior notification for updates and receipt of the errors
through mail messages
Pat Greene is working as a system administrator at InfoSuper Corp.
The management asks Pat to migrate user information from the NIS
server configured in the network of the organization to the OpenLDAP
server configured on the same host. Pat needs to add user accounts
and groups information contained in the LDIF format to the OpenLDAP
database. What should Pat do to perform the required task?
Edit the migrate_common.ph file
Specify the domain and base of your network in the
/usr/share/openldap/migration/migrate_common.ph file.
Create a file infosuper.ldif in the /tmp directory
Edit the values of the DEFAULT_MAIL_DOMAIN and DEFAULT_BASE
parameters
Which of the following components is installed on a directoryserver or a client that will access the directory?Directory-enabled applicationDirectory serversAccess policiesDirectory clients
Which of the following directory types help developcompany white pages?Application-specific directoriesGeneral-purpose directoriesNOS directoriesPurpose-specific directories
You have configured a directory. You want to grant directoryaccess to specific clients between 10:00 AM and 1:00 PMevery day. How will you achieve this?Create replicas of the directoryCreate ACLsCreate directory partitionsConfigure MMS
In which of the following directory stages should you test thereliability and fault-tolerance of the directory server?Design stageDeployment stageMaintenance stageBoth design and deployment stage
The parameters used to measure directory performanceare:LatencyThroughputRobustnessBoth latency and throughput
The LDAP client and server communicate using the ___ portnumber?803896079
Which of the following models defines the basic building
blocks of LDAP directory?Functional modelNaming modelSecurity modelInformation model
Which of the following data format will you use to storedigital certificate in a directory?StringDigitDateBinary
Which of the following directory servers is an example ofthe application-specific directory type?a. OpenLDAPb. IBM/Lotus Notes Namec. Active Directoryd. Switchboard Directory
In which of the following directory stages should you take
feedback from the users?
a. Design stageb. Deployment stagec. Maintenance staged. Both design and deployment stage
Which of the following feature of a directory allows you topersonalize the directory according to your businessneeds?a. Distribute datab. Flexibilityc. Replicate datad. Dynamic
The attribute type, ces representsa. Strings, where case of strings is significant duringsearching and comparisonsb. Distinguished name of the object that owns the entryc. Strings, where case of strings cannot be specified duringsearching and comparisonsd. String classWhich of the following directory components represents device drivers that will beaccessed by a directory server?
a. Directory-enabled applicationb. Softwarec. Supporting softwared. Directory clients
Which of the following directory features enables you to store data of differentformats on a directory server?a. Dynamic natureb. Flexibilityc. Personalizationd. Data distribution
Which of the following elements is a platform-independent directory server?a. Active Directoryb. MMSc. Novell Directory Serverd. Netscape Directory Server
In order to ensure that the clients in the branch offices are not affected in case thedirectory server breaks down, how would you make the directory fault-tolerant?a. Store data hierarchically in the directoryb. Make the directory interoperable with the other servers in the branch officesc. Configure replicas of the directory in the branch officesd. Secure the directory against unauthorized access from branch offices
In which of the following directory stages should you make backups of the directoryserver?a. Deployment stageb. Design stagec. Maintenance staged. Backup stage
Which of the following tree designs is the correct representation of a DIT?a. Horizontal treeb. Inverted treec. Vertical tree with root node at the lowest level of the treed. Cannot be represented by any tree design
Identify the LDAP model that specifies how to organize and identify data in adirectory.a. Information model
b. Naming modelc. Functional modeld. Security model
In an inventory database, the product ID must be alphabetically ordered, composedof alphanumeric characters only, and be unique. Which one of the following is anexample of this definition?a. Rules for matching equalityb. Rules for sorting attribute valuesc. Syntaxd. Entry
If contained in a Dn, which one of the following characters is NOT escaped?a. Backslash (\)b. Less-than symbol (<)c. Greater-than symbol (>)d. Dollar sign ($)
Identify the operation that takes a single parameter, message ID.a. Abandon operationb. Bind operationc. Unbind operationd. Rename operation
Which of the following attribute types describes theapplications that own and use the attribute?OIDAssociated attribute syntaxUsage indicatorMatching rules
Which of the following directory schema elements governsthe search and compare operations performed on attributevalues?AttributeAttribute SyntaxMatching RulesObject Classes
In which of the following classes are the optional objectclass attributes defined?Structural classAuxiliary class
Abstract classBoth Structural class and Abstract class
The OID of an object class definesA unique number to identify the objectThe number of attributes in the classThe name of the classThe optional attributes in the class
Which of the following attribute can be used to represent thedepartments in a DIT?oudccnuid
Which of the following is the correct representation of RDNof the root node for an organization whose Internet domainname is www.developsol.com?dc=developsol,dc=comdc=com,dc=developsoldc=developsol.comdc=developsol
Which of the following factor does not affect the directorydesign topology?Subnet mask of the networkDNS namespacePhysical location of the networkSchema documentation
Which of the following determine the way the data, which isstored in the main directory server and the replica servers,is synchronized?Replication PoliciesUnit of replicationIncremental updateTotal update
Identify the replication strategy for the above statement.Single master replication using chainingSingle master replication using referralsMultimaster replication using partial updateMultimaster replication using complete update
Identify the protocol that consists of two layers, the recordprotocol and handshake protocol, which provide encryptedcommunication between communication hosts on a network.TLSSASLTCP/IPDIGEST-MD5
Which of the following rpms will you use to implement thisauthentication mechanism?# rpm –ivh pam_krb5-1.70-1.i386.rpm# rpm –ivh cyrus-sasl-md5-2.1.15-3.i386.rpm# rpm –ivh openssl-0.9.7a-22.1.i386.rpm# rpm –ivh cyrus-sasl-gssapi-2.1.15-3.i386.rpm
Which of the following data format represent ASCII textstring?a. IA5Stringb. OctetStringc. DirectoryStringd. CountryString
In which replication policy do the main server and the replicaservers store a writable copy of the directory entries?a. Multimaster replicationb. Dualmaster replicationc. Hybrid replicationd. Multiclient replication
Which of the following specifies how attribute value should be represented in thedirectory?a. Associated attribute syntaxb. Attributec. Object classesd. Matching rules
From the following, identify the standard syntax that represents text strings, whichare encoded in UTF-8 of ISO 10646.a. CountryStringb. DirectoryStringc. IA5Stringd. PrintableString
Which of the following standard matching rules is used to compare case of lettersduring comparisons, ignoring the leading, trailing, and multiple spaces?a. caseIgnoreMatchb. caseExactMatchc. integerMatchd. octetStringMatch
Which of the following types of object class is used to create a new class from theexisting LDAP class, top?a. Structuralb. Aliasc. Auxiliaryd. Abstract
In the ASN.1 schema format, what does SUBMATCHINGRULE specify?a. The rule applied when comparing two attributes for equalityb. The rules applied on attributes when performing comparison operationsc. The rules applied on attribute when comparing the attribute value with asubstringd. The rules applied on attribute when deleting the attribute value with a substring
Consider the following problem and solution:Problem: You have multimaster directory server setup in your organization.However, you are facing a conflict problem in upgrading.Solution: You have assigned sequence numbers to the attribute names.Identify the correct option for the solution.a. The solution fully solves the problemb. The solution partially solves the problemc. The solution does not solve the problemd. Both the problem and solution are incorrect
You have configured a directory server in an organization. Whenever a user has toaccess the server, the user has to provide his/her user name and password. After auser connects to the directory server, you would like the user to remain connected forthe next five hours. To solve the problem, you need to:a. Configure Kerberosb. Configure single master directoryc. Configure OpenSSL
d. Configure multimaster directory
You have configured a directory server and a slave directory server in anorganization. However, you find that the master directory server and the slavedirectory are synchronized after every 12 hours. Which one of the following optionsis the correct reason for the mismatch between master and slave directory servers?a. The servers are configured in multimaster modeb. The servers are updated through chaining approachc. The servers are configure in single master moded. The servers are configured for incremental updating
The main server performs the write operation on the request of the replica server andsends back the results. The replica server receives the result and forwards it to theclient. In which of the following replication policies does the preceding scenariounfold?a. Multimaster replicationb. Single-master replication using referralsc. Single-master replication using chainingd. Multimaster replication using incremental update
Donna Bard, a network administrator at RedSky Inc., is assigned the task of enablingthe replica server to send the IP address of the main server to the client of thecompany. What should Donna do to perform the task?a. Send a write operation by using referrals.b. Send a write operation by using chaining.c. Use multimaster replication to send a write operation.d. Use single Master replication to send a write operation.
You have to configure an OpenLDAP server. To save diskspace, however, you have to disable logging in theOpenLDAP server. Which one of the following optionscan you use to achieve this?a. Remove the log files from /var/log filesb. Add loglevel 0 in slapd.conf filec. Add local4.debug 0 in slapd.conf filed. Add loglevel 2048 in slapd.conf file
Tom Wilkins is working as a network administratorat Blue Moon Computers. Blue Moon Computershas deployed an LDAP server to provideinformation and resources across the organization.Tom is asked to modify salary entries of employeeswho got increments. He wants the modificationprocess to continue even if there is an error in the
modified entry. Tom also wants that all the incorrectentries should be recorded in an errorlog file,log_file. Which command should Tom use toperform the required task?a. ldapmodify –c –o log_fileb. ldapmodify –o log_filec. ldapmodify –c-w log_filed. ldapmodify –o –w log_file
Identify the command that you will issue to add the detailsof user contained in an LDIF file named, user.ldif from anLDAP client. The LDAP server is configured on192.168.0.202.a. slapadd –l –h 192.168.0.202 user.ldifb. slapadd –l –h 192.168.0.202 –f user.ldifc. ldapadd -x –h 192.168.0.202 -D"cn=Manager,dc=newmoon,dc=com" -W user.ldifd. ldapadd -x –h 192.168.0.202 -D"cn=Manager,dc=newmoon,dc=com" -W -fpeter.ldif
Which one of the following files will you use to find the arguments that werepassed to the slapd daemon for starting an OpenLDAP server?a. /etc/openldap/slapd.confb. /var/run/slapd.argsc. /var/run/slapd.pidd. /var/log/slapd.conf
You have to configure a directory-enabled application. Which one of thefollowing security mechanisms can you use to provide programmableauthentication interface to the application?a. CRAM-MD5b. GSSAPIc. KERBEROS_V4d. DIGEST-MD5
Which of the following directives is used configure logging on theOpenLDAP server?a. loglevelb. pidfilec. replogfiled. logserver
Which of the following files contains the information about the FQDN of a
directory server?a. slapd.confb. slapdc. sasl.confd. slurpd.conf
Which one of the following parameters can be used in ACLs to restrict clientsfrom accessing a specific attribute in a directory?a. dn[<dnstyle>]=<users>b. attrs=<attribute list>c. attrs=<auth>d. users
Ed Young is working as a system administrator at Red Sky IT Systems. Theorganization has implemented an LDAP server to enable its users and clientsto access the organization’s information. Ed finds that the LDAP directory isdisplaying numerous irrelevant entries in response to the search requests ofthe clients. He wants to restrict the number of entries that a server retrieves inresponse to search requests. Which of the following parameters of theslapd.conf file on LDAP server should Ed modify to perform the task?a. sizelimit <integer>b. timelimit <integer>c. –l <integer>d. –z <integer>
Tom Wilkins is working as a system administrator at Technology Systems.The management asks Tom to identify the employees who have receivedsalary increments. Tom writes all the search requests in a data file. He usesthe ldapsearch utility to search the bulk entries by using a single command.Which option should Tom use with ldapsearch utility to read lines from a datafile and perform LDAP search for each line?a. -Sb. –fc. –xd. –D
Ed Young, a system administrator at Mastery Mechanics is working on anLDAP directory. He finds that some entries of the inventory departmentrequire immediate updating. Ed writes all the required modifications in a file.He wants to use this file as an input to the ldapmodify utility. In addition, hedoes not want the modification process to stop even if there is an error in it.Which of the following commands should Ed use to perform the task?a. ldapmodify –a -fb. ldapmodify –b -fc. ldapmodify –c -f
d. ldapmodify –r –f
You have configured an LDAP directory server on a node having the IPaddress 172.17.27.154. The suffix of the directory is dc=newmoon,dc=com.You have to identify only the e-mail ids of all the users whose surname isCarter. Which of the following commands will you use to perform the task?a. ldapsearch sn=carter -h 172.17.27.154 mailb. ldapsearch sn=carter -x -D "cn=manger,dc=newmoon,dc=com"c. ldapsearch sn=carter -x -D -W "cn=manger,dc=newmoon,dc=com"d. ldapsearch sn=carter -x -h 172.17.27.154 mail
John Barret is working as a system administrator at SuperGraphics. Johnneeds to delete some entries from the LDAP directory by using the ldapdeletecommand. He also wants the ldapdelete command to prompt the user for thepassword before deleting the entry from the directory. In addition to this,John requires the input to be read from the data file instead of the standardinput. Which command should John use to perform the task?a. ldapdelete –x –cb. ldapdelete –c -fc. ldapdelete –f -xd. ldapdelete –W –f
Identify the directive that is used to specify the name of thelog file in which changes will be logged on the masterserver.replogfilereplicabinddncredentials
replica directive, specifies the binding method to bind themaster OpenLDAP server to the replica?suffixbindmethodbinddncredentials
What should be considered while copying the database filesfrom the master server to the slave server?Master server and slave should use the same or compatibledatabase versionsMaster server and slave should use the same byte ordering.Master server and slave should not use the same byteordering.Master server and slave should use the same or compatibledatabase versions and should use the same byte ordering.
Identify the command that you will issue at the masterserver to export the database to an LDIF file, backup.ldif.# slapadd–b –l backup.ldif#ldapadd –l backup.ldif# ldapadd –b -l backup.ldif#slapadd –l backup.ldif
What is the knowledge reference that points to the nodesdirectly under a directory partition s held by a domaincontroller known as?ReferralReferenceSuperior Knowledge ReferenceReferral Link
Mike Womack is working as a network administrator atQuality Software developers. He is performing crossplatform integration of multiple directory services across theplatforms. When he tries to integrate multiple directoryservices from different vendors, Mike has a problem insynchronizing data. Which utility should Mike use to carryout the transfer and conversion of data between multipledirectories?Both, Connector and Driver agentsConnector agentDriver agentMeta Directory
When does the need for integrating databases anddirectories across the network arise?Multiple vendor directories are used to store the data.Each directory uses its own database.Single vendor directories are used to store the data.Multiple vendor directories are used to store the data andeach directory uses its own database
What are the major issues in cross platform integration?Security of dataIntegrity of data
Security and integrity of dataSecurity and integrity of data stored on the LDAP directory
In order to work with LDAP, what would you do to configurethe Active Directory?Update the schema.Extend the interface of Microsoft’s Users and Group ManagerDirectory administration.Update the schema and extend the interface of Microsoft’sUsers and Group Manager Directory administration.Secure data stored on the LDAP directory.
Which of the following directives is used to edit theconfiguration file, /etc/openldap/ldap.conf?BASE <search base>ReplogfileReplicaBASE <search base> and HOST<server name>
To breach the security of the directory server, Steveeavesdrops on the credential information transmitted to thedirectory server. Identify the threat that Steve is using tobreach the security.Connection hijackingCredential forgingNetwork sniffingMasquerading
Steve, the system administrator at APL Inc. needs toknow the controls supported by the OpenLDAP server.Which of the following commands should Steve use toperform the task?a. # ldapsearch -x -s base -b "" "(objectclass=*)" +b. # ldapsearch -x -s base -b "" "(objectclass=*)"c. # ldapsearch -x base -b "" "(objectclass=*)" +d. # ldapsearch -x -s base -b "" +"(objectclass=*)"
You want to dump the content of OpenLDAP directoryentries into an LDIF file. Which of the followingcommands should you use?a. slapaddb. slapcatc. ldapaddd. ldapmod
Steve, the system administrator at APL Inc. needs to
create a replica OpenLDAP server of the masterOpenLDAP server. Which of the following should Steveuse to create a replica OpenLDAP server?a. # slapadd –l dbfile.ldifb. # slapcat –l dbfile.ldifc. # slapadd –b “dc=apl,dc=inc” –l dbfile.ldifd. # slapcat –b “dc=apl,dc=inc” –l dbfile.ldif
To allow users to search anonymously within the activedirectory, you have to configure the __________of theActive Directory.a. Access Control List (ACL)b. Metadirectoryc. Multivendor directoryd. LDAP directory
Which of the following is an LDAP replication daemon that is used to synchronizethe databases of master server and slave servers?a. slurpdb. slapdc. replicadd. ncsd
Which of the following files is used to enable replication in the slave LDAP server?a. slapd.confa. slurpd.confb. master.confc. nsswitch.conf
Which of the following parameters in slapd.conf file of a replica allows you tobypass the modification request from slave LDAP server to master LDAP server?a. rootpwb. updatednc. rootdnd. updateref
Which of the following configuration parameters with the replica directive can beused to specify the partition to be replicated?a. Hostb. Portc. Suffixd. credentials
5. Which of the following sections of the slapd.conf file should be same in both, themaster server and replicas?a. Globalb. Databasec. The Global and Database section should be same in both, the master server andreplicasd. The Global and Database section should be different in the master server andreplicas
Multistore uses Windows and Linux-based computer systems in two differentdepartments. Ed, the system administrator at Multistore, is asked to enable thecomputer systems to communicate with each other. To achieve this, Ed implementsthe LDAP server on the Linux-based computer system but has a problem ofsynchronization between the computer systems. Which synchronization agent shouldEd use to solve the problem?a. Push agentb. Pull agentc. Push and Pull agentd. Both, Push and Pull agents
Technology Systems is a computer systems manufacturing company. The variousdepartments maintain different databases and directories to store their respectivedata. The General Manager of Technology Systems needs to see an integrated viewof the databases and directories of all the departments. Which service should thecompany use to perform the task?a. Metadirectoryb. Connector Synchronization agentc. Driver Synchronization agentd. Connector and Driver Synchronization agents
Mastery Mechanics maintains the information of its employees in databases anddirectories in different computer systems operating on different platforms. Theinformation contained in directories is different from the information contained indatabases. Therefore, the management asks Ed Young, the system administrator, tointegrate these multiple directories across the platform for business purposes. Ed hasa problem in integrating all the information sources to perform the task. Whichtechnology should Ed use to solve the problem?a. Metadirectoryb. Multivendor Directoryc. Singlevendor Directoryd. Singlevendor and Multivendor directories both
True Travel Services maintains the data of its employees in different directoryservers. These directory servers are operating on Windows- and Linux-based
platforms. The company needs to perform cross-platform integration between thedirectory servers to enable users on different platforms to communicate with eachother. Donna Bard, the system administrator, is asked to perform the task. Whichmethod should Donna use to integrate Windows clients with Linux clients?a. LDAP proxy serverb. Both, Connector and Driver agentsc. Metadirectoryd. NIS/Active Directory gateway or PAM and NSS LDAP libraries
SSPT Corporation uses the LDAP directory to store all the information about itsemployees. The management allows the employees to search and access theinformation anonymously. The employees find that they are unable to read theirpasswords. What can be the possible cause of the problem?a. The permission set of Read all properties does not include reading ofpassword permissionb. Error in the directoryc. Entry does not exist in the directoryd. No password is required in anonymous access
Steve tries to hack the LDAP server of Blue Moon Inc. by usingkeystroke sniffer software that records the keystrokes made bya user. What type of security threat does Steve use?a. Script kiddieb. Trojan Horsec. Virusd. Zombie
Consider the following statements:Statement A: You need to generate a public andprivate key pair for digital certificates.Statement B: SSL uses public-key cryptography toestablish a secure connection betweencommunicating hosts.a. Statement A is True, and Statement B is False.b. Statement A is False, and Statement B is True.c. Both, Statement A and Statement B, are True.d. Both, Statement A and Statement B, are False.
Identify the authentication scheme where the directoryserver and the client need to present credentialinformation to each other.a. Anonymous authentication
b. One way authenticationc. Authentication based on a simple passwordd. Mutual authentication
Statement A: SASL is used to provide authentication support toconnection less protocols, such as TCP/IP.Statement B: The client tools, such as ldapsearch andldapmodify, by default uses the SASL to authenticate the users.Which is correct with respect to the above statements?a. Statement A is True and Statement B is False.b. Statement A is False and Statement B is True.c. Both, Statement A and Statement B, are True.d. Both, Statement A and Statement B, are False.
In which of the following security threats, existing programs are used to exploit thesecurity loopholes on the directory server?a. Connection hijackingb. Credential forgingc. Network sniffingd. Script kiddie
John has made use of disk space and CPU of the directory server to an extent thatdirectory server is unavailable to authorized clients. Which of the following methodJohn has used to launch DoS attack on the directory?a. Distributed DoS attackb. Direct resource consumptionc. SYN attackd. Indirect resource consumption
Which of the following method should you use to monitor the activities such as themodification of user password?a. Intrusion detection system (IDS)b. Auditingc. Authenticationd. Host-based detection systems
Identify the tool that prepares reports regarding identified security loophole, causesof the loophole, impact of the loophole, and solutions to handle the identifiedproblem.a. SASLb. SATANc. SSLd. TLS
Consider the following statements:Statement A: SSL always uses digital certificates to authenticate users over an
SSL-encrypted connection.Statement B: Authentication based on digital certificate over SSL becomes complexdue to the use of digital certificates that use a lot of system resources.a. Both, Statement A and Statement B, are true.b. Both, Statement A and Statement B, are false.c. Statement A is true, and Statement B is false.d. Statement A is false, and Statement B is true.
John, the system administrator at Red Eye Sky IT Systems, decides to implement theSASL authentication mechanism on his OpenLDAP server. John decides to share thepassword between OpenLDAP client and server. Therefore, John uses the DIGESTMD5mechanism to encrypt the password. Which format should John use to producethe SASL authentication id using the DIGEST-MD5 mechanism?a. uid=<username>, cn=<realm>, cn=digest-md5b. uid=<username>, cn=<realm>, cn=authc. uid=<username>, cn=digest-md5, cn=authd. uid=<username>, cn=<realm>, cn=digest-md5, cn=auth
Steve, the system administrator at Smartlabs, has implemented the SASLauthentication mechanism on his OpenLDAP server. John Barrett has recently joinedthe organization and Steve is asked to create the user account for John. Whichcommand should Steve use to generate an encrypted password for the new userJohn?a. # saslpasswd2 –u Johnb. # saslpasswd –c John–u Johnc. # saslpasswd2 –c Johnd. # saslpasswd2 John
Donna Bard is working as a system administrator at Blue Moon Computers Inc. BlueMoon uses various authentication mechanisms, such as DIGEST-MD5, forauthentication purposes. Donna is required to retrieve information about the userSteve from the OpenLDAP server. Which of the following ldapsearch commandsshould Donna use to perform the above task?a. $ ldapsearch –U u000997 –b dc=smartdevelopers, dc=com ‘cn=Steve*’b. $ ldapsearch –Y –U u000997 –b dc=smartdevelopers, dc=com‘cn=Ronald*’c. $ ldapsearch –b dc=smartdevelopers, dc=com ‘cn=Ronald*’d. $ ldapsearch –Y DIGEST-MD5 –U u000997 –b dc=smartdevelopers,dc=com ‘cn=Ronald*
Ronald Billing is working as a system administrator at Smartlabs. Ronald is asked tosetup the Kerberos servers in the organization to enable the Kerberos basedauthentication. Ronald needs to specify the domain name and realm to set up theprimary Kerberos server. Which of the following configuration files should Ronaldmodify to configure the primary Kerberos server?
a. /etc/kerb5.confb. /var/kerberos/krb5kdc/kdc.confc. /var/kerberos/krb5kdc/kadm5.acld. /var/kerberos/krb5kdc/kadm5.acl, and /etc/kerb5.conf
Steve Barnard is working as a system administrator at Smartdevelopers Inc. Steve isasked to setup Kerberos server to enable Kerberos-based authentication in theorganization. After modifying the configuration files, Steve needs to create theKerberos database that will store the authentication information. Which commandshould Steve use to perform the above task?a. # /usr/kerberos/sbin/kdb5_util createb. # /usr/kerberos/kdb5_util create –sc. # /usr/kerberos/sbin/kdb5_util create –sd. # /usr/sbin/kdb5_util create –s
To which of the following attributes of posixAccount objectclass will the first entry of 325 be mapped?gecos attributeuid attributeuidNumber attributegidNumber attribute
Steve, the system administrator at APL Inc. is changing theNIS infrastructure to LDAP infrastructure. Steve needs toconvert the group information in the LDIF format. Identify themigration perl script that Steve should use to perform thespecified task.migrate_group.plmigrate_netgroup.plmigrate_netgroup_byhost.plmigrate_netgroup_byuser.pl
Jim Lewis is working as a system administrator at RedSkyIT Systems. The management of the organization decides tomigrate the existing NIS infrastructure to OpenLDAP server.Jim decides to customize the migration script,migrate_common.ph file to create the migration scriptsaccording to the requirements. Which of the followingparameter should Jim use to provide default name suffix inthe customized migration script?
$DEFAULT_MAIL_DOMAIN$DEFAULT_BASE$EXTENDED_SCHEMA$NAMING CONTEXT
John, the system administrator needs to create theencrypted password for the ldap admin dn of the OpenLDAPdirectory. Which command should John use to perform therequired task?# smbpasswd –w secret# smbpasswd –W secret# /usr/bin/smbpasswd –w secret# /usr/bin/smbpasswd –W secret
Steve is working as a system administrator at Smartlabs.Steve needs to retrieve the modification time of lmpasswordand ntpassword since 1970. Which attribute if thesambaAccount object should Steve use to perform therequired task?sambaNTPasswordsambaPwdLastSetsambaAcctFlagsSambaLMPassword
Identify the attribute of sambaAccount object that specifiesthe path where user profiles are stored.sambaHomeDrivesambaLogonScriptsambaProfilePathsambaHomePath
Consider the following statementsStatement A: You can store all the Samba relatedinformation in the OpenLDAP server by using thesmbAccount object.Statement B: The operating system of the OpenLDAPserver should provide a valid set of UNIX attributes for thesmbAccount object.With respect to the preceding statements, which of thefollowing options is correct?Both, Statement A and Statement B, are False.Both, Statement A and Statement B, are True.Statement A is False and Statement B is True.
Statement A is True and Statement B is False.
Steve is working as a system administrator at Smartlabs.Steve needs to add a new user account, Ronald as a sambauser. Which command should Steve use to perform therequired task?# smbpasswd ronald –s ronald123# smbpasswd –s ronald123# smbpasswd –a ronald ronald123# smbpasswd –a ronald –s ronald123
Steve, the system administrator at APL Inc., is changingthe NIS infrastructure to LDAP infrastructure. He needs toconvert the password files stored in /etc/password and/etc/shadow in the LDIF format. Identify the migration perlscript that Steve should use to perform the specified task.a. migrate_group.plb. migrate_netgroup.plc. migrate_passwd.pld. migrate_netgroup_byuser.pl
Which perl script is used to translate the entries of the file/etc/networks into the LDIF format?a. migrate_networks.plb. migrate_netgroup_byhost.plc. migrate_netgroup.pld. migrate_netgroup_byuser.pl
Statement A: You need to use a cosine.schema file to provideSamba support in the LDAP server.Statement B: The pre-requisite schema files for samba.schemaare inetorgperson.schema and cosine.schema.With respect to the preceding statements, which of the followingoptions is correct?a. Both, Statement A and Statement B, are False.b. Statement A is False and Statement B is True.c. Both, Statement A and Statement B, are True.d. Statement A is True and Statement B is False.
Statement A: You use SMB protocol for file sharing and printersharing.
Statement B: A login request from the Windows clients performsmaximum two lookups in the Samba server.With respect to the preceding statements, which of the followingoptions is correct?a. Statement A is True and Statement B is False.b. Statement A is False and Statement B is True.c. Both, Statement A and Statement B, are True.d. Both, Statement A and Statement B, are False.
Steve, the system administrator with Blue Moon Inc., needsto configure Samba with ldap support. Identify theparameter that Steve needs to use to bind the smbddaemon to the LDAP server.a. ldap admin dnb. ldap suffixc. ldap ssld. ldap server
Ronald Irving, the system administrator at RedSky IT, Inc., is changing the NISinfrastructure to LDAP infrastructure. He needs to convert the host’s informationinto LDIF format. Identify the migration Perl script that Ronald should use toperform the specified task.a. migrate_passwd.plb. migrate_hosts.plc. migrate_networks.pld. migrate_base.pl
Which of the following posixAccount object class attributes specify the user name?a. Usernameb. Uidc. Uidnumberd. Gecos
Which of the following statements is true when migrating from NIS to LDAP?a. Only those attributes that have a many-to-many mapping are migrated from NISto LDAP.b. Only those attributes that have a many-to-one mapping are migrated from NIS toLDAP.c. Only those attributes that have a one-to-many mapping are migrated from NIS to
LDAP.d. Only those attributes that have a one-to-one mapping are migrated from NIS toLDAP.
Which of the following posixAccount object class attributes can be used to specifythe office contact number of a user?a. Cnb. Descriptionc. Gecosd. homedirectory
John, the system administrator at Red Eye Sky IT Systems, decides to integratesamba with OpenLDAP to enable the Linux server to be a part of Windows networkand provide various services to the users. Which of the following services is notprovided by Samba?a. File sharingb. Printer Sharingc. Messagingd. User Authentication
Steve, the system administrator at Smartlabs, is asked to integrate the Linux serverwith Windows server using Samba. To do this, Steve needs to install a specific RPMpackage, smbldap-0.7-1.i386.rpm on the Linux machine. Which of the followingcommand should Steve use to perform the required task?a. # rpm –vh smbldap-tools-0.7-1.i386.rpmb. # rpm -ivh smbldap-0.7-1.i386.rpmc. # rpm –ivh smbldap-tools-0.7-1.i386d. # rpm –ivh smbldap-tools-0.7-1.i386.rpm
Donna Bard is working as a system administrator at Blue Moon Computers Inc. BlueMoon asks Donna to integrate the Linux network with Windows using Samba.Donna is required to modify the /etc/samba/smb.conf file to configure the samba tosupport OpenLDAP. Which of the following parameters should Donna implement toperform the required task?a. workgroup, netbios name, security, and encryptionb. workgroup, netbios, and securityc. workgroup, netbios, and encryptiond. workgroup and encryption
Ronald Billing is working as a system administrator at Smartlabs. Ronald is asked tointegrate the Samba with OpenLDAP server. Ronald decides to configure theOpenLDAP to support Samba. To perform the task, Ronald needs to define the
16-byte hashed LANMAN password. This password will be generated by DESencryption method. Which attribute should Ronald implement to perform therequired task?a. SambaLMPasswordb. SambaNTPasswordc. SambaAcctFlagsd. SambaLogonScripts
Steve Barnard is working as a system administrator at Smartdevelopers Inc. Steve isasked to integrate the Samba with OpenLDAP. To integrate the Samba withOpenLDAP, Steve needs to include some additional attributes, such as uid,displayName, and gidNumber. Which of the schema files should Steve include in theslapd.conf file to include these attributes?a. inetorgperson.schema, cosine.schema,nis.schema,autofs.schemab. inetorgperson.schema, cosine.schema,autofs.schemac. inetorgperson.schema, nis.schemad. inetorgperson.schema, cosine.schema,nis.schema
Statement A: You need to use the –b option of rpmbuildcommand to build the binary package after the completionof %prep, %build, and %install stages.Statement B: You need to use the –s option of rpmbuildcommand to perform the %build stage from the spec file.Which of the following options is correct with respect to theabove statements?Statement A is True and Statement B is False.Statement A is False and Statement B is True.Both, Statements A and B, are True.Both, Statements A and B, are False.
Statement A: You need to issue the patch command fromthe/usr/src directory to apply a patch.Statement B: You need to use the patch –p0 commandalways to apply a patch.Which of the following options is correct with respect to theabove statements?Statement A is True and Statement B is False.Statement A is False and Statement B is True.Both, Statements A and B, are True.Both, Statements A and B, are False.
Statement A: The –B option of the scp command is used todisable password authentication mechanism.Statement B: The –p option of the scp command is used todisable the status indicator for each file transferred.Which of the following options is correct with respect to theabove statements?Statement A is True and Statement B is False.Statement A is False and Statement B is True.Both, Statements A and B, are True.Both, Statements A and B, are False.
Steve works as a system administrator at Good Graphics,Inc. He types the following command to check the integrityof the tracepath command:# rpm –Vf /bin/tracepathWhich of the following character will be displayed in theoutput if the file is unreadable?SGM?
Donna Johnson works as a system administrator atRed-Eye Experts. While upgrading a package, sheencounters the dependency problem. Which option of therpm command should Donna use to ignore the dependencyerror?--nodeps-F--aids-V
Steve works as a network administrator at Red Sky ITSystems at Denvor. He wants to upgrade the existing kernelof the Linux server with a new kernel to enable enhancedsecurity features. Steve downloads the required kernelsource code and wants to configure it. Steve has to changeonly few configuration settings. Steve has to upgrade thekernel at the earliest and the GUI mode of Linux is notworking. Which of the following command should Steve useat the shell prompt to configure the kernel?make menuconfigmake xconfigmake oldconfigmake config
Tom works as a network administrator at PQR Inc. Hewants to upgrade the kernel version 2.4.0 of Linux computerwith kernel version 2.6.0 to improve the speed of processingof kernel. While configuring the kernel, he enables themodule support feature for the File system option in theMain menu. After configuring the kernel version 2.6.0, whichcommand should Tom issue at the shell prompt to compilethe modules?make modulesmake modules_installmake cleanmake dep
John works as a network administrator at Deez, Inc. Thereis a Linux server in the organization that uses processor ofarchitecture i686. John has been assigned a task ofupgrading the kernel version 2.4.2 of Linux server to kernelversion 2.4.22. After configuring and compiling the kernel,John wants to install the kernel. For this, first, he needs tocopy the kernel to the /boot/vmlinuz-2.4.24Upgradedirectory. Which command should John issue at the shellprompt to copy the kernel to the /boot/vmlinuz-2.4.24Upgrade directory?cp /usr/src/linux-2.4.22/arch/i686/bzImage/boot/vmlinuz-2.4.22Upgradecp /usr/src/linux-2.4.22/arch/i686/boot/bzImage /boot/vmlinuz-2.4.22Upgradecp /usr/src/bzImage /boot/vmlinuz-2.4.22Upgradecp /usr/src/linux-2.4.22/bzImage/boot/vmlinuz-2.4.22Upgrade
Statement A: If the kernel compiles ok, but does not boot,then you need to run the make clean command totroubleshoot the problem and then recompile the kernel.Statement B: If the kernel compiles ok but make moduesfail, then you need to run make dep command only totroubleshoot the problem.Which of the following options is correct with respect to theabove statements?Statement A is True and Statement B is False.
Statement A is False and Statement B is True.Both, Statement A and Statement B, are True.Both, Statement A and Statement B, are False.
Statement A: The “Unresolved symbols” error messageoccurs when the kernel fails to load a module.Statement B: The “Unresolved symbols” error message canbe troubleshooted by running the make clean commandbefore compiling the kernel.Which of the following options is correct with respect to theabove statements?Statement A is True and Statement B is False.Statement A is False and Statement B is True.Both, Statement A and Statement B, are True.Both, Statement A and Statement B, are False.
Nancy Jones works as a network administrator at GlobalSystem, Inc. The organization has its two branches atHouston and New York, and both are connected in anetwork. The employees of the organization generallycommunicate through e-mail messages. Nancy receives acomplaint from John, a software developer at Houston, thathe is not able to send and receive mails to James, asoftware developer at the New York branch. Nancy uses thetraceroute command to view the route through which thee-mail messages go from source to the destination. Sheobserves that the traceroute command is not workingproperly. As a result, she wants to check the integrity of thetraceroute command. What should Nancy do to checkthe integrity of the traceroute command?a. She needs to type the rpm –Vf /bin/traceroutecommand at the shell promptb. She needs to type the rpm –K /bin/traceroute commandat the shell promptc. She needs to import the RPM-GPG-KEY key and type the rpm–Vf /bin/traceroute command at the shell promptd. She needs to import the RPM-GPG-KEY key and type the rpm–K /bin/traceroute command at the shell prompt
Steve, a network administrator, downloads the
squirrelmail-1.2.11-1.src.rpm SRPM and installs it on hiscomputer. Now, he wants to make binary RPM of thesquirrelmail-1.2.11-1.src.rpm SRPM. While building thebinary RPM, Steve also wants to view the debugginginformation. How can he perform the required task?a. He needs to navigate to the /usr/src/redhat/SPECSdirectory and type the following command to build binaryRPM of squirrelmail package:# rpmbuild –bb squirrelmail.spec �b. He needs to navigate to the /usr/src/redhat/SPECSdirectory and type the following command to build binaryRPM of squirrelmail package:# rpmbuild –bp squirrelmail.spec �c. He needs to navigate to the /usr/src directory and type thefollowing command to build binary RPM of squirrelmailpackage:# rpmbuild –bb –vv squirrelmail.spec �d. He needs to navigate to the /usr/src/redhat/SPECS directoryand type the following command to build binary RPM ofsquirrelmail package:# rpmbuild –bb –vv squirrelmail.spec �
Donna Johnson works as a network administrator at PQR,Inc. She has the httpd-2.0.i386.rpm installed on hercomputer. Donna finds that the httpd.conf file in thehttpd-2.0.i386.rpm has been corrupted. She wants toextracts the httd.conf file from the httpd-2.0.i386.rpmpackage. What should Donna do to perform the requiredtask?a. He needs to convert the httpd-2.0.i386.rpm to the cpio archiveby using the cpio command and copy the httpd.conf file fromthe cpio archive to the /etc/httpd/conf directory.b. She needs to convert the httpd-2.0.i386.rpm to the cpio archiveby using the rpm2cpio command and copy the httpd.conffile from the cpio archive to the /etc/httpd/conf directory.c. She needs to convert the httpd-2.0.i386.rpm to the cpio archiveby using the cpio command and copy the httpd.conf file fromthe cpio archive to the /etc/httpd directory.d. She needs to convert the httpd-2.0.i386.rpm to the cpio archiveby using the rpm2cpio command and copy the httpd.conf filefrom the cpio archive to the /etc/httpd directory.
John works as a network administrator at Global System,Inc. He has the squirrelmail-1.2.11-1.noarch.rpm packageinstalled on his computer. He wants to verify the integrity ofthe squirrelmail-1.2.11-1.noarch.rpm package. How can
John perform the required task?a. He needs to type therpm –K squirrelmail-1.2.11-1.noarch.rpmcommand at the shell promptb. He needs to type therpm –Vf squirrelmail-1.2.11-1.noarch.rpmcommand at the shell promptc. He needs to import the RPM-GPG-KEY key and type therpm –Vf squirrelmail-1.2.11-1.noarch.rpmcommand at the shell promptd. He needs to import the RPM-GPG-KEY key and type therpm –K squirrelmail-1.2.11-1.noarch.rpmcommand at the shell prompt
Joe Garnett works as a system administrator in RedSky ITServices. Joe recently downloaded the latest kernel sourcecode and updated it. However, Joe is unable to boot fromthe new kernel and views the following error message:Warning: unable to open an initial consoleKernel panic: no init found. Try passing init = option toKernel . What should Joe do to troubleshoot the problem?a. Joe needs to set the root= parameter correctly in the/etc/lilo.conf fileb. Joe needs to assign the value, 0, to the default parameterc. Joe needs to assign the value, 1, to the default parameterd. Joe needs to set the image= parameter correctly in the/etc/lilo.conf file
John Barred, the system administrator at Red Sky ITSystem wants to check whether or not the kernel on a Linuxcomputer detects the full amount of RAM. For this, Johnissues the cat/proc/meminfo command and observes that thedisplayed quantity of memory is not the same as theinstalled RAM of 256 MB. What should John do so that thekernel detects the full amount of RAM?a. John needs to add the following entry to the/boot/grub/grub.conf: mem=256Mb. John needs to add the following entry to the
/boot/grub/grub.conf: mem=256M. After adding this entry,John needs to reboot the computer.c. John needs to add the following entry to the/boot/grub/grub.conf: linux mem=256M. After adding thisentry, John needs to reboot the computer.d. John needs to add the following entry to the/boot/grub/grub.conf: linux mem=256M
Statement A: The make xconfig command works only inthe GUI mode.Statement B: The make oldconfig prompts all thequestions that are required for configuration of kernel.Which of the following options is correct with respect to theabove statements?a. Statement A is True and Statement B is False.b. Statement A is False and Statement B is True.c. Both, Statement A and Statement B, are True.d. Both, Statement A and Statement B, are False.
What do you need to do if you see the following errormessage after running the make bzImage command:warning: kernel is too big for standaloneboot from floppya. Use the make zImage command instead of the bzImagecommand.b. Disable the configuration settings that are not required andrecompile the kernel using the make bzImage command.c. Disable the configuration settings that are not required andrecompile the kernel using the make zImage command.d. Use the make dep command and then recompile the kernelusing the make bzImage command.
Mike Womack works as a network administrator at PQR,Inc. Mike upgrades the existing kernel of the Linux serverto a new version to obtain new hardware support. Heupgrades the kernel and reboots the computer afterupgrading. He observes that the computer hangs justbefore the LILO is displayed. What should Mike do totroubleshoot the problem?a. Mike needs to restart the computer and press the DEL key toset up the BIOS. Then, Mike needs to select the IDE settingsand set the proper primary hard drive and slave drives.b. Mike needs to restart the computer and press the F10 key to
set up the BIOSd. Then, Mike needs to select the IDE settingsand set the proper primary hard drive and slave drives.c. Mike needs to restart the computer and press the DEL key toset up the BIOS. Then, Mike needs to select the IDE settingsand set the proper secondary hard drive and slave drives.d. Mike needs to restart the computer and press the DEL key toset up the BIOS. Then, Mike needs to select the IDE settingsand set the proper primary hard drive.
Chris Donald, the system administrator, at Smart Software Developers wants tomake a binary RPM from the source code of slang-1.4.5-18.src.rpm SRPM. Beforemaking the binary RPM, Chris wants to specify the location of the README file.Which of the following sections does Chris need to modify to perform the requiredtask?a. Preambleb. %prepc. %filed. %build
Steve works as a network administrator at Red Sky IT Systems. He downloads thesource code of postfix RPM to provide support to the mail server in the organization.Which of the following options should Steve use with rpmbuild command to unpackthe SRPM of postfix?a. –bbb. –bpc. –bcd. –bs
Nancy, the network administrator at Quality Software Developers wants to check theintegrity of an rpm package installed on her computer. Which option of the rpmcommand should Nancy use to perform the required task?a. –vb. –Vfc. –Kd. –qi
Statement A: You can use the cpio command to extract a single file from a package.Statement B: You can use the --replacefiles or --nodeps option with the rpmcommand to resolve dependencies.With respect to the above statements, which of the following options is correct?a. Statement A is True and Statement B is False.b. Statement A is False and Statement B is True.c. Both, Statement A and Statement B, are True.
d. Both, Statement A and Statement B, are False.
Statement A: The ? symbol in the output of rpm –Vf command shows that the file isunreadable.Statement B: The –Vf of rpm command can check the integrity of any command.With respect to the above statements, which of the following options is correct?a. Statement A is True and Statement B is False.b. Statement A is False and Statement B is True.c. Both, Statement A and Statement B, are True.d. Both, Statement A and Statement B, are False.
1. Which of the following commands cannot be used to configure the kernel if youwork in a CLI mode?a. make configb. make oldconfigc. make menuconfigd. make xconfig
2. Steve works as a network administrator at Global System, Inc. He needs to upgradethe kernel version 2.4.0 of Linux server to kernel version 2.6.0. To configure thekernel version 2.6.0, from which directory Steve should issue the make xconfigcommand?a. /rootb. /usr/srcc. /usr/src/linux-2.4.0d. /usr/src/linux-2.6.0
3. Donna works as a network administrator at Deez, Inc. There is a Linux server in theorganization that uses a processor of architecture i486. Donna needs to upgrade thekernel version 2.4.0 of Linux server to kernel version 2.4.24. She issues the makebzImage command to create the gzip compressed kernel image named bzImage. Inwhich directory is the bzImage file stored?a. /usr/src/linux-2.4.24b. /usr/srcc. /usr/src/linux-2.4.24/arch/i486/bootd. /usr/src/linux-2.4.24/arch/i486
4. Which of the following options when used with the mkbootdisk command instructsthe user to insert a floppy?a. --device devicefileb. --nopromptc. –iso
d. --size size
5. Don Allen works as a network administrator at Good Graphics, Inc. He needs toupgrade kernel version 2.4.2 of Linux server to kernel version 2.6.0. Afterconfiguring and compiling the kernel version 2.6.0, Don types the makemodules_install command to install the modules. What task does this commandperform?a. Copies the new modules to the /lib directoryb. Copies the new modules to the /lib/modules directoryc. Copies the new modules to the /lib/modules/2.6.0 directoryd. Copies the new modules to the /lib/modules/2.6.0/build directory
Statement A: To install Linux on a computer using FTP, youneed to install FTP on the Linux computer.Statement B: To install Linux on a computer using NFS, youneed to install NFS on the Linux computer.Which is correct with respect to above statements?Statement A is True and Statement B is False.Statement A is False and Statement B is True.Both, Statement A and Statement B, are True.Both, Statement A and Statement B, are False.
Statement A: SNMP can be used to monitor a network andits components.Statement B: Strace can be used as a monitoring tool.Which is correct with respect to above statements?Statement A is True and Statement B is False.Statement A is False and Statement B is True.Both, Statement A and Statement B, are True.Both, Statement A and Statement B, are False.
Statement A: Providing network based services, such asFTP and samba makes different ports vulnerable fornetwork attacks.Statement B: Malicious users can cause an application oran operating system to break down by triggering its bufferoverrun.Which is correct with respect to above statements?Statement A is True and Statement B is False.Statement A is False and Statement B is True.Both, Statement A and Statement B, are True.Both, Statement A and Statement B, are False.
Statement A: Auditing in Linux can be done using syslog.Statement B: Stealth scanning is used to scan a host
without being detected by applications, such as Synlogger.Which is correct with respect to above statements?Statement A is True and Statement B is False.Statement A is False and Statement B is True.Both, Statement A and Statement B, are True.Both, Statement A and Statement B, are False.
Statement A: RHEL 3 supports kernel 2.6.Statement B: Mandrake corporate server 3.0 supportskernel 2.6.Which is correct with respect to above statements?Statement A is True and Statement B is False.Statement A is False and Statement B is True.Both, Statement A and Statement B, are True.Both, Statement A and Statement B, are False.
Statement A: The syslog.conf file is stored in the /etc/sysconfigdirectory, and the syslog file is stored in the /etc directory.Statement B: The –r option of the SYSLOGD_OPTIONS parameterin the /etc/sysconfig/syslog file enables logging from the remotemachines.Which of the following options is correct with respect to the abovestatements?Statement A is True and Statement B is False.Statement A is False and Statement B is True.Both, Statement A and Statement B, are True.Both, Statement A and Statement B, are False.
Statement A: kswapd is a part of the kernel that frees memorywhen it gets fragmented or full.Statement B: kswapd contains a parameter tries_min, whichspecifies the number of pages kswapd writes in one turn.Which of the following options is correct with respect to the abovestatements?Statement A is True and Statement B is False.Statement A is False and Statement B is True.Both, Statement A and Statement B, are True.Both, Statement A and Statement B, are False.
Statement A: A Linux computer is said to be shutting down
gracefully if before shutting down it does not terminate all theprocesses that are running currently.Statement B: A non-zero value of the ctrl-alt-del parameterspecifies that the computer will reboot immediately withoutterminating all the running services and processes.Which of the following options is correct with respect to the abovestatements?Statement A is True and Statement B is False.Statement A is False and Statement B is True.Both, Statement A and Statement B, are True.Both, Statement A and Statement B, are False.
Statement A: The parameter, panic_on_oops can be modified tocontrol the behavior of the kernel when a bug is encountered.Statement B: The value, 0, of the panic_on_oops parameterspecifies that the kernel delays for few seconds if a bug isencountered and then reboots.Which of the following options is correct with respect to the abovestatements?Statement A is True and Statement B is False.Statement A is False and Statement B is True.Both, Statement A and Statement B, are True.Both, Statement A and Statement B, are False.
Which of the following commands will you use to verify theinstallation of the appropriate HTTP services, whilepreparing an Apache Server?# rpm –qa | grep nfs-utils# redhat-config-nfs-1.0.13-1# rpm –qa | grep http# rpm –qa | grep ftp
What is the directory location of storing the standard files ofFTP server?/usr/var/vsftp
/usr/ftp//var/ftp/pub
What is the directory location for storing the standard files ofApache Web Server?/var/var/www/html/usr/bin/etc
For providing the graphical installation feature in Kickstart,which parameter needs to be specified in the ks.cfg file?mousekeyboardlanguagemonitor
Statement A: Linux kernel is modular as well as monolithicwhile Windows kernel is only monolithic.Statement B: Linux kernel runs the threads of amultithreaded application as separate processes usingshared memory, while Windows kernel runs everyapplication as a collection of threads.Which of the following options is correct with respect to theabove statements?Statement A is True and Statement B is False.Statement A is False and Statement B is True.Both, Statement A and Statement B, are True.Both, Statement A and Statement B, are False.
Statement A: The file systems, FAT32 and ext3, aresupported by RHEL, but RHEL does not support XFS.Statement B: The file system, ReiserFS is a default filesystem in SuSE.With respect to the above statements, which of the followingoptions is correct?Statement A is True and Statement B is False.Statement A is False and Statement B is True.Both, Statement A and Statement B, are True.Both, Statement A and Statement B, are False.
Statement A: Both file systems, ext3 and XFS, support blockjournaling.Statement B: Both file systems, ext3 and NTFS, providePOSIX file permissions.With respect to the above statements, which of the followingoptions is correct?Statement A is True and Statement B is False.Statement A is False and Statement B is True.Both, Statement A and Statement B, are True.Both, Statement A and Statement B, are False.
Statement A: You can export the account settings using thebuilt in Import/Export feature of Internet Explorer.Statement B: You cannot export theFavorites/Bookmarks/Cookie with the help of built-inImport/Export feature of Internet Explorer.With respect to the above statements, which of the followingoptions is correct?Statement A is True and Statement B is False.Statement A is False and Statement B is True.Both, Statement A and Statement B, are True.Both, Statement A and Statement B, are False.
Statement A: While installing Mono RPMs, you should installthe mono-core-1.1.6-1.novell.6.3.i586 RPM before installingthe mono-data-1.1.6-1.novell.6.3.i586.rpm RPM.Statement B: While installing Mono RPMs, you should installthe mono-data-1.1.6-1.novell.6.3.i586.rpmbefore installingthe mono-basic-1.1.6-1.novell.6.3.i586.rpm RPM.Which of the following options is correct with respect to theabove statements?Statement A is True and Statement B is False.Statement A is False and Statement B is True.Both, Statement A and Statement B, are True.Both, Statement A and Statement B, are False.
1. Consider the following statements:Statement A: Linux is supported on almost all types of platforms available.Statement B: Linux provides support to all types of hardware, such as a Palmtop with2 MB of memory storage or petabyte storage cluster with hundreds of nodes.With respect to the above statements, which of the following is correct?a. Statement A is True and Statement B is False.b. Statement A is False and Statement B is True.c. Both, Statement A and Statement B, are True.d. Both, Statement A and Statement B, are False.
2. Consider the following statements:Statement A: Linux provides authentication service using PAM.Statement B: Linux provides secure communication using PAM.With respect to above statements, which of the following is correct?a. Statement A is True and Statement B is False.b. Statement A is False and Statement B is True.c. Both, Statement A and Statement B, are True.d. Both, Statement A and Statement B, are False.
3. Consider the following statements:Statement A: Linux provides authorization service using PAM.Statement B: Linux provides secure communication using PAM.With respect to above statements, which of the following is correct?a. Statement A is True and Statement B is False.b. Statement A is False and Statement B is True.c. Both, Statement A and Statement B, are True.d. Both, Statement A and Statement B, are False
4. Consider the following statements:Statement A: Red Hat Enterprise Linux ES supports EMD64T & AMD64 systems.Statement B: Red Hat Enterprise Linux AS supports EMD64T & AMD64 systems.With respect to above statements, which of the following is correct?a. Statement A is True and Statement B is False.b. Statement A is False and Statement B is True.c. Both, Statement A and Statement B, are True.d. Both, Statement A and Statement B, are False.
5. Consider the following statements:Statement A: Red Hat Enterprise Linux ES supports Itanium2 systemsStatement B: Red Hat Enterprise Linux AS supports Itanium2 systemsWith respect to above statements, which of the following is correct?a. Statement A is True and Statement B is False.b. Statement A is False and Statement B is True.c. Both, Statement A and Statement B, are True.d. Both, Statement A and Statement B, are False.
1. APL, Inc. provides IT services to its clients across the world. The company hasLinux-based enterprise set up for its services to the clients. Whenever a new systemis brought in, the Kickstart installation is used to configure it. Steve is a networkadministrator at APL Inc.. In view of increasing client requirements, some newsystems are added to the company. Steve wants to read and edit the Kickstartconfiguration file that may be used to install Linux on these new systems. Which
option in Kickstart installation should Steve use to perform the task?a. skipxb. installc. interactived. text
2. EarthenSky, Inc. is an application development organization. The company usesLinux-based enterprise set up for its application development projects. The companyhas got a new application development project. John Warren is working as a projectmanager of this new project. The client has instructed John to ensure the safety andsecurity of application resources related to this project. For this, the company uses anencrypt password system in its Linux-based machines. John needs a server thatsupports this encrypt password system. Which server should John use to perform thistask?a. HTTP serverb. Kerberos Serverc. Samba Serverd. NFS server
3. Earthenmovers, Inc. is an IT company, providing services to its clients all over theworld. The company has a Linux-based enterprise set up. As per the client’srequirements, the company needs to introduce new systems in its enterprise. Thecompany uses the Kickstart installation for this purpose. Henry O’Neil is working asthe network administrator at Earthermovers Inc.. While performing the Kickstartinstallation on a new computer in the enterprise, Henry needs to initialize all theinvalid partitions on the disk and delete the data on those partitions. Which Kickstartcommand should Henry use to perform the task?a. upgradeb. xconfigc. zerombrd. skipx
4. TeamSoftwares, Inc. is a software development organization, and has a Linux-basedenterprise set up. The company needs to add 25 more computers for a new project. The enterprise uses Red Hat installation files from a remote computer for Kickstartinstallation. The enterprise has a DHCP server and a single Ethernet network card forevery machine on the local network. Donna Bard is working as a networkadministrator at TeamSoftware Inc. She needs to configure the network cards onevery new computer. Which command should Donna use to perform the task?a. network --device eth0 –bootproto dhcpb. clearpart --all --drives=sda,sdb,sdcc. part /boot --fstype ext3 --size=100 --ondisk=sdad. part / --fstype ext3 --size=10000 --grow --ondisk=sda
5. PQl, Inc. is an IT company, providing the e-greetings services to its clients all overthe world. The organization has a Linux-based set up in its enterprise. It needs to addsome more computers to cater its client requirements. Ken Burton is working as anetwork administrator at PQl Inc., He is assigned the task of installing these newcomputers in the enterprise. He must install Linux on these machines by using theKickstart installation remotely. Ken is instructed to perform this task in the minimumamount of time. Which server system should Ken use to perform this task?a. FTPb. HTTPc. NFSd. Samba
John works as a network administrator at Red Sky ITSystems. While managing virtual memory at the Linuxserver, John wants to specify the maximum number of dirtybuffers that can be stored in the buffer cache. Which of thefollowing parameters of the bdflush file should John edit toperform the required task?a. int ndirtyb. int nfractc. int intervald. int nfract_sync
Donna works as a network administrator at Red Sky ITSystems. While managing virtual memory at the Linuxserver, Donna wants to specify the maximum percentageof memory that can be used as buffer. Which of thefollowing files does Donna need to edit for this?a. buffermemb. freepagesc. bdflushd. kswapd
Ronald Billing works as network administrator at Red EyeExperts. The mail server at the main branch of theorganization provides mail services to all the computers
across different branches. To avoid the unnecessary trafficof data, Ronald has been assigned the task of blocking allthe bogus error messages arriving at the mail server. Whatshould Ronald do to perform the required task?a. He needs to assign the value, 1 to theicmp_echo_ignore_all parameterb. He needs to assign the value, 0 to theicmp_echo_ignore_all parameterc. He needs to assign the value, 1 to theicmp_echo_ignore_broadcasts parameterd. He needs to assign the value, 1 to theicmp_ignore_bogus_error_responses parameter
Tom works as a network administrator at PQR, Inc. All theemployees across various branches use a centralizedserver at the main branch of the organization. Tom wantsto increase the file descriptor limit for the MPI jobs thatusers run on the centralized server. What should Tom do toincrease the file descriptor limit for the MPI jobs?a. Only the file, /etc/pam.d/login should be edited.b. Only the file, /etc/security/limits.conf should be edited.c. Both the files, /etc/pam.d/login, and /etc/security/limits.confshould be edited.d. Both the files, /etc/pam.d/rlogin, and /etc/security/limits.confshould be edite
Steve works as a network administrator at Red Sky ITSystems. The employees across various branches of theorganization use the database server, which is based onWindows. The employees of the organization require POSIXfile permissions on the database server and ask Steve forthis. Steve wants block journaling to be enabled on thedatabase server. What should Steve do to perform therequired tasks?a. Steve needs to migrate the database server to a Linuxdistribution that supports ReiserFS.b. Steve needs to migrate the database server to a Linux
distribution that supports ext3 filesystem.c. Steve needs to migrate the database server to a Linuxdistribution that supports ext2 filesystem.d. Steve needs to migrate the database server to a Linuxdistribution that supports XFS.
John Barret works as a network administrator at GlobalSystem Inc. The employees of its Software Developmentdepartment develop .NET applications for their clients.Global System Inc. migrates to the Linux platform to avoidthe cost of licensing in Windows. The employees needsupport to develop .NET applications on the Linux platform.What should John do to provide this support?a. John needs to install themono-data-sybase-1.1.6-1.novell.6.3.i586.rpm RPM and allthe RPMs on which it is dependent.b. John needs to install themono-ikvm-1.1.6-1.novell.6.3.i586.rpm RPM and all theRPMs on which it is dependent.c. John needs to install themono-jscript-1.1.6-1.novell.6.3.i586.rpm RPM and all theRPMS on which it is dependent.d. John needs to install themono-devel-1.1.6-1.novell.6.3.i586.rpm RPM and all theRPMs on which it is dependent.
Chris Donald works as a network administrator at QualitySoftware Developers. To avoid the cost of licensing inWindows, the organization migrates to the Linux platform.The employees of the R& D of Quality Software want to test
an application written in C# on the Linux platform. Which ofthe following is the correct order of installing the requiredMono RPMs to provide support to run the C# application?a. The RPMs should be installed in the following order:mono-core-1.1.6-1.novell.6.3.i586.rpmmono-data-1.1.6-1.novell.6.3.i586.rpmmono-web-1.1.6-1.novell.6.3.i586.rpmb. The RPMs should be installed in the following order:mono-data-1.1.6-1.novell.6.3.i586.rpmmono-core-1.1.6-1.novell.6.3.i586.rpmmono-web-1.1.6-1.novell.6.3.i586.rpmc. The RPMs should be installed in the following order:mono-core-1.1.6-1.novell.6.3.i586.rpmmono-web-1.1.6-1.novell.6.3.i586.rpmmono-data-1.1.6-1.novell.6.3.i586.rpmd. The RPMs should be installed in the following order:mono-data-1.1.6-1.novell.6.3.i586.rpmmono-web-1.1.6-1.novell.6.3.i586.rpmmono-core-1.1.6-1.novell.6.3.i586.rpm
Statement A: While installing Mono RPMs, you shouldinstall the mono-locale-extras-1.1.6-1.novell.6.3.i586.rpmbefore installing the mono-devel-1.1.6-1.novell.6.3.i586.rpm to avoiddependency error.Statement B: While installing Mono RPMs, you shouldinstall the mono-extras-1.1.6-1.novell.6.3.i586.rpm RPMbefore installing the mono-devel-1.1.6-1.novell.6.3.i586.rpm RPM.Which of the following options is correct with respect to theabove statements?a. Statement A is True and Statement B is False.b. Statement A is False and Statement B is True.c. Both, Statement A and Statement B, are True.d. Both, Statement A and Statement B, are False.
Statement A: You can use the –unsafe option with themcs command to compile the unsafe code written in theC#.Statement B: You can use the – nowarn option with themcs command to ignore the warning messages whilecompiling a C# application.Which of the following options is correct with respect to theabove statements?a. Statement A is True and Statement B is False.b. Statement A is False and Statement B is True.
c. Both, Statement A and Statement B, are True.d. Both, Statement A and Statement B, are False
1. Consider the following statements:Statement A: You need to assign the value, -s, to the SMBDOPTIONS parameter storedin the /etc/sysconfig/samba file to specify that the smbd should log to the standardoutput rather than a file.Statement B: You need to assign the value, -F, to the WINBINDOPTIONS parameter ifyou do not want to run winbind as a daemon.With respect to the above statements, which of the following options is correct?a. Statement A is True and Statement B is False.b. Statement A is False and Statement B is True.c. Both, Statement A and Statement B, are True.d. Both, Statement A and Statement B, are False.
2. Consider the following statements:Statement A: The default value of the age_buffer parameter stored in the/proc/sys/vm/bdflush file is 1 second.Statement B: The minimum value of the age_buffer parameter stored in the/proc/sys/vm/bdflush file is 30 seconds.With respect to the above statements, which of the following options is correct?a. Statement A is True and Statement B is False.b. Statement A is False and Statement B is True.c. Both, Statement A and Statement B, are True.d. Both, Statement A and Statement B, are False.
3. Which of the following parameters is used to calculate the maximum number ofpages of virtual memory kswapd tries to free in one round?a. swap_clusterb. tries_minc. tries_based. overcommit_memory
4. Which of the following parameters stored in the /proc/sys/kernel directory specifiesthe maximum number of System V shared memory segments that can be created in asystem?a. shmallb. shmmaxc. overflowgid
d. shmmni
5. Consider the following statements:Statement A: The minimum value of the nfrat_sync parameter is 0%.Statement B: The default value of the nfract_sync parameter is 50%.With respect to the above statements, which of the following options is correct?a. Statement A is True and Statement B is False.b. Statement A is False and Statement B is True.c. Both, Statement A and Statement B, are True.d. Both, Statement A and Statement B, are False.
1. Donna works as a network administrator at PQR, Inc. The employees across variousbranches of PQR, Inc. use the database server, which is based on the Windowsplatform. The employees of PQR Inc. want to be able to store files of size up to 6terabyte on the file server. They also require POSIX file permissions on the fileserver. What should Steve do to solve the problem of employees?a. Steve needs to migrate the database server to a Linux distribution that supportsReiserFS.b. Steve needs to migrate the database server to a Linux distribution that supportsext3 filesystem.c. Steve needs to migrate the database server to a Linux distribution that supportsext2 filesystem.d. Steve needs to migrate the database server to a Linux distribution that supportsNTFS.
2. Tom Wilkins works as a network administrator at Smart Software Developers. Theemployees of the Software Development department of the organization developVisual Basic applications for their clients. Smart Software migrates to the Linuxplatform to avoid the cost of licensing in Windows. The employees of the SoftwareDevelopment department need support to run Visual Basic applications on the Linuxplatform. What should John do to help?a. John needs to install the mono-data-sybase-1.1.6-1.novell.6.3.i586.rpm RPMand all the rpms on which it is dependent.b. John needs to install the mono-complete-1.1.6-1.novell.6.3.i586.rpm RPM andall the rpms on which it is dependent.c. John needs to install the mono-basic-1.1.6-1.novell.6.3.i586.rpm RPM and allthe RPMs on which it is dependent.d. John needs to install the mono-devel-1.1.6-1.novell.6.3.i586.rpm RPM and allthe RPMs on which it is dependent.
3. Steve works as a network administrator at Red Sky IT Systems. The organizationmigrates its network to the Linux platform to avoid the cost of licensing in Windows.The employees of the Software Development department of this organization want torun the C# application, payroll.cs, on the Linux computers. Steve installs all therequired Mono RPMs to provide support for running C# applications.After installing the required RPMs, Steve compiles the payroll.cs application. While
running the C# application, the employees of the Software Development departmentwant the file, basic, to be loaded into the memory. They also want to activate thesecurity manager while running the C# application. Which command should Steveuse to perform the required tasks?a. # mono –-config basic –-security payroll.exeb. # mono –-config basic payroll.exec. # mono –-config –security payroll.exed. # mono –-security payroll.exe
4. Chris works as a network administrator at Red Eye Experts. This organizationmigrates its network from Windows to Linux. The employees of the ApplicationDevelopment department of the organization want to compile and run the C#application, salary.cs, on Linux computers. They also want that, if any error occurs,an exception should be generated. Which command should Chris use to perform thistask?a. # mcs --fatal salary.csb. # mcs -debug salary.csc. # mcs --nowarn salary.csd. # mcs --unsafe salary.cs
5. Jim works as a network administrator at Infoway Inc. The employees across variousbranches of Infoway Inc. uses Windows-based database server. The employees want to be able to store files of size up to 9EB on the database server. Jim wants to enablethe Metadata only journaling feature on the server. What should he do to solve theproblem of employees?a. Steve needs to migrate the database server to a Linux distribution that supportsReiserFS.b. Steve needs to migrate the database server to a Linux distribution that supportsext3 filesystem.c. Steve needs to migrate the database server to a Linux distribution that supportsNTFS filesystem.d. Steve needs to migrate the database server to a Linux distribution that supportsXFS.
Statement 1: You can use the vmstat command to obtainvirtual memory statistics.Statement 2: You can use the top command to display asorted list of CPU utilization processes.Which of the following is True with respect to the precedingstatements?Statement A is True and Statement B is False.Statement A is False and Statement B is True.
Both, Statement A and Statement B, are True.Both, Statement A and Statement B, are False.
Statement A: A managed device is a network terminal thatcontains an SNMP agent and resides on a SNMP managednetwork.Statement B: An agent is a software module for managingthe network that resides in the managed devices.Which is True with respect to above statements?Statement A is True and Statement B is False.Statement A is False and Statement B is True.Both, Statement A and Statement B, are True.Both, Statement A and Statement B, are False.
Statement A: The read command is used by an NMS tomonitor the managed devices.Statement B: The write command is used by an NMS tocontrol the managed devices.Which is True with respect to above statements?Statement A is True and Statement B is False.Statement A is False and Statement B is True.Both, Statement A and Statement B, are True.Both, Statement A and Statement B, are False
Statement A: The snmpd.conf file defines the operationmethods of the snmp agent.dStatement B: The snmptrapd.conf file defines the methodsof operation of the Net-snmp applications.Which is True with respect to above statements?Statement A is True and Statement B is False.Statement A is False and Statement B is True.Both, Statement A and Statement B, are True.Both, Statement A and Statement B, are False.
Statement A: Host Escalations consist of definitions ofoptional escalation levels for host problems.Statement B: Service Escalations consist of definitions ofoptional escalation levels for failed services.Which is True with respect to above statements?Statement A is True and Statement B is False.Statement A is False and Statement B is True.Both, Statement A and Statement B, are True.
Both, Statement A and Statement B, are False.
Statement A: MRTG is used to produce graphical images ofthe information, such as network bandwidth and bottlenecksin the network.Statement B: MRTG uses a Web page to display thegraphical images of the monitored information.Which of the following is true, with respect to the abovestatements?Statement A is True and Statement B is False.Statement A is False and Statement B is True.Both, Statement A and Statement B, are True.Both, Statement A and Statement B, are False.
Statement A: Before installing MRTG on your computer, youneed to install the snmp utility on your computer.Statement B: Before installing MRTG on your computer, youneed to install the fping utility on your computer.Which of the following is true, with respect to the abovestatements?Statement A is True and Statement B is False.Statement A is False and Statement B is True.Both, Statement A and Statement B, are True.Both, Statement A and Statement B, are False.
Statement A: The "tcpActiveOpens" TCP-MIB ObjectVariable measures the total number of TCP connectionscompleted.Statement B: The "tcpCurrEstab" TCP-MIB Object Variablemeasures the total number of TCP connections in theestablished state.Which of the following is true, with respect to the abovestatements?Statement A is True and Statement B is False.Statement A is False and Statement B is True.Both, Statement A and Statement B, are True.Both, Statement A and Statement B, are False.
Statement A: You need to create two files, config and users,in the /usr/local/argus/data directory to configure Argus.Statement B: You need to navigate to the /usr/local/argusdirectory to create link to the arguscgi program.Which of the following is true, with respect to the abovestatements?Statement A is True and Statement B is False.Statement A is False and Statement B is True.
Both, Statement A and Statement B, are True.Both, Statement A and Statement B, are False.
Statement A: You can customize the NIS component of SFUfor managing users and groups in the network.Statement B: You can customize NFS Component of SFU toenable users to access shared data using NFS protocol.Which of the following is true, with respect to the abovestatements?Statement A is True and Statement B is False.Statement A is False and Statement B is True.Both, Statement A and Statement B, are True.Both, Statement A and Statement B, are False.
Statement A: MRTG generates HTML pages containing GIFimages, which provide a visual representation of thenetwork traffic.Statement B: SNMP operates at the application level usingTCP/IP transport-level protocols so that it can ignore thedifferences in the network hardware.Which of the following is True with respect to the precedingstatements?Statement A is True and Statement B is False.Statement A is False and Statement B is True.Both, Statement A and Statement B, are True.Both, Statement A and Statement B, are False.
Statement A: The iostat command is used for monitoringsystem input/output device loading.Statement B: The hinv command displays the contents ofthe system's hardware inventory.Which is True with respect to above statements?Statement A is True and Statement B is False.Statement A is False and Statement B is True.Both, Statement A and Statement B, are True.Both, Statement A and Statement B, are False.
Statement A: An NMS executes applications that monitorand control managed devices.Statement B: An agent is a software module that resides inthe managed devices and manages the network.Which is True with respect to above statements?Statement A is True and Statement B is False.Statement A is False and Statement B is True.Both, Statement A and Statement B, are True.Both, Statement A and Statement B, are False.
Statement A: MIBs do not contain information aboutmanaged objects, which are identified using ObjectIdentifiers (OIDs).Statement B: The trap command is used by manageddevices to asynchronously report events to the NMS.Which is True with respect to above statements?Statement A is True and Statement B is False.Statement A is False and Statement B is True.Both, Statement A and Statement B, are True.Both, Statement A and Statement B, are False.
Statement A: The nagios.cfg file contains global settings forthe nagios package.Statement B: Object configuration files specify only theservices that are to be monitored.Which is True with respect to above statements?Statement A is True and Statement B is False.Statement A is False and Statement B is True.Both, Statement A and Statement B, are True.Both, Statement A and Statement B, are False.
Tom Wilkins works as a system administrator atEarthenWares. The employees of the organization,EarthenWares develop software for its clients. Theorganization receives an order to develop software, whichcan monitor the efficiency of CPU at various instants of timeand display the efficiency on a graph. For this, thedevelopers need MRTG utility on their computers.Tom installs the MRTG utility on the computers of the developersof the organization. Tom is assigned the task to enable thedevelopers to work in US English instead of English UTF-8 to fulfillthe client requirements. Which of the following commands shouldTom use to perform the required task?# import LANG=en_US# export LANGUAGE=en_US# export LANG=en_US_UTF-8# export LANG=en_US
Chris Donald works as a system administrator at QualitySoftware Developers. There are multiple servers in theorganization Quality Software running services, such as theSMTP, IMAP, and DNS. Chris wants to monitor theseservices from the remote computer running Apache Webserver. Therefore, Chris installs Argus on the remotecomputer to monitor the services and configures the configand users files stored in the /usr/local/argus/data directory to
specify the services that are to be monitored. Chris alsoassigns the ownership of the /usr/local/argus directory to theApache Web server. To which directory does Chris need tonavigate to create a link to the arguscgi program?/usr/local/argus/sbin/usr/local/argus/usr/local/argus/sbin/arguscgi/var/www/cgi-bin
Don works as a system administrator at SmartLabs, Inc. Allthe employees of SmartLabs use the database server tostore data. Don observes the processing speed of thedatabase server decreases due to improper memoryutilization. To get exact figures about memory utilization ofthe database server, Don needs to prepare a graph showingthe memory utilization at the database server. Therefore,Don installs and configures MRTG utility on the databaseserver. Don observes the graph results produced are eighttimes higher than expected. What of the following can bethe reason for this abnormal output?The bits parameter is set instead of the bytes parameter.Unavailability of the OID values.Avaliability of the OID values.The bytes parameter is set instead of the bits parameter.
SSPT Corporation is an Internet Service Provider (ISP) thatprovides Internet services to its clients. Steve, the networkadministrator, receives complaints from a client about theslow speed of the Internet. Steve wants to check the statusof services, such as HTTP, TCP, and SMTP running on theserver from his own computer. For this, Steve wants toinstall Argus. However, before installing Argus, Steve needsto verify if specific software are already installed on hiscomputer. Which of the following software should Steveverify before installing Argus on his computer?Perl, sendmail, qpage, fping, a cgi capable Web server;Berkeley DB, and perl DB_FilePerl, sendmail, qpage, and GNU C Compiler (GCC)GCC, Perl, Gd, Libpng, and ZlibGCC and Perl
John Barrett works as a system administrator at QualitySoftware Developers. There are multiple servers in theorganization, Quality Software running the services, suchas SMTP, IMAP, and DNS. John wants to monitor theseservices from the remote computer running Apache Webserver. Therefore, John installs Argus on a remote
computer . John configures the config and users filesstored in the /usr/local/argus/data directory to specify theservices that are to be monitored. What should John doafter configuring the config and users files?Run Argus by using the argusd script.Open the /usr/local/argus/sbin/arguscgi in the Web browser.Assign the ownership of the /usr/local/argus directory to theApache Web server and run the argusd script.Assign the ownership of the /usr/local/argus directory to theApache Web server, create a link in the cgi-bin directory to thearguscgi program, and run the argusd script.
1. Consider the following statements:Statement A: System monitoring tools are used to monitor the process and filesystems of a network.Statement B: Network monitoring tools are used to keep track of all the services thatare running in the enterprise.With respect to the above statements, which of the following options is correct?a. Statement A is True and Statement B is False.b. Statement A is False and Statement B is True.c. Both, Statement A and Statement B, are True.d. Both, Statement A and Statement B, are False.
2. Consider the following statements:Statement A: Nagios is used to monitor the traffic load on the network links.Statement B: IPTraf is used to monitor network services, such as HTTP, SMTP, andSSH.With respect to the above statements, which of the following options is correct?a. Statement A is True and Statement B is False.b. Statement A is False and Statement B is True.c. Both, Statement A and Statement B, are True.d. Both, Statement A and Statement B, are False.
3. Consider the following statements:Statement A: The snmpset tool is used to set values in remote agents.Statement B: The snmptrapd tool shows network status by using SNMP.With respect to the above statements, which of the following options is correct?a. Statement A is True and Statement B is False.b. Statement A is False and Statement B is True.c. Both, Statement A and Statement B, are True.d. Both, Statement A and Statement B, are False.
4. Consider the following statements:Statement A: Object configuration files specify the hosts and services that aremonitored.Statement B: The resource configuration files define the macros that are used withinother settings for security purposes.
With respect to the above statements, which of the following options is correct?a. Statement A is True and Statement B is False.b. Statement A is False and Statement B is True.c. Both, Statement A and Statement B, are True.d. Both, Statement A and Statement B, are False.
5. Consider the following statements:Statement A: The –d iface option for the iptraf command displays the detailedstatistics for the specified interface.Statement B: The –z iface option for the iptraf command starts the TCP/UDP trafficmonitor for the specified interfaces.With respect to the above statements, which of the following options is correct?a. Statement A is True and Statement B is False.b. Statement A is False and Statement B is True.c. Both, Statement A and Statement B, are True.d. Both, Statement A and Statement B, are False.
1. Don Allen, the network administrator at Mountain Marketing, configuresMulti-Router Traffic Grapher (MRTG) to monitor the network of the organization.Don uses a Web browser to display the Web index page. The index page displaysfour graphs. Which of the following graph provides an average of the input trafficand output traffic after every 30 minutes?a. Daily Graphb. Monthly Graphc. Weekly Graphd. Yearly Graph
2. Ed Young, the network administrator at XYZ, Inc. wants to enable the Web server todisplay the output of the MRTG on a Web page. For this, Ed creates the/var/www/html/mrtg directory. After creating this directory, what should he do toenable the Web server to display the output of MRTG in the form of a Web page?a. Ed needs to type the following line in the mrtg.conf file:Alias /mrtg "/var/www/html/mrtg"<Directory "/var/www/html/mrtg">Order allow,denyAllow from allAllow from localhost# Allow from .example.com</Directory>b. Ed needs to type the following line in the mrtg.conf file:/mrtg "/var/www/html/mrtg"<Directory "/var/www/html/mrtg">Order allow,denyAllow from allAllow from localhost# Allow from .example.com</Directory>
c. Ed needs to type the alias /mrtg /var/www/html line in the mrtg.conf file.d. Ed needs to type the /mrtg /var/www line in the mrtg.conf file.
3. Blue Moon Computers is an Internet Service Provider. There are multiple Webservers in the organization running services, such as SMTP, HTTP, and DNS. Pat,the system administrator at Blue Moon, wants to monitor these services from aremote computer that is running the Apache Server. Which of the following utilitiesor tools should Pat install on the remote computer to monitor the services?a. Argusb. Perlc. MRTGd. Zlib
4. Pat works as a network administrator at Red Eye Experts. He installs Argus on aremote computer to monitor the services, such as HTTP, IMAP, and SMTP, runningon multiple servers in the organization. Next, Pat wants to specify the services thatare to be monitored. He also wants to specify the username and password to useArgus. For this, Pat needs to create two files, config file and users file. In which ofthe following directories, does Pat need to create these files?a. /usr/local/argusb. /user/local/argus/datac. /usr/local/argus/libd. /usr/local/argus/sbin
5. James works as a network administrator at PQR, Inc. James wants to install anMRTG on a remote computer to monitor the network traffic. What are the minimumsystem requirements to install MRTG?a. SNMP, GCC, Perl, gd, libpng, and zlibb. SNMP, fping, Perl, gd, libpng, and zlibc. SNMP, GCC, Perl, gd, qpage, and zlibd. SNMP, GCC, Perl, fping, libpng, and zlib
Which command should be used to uninstall Wine if it isinstalled using the source code method?# rpm –qa | grep -i wine# make depend# rpm –ivh wine-20050310-1wbel3winehq.i386.rpm# make uninstallJust a minuteWhile installing Wine through the CVS Snapshot method,which command should be used to download the Winesource code tree in the wine directory?/configure && make depend && make$ cvs –z3 checkout wine# make install$ cvs
Which key contains the data related to current Windowsinstallation?HKEY_LOCAL_MACHINEHKEY_CURRENT_USERHKEY_USERSHKEY_USERS\.Default
Which command is used to view the control panel applets in aWindow?uninstallerwine controlWINEDEBUG=+all,-relay wine program_nameExportLIB_ODBC_DRIVER_MANAGER=/usr/lib/libodbc.so.1.0.0
Which command line option is used to display the helpmessage of wineserver command line options?Wp[n]Hk[n]
Steve is a network administrator at Smartlabs. Steveidentifies that an rpm package, Xfree86 is not functioning. Toidentify the reason, Steve requires the debugging informationabout the package. Which of the following rpm query shouldSteve use to perform the required task?rpm -qvv XFree86rpm -qc XFree86rpm -scripts XFree86rpm -qf XFree86
Tom Wilkins is a network administrator in Blue MoonComputers. Tom wants to verify the configuration of theApache web server. Which command should he use toverify the configuration of the Apache web server?# apachectl configtest �# telnet �# ssh �# rpm –qa apache �
Statement A: The /etc/httpd/http.conf file is used to store theconfiguration settings for the Apache Web server.Statement B: The apachectl configtest command is used totest the configuration file for the Apache Web server.Which of the following options are correct with respect to the
preceding statements?Statement A is True and Statement B is False.Statement A is False and Statement B is True.Both, Statement A and Statement B, are True.Both, Statement A and Statement B, are False.
Jim Lewis is working as a network administrator at Red SkyIT. Jim is assigned the task to share the applications anddata between Linux-based computers and Window–basedcomputers. Which of the following functionalities of SFU 3.5should Jim use to perform the required task?Interoperability toolsPassword synchronizationNFS V2 and NFS V3Interix technology
Jim Lewis, a network administrator at Red Sky IT, is usingSFU 3.5 toolkit to share files between Linux and Windowsbasedcomputers in a network. Which NFS componentshould Jim use to enable Windows-based computers toaccess files and directories, exported by NFS file server?Server for NFSClient for NFSGateway for NFSNFS share component
Ed Young is a network administrator at RedSky IT companyand needs to install SFU 3.5 toolkit on Windows-basedcomputers to run Linux applications on them. What is theleast memory that Ed needs on Windows-based computersto perform SFU installation?10 MB20 MB30 MB40 MB
What is the location on a computer where SFU 3.5 toolkit isinstalled by default?C:\SFU\D:\SFU\C:\windows\SFU\D:\windows\SFU
By default, which of the following shells is not supported by
the SFU 3.5 toolkit to run Linux scripts on a Windowsbasedcomputer?Korn shellC shellBash shellSDK shell
Chris Donaldson is a network administrator at Smartlabs.Some processes have modified the dynamic link libraries ofhis Linux machine. Chris wants to identify the processes thathave called those dynamic link libraries. In addition to this,Chris also wants to identify the system calls that wereexecuted along with the library calls. Which ltrace syntaxshould Chris use to perform the required task?ltrace –I <command>ltrace –S <command>ltrace –s <command>ltrace -o <command>
Which of the following Bugzilla feature helps to flag andanalyze the previously reported bugs?Enterprise group supportMultiple authentication methodRequest SystemGeneric Reporting
Tom has encountered a bug in OpenVMS. Which should bethe appropriate field to mention this?ComponentOperating SystemProductVersion
Which of the following Linux forums provide support tocreate CD based games?GentooKnoppixMandrakeFedora
1. Consider the statements:Statement A: A computer System should have Windows operating system to installWine.Statement B: All Windows applications can run on Linux operating system usingWine.With respect to the preceding statements, which of the following is true?
a. Statement A is True and Statement B is False.b. Statement A is False and Statement B is True.c. Both, Statement A and Statement B, are True.d. Both, Statement A and Statement B, are False.
2. Ken Burton is working as a system administrator at Mountain Marketing. Ken wantsto install Wine to run Windows applications on Linux. He installs Wine by using thesource archive method. Further, he decides to configure Wine. While configuring theDLL section in the Wine configuration file, native version of which of the followingDLL pairs should Ken use?a. KERNEL, KERNEL32b. USER, USER32c. SHELL, SHELL32d. GDI, GDI32
3. Pat Greene is working as a system administrator at Global Systems. For runningWindows applications on Debian Linux, Pat needs to install Wine. He installs it byusing the apt-get command. Which installation method does Pat use to perform thistask?a. Installing Wine from a packageb. Installing Wine from a source archivec. Installing Wine from CVSd. Installing Wine from a package or Installing Wine from CVS
4. Ed Young is working as a system administrator at Supersoft2000.Ed installs Wine byusing the CVS Snapshot method. Which of the following commands should Edexecute to build the utilities of Wine?a. makeb. make installc. make dependd. ./configure
5. Don Allen is working as a system administrator at AB Corp. Don is able tosuccessfully login to the CVS server and install the CVS package. Now, he wants tocheck the working directory of the newly downloaded Wine directory. Whichcommand should Don execute to perform this task?a. makeb. pwdc. cvs logind. cd wine
1. Global System, Inc. is an application development company based in Woodland. Theorganization works on a Windows-based network system. For a new applicationdevelopment project, the developers need to migrate and run a Linux application ontheir Windows-based computers. For this, the company decides to install a SFU 3.5toolkit in its enterprise. This Linux application has features that restrict this
application to run on a Windows-based computer. Nancy Jones, a networkadministrator, is assigned the task of isolating these features in the Linux applicationto enable it to run on a Windows-based computer. Which statement should Nancyuse to isolate these features?a. #ifdefb. ioctl()c. #sdkd. #whichif
2. SmartDevelopers, Inc. is an application development company based in Atlanta. Itworks on a Windows-based network system. The company opens a new center atFlorida, which works on a Linux-based system. For application developmentprojects, the company uses a SFU 3.5 toolkit at the Atlanta center, to run Linuxapplications developed at the Florida center. To allow file sharing between both thenetwork systems, the company needs to use NFS protocol services. For this, KenBurton, the network administrator, is assigned the task of installing the NFS protocolin the enterprise. Which versions of NFS protocol should Ken use that support theSFU 3.5 toolkit for file sharing in an enterprise?a. Any NFS protocol versionb. NFS version 1c. NFS version 1.1d. NFS version 2 and 3
3. Earthenmovers, Inc. is an application development organization that works on theLinux and Windows-based network systems. For a new application developmentproject, the company needs to migrate and run Linux applications on Windows-basedcomputers. Developers working on the Windows-based computers require differentSFU 3.5 toolkit components to run Linux applications on their computers. KathyCarter, the system administrator, is assigned the task of installing an SFU 3.5 toolkiton the Windows-based computers. Which installation method should Kathy usewhile installing the SFU 3.5 toolkit?a. Standard installationb. Custom installationc. Default componentsd. Customizable components
4. ABC, Inc. is an application development organization that works on a Windowsbasednetwork system. The company receives a new application developmentproject, for which it requires its employees to migrate and run some Linuxapplications on the Windows-based computers. For this, the company uses a SFU 3.5toolkit on its Windows-based computers. While migrating a Linux application to aWindows-based computer, the developers face a bug problem. The company assignsthe task of debugging this application to Robert Joseph, a network administrator.Which debugger should Robert use to perform this task?a. The SDK Debuggerb. The Interix Debugger
c. The SFU Debuggerd. The GDB Debugger
5. PQR, Inc. an application development organization works, on both Linux andWindows-based network systems. For a new application development project, thecompany needs to use the SFU 3.5 toolkit to run Linux applications on the Windowsbasedcomputers in its enterprise. For this, the company needs to implement remotecommand line access to share files and data resources from Linux to Windows-basedcomputer. Which command line access feature of the SFU 3.5 toolkit should thecompany use to perform the task?a. Interix clientb. Interix serverc. Telnet serverd. Telnet client and Telnet server
1. Steve is working as a network administrator at Red Eye Experts. He finds that usersare not able to transfer data across the network. They are also not able to receivedata. Steve wants to identify the problem of packet loss in the network. Whichcommand should Steve use to perform the required task?a. digb. nslookupc. hostd. tcpdump
2. Consider the following statements:Statement A: Improper boot loader configuration can lead to failure of boot process.Statement B: Improper kernel or init parameter can cause boot process failure.With respect to the preceding statements, which of the following options is correct?a. Statement A is True and Statement B is False.b. Statement A is False and Statement B is True.c. Both, Statement A and Statement B, are True.d. Both, Statement A and Statement B, are False.
3. Tom Wilkins is working as a network administrator at Red Sky IT Systems. Hewants to monitor the traffic flow of the network, which comprises of variousplatforms with different configurations. Tom also wants to monitor the trafficgenerated by specific hosts in order to check if the traffic from their side is creatingany problems in the network. Which of the following tools should Tom use toperform the required task?a. etherealb. tcpdumpc. digd. nslookup
4. Chris Donaldson is working as a network administrator at Global Systems, Inc. He is
receiving complaints that users are not able to connect to the DNS server. Chris findsthat the DNS is configured properly. Now, he wants to check whether the clients areconfigured properly. Which file should he view to perform the required task?a. /etc/resolv.confb. /etc/named.confc. /etc/httpd/conf/http.confd. /etc/pam.conf
5. Debbie Howe is working as a network administrator in Smart Software Developers.Debbie is asked to implement a security policy in which permissions are granted tousers based on various parameters, such as time, available resources, priority, orclient location. She wants to implement PAM to apply these types of settings in thenetwork. Which module type should Debbie implement in PAM to perform therequired task?a. Authb. Accountc. Sessiond. password
1. Consider the following statements:Statement A: The Update Module helps in obtaining prior notification about the newupdates in the software.Statement B: The Update Module helps in managing a group of computers in anenterprise.With respect to the preceding statements, which of the following options is correct?a. Statement A is True and Statement B is False.b. Statement A is False and Statement B is True.c. Both, Statement A and Statement B, are False.d. Both, Statement A and Statement B, are True.
2. Consider the following statements:Statement A: The Management Module ensures that all the packages required for thestability of the computer are downloaded with the software.Statement B: The Management Module helps in searching the computers in anenterprise for updates based on different search criteria, such as system specificationand package name.With respect to the preceding statements, which of the following options is correct?a. Statement A is True and Statement B is False.b. Statement A is False and Statement B is True.c. Both, Statement A and Statement B, are False.d. Both, Statement A and Statement B, are True.
3. Consider the following statements:Statement A: Hosted model architecture helps in creating channels according to yourrequirement.Statement B: Hosted model architecture provides a single port number for both
inbound and outbound connections.With respect to the preceding statements, which of the following options is correct?a. Statement A is True and Statement B is False.b. Statement A is False and Statement B is True.c. Both, Statement A and Statement B, are False.d. Both, Statement A and Statement B, are True.
4. Consider the following statements:Statement A: Proxy model architecture provides custom channels.Statement B: In Proxy model architecture, the content of RHN database is cachedlocally on the network.With respect to the preceding statements, which of the following options is correct?a. Statement A is True and Statement B is False.b. Statement A is False and Statement B is True.c. Both, Statement A and Statement B, are False.d. Both, Statement A and Statement B, are True.
5. Consider the following statements:Statement A: Knoppix Forum provides support to create CD-based games.Statement B: Knoppix Forum provides support to use its software on laptops.With respect to the preceding statements, which of the following options is correct?a. Statement A is True and Statement B is False.b. Statement A is False and Statement B is True.c. Both, Statement A and Statement B, are False.d. Both, Statement A and Statement B, are True.
1. Tom Wilkins is working as a network administrator at InfoSuper Corp. The management of the organization decides to migrate to the Linux environment to provide file level security and data level security to all the applications. Tom needs to compile and execute a C# application on a Linux platform. To compile the application on the C#application, Tom changes to the /usr/src/ mono directory and enters the following command at the shell prompt to compile the application:# mcs interactive\ Welcome.csHowever, Tom observes that no output is displayed. In addition, he also wants to execute the application. What should Tom do to perform the required task?a. Compilation is performed successfully
Enter the following command to execute the application:# mcs interactive\ Welcome.exe
b. The compilation is performed successfullyEnter the following command to execute the application:# mono interactive \ Welcome.exe
c. Chris needs to enter the following commands to compile:# mono interactive \ Welcome.exeEnter the following command to execute the application:# mono interactive \ Welcome.exe
d. Chris needs to enter the following commands to compile:# mcs interactive \ Welcome.exeEnter the following command to execute the application:# mcs interactive \ Welcome.exe
2. InfoSuper Corp. is asoftware development organization, which has a large number of computer systems that are connected through a network. The organization has a centralized directory server. John Barren, the system administrator at InfoSuper Corps, comes to know that a malicious user has breached the security of the directory server. The user uses some software tools to eavesdrop on the data being transmitted on the network. The user then decrypts the passwords and monitors the data on the network. Further, the user gathers the credential information and data being transmitted between the directory server and the authorized users. This information is used by the malicious user to breach the security of the directory server. Which security threat has the malicious user employed to breach the security of the server?
a. Trojan horsesb. Network sniffingc. Credential stealingd. Connection hijacking
3. Which attribute in the sambaAccount object, used to store the Samba related information in OpenLDAP, specifies the time when the Impassword and ntpassword are last modified?
a. SambaNTPasswordb. SambaLMPasswordc. SambaPwdLastSetd. SambaLogonScript
4. Perfect Watch Corp. is a watch manufacturing company. The company needs to implement an LDAP Directory server to communicate with its clients. For implementing the LDAP Directory server, the company asks Donna Band, the system administrator, to define a LDAP Model, which describes the services provided by LDAP Directory server to the LDAP Directory clients of the company. While performing the task, Donna needs to describe the operations that can be performed on the LDAP Directory, such as search, add, delete, bind, unbind. What does Donna do to perform the above task?
a. Define the Functional Modelb. Define the Security Modelc. Define the Naming modeld. Define the Information model
5. Donna is working as a network administrator at Safest Software Developers. The organization has three branches at different locations. There are three departments at each branch, named application development, quality assurance, and sales. The users of the same department at different branches are part of a group. There are three groups corresponding to each department, app for application development department, qa for quality assurance department, and sales for sales department. All the employees at different branches use a database server at the main branch to store data. The database server can run 100 processes at a time. The users in the app group run a large number of processes on the database server due to which the users in the qa and sales groups are not able to run their processes. What should Donna do to solve this problem?
a. Donna needs to add the following entries to the /etc/security/limits.conf file:* soft file 560* hard file 860
b. Donna need to add the following entry to the /etc/pam.d/login file:sesion required /lib/security/pam_limits.so
c. Donna needs to add the following entries to the /etc/pam.d/login file:* soft nofile 85* hard nofile 88
d. Donna needs need to add the following entries to the /etc/security/limits.conf file:@app soft nproc 45@app hard nproc 50
6. Red-Eye Experts is a leading developer of computer applications, with its head office in Hew York. The organization has three departments: HR, Research, and Development. A directory service is configured in the HR department and all the employees in the rest of the departments access the directory service. The organization has two branch offices in London and Paris. These branch offices are connected to the head office in Hew York through Virtual Private Network (VPN). The directory service, in the HR department of the head office, is also accessed by the employees in the branch offices. So, there is a potential risk that a network failure between the head office and the branch offices can seriously affect the employees in the branch offices. To prevent this situation, John Barrett, the system administrator at the head office, decides to create multiple replicas of the directory service and configure these replicas in the branch offices. How, to maintain data consistency, John wants to synchronize the data which is stored in the main directory service and the replica servers. John wants to implement amechanism in such a way that when a replica server receives a write operation request from a client, it performs the write operation. After that, the replica server sends the modified updated entry values to all the replica servers and the main server. On receiving the modified entry values, the main server and the replica servers update the stored entries accordingly. How, which Replication Policy and Write Operation performing strategy should be employed by John to implement the above mechanism?
a. Multimaster Replication Policy using referralsb. Single-Master Replication Policy using chainingc. Single-Master Replication Policy using referralsd. Multimaster Replication Policy
7. Red-Eye Experts is a .NET applications development organization, based in the US. The organization uses the Windows plattorm to developing .NET applications. For security reasons, Donna Bard, the network administrator, needs to migrate .NET applications to the Linux platform to provide file-level and user-level security to the applications. To migrate the .NET applications to the Linux platform, Donna needs to install the Mono tool that provides a number of APIs that can be used to run the .NET applications on Linux. For this, Donna installs the mono-data-1.1.6-1.novell.6.3.i586.rpm RPM package as the first package of the tool. However, Donna finds an error massage while installing this package. What error message does Donna receive while installing this package?
a. The error message is displayed as follows:"mono-core-1.1.6-1.novell.6.3.i586.rpm andmono-basic-1.1.6-1.novell.6.3.i586.rpm RPM packages should already be installed on the computer."
b. The error message is displayed as follows:"mono-data-oracle-1.1.6-1.novell.6.3.i586.rpm andmono-complete-1.1.6-1 .novell.6.3.i586.rpm RPM packages should already be installed on the computer."
c. The error message is displayed as follows:"mono-extras-1.1.6-1.novell.6.3.i586.rpm andmono-complete-1.1.6-1.novell.6.3.i586.rpm RPM packages should already be installed on the computer."
d. The error message is displayed as follows:"mono-data-oracle-1.1.6-1 .novell.6.3.i586.rpm and mono-data-postgresql-1.1.6-1.novell.6.3.i586.rpm RPM packages should already be installed on the computer."
8. SmartLabs is a rnultii national company that has 78 branches across the world. The company maintains a directory server for storing all the information about the company's product. Clients of the company access the directory server to obtain information about the products. The directory server has come under frequent hacking attacks in the past few months. This has led to hackers stealing and changing the confidential information stored on the server. Debbie Howe, the system administrator at SmartLabs, is assigned the task to provide security to the directory server from the hackers. For this, Debbie divides the data into various categories depending on the frequency of access to the data and the degree of loss to the company if the data is modified. How, Debbie assigns various priority levels to the various categories of data. Which possible security consideration is Debbie implementing to provide security to the directory server?
a. Sensitivity of data of Identifying the Security Requirements of a Directoryb. Directory accessibility of Understanding the Environment of the Organizationc. User community of Understanding the Environment of the Organizationd. Administration of Identifying the Security Requirements of a Directory
9. Countryside Markets is a software application development company in U.S. The company maintains all the details of the software developed by the company in an OpenLDAP server. The company finds that some unauthorized people are accessing the OpenLDAP server to get information about the software contained therein. The company assigns the task to the system administrator, Chris Donaldson, to protect the OpenLDAP server from this threat. Chris finds that the company allows access to the OpenLDAP
server to the clients byasking for the DM to be accessed and for the password as plain text. To provide security to the OpenLDAP server, Chris decides to change the accessing method. Chris defines that whenever a client has to connect to the OpenLDAP server, the client sends a connection request to the OpenLDAP server. When the OpenLDAP server receives the request, it creates and sends a challenge to the client, which consists of an encrypted message from the server to the client. If the client has the encrypted key, it sends the key as the response to the challenge sent by the OpenLDAP server. If the key is verified, the OpenLDAP server allows the client to connect and access information from the OpenLDAP server. What kind of implementation is Chris defining to provide security to the OpenLDAP server?
a. ANONYMOUSb. DIGEST-MD5c. KERBEROS _V 4d. CRAM-MD5
10. Larry Williams is work ing as a system administrator at Technology Systems. He wants to implement kickstart installation to configure multiple workstations in the organization. He also wants to redirect the existing Linux server to create scripts for configuring these newly installed workstations that are connected to the network. What should Larry do to perform the task?
a. Use Existing state provisioningb. Use Configuration managementc. Use Bare metal provisioningd. Use Kickstart configuration writer
11. Jim Lewis is working as a network administrator at Good Graphics, Inc. The organization uses Wine installed in Linux operating system to enable the employees of the organization to use existing Windows-based applications. However, Jim finds that some packages of Wine are corrupted; so, he needs to uninstall the all installed Wine packages. What should Jim do to perform the above activity?
a. First, use the following command to identify the Wine packages installed on the system:# rpm -qa | grep -i wine?Then use following command to uninstall the packages# rpm -e <wine-package_name> ?
b. First, use the following command to identify the Wine packages installed on the system:# rpm -ivh wine-20050310-1wbel3winehq.i386.rpm ?Then use following command to uninstall the packages# rpm -e <wine-package_name> ?
c. First, use the following command to identify the Wine packages installed on the system:# rpm -e <wine-package_name> ?Then use following command to uninstall the packages# rpm -ivh <wine-package-name>.rpm ?
d. First, use the following command to identify the Wine packages installed on the system:
# rpm -qa | grep -i wine?Then use following command to uninstall the packages# rpm -ivh <wine-package-name>.rpm ?
12. Donna Brad is working as a system administrator at Blue moon Computers. To support the recently acquired hardware, the management asks Donna to upgrade the kernel of the main Linux server. She checks whether the kernel source code is already installed on the main server and finds the code is not installed. Therefore, she downloads the source code from Web and configures the kernel source code on the server. How, Donna needs to compile the kernel source code, and perform the installation steps of kernel. What should Donna do to complete the upgrade of the kernel?
a. Donna should execute the following commands:# make dep# make clean# make bzimage# make modules# make modules_install# make install
b. Donna should execute the following commands:# make dep# make bzimage# make clean# make modules# make install# make modules_install
c. Donna should execute the following commands:# make dep# make bzimage# make cln# make modules# make modules_install# make install
d. Donna should execute the following commands:# make dep# make clean# make bzimage# make modules# make modules_install
13. Consider the statements:Statement A: The # rpm -qa | grep -i wine command is used to identify the installed Wine packages on the system.Statement B: The # rpm -e <wine-package_name> command is used to uninstall the Wine packages from the system.Which of the following options is correct with respect to the above statements?
a. Statement A is true and statement B is false.b. Both statements A and B are false.
c. Statement A is false and statement B is true.d. Both statements A and B are true.
14. Supersoft2000 is a software development company that has number of development centers all over America. Larry Williams, the system administrator installs a Directory service to implement an identity management system. In the identity management system, the employee information such as name, employee code, telephone extension number, department code, branch office, and designation, is stored and organized. How, the management of the company wants to expand the business. As a result, Larry faces a problem of insufficient hardware resources and slow read/write process of the directory server. He wants to provide aflexible Directory service that can meet the increasing storage space requirement of the directory service. What should Larry do to solve this problem?
a. Purchase a new server with higher processing speed.b. Use high-speed physical media such as fiber optic cable.c. Distribute the directory server among multiple computers.d. Purchase a new server with more Hard Disk storage space.
15. Pat Greene is working as a network administrator at Technology Systems. The orgnization has implemented LDAP server to enable the employees to access the employee information of the organization. The management asks Pat to index the entries stored in the LDAP database to enable fast searching and retrieval of data. What should Pat do to perform the required task?
a. Add the following indexes in the slapd.conf file:index objectclass eqindex eq
b. Add the following indexes in the slapd.conf file:index objectClass eqindex cnpres,eq
c. Add the following indexes in the slapd.conf file:index objectClass eqindex departmentNumber
d. Add the following indexes in the slapd.conf file:index objectClass eqindex cn, sn, mail eq, subindex departmentNumber eq
16. Which value for the STAGE argument in the rpmbuild command unpacks the source code and applies patches?
a. bb. cc. pd. a
17. Which command is used to verify the mapped files of nfs Windows-based << it should be nfs > computer?
a. # mount: 192.168.0.52b. # showmount 192.168.0.52c. # mount –e 192.168.0.52d. # showmount –e 192.168.0.52
18. Which music file format needs to be searched and saved in the Migration folder while migrating from Windows to Linux operating system?
a. AVIb. MPGc. WMVd. WAV
19. Pat Wilkins is working as a network administrator at LMN Inc., which provides storage solutions to its customers. The network of the organization comprises of Red Hat Linux Systems. Pat is assigned the task of managing and monitoring the entire network of the enterprise. To perform the task, he installs Red Hat Network (RHN) software in the network. To enhance the performance of the enterprise network, Pat wants to configure computers in an enterprise according to the requirements of the computers. He also wants to deploy, update, and re-deploy the Linux infrastructure in the enterprise using a GUI. In addition, he wants to configure the Linux computers in the enterprise automatically for asingle user or group. What should Pat do to complete the required tasks?
a. Use the update module of the RHN softwareb. Use the proxy model of RHN softwarec. Use the provisioning module of the RHN softwared. Use errata information and simple Web user interface
20. Ronald Billing is working as system administrator with the Technology Systems. Homelike Hospital Ltd. is a chain of hospitals all over America. Don Alien, the Chief Medical Officer at Homelike Hospital Ltd. directs Ronald to create a directory service to store information about doctors. To implement the directory, Ronald needs to install a software package called OpenLDAP. Ronald finds that he needs to install a package called SASL before installing OpenLDAP. To install the SASL package, Ronald enters the following commands at the shell prompt:
# rpm -ivh cyrus-sasl-md5-2.1.15-3.i386.rpm# rpm -ivh cyrus-sasl-plain-2.1.15-3.i386.rpm
# rpm -ivh cyrus-sasl-2.1.15-3.i386.rpmHowever, Ronald notices that the commands are not producing required results. What should Ronald do to solve the problem?
a. Ronald needs to enter the following command at the shell prompt:# rpm -ivh cyrus-sasl-md5-2.1.15-3.i386.rpm
# rpm -ivh cyrus-sasl-plain-2.1.15-3.i386.rpm# rpm -ivh krb5-libs-1.2.7-19.1386.rpm# rpm -ivh cvrus-sasl-gssapi-2.1.15-3.i386.rpm# rpm -ivh cvrus-sasl-devel-2.1.15-3.i386.rpm
b. Ronald needs to enter the following commands at the shell prompt:# rpm -ivh cyrus-sasl-md5-2.1.15-3.i386.rpm# rpm -ivh cyrus-sasl-plain-2.1.15-3.i386.rpm# rpm -ivh cyrus-sasl-2.1.15-3.i386.rpm# rpm -ivh cyrus-sasl-gssapi-2.1.15-3.i386.rpm# rpm -ivh cyrus-sasl-devel-2.1.15-3.i386.rpm
c. Ronald needs to enter the following commands at the shell prompt:# rpm -ivh cyrus-sasl-md5-2.1.15-3.i386.rpm# rpm -ivh cyrus-sasl-plain-2.1.15-3.i386.rpm# rpm -ivh krb5-workstation-1.2.7-19.1386.rpm# rpm -ivh cyrus-sasl-gssapi-2.1.15-3.i386.rpm# rpm -ivh cyrus-sasl-devel-2.1.15-3.i386.rpm
d. Ronald needs to enter the following command at the shell prompt:# rpm -Ivh cyrus-sasl-md5-2.1.15-3.1386.rpm# rpm -Ivh pam_krb5-1.70-1.1386.rpm# rpm -Ivh cyrus-sasl-2.1.15-3.1386.rpm# rpm -Ivh cyrus-sasl-gssapl-2.1.15-3.1386.rpm# rpm -ivh cyrus-sasl-devel-2.1.15-3.i386.rpm
21. Ken Burton is working as a system administrator at Global Systems Inc. The details of the employee information are placed in the NIS-based directory of the organization. Ken needs to migrate the user information from the NIS server to the OpenLDAP server for faster retrieval of data. Ken has added the user accounts information to the OpenLDAP database. How, he needs to verify the entries of user in the LDAP server. What should Ken do to perform the required task?
a. Ken needs to issue the following command:# ldapadd -x -D "cn=Manager,dc=globalsystems,dc=com" -W < /tmp/passwd.ldif
b. Ken needs to issue the following command:# Idapsearch -x -b 'dc=globalsystems,dc=com' '(objectclass=*)'
c. Ken needs to issue the following command:# Idapsearch -x -b "uid=steve,ou=People,dc=globalsystems,dc=com"
d. Ken needs to issue the following command:# Idapadd -x -D "cn=Manager,dc=globalsystems,dc=com" –W
22. MentorGraphics is a leading software solution provider. The management of the organization asks Nancy Jones, the network administrator, to install a sendmail RPM package in the organization network. Nancy observes that the existing RPM package is not secure for sendmail package. Therefore, Nancy decides to update the existing RPM packages to enhance the security for sendmail packages. For this, Nancy needs to register a server computer with Red Hat Network (RHN). In addition, Nancy needs to push updates and patches securely from the server registered with RHN to other remote servers in the organization network. What should Nancy do to perform the task?
a. Execute rsync [options] <[user@]sourcehost:> <source filename><[user@]destinationhost:> <destination filename>
b. Execute Patch [options] <[user@]sourcehost:> <source filename><[user@]destinationhost:> <destination filename>
c. Execute rpm [options] <[user@]sourcehost:> <source filename><[user@]destinationhost:> <destination filename>
d. Execute scp [options] <[user@]sourcehost:> <source filename><[user@]destinationhost:> <destination filename>
23. Tom Wilkins is working as a system administrator at Technology Systems. Tom is assigned the task to migrate the NIS information to LDAP. Therefore, Tom needs to map the NIS information stored in /etc/passwd file to attributes of posixAccount object class. Tom needs to translate the parameter, /bin/bash from the entry stored in /etc/passwd file. Which of the following attribute of posixAccount object class maps to the above parameter?
a. loginShellb. HOMEDIRECTORYc. homeDirectoryd. LoginShell
24. Identify the authentication mechanism provided by SASL, which is used with the Transport Layer Security (TLS) to encrypt the connection between the LDAP server and client?
a. DIGEST-MD5 mechanismb. One Time Password (OTP) mechanismc. Shared secret mechanismd. PLAIN mechanism
25. The system administrator at Global Systems, needs to install Red Hat Linux on the organization's server, using kickstart. He wants to use the graphical installation feature in Kickstart. Which default parameter should he provide for starting Red Hat Enterprise Linux installation process and which parameter needs to be specified in the ks.cfg file for the graphical user interface?
a. Root password and keyboardb. Authentication and languagec. Bootloader and moused. Bootloader and monitor
26. Technology Systems is a leading software solution provider based in Kansas. The organization opens a new branch in Chicago to cater to the increasing demands of the customers. The organization assigns Christine Turner, the system administrator, the task of installing an operating system that supports security protocols, such as Kerberos and hash algorithms. The operating system should provide forum support for posting and receiving the solutions for any software problem. Independent Software Vendors (ISVs),
such as Oracle, and IBM should support this operating system. What should Christine do to perform the task?
a. Evaluate Linux for Security requirements and install Linuxb. Evaluate Linux Deployment requirements and install Linuxc. Evaluate Linux for Business Requirements and install Linuxd. Evaluate Linux for Maintenance Requirements and install Linux
27. Christine Turner is working as a system administrator at Medical Central Supplies. The organization maintains several directory servers on different platforms to store the data pertaining to the employees. Each directory server uses different data formats, syntaxes, and protocols for communication with the supported application. The organization asks Christine to enable data sharing between the directory servers. To perform the task, Christine decides to integrate applications across the platforms. However, Christine finds that the directory servers are not able to understand the protocols of each other across the servers. What should Christine do to resolve the issue and enable data sharing between different directory servers?
a. Use gatewaysb. Use metadirectoriesc. Use push and pull synchronization agentsd. Use a distributed multivendor directory
28. Pat Greene is working as a system administrator at SuperGraphics Inc. Pat is assigned the task to integrate Samba with OpenLDAP to store the user information of the samba on OpenLDAP. Therefore, Pat uses the sambaAccount object class to store the user information on OpenLDAP. Pat identifies that few of the attributes of sambaAccount object class need to be secured from dictionary attacks. Which set of attributes should Pat secure to prevent dictionary attacks?
a. sambaLMPassword, sambaPwdLastSetb. sambaLMPassword and sambaNTPasswordc. sambaPwdLastSet and sambaNTPasswordd. sambaLMPassword, sambaNTPassword, and sambaPwdLastSet
29. David Johnson is working as a network administrator with Blue Moon Computers that provides customized consulting services. The network of the company contains numerous web servers, files servers, and database servers. David is assigned the task of managing the network of the enterprise. David notices that network congestion has increased due to increase in the number of employees accessing these servers, in the enterprise. This results in low bandwidth and affects the performance of the network. Also, he receives complaints that httpd process is not running properly on the web servers. What should David do to solve the problems?
a. David should check for disk usage in the Access Control Setup section and configure the nagios.cfg file to use object configuration files to check the services running on the hosts.
b. David should check for disk usage in the Monitor Various Aspects of the Running Host section and configure the snmpd.conf file to check the name of the process.
c. David should check for disk usage in the Monitor Various Aspects of the Running Host section and configure the minimal.cfg file to add a host to be monitored in the HOSTS section.
d. David should check for disk usage in the Access Control Setup section and configure the cgi.cfg file to set use_authentication=1 entry to use_authentication=0.
30. Tom Wilkins works as a system administrator in EarthenWares that provides Web services to its customers. The organization wants to upgrade its Linux-based web servers to provide enhanced security features. The new version of Linux does not support some of the applications running on the web servers. It also does not provide some security features, which are required. What should he do to update the web servers?
a. Upgrade the kernel by customizing the source code of new version and configure the kernel using make xconfig command
b. Upgrade the kernel using RPM and configure kernel using make oldconfig commandc. Upgrade the kernel by applying patches and configure the kernel using make
menuconfig commandd. Upgrade the kernel by applying patches and configure the kernel using make
oldconfig command
31. Donna Bard, the system administrator at Quality Software Developers, wants to backup sensitive data of the organization regularly. For this, Donna decides to implement Redundant Array of Inexpensive Disks (RAID) on the Linux server. Donna wants to delete some partitions on the server to create the RAID disks. Donna uses fdisk utility to delete the offline partitions and does not delete any extended partitions. However, Donna observes that the server is unable to delete these partitions. What should Donna Do to solve the problem?
a. Donna should use the umount command to delete the partitions.b. Donna should also delete the extended partitions.c. Donna should use any third party tool to delete the specified partitions.d. Donna should delete all the logical partitions.
32. Global Systems Inc. is a leading software development organization. Users in RD frequently download files and packages from the database server through the Internet. Some files and packages downloaded from the Internet are infected with viruses, which affect computers of all users. To overcome this virus problem, instead of installing antivirus programs on every computer. The organization needs to install virus-free operating systems, such as Linux. Chris, the system administrator, automates the installation of the operating system. Pat needs to use an operating system that provides solution for small to medium range of servers used for the majority of businesses, such as file servers and mail servers. He also needs to place pre-installation scripts at the beginning of the Kickstart configuration file. What should Chris do to perform the required task?
a. Chris needs to use Red Hat Enterprise Linux operating system and enter the following command:%preecho "My kickstart installation started on ' /bin/date' " > /etc/motd
b. Chris needs to use Red Hat Enterprise Linux operating system and enter the following command:%post --interpreter /usr/bin/python
c. Chris needs to use Red Hat Enterprise Linux operating system and enter the following command:# mkdir /var/ftp/pub/configfiles
d. Chris needs to use Mandriva Linux operating system and enter the following command:network --device eth0 --bootproto dhcp ?
33. Chris Donaldson is an application developer at PQR Inc. The organization is currently working on the Linux platform. The organization receives a new application development project based on the Windows platform. For this, the organization requires developers to work on Windows-based workstations. As a result, Chris needs to migrate and run the Bzip2 Linux application on the Windows-based workstations using SFU. Therefore, Chris downloads the bzip2-1.0.2.tar.gz file from the Internet and saves the file to the local directory of the Windows-based workstation. Then, he enters the following code snippet at the Korn shell prompt to migrate and run the Linux application on Windows platform:
$ gunzip bzip2-1.0.2.tar.gz ?$ tar -xvf bzip2-1 .0.2.tar ?$ made ?$ made install ?However, while executing the preceding code snippet, Chris notices that the code is not providing the required output. What should Chris do to solve the problem?
a. Chris needs to enter the following code snippet:$ cd 0.2 ?$ make ?$ make install ?
b. Chris needs to enter the following code snippet:$ tar -xvf bzip2-1.0.2.tar ?$ cd$ make ?$ make install ?
c. Chris needs to enter the following code snippet:$ gunzipbzip2-1.0.2.tar.gz ?$ tar -xvf bzip2-1.0.2.tar ?$ cd bzip2-1.0.2 ?$ make ?$ make install ?
d. Chris needs to enter the following code snippet:$ gunzip bzip2-1.0.2.tar.gz ?$ tar -xvf bzip2-1.0.2.txt ?
34. Donna Bard is working as a network administrator at Global Systems Inc. Donna has deployed an LDAP server to provide information and resources across the organization. Donna is asked to modify the entries in the salary column of the employees who have been promoted in the LDAP directory. Donna wants to use a data file as input source to modify directory data. In addition, Donna wants that the modification process should continue even ifthere is an errorwhile modifying the entry in the LDAP directory. Which command should Donna use to perform the required tasks?
a. Use Idapmodify utility with -f and -c optionb. Use Idapmodify utility with -o logfile and -c optionc. Use Idapmodify utility with -W and -r optiond. Use Idapmodify utility with -b and -E option
35. Which of the following ACLs configuration parameter enables only the authenticated users to access the OpenLDAP server?
a. Anonymousb. Usersc. Selfd. *
36. Jim Lewis is working as a system administrator at Technology Systems The organization has an OpenLDAP server configured to manage the organizational information, such as employee information and business details. However, the performance of the server is decreasing. The management, therefore, asks Jim to configure a server to act as a replica of the master server. Jim uses the following command at the master server to export the database to an LDIF file:
# slapadd -I "dc=technologysystems,dc=com" -b database.IdifHowever, the database files are not exported to an LDIF file. In addition, after exporting the database files to the LDIF file, Jim needs to import the LDIF file to the replica server. What should Jim do to perform the required task?
a. Use the# slapcat -b "dc=technologysystem,dc=com" -l database.Idifand# slapadd -l database.Idifcommand
b. Use the# slapcat -I "dc=technologysystem,dc=com" -b database.Idifand# slapcat -b database.Idifcommand
c. Use the# slapadd -b "dc=technologysystem,dc=com" -l database.Idifand# slapadd -b database.Idifcommands
d. Use the# ldapsearch -b "dc=technologysystem,dc=com" -I database.Idifand# slapadd -I database.Idifcommand
37. Tom Wilkins is working as a system administrator at Technology Systems. Tom needs to design a schema for a directory that contains records of employees, such as name, phone, address, and job profile, in the organization. Tom writes a code for the telephoneHumber attribute type in LDAP.
2.5.4.20 NAME 'telephoneHumber' EQUALITY telephoneHumberMatch SUBSTR telephoneHumberSubstringsMatch SYNTAX
1.3.6.1.4.1.1466.115.121.1.1 5{24} Identify the OID of the attribute type and the use of telephoneHumberMatch rule in the preceding code snippet?
a. The OID of the attribute type is 2.5.4.20 and the telephoneHumberMatch rule is used for matching complete telephone numbers.
b. The OID of the attribute type is 1.3.6.1.4.1.1466.115.121.1.15 and the telephoneHumberMatch rule is used to describe the applications that own and use the attribute.
c. The OID of the attribute type is 2.5.4.20 and the telephoneHumberMatch rule is used for matching partial telephone numbers.
d. The OID of the attribute type is 1.3.6.1.4.1.1466.115 and the telephoneHumberMatch rule is used to specify the unique name of an attribute.
38. Which feature of Provisioning module would automatically configure the kickstart file for a single user?
a. Existing state provisioningb. Bare metal provisioningc. Kickstart configuration writerd. Configuration management
39. Which attribute of the migrate_common.ph file is used to customize the mail domain in the mail attribute in the migrate_passwd.pl script?
a. $ DEFAULT_MAIL_DOMAIMb. $ EXTENDED_SCHEMAc. $ DEFAULT_BASEd. $ NAMINGCONTEXT
40. Consider the statements:Statement A: Kerberos eliminates the transmission of password over a network by using symmetric key cryptography to authenticate users accessing the network services.Statement B: The master key is used to secure the Kerberos database.Which of the following is true, with respect to the above statements?
a. Statement A is true and statement B is false.b. Both, statements A and B, are false.c. Both, statements A and B, are true.d. Statement A is false and statement B is true.
01 02 03 04 05 06 07 08 09 10 11 12 13 14 15 16 17 18 19 20
b b c a d d a a b d a a d c d c d d a b
21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40
b d a d c c a b b a c a c a b a a d a c
Linux Q7 MMS Review (82 questions for all topics)
No. Question Answer
1
Pat Greene is working as a network administrator at Technology Systems. The orgnization has implemented LDAP server to enable the employees to access the employee information of the organization.
The management asks Pat to index the entries stored in the LDAP database to enable fast searching and retrieval of data. What should Pat do to perform the required task? 1,Add the following indexes in the slapd.conf file:
index objectClass eq
index cn, sn, mail eq, sub
index departmentNumber eq2,Add the following indexes in the slapd.conf file:
index objectClass eq
index departmentNumber 3,Add the following indexes in the slapd.conf file:
index objectClass eq
index cn
pres,eq 4,Add the following indexes in the slapd.conf file:
index objectclass eq
1
index eq
2
Donna Bard is working, as a network administrator at Good Graphics Inc. Donna needs to add entries of new employees to the LDAP directory containing employees information. While adding the entries, Donna needs to specify the input file from where the “ldapadd” utility will pick up the entry and add to the LDAP directory. Which one of the following options will Donna use to perform the required task? 1,-f filename 2,-h hostname 3,-U username 4,-D binddn
1
3
Pat Greene is working, as a network administrator at Global Systems inc. The LDAP directory on the network server contains the information of the employees in the organization. Pat needs to add an entry of an employee in the LDAP directory from an LDIF file named temp1.ldif. Pat, therefore, uses the following command:
# slapadd –d temp1.ldif
However, he is not able to add the entry. Which of the following commands will enable Pat to perform the required task? 1,# slapdelete –l temp1.ldif 2,# slapmodify –f temp1.ldif 3,# slapadd –l temp1.ldif4,# slapadd –u
3
4
Donna Bard is working as a network administrator at SuperGraphics Inc. Donna has deployed an LDAP server to provide information and resources across the organization. Now, Donna needs to specify the number of entries that the LDAP server will return in response to a search request. What should Donna do to perform the required task? 1,Use the sizelimit <integer> parameter of the slapd.conf file. 2,Use the timelimit <integer> parameter of the slapd.conf file. 3,Use the ldapmodify utility with –c option 4,Use the ldapdelete utility
1
5
Tom Wilkins is working as a network administrator at BlueMoon Computers. Tom needs to search for the name of the employees with first name ‘Steve’ from the LDAP directory containing the details of the employees. Tom needs to specify that a maximum of 50 entries should be retrieved as a result of search request. What should Tom do to perform the required task? 1,Use the ldapsearch command with –l option 2,Use the ldapadd command with -k option 3,Use the ldapmodify utility with –a option 4,Use the ldapsearch command with –z option
4
6
Blue Moon Computers is a software development organization, which has development centers all over the US. Pat Greene, the system administrator at Blue Moon Computers, installs a LDAP server to store the information about the employees and projects running at different development centers. The Internet has facilitated the growth of Blue Moon Computers. Therefore, Pat decides to increase the accessibility of the LDAP server to all development centers through the Internet.
According to the company’s policies, the electronic mail address for a given employee is considered public information and the employee's home address is considered sensitive information. It must be protected to address employee privacy concerns. Easy accessibility to the LDAP server allows malicious users to try and access the LDAP server to obtain the home address and other such private and confidential information about various employees. Therefore, the server needs to be protected against such malicious users. Pat needs to implement Access Control List (ACL) to grant access privileges to the authenticated users.
Which of the following options contains the access control requirements to accomplish this task? 1,-The subjects accessing the LDAP server
-The objects that are accessed
-The level of authentication required
-The accessibility time of the LDAP server
-The access level to an LDAP server2,-Physical security
-Directory accessibility 3,-Read/Write permission
-Sestivity of data
-Administration of directory server
-User community 4,-Replication and synchronization
-Managing the directory server
-Network environment
1
7
John Barrett is working as a system administrator at Technology Systems. John has implemented a directory server in the organization to store and manage the information pertaining to the employees and the organizational resources. The directory server contains both the confidential data that is private to the employees and the global information that is publicly readable and accessible to all the employees. Now, it is the responsibility of John to protect the data in the directory server to maintain the integrity of the data. For this, John wants to implement a mechanism so that:
-The activities performed by the directory server, such as the modification of the employee password, are constantly monitored.
-The Log files of the directory server are constantly analyzed to detect loopholes, such as unauthorized access to the Directory server.
-Both the employees and the directory server provide the credential information to each other to verify their identities.
Which security methods are required to be identified and implemented by John to achieve his objective? 1,-One-way Authentication method
-Auditing 2,-Auditing
-Two-way Authentication method3,-Firewall
-One-way Authentication method 4,-Encryption
-Two-way Authentication method
2
8
Identify the authentication mechanism provided by SASL, which is used with the Transport Layer Security (TLS) to encrypt the connection between the LDAP server and client? 1,PLAIN mechanism 2,Shared secret mechanism 3,One Time Password (OTP) mechanism 4,DIGEST-MD5 mechanism
1
9
To set up the primary Kerberos server, you need to create the Kerberos database. Which command do you use to create the Kerberos database? 1,# /usr/kerberos/sbin/kdb5_util create –s2,# /usr/kerberos/sbin/kadmin5.local –q “addprinc ronald/admin” 3,# /usr/kerberos/kadmin5.local –q “addprinc ronald/admin” 4,# /usr/kerberos/kdb5_util create –s
1
10
Identify the command that a LDAP Directory client uses to view the list of Ticket to Get Tickets (TGTs) obtained from the Kerberos server. 1,klist2,kinit 3,kadmin.local 4,kdb5_util
1
11
Which of the following ACLs configuration parameter enables only the authenticated users to access the OpenLDAP server? 1,Users2,* 3,Anonymous 4,Self
1
12
You are configuring an OpenLDAP directory. You want to monitor the information related to communication with shell backends and clients. Which of the following options will you select? 1,loglevel 16 2,loglevel 512 3,loglevel 10244,loglevel 64
3
13
Which implementation provided by Cyrus-SASL libraries enables a client to send and receive encrypted data from an OpenLDAP server? 1,ANONYMOUS 2,CRAM-MD53,DIGEST-MD5 4,KERBEROS_V4
2
14
Which of the following parameter of the database section identifies the dn that specifies the common name of the manager of the directory server? 1,rootdn <dn>2,replogfile <filename> 3,updated <dn> 4,Suffix <dn suffix>
1
15
Ken Burton is working as a network administrator at SuperGraphics Inc. The organization has implemented an LDAP server to enable the access to employee information of the organization. Therefore, the management decides to build white page service. Now, Ken needs to index the entries stored in the LDAP database to enable fast searching and retrieval of data. What should Ken do to perform the required task? 1,Add the following indexes in the slap.conf file
index objectClass eq
index cn, sn, mail eq, sub
index departmentNumber eq2,Add the following indexes in the slap.conf file
index objectClass eq
index departmentNumber 3,Add the following indexes in the slap.conf file
index objectClass eq
index cn, mail
index departmentNumber eq 4,Add the following indexes in the slap.conf file
index objectClass eq
index cn, sn, mail eq, sub
1
16
Tom Wilkins is working as a network administrator at Good Graphics Inc. The management asks Tom to deploy LDAP server to provide information and resources across the organization. Tom needs to search for the name of the employees whose first name is “Steve”. In addition, Tom wants that ldapsearch utility should prompt for simple authentication. What should Tom do to perform the required task?
1,# ldapsearch cn=Steve* -S–d 2,# ldapsearch cn=Steve* -c -h 3,# ldapsearch cn=Steve* -x -h 4,# ldapadd cn=Steve* -x -h
3
17
Chris Donaldson is working as a network administrator at SuperGraphics Inc. The organization has implemented an LDAP server to enable access to employee information of the organization. Therefore, the organization decides to build white page service. The management asks Chris to build white pages for the organization. To perform the required task, Chris uses inetOrgPerson class to store the employee information in the LDAP directory. Now, Chris needs to add the existing schema files to support the attributes and object classes. How should Chris modify the global sections of the slap.conf file to add the schema files? 1,# /usr/local/etc/openldap/slapd.conf
# Global section
## Include the minimum schema required.
include
/usr/local/etc/openldap/schema/core.schema
## Added to support the inetOrgPerson object.
include
/usr/local/etc/openldap/schema/cosine.schema
include
/usr/local/etc/openldap/schema/inetorgperson.schema
## Added logging parameters2,# /usr/local/etc/openldap/slapd.conf
# Global section
## Include the minimum schema required.
include
/usr/local/etc/openldap/schema/core.schema
## Added to support the inetOrgPerson object.
include
/usr/local/etc/openldap/schema
include
/usr/local/etc/openldap/schema/schema
## Added logging parameters 3,# /usr/local/etc/openldap/slapd.conf
# Global section
## Include the minimum schema required.
include
1
/usr/local/etc/openldap/schema/core.schema
## Added to support the inetOrgPerson object.
## Added logging parameters 4,# /usr/local/etc/openldap/
# Global section
## Include the minimum schema required.
include
/usr/local/etc/openldap/schema/core.schema
## Added to support the inetOrgPerson object.
## Added logging parameters
18
Tom Wilkins is working as a system administrator at Technology Systems. Tom needs to design a schema for a directory that contains records of employees, such as name, phone, address, and job profile, in the organization. Tom writes a code for the telephoneNumber attribute type in LDAP.
2.5.4.20 NAME 'telephoneNumber' EQUALITY telephoneNumberMatch SUBSTR telephoneNumberSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{24}
Identify the OID of the attribute type and the use of telephoneNumberMatch rule in the preceding code snippet? 1,The OID of the attribute type is 2.5.4.20 and the telephoneNumberMatch rule is used for matching complete telephone numbers. 2,The OID of the attribute type is 2.5.4.20 and the telephoneNumberMatch rule is used for matching partial telephone numbers. 3,The OID of the attribute type is 1.3.6.1.4.1.1466.115.121.1.15 and the telephoneNumberMatch rule is used to describe the applications that own and use the attribute. 4,The OID of the attribute type is 1.3.6.1.4.1.1466.115 and the telephoneNumberMatch rule is used to specify the unique name of an attribute.
1
19
Donna Bard is working as a system engineer at ABC corp. The company uses LDAP directory schema to reduce data redundancy problems and to maintain data integrity. This directory stores the record of employees,such as name, age, and year of birth. Now, the company assigns a task to Donna to design a new object class, myPerson, which is extended from the existing object class, inetOrgPerson. The company also asks donna to define a new attribute type, dob, in the my Person object class. The attribute type, dob, stores the date of birth of the employees of the company. Donna uses the following code snippet to define the dob attribute type and the object class, myPerson, respectively:
1.) ( dob-OID NAME DESC 'birthday day-month' EQUALITY caseIgnoreMatch SUBSTR
caseIgnoreSubstringsmatch SYNTAX ‘bob’ 1.3.6.1.4.1.1466.115.121.1.15 )
2.)
( myPerson-OID NAME 'myPerson' DESC 'Extended person' SUP inetOrgPerson
STRUCTURAL MAY dob )
But, Donna finds that the above code snippet is not producing the required results. What code snippet should Donna use to perform the task? 1,1.) ( dob-OID NAME 'dob' DESC 'birthday day-month' EQUALITY caseIgnoreMatch SUBSTR
caseignoresubstringsmatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
2.)
( myPerson-OID NAME 'myPerson' DESC 'implementing person' SUP inetOrgPerson
STRUCTURAL MAY dob )
2,1.) ( dob-OID NAME 'dob' DESC 'birthday day-month' EQUALITY caseIgnoreMatch SUBSTR
caseIgnoreSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
2.)
( myPerson-OID NAME 'myPerson' DESC 'Extended person' SUP inetOrgPerson
STRUCTURAL MAY dob )
3,1.) ( dob-OID NAME 'dob' DESC 'birthday day amd month' EQUALITY caseIgnoreMatch SUBSTR
caseIgnoresubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
2.)
2
( myPerson-OID NAME DESC 'Extended person' SUP inetOrgPerson ,myname,
STRUCTURAL MAY dob )
4,1.) ( dob-OID NAME 'dob' DESC EQUALITY caseIgnoreMatch SUBSTR
caseIgnoreSubstringsMatch 1.3.6.1.4.1.1466.115.121.1.15 )
2.)
( myPerson-OID NAME 'myPerson' DESC 'Extended person' SUP inetOrgPerson
STRUCTURAL MAY dob )
20
Tom Wilkins is working as a system administrator at Quality Software Developers. The organization uses a Directory server to access information pertaining to its employees and organizational resources, such as computers and printers. The Directory server contains confidential and private data of the organization. Tom is assigned a task to implement security of confidential data through the authentication method. In the authentication method, a secure connection is established between two networks and information transmitted on this secure connection is encrypted using encryption methods.
Which technology does Tom choose to perform this task? 1,SSL/TLS2,CIPE 3,IPSec 4,Netfilter
1
21
InfoSuper Corp. is a software development organization, which has a large number of computer systems that are connected through a network. The organization has a centralized directory server. John Barrett, the system administrator at InfoSuper Corps. comes to know that a malicious user has breached the security of the directory server. The user uses some software tools to eavesdrop on the data being transmitted on the network. The user then decrypts the passwords and monitors the data on the network. Further, the user gathers the credential information and data being transmitted between the directory server and the authorized users. This information is used by the malicious user to breach the security of the directory server.
Which security threat has the malicious user employed to breach the security of the server? 1,Credential stealing 2,Connection hijacking 3,Trojan horses 4,Network sniffing
4
22
Pat Greene is working as a network administrator at XYZ Inc.
Pat implements a directory service to store data at a centralized location. Pat is informed that:
-The authorized users are not able to access the Directory server as a malicious user is identifying the hardware and software environment of the directory server.
-After identifying the capacity of the directory server, the malicious user is sending more traffic than what the server can handle.
Which technique does this type of attack illustrate? 1,SYN attack 2,Buffer overflow attack3,Indirect resource consumption 4,Direct resource consumption
2
23
Supersoft2000, a software development organization has development centers throughout America, which are connected through a network. Larry Williams, a system administrator at Supersoft2000, installs a directory service to implement an identity management system. Employees and clients at different centers access the directory server through the network. Larry wants to prevent unauthorized access to the directory server. So, Larry installs a firewall on the network of the organization such that:
The employees of the internal network are able to establish a connection with external networks.
Incoming requests are processed first by the firewall. Next, the firewall validates the requests and forwards them to the directory server.
Which of the following does Larry use to perform these tasks? 1,SSL/TLS 2,SASL 3,CIPE4,Kerberos
3
24Which migration perl script is used to translate the protocol entries that are stored in the /etc/protocols file? 1,migrate_protocols.pl2,migrate_networks.pl 3,migrate_hosts.pl 4,migrate_netgroup_byuser.pl
1
25
Which attribute of the migrate_common.ph file is used to customize the mail domain in the mail attribute in the migrate_passwd.pl script? 1,$DEFAULT_MAIL_DOMAIN2,$DEFAULT_BASE 3,$EXTENDED_SCHEMA 4,NAMINGCONTEXT
1
26Which perl script is used to translate the host entries stored in the NIS infrastructure? 1,Migrate_netgroup_byuser.pl 2,Migrate_netgroup.byhost.pl 3,Migrate_group.pl 4,Migrate_hosts.pl
4
27
Jim Edwin is working as a system administrator with Blue Moon Computers. The management assigns Jim the task to migrate the NIS based network to OpenLDAP. Jim wants to customize the migration script according to the organizational requirements. To customize the script, Jim needs to specify the name suffix to be used as distinguished name in the OpenLDAP information.
Which parameter of migrate_common.ph script should Jim use to accomplish the task? 1,$DEFAULT_MAIL_DOMAIN 2,$DEFAULT_BASE3,$EXTENDED_SCHEMA 4,NAMINGCONTEXT
2
28
Ken Burton is working as a system administrator at SuperGraphics Inc. While replicating an LDAP server, Ken needs to configure the master LDAP server to maintain a log of the changes made. Ken, therefore, needs to edit the slapd.conf file to specify the details of the replica server. He needs to specify the name of the replica server, the partition to be replicated, the binding DN of the LDAP server, and the binding method to bind the master LDAP server to the replica server. Which of the following commands should Ken use to perform the required task? 1,replica host=replicaser.supergraphics.com:389
binddn=”cn=replicaser,dc=supergraphics,dc=com”
credentials bindmethod=simple tls=no
2,replica host=replicaser.supergraphics.com:389
tls=”dc=supergraphics,dc=com”
binddn=”cn=replicaser,dc=supergraphics,dc=com”
credentials bindmethod=simple tls=no 3,replica host=replicaser.supergraphics.com:389
suffix=”dc=supergraphics,dc=com”
binddn=”cn=replicaser,dc=supergraphics,dc=com”
credentials bindmethod=simple tls=no4,replica host=replicaser.supergraphics.com:389
suffix=”dc=supergraphics,dc=com”
portnumber=”cn=replicaser,dc=supergraphics,dc=com”
credentials bindmethod=simple tls=no
3
29
Larry Williams is working as a system administrator at BlueMoon Computers. Larry observes that the performance of the server is decreasing as the users in the organization are excessively querying one section, employee information, of the server. The management, therefore, asks Larry to distribute the directory to improve the performance of the server. After distributing a directory, such that Server1 maintains the information about the organizational information while the employee information is maintained by Server2. Now, Larry needs to verify the correctness of the data stored in Server2. For this, Larry executes the following command:
# slapcat -H –C ldap://Server2.bluemooncomputers.com/ -LL -x -b "dc=bluemooncomputers,dc=com" "(ou=*)" ou
However, Larry is not able to retrieve results from the Server2, which contains the employee information. What should Larry do to perform the required task? 1,Use
# ldapsearch -H –C ldap://Server2.bluemooncomputers.com/ -LL -x -b "dc=bluemooncomputers,dc=com" "(ou=*)" ou command
2,Use
# slapcat -c –H ldap://Server2.bluemooncomputers.com/ -LL -x -b "dc=bluemooncomputers,dc=com" "(ou=*)" ou command 3,Use
# slapadd -H –C ldap://Server2.bluemooncomputers.com/ -LL -x -b "dc=bluemooncomputers,dc=com" "(ou=*)" ou command 4,Use
# slapindex -H –C ldap://Server2.bluemooncomputers.com/ -LL -x -b "dc=bluemooncomputers,dc=com" "(ou=*)" ou command
1
30
Tom Wilkins is working as a system administrator at Technology Systems. Tom is assigned the task to enable the OpenLDAP support in Samba. Tom needs to provide support to the uid, displayName, and gidNumber attributes in the OpenLDAP. Which of the following schema files must be included in the slapd.conf file to support the above attributes? 1,cosine.schema, nis.schema, and samba.schema 2,cosine.schema, inetorgperson.schema, and autofs.schema 3,cosine.schema,inetorgperson.schema,nis.schema4,inetorgperson.schema, samba.schema, and nis.schema
3
31
Chris Donaldson is working as a system administrator at SuperGraphics Inc. Chris needs to integrate the samba with OpenLDAP to store the user information. Chris adds a new user Ronald in the OpenLDAP directory. Which command should Chris use to verify the existence of user, Ronald in the OpenLDAP directory? 1,# /usr/local/sbin/smbldap-usershow.pl ronald2,# smbldap-usershow.pl ronald 3,# /usr/local/sbin/smbldap-usershow ronald 4,# /usr/local/sbin/smbldap-usershow.pl
1
32
Donna Bard is working as a system administrator at Blue Moon Computers, which is a software development organization based in New York. Each department of the organization maintains its own database to store information about the employees. Since the information is stored in multiple data sources, the employees frequently encounter redundant data and inconsistent data. For this, Donna decides to configure a Directory server in the organization. She first creates a Data Design of the organization. She observes that when an employee in a department is shifted to another department, the changes are not reflected in the other related databases. What could be the possible consequence of Donna’s observation? 1,Obsolete data stored in the databases 2,Databases updated without any coordination between the database administrators. 3,Databases updated within short time duration. 4,Databases accessed by a number of database administrators at the same time.
1
33
Perfect Watch Corp. is a watch manufacturing company. The company needs to implement an LDAP Directory server to communicate with its clients. For implementing the LDAP Directory server, the company asks Donna Bard, the system administrator, to define a LDAP Model, which describes the services provided by LDAP Directory server to the LDAP Directory clients of the company. While performing the task, Donna needs to describe the operations that can be performed on the LDAP Directory, such as search, add, delete, bind, unbind. What does Donna do to perform the above task? 1,Define the Information model 2,Define the Naming model 3,Define the Functional Model 4,Define the Security Model
3
34
Jim Lewis is working as a system administrator at Smart Software Developers, a leading developer of computer applications. Jim is assigned the task to implement a Directory service in the organization to provide centralized storage and management of information, such as employee records.
For this, Jim decides to implement an LDAP Directory server in the organization. While implementing the LDAP Directory server, he wants to specify a distinguished name for every entry in the Directory server. He also wants to specify rules to restrict the size of the attributes of the data elements, such as employee ID. Which LDAP models should Jim use to achieve his objective? 1,Information Model and Naming Model 2,Functional Model and Security Model 3,Information Model and Security Model 4,Functional Model and Naming Model
1
35
Blue Moon Computers is a leading developer of computer applications. The organization has three departments: HR, Research, and Development. The directory service is configured in the HR department only, and all the employees in the rest of the departments access the directory. Now, if the directory service fails due to a system failure, employees in all the three departments will be affected. To avoid this, Chris Donaldson, the system administrator, wants to make the directory service available in all the three departments. For this, Chris decides to create multiple copies of the directory service and install a copy of the Directory service in each department. Chris employs the Single-Master Replication Policy to synchronize the data stored in the main directory server and the Replica servers, to maintain data consistency.
Now, to perform the write operations to add, modify, or update the data, in the Directory service, Chris wants to implement a mechanism so that when an employee sends a write operation request to a replica server, the replica server sends the IP address of the main directory server to the employee. The replica server also sends a message to the employee along with the IP address. This message requests the employee to send the write operation request to the main directory server.
Which strategy, in the Single-Master Replication policy, is employed by Chris to perform the write operation? 1,Using referrals 2,Using chaining 3,Assigning unique sequence numbers to each update operation performed 4,Using referrals and Using chaining
1
36
Blue Valley Consulting is a leading developer of computer applications. The organization has its head office in New York and two branch offices in California and Paris. There are three departments in the organization: Marketing, Research, and Development. The branch offices are connected to the head office in New York through Virtual Private Network (VPN). Each branch office runs as a separate entity, with its own network, reporting structure, and constraints. The organization has no centralized IT management group, and separate administrators at each branch offices manage the network. Since the organization has multiple servers but no centralized management of the information, it faces the data redundancy and data inconsistency problems.
To avoid the above data related problems by centralizing the storage and management of data in the organization, Tom Wilkins, the system administrator at the head office, decides to install and configure the OpenLDAP Directory service. Before installing OpenLDAP, Tom wants to install the OpenSSL software package to implement secure, encrypted communication between the Directory server and the clients. What are the commands entered by Tom to install the OpenSSL software package? 1,Tom must enter the following commands at the shell prompt to install OpenSSL:
# rpm –ivh openssl-0.9.7a-22.1.i386.rpm
# rpm –ivh openssl-devel-0.9.7a-22.1.i386.rpm
# rpm –ivh openssl096b-0.9.6b-13.i386.rpm2,Tom must enter the following commands at the shell prompt to install OpenSSL:
# rpm –ivh krb5-server-1.2.7-19.i386.rpm
# rpm –ivh pam_krb5-1.70-1.i386.rpm
# rpm –ivh krb5-libs-1.2.7-19.i386.rpm
# rpm –ivh krb5-devel-1.2.7-19.i386.rpm
# rpm –ivh krb5-workstation-1.2.7-19.i386.rpm 3,Tom must enter the following command at the shell prompt to install OpenSSL:
# rpm –qa | grep openssl 4,Tom must enter the following commands at the shell prompt to install OpenSSL:
1
# rpm –ivh openssl096b-0.9.6b-13.i386.rpm
# rpm –ivh openssl-devel-0.9.7a-22.1.i386.rpm
37Which the command is used to test the configuration of the Kerberos client? 1,kinit 2,klist 3,kdb5_util 4,kadmin.local
1
38
Smart Software Developers is a leading software development organization with 15 branches across the world. To enhance the security of the LDAP Directory server maintained by the organization, Ken Burton, the system administrator, decides to authenticate the LDAP Directory users using Kerberos support. For this, Ken needs to create the Kerberos Database on the Key Distribution Center (KDC). What should Ken do to perform the above task? 1,Ken should enter the following command to create the Kerberos Database:
# kdb5_util create –s2,Ken should enter the following command to create the Kerberos Database:
# kdb5_util create –c 3,Ken should enter the following command to create the Kerberos Database:
kdb5util create –s 4,Ken should enter the following command to create the Kerberos Database:
# kdb5util create –c
1
39
Which parameter in the “smb.conf” file for the OpenLDAP-enabled Samba server specifies the domain where Samba server resides? 1,Workgroup 2,Netbios name 3,Security 4,Encryption
1
40
Which attribute in the sambaAccount object, used to store the Samba related information in OpenLDAP, specifies the time when the lmpassword and ntpassword are last modified? 1,SambaPwdLastSet2,SambaNTPassword 3,SambaLMPassword 4,SambaLogonScript
1
41
Which schema file path should be specified in the samba.schema file to provide the uid attribute of a sambaAccount object? 1,cosine.schema 2,inetorgperson.schema 3,nis.schema 4,core.schema
1
42
Which command is used to verify whether Samba has authenticated a sambaAccount, Mike, stored on the OpenLDAP server? 1,# /usr/local/sbin/smbldap-usershow.pl Mike2,# /usr/local/smbldap-usershow.pl Mike 3,# /usr/sbin/smbldap-usershow.pl Mike 4,# /usr/local/sbin/ldap-usershow.pl Mike
1
43
Christine Turner is working as a system administrator at Medical Central Supplies. The organization maintains several directory servers on different platforms to store the data pertaining to the employees. Each directory server uses different data formats, syntaxes, and protocols for communication with the supported application. The organization asks Christine to enable data sharing between the directory servers. To perform the task, Christine decides to integrate applications across the platforms. However, Christine finds that the directory servers are not able to understand the protocols of each other across the servers. What should Christine do to resolve the issue and enable data sharing between different directory servers?
1,Use gateways 2,Use push and pull synchronization agents 3,Use metadirectories 4,Use a distributed multivendor directory
1
44
Jim Lewis is working as a system administrator at Technology Systems. The organization maintains different directory servers on several platforms for running different types of applications. These directory servers use different security mechanisms to provide access to the directories of the directory server. The organization needs to enable sharing and accessing of information between the directory servers for official purposes. Jim decides to perform the task and finds that the directory servers are unable to recognize the clients of different platforms. As a result, the directory services of the directory server are unable to interoperate with the non-native clients. What should Jim do to resolve the problem? 1,Use push and pull synchronization agents 2,Use gateways 3,Create distributed multivendor directories 4,Use cross-platform authentication services
4
45
Certified Carriers is a software application development company based in U.S. The company maintains the details about all the running projects in the OpenLDAP server, installed in the company. The company finds that the server has started running slowly due to some unknown reasons. The company asks the system administrator, Ed Young, to identify the cause of the problem. Ed finds that some unauthorized people are accessing the directory server, which causes the server to run slowly. To solve the problem, Ed needs to specify the kind of information, which should be stored in the system logs. For this, Ed defines the value of the loglevel directive as ‘8’. What kind of information does Ed want to store by using this value? 1,KERBEROS_V4 2,DIGEST-MD53,CRAM-MD5 4,ANONYMOUS
2
46Which feature of Provisioning module would automatically configure the kickstart file for a single user? 1,Bare metal provisioning 2,Existing state provisioning 3,Configuration management4,Kickstart configuration writer
3
47
The Satellite model grants permission to the user to download software using physical media, such as CD and floppy. Which of the following feature helps to accomplish this task? 1,Local database repository 2,Complete off-network capability3,Channel and errata cloning and their management 4,Channel permissions
2
48
Global Systems is a software development organization. Pat Greene, the network administrator, has used the Kickstart installation method to automatically configure workstations and servers according to the requirement of the organization. Which feature of the provisioning module does Pat use? 1,Bare metal provisioning2,Existing state provisioning 3,Configuration management 4,Kickstart configuration writer
1
49
Jim Lewis is working as a network administrator at Smart Software Developers. Jim has registered the Linux workstations and servers with Red Hat Network. Jim has identified a workstation on the network that has crashed while running a software application. For resolving the problem, he must identify the location of this error. What should he do to accomplish the task? 1,Implement a GUI to receive automatic updates from Red Hat network 2,Ask for prior notification for updates and receipt of the errors through mail messages 3,Issue a list of Errata4,Check RPM dependencies associated with each new version of the updates
3
50
Quality Software developer is multinational organization. Donna Bard, the network administrator in the organization is responsible for monitoring the network of the organization. While monitoring the network, Donna observes that a large number of data packets are getting lost on the network. As a result, the employees of organization are not able to download the file from the file server although all the connections and protocols related to file server are working perfectly. This is affecting the performance of the enterprise. What should Donna do to solve the problem?
1,Run the tcpdump command at the shell prompt. 2,Run the itrace and strace command at the shell prompt. 3,Run the itrace command at the shell prompt. 4,Run the strace command at the shell prompt.
1
51
Ronald Billing is working as a system administrator at Blue Moon Computers, which provides storage solutions to its customers. Ronald has configured a DNS server in the enterprise, which converts the address of a Web site to its associated IP address. All the employees of Blue Moon Computers are connected to the DNS for routing over the network. The users report complaints to Ronald that they cannot access the enterprise network because DNS is not able to resolve the names into IP addresses. If the problem persists, the network will stop functioning and the performance of the enterprise will go down quickly. What should Ronald do to solve the problem? 1,Use the ps command
Use the kill –STOP command
Use the kill –CONT command 2,Use the fuser command
Use the Isof command
Configure the rpm -q files 3,Use the host or nslookup command
Use the dig command
Configure the chroot files4,Use the host or ltrace command
Use the strace command
Configure the rpm –qc files
3
52
Certified Carriers is an established computer-training institute, based in New Jersey. The institute has launched a new course on Linux administration that has been very successful. Therefore, the management wants to launch two new batches within the next week. For this, Corrine Wallace, the network administrator, needs to set up 60 Linux workstations.
Corrine wants to use Kickstart installation that enables automatic installation of the operating systems on several computers simultaneously. To use Kickstart installation, Corrine needs to set up an installation sever, such as NFS server, or Apache server. While setting up NFS server, Corrine wants to copy the Linux installation files to the NFS shared directory.
What of the following sequence of command, should Corrine follow to perform the task? 1,Run the following command sequentially:
# mkdir /mnt/install ?
# mount /dev/cdrom /mnt/cdrom ?
# cp –ar /mnt/cdrom/RedHat /var/www/html/install ?
# cp /mnt/cdrom/.discinfo /mnt/install ?
# umount /mnt/cdrom ?
# mount /dev/cdrom /mnt/cdrom ?
# cp –ar /mnt/cdrom/RedHat/RPMS /mnt/install ?
# umount /mnt/cdrom ?
# mount /dev/cdrom /mnt/cdrom ?
# cp –ar /mnt/cdrom/RedHat/RPMS /mnt/install ? 2,Run the following command sequentially:
# mkdir /mnt/install ?
# mount /dev/cdrom /mnt/cdrom ?
# cp –ar /mnt/cdrom/RedHat /var/ftp/pub/install ?
# cp /mnt/cdrom/.discinfo /mnt/install ?
# umount /mnt/cdrom ?
# mount /dev/cdrom /mnt/cdrom ?
# cp –ar /mnt/cdrom/RedHat/RPMS /mnt/install ?
# umount /mnt/cdrom ?
# mount /dev/cdrom /mnt/cdrom ?
# cp –ar /mnt/cdrom/RedHat/RPMS /mnt/install ? 3,Run the following command sequntially:
4
# mkdir /mnt/install ?
# mount /dev/cdrom /mnt/cdrom ?
# cp /mnt/cdrom/.discinfo /mnt/install ?
# cp /mnt/cdrom/.discinfo /mnt/install ?
# umount /mnt/cdrom ?
# mount /dev/cdrom /mnt/cdrom ?
# cp –ar /mnt/cdrom/RedHat/RPMS /mnt/install ?
# umount /mnt/cdrom ?
# mount /dev/cdrom /mnt/cdrom ?
# cp –ar /mnt/cdrom/RedHat/RPMS /mnt/install ? 4,Run the following command sequentially:
# mkdir /mnt/install ?
# mount /dev/cdrom /mnt/cdrom ?
# cp –ar /mnt/cdrom/RedHat /mnt/install ?
# cp /mnt/cdrom/.discinfo /mnt/install ?
# umount /mnt/cdrom ?
# mount /dev/cdrom /mnt/cdrom ?
# cp –ar /mnt/cdrom/RedHat/RPMS /mnt/install ?
# umount /mnt/cdrom ?
# mount /dev/cdrom /mnt/cdrom ?
# cp –ar /mnt/cdrom/RedHat/RPMS /mnt/install ?
53
The system administrator at Global Systems needs to install Linux operating system on the computers in the organization. He wants to install a server system that enables the employees at different branches of an organization to share the data. He wants to use the kickstart method to install Linux on all the computers from a main server where he would have the image of the boot floppy stored. Identify the server type along with its installation command that he should use and the image file on the server that would be used to create a boot floppy diskette? 1,Apache web server
# rpm –qa | grep ftp ?
linux.img 2,Network file system server
# rpm –qa | grep nfs-utils ?
root.img 3,file transfer protocol server
# rpm –qa | grep http ?
iso.img 4,Network file system (NFS) server
# rpm –qa | grep nfs ?
bootdisk.img
4
54
Pat Greene, the network administrator, at InfoSuper Corp. The organization needs to implement data encryption and authentication protocols for user and file level security. The management, therefore, decides to implement Linux operating system for all business purposes. Pat installs Linux operating system on all the computers in the network of the organization. Pat is using kickstart installation method to automate installation. While deploying Linux operating system Pat gets an error message stating that “ks.cfg file not accessible”. What should Pat do to solve the problem? 1,Pat needs to need to check the path at root prompt or the directory name should be correct and accurate2,Pat needs to check if the CD-ROM is in readable mode and that you have made the CD-ROM bootable. 3,Pat needs to check for the mouse parameter and mention it in your ks.cfg file. 4,Pat needs to use the recent version of boot image file.
1
55
Global Systems Inc. is a leading software development organization. Users in R&D frequently download files and packages from the database server through the Internet. Some files and packages downloaded from the Internet are infected with viruses, which affect computers of all users. To overcome this virus problem, instead of installing antivirus programs on every computer. The organization needs to install virus-free operating systems, such as Linux. Chris, the system administrator, automates the installation of the operating system. Pat needs to use an operating system that provides solution for small to medium range of servers used for the majority of businesses, such as file servers and mail servers. He also needs to place pre-installation scripts at the beginning of the Kickstart configuration file. What should Chris do to perform the required task? 1,Chris needs to use Red Hat Enterprise Linux operating system and enter the following command:
%pre
echo ”My kickstart installation started on ‘ /bin/date’ “ > /etc/motd
2,Chris needs to use Mandriva Linux operating system and enter the following command:
network --device eth0 -–bootproto dhcp ?
3,Chris needs to use Red Hat Enterprise Linux operating system and enter the following command:
%post --interpreter /usr/bin/python 4,Chris needs to use Red Hat Enterprise Linux operating system and enter the following command:
# mkdir /var/ftp/pub/configfiles
1
56
Consider the statements:
Statement A:
The BOOTP server contains the information about the configuration of the computers on which Linux needs to be installed.
Statement B:
During the Kickstart installation of Linux over a network, the Kickstart client needs to have either the network information or the files required for installing the Linux operating system.
Which of the following is true, with respect to the above statements? 1,Statement A is true and statement B is false. 2,Statement A is false and statement B is true. 3,Both, statements A and B, are true. 4,Both, statements A and B, are false.
4
57
Jim, the network administrator at Supersoft Inc., has decided to install the Linux operating system on the network at his organization. He needs to deploy an NFS server at a centralized location on the network. After preparing the server, some problem occurred while he was configuring the server. The following set of commands was used by him to configure the NFS server:
/mnt/install *(ro,sync)<ro,asynch>
# exportfs –e
# service nfs start
# showmount –e
Which command should Jim modify to configure the server? 1,# exportfs –e 2,# service nfs start 3,# showmount –e 4,/mnt/install *(ro,sync)
3
58
Red Sky IT Systems is an IT organization that provides software services to its customers. One of the projects being developed at Red Sky requires the use of advanced Perl scripts. For this, Pat Greene, the network administrator installs RPM packages on the computers. Pat observes that a file of RPM package is corrupted during the installation of RPM packages. Therefore, Pat needs to verify the corrupted file to check the attributes of the file. What should Pat do to perform the task? 1,Execute # rpm –-rebuilddb ? 2,Execute # rpm –Vf /bin/umount ?3,Execute # rpm --import /mnt/cdrom/RPM-GPG-KEY ? 4,Execute # rpm -K squirrelmail-1.2.11-1.noarch.rpm ?
2
59
MentorGraphics is a leading software solution provider. The management of the organization asks Nancy Jones, the network administrator, to install a sendmail RPM package in the organization network. Nancy observes that the existing RPM package is not secure for sendmail package. Therefore, Nancy decides to update the existing RPM packages to enhance the security for sendmail packages. For this, Nancy needs to register a server computer with Red Hat Network (RHN).
In addition, Nancy needs to push updates and patches securely from the server registered with RHN to other remote servers in the organization network. What should Nancy do to perform the task? 1,Execute Patch [options] <[user@]sourcehost:> <source filename> <[user@]destinationhost:> <destination filename> 2,Execute rsync [options] <[user@]sourcehost:> <source filename> <[user@]destinationhost:> <destination filename> 3,Execute scp [options] <[user@]sourcehost:> <source filename> <[user@]destinationhost:> <destination filename>4,Execute rpm [options] <[user@]sourcehost:> <source filename> <[user@]destinationhost:> <destination filename>
3
60
Which value for the STAGE argument in the rpmbuild command unpacks the source code and applies patches? 1,a 2,p3,b 4,c
2
61Which section of a spec file contains the instructions to prepare the source code for build? 1,%build 2,%prep3,%install 4,%files
2
62Which SRPM directory contains the files that are used to control the RPM build process? 1,/usr/src/redhat/BUILD 2,/usr/src/redhat/RPMS 3,/usr/src/redhat/SPECS4,/usr/src/redhat/SRPMS
3
63
Which character is displayed in the output of the rpm command with –Vf option that is used to check if there is a change in the user ownership attribute of the file? 1,L 2,U3,S 4,M
2
64
Donna is working as a network administrator at Safest Software Developers. The organization has three branches at different locations. There are three departments at each branch, named application development, quality assurance, and sales. The users of the same department at different branches are part of a group. There are three groups corresponding to each department, app for application development department, qa for quality assurance department, and sales for sales department. All the employees at different branches use a database server at the main branch to store data. The database server can run 100 processes at a time. The users in the app group run a large number of processes on the database server due to which the users in the qa and sales groups are not able to run their processes. What should Donna do to solve this problem?
1,Donna needs need to add the following entries to the /etc/security/limits.conf file:
@app soft nproc 45
@app hard nproc 502,Donna need to add the following entry to the /etc/pam.d/login file:
session required /lib/security/pam_limits.so
3,Donna needs to add the following entries to the /etc/pam.d/login file:
* soft nofile 85*
hard nofile 88 4,Donna needs to add the following entries to the /etc/security/limits.conf file:
* soft file 560*
1
hard file 860
65
Tom Wilkins is working as a system administrator at SSPT Corporation. To provide communication between these branch offices, Tom needs to provide an e-mail facility and shared Internet access in the organization. For this, he needs to update the Linux kernel of a server to embed the required services into the existing communication system. After updating, he needs to configure the kernel source code, which is of very large size. He also needs to compile the kernel source and resolve all the dependencies after configuring the kernel source code as required. He also wants to remove all the unused files. What should Tom do to accomplish this task?
1,Tom should use the following commands:
# make menuconfig
#make oldconfig
#make mrproper 2,Tom should use the following commands:
#make oldconfig
# make zImage
# make modules_install 3,Tom should use the following commands:
# make oldconfig
# make xconfig
# make install 4,Tom should use the following commands:
4
# make dep
# make bzImage
66
Technology Systems is a leading software development organization. The organization uses the Linux operating system on its workstations and servers for security purposes. The organization has a main centralized server that uses kernel-2.6. The organization adds two new divisions, one for its research work and another for its development work. Both divisions access the centralized server and this increases the load on the server.
To improve the performance of server, the organization assigns Diane Frye, the system administrator, the task of upgrading the kernel. For this, Diane downloads, configures, and compiles the upgraded kernel on the server. However, Diane fails to execute the make module command.
What should Diane do to troubleshoot the problem? 1,Run the make dep command.2,Run the make modules command. 3,Run the make bzImage command. 4,Run the make install command.
1
67
Donna Brad is working as a system administrator at Blue moon Computers. To support the recently acquired hardware, the management asks Donna to upgrade the kernel of the main Linux server. She checks whether the kernel source code is already installed on the main server and finds the code is not installed. Therefore, she downloads the source code from Web and configures the kernel source code on the server. Now, Donna needs to compile the kernel source code, and perform the installation steps of kernel.
What should Donna do to complete the upgrade of the kernel? 1, Donna should execute the following commands:
# make dep
# make bzImage
# make cln
# make modules
# make modules_install
# make install 2,Donna should execute the following commands:
# make dep
# make clean
# make bzImage
# make modules
# make modules_install 3,Donna should execute the following commands:
# make dep
# make clean
# make bzImage
# make modules
# make modules_install
# make install4,Donna should execute the following commands:
# make dep
# make bzImage
# make clean
# make modules
# make install
3
# make modules_install
68
Global Systems is a software development organization that provides customized software solutions. The organization uses kernel-2.4.21-4.EL on its Linux server. The management of the organization decides to upgrade the existing kernel to kernel-2.4.24 to enhance security and to acquire new hardware support. Pat Greene, the system administrator is assigned the task of upgrading the Linux kernel.
After downloading the.tar.gz file containing the source code of the kernel in /usr/src directory, Pat needs to install the kernel source code.
What should Pat do to perform the task? 1, Pat needs to execute the following code snippet:
# cd /usr/src
# tar -zxvf linux-2.4.24.tar.gz
# cd linux-2.4.24
# ls –al2,Pat needs to execute the following code snippet:
# cd /src
# tar -zxvf linux-2.4.24.tar.gz
# cd linux-2.4.24
# ls –l 3,Pat needs to execute the following code snippet:
# cd /usr/src
# tar linux-2.24.tar.gz
# cd linux-2.4.24
# ls –al 4,Pat needs to execute the following code snippet:
# cd /usr/src
# tar -zxcf linux-2.4.24.gz
# cd linux-2.4.24
# ls –al
1
69
John Barrett is working as a network administrator at Blue Valley Consulting. The organization has a number of branch offices all over US. The employees of the organization access a centralized Linux server located at the main branch. John has recently upgraded the kernel of the centralized Linux server from kernel-2.4 to kernel-2.6. John has also implemented RAID to avoid any data loss. After implementing the RAID, John observes that the RAID acceleration is low. As a result, the server performance is also degraded. To improve the RAID acceleration, John needs to stabilize the speed of the RAID device. For this, he decides to assign the value, 80000, to the parameters specifying the speed of the RAID device. What should John do to perform this task?
1,Execute the following commands at the shell prompt:
# echo 80000 > /sys/dev/raid/speed_limit_max
# echo 80000 > /sys/dev/raid/speed_limit_min
2,Execute the following commands at the shell prompt:
# echo 80000 > /proc/sys/dev/raid/speed_limit_max
# echo 80000 > /proc/sys/dev/raid/speed_limit_min
3,Execute the following commands at the shell prompt:
# echo 80000 > /proc/sys/dev/raid/speed_max
# echo 80000 > /proc/sys/dev/raid/speed_min 4,Execute the following commands at the shell prompt:
# echo 80000 > /proc/sys/raid/speed_limit_max
# echo 80000 > /proc/sys/raid/speed_limit_min
2
70
Tom Wilkins is working as a network administrator at InfoSuper Corp. The management of the organization decides to migrate to the Linux environment to provide file level security and data level security to all the applications. Tom needs to compile and execute a C# application on a Linux platform. To compile the application on the C# application, Tom changes to the /usr/src/ mono directory and enters the following command at the shell prompt to compile the application:
# mcs Interactive\ Welcome.cs
However, Tom observes that no output is displayed. In addition, he also wants to execute the application. What should Tom do to perform the required task? 1,Chris needs to enter the following commands to compile:
# mono Interactive\ Welcome.cs
Enter the following command to execute the application:
# mono Interactive\ Welcome.exe 2,The compilation is performed successfully
Enter the following command to execute the application:
# mono Interactive\ Welcome.exe 3,Chris needs to enter the following commands to compile:
# mcs Interactive\ Welcome.cs
Enter the following command to execute the application:
# mcs Interactive\ Welcome.exe 4,Compilation is performed successfully
Enter the following command to execute the application:
# mcs Interactive\ Welcome.exe
2
71
Chris Donaldson is working as a network administrator at Quality Software Developers. To provide file and user level security, the management decides to migrate application to a Linux-based system. Chris decides to use mono tool to migrate the .NET application to Linux. To use the tool, Chris downloads the zip files that contains the required RPM packages needed to run the application on Linux platform. Chris installs the first four RPM packages to provide database connectivity and debug information in the following order:
bytefx-data-mysql-1.1.6-1.novell.6.3.i586.rpm
libgdiplus-1.1.5-1.ximian.1.1.i386.rpm
ibm-data-db2-1.1.6-1.novell.6.3.i586.rpm
libgdiplus-debuginfo-1.1.5-1.ximian.1.1.i386.rpm
However, after installing of all the required RPM packages, Chris observes that still the .NET application is not running on Linux platform. What should Chris do to solve the problem? 1,Chris needs to install the RPM packages in the following order:
libgdiplus-debuginfo-1.1.5-1.ximian.1.1.i386.rpm
bytefx-data-mysql-1.1.6-1.novell.6.3.i586.rpm
ibm-data-db2-1.1.6-1.novell.6.3.i586.rpm
libgdiplus-1.1.5-1.ximian.1.1.i386.rpm 2,Chris needs to install the RPM packages in the following order:
bytefx-data-mysql-1.1.6-1.novell.6.3.i586.rpm
ibm-data-db2-1.1.6-1.novell.6.3.i586.rpm
libgdiplus-1.1.5-1.ximian.1.1.i386.rpm
libgdiplus-debuginfo-1.1.5-1.ximian.1.1.i386.rpm3,Chris needs to install the RPM packages in the following order:
bytefx-data-mysql-1.1.6-1.novell.6.3.i586.rpm
libgdiplus-1.1.5-1.ximian.1.1.i386.rpm
ibm-data-db2-1.1.6-1.novell.6.3.i586.rpm
libgdiplus-debuginfo-1.1.5-1.ximian.1.1.i386.rpm 4,Chris needs to install the RPM packages in the following order:
libgdiplus-debuginfo-1.1.5-1.ximian.1.1.i386.rpm
libgdiplus-1.1.5-1.ximian.1.1.i386.rpm
bytefx-data-mysql-1.1.6-1.novell.6.3.i586.rpm
ibm-data-db2-1.1.6-1.novell.6.3.i586.rpm
2
72
Tom Wilkins is working as a network administrator at Blue Valley Consulting. The employees of the organization’s Software Development department develop .NET applications for their clients. Now, the organization migrates to the Linux platform to avoid the cost of licensing in Windows. As a result, the employees now need to migrate the .NET applications to the Linux platform. Tom decides to use the Mono tool to allow migration of the .NET applications to the Linux platform. He first compiles the .NET applications on the Windows platform. He then copies the compiled source code of the application to the /usr/src directory on Linux platform. Now, he needs to compile the application source code on the Linux platform. For this, he decides to use the mcs command. During compilation, he wants to generate the exceptions that the debugger can catch. He also wants to generate the debugging information but ignore the warning messages. To perform the above tasks, Tom executes the following command:
mcs –debug -nowarn:WARNLIST
However, Tom notices that the above command is not providing the required results. What should Tom do to solve the above problem? 1,Tom should execute the following command:
mcs –debug –-fatal –nowarn:WARNLIST [source-files]
In this code, source-files parameter refers to the name of files that contain the source code of .NET applications.2,Tom should execute the following command:
mcs –-about –L PATH [source-files]
In this code, source-files parameter refers to the name of files that contain the source code of .NET applications. 3,Tom should execute the following command:
mcs –debug –nowarn:WARNLIST –L PATH [source-files]
In this code, source-files parameter refers to the name of files that contain the source code of .NET applications. 4,Tom should execute the following command:
mcs -debug --fatal [source-files]
In this code, source-files parameter refers to the name of files that contain the source code of .NET applications.
1
73Which RPM of mono-1.1.zip file provides development support for IKVM, for the .NET CLR? 1,mono-ikvm-1.1.6-1.novell.6.3.i586.rpm2,mono-jscript-1.1.6-1.novell.6.3.i586.rpm 3,mono-locale-extras-1.1.6-1.novell.6.3.i586.rpm 4,mono-web-1.1.6-1.novell.6.3.i586.rpm
1
74
Which element in the migration checklist for Windows to the Linux platform migration can be exported with the help of the built-in Import/Export feature of Internet Explorer? 1,Outlook Express mails 2,Documents and files 3,Account settings 4,Favorites/Bookmarks/Cookies
4
75Which RPM of mono-1.1.zip file provides development support for Mono tool? 1,mono-data-postgresql 2,mono-data-sqlite 3,mono-devel-1.1.6-1.novell.6.3.i586.rpm4,mono-data-sybase
3
76
Ed Young is a network administrator at Global Systems. The organization implements Linux on all its workstations and servers. Ed wants to open a .zip file on his Linux-based workstation. The file was compressed using the Windows WinZip utility. Therefore, he installs WinZip on his workstation. After installing WinZip, Ed types the following code snippet at the shell prompt to run the WinZip utility:
$ Wine ~/.wine/Program\ Files/WinZip/WINZIP32.EXE ?
However, when Ed executes the snippet, it does not provide the required output. What should Ed do to solve the problem? 1,Ed needs to write the following code snippet:
$ wine drive_c/Program\ Files/WinZip/WINZIP32.EXE ? 2,Ed needs to write the following code snippet:
$ wine /Program\ Files/WinZip/WINZIP32.EXE ? 3,Ed needs to write the following code snippet:
$ wine ~/.wine/drive_c/Program\ Files/WinZip/WINZIP32.TXT ? 4,Ed needs to write the following code snippet:
$ wine ~/.wine/drive_c/Program\ Files/WinZip/WINZIP32.EXE ?
4
77
Steve Irving is working as a network administrator at Deez Inc., a Texas-based organization. To save the licensing costs of the Windows-based applications, the organization decides to migrate from Windows to Linux. Steve is assigned the task of enabling the Windows-based applications to run on the Linux systems. For this, he needs to install Wine, which translates the Windows instructions into its equivalent Linux instructions. To install Wine on Linux using packages with .deb extensions, Steve writes the following code snippet to execute the command at the shell prompt as a root user:
# apt- _0.0.20050419-winehq-1_i386.deb ?
However, while executing the preceding code snippet, Steve notices that the code snippet is not providing the required output. What should Steve do to solve the problem? 1,Steve needs to write the following code snippet:
#apt-get install -winehq-1_i386.deb ? 2,Steve needs to write the following code snippet:
#apt-get install wine_0.0.20050419- ? 3,Steve needs to write the following code snippet:
#apt-get install wine_0.0.20050419-winehq-1_i386.deb ?4,Steve needs to write the following code snippet:
#get install wine_0.0.20050419-winehq-1_i386.txt ?
3
78
Chris Donaldson is an application developer at PQR Inc. The organization is currently working on the Linux platform. The organization receives a new application development project based on the Windows platform. For this, the organization requires developers to work on Windows-based workstations. As a result, Chris needs to migrate and run the Bzip2 Linux application on the Windows-based workstations using SFU. Therefore, Chris downloads the bzip2-1.0.2.tar.gz file from the Internet and saves the file to the local directory of the Windows-based workstation. Then, he enters the following code snippet at the Korn shell prompt to migrate and run the Linux application on Windows platform:
$ gunzip bzip2-1.0.2.tar.gz ?
$ tar -xvf bzip2-1.0.2.tar ?
$ made ?
$ made install ?
However, while executing the preceding code snippet, Chris notices that the code is not providing the required output. What should Chris do to solve the problem? 1,Chris needs to enter the following code snippet:
$ tar -xvf bzip2-1.0.2.tar ?
$ cd
$ make ?
$ make install ? 2,Chris needs to enter the following code snippet:
$ cd 0.2 ?
$ make ?
$ make install ? 3,Chris needs to enter the following code snippet:
$ gunzip bzip2-1.0.2.tar.gz ?
$ tar -xvf bzip2-1.0.2.txt ? 4,Chris needs to enter the following code snippet:
$ gunzip bzip2-1.0.2.tar.gz ?
$ tar -xvf bzip2-1.0.2.tar ?
$ cd bzip2-1.0.2 ?
$ make ?
$ make install ?
4
79
Don Allen is working as a system administrator at Indestructible Boxes, Inc. The organization asks to Don to install Simple Network Management Protocol (SNMP) on a computer in the organization to monitor networks and systems of the organization. To install SNMP, Don downloads the source code of SNMP available in the tar.gz file. Now, what command should Don use to perform the task? 1,# cp snmp-<x>.tar.gz /usr/src ?
# net-snmp-utils-5.0.8-11
# net-snmp-devel-5.0.8-11
# cd /usr/src/snmp-<x> ?
# ./configure ?
# make all ? 2,# cp snmp-<x>.tar.gz /usr/src ?
# cd /usr/src ?
# tar xzvf snmp-<x>.tar.gz ?
# cd /usr/src/snmp-<x> ?
# ./configure ?
# make all ?3,# cp snmp-<x>.tar.gz /usr/src ?
# mv snmpd.conf snmpd.conf.org ?
# tar xzvf snmp-<x>.tar.gz ?
# cd /usr/src/snmp-<x> ?
# service snmpd status ?
# make all ? 4,# cp snmp-<x>.tar.gz /usr/src ?
# cd /usr/src ?
# mv snmpd.conf snmpd.conf.org ?
# cd /usr/src/snmp-<x> ?
# ./configure ?
# make all ?
2
80
Jim Lewis, the network administrator at Simple Solution, implements the Nagios system to monitor the enterprise network. The enterprise provides five mail servers to its employees for retrieving and sending e-mail messages. Jim needs to monitor and manage all the mail servers for better performance. For this, he uses object configuration files to define the Post Office Protocol (POP) service on all the mail servers using the following code:
define service{
use generic-pop
service_description_Check-pop
contact_groups mailadmins1
host_name mailhosts
}
However, Jim observes that the POP service is not defined in the object configuration files. What should Jim do in order to troubleshoot the problem? 1,Jim should use the following code:
define service{
use generic-pop
service_description_Check-pop
contact_groups usergroup1
host_name mailhosts
event_handler eh_pop
}
2,Jim should use the following code:
define service{
use generic-pop
service_description_Check-pop
check_command check_pop
contact_groups usergroup1
event_handler eh_pop
host_name real user
}
3
3,
Jim should use the following code:
define service{
use general
name generic-POP
service_description Check pop
check_command check_pop
event_handler eh_pop
contact_groups mailadmin
}4,
Jim should use the following code:
define service {
use general
name generic-pop
service_description_Check-pop
check_command check_pop
event_handler eh_pop
}
81
Tom Wilkins is the network administrator at Safest Software. He installs Wine to facilitate the execution of Windows-based applications on the Linux platform. Tom wants to enable the employees of the organization to use a parallel port to access Wine whenever they want to execute Windows-based applications on the Linux platform. Therefore, he needs to configure the Wine settings in the configuration file of Wine. Which section of Wine should he configure for the purpose? 1,[ppdev]2,[ports] 3,[x11drv] 4,[afmdirs]
1
82Which command is used to copy the passwd file to ssod directory contained in the /etc/pam.d directory? 1,# cp /etc/pam.d/ssod /etc/pam.d/passwd 2,# cp /etc/pam.d/passwd /etc/pam.d/ssod 3,# mount etc/pam.d/ssod /etc/pam.d/passwd 4,# mount /etc/pam.d/passwd etc/pam.d/ssod
2