q7 Linux Full

175
Pat Greene is working as a network administrator at XYZ Inc. Pat implements a directory service to store data at a centralized location. Pat is informed that: -The authorized users are not able to access the Directory server as a malicious user is identifying the hardware and software environment of the directory server. -After identifying the capacity of the directory server, the malicious user is sending more traffic than what the server can handle. Which technique does this type of attack illustrate? SYN attack Buffer overflow attack Indirect resource consumption Direct resource consumption Jim Lewis wants to migrate a .NET application to a Linux platform. To perform the task, Jim compiles the application on the Windows platform. He then copies the compiled source code of the application to the /usr/src directory of the Linux computer, on which the application will be run. After copying the source code to the /usr/src directory, Jim needs to compile the application source code on the Linux platform. In addition, Jim wants to generate debugging information and ignore the warning messages displayed during the compilation of the source code. What should Jim do to perform the required tasks? Use mcs command with debug and fatal options. Use mono command with security and v option Use mcs command with debug and nowarn options. Use mono command with aot and config filename options. Technology Systems is an IT organization based at Atlanta. The organization decides to open a new development center at Florida. The management of the organization asks John Barrett, the network administrator, to configure a mail server at this new center. For this, John needs to install send-email packages. John observes that the binary RPM package for send-email package is not available on the network, however, the Source RPM (SRPM) package is available. Therefore, John decides to build binary RPM package from SRPM. What should John do to perform the task?

description

linux

Transcript of q7 Linux Full

Page 1: q7 Linux Full

Pat Greene is working as a network administrator at XYZ Inc.

Pat implements a directory service to store data at a centralized

location. Pat is informed that:

-The authorized users are not able to access the Directory server as

a malicious user is identifying the hardware and software environment

of the directory server.

-After identifying the capacity of the directory server, the

malicious user is sending more traffic than what the server can

handle.

Which technique does this type of attack illustrate?

SYN attack

Buffer overflow attack

Indirect resource consumption

Direct resource consumption

Jim Lewis wants to migrate a .NET application to a Linux platform. To

perform the task, Jim compiles the application on the Windows

platform. He then copies the compiled source code of the application

to the /usr/src directory of the Linux computer, on which the

application will be run. After copying the source code to the

/usr/src directory, Jim needs to compile the application source code

on the Linux platform. In addition, Jim wants to generate debugging

information and ignore the warning messages displayed during the

compilation of the source code. What should Jim do to perform the

required tasks?

Use mcs command with debug and fatal options.

Use mono command with security and v option

Use mcs command with debug and nowarn options.

Use mono command with aot and config filename options.

Technology Systems is an IT organization based at Atlanta. The

organization decides to open a new development center at Florida. The

management of the organization asks John Barrett, the network

administrator, to configure a mail server at this new center. For

this, John needs to install send-email packages. John observes that

the binary RPM package for send-email package is not available on the

network, however, the Source RPM (SRPM) package is available.

Therefore, John decides to build binary RPM package from SRPM. What

should John do to perform the task?

Page 2: q7 Linux Full

Execute rpmbuild –bSTAGE [options] /usr/src/redhat/SRPMS

Execute rpmbuild –bSTAGE [options] /usr/src/redhat/SPECS

Execute rpmbuild –bSTAGE [options] /usr/src/redhat/SOURCES

Execute rpmbuild –bSTAGE [options] /usr/src/redhat/BUILD

Technology Systems is a .NET applications development organization,

based in the US. The organization uses the Window platform for

developing .NET applications. To provide more security to the .NET

applications, the organization asks to Tom Wilkins, the network

administrator, to migrate the .NET applications to the Linux

platform. The organization also asks to Tom to precompile the code in

an assembly language. To perform the task, Tom compiles the source

code of the .NET application to generate the .exe file, named

temp.exe. Now, to execute the .NET application, Tom uses following

the code snippet:

# mono-config filename sample.exe

However, Tom finds that the above code snippet is not giving the

desired results. What should Tom do to solve the problem?

Tom should use the following:

# mono-V sample.exe

Tom should use the following:

# mono--aot sample.exe

Tom should use the following:

# mono--security sample.exe

Tom should use the following:

# mono--config filename sample.exe

Larry Williams is working as a system administrator at BlueMoon

Computers. Larry observes that the performance of the server is

decreasing as the users in the organization are excessively querying

one section, employee information, of the server. The management,

therefore, asks Larry to distribute the directory to improve the

performance of the server. After distributing a directory, such that

Server1 maintains the information about the organizational

information while the employee information is maintained by Server2.

Now, Larry needs to verify the correctness of the data stored in

Server2. For this, Larry executes the following command:

Page 3: q7 Linux Full

# slapcat -H –C ldap://Server2.bluemooncomputers.com/ -LL -x -b

"dc=bluemooncomputers,dc=com" "(ou=*)" ou

However, Larry is not able to retrieve results from the Server2,

which contains the employee information. What should Larry do to

perform the required task?

Use

# ldapsearch -H –C ldap://Server2.bluemooncomputers.com/ -LL -x -b

"dc=bluemooncomputers,dc=com" "(ou=*)" ou command

Use

# slapindex -H –C ldap://Server2.bluemooncomputers.com/ -LL -x -b

"dc=bluemooncomputers,dc=com" "(ou=*)" ou command

Use

# slapadd -H –C ldap://Server2.bluemooncomputers.com/ -LL -x -b

"dc=bluemooncomputers,dc=com" "(ou=*)" ou command

Use

# slapcat -c –H ldap://Server2.bluemooncomputers.com/ -LL -x -b

"dc=bluemooncomputers,dc=com" "(ou=*)" ou command

Ed Young is a network administrator at Global Systems. The

organization implements Linux on all its workstations and servers. Ed

wants to open a .zip file on his Linux-based workstation. The file

was compressed using the Windows WinZip utility. Therefore, he

installs WinZip on his workstation. After installing WinZip, Ed types

the following code snippet at the shell prompt to run the WinZip

utility:

$ Wine ~/.wine/Program\ Files/WinZip/WINZIP32.EXE ?

However, when Ed executes the snippet, it does not provide the

required output. What should Ed do to solve the problem?

Ed needs to write the following code snippet:

$ wine ~/.wine/drive_c/Program\ Files/WinZip/WINZIP32.TXT ?

Ed needs to write the following code snippet:

$ wine drive_c/Program\ Files/WinZip/WINZIP32.EXE ?

Ed needs to write the following code snippet:

$ wine /Program\ Files/WinZip/WINZIP32.EXE ?

Ed needs to write the following code snippet:

$ wine ~/.wine/drive_c/Program\ Files/WinZip/WINZIP32.EXE ?

Page 4: q7 Linux Full

Consider the statements:

Statement A:

The BOOTP server contains the information about the configuration of

the computers on which Linux needs to be installed.

Statement B:

During the Kickstart installation of Linux over a network, the

Kickstart client needs to have either the network information or the

files required for installing the Linux operating system.

Which of the following is true, with respect to the above

statements?

Both, statements A and B, are false.

Statement A is false and statement B is true.

Statement A is true and statement B is false.

Both, statements A and B, are true.

Which ACLs configuration parameter disables all the permissions of

the authorized users accessing the OpenLDAP server?

Write

Compare

Auth

None

Tom Wilkins is working as network administrator at Quality Software

Developers. All workstations and servers in the organization form a

Local Area Network (LAN). Tom wants to implement a Red Hat Network

(RHN) to manage these systems. He needs to configure a server to

enable the RHN and LAN users to exchange information, such as

software updates and solutions to software related problems, even

when the users are offline. He also wants to prevent unauthorized

access to the LAN servers. What should Tom do to accomplish this

task?

Tom should configure a Firewall server.

Tom should configure a Proxy server.

Tom should configure a Satellite server.

Tom should configure a Hosted server.

Nancy Jones the network administrator at Technology Systems is

responsible for monitoring the network of the organization. While

Page 5: q7 Linux Full

monitoring the network, Nancy observes that the RPM packages

installed on the Linux servers are of an older version than required

and do not provide required functionalities. Therefore, Nancy decides

to install an updated version of the RPM packages. For this, Nancy

downloads a new RPM package, but observes that the package

installation files are not executing properly. What should Nancy do

to solve the problem?

Run the ethereal command at the shell prompt

Run the strace command at the shell prompt

Run the tcpdump command at the shell prompt

Run the itrace command at the shell prompt

Technology Systems is a leading developer of computer applications.

The organization has its head office in California and two branch

offices in New York and Toronto. There are three departments in the

organization: Marketing, Programming, and Accounting. The Programming

department is divided into two groups, Windows group and Linux group.

The branch offices are connected to the head office by a 56 Kbps

leased line. Now, each branch office runs as a separate entity, with

its own network, reporting structure, and constraints. The

organization has no centralized IT management group, and separate

administrators at each branch office manage the network. Since the

organization has multiple servers but no centralized management of

the information, it faces the data-related problems, such as data

redundancy and data inconsistency.

To avoid these data-related problems in the organization, Jim Lewis,

the system administrator at the head office, decides to install and

configure the OpenLDAP Directory service. Through the use of OpenLDAP

Directory service, Jim wants to provide authentication service in the

organization.

This authentication service authenticates the employees to the

directory server by providing the employees encrypted tickets for a

short duration. During the period when the ticket is valid, an

employee can access the directory service without providing a

password.

Now, to implement the above authentication mechanism, which

prerequisite software package must be installed and configured by Jim

before installing OpenLDAP, and what is the command entered by Jim to

install the prerequisite software package?

Page 6: q7 Linux Full

Jim must install the Kerberos software package

Jim must enter the following command to install Kerberos:

# rpm –qa | grep krb5-server

Jim must install the Kerberos software package

Jim must enter the following commands to install Kerberos:

# rpm –ivh krb5-server-1.2.7-19.i386.rpm

# rpm –ivh pam_krb5-1.70-1.i386.rpm

# rpm –ivh krb5-libs-1.2.7-19.i386.rpm

# rpm –ivh krb5-devel-1.2.7-19.i386.rpm

# rpm –ivh krb5-workstation-1.2.7-19.i386.rpm

Jim must install the SASL software package

Jim must enter the following commands to install SASL:

# rpm –ivh cyrus-sasl-md5-2.1.15-3.i386.rpm

# rpm –ivh cyrus-sasl-plain-2.1.15-3.i386.rpm

# rpm –ivh cyrus-sasl-2.1.15-3.i386.rpm

# rpm –ivh cyrus-sasl-gssapi-2.1.15-3.i386.rpm

# rpm –ivh cyrus-sasl-devel-2.1.15-3.i386.rpm

Jim must install the OpenSSL software package.

Jim must enter the following commands to install OpenSSL:

# rpm –ivh openssl-0.9.7a-22.1.i386.rpm

# rpm –ivh openssl-devel-0.9.7a-22.1.i386.rpm

# rpm –ivh openssl096b-0.9.6b-13.i386.rpm

Which of the following Bugzilla feature helps in searching and

displaying the identified bug in the bug lists of the bug tracking

system?

Localization

Request System

Enterprise group support

Sanity check

Tom Wilkins is working as a system administrator at SSPT Corporation.

To provide communication between these branch offices, Tom needs to

provide an e-mail facility and shared Internet access in the

organization. For this, he needs to update the Linux kernel of a

server to embed the required services into the existing communication

system. After updating, he needs to configure the kernel source code,

which is of very large size. He also needs to compile the kernel

Page 7: q7 Linux Full

source and resolve all the dependencies after configuring the kernel

source code as required. He also wants to remove all the unused

files. What should Tom do to accomplish this task?

Tom should use the following commands:

#make oldconfig

# make zImage

# make modules_install

Tom should use the following commands:

# make oldconfig

# make xconfig

# make install

Tom should use the following commands:

# make dep

# make bzImage

Tom should use the following commands:

# make menuconfig

#make oldconfig

#make mrproper

Safest Software Co. is a multinational company that has opened its

new branch at New York. The company needs to maintain the data of all

the employees in a directory to reduce all data related problems,

such as data redundancy and to allow the employees of the company to

view the data. The company assigns the task of deploying a directory

server in the company to the system administrator, Tom Wilkins. Tom

deploys OpenLDAP server to perform the task and decides to configure

the overall performance of the OpenLDAP server, such as size of log

files and connection timeout value. Tom uses a parameter that allows

him to enable or disable a specific set of users from accessing a set

of attributes or entries on the OpenLDAP server. Which parameter does

Tom use to perform the desired task?

access to<what> [ by <who> <access> <control> ]-

access to<what> [ by <who> <access> <control> ]+

Nodefaultaccess { none | auth | compare | search | read | write}

defaultaccess { none | auth | compare | search | read | write}

Donna Bard is working as a system engineer at ABC corp. The company

uses LDAP directory schema to reduce data redundancy problems and to

maintain data integrity. This directory stores the record of

Page 8: q7 Linux Full

employees,such as name, age, and year of birth. Now, the company

assigns a task to Donna to design a new object class, myPerson, which

is extended from the existing object class, inetOrgPerson. The

company also asks donna to define a new attribute type, dob, in the

my Person object class. The attribute type, dob, stores the date of

birth of the employees of the company. Donna uses the following code

snippet to define the dob attribute type and the object class,

myPerson, respectively:

1.) ( dob-OID NAME DESC 'birthday day-month'

EQUALITY caseIgnoreMatch SUBSTR

caseIgnoreSubstringsmatch SYNTAX ‘bob’ 1.3.6.1.4.1.1466.115.121.1.15

)

2.)

( myPerson-OID NAME 'myPerson' DESC 'Extended person' SUP

inetOrgPerson

STRUCTURAL MAY dob )

But, Donna finds that the above code snippet is not producing the

required results. What code snippet should Donna use to perform the

task?

1.) ( dob-OID NAME 'dob' DESC 'birthday day-month'

EQUALITY caseIgnoreMatch SUBSTR

caseIgnoreSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.1

15.121.1.15 )

2.)

( myPerson-OID NAME 'myPerson' DESC 'Extended person' SUP

inetOrgPerson

STRUCTURAL MAY dob )

1.) ( dob-OID NAME 'dob' DESC EQUALITY caseIgnoreMatch

SUBSTR

caseIgnoreSubstringsMatch 1.3.6.1.4.1.1466.115.121.1.15 )

2.)

( myPerson-OID NAME 'myPerson' DESC 'Extended person' SUP

inetOrgPerson

STRUCTURAL MAY dob )

1.) ( dob-OID NAME 'dob' DESC 'birthday day-month'

Page 9: q7 Linux Full

EQUALITY caseIgnoreMatch SUBSTR

caseignoresubstringsmatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )

2.)

( myPerson-OID NAME 'myPerson' DESC 'implementing person' SUP

inetOrgPerson

STRUCTURAL MAY dob )

1.) ( dob-OID NAME 'dob' DESC 'birthday day amd month'

EQUALITY caseIgnoreMatch SUBSTR

caseIgnoresubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )

2.)

( myPerson-OID NAME DESC 'Extended person' SUP inetOrgPerson

,myname,

STRUCTURAL MAY dob )

Pat Greene is working, as a network administrator at Global Systems

inc. The LDAP directory on the network server contains the

information of the employees in the organization. Pat needs to add an

entry of an employee in the LDAP directory from an LDIF file named

temp1.ldif. Pat, therefore, uses the following command:

# slapadd –d temp1.ldif

However, he is not able to add the entry. Which of the following

commands will enable Pat to perform the required task?

# slapmodify –f temp1.ldif

# slapadd –u

# slapdelete –l temp1.ldif

# slapadd –l temp1.ldif

Pat Wilkins is a system administrator with the Red Sky IT Systems.

ABC Books, a client of the company, is an online bookstore, which

stores information about books in a directory. The directory is

accessed by multiple directory-enabled applications and accessed by

multiple users. Tom Allen, the Business Manager at ABC Books, wants

to expand company’s business in the global market. To manage the

increasing load required on the existing directory service, Tom

directs Pat to create a new directory service. To implement the

directory, Pat needs to install a software package called OpenLDAP.

However, Pat finds that he needs to install a package called OpenSSL

before installing OpenLDAP. To verify whether OpenSSL is already

installed on the node, Pat enters the following command at the shell

Page 10: q7 Linux Full

prompt:

# rpm –ivh openssl-0.9.7a-22.1.i386.rpm

However, Pat notices that the command is not producing required

results. What should Pat do to solve the problem?

Pat needs to enter the following command at the shell prompt:

# rpm –ivh openssl096b-0.9.6b-13.i386.rpm

Pat needs to enter the following command at the shell prompt:

# rpm –ivh openssl-devel-0.9.7a-22.1.i386.rpm

Pat needs to enter the following command at the shell prompt:

# rpm –qa | grep openssl

Pat needs to enter the following command at the shell prompt:

# rpm –qa grep openssl

Smartdevelopers is a leading software development organization. The

organization maintains an LDAP Directory server to store information

about employees of the organization. To enhance the security of the

LDAP Directory server, Ronald Billing, the system administrator,

needs to configure the LDAP Directory server to support Kerberos

authentication. For this, Ronald needs to create Kerberos service

principals for the LDAP server and extract them to a keytab file.

What should Ronald do to perform the above task?

Ronald should execute the following commands:

# kadmin addprinc –randkey ldap/smartdevelopers.com

# ktadd –k /etc/openldap/ldap.keytab ldap/smartdevelopers.com

# chgrp ldap /etc/openldap/ldap.keytab

# chmod 640 /etc/openldap/ldap.keytab

Ronald should execute the following commands:

# kadmin addprinc –randkey ldap/smartdevelopers.com

# ktadd –k /etc/openldap/ldap.keytab ldap/smartdevelopers.com

Ronald should execute the following commands:

# chgrp ldap /etc/openldap/ldap.keytab

# chmod 640 /etc/openldap/ldap.keytab

Ronald should execute the following commands:

# ktadd –k /etc/openldap/ldap.keytab ldap/smartdevelopers.com

# chgrp ldap /etc/openldap/ldap.keytab

# chmod 640 /etc/openldap/ldap.keytab

Which RPM of mono-1.1.zip file provides development support for IKVM,

for the .NET CLR?

mono-ikvm-1.1.6-1.novell.6.3.i586.rpm

Page 11: q7 Linux Full

mono-jscript-1.1.6-1.novell.6.3.i586.rpm

mono-locale-extras-1.1.6-1.novell.6.3.i586.rpm

mono-web-1.1.6-1.novell.6.3.i586.rpm

Ken Burton is working as a network administrator at SuperGraphics

Inc. The organization has implemented an LDAP server to enable the

access to employee information of the organization. The management

asks Ken to add entry of a new employee, Steve, to the LDAP

directory. Ken wants to specify the input file from where the entry

is added to the LDAP directory. In addition, Ken wants that new entry

be added only when the password is correctly entered. Which of the

following commands should Ken use to perform the required tasks?

ldapadd command with –c and –r option

ldapadd command with –k and –v option

ldapmodify command with –a and –b option

ldapadd command with –f filename and –W option

SmartLabs is a multi national company that has 78 branches across the

world. The company maintains a directory server for storing all the

information about the company’s product. Clients of the company

access the directory server to obtain information about the products.

The directory server has come under frequent hacking attacks in the

past few months. This has led to hackers stealing and changing the

confidential information stored on the server. Debbie Howe, the

system administrator at SmartLabs, is assigned the task to provide

security to the directory server from the hackers.

For this, Debbie divides the data into various categories depending

on the frequency of access to the data and the degree of loss to the

company if the data is modified. Now, Debbie assigns various priority

levels to the various categories of data.

Which possible security consideration is Debbie implementing to

provide security to the directory server?

Administration of Identifying the Security Requirements of a

Directory

Sensitivity of data of Identifying the Security Requirements of a

Directory

User community of Understanding the Environment of the

Organization

Directory accessibility of Understanding the Environment of the

Organization

Page 12: q7 Linux Full

Pat Greene, the network administrator, at InfoSuper Corp. The

organization needs to implement data encryption and authentication

protocols for user and file level security. The management,

therefore, decides to implement Linux operating system for all

business purposes. Pat installs Linux operating system on all the

computers in the network of the organization. Pat is using kickstart

installation method to automate installation. While deploying Linux

operating system Pat gets an error message stating that “ks.cfg file

not accessible”. What should Pat do to solve the problem?

Pat needs to check for the mouse parameter and mention it in your

ks.cfg file.

Pat needs to check if the CD-ROM is in readable mode and that you

have made the CD-ROM bootable.

Pat needs to use the recent version of boot image file.

Pat needs to need to check the path at root prompt or the

directory name should be correct and accurate

To set up the primary Kerberos server, you need to create the

Kerberos database. Which command do you use to create the Kerberos

database?

# /usr/kerberos/kdb5_util create –s

# /usr/kerberos/kadmin5.local –q “addprinc ronald/admin”

# /usr/kerberos/sbin/kadmin5.local –q “addprinc ronald/admin”

# /usr/kerberos/sbin/kdb5_util create –s

Certified Carriers is an established computer-training institute,

based in New Jersey. The institute has launched a new course on Linux

administration that has been very successful. Therefore, the

management wants to launch two new batches within the next week. For

this, Corrine Wallace, the network administrator, needs to set up 60

Linux workstations.

Corrine wants to use Kickstart installation that enables automatic

installation of the operating systems on several computers

simultaneously. To use Kickstart installation, Corrine needs to set

up an installation sever, such as NFS server, or Apache server. While

setting up NFS server, Corrine wants to copy the Linux installation

files to the NFS shared directory.

What of the following sequence of command, should Corrine follow to

perform the task?

Page 13: q7 Linux Full

Run the following command sequentially:

# mkdir /mnt/install ?

# mount /dev/cdrom /mnt/cdrom ?

# cp –ar /mnt/cdrom/RedHat /var/www/html/install ?

# cp /mnt/cdrom/.discinfo /mnt/install ?

# umount /mnt/cdrom ?

# mount /dev/cdrom /mnt/cdrom ?

# cp –ar /mnt/cdrom/RedHat/RPMS /mnt/install ?

# umount /mnt/cdrom ?

# mount /dev/cdrom /mnt/cdrom ?

# cp –ar /mnt/cdrom/RedHat/RPMS /mnt/install ?

Run the following command sequentially:

# mkdir /mnt/install ?

# mount /dev/cdrom /mnt/cdrom ?

# cp –ar /mnt/cdrom/RedHat /mnt/install ?

# cp /mnt/cdrom/.discinfo /mnt/install ?

# umount /mnt/cdrom ?

# mount /dev/cdrom /mnt/cdrom ?

# cp –ar /mnt/cdrom/RedHat/RPMS /mnt/install ?

# umount /mnt/cdrom ?

# mount /dev/cdrom /mnt/cdrom ?

# cp –ar /mnt/cdrom/RedHat/RPMS /mnt/install ?

Run the following command sequntially:

# mkdir /mnt/install ?

# mount /dev/cdrom /mnt/cdrom ?

# cp /mnt/cdrom/.discinfo /mnt/install ?

# cp /mnt/cdrom/.discinfo /mnt/install ?

# umount /mnt/cdrom ?

# mount /dev/cdrom /mnt/cdrom ?

# cp –ar /mnt/cdrom/RedHat/RPMS /mnt/install ?

# umount /mnt/cdrom ?

# mount /dev/cdrom /mnt/cdrom ?

# cp –ar /mnt/cdrom/RedHat/RPMS /mnt/install ?

Run the following command sequentially:

# mkdir /mnt/install ?

# mount /dev/cdrom /mnt/cdrom ?

# cp –ar /mnt/cdrom/RedHat /var/ftp/pub/install ?

# cp /mnt/cdrom/.discinfo /mnt/install ?

Page 14: q7 Linux Full

# umount /mnt/cdrom ?

# mount /dev/cdrom /mnt/cdrom ?

# cp –ar /mnt/cdrom/RedHat/RPMS /mnt/install ?

# umount /mnt/cdrom ?

# mount /dev/cdrom /mnt/cdrom ?

# cp –ar /mnt/cdrom/RedHat/RPMS /mnt/install ?

Chris Donaldson is working as a system administrator at Red-Eye

Experts. The organization uses different directories supplied by

different vendors to store the data pertaining to the clients of the

organization. The organization needs to integrate the directories

with each other to facilitate data sharing. Chris attempts to

integrate the directories, however the inconsistency and

synchronization issues between data arise. Chris finds that the

synchronization issues arise because the data stored in either of the

directories can be modified without notifying the changes to the

other directories. Therefore, the data stored in the directories

becomes inconsistent due to these changes. What should Chris do to

resolve the issues?

By replicating the data from one directory to another.

By joining and storing the information present in different

directories on different platforms in a common and logical directory

By converting one protocol format to another

By integrating the distinct, isolated information stored at

different places into one common logical volume

Global Systems is a software development organization. Pat Greene,

the network administrator, has used the Kickstart installation method

to automatically configure workstations and servers according to the

requirement of the organization. Which feature of the provisioning

module does Pat use?

Existing state provisioning

Bare metal provisioning

Configuration management

Kickstart configuration writer

Chris Donaldson is working as a system administrator at SuperGraphics

Inc. Chris needs to integrate the samba with OpenLDAP to store the

user information. Chris adds a new user Ronald in the OpenLDAP

directory. Which command should Chris use to verify the existence of

Page 15: q7 Linux Full

user, Ronald in the OpenLDAP directory?

# /usr/local/sbin/smbldap-usershow.pl ronald

# smbldap-usershow.pl ronald

# /usr/local/sbin/smbldap-usershow.pl

# /usr/local/sbin/smbldap-usershow ronald

Larry Williams is working as a system administrator at SSPT

Corporation, which is a leading developer of computer applications.

The organization has various departments and each department

maintains its own database for storing information about the

employees. Since information is stored in multiple data sources, the

employees need to access several data sources for searching and

retrieving information. This leads to data related problems, such as

data redundancy and data inconsistency.

To solve the data related problems, Larry decides to configure a

directory service to centrally manage the data of the organization.

Larry first creates a data design of the organization. She needs to

specify the permissions of the directory-enabled applications

installed in the organization, to update the data entries stored in

the directory. She also needs to specify the authentication level for

accessing the directory, for the various employees. What should Larry

do to perform the above tasks?

Define the data access and the data replication policies.

Define a simple process for handling exceptions to the general

policies.

Define the data sources and data elements to be included in the

Directory.

Define the data access and data modification policies for the data

stored in the Directory.

Which option can be used with the scp command to recursively copy all

subdirectories and files in the source directory to the destination

directory?

-q

-r

-p

-v

Which attribute of the migrate_common.ph file is used to customize

the mail domain in the mail attribute in the migrate_passwd.pl

Page 16: q7 Linux Full

script?

$DEFAULT_BASE

$EXTENDED_SCHEMA

$DEFAULT_MAIL_DOMAIN

NAMINGCONTEXT

Global Systems is a software development organization that provides

customized software solutions. The organization uses

kernel-2.4.21-4.EL on its Linux server. The management of the

organization decides to upgrade the existing kernel to kernel-2.4.24

to enhance security and to acquire new hardware support. Pat Greene,

the system administrator is assigned the task of upgrading the Linux

kernel.

After downloading the.tar.gz file containing the source code of the

kernel in /usr/src directory, Pat needs to install the kernel source

code.

What should Pat do to perform the task?

Pat needs to execute the following code snippet:

# cd /usr/src

# tar -zxcf linux-2.4.24.gz

# cd linux-2.4.24

# ls –al

Pat needs to execute the following code snippet:

# cd /src

# tar -zxvf linux-2.4.24.tar.gz

# cd linux-2.4.24

# ls –l

Pat needs to execute the following code snippet:

# cd /usr/src

# tar -zxvf linux-2.4.24.tar.gz

# cd linux-2.4.24

# ls –al

Pat needs to execute the following code snippet:

# cd /usr/src

# tar linux-2.24.tar.gz

# cd linux-2.4.24

# ls –al

Which attribute in the sambaAccount object, used to store the Samba

related information in OpenLDAP, specifies the time when the

Page 17: q7 Linux Full

lmpassword and ntpassword are last modified?

SambaLMPassword

SambaNTPassword

SambaPwdLastSet

SambaLogonScript

Pat Greene is working as a system administrator at InfoSuper Corp.

The management asks Pat to migrate user information from the NIS

server configured in the network of the organization to the OpenLDAP

server configured on the same host. Pat needs to add user accounts

and groups information contained in the LDIF format to the OpenLDAP

database. What should Pat do to perform the required task?

Create a file infosuper.ldif in the /tmp directory

Specify the domain and base of your network in the

/usr/share/openldap/migration/migrate_common.ph file.

Edit the values of the DEFAULT_MAIL_DOMAIN and DEFAULT_BASE

parameters

Edit the migrate_common.ph file

Which commands is used to set execute permission for /usr/bin/ssod

directory?

# mount 192.168.0.52:/list /usr/bin/ssod

# service /mnt/nfs1

# ls /mnt/nfs1

# chmod +x /usr/bin/ssod

Pat Greene is working as a network administrator at XYZ Inc.

that has many offices at different locations. Pat wants to

implement a Directory service in the company to store data at a

centralized location. This enables Pat to access different directory

services at a particular location in the network. Clients also access

the directory. For security reasons, he also wants to restrict the

clients and employees in a particular subnet from accessing important

data in the directory. He also wants to specify the time intervals

within which authorized users would be able to access the directory.

What should Pat do to accomplish this task?

Create replicas of the directory

Implement Access Control List (ACL)

Partition the directory

Implement Microsoft Metadirectory Service (MMS).

Page 18: q7 Linux Full

company has a network of Linux- based computers at its offices. Each

server provides a specific amount of memory space that can be shared

among multiple users. Ron needs to increase the amount of shared

memory in the server for additional users at the new branch office.

The users at the new branch office need to use the shared memory and

run processes on the servers. How should Ron modify the parameters on

the Linux server to add the users from the new branch office?

John needs to modify the min_percent parameter in the /proc/sys/vm

directory and the shmmall parameter in the /proc/sys/kernel.

John needs to modify the threads-max parameter in the

/proc/sys/kernel and the max_percent parameter in the /proc/sys/vm.

Ron needs to edit the shmmin parameter in the

/proc/sys/kernel/shmmin file and threads-max parameter, stored in the

/proc/sys/kernel.

Ron needs to edit the shmmax parameter in the

/proc/sys/kernel/shmmax file and threads-max parameter, stored in the

/proc/sys/kernel.

Don Allen is working as a network administrator at Technology Systems

that provides software solutions to its customers. The enterprise

maintains 100 database servers. Don needs to monitor free disk space

and load average on these database servers. Therefore, he configures

the Nagios monitoring tool in the enterprise and defines hosts and

services that are to be monitored on the network. However, he

observes that when any of the servers are not available on the

network, he does not get any alerts and notifications regarding these

network failures. Therefore, he is not able to resolve these failures

on time, which is affecting the network performance. What should Don

do to resolve the issue?

Don should specify the maximum number of times to recheck failures

using the max_check_attempts attribute while defining the hosts.

Don should specify the time period for notification using the

notification_period attribute while defining the hosts.

Don should specify the time period to repeat failure notifications

using the notification_interval attribute while defining the hosts.

Don should enable the host event handler using the

event_handler_enabled attribute while defining the hosts.

Page 19: q7 Linux Full

Don Allen is working as a system administrator at Indestructible

Boxes, Inc. The organization asks to Don to install Simple Network

Management Protocol (SNMP) on a computer in the organization to

monitor networks and systems of the organization. To install SNMP,

Don downloads the source code of SNMP available in the tar.gz file.

Now, what command should Don use to perform the task?

# cp snmp-<x>.tar.gz /usr/src ?

# cd /usr/src ?

# tar xzvf snmp-<x>.tar.gz ?

# cd /usr/src/snmp-<x> ?

# ./configure ?

# make all ?

# cp snmp-<x>.tar.gz /usr/src ?

# net-snmp-utils-5.0.8-11

# net-snmp-devel-5.0.8-11

# cd /usr/src/snmp-<x> ?

# ./configure ?

# make all ?

# cp snmp-<x>.tar.gz /usr/src ?

# mv snmpd.conf snmpd.conf.org ?

# tar xzvf snmp-<x>.tar.gz ?

# cd /usr/src/snmp-<x> ?

# service snmpd status ?

# make all ?

# cp snmp-<x>.tar.gz /usr/src ?

# cd /usr/src ?

# mv snmpd.conf snmpd.conf.org ?

# cd /usr/src/snmp-<x> ?

# ./configure ?

# make all ?

Pat Greene is working as a system administrator at SuperGraphics Inc.

Pat is assigned the task to migrate the information about the hosts

contained in NIS network to LDIF format using perl scripts. Which

perl scripts should Pat use to accomplish the task?

migrate_netgroup.pl

migrate_networks.pl

migrate_group.pl

migrate_hosts.pl

Page 20: q7 Linux Full

John Barrett is the network administrator at Quality Software

Developers. He needs to run the Windows applications on the Debian

Linux platform. He also needs to ensure that the execution of the

Windows applications should not stop because of the incompatible

instructions of Windows-based application with Linux applications.

Therefore, he decides to install a prepackaged version of Wine, which

is a program that translates the instructions of the Window

application into its equivalent Debian Linux instructions. Which

command should he use to perform the task?

# get-apt install wine_0.0.20050419-winehq-1_i386.deb

# apt-get install wine_0.0.20050419-winehq-1_i386.deb

# get-rpm install wine_0.0.20050419-winehq-1_i386.deb

# rpm-get install wine_0.0.20050419-winehq-1_i386.deb

Donna Bard, the system administrator at Quality Software Developers,

wants to backup sensitive data of the organization regularly. For

this, Donna decides to implement Redundant Array of Inexpensive Disks

(RAID) on the Linux server. Donna wants to delete some partitions on

the server to create the RAID disks.

Donna uses fdisk utility to delete the offline partitions and does

not delete any extended partitions. However, Donna observes that the

server is unable to delete these partitions. What should Donna Do to

solve the problem?

Donna should also delete the extended partitions.

Donna should delete all the logical partitions.

Donna should use the umount command to delete the partitions.

Donna should use any third party tool to delete the specified

partitions.

Pat Greene is working as a system administrator at SuperGraphics Inc.

Pat is assigned the task to migrate the information about the hosts

contained in NIS network to LDIF format using perl scripts. Which

perl scripts should Pat use to accomplish the task?

migrate_group.pl

migrate_netgroup.pl

migrate_hosts.pl

migrate_networks.pl

Page 21: q7 Linux Full

Which value for the STAGE argument in the rpmbuild command unpacks

the source code and applies patches?

b

c

p

a

Tom Wilkins works as a system administrator in EarthenWares that

provides Web services to its customers. The organization wants to

upgrade its Linux-based web servers to provide enhanced security

features. The new version of Linux does not support some of the

applications running on the web servers. It also does not provide

some security features, which are required. What should he do to

update the web servers?

Upgrade the kernel using RPM and configure kernel using make

oldconfig command

Upgrade the kernel by applying patches and configure the kernel

using make oldconfig command

Upgrade the kernel by customizing the source code of new version

and configure the kernel using make xconfig command

Upgrade the kernel by applying patches and configure the kernel

using make menuconfig command

Corrine Wallace is working as a network administrator at SSPT

Corporation. The organization has the Linux operating system

installed on its servers and workstations. The management of the

organization asks Corrine to upgrade the Linux kernel to implement

the enhanced security features available. Corrine downloads the

source code from the Internet and configures the kernel source code

on the one of the main servers.

After configuring the kernel source code, Corrine compiles the

source code and installs the kernel. However, the server fails to

boot.

What should Corrine do to solve the problem?

Use /etc/sysconfig/grub utility to specify the device from which

the server boots

Use /etc/sysconfig/syslog utility to specify the device from which

Page 22: q7 Linux Full

the server boots

Use /etc/sysconfig/samba utility to specify the device from which

the server boots

Use /etc/sysconfig/ sendmail utility to specify the device from

which the server boots

Smartdevelopers is a leading software development organization. The

organization maintains an LDAP Directory server to store information

about employees of the organization. To enhance the security of the

LDAP Directory server, Ronald Billing, the system administrator,

needs to configure the LDAP Directory server to support Kerberos

authentication. For this, Ronald needs to create Kerberos service

principals for the LDAP server and extract them to a keytab file.

What should Ronald do to perform the above task?

Ronald should execute the following commands:

# kadmin addprinc –randkey ldap/smartdevelopers.com

# ktadd –k /etc/openldap/ldap.keytab ldap/smartdevelopers.com

# chgrp ldap /etc/openldap/ldap.keytab

# chmod 640 /etc/openldap/ldap.keytab

Ronald should execute the following commands:

# chgrp ldap /etc/openldap/ldap.keytab

# chmod 640 /etc/openldap/ldap.keytab

Ronald should execute the following commands:

# kadmin addprinc –randkey ldap/smartdevelopers.com

# ktadd –k /etc/openldap/ldap.keytab ldap/smartdevelopers.com

Ronald should execute the following commands:

# ktadd –k /etc/openldap/ldap.keytab ldap/smartdevelopers.com

# chgrp ldap /etc/openldap/ldap.keytab

# chmod 640 /etc/openldap/ldap.keytab

Tom Wilkins is working as a network administrator at Blue Valley

Consulting. The employees of the organization’s Software Development

department develop .NET applications for their clients. Now, the

organization migrates to the Linux platform to avoid the cost of

licensing in Windows. As a result, the employees now need to migrate

the .NET applications to the Linux platform. Tom decides to use the

Mono tool to allow migration of the .NET applications to the Linux

platform. He first compiles the .NET applications on the Windows

platform. He then copies the compiled source code of the application

to the /usr/src directory on Linux platform. Now, he needs to compile

the application source code on the Linux platform. For this, he

Page 23: q7 Linux Full

decides to use the mcs command. During compilation, he wants to

generate the exceptions that the debugger can catch. He also wants to

generate the debugging information but ignore the warning messages.

To perform the above tasks, Tom executes the following command:

mcs –debug -nowarn:WARNLIST

However, Tom notices that the above command is not providing the

required results. What should Tom do to solve the above problem?

Tom should execute the following command:

mcs –debug –nowarn:WARNLIST –L PATH [source-files]

In this code, source-files parameter refers to the name of files

that contain the source code of .NET applications.

Tom should execute the following command:

mcs –debug –-fatal –nowarn:WARNLIST [source-files]

In this code, source-files parameter refers to the name of files

that contain the source code of .NET applications.

Tom should execute the following command:

mcs –-about –L PATH [source-files]

In this code, source-files parameter refers to the name of files

that contain the source code of .NET applications.

Tom should execute the following command:

mcs -debug --fatal [source-files]

In this code, source-files parameter refers to the name of files

that contain the source code of .NET applications.

Donna Johnson is an HR Manager at ABC Inc. Donna uses a shell script,

Attendance.sh to extract the attendance of each team member for a

particular month from the Attendance.txt file. The Attendance file

includes six columns, Employee Code, Employee Name, TL Code, TL Name,

In Time, and Out Time.

Donna needs to save and display the attendance records of team

members working on a new project. Donna also wants to run the

Attendance.sh shell script on a Windows-based machine. To perform

this task, Donna performs the following steps:

Enters the following command at the Korn shell prompt to change the

current shell directory to C drive:

$ cd \dev\fs ?

Enters the following command at the shell prompt to run the

Attendance.sh shell script:

$ sh Attendance.txt

Enters the following command at the shell prompt to display the

Page 24: q7 Linux Full

attendance record of the employees store in a new file,

Attendance_Report.txt, on C drive:

$ cat Attendance_Report.txt ?

However, while executing the preceding code snippets, Donna notices

that the code is not providing the required output. What should Donna

do to solve the problem?

Donna needs to use the following code snippet:

$ sh Attendance.sh ?

$ cate Attendance_Report.exe ?

Donna needs to use the following code snippet:

$ cd \dev\fs\C ?

$ sh Attendance.sh ?

$ cat Attendance_Report.txt ?

Donna needs to use the following code snippet:

$ dev\fs\C ?

$ sh Attendance.shi ?

$ cat Attendance_Report.exe ?

Donna needs to use the following code snippet:

$ cd \C ?

$ sha Attendance.sh ?

$ cat Attendance_Report.exe ?

Tom Wilkins is working as a network administrator at BlueMoon

Computers. Tom needs to search for the name of the employees with

first name ‘Steve’ from the LDAP directory containing the details of

the employees. Tom needs to specify that a maximum of 50 entries

should be retrieved as a result of search request. What should Tom do

to perform the required task?

Use the ldapadd command with -k option

Use the ldapmodify utility with –a option

Use the ldapsearch command with –l option

Use the ldapsearch command with –z option

Donna Bard is working as a system administrator at Blue Moon

Computers, which is a software development organization based in New

York. Each department of the organization maintains its own database

to store information about the employees. Since the information is

stored in multiple data sources, the employees frequently encounter

Page 25: q7 Linux Full

redundant data and inconsistent data. For this, Donna decides to

configure a Directory server in the organization. She first creates a

Data Design of the organization. She observes that when an employee

in a department is shifted to another department, the changes are not

reflected in the other related databases. What could be the possible

consequence of Donna’s observation?

Databases accessed by a number of database administrators at the

same time.

Databases updated without any coordination between the database

administrators.

Databases updated within short time duration.

Obsolete data stored in the databases

Consider the statements:

Statement A:

To create a Kickstart configuration file for an FTP server, you must

ensure that the authentication technique is implemented.

Statement B:

To create a Kickstart configuration file for an FTP server, you need

to install X Windows System, as the users and the administrators will

access the FTP server remotely most of the time.

Which of the following is true, with respect to the above

statements?

Statement A is false and statement B is true.

Both, statements A and B, are false.

Both, statements A and B, are true.

Statement A is true and statement B is false.

Safest Software, Inc. has recently implemented the Argus network

monitoring tool on its enterprise network to monitor and mange the

network traffic. Corrine Wallace, the network engineer, wants to

monitor Simple Mail Transfer Protocol (SMTP) and Domain Name Services

(DNS) services running on the Web servers of the enterprise from a

remote computer. Therefore, Corrine installs Argus-3.3 on a remote

computer to monitor these services from the remote location. However,

Page 26: q7 Linux Full

she is unable to monitor the network as Argus fails to initialize.

Corrine has verified the network and checked all connectivity tools,

which are working properly. But still she is unable to monitor the

network.

What should Corrine do in this situation?

Corrine should restart the http service using the service httpd

restart command.

Corrine should configure argus-3.3 to run the script

# . /argusd

Corrine should add the content username encrypted_password

home_obj groups in the user file.

Corrine should type the following command at the shell prompt to

extract the argus-3.3.tgz file:

tar –zxvf argus-3.3.tgz

Global Systems Inc. is a leading software development organization.

Users in RD frequently download files and packages from the database

server through the Internet. Some files and packages downloaded from

the Internet are infected with viruses, which affect computers of all

users. To overcome this virus problem, instead of installing

antivirus programs on every computer. The organization needs to

install virus-free operating systems, such as Linux. Chris, the

system administrator, automates the installation of the operating

system. Pat needs to use an operating system that provides solution

for small to medium range of servers used for the majority of

businesses, such as file servers and mail servers. He also needs to

place pre-installation scripts at the beginning of the Kickstart

configuration file. What should Chris do to perform the required

task?

Chris needs to use Red Hat Enterprise Linux operating system and

enter the following command:

# mkdir /var/ftp/pub/configfiles

Chris needs to use Mandriva Linux operating system and enter the

following command:

network --device eth0 -–bootproto dhcp ?

Chris needs to use Red Hat Enterprise Linux operating system and

Page 27: q7 Linux Full

enter the following command:

%pre

echo ”My kickstart installation started on ‘ /bin/date’ “ >

/etc/motd

Chris needs to use Red Hat Enterprise Linux operating system and

enter the following command:

%post --interpreter /usr/bin/python

Larry Williams is working as a network administrator at Quality

Software Developers. The employees of the Software Development

department develop applications in .NET for their clients. These are

Graphic User interface (GUI) applications and use the Oracle as a

database server. To avoid the cost of licensing, the management

decides to migrate from Windows to the Linux platform. Larry decides

to use mono tool to deploy the .NET application on Linux platform.

Now, Larry needs to install RPM packages to run .NET applications.

Larry has already installed 15 RPM packages on the computer where he

wants to run the .NET application. Now, he wants to install the

remaining RPM packages to enable Web services and support Windows

form implementation. What should Larry do to perform the required

task?

Larry needs to install the rpm packages in the following order:

mono-jscript-1.1.6-1.novell.6.3.i586.rpm

mono-web-1.1.6-1.novell.6.3.i586.rpm

mono-winforms-1.1.6-1.novell.6.3.i586.rpm

mono-locale-extras-1.1.6-1.novell.6.3.i586.rpm

Larry needs to install the rpm packages in the following order:

mono-locale-extras-1.1.6-1.novell.6.3.i586.rpm

mono-jscript-1.1.6-1.novell.6.3.i586.rpm

mono-web-1.1.6-1.novell.6.3.i586.rpm

mono-winforms-1.1.6-1.novell.6.3.i586.rpm

Larry needs to install the rpm packages in the following order:

mono-jscript-1.1.6-1.novell.6.3.i586.rpm

mono-locale-extras-1.1.6-1.novell.6.3.i586.rpm

mono-web-1.1.6-1.novell.6.3.i586.rpm

mono-winforms-1.1.6-1.novell.6.3.i586.rpm

Larry needs to install the rpm packages in the following order:

mono-jscript-1.1.6-1.novell.6.3.i586.rpm

mono-locale-extras-1.1.6-1.novell.6.3.i586.rpm

Page 28: q7 Linux Full

mono-winforms-1.1.6-1.novell.6.3.i586.rpm

mono-web-1.1.6-1.novell.6.3.i586.rpm

Red-Eye Experts is a leading developer of computer applications, with

its head office in New York. The organization has three departments:

HR, Research, and Development. A directory service is configured in

the HR department and all the employees in the rest of the

departments access the directory service. The organization has two

branch offices in London and Paris. These branch offices are

connected to the head office in New York through Virtual Private

Network (VPN). The directory service, in the HR department of the

head office, is also accessed by the employees in the branch offices.

So, there is a potential risk that a network failure between the head

office and the branch offices can seriously affect the employees in

the branch offices. To prevent this situation, John Barrett, the

system administrator at the head office, decides to create multiple

replicas of the directory service and configure these replicas in the

branch offices. Now, to maintain data consistency, John wants to

synchronize the data which is stored in the main directory service

and the replica servers. John wants to implement a mechanism in such

a way that when a replica server receives a write operation request

from a client, it performs the write operation. After that, the

replica server sends the modified updated entry values to all the

replica servers and the main server. On receiving the modified entry

values, the main server and the replica servers update the stored

entries accordingly. Now, which Replication Policy and Write

Operation performing strategy should be employed by John to implement

the above mechanism?

Single-Master Replication Policy using chaining

Multimaster Replication Policy using referrals

Multimaster Replication Policy

Single-Master Replication Policy using referrals

Global Systems is a leading software organization with multiple

branches spread across the world Workstations and servers across the

organization have the Windows family of operating systems configured.

The organization wants to migrate from Windows to Linux due to

enhanced security features offered by Linux. Mike Womack, the network

administrator, is assigned the task to implement Linux in text mode

across the major branches, including the corporate head office. Mike

Page 29: q7 Linux Full

installs Linux on existing systems which have the following hardware

configuration:

Motorola 68K processor

Industry Standard Architecture (ISA) architecture

60 MB RAM

However, the Linux installation fails on these systems. What should

Mike do to solve the problem?

Verify the security considerations for implementing Linux

Verify the architecture supported for implementing Linux

Verify the memory requirements for implementing Linux

Verify the processor required for implementing Linux

Which command is used to copy the passwd file to ssod directory

contained in the /etc/pam.d directory?

# cp /etc/pam.d/ssod /etc/pam.d/passwd

# mount etc/pam.d/ssod /etc/pam.d/passwd

# mount /etc/pam.d/passwd etc/pam.d/ssod

# cp /etc/pam.d/passwd /etc/pam.d/ssod

Supersoft2000 is a software development company that has number of

development centers all over America. Larry Williams, the system

administrator installs a Directory service to implement an identity

management system. In the identity management system, the employee

information such as name, employee code, telephone extension number,

department code, branch office, and designation, is stored and

organized. Now, the management of the company wants to expand the

business. As a result, Larry faces a problem of insufficient hardware

resources and slow read/write process of the directory server. He

wants to provide a flexible Directory service that can meet the

increasing storage space requirement of the directory service. What

should Larry do to solve this problem?

Purchase a new server with more Hard Disk storage space.

Use high-speed physical media such as fiber optic cable.

Purchase a new server with higher processing speed.

Distribute the directory server among multiple computers.

Blue Moon Computers is a multinational company, which is

manufacturing mainframe computers for a space research organization.

Blue Moon Computers has 41 branches in the US.

Page 30: q7 Linux Full

The organization uses a directory server to store all their

confidential information. Employees are provided a username and a

password to access the directory server. Ken Burton, a system

administrator at Blue Moon Computers, is responsible for maintaining

the security of the directory server.

Ken receives a report that some confidential data stored in the

directory server has been tampered with. Ken examines the directory

server and discovers that a malicious user has attempted to obtain

passwords of certain employees. The malicious user has tried each

possible combination to hack the passwords by using some software

tools.

What type of security threat has Ken discovered and what method has

the malicious user employed to hack the passwords?

Kind of security threat – Unauthorized Access

Method used - Dictionary attack

Kind of security threat – Denial of Service (DoS) Attack

Method used - Smurf attack

Kind of security threat – Denial of Service (DoS) Attack

Method used - Distributed denial of service (DoS) attack

Kind of security threat – Unauthorized Access

Method used - Brute-force attack

Which command is used to verify whether Samba has authenticated a

sambaAccount, Mike, stored on the OpenLDAP server?

# /usr/local/sbin/smbldap-usershow.pl Mike

# /usr/sbin/smbldap-usershow.pl Mike

# /usr/local/sbin/ldap-usershow.pl Mike

# /usr/local/smbldap-usershow.pl Mike

Quality Software developer is multinational organization. Donna Bard,

the network administrator in the organization is responsible for

monitoring the network of the organization. While monitoring the

network, Donna observes that a large number of data packets are

getting lost on the network. As a result, the employees of

organization are not able to download the file from the file server

although all the connections and protocols related to file server are

working perfectly. This is affecting the performance of the

enterprise. What should Donna do to solve the problem?

Page 31: q7 Linux Full

Run the itrace and strace command at the shell prompt.

Run the strace command at the shell prompt.

Run the itrace command at the shell prompt.

Run the tcpdump command at the shell prompt.

The migration perl scripts translate the system files into which file

format?

.rpm format

.doc format

.LDIF format

.conf format

Which the command is used to test the configuration of the Kerberos

client?

kadmin.local

klist

kinit

kdb5_util

Which of the following Bugzilla feature helps in searching and

displaying the identified bug in the bug lists of the bug tracking

system?

Enterprise group support

Sanity check

Request System

Localization

Tom Wilkins is working as a network administrator at Good Graphics

Inc. The management asks Tom to deploy LDAP server to provide

information and resources across the organization. Tom needs to

search for the name of the employees whose first name is “Steve”. In

addition, Tom wants that ldapsearch utility should prompt for simple

authentication. What should Tom do to perform the required task?

# ldapsearch cn=Steve* -S–d

# ldapsearch cn=Steve* -x -h

# ldapadd cn=Steve* -x -h

# ldapsearch cn=Steve* -c -h

Page 32: q7 Linux Full

Donna Bard is working as a network administrator at Quality Softwares

Inc based at U.S. For business expansion, the organization opens a

new branch office in California. Donna installs Red Hat Linux

operating system at the new branch office. Donna also wants to

install Wine using RPM package to enable the employees of the

organization to use existing Windows-based applications. To install

Wine, Donna executes the following command:

# apt-get install wine_0.0.20050419-winehq-1_i386.deb ?

However, Donna notices that he is cannot install Wine using the

above command. What should Donna do to solve the problem?

Use the following command

# rpm –qa | grep -i wine ?

Use the following command

# rpm –sf /usr/local/etc/wine.systemreg system.reg ?

Use the following command

# rpm –ivh <wine-package-name>.rpm ?

Use the following command

# rpm -e <wine-package_name> ?

Jim Lewis is working as a system administrator at Technology Systems.

The organization maintains different directory servers on several

platforms for running different types of applications. These

directory servers use different security mechanisms to provide access

to the directories of the directory server. The organization needs to

enable sharing and accessing of information between the directory

servers for official purposes. Jim decides to perform the task and

finds that the directory servers are unable to recognize the clients

of different platforms. As a result, the directory services of the

directory server are unable to interoperate with the non-native

clients. What should Jim do to resolve the problem?

Use cross-platform authentication services

Page 33: q7 Linux Full

Use push and pull synchronization agents

Use gateways

Create distributed multivendor directories

Which implementation provided by Cyrus-SASL libraries enables a

client to send and receive encrypted data from an OpenLDAP server?

DIGEST-MD5

KERBEROS_V4

CRAM-MD5

ANONYMOUS

Technology Systems, a software development organization has a number

of branch offices at different locations. The branch offices are

connected through a network, so that the employees at different

offices can communicate. Ed Young a system administrator in

Technology Systems is implementing a directory service to store

information about users, customers, and projects. Ed wants to

implement a security mechanism that can avoid a man-in-middle attack

used by a malicious user for tampering with directory data. In this

security threat, a malicious user listens the communication and

captures the data packets between the client and the Directory. Next,

the malicious user modifies the requests, which a client sends to the

directory.

Which technology should Ed use to detect this security threat?

Network Intrusion Detection System (NIDS)

Simple Authentication and Security Layer (SASL)

Log File Monitors (LFM)

System Integrity Verifiers (SIV)

Ken Burton is working as a system administrator at SuperGraphics Inc.

While replicating an LDAP server, Ken needs to configure the master

LDAP server to maintain a log of the changes made. Ken, therefore,

needs to edit the slapd.conf file to specify the details of the

replica server. He needs to specify the name of the replica server,

the partition to be replicated, the binding DN of the LDAP server,

and the binding method to bind the master LDAP server to the replica

server. Which of the following commands should Ken use to perform the

required task?

replica host=replicaser.supergraphics.com:389

Page 34: q7 Linux Full

tls=”dc=supergraphics,dc=com”

binddn=”cn=replicaser,dc=supergraphics,dc=com”

credentials bindmethod=simple tls=no

replica host=replicaser.supergraphics.com:389

suffix=”dc=supergraphics,dc=com”

binddn=”cn=replicaser,dc=supergraphics,dc=com”

credentials bindmethod=simple tls=no

replica host=replicaser.supergraphics.com:389

suffix=”dc=supergraphics,dc=com”

portnumber=”cn=replicaser,dc=supergraphics,dc=com”

credentials bindmethod=simple tls=no

replica host=replicaser.supergraphics.com:389

binddn=”cn=replicaser,dc=supergraphics,dc=com”

credentials bindmethod=simple tls=no

Red Sky IT Systems is an IT organization that provides software

services to its customers. One of the projects being developed at Red

Sky requires the use of advanced Perl scripts. For this, Pat Greene,

the network administrator installs RPM packages on the computers. Pat

observes that a file of RPM package is corrupted during the

installation of RPM packages. Therefore, Pat needs to verify the

corrupted file to check the attributes of the file. What should Pat

do to perform the task?

Execute # rpm –-rebuilddb ?

Execute # rpm -K squirrelmail-1.2.11-1.noarch.rpm ?

Execute # rpm –Vf /bin/umount ?

Execute # rpm --import /mnt/cdrom/RPM-GPG-KEY ?

Which RPM of mono-1.1.zip file provides development support for Mono

tool?

mono-data-sqlite

mono-data-sybase

mono-devel-1.1.6-1.novell.6.3.i586.rpm

mono-data-postgresql

Chris Donaldson is working as a system administrator at SuperGraphics

Inc. Chris needs to integrate the samba with OpenLDAP to store the

Page 35: q7 Linux Full

user information. Chris adds a new user Ronald in the OpenLDAP

directory. Which command should Chris use to verify the existence of

user, Ronald in the OpenLDAP directory?

# smbldap-usershow.pl ronald

# /usr/local/sbin/smbldap-usershow ronald

# /usr/local/sbin/smbldap-usershow.pl ronald

# /usr/local/sbin/smbldap-usershow.pl

Tom Wilkins is working as a system administrator at Technology

Systems. Tom needs to design a schema for a directory that contains

records of employees, such as name, phone, address, and job profile,

in the organization. Tom writes a code for the telephoneNumber

attribute type in LDAP.

2.5.4.20 NAME 'telephoneNumber' EQUALITY telephoneNumberMatch SUBSTR

telephoneNumberSubstringsMatch SYNTAX

1.3.6.1.4.1.1466.115.121.1.15{24}

Identify the OID of the attribute type and the use of

telephoneNumberMatch rule in the preceding code snippet?

The OID of the attribute type is 2.5.4.20 and the

telephoneNumberMatch rule is used for matching partial telephone

numbers.

The OID of the attribute type is 1.3.6.1.4.1.1466.115 and the

telephoneNumberMatch rule is used to specify the unique name of an

attribute.

The OID of the attribute type is 1.3.6.1.4.1.1466.115.121.1.15 and

the telephoneNumberMatch rule is used to describe the applications

that own and use the attribute.

The OID of the attribute type is 2.5.4.20 and the

telephoneNumberMatch rule is used for matching complete telephone

numbers.

Consider the statements:

Statement A: The # rpm –qa | grep -i wine command is used to

identify the installed Wine packages on the system.

Statement B: The # rpm -e <wine-package_name> command is used to

uninstall the Wine packages from the system.

Which of the following options is correct with respect to the above

statements?

Both statements A and B are true.

Page 36: q7 Linux Full

Statement A is false and statement B is true.

Statement A is true and statement B is false.

Both statements A and B are false.

John Barrett is working at EarthenWares as a system administrator.

EarthenWares uses the OpenLDAP server to manage data about the

employees working in the company. All the employees of the company

have access to the data included in the OpenLDAP server. As a result,

the company finds some unwanted changes made to the data contained in

the OpenLDAP directory server. The company assigns the task to John

to implement a mechanism to monitor each activity taking place on the

OpenLDAP server. For this, John needs to add the following statements

in the slapd.conf file:

include /usr/local/etc/openldap/schema/core.schema

pidfile /usr/local/var/slapd.pid

argsfile/usr/local/var/slapd.args

But, John finds that this code snippet is not working properly.

Which code snippet should John use to perform the task?

include /usr/local/etc/openldap/schema/core.schema

loglevel 1

pidfile /usr/local/var/slapd.pid

argsfile /usr/local/var/slapd.args

include /usr/local/etc/openldap/schema/core.schema

loglevel 2048

pidfile /usr/local/var/slapd.pid

argsfile /usr/local/var/slapd.args

include /usr/local/etc/openldap/schema/core.schema

loglevel -1

pidfile /usr/local/var/slapd.pid

argsfile /usr/local/var/slapd.args

include /usr/local/etc/openldap/schema/core.schema

loglevel 0

pidfile /usr/local/var/slapd.pid

argsfile /usr/local/var/slapd.args

Donna is working as a network administrator at Safest Software

Developers. The organization has three branches at different

locations. There are three departments at each branch, named

Page 37: q7 Linux Full

application development, quality assurance, and sales. The users of

the same department at different branches are part of a group. There

are three groups corresponding to each department, app for

application development department, qa for quality assurance

department, and sales for sales department. All the employees at

different branches use a database server at the main branch to store

data. The database server can run 100 processes at a time. The users

in the app group run a large number of processes on the database

server due to which the users in the qa and sales groups are not able

to run their processes. What should Donna do to solve this problem?

Donna needs need to add the following entries to the

/etc/security/limits.conf file:

@app soft nproc 45

@app hard nproc 50

Donna needs to add the following entries to the /etc/pam.d/login

file:

* soft nofile 85*

hard nofile 88

Donna need to add the following entry to the /etc/pam.d/login

file:

session required /lib/security/pam_limits.so

Donna needs to add the following entries to the

/etc/security/limits.conf file:

* soft file 560*

hard file 860

Technology Systems is a software development organization. Jim Lewis,

the system administrator, has implemented a NIS-based directory

containing the details of the employees of the organization. The

management of the organization decides to migrate the existing NIS

infrastructure to OpenLDAP server. Chris needs to convert system

files, stored in /etc/ directory of NIS server, into LDIF format.

Chris, therefore, needs to migrate user information from /etc/passwd

to the LDIF file. What should Chris do to perform the required task?

Use the following command:

# /usr/share/openldap/migration/migrate_group.pl /etc/group

/tmp/group.ldif

Use the following command:

Page 38: q7 Linux Full

# /usr/share/openldap/migration/migrate_passwd.pl /etc/

passwd

/tmp/passwd.ldif

Use the following command:

# /usr/share/openldap/migration/migrate_group.pl /etc/group

/tmp/group.ldif

Use the following command:

# /usr/share/openldap/migration/migrate_passwd.pl /etc/

/passwd.ldif

command

Don Allen is working as application developer at Safest Software

Developers. Don wants to use a software application that helps keep

track of bugs in any of software products developed. He needs to

identify and analyze errors in the programming code of software

product. While detecting the bugs, Don wants to identify the name and

component of the software product in which a bug is encountered. He

wants to define the state, such as fixed, modified, or closed of the

bug. He also wants to display a short summary about the bug. What

should Don do to perform this task?

Don should understand Bug Anatomy.

Don should use Bug Lists.

Don should Search bugs.

Don should create a Bugzilla account.

Which option can be used with the scp command to recursively copy all

subdirectories and files in the source directory to the destination

directory?

-v

-r

-p

-q

EarthenWares is a leading developer of computer applications. The

organization assigns Ken Burton, the system administrator, the task

Page 39: q7 Linux Full

to implement a Directory server to provide centralized storage and

management of information, such as employee records.

Ken decides to implement the LDAP Directory server in the

organization. He needs to provide a framework to protect the LDAP

Directory from unauthorized access. For this, he decides to use the

LDAP Security model to ensure that when an LDAP Directory client

tries to establish a connection with the LDAP Directory server, an

authentication protocol exchange is initiated.

This exchange consists of a series of requests and responses between

the LDAP Directory client and the LDAP Directory server. Based on the

nature of responses, authentication is performed between the LDAP

Directory client and the LDAP Directory server.

Which authentication mode does Ken implement?

Provide the LDAP client, full access to the LDAP Directory server,

in anonymous mode.

Implement passwords using TLS.

Provide the LDAP client, read only access to the LDAP Directory

server, in anonymous mode.

Secure the LDAP server using the DIGEST-MD5 authentication

mechanism.

The Satellite model grants permission to the user to download

software using physical media, such as CD and floppy. Which of the

following feature helps to accomplish this task?

Local database repository

Channel and errata cloning and their management

Complete off-network capability

Channel permissions

which provides e-commerce services to its customers. Ken is assigned

the task of monitoring and controlling the network of the enterprise.

For this, Ken configures the Nagios monitoring tool on the network

enterprise and modifies the object configuration files to specify the

hosts and services that are to be monitored. The employees of Red Eye

Experts report problems in the httpd service of some of the hosts.

Therefore, Ken decides to monitor these hosts using the Nagios tool.

However, Ken observes that he is not able to detect the hosts that

are facing the problems. What should Ken do to identify the hosts?

Ken should enable the host event handler, event_handler_enabled in

the template used for defining the hosts and hosts groups.

Page 40: q7 Linux Full

Ken should specify the contact group in the template used for

creating the host groups.

Ken should specify the check_command check-host-alive command in

the template used for defining the hosts and hosts groups.

Ken should specify the event_handler command in the template used

for defining the hosts and hosts groups.

Which video file format needs to be searched and saved in the

Migration folder while migrating from Windows to Linux operating

system?

AIFF

OGG

WMV

WAV

Global Systems is a software development organization that provides

customized software solutions. The organization uses

kernel-2.4.21-4.EL on its Linux server. The management of the

organization decides to upgrade the existing kernel to kernel-2.4.24

to enhance security and to acquire new hardware support. Pat Greene,

the system administrator is assigned the task of upgrading the Linux

kernel.

After downloading the.tar.gz file containing the source code of the

kernel in /usr/src directory, Pat needs to install the kernel source

code.

What should Pat do to perform the task?

Pat needs to execute the following code snippet:

# cd /usr/src

# tar -zxcf linux-2.4.24.gz

# cd linux-2.4.24

# ls –al

Pat needs to execute the following code snippet:

# cd /usr/src

# tar linux-2.24.tar.gz

# cd linux-2.4.24

# ls –al

Pat needs to execute the following code snippet:

# cd /src

# tar -zxvf linux-2.4.24.tar.gz

Page 41: q7 Linux Full

# cd linux-2.4.24

# ls –l

Pat needs to execute the following code snippet:

# cd /usr/src

# tar -zxvf linux-2.4.24.tar.gz

# cd linux-2.4.24

# ls –al

Which parameter in the “smb.conf” file for the OpenLDAP-enabled Samba

server specifies the domain where Samba server resides?

Workgroup

Encryption

Security

Netbios name

Corrine Wallace is working as a system administrator at Countryside

Markets. The organization runs multiple LDAP servers for storing the

data pertaining to the organization. Every department stores their

own data in their respective databases and directories, supplied by

different vendors. For official reasons, the LDAP servers need to be

integrated to share the data contained therein. However, Corrine

finds that the Integrating the Access to different Directories issue

arises because the schema design for the LDAP schema referral differs

from vendor to vendor. What should Corrine do to solve the issue?

Use push and pull agents

Create distributed multivendor directories

Use metadirectories

Use gateways

Consider the statements:

Statement A:

To create a Kickstart configuration file for an FTP server, you must

ensure that the authentication technique is implemented.

Statement B:

To create a Kickstart configuration file for an FTP server, you need

to install X Windows System, as the users and the administrators will

Page 42: q7 Linux Full

access the FTP server remotely most of the time.

Which of the following is true, with respect to the above

statements?

Statement A is false and statement B is true.

Statement A is true and statement B is false.

Both, statements A and B, are true.

Both, statements A and B, are false.

Global Systems Inc. is a leading software development organization.

Users in RD frequently download files and packages from the database

server through the Internet. Some files and packages downloaded from

the Internet are infected with viruses, which affect computers of all

users. To overcome this virus problem, instead of installing

antivirus programs on every computer. The organization needs to

install virus-free operating systems, such as Linux. Chris, the

system administrator, automates the installation of the operating

system. Pat needs to use an operating system that provides solution

for small to medium range of servers used for the majority of

businesses, such as file servers and mail servers. He also needs to

place pre-installation scripts at the beginning of the Kickstart

configuration file. What should Chris do to perform the required

task?

Chris needs to use Red Hat Enterprise Linux operating system and

enter the following command:

%post --interpreter /usr/bin/python

Chris needs to use Red Hat Enterprise Linux operating system and

enter the following command:

# mkdir /var/ftp/pub/configfiles

Chris needs to use Red Hat Enterprise Linux operating system and

enter the following command:

%pre

echo ”My kickstart installation started on ‘ /bin/date’ “ >

/etc/motd

Chris needs to use Mandriva Linux operating system and enter the

following command:

Page 43: q7 Linux Full

network --device eth0 -–bootproto dhcp ?

Smartdevelopers is a leading software development organization. The

organization maintains an LDAP Directory server to store information

about employees of the organization. To enhance the security of the

LDAP Directory server, Ronald Billing, the system administrator,

needs to configure the LDAP Directory server to support Kerberos

authentication. For this, Ronald needs to create Kerberos service

principals for the LDAP server and extract them to a keytab file.

What should Ronald do to perform the above task?

Ronald should execute the following commands:

# chgrp ldap /etc/openldap/ldap.keytab

# chmod 640 /etc/openldap/ldap.keytab

Ronald should execute the following commands:

# kadmin addprinc –randkey ldap/smartdevelopers.com

# ktadd –k /etc/openldap/ldap.keytab ldap/smartdevelopers.com

# chgrp ldap /etc/openldap/ldap.keytab

# chmod 640 /etc/openldap/ldap.keytab

Ronald should execute the following commands:

# ktadd –k /etc/openldap/ldap.keytab ldap/smartdevelopers.com

# chgrp ldap /etc/openldap/ldap.keytab

# chmod 640 /etc/openldap/ldap.keytab

Ronald should execute the following commands:

# kadmin addprinc –randkey ldap/smartdevelopers.com

# ktadd –k /etc/openldap/ldap.keytab ldap/smartdevelopers.com

Nancy Jones the network administrator at Technology Systems is

responsible for monitoring the network of the organization. While

monitoring the network, Nancy observes that the RPM packages

installed on the Linux servers are of an older version than required

and do not provide required functionalities. Therefore, Nancy decides

to install an updated version of the RPM packages. For this, Nancy

downloads a new RPM package, but observes that the package

installation files are not executing properly. What should Nancy do

to solve the problem?

Run the itrace command at the shell prompt

Run the ethereal command at the shell prompt

Run the tcpdump command at the shell prompt

Run the strace command at the shell prompt

Page 44: q7 Linux Full

Donna Bard is working, as a network administrator at Good Graphics

Inc. Donna needs to add entries of new employees to the LDAP

directory containing employees information. While adding the entries,

Donna needs to specify the input file from where the “ldapadd”

utility will pick up the entry and add to the LDAP directory. Which

one of the following options will Donna use to perform the required

task?

-D binddn

-U username

-f filename

-h hostname

Tom Wilkins is working as a network administrator at Good Graphics

Inc. The management asks Tom to deploy LDAP server to provide

information and resources across the organization. Tom needs to

search for the name of the employees whose first name is “Steve”. In

addition, Tom wants that ldapsearch utility should prompt for simple

authentication. What should Tom do to perform the required task?

# ldapsearch cn=Steve* -S–d

# ldapsearch cn=Steve* -c -h

# ldapsearch cn=Steve* -x -h

# ldapadd cn=Steve* -x -h

Tom Wilkins is working as a system administrator at Technology

Systems. Tom is assigned the task to migrate the NIS information to

LDAP. Therefore, Tom needs to map the NIS information stored in

/etc/passwd file to attributes of posixAccount object class. Tom

needs to translate the parameter, /bin/bash from the entry stored in

/etc/passwd file. Which of the following attribute of posixAccount

object class maps to the above parameter?

homeDirectory

LoginShell

loginShell

HOMEDIRECTORY

Donna Bard is working as system administrator with Quality Software

Developers. Sharp Clothing Inc. is a garment manufacturing

organization, which stores information about its employees,

customers, and suppliers in a directory. All the employees of the

Page 45: q7 Linux Full

organization and customers access the directory. Tom Allen, the

Business Manager at Sharp Clothing Inc., decides to set up new

manufacturing units at different locations. As a result the load on

the existing directory service increases. To solve this problem, Tom

directs Donna to create a new directory service. To implement the

directory, Donna wants to install a software package called OpenLDAP.

However, Donna observes that a package called SASL needs to be

installed before installing OpenLDAP. To verify whether SASL is

already installed on the server, Donna enters the following command

at the shell prompt:

# rpm –ivh openssl-0.9.7a-22.1.i386.rpm

However, Donna notices that the command is not producing required

results. What should Donna do to solve the problem?

Donna needs to enter the following command at the shell prompt:

# rpm –ivh sasl-devel-0.9.7a-22.1.i386.rpm

Donna needs to enter the following command at the shell prompt:

# rpm grep | –qa sasl

Donna needs to enter the following command at the shell prompt:

# rpm –qa grep openssl

Donna needs to enter the following command at the shell prompt:

# rpm –qa | grep sasl

Which command is used to verify that the result of # ls / >

/soft/list command has been copied to the list file?

# cat /soft

# cat /list

# cat /soft/list

# cat

Jim Lewis is working as a system administrator in AB Corp. He uses

Linux operating system at the datacentre. He upgraded the Linux

kernel-2.2 to kernel—2.4 to provide support for Oracle9i database

server. He compiled the kernel using the make modules command, but

the system was not able to boot. Identify the reason and the solution

for this problem?

Dependencies were not resolved before compiling the kernel.

Resolve all the dependencies using the make dep command.

Initial RAM disk was not created. Create RAM disk using the

mkinitrd command.

Symbolic links described in the README file were not set up

Page 46: q7 Linux Full

correctly. Reinstall the kernel

Unused files were not removed before compiling. Use make clean

command

The migration perl scripts translate the system files into which file

format?

.LDIF format

.rpm format

.doc format

.conf format

Identify the command that a LDAP Directory client uses to view the

list of Ticket to Get Tickets (TGTs) obtained from the Kerberos

server.

kinit

klist

kadmin.local

kdb5_util

Donna Bard is the network administrator at PQR Corp. She needs to

provide the alternative input devices, such as touchscreen and

trackball to the employees of the organization to allow them to enter

data using different input devices. She also needs to facilitate the

troubleshooting of different Windows and Linux-based applications by

providing a debugger. Therefore, she decides to install Wine using

Concurrent Versions System (CVS) Snapshot method on one of the main

servers. Which command should Donna use to download the Wine source

code tree in the wine directory on the server?

$ cvs

$ export CVSROOT=:pserver:[email protected]:/home/wine

$ cvs –z3 checkout wine

$ ./configure & make depend & make

Technology Systems is an IT organization based at Atlanta. The

organization decides to open a new development center at Florida. The

management of the organization asks John Barrett, the network

administrator, to configure a mail server at this new center. For

this, John needs to install send-email packages. John observes that

the binary RPM package for send-email package is not available on the

network, however, the Source RPM (SRPM) package is available.

Page 47: q7 Linux Full

Therefore, John decides to build binary RPM package from SRPM. What

should John do to perform the task?

Execute rpmbuild –bSTAGE [options] /usr/src/redhat/SOURCES

Execute rpmbuild –bSTAGE [options] /usr/src/redhat/SRPMS

Execute rpmbuild –bSTAGE [options] /usr/src/redhat/SPECS

Execute rpmbuild –bSTAGE [options] /usr/src/redhat/BUILD

Tom is working as a system engineer at ABC corp. The company assigns

a task to Donna to implement LDAP directory schema to reduce data

redundancy problems and to maintain data integrity. To perform the

task, Tom implements an attribute type, which specifies the

information that can be stored in the attribute of the directory. The

company also asks Tom to use the specification given below to

implement attribute type:

OID: 2.5.4.20 and the attribute name is telephoneNumber.

telephoneNumberMatch rule: To match complete telephone numbers

telephoneNumberSubstringMatch: To match partial telephone numbers.

The OID of the encoding rule: 1.3.6.1.4.1.1466.115.121.1.15.

Maximum length: 24

What code snippet should Tom use to perform the task?

SYNTAX 1.3.6.1.4.1.1466.115.121.1.15, 2.5.4.20 NAME

'telephoneNumber' EQUALITY telephoneNumberMatch SUBSTR

telephoneNumberSubstringsMatch {24}

SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 NAME 'telephoneNumber'

EQUALITY telephoneNumberMatch SUBSTR telephoneNumberSubstringsMatch

length 24

2.5.4.20 NAME 'telephoneNumber' EQUALITY telephoneNumberMatch

SUBSTR telephoneNumberSubstringsMatch SYNTAX

1.3.6.1.4.1.1466.115.121.1.15{24}

2.5.4.20 NAME telephoneNumber EQUALITY telephoneNumberMatch SUBSTR

telephoneNumberSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15

length 24

Red-Eye Experts is a .NET applications development organization,

based in the US. The organization uses the Windows platform for

developing .NET applications. For security reasons, Donna Bard, the

network administrator, needs to migrate .NET applications to the

Linux platform to provide file-level and user-level security to the

applications. To migrate the .NET applications to the Linux

Page 48: q7 Linux Full

platform, Donna needs to install the Mono tool that provides a number

of APIs that can be used to run the .NET applications on Linux. For

this, Donna installs the mono-data-1.1.6-1.novell.6.3.i586.rpm RPM

package as the first package of the tool. However, Donna finds an

error massage while installing this package. What error message does

Donna receive while installing this package?

The error message is displayed as

follows:“mono-data-oracle-1.1.6-1.novell.6.3.i586.rpm and

mono-complete-1.1.6-1.novell.6.3.i586.rpm RPM packages should already

be installed on the computer.”

The error message is displayed as follows:

“mono-core-1.1.6-1.novell.6.3.i586.rpm and

mono-basic-1.1.6-1.novell.6.3.i586.rpm RPM packages should already be

installed on the computer.”

e error message is displayed as

follows:“mono-data-oracle-1.1.6-1.novell.6.3.i586.rpm and

mono-data-postgresql-1.1.6-1.novell.6.3.i586.rpm RPM packages should

already be installed on the computer.”

The error message is displayed as

follows:“mono-extras-1.1.6-1.novell.6.3.i586.rpm and

mono-complete-1.1.6-1.novell.6.3.i586.rpm RPM packages should already

be installed on the computer.”

Blue Moon Computers is a software development organization, which has

development centers all over the US. Pat Greene, the system

administrator at Blue Moon Computers, installs a LDAP server to store

the information about the employees and projects running at different

development centers. The Internet has facilitated the growth of Blue

Moon Computers. Therefore, Pat decides to increase the accessibility

of the LDAP server to all development centers through the Internet.

According to the company’s policies, the electronic mail address for

a given employee is considered public information and the employee's

home address is considered sensitive information. It must be

protected to address employee privacy concerns. Easy accessibility to

the LDAP server allows malicious users to try and access the LDAP

server to obtain the home address and other such private and

confidential information about various employees. Therefore, the

server needs to be protected against such malicious users. Pat needs

to implement Access Control List (ACL) to grant access privileges to

Page 49: q7 Linux Full

the authenticated users.

Which of the following options contains the access control

requirements to accomplish this task?

-Replication and synchronization

-Managing the directory server

-Network environment

-Physical security

-Directory accessibility

-Read/Write permission

-Sestivity of data

-Administration of directory server

-User community

-The subjects accessing the LDAP server

-The objects that are accessed

-The level of authentication required

-The accessibility time of the LDAP server

-The access level to an LDAP server

Mike Womack is working as a network administrator at Super Graphics

Inc. The accounts department of the organization operates its

business processes using a. NET-based accounting application. The

organization notices that unauthorized users are accessing the

confidential data from its network. Therefore, the organization

decides to migrate the accounting application from Windows 98 to the

Linux platform to provide file and user-level security to its

network. To perform the task, Mike compiles the source code of the

.NET application to generate a .exe file. Now, he needs to execute

the application by passing the .exe file as an argument. In addition,

he wants to determine the version information of the Just in time

(JIT) compiler and activate the security manager. What should Mike do

to perform the required task?

Use the mono command with –v and security option

Use the mcs command with about and fatal option

Use the mcs command with –L PATH and debug option

Use the mono command with aot and security option

John Barrett is working as a network administrator at Blue Valley

Consulting. The organization has a number of branch offices all over

US. The employees of the organization access a centralized Linux

Page 50: q7 Linux Full

server located at the main branch. John has recently upgraded the

kernel of the centralized Linux server from kernel-2.4 to kernel-2.6.

John has also implemented RAID to avoid any data loss. After

implementing the RAID, John observes that the RAID acceleration is

low. As a result, the server performance is also degraded. To improve

the RAID acceleration, John needs to stabilize the speed of the RAID

device. For this, he decides to assign the value, 80000, to the

parameters specifying the speed of the RAID device. What should John

do to perform this task?

Execute the following commands at the shell prompt:

# echo 80000 > /proc/sys/dev/raid/speed_max

# echo 80000 > /proc/sys/dev/raid/speed_min

Execute the following commands at the shell prompt:

# echo 80000 > /sys/dev/raid/speed_limit_max

# echo 80000 > /sys/dev/raid/speed_limit_min

Execute the following commands at the shell prompt:

# echo 80000 > /proc/sys/dev/raid/speed_limit_max

# echo 80000 > /proc/sys/dev/raid/speed_limit_min

Execute the following commands at the shell prompt:

# echo 80000 > /proc/sys/raid/speed_limit_max

# echo 80000 > /proc/sys/raid/speed_limit_min

Which implementation provided by Cyrus-SASL libraries enables a

client to send and receive encrypted data from an OpenLDAP server?

KERBEROS_V4

CRAM-MD5

DIGEST-MD5

ANONYMOUS

Jim Lewis is a network administrator at Blue Moon Computers. All the

employees of the organization are working on the Windows platform.

Recently, the organization receives a project to develop inventory

management software based on the Linux platform. Therefore, Jim is

assigned the task to install Linux on the workstations and servers in

the software development department of the organization. However, the

employees of the company need to run some Windows-based applications

on the Linux systems. To perform this task, Jim installs the Wine

software. Now, to configure Wine, Jim writes the following code

Page 51: q7 Linux Full

snippet at the shell prompt:

$ mkdir ~/.wine/ ?

$ cp documentation/samples/config ~/.wine/config ?

However, while executing the preceding code snippet, Jim notices

that code snippet has many errors because of which it is not

providing the required output. What should Jim do to solve the

problem?

Jim needs to write the following code snippet:

$ mkdir ~/.wine/ ?

$ cp <dir_to_wine_source_code>/documentation/samples/config

~/.wine/config ?

Jim needs to write the following code snippet:

<dir_to_wine_source_code>/documentation/samples/config

Jim needs to write the following code snippet:

$ mkdir wine/ ?

$ cp <dir_to_wine_source_code>/documentation/samples/

Jim needs to write the following code snippet:

$ mkdir ~/.wine/ ?

<dir_to_wine_source_code>/documentation/samples/ con

Red-Eye Experts is a leading developer of educational courseware. The

organization is located in California, and has about 200 employees.

The organization is divided into three departments: Production, HR,

and Marketing. In the existing setup, an NIS server is used to

authenticate the employees. However, the organization has decided to

recruit another 300 persons in the next two months. Due to the

expansion plans, Tom Wilkins, the system administrator, has decided

to configure an OpenLDAP server in the organization with the domain

“redeye.com”, to better manage the information about the employees.

For this, Tom needs to edit the “slapd.conf” file to specify the

domain components for the LDAP domain, and to specify the location of

the OpenLDAP database. Which directives of the slapd.conf file should

Tom use and how is Tom going to edit these directives to achieve his

objective?

To specify the domain components for the LDAP domain, Tom should

edit the Suffix directive, as shown:

Page 52: q7 Linux Full

suffix “ dc= redeye,dc=com”

To specify the location of the OpenLDAP database, Tom should edit

the directory directive, as shown:

directory /var/lib/redeye.com

To specify the domain components for the LDAP domain, Tom should

edit the Suffix directive, as shown:

suffix “ dc= redeye, dc=com”

To specify the location of the OpenLDAP database, Tom should edit

the directory directive, as shown:

directory /var/lib/ldap/redeye.com

To specify the domain components for the LDAP domain, Tom should

edit the Suffix directive, as shown:

suffix “ dc= redeye.com”

To specify the location of the OpenLDAP database, Tom should edit

the directory directive, as shown:

directory /lib/ldap/redeye.com

To specify the domain components for the LDAP domain, Tom should

edit the Suffix directive, as shown:

suffix “ dc= redeye.com”

To specify the location of the OpenLDAP database, Tom should edit

the directory directive, as shown:

directory /var/lib/ldap/redeye.com

Technology Systems is a leading developer of computer applications.

The organization has its head office in California and two branch

offices in New York and Toronto. There are three departments in the

organization: Marketing, Programming, and Accounting. The Programming

department is divided into two groups, Windows group and Linux group.

The branch offices are connected to the head office by a 56 Kbps

leased line. Now, each branch office runs as a separate entity, with

its own network, reporting structure, and constraints. The

organization has no centralized IT management group, and separate

administrators at each branch office manage the network. Since the

organization has multiple servers but no centralized management of

the information, it faces the data-related problems, such as data

redundancy and data inconsistency.

To avoid these data-related problems in the organization, Jim Lewis,

the system administrator at the head office, decides to install and

configure the OpenLDAP Directory service. Through the use of OpenLDAP

Directory service, Jim wants to provide authentication service in the

Page 53: q7 Linux Full

organization.

This authentication service authenticates the employees to the

directory server by providing the employees encrypted tickets for a

short duration. During the period when the ticket is valid, an

employee can access the directory service without providing a

password.

Now, to implement the above authentication mechanism, which

prerequisite software package must be installed and configured by Jim

before installing OpenLDAP, and what is the command entered by Jim to

install the prerequisite software package?

Jim must install the SASL software package

Jim must enter the following commands to install SASL:

# rpm –ivh cyrus-sasl-md5-2.1.15-3.i386.rpm

# rpm –ivh cyrus-sasl-plain-2.1.15-3.i386.rpm

# rpm –ivh cyrus-sasl-2.1.15-3.i386.rpm

# rpm –ivh cyrus-sasl-gssapi-2.1.15-3.i386.rpm

# rpm –ivh cyrus-sasl-devel-2.1.15-3.i386.rpm

Jim must install the Kerberos software package

Jim must enter the following command to install Kerberos:

# rpm –qa | grep krb5-server

Jim must install the OpenSSL software package.

Jim must enter the following commands to install OpenSSL:

# rpm –ivh openssl-0.9.7a-22.1.i386.rpm

# rpm –ivh openssl-devel-0.9.7a-22.1.i386.rpm

# rpm –ivh openssl096b-0.9.6b-13.i386.rpm

Jim must install the Kerberos software package

Jim must enter the following commands to install Kerberos:

# rpm –ivh krb5-server-1.2.7-19.i386.rpm

# rpm –ivh pam_krb5-1.70-1.i386.rpm

# rpm –ivh krb5-libs-1.2.7-19.i386.rpm

# rpm –ivh krb5-devel-1.2.7-19.i386.rpm

# rpm –ivh krb5-workstation-1.2.7-19.i386.rpm

Ken Burton is working as a system administrator with Global Systems

Inc. Ken is assigned the task to integrate Samba with OpenLDAP. Ken

is asked to store the user information in OpenLDAP. He wants to store

the sambaAccount information for validating the Windows user, John.

Which of the following command should Ken use to accomplish the task?

Page 54: q7 Linux Full

# smbpasswd –s john

# smbpasswd –s john –a john124

# smbpasswd –a john –s john123

# smbpasswd –a john –S john123

Ed Young is working as a system administrator at InfoSuper Corp. Don

Allen, the Business Manager at XYZ Inc. decides to setup new offices

in US, UK, and China. So, Don directs Ed to implementa

centralizedDirectory service in the organization. To perform this

task, Ed selects and implements a directory, and tests the

reliability, redundancy, and fault tolerance of the directory. Ed

also studies the organizational environment and identifies the data

sources, directory users, and directory-enabled applications. Ed also

updates the directory to incorporate new requirements, makes backup

of directory, and monitors the performance of the directory.

Which sequence of steps should Ed follow to complete the task?

1. Test the reliability, redundancy, and fault tolerance of the

directory.

2. Update the directory

3. Examine the organizational environment.

1. Test the reliability, redundancy, and fault tolerance of the

directory.

2. Examine the organization environment

3. Update the directory

1. Examine the organizational environment.

2. Test the reliability, redundancy, and fault tolerance of the

directory.

3. Update the directory

1. Update the directory

2. Test the reliability, redundancy, and fault tolerance of the

directory.

3. Examine the organizational environment.

Don Allen is working as a system administrator at Indestructible

Boxes, Inc. The organization asks to Don to install Simple Network

Management Protocol (SNMP) on a computer in the organization to

monitor networks and systems of the organization. To install SNMP,

Don downloads the source code of SNMP available in the tar.gz file.

Now, what command should Don use to perform the task?

Page 55: q7 Linux Full

# cp snmp-<x>.tar.gz /usr/src ?

# mv snmpd.conf snmpd.conf.org ?

# tar xzvf snmp-<x>.tar.gz ?

# cd /usr/src/snmp-<x> ?

# service snmpd status ?

# make all ?

# cp snmp-<x>.tar.gz /usr/src ?

# cd /usr/src ?

# tar xzvf snmp-<x>.tar.gz ?

# cd /usr/src/snmp-<x> ?

# ./configure ?

# make all ?

# cp snmp-<x>.tar.gz /usr/src ?

# net-snmp-utils-5.0.8-11

# net-snmp-devel-5.0.8-11

# cd /usr/src/snmp-<x> ?

# ./configure ?

# make all ?

# cp snmp-<x>.tar.gz /usr/src ?

# cd /usr/src ?

# mv snmpd.conf snmpd.conf.org ?

# cd /usr/src/snmp-<x> ?

# ./configure ?

# make all ?

Ken Burton is working as a system administrator at SuperGraphics Inc.

While replicating an LDAP server, Ken needs to configure the master

LDAP server to maintain a log of the changes made. Ken, therefore,

needs to edit the slapd.conf file to specify the details of the

replica server. He needs to specify the name of the replica server,

the partition to be replicated, the binding DN of the LDAP server,

and the binding method to bind the master LDAP server to the replica

server. Which of the following commands should Ken use to perform the

required task?

replica host=replicaser.supergraphics.com:389

binddn=”cn=replicaser,dc=supergraphics,dc=com”

credentials bindmethod=simple tls=no

replica host=replicaser.supergraphics.com:389

Page 56: q7 Linux Full

tls=”dc=supergraphics,dc=com”

binddn=”cn=replicaser,dc=supergraphics,dc=com”

credentials bindmethod=simple tls=no

replica host=replicaser.supergraphics.com:389

suffix=”dc=supergraphics,dc=com”

binddn=”cn=replicaser,dc=supergraphics,dc=com”

credentials bindmethod=simple tls=no

replica host=replicaser.supergraphics.com:389

suffix=”dc=supergraphics,dc=com”

portnumber=”cn=replicaser,dc=supergraphics,dc=com”

credentials bindmethod=simple tls=no

Quality Software Developers is a software development organization,

based at Atlanta. All computer systems in the organization run on the

Windows family of operating systems. The management assigns Jim

Lewis, the system administrator, the task of enabling remote

installation of an operating system across several machines. The

operating system should:

Provide support for different services, such as Samba and FTP

Specify the maximum number of files that can be opened by a user at

a time

Support e-mail services, such as Sendmail, Qmail, and Postfix

services

Enhance the security of the organization network by providing

security services, such as VPN and firewalls in the network

What should Jim do to perform the task?

Evaluate Linux for Security Requirements and install Linux

Evaluate Linux Deployment Requirements and install Linux

Evaluate Linux for Business Requirements and install Linux

Evaluate Linux for Maintenance Requirements and install Linux

Supersoft2000, a software development organization has development

centers throughout America, which are connected through a network.

Larry Williams, a system administrator at Supersoft2000, installs a

directory service to implement an identity management system.

Employees and clients at different centers access the directory

server through the network. Larry wants to prevent unauthorized

access to the directory server. So, Larry installs a firewall on the

network of the organization such that:

Page 57: q7 Linux Full

The employees of the internal network are able to establish a

connection with external networks.

Incoming requests are processed first by the firewall. Next, the

firewall validates the requests and forwards them to the directory

server.

Which of the following does Larry use to perform these tasks?

SASL

SSL/TLS

CIPE

Kerberos

Jim Lewis is working as a network administrator at Smart Software

Developers. Jim has registered the Linux workstations and servers

with Red Hat Network. Jim has identified a workstation on the network

that has crashed while running a software application. For resolving

the problem, he must identify the location of this error. What should

he do to accomplish the task?

Implement a GUI to receive automatic updates from Red Hat network

Check RPM dependencies associated with each new version of the

updates

Issue a list of Errata

Ask for prior notification for updates and receipt of the errors

through mail messages

Pat Greene is working as a system administrator at InfoSuper Corp.

The management asks Pat to migrate user information from the NIS

server configured in the network of the organization to the OpenLDAP

server configured on the same host. Pat needs to add user accounts

and groups information contained in the LDIF format to the OpenLDAP

database. What should Pat do to perform the required task?

Edit the migrate_common.ph file

Specify the domain and base of your network in the

/usr/share/openldap/migration/migrate_common.ph file.

Create a file infosuper.ldif in the /tmp directory

Edit the values of the DEFAULT_MAIL_DOMAIN and DEFAULT_BASE

parameters

Page 58: q7 Linux Full
Page 59: q7 Linux Full

Which of the following components is installed on a directoryserver or a client that will access the directory?Directory-enabled applicationDirectory serversAccess policiesDirectory clients

Which of the following directory types help developcompany white pages?Application-specific directoriesGeneral-purpose directoriesNOS directoriesPurpose-specific directories

You have configured a directory. You want to grant directoryaccess to specific clients between 10:00 AM and 1:00 PMevery day. How will you achieve this?Create replicas of the directoryCreate ACLsCreate directory partitionsConfigure MMS

In which of the following directory stages should you test thereliability and fault-tolerance of the directory server?Design stageDeployment stageMaintenance stageBoth design and deployment stage

The parameters used to measure directory performanceare:LatencyThroughputRobustnessBoth latency and throughput

The LDAP client and server communicate using the ___ portnumber?803896079

Which of the following models defines the basic building

Page 60: q7 Linux Full

blocks of LDAP directory?Functional modelNaming modelSecurity modelInformation model

Which of the following data format will you use to storedigital certificate in a directory?StringDigitDateBinary

Which of the following directory servers is an example ofthe application-specific directory type?a. OpenLDAPb. IBM/Lotus Notes Namec. Active Directoryd. Switchboard Directory

In which of the following directory stages should you take

feedback from the users?

a. Design stageb. Deployment stagec. Maintenance staged. Both design and deployment stage

Which of the following feature of a directory allows you topersonalize the directory according to your businessneeds?a. Distribute datab. Flexibilityc. Replicate datad. Dynamic

The attribute type, ces representsa. Strings, where case of strings is significant duringsearching and comparisonsb. Distinguished name of the object that owns the entryc. Strings, where case of strings cannot be specified duringsearching and comparisonsd. String classWhich of the following directory components represents device drivers that will beaccessed by a directory server?

Page 61: q7 Linux Full

a. Directory-enabled applicationb. Softwarec. Supporting softwared. Directory clients

Which of the following directory features enables you to store data of differentformats on a directory server?a. Dynamic natureb. Flexibilityc. Personalizationd. Data distribution

Which of the following elements is a platform-independent directory server?a. Active Directoryb. MMSc. Novell Directory Serverd. Netscape Directory Server

In order to ensure that the clients in the branch offices are not affected in case thedirectory server breaks down, how would you make the directory fault-tolerant?a. Store data hierarchically in the directoryb. Make the directory interoperable with the other servers in the branch officesc. Configure replicas of the directory in the branch officesd. Secure the directory against unauthorized access from branch offices

In which of the following directory stages should you make backups of the directoryserver?a. Deployment stageb. Design stagec. Maintenance staged. Backup stage

Which of the following tree designs is the correct representation of a DIT?a. Horizontal treeb. Inverted treec. Vertical tree with root node at the lowest level of the treed. Cannot be represented by any tree design

Identify the LDAP model that specifies how to organize and identify data in adirectory.a. Information model

Page 62: q7 Linux Full

b. Naming modelc. Functional modeld. Security model

In an inventory database, the product ID must be alphabetically ordered, composedof alphanumeric characters only, and be unique. Which one of the following is anexample of this definition?a. Rules for matching equalityb. Rules for sorting attribute valuesc. Syntaxd. Entry

If contained in a Dn, which one of the following characters is NOT escaped?a. Backslash (\)b. Less-than symbol (<)c. Greater-than symbol (>)d. Dollar sign ($)

Identify the operation that takes a single parameter, message ID.a. Abandon operationb. Bind operationc. Unbind operationd. Rename operation

Which of the following attribute types describes theapplications that own and use the attribute?OIDAssociated attribute syntaxUsage indicatorMatching rules

Which of the following directory schema elements governsthe search and compare operations performed on attributevalues?AttributeAttribute SyntaxMatching RulesObject Classes

In which of the following classes are the optional objectclass attributes defined?Structural classAuxiliary class

Page 63: q7 Linux Full

Abstract classBoth Structural class and Abstract class

The OID of an object class definesA unique number to identify the objectThe number of attributes in the classThe name of the classThe optional attributes in the class

Which of the following attribute can be used to represent thedepartments in a DIT?oudccnuid

Which of the following is the correct representation of RDNof the root node for an organization whose Internet domainname is www.developsol.com?dc=developsol,dc=comdc=com,dc=developsoldc=developsol.comdc=developsol

Which of the following factor does not affect the directorydesign topology?Subnet mask of the networkDNS namespacePhysical location of the networkSchema documentation

Which of the following determine the way the data, which isstored in the main directory server and the replica servers,is synchronized?Replication PoliciesUnit of replicationIncremental updateTotal update

Identify the replication strategy for the above statement.Single master replication using chainingSingle master replication using referralsMultimaster replication using partial updateMultimaster replication using complete update

Page 64: q7 Linux Full

Identify the protocol that consists of two layers, the recordprotocol and handshake protocol, which provide encryptedcommunication between communication hosts on a network.TLSSASLTCP/IPDIGEST-MD5

Which of the following rpms will you use to implement thisauthentication mechanism?# rpm –ivh pam_krb5-1.70-1.i386.rpm# rpm –ivh cyrus-sasl-md5-2.1.15-3.i386.rpm# rpm –ivh openssl-0.9.7a-22.1.i386.rpm# rpm –ivh cyrus-sasl-gssapi-2.1.15-3.i386.rpm

Which of the following data format represent ASCII textstring?a. IA5Stringb. OctetStringc. DirectoryStringd. CountryString

In which replication policy do the main server and the replicaservers store a writable copy of the directory entries?a. Multimaster replicationb. Dualmaster replicationc. Hybrid replicationd. Multiclient replication

Which of the following specifies how attribute value should be represented in thedirectory?a. Associated attribute syntaxb. Attributec. Object classesd. Matching rules

From the following, identify the standard syntax that represents text strings, whichare encoded in UTF-8 of ISO 10646.a. CountryStringb. DirectoryStringc. IA5Stringd. PrintableString

Page 65: q7 Linux Full

Which of the following standard matching rules is used to compare case of lettersduring comparisons, ignoring the leading, trailing, and multiple spaces?a. caseIgnoreMatchb. caseExactMatchc. integerMatchd. octetStringMatch

Which of the following types of object class is used to create a new class from theexisting LDAP class, top?a. Structuralb. Aliasc. Auxiliaryd. Abstract

In the ASN.1 schema format, what does SUBMATCHINGRULE specify?a. The rule applied when comparing two attributes for equalityb. The rules applied on attributes when performing comparison operationsc. The rules applied on attribute when comparing the attribute value with asubstringd. The rules applied on attribute when deleting the attribute value with a substring

Consider the following problem and solution:Problem: You have multimaster directory server setup in your organization.However, you are facing a conflict problem in upgrading.Solution: You have assigned sequence numbers to the attribute names.Identify the correct option for the solution.a. The solution fully solves the problemb. The solution partially solves the problemc. The solution does not solve the problemd. Both the problem and solution are incorrect

You have configured a directory server in an organization. Whenever a user has toaccess the server, the user has to provide his/her user name and password. After auser connects to the directory server, you would like the user to remain connected forthe next five hours. To solve the problem, you need to:a. Configure Kerberosb. Configure single master directoryc. Configure OpenSSL

Page 66: q7 Linux Full

d. Configure multimaster directory

You have configured a directory server and a slave directory server in anorganization. However, you find that the master directory server and the slavedirectory are synchronized after every 12 hours. Which one of the following optionsis the correct reason for the mismatch between master and slave directory servers?a. The servers are configured in multimaster modeb. The servers are updated through chaining approachc. The servers are configure in single master moded. The servers are configured for incremental updating

The main server performs the write operation on the request of the replica server andsends back the results. The replica server receives the result and forwards it to theclient. In which of the following replication policies does the preceding scenariounfold?a. Multimaster replicationb. Single-master replication using referralsc. Single-master replication using chainingd. Multimaster replication using incremental update

Donna Bard, a network administrator at RedSky Inc., is assigned the task of enablingthe replica server to send the IP address of the main server to the client of thecompany. What should Donna do to perform the task?a. Send a write operation by using referrals.b. Send a write operation by using chaining.c. Use multimaster replication to send a write operation.d. Use single Master replication to send a write operation.

You have to configure an OpenLDAP server. To save diskspace, however, you have to disable logging in theOpenLDAP server. Which one of the following optionscan you use to achieve this?a. Remove the log files from /var/log filesb. Add loglevel 0 in slapd.conf filec. Add local4.debug 0 in slapd.conf filed. Add loglevel 2048 in slapd.conf file

Tom Wilkins is working as a network administratorat Blue Moon Computers. Blue Moon Computershas deployed an LDAP server to provideinformation and resources across the organization.Tom is asked to modify salary entries of employeeswho got increments. He wants the modificationprocess to continue even if there is an error in the

Page 67: q7 Linux Full

modified entry. Tom also wants that all the incorrectentries should be recorded in an errorlog file,log_file. Which command should Tom use toperform the required task?a. ldapmodify –c –o log_fileb. ldapmodify –o log_filec. ldapmodify –c-w log_filed. ldapmodify –o –w log_file

Identify the command that you will issue to add the detailsof user contained in an LDIF file named, user.ldif from anLDAP client. The LDAP server is configured on192.168.0.202.a. slapadd –l –h 192.168.0.202 user.ldifb. slapadd –l –h 192.168.0.202 –f user.ldifc. ldapadd -x –h 192.168.0.202 -D"cn=Manager,dc=newmoon,dc=com" -W user.ldifd. ldapadd -x –h 192.168.0.202 -D"cn=Manager,dc=newmoon,dc=com" -W -fpeter.ldif

Which one of the following files will you use to find the arguments that werepassed to the slapd daemon for starting an OpenLDAP server?a. /etc/openldap/slapd.confb. /var/run/slapd.argsc. /var/run/slapd.pidd. /var/log/slapd.conf

You have to configure a directory-enabled application. Which one of thefollowing security mechanisms can you use to provide programmableauthentication interface to the application?a. CRAM-MD5b. GSSAPIc. KERBEROS_V4d. DIGEST-MD5

Which of the following directives is used configure logging on theOpenLDAP server?a. loglevelb. pidfilec. replogfiled. logserver

Which of the following files contains the information about the FQDN of a

Page 68: q7 Linux Full

directory server?a. slapd.confb. slapdc. sasl.confd. slurpd.conf

Which one of the following parameters can be used in ACLs to restrict clientsfrom accessing a specific attribute in a directory?a. dn[<dnstyle>]=<users>b. attrs=<attribute list>c. attrs=<auth>d. users

Ed Young is working as a system administrator at Red Sky IT Systems. Theorganization has implemented an LDAP server to enable its users and clientsto access the organization’s information. Ed finds that the LDAP directory isdisplaying numerous irrelevant entries in response to the search requests ofthe clients. He wants to restrict the number of entries that a server retrieves inresponse to search requests. Which of the following parameters of theslapd.conf file on LDAP server should Ed modify to perform the task?a. sizelimit <integer>b. timelimit <integer>c. –l <integer>d. –z <integer>

Tom Wilkins is working as a system administrator at Technology Systems.The management asks Tom to identify the employees who have receivedsalary increments. Tom writes all the search requests in a data file. He usesthe ldapsearch utility to search the bulk entries by using a single command.Which option should Tom use with ldapsearch utility to read lines from a datafile and perform LDAP search for each line?a. -Sb. –fc. –xd. –D

Ed Young, a system administrator at Mastery Mechanics is working on anLDAP directory. He finds that some entries of the inventory departmentrequire immediate updating. Ed writes all the required modifications in a file.He wants to use this file as an input to the ldapmodify utility. In addition, hedoes not want the modification process to stop even if there is an error in it.Which of the following commands should Ed use to perform the task?a. ldapmodify –a -fb. ldapmodify –b -fc. ldapmodify –c -f

Page 69: q7 Linux Full

d. ldapmodify –r –f

You have configured an LDAP directory server on a node having the IPaddress 172.17.27.154. The suffix of the directory is dc=newmoon,dc=com.You have to identify only the e-mail ids of all the users whose surname isCarter. Which of the following commands will you use to perform the task?a. ldapsearch sn=carter -h 172.17.27.154 mailb. ldapsearch sn=carter -x -D "cn=manger,dc=newmoon,dc=com"c. ldapsearch sn=carter -x -D -W "cn=manger,dc=newmoon,dc=com"d. ldapsearch sn=carter -x -h 172.17.27.154 mail

John Barret is working as a system administrator at SuperGraphics. Johnneeds to delete some entries from the LDAP directory by using the ldapdeletecommand. He also wants the ldapdelete command to prompt the user for thepassword before deleting the entry from the directory. In addition to this,John requires the input to be read from the data file instead of the standardinput. Which command should John use to perform the task?a. ldapdelete –x –cb. ldapdelete –c -fc. ldapdelete –f -xd. ldapdelete –W –f

Identify the directive that is used to specify the name of thelog file in which changes will be logged on the masterserver.replogfilereplicabinddncredentials

replica directive, specifies the binding method to bind themaster OpenLDAP server to the replica?suffixbindmethodbinddncredentials

What should be considered while copying the database filesfrom the master server to the slave server?Master server and slave should use the same or compatibledatabase versionsMaster server and slave should use the same byte ordering.Master server and slave should not use the same byteordering.Master server and slave should use the same or compatibledatabase versions and should use the same byte ordering.

Page 70: q7 Linux Full

Identify the command that you will issue at the masterserver to export the database to an LDIF file, backup.ldif.# slapadd–b –l backup.ldif#ldapadd –l backup.ldif# ldapadd –b -l backup.ldif#slapadd –l backup.ldif

What is the knowledge reference that points to the nodesdirectly under a directory partition s held by a domaincontroller known as?ReferralReferenceSuperior Knowledge ReferenceReferral Link

Mike Womack is working as a network administrator atQuality Software developers. He is performing crossplatform integration of multiple directory services across theplatforms. When he tries to integrate multiple directoryservices from different vendors, Mike has a problem insynchronizing data. Which utility should Mike use to carryout the transfer and conversion of data between multipledirectories?Both, Connector and Driver agentsConnector agentDriver agentMeta Directory

When does the need for integrating databases anddirectories across the network arise?Multiple vendor directories are used to store the data.Each directory uses its own database.Single vendor directories are used to store the data.Multiple vendor directories are used to store the data andeach directory uses its own database

What are the major issues in cross platform integration?Security of dataIntegrity of data

Page 71: q7 Linux Full

Security and integrity of dataSecurity and integrity of data stored on the LDAP directory

In order to work with LDAP, what would you do to configurethe Active Directory?Update the schema.Extend the interface of Microsoft’s Users and Group ManagerDirectory administration.Update the schema and extend the interface of Microsoft’sUsers and Group Manager Directory administration.Secure data stored on the LDAP directory.

Which of the following directives is used to edit theconfiguration file, /etc/openldap/ldap.conf?BASE <search base>ReplogfileReplicaBASE <search base> and HOST<server name>

To breach the security of the directory server, Steveeavesdrops on the credential information transmitted to thedirectory server. Identify the threat that Steve is using tobreach the security.Connection hijackingCredential forgingNetwork sniffingMasquerading

Steve, the system administrator at APL Inc. needs toknow the controls supported by the OpenLDAP server.Which of the following commands should Steve use toperform the task?a. # ldapsearch -x -s base -b "" "(objectclass=*)" +b. # ldapsearch -x -s base -b "" "(objectclass=*)"c. # ldapsearch -x base -b "" "(objectclass=*)" +d. # ldapsearch -x -s base -b "" +"(objectclass=*)"

You want to dump the content of OpenLDAP directoryentries into an LDIF file. Which of the followingcommands should you use?a. slapaddb. slapcatc. ldapaddd. ldapmod

Steve, the system administrator at APL Inc. needs to

Page 72: q7 Linux Full

create a replica OpenLDAP server of the masterOpenLDAP server. Which of the following should Steveuse to create a replica OpenLDAP server?a. # slapadd –l dbfile.ldifb. # slapcat –l dbfile.ldifc. # slapadd –b “dc=apl,dc=inc” –l dbfile.ldifd. # slapcat –b “dc=apl,dc=inc” –l dbfile.ldif

To allow users to search anonymously within the activedirectory, you have to configure the __________of theActive Directory.a. Access Control List (ACL)b. Metadirectoryc. Multivendor directoryd. LDAP directory

Which of the following is an LDAP replication daemon that is used to synchronizethe databases of master server and slave servers?a. slurpdb. slapdc. replicadd. ncsd

Which of the following files is used to enable replication in the slave LDAP server?a. slapd.confa. slurpd.confb. master.confc. nsswitch.conf

Which of the following parameters in slapd.conf file of a replica allows you tobypass the modification request from slave LDAP server to master LDAP server?a. rootpwb. updatednc. rootdnd. updateref

Which of the following configuration parameters with the replica directive can beused to specify the partition to be replicated?a. Hostb. Portc. Suffixd. credentials

Page 73: q7 Linux Full

5. Which of the following sections of the slapd.conf file should be same in both, themaster server and replicas?a. Globalb. Databasec. The Global and Database section should be same in both, the master server andreplicasd. The Global and Database section should be different in the master server andreplicas

Multistore uses Windows and Linux-based computer systems in two differentdepartments. Ed, the system administrator at Multistore, is asked to enable thecomputer systems to communicate with each other. To achieve this, Ed implementsthe LDAP server on the Linux-based computer system but has a problem ofsynchronization between the computer systems. Which synchronization agent shouldEd use to solve the problem?a. Push agentb. Pull agentc. Push and Pull agentd. Both, Push and Pull agents

Technology Systems is a computer systems manufacturing company. The variousdepartments maintain different databases and directories to store their respectivedata. The General Manager of Technology Systems needs to see an integrated viewof the databases and directories of all the departments. Which service should thecompany use to perform the task?a. Metadirectoryb. Connector Synchronization agentc. Driver Synchronization agentd. Connector and Driver Synchronization agents

Mastery Mechanics maintains the information of its employees in databases anddirectories in different computer systems operating on different platforms. Theinformation contained in directories is different from the information contained indatabases. Therefore, the management asks Ed Young, the system administrator, tointegrate these multiple directories across the platform for business purposes. Ed hasa problem in integrating all the information sources to perform the task. Whichtechnology should Ed use to solve the problem?a. Metadirectoryb. Multivendor Directoryc. Singlevendor Directoryd. Singlevendor and Multivendor directories both

True Travel Services maintains the data of its employees in different directoryservers. These directory servers are operating on Windows- and Linux-based

Page 74: q7 Linux Full

platforms. The company needs to perform cross-platform integration between thedirectory servers to enable users on different platforms to communicate with eachother. Donna Bard, the system administrator, is asked to perform the task. Whichmethod should Donna use to integrate Windows clients with Linux clients?a. LDAP proxy serverb. Both, Connector and Driver agentsc. Metadirectoryd. NIS/Active Directory gateway or PAM and NSS LDAP libraries

SSPT Corporation uses the LDAP directory to store all the information about itsemployees. The management allows the employees to search and access theinformation anonymously. The employees find that they are unable to read theirpasswords. What can be the possible cause of the problem?a. The permission set of Read all properties does not include reading ofpassword permissionb. Error in the directoryc. Entry does not exist in the directoryd. No password is required in anonymous access

Steve tries to hack the LDAP server of Blue Moon Inc. by usingkeystroke sniffer software that records the keystrokes made bya user. What type of security threat does Steve use?a. Script kiddieb. Trojan Horsec. Virusd. Zombie

Consider the following statements:Statement A: You need to generate a public andprivate key pair for digital certificates.Statement B: SSL uses public-key cryptography toestablish a secure connection betweencommunicating hosts.a. Statement A is True, and Statement B is False.b. Statement A is False, and Statement B is True.c. Both, Statement A and Statement B, are True.d. Both, Statement A and Statement B, are False.

Identify the authentication scheme where the directoryserver and the client need to present credentialinformation to each other.a. Anonymous authentication

Page 75: q7 Linux Full

b. One way authenticationc. Authentication based on a simple passwordd. Mutual authentication

Statement A: SASL is used to provide authentication support toconnection less protocols, such as TCP/IP.Statement B: The client tools, such as ldapsearch andldapmodify, by default uses the SASL to authenticate the users.Which is correct with respect to the above statements?a. Statement A is True and Statement B is False.b. Statement A is False and Statement B is True.c. Both, Statement A and Statement B, are True.d. Both, Statement A and Statement B, are False.

In which of the following security threats, existing programs are used to exploit thesecurity loopholes on the directory server?a. Connection hijackingb. Credential forgingc. Network sniffingd. Script kiddie

John has made use of disk space and CPU of the directory server to an extent thatdirectory server is unavailable to authorized clients. Which of the following methodJohn has used to launch DoS attack on the directory?a. Distributed DoS attackb. Direct resource consumptionc. SYN attackd. Indirect resource consumption

Which of the following method should you use to monitor the activities such as themodification of user password?a. Intrusion detection system (IDS)b. Auditingc. Authenticationd. Host-based detection systems

Identify the tool that prepares reports regarding identified security loophole, causesof the loophole, impact of the loophole, and solutions to handle the identifiedproblem.a. SASLb. SATANc. SSLd. TLS

Consider the following statements:Statement A: SSL always uses digital certificates to authenticate users over an

Page 76: q7 Linux Full

SSL-encrypted connection.Statement B: Authentication based on digital certificate over SSL becomes complexdue to the use of digital certificates that use a lot of system resources.a. Both, Statement A and Statement B, are true.b. Both, Statement A and Statement B, are false.c. Statement A is true, and Statement B is false.d. Statement A is false, and Statement B is true.

John, the system administrator at Red Eye Sky IT Systems, decides to implement theSASL authentication mechanism on his OpenLDAP server. John decides to share thepassword between OpenLDAP client and server. Therefore, John uses the DIGESTMD5mechanism to encrypt the password. Which format should John use to producethe SASL authentication id using the DIGEST-MD5 mechanism?a. uid=<username>, cn=<realm>, cn=digest-md5b. uid=<username>, cn=<realm>, cn=authc. uid=<username>, cn=digest-md5, cn=authd. uid=<username>, cn=<realm>, cn=digest-md5, cn=auth

Steve, the system administrator at Smartlabs, has implemented the SASLauthentication mechanism on his OpenLDAP server. John Barrett has recently joinedthe organization and Steve is asked to create the user account for John. Whichcommand should Steve use to generate an encrypted password for the new userJohn?a. # saslpasswd2 –u Johnb. # saslpasswd –c John–u Johnc. # saslpasswd2 –c Johnd. # saslpasswd2 John

Donna Bard is working as a system administrator at Blue Moon Computers Inc. BlueMoon uses various authentication mechanisms, such as DIGEST-MD5, forauthentication purposes. Donna is required to retrieve information about the userSteve from the OpenLDAP server. Which of the following ldapsearch commandsshould Donna use to perform the above task?a. $ ldapsearch –U u000997 –b dc=smartdevelopers, dc=com ‘cn=Steve*’b. $ ldapsearch –Y –U u000997 –b dc=smartdevelopers, dc=com‘cn=Ronald*’c. $ ldapsearch –b dc=smartdevelopers, dc=com ‘cn=Ronald*’d. $ ldapsearch –Y DIGEST-MD5 –U u000997 –b dc=smartdevelopers,dc=com ‘cn=Ronald*

Ronald Billing is working as a system administrator at Smartlabs. Ronald is asked tosetup the Kerberos servers in the organization to enable the Kerberos basedauthentication. Ronald needs to specify the domain name and realm to set up theprimary Kerberos server. Which of the following configuration files should Ronaldmodify to configure the primary Kerberos server?

Page 77: q7 Linux Full

a. /etc/kerb5.confb. /var/kerberos/krb5kdc/kdc.confc. /var/kerberos/krb5kdc/kadm5.acld. /var/kerberos/krb5kdc/kadm5.acl, and /etc/kerb5.conf

Steve Barnard is working as a system administrator at Smartdevelopers Inc. Steve isasked to setup Kerberos server to enable Kerberos-based authentication in theorganization. After modifying the configuration files, Steve needs to create theKerberos database that will store the authentication information. Which commandshould Steve use to perform the above task?a. # /usr/kerberos/sbin/kdb5_util createb. # /usr/kerberos/kdb5_util create –sc. # /usr/kerberos/sbin/kdb5_util create –sd. # /usr/sbin/kdb5_util create –s

To which of the following attributes of posixAccount objectclass will the first entry of 325 be mapped?gecos attributeuid attributeuidNumber attributegidNumber attribute

Steve, the system administrator at APL Inc. is changing theNIS infrastructure to LDAP infrastructure. Steve needs toconvert the group information in the LDIF format. Identify themigration perl script that Steve should use to perform thespecified task.migrate_group.plmigrate_netgroup.plmigrate_netgroup_byhost.plmigrate_netgroup_byuser.pl

Jim Lewis is working as a system administrator at RedSkyIT Systems. The management of the organization decides tomigrate the existing NIS infrastructure to OpenLDAP server.Jim decides to customize the migration script,migrate_common.ph file to create the migration scriptsaccording to the requirements. Which of the followingparameter should Jim use to provide default name suffix inthe customized migration script?

Page 78: q7 Linux Full

$DEFAULT_MAIL_DOMAIN$DEFAULT_BASE$EXTENDED_SCHEMA$NAMING CONTEXT

John, the system administrator needs to create theencrypted password for the ldap admin dn of the OpenLDAPdirectory. Which command should John use to perform therequired task?# smbpasswd –w secret# smbpasswd –W secret# /usr/bin/smbpasswd –w secret# /usr/bin/smbpasswd –W secret

Steve is working as a system administrator at Smartlabs.Steve needs to retrieve the modification time of lmpasswordand ntpassword since 1970. Which attribute if thesambaAccount object should Steve use to perform therequired task?sambaNTPasswordsambaPwdLastSetsambaAcctFlagsSambaLMPassword

Identify the attribute of sambaAccount object that specifiesthe path where user profiles are stored.sambaHomeDrivesambaLogonScriptsambaProfilePathsambaHomePath

Consider the following statementsStatement A: You can store all the Samba relatedinformation in the OpenLDAP server by using thesmbAccount object.Statement B: The operating system of the OpenLDAPserver should provide a valid set of UNIX attributes for thesmbAccount object.With respect to the preceding statements, which of thefollowing options is correct?Both, Statement A and Statement B, are False.Both, Statement A and Statement B, are True.Statement A is False and Statement B is True.

Page 79: q7 Linux Full

Statement A is True and Statement B is False.

Steve is working as a system administrator at Smartlabs.Steve needs to add a new user account, Ronald as a sambauser. Which command should Steve use to perform therequired task?# smbpasswd ronald –s ronald123# smbpasswd –s ronald123# smbpasswd –a ronald ronald123# smbpasswd –a ronald –s ronald123

Steve, the system administrator at APL Inc., is changingthe NIS infrastructure to LDAP infrastructure. He needs toconvert the password files stored in /etc/password and/etc/shadow in the LDIF format. Identify the migration perlscript that Steve should use to perform the specified task.a. migrate_group.plb. migrate_netgroup.plc. migrate_passwd.pld. migrate_netgroup_byuser.pl

Which perl script is used to translate the entries of the file/etc/networks into the LDIF format?a. migrate_networks.plb. migrate_netgroup_byhost.plc. migrate_netgroup.pld. migrate_netgroup_byuser.pl

Statement A: You need to use a cosine.schema file to provideSamba support in the LDAP server.Statement B: The pre-requisite schema files for samba.schemaare inetorgperson.schema and cosine.schema.With respect to the preceding statements, which of the followingoptions is correct?a. Both, Statement A and Statement B, are False.b. Statement A is False and Statement B is True.c. Both, Statement A and Statement B, are True.d. Statement A is True and Statement B is False.

Statement A: You use SMB protocol for file sharing and printersharing.

Page 80: q7 Linux Full

Statement B: A login request from the Windows clients performsmaximum two lookups in the Samba server.With respect to the preceding statements, which of the followingoptions is correct?a. Statement A is True and Statement B is False.b. Statement A is False and Statement B is True.c. Both, Statement A and Statement B, are True.d. Both, Statement A and Statement B, are False.

Steve, the system administrator with Blue Moon Inc., needsto configure Samba with ldap support. Identify theparameter that Steve needs to use to bind the smbddaemon to the LDAP server.a. ldap admin dnb. ldap suffixc. ldap ssld. ldap server

Ronald Irving, the system administrator at RedSky IT, Inc., is changing the NISinfrastructure to LDAP infrastructure. He needs to convert the host’s informationinto LDIF format. Identify the migration Perl script that Ronald should use toperform the specified task.a. migrate_passwd.plb. migrate_hosts.plc. migrate_networks.pld. migrate_base.pl

Which of the following posixAccount object class attributes specify the user name?a. Usernameb. Uidc. Uidnumberd. Gecos

Which of the following statements is true when migrating from NIS to LDAP?a. Only those attributes that have a many-to-many mapping are migrated from NISto LDAP.b. Only those attributes that have a many-to-one mapping are migrated from NIS toLDAP.c. Only those attributes that have a one-to-many mapping are migrated from NIS to

Page 81: q7 Linux Full

LDAP.d. Only those attributes that have a one-to-one mapping are migrated from NIS toLDAP.

Which of the following posixAccount object class attributes can be used to specifythe office contact number of a user?a. Cnb. Descriptionc. Gecosd. homedirectory

John, the system administrator at Red Eye Sky IT Systems, decides to integratesamba with OpenLDAP to enable the Linux server to be a part of Windows networkand provide various services to the users. Which of the following services is notprovided by Samba?a. File sharingb. Printer Sharingc. Messagingd. User Authentication

Steve, the system administrator at Smartlabs, is asked to integrate the Linux serverwith Windows server using Samba. To do this, Steve needs to install a specific RPMpackage, smbldap-0.7-1.i386.rpm on the Linux machine. Which of the followingcommand should Steve use to perform the required task?a. # rpm –vh smbldap-tools-0.7-1.i386.rpmb. # rpm -ivh smbldap-0.7-1.i386.rpmc. # rpm –ivh smbldap-tools-0.7-1.i386d. # rpm –ivh smbldap-tools-0.7-1.i386.rpm

Donna Bard is working as a system administrator at Blue Moon Computers Inc. BlueMoon asks Donna to integrate the Linux network with Windows using Samba.Donna is required to modify the /etc/samba/smb.conf file to configure the samba tosupport OpenLDAP. Which of the following parameters should Donna implement toperform the required task?a. workgroup, netbios name, security, and encryptionb. workgroup, netbios, and securityc. workgroup, netbios, and encryptiond. workgroup and encryption

Ronald Billing is working as a system administrator at Smartlabs. Ronald is asked tointegrate the Samba with OpenLDAP server. Ronald decides to configure theOpenLDAP to support Samba. To perform the task, Ronald needs to define the

Page 82: q7 Linux Full

16-byte hashed LANMAN password. This password will be generated by DESencryption method. Which attribute should Ronald implement to perform therequired task?a. SambaLMPasswordb. SambaNTPasswordc. SambaAcctFlagsd. SambaLogonScripts

Steve Barnard is working as a system administrator at Smartdevelopers Inc. Steve isasked to integrate the Samba with OpenLDAP. To integrate the Samba withOpenLDAP, Steve needs to include some additional attributes, such as uid,displayName, and gidNumber. Which of the schema files should Steve include in theslapd.conf file to include these attributes?a. inetorgperson.schema, cosine.schema,nis.schema,autofs.schemab. inetorgperson.schema, cosine.schema,autofs.schemac. inetorgperson.schema, nis.schemad. inetorgperson.schema, cosine.schema,nis.schema

Statement A: You need to use the –b option of rpmbuildcommand to build the binary package after the completionof %prep, %build, and %install stages.Statement B: You need to use the –s option of rpmbuildcommand to perform the %build stage from the spec file.Which of the following options is correct with respect to theabove statements?Statement A is True and Statement B is False.Statement A is False and Statement B is True.Both, Statements A and B, are True.Both, Statements A and B, are False.

Statement A: You need to issue the patch command fromthe/usr/src directory to apply a patch.Statement B: You need to use the patch –p0 commandalways to apply a patch.Which of the following options is correct with respect to theabove statements?Statement A is True and Statement B is False.Statement A is False and Statement B is True.Both, Statements A and B, are True.Both, Statements A and B, are False.

Page 83: q7 Linux Full

Statement A: The –B option of the scp command is used todisable password authentication mechanism.Statement B: The –p option of the scp command is used todisable the status indicator for each file transferred.Which of the following options is correct with respect to theabove statements?Statement A is True and Statement B is False.Statement A is False and Statement B is True.Both, Statements A and B, are True.Both, Statements A and B, are False.

Steve works as a system administrator at Good Graphics,Inc. He types the following command to check the integrityof the tracepath command:# rpm –Vf /bin/tracepathWhich of the following character will be displayed in theoutput if the file is unreadable?SGM?

Donna Johnson works as a system administrator atRed-Eye Experts. While upgrading a package, sheencounters the dependency problem. Which option of therpm command should Donna use to ignore the dependencyerror?--nodeps-F--aids-V

Steve works as a network administrator at Red Sky ITSystems at Denvor. He wants to upgrade the existing kernelof the Linux server with a new kernel to enable enhancedsecurity features. Steve downloads the required kernelsource code and wants to configure it. Steve has to changeonly few configuration settings. Steve has to upgrade thekernel at the earliest and the GUI mode of Linux is notworking. Which of the following command should Steve useat the shell prompt to configure the kernel?make menuconfigmake xconfigmake oldconfigmake config

Page 84: q7 Linux Full

Tom works as a network administrator at PQR Inc. Hewants to upgrade the kernel version 2.4.0 of Linux computerwith kernel version 2.6.0 to improve the speed of processingof kernel. While configuring the kernel, he enables themodule support feature for the File system option in theMain menu. After configuring the kernel version 2.6.0, whichcommand should Tom issue at the shell prompt to compilethe modules?make modulesmake modules_installmake cleanmake dep

John works as a network administrator at Deez, Inc. Thereis a Linux server in the organization that uses processor ofarchitecture i686. John has been assigned a task ofupgrading the kernel version 2.4.2 of Linux server to kernelversion 2.4.22. After configuring and compiling the kernel,John wants to install the kernel. For this, first, he needs tocopy the kernel to the /boot/vmlinuz-2.4.24Upgradedirectory. Which command should John issue at the shellprompt to copy the kernel to the /boot/vmlinuz-2.4.24Upgrade directory?cp /usr/src/linux-2.4.22/arch/i686/bzImage/boot/vmlinuz-2.4.22Upgradecp /usr/src/linux-2.4.22/arch/i686/boot/bzImage /boot/vmlinuz-2.4.22Upgradecp /usr/src/bzImage /boot/vmlinuz-2.4.22Upgradecp /usr/src/linux-2.4.22/bzImage/boot/vmlinuz-2.4.22Upgrade

Statement A: If the kernel compiles ok, but does not boot,then you need to run the make clean command totroubleshoot the problem and then recompile the kernel.Statement B: If the kernel compiles ok but make moduesfail, then you need to run make dep command only totroubleshoot the problem.Which of the following options is correct with respect to theabove statements?Statement A is True and Statement B is False.

Page 85: q7 Linux Full

Statement A is False and Statement B is True.Both, Statement A and Statement B, are True.Both, Statement A and Statement B, are False.

Statement A: The “Unresolved symbols” error messageoccurs when the kernel fails to load a module.Statement B: The “Unresolved symbols” error message canbe troubleshooted by running the make clean commandbefore compiling the kernel.Which of the following options is correct with respect to theabove statements?Statement A is True and Statement B is False.Statement A is False and Statement B is True.Both, Statement A and Statement B, are True.Both, Statement A and Statement B, are False.

Nancy Jones works as a network administrator at GlobalSystem, Inc. The organization has its two branches atHouston and New York, and both are connected in anetwork. The employees of the organization generallycommunicate through e-mail messages. Nancy receives acomplaint from John, a software developer at Houston, thathe is not able to send and receive mails to James, asoftware developer at the New York branch. Nancy uses thetraceroute command to view the route through which thee-mail messages go from source to the destination. Sheobserves that the traceroute command is not workingproperly. As a result, she wants to check the integrity of thetraceroute command. What should Nancy do to checkthe integrity of the traceroute command?a. She needs to type the rpm –Vf /bin/traceroutecommand at the shell promptb. She needs to type the rpm –K /bin/traceroute commandat the shell promptc. She needs to import the RPM-GPG-KEY key and type the rpm–Vf /bin/traceroute command at the shell promptd. She needs to import the RPM-GPG-KEY key and type the rpm–K /bin/traceroute command at the shell prompt

Steve, a network administrator, downloads the

Page 86: q7 Linux Full

squirrelmail-1.2.11-1.src.rpm SRPM and installs it on hiscomputer. Now, he wants to make binary RPM of thesquirrelmail-1.2.11-1.src.rpm SRPM. While building thebinary RPM, Steve also wants to view the debugginginformation. How can he perform the required task?a. He needs to navigate to the /usr/src/redhat/SPECSdirectory and type the following command to build binaryRPM of squirrelmail package:# rpmbuild –bb squirrelmail.spec �b. He needs to navigate to the /usr/src/redhat/SPECSdirectory and type the following command to build binaryRPM of squirrelmail package:# rpmbuild –bp squirrelmail.spec �c. He needs to navigate to the /usr/src directory and type thefollowing command to build binary RPM of squirrelmailpackage:# rpmbuild –bb –vv squirrelmail.spec �d. He needs to navigate to the /usr/src/redhat/SPECS directoryand type the following command to build binary RPM ofsquirrelmail package:# rpmbuild –bb –vv squirrelmail.spec �

Donna Johnson works as a network administrator at PQR,Inc. She has the httpd-2.0.i386.rpm installed on hercomputer. Donna finds that the httpd.conf file in thehttpd-2.0.i386.rpm has been corrupted. She wants toextracts the httd.conf file from the httpd-2.0.i386.rpmpackage. What should Donna do to perform the requiredtask?a. He needs to convert the httpd-2.0.i386.rpm to the cpio archiveby using the cpio command and copy the httpd.conf file fromthe cpio archive to the /etc/httpd/conf directory.b. She needs to convert the httpd-2.0.i386.rpm to the cpio archiveby using the rpm2cpio command and copy the httpd.conffile from the cpio archive to the /etc/httpd/conf directory.c. She needs to convert the httpd-2.0.i386.rpm to the cpio archiveby using the cpio command and copy the httpd.conf file fromthe cpio archive to the /etc/httpd directory.d. She needs to convert the httpd-2.0.i386.rpm to the cpio archiveby using the rpm2cpio command and copy the httpd.conf filefrom the cpio archive to the /etc/httpd directory.

John works as a network administrator at Global System,Inc. He has the squirrelmail-1.2.11-1.noarch.rpm packageinstalled on his computer. He wants to verify the integrity ofthe squirrelmail-1.2.11-1.noarch.rpm package. How can

Page 87: q7 Linux Full

John perform the required task?a. He needs to type therpm –K squirrelmail-1.2.11-1.noarch.rpmcommand at the shell promptb. He needs to type therpm –Vf squirrelmail-1.2.11-1.noarch.rpmcommand at the shell promptc. He needs to import the RPM-GPG-KEY key and type therpm –Vf squirrelmail-1.2.11-1.noarch.rpmcommand at the shell promptd. He needs to import the RPM-GPG-KEY key and type therpm –K squirrelmail-1.2.11-1.noarch.rpmcommand at the shell prompt

Joe Garnett works as a system administrator in RedSky ITServices. Joe recently downloaded the latest kernel sourcecode and updated it. However, Joe is unable to boot fromthe new kernel and views the following error message:Warning: unable to open an initial consoleKernel panic: no init found. Try passing init = option toKernel . What should Joe do to troubleshoot the problem?a. Joe needs to set the root= parameter correctly in the/etc/lilo.conf fileb. Joe needs to assign the value, 0, to the default parameterc. Joe needs to assign the value, 1, to the default parameterd. Joe needs to set the image= parameter correctly in the/etc/lilo.conf file

John Barred, the system administrator at Red Sky ITSystem wants to check whether or not the kernel on a Linuxcomputer detects the full amount of RAM. For this, Johnissues the cat/proc/meminfo command and observes that thedisplayed quantity of memory is not the same as theinstalled RAM of 256 MB. What should John do so that thekernel detects the full amount of RAM?a. John needs to add the following entry to the/boot/grub/grub.conf: mem=256Mb. John needs to add the following entry to the

Page 88: q7 Linux Full

/boot/grub/grub.conf: mem=256M. After adding this entry,John needs to reboot the computer.c. John needs to add the following entry to the/boot/grub/grub.conf: linux mem=256M. After adding thisentry, John needs to reboot the computer.d. John needs to add the following entry to the/boot/grub/grub.conf: linux mem=256M

Statement A: The make xconfig command works only inthe GUI mode.Statement B: The make oldconfig prompts all thequestions that are required for configuration of kernel.Which of the following options is correct with respect to theabove statements?a. Statement A is True and Statement B is False.b. Statement A is False and Statement B is True.c. Both, Statement A and Statement B, are True.d. Both, Statement A and Statement B, are False.

What do you need to do if you see the following errormessage after running the make bzImage command:warning: kernel is too big for standaloneboot from floppya. Use the make zImage command instead of the bzImagecommand.b. Disable the configuration settings that are not required andrecompile the kernel using the make bzImage command.c. Disable the configuration settings that are not required andrecompile the kernel using the make zImage command.d. Use the make dep command and then recompile the kernelusing the make bzImage command.

Mike Womack works as a network administrator at PQR,Inc. Mike upgrades the existing kernel of the Linux serverto a new version to obtain new hardware support. Heupgrades the kernel and reboots the computer afterupgrading. He observes that the computer hangs justbefore the LILO is displayed. What should Mike do totroubleshoot the problem?a. Mike needs to restart the computer and press the DEL key toset up the BIOS. Then, Mike needs to select the IDE settingsand set the proper primary hard drive and slave drives.b. Mike needs to restart the computer and press the F10 key to

Page 89: q7 Linux Full

set up the BIOSd. Then, Mike needs to select the IDE settingsand set the proper primary hard drive and slave drives.c. Mike needs to restart the computer and press the DEL key toset up the BIOS. Then, Mike needs to select the IDE settingsand set the proper secondary hard drive and slave drives.d. Mike needs to restart the computer and press the DEL key toset up the BIOS. Then, Mike needs to select the IDE settingsand set the proper primary hard drive.

Chris Donald, the system administrator, at Smart Software Developers wants tomake a binary RPM from the source code of slang-1.4.5-18.src.rpm SRPM. Beforemaking the binary RPM, Chris wants to specify the location of the README file.Which of the following sections does Chris need to modify to perform the requiredtask?a. Preambleb. %prepc. %filed. %build

Steve works as a network administrator at Red Sky IT Systems. He downloads thesource code of postfix RPM to provide support to the mail server in the organization.Which of the following options should Steve use with rpmbuild command to unpackthe SRPM of postfix?a. –bbb. –bpc. –bcd. –bs

Nancy, the network administrator at Quality Software Developers wants to check theintegrity of an rpm package installed on her computer. Which option of the rpmcommand should Nancy use to perform the required task?a. –vb. –Vfc. –Kd. –qi

Statement A: You can use the cpio command to extract a single file from a package.Statement B: You can use the --replacefiles or --nodeps option with the rpmcommand to resolve dependencies.With respect to the above statements, which of the following options is correct?a. Statement A is True and Statement B is False.b. Statement A is False and Statement B is True.c. Both, Statement A and Statement B, are True.

Page 90: q7 Linux Full

d. Both, Statement A and Statement B, are False.

Statement A: The ? symbol in the output of rpm –Vf command shows that the file isunreadable.Statement B: The –Vf of rpm command can check the integrity of any command.With respect to the above statements, which of the following options is correct?a. Statement A is True and Statement B is False.b. Statement A is False and Statement B is True.c. Both, Statement A and Statement B, are True.d. Both, Statement A and Statement B, are False.

1. Which of the following commands cannot be used to configure the kernel if youwork in a CLI mode?a. make configb. make oldconfigc. make menuconfigd. make xconfig

2. Steve works as a network administrator at Global System, Inc. He needs to upgradethe kernel version 2.4.0 of Linux server to kernel version 2.6.0. To configure thekernel version 2.6.0, from which directory Steve should issue the make xconfigcommand?a. /rootb. /usr/srcc. /usr/src/linux-2.4.0d. /usr/src/linux-2.6.0

3. Donna works as a network administrator at Deez, Inc. There is a Linux server in theorganization that uses a processor of architecture i486. Donna needs to upgrade thekernel version 2.4.0 of Linux server to kernel version 2.4.24. She issues the makebzImage command to create the gzip compressed kernel image named bzImage. Inwhich directory is the bzImage file stored?a. /usr/src/linux-2.4.24b. /usr/srcc. /usr/src/linux-2.4.24/arch/i486/bootd. /usr/src/linux-2.4.24/arch/i486

4. Which of the following options when used with the mkbootdisk command instructsthe user to insert a floppy?a. --device devicefileb. --nopromptc. –iso

Page 91: q7 Linux Full

d. --size size

5. Don Allen works as a network administrator at Good Graphics, Inc. He needs toupgrade kernel version 2.4.2 of Linux server to kernel version 2.6.0. Afterconfiguring and compiling the kernel version 2.6.0, Don types the makemodules_install command to install the modules. What task does this commandperform?a. Copies the new modules to the /lib directoryb. Copies the new modules to the /lib/modules directoryc. Copies the new modules to the /lib/modules/2.6.0 directoryd. Copies the new modules to the /lib/modules/2.6.0/build directory

Statement A: To install Linux on a computer using FTP, youneed to install FTP on the Linux computer.Statement B: To install Linux on a computer using NFS, youneed to install NFS on the Linux computer.Which is correct with respect to above statements?Statement A is True and Statement B is False.Statement A is False and Statement B is True.Both, Statement A and Statement B, are True.Both, Statement A and Statement B, are False.

Statement A: SNMP can be used to monitor a network andits components.Statement B: Strace can be used as a monitoring tool.Which is correct with respect to above statements?Statement A is True and Statement B is False.Statement A is False and Statement B is True.Both, Statement A and Statement B, are True.Both, Statement A and Statement B, are False.

Statement A: Providing network based services, such asFTP and samba makes different ports vulnerable fornetwork attacks.Statement B: Malicious users can cause an application oran operating system to break down by triggering its bufferoverrun.Which is correct with respect to above statements?Statement A is True and Statement B is False.Statement A is False and Statement B is True.Both, Statement A and Statement B, are True.Both, Statement A and Statement B, are False.

Statement A: Auditing in Linux can be done using syslog.Statement B: Stealth scanning is used to scan a host

Page 92: q7 Linux Full

without being detected by applications, such as Synlogger.Which is correct with respect to above statements?Statement A is True and Statement B is False.Statement A is False and Statement B is True.Both, Statement A and Statement B, are True.Both, Statement A and Statement B, are False.

Statement A: RHEL 3 supports kernel 2.6.Statement B: Mandrake corporate server 3.0 supportskernel 2.6.Which is correct with respect to above statements?Statement A is True and Statement B is False.Statement A is False and Statement B is True.Both, Statement A and Statement B, are True.Both, Statement A and Statement B, are False.

Statement A: The syslog.conf file is stored in the /etc/sysconfigdirectory, and the syslog file is stored in the /etc directory.Statement B: The –r option of the SYSLOGD_OPTIONS parameterin the /etc/sysconfig/syslog file enables logging from the remotemachines.Which of the following options is correct with respect to the abovestatements?Statement A is True and Statement B is False.Statement A is False and Statement B is True.Both, Statement A and Statement B, are True.Both, Statement A and Statement B, are False.

Statement A: kswapd is a part of the kernel that frees memorywhen it gets fragmented or full.Statement B: kswapd contains a parameter tries_min, whichspecifies the number of pages kswapd writes in one turn.Which of the following options is correct with respect to the abovestatements?Statement A is True and Statement B is False.Statement A is False and Statement B is True.Both, Statement A and Statement B, are True.Both, Statement A and Statement B, are False.

Statement A: A Linux computer is said to be shutting down

Page 93: q7 Linux Full

gracefully if before shutting down it does not terminate all theprocesses that are running currently.Statement B: A non-zero value of the ctrl-alt-del parameterspecifies that the computer will reboot immediately withoutterminating all the running services and processes.Which of the following options is correct with respect to the abovestatements?Statement A is True and Statement B is False.Statement A is False and Statement B is True.Both, Statement A and Statement B, are True.Both, Statement A and Statement B, are False.

Statement A: The parameter, panic_on_oops can be modified tocontrol the behavior of the kernel when a bug is encountered.Statement B: The value, 0, of the panic_on_oops parameterspecifies that the kernel delays for few seconds if a bug isencountered and then reboots.Which of the following options is correct with respect to the abovestatements?Statement A is True and Statement B is False.Statement A is False and Statement B is True.Both, Statement A and Statement B, are True.Both, Statement A and Statement B, are False.

Which of the following commands will you use to verify theinstallation of the appropriate HTTP services, whilepreparing an Apache Server?# rpm –qa | grep nfs-utils# redhat-config-nfs-1.0.13-1# rpm –qa | grep http# rpm –qa | grep ftp

What is the directory location of storing the standard files ofFTP server?/usr/var/vsftp

Page 94: q7 Linux Full

/usr/ftp//var/ftp/pub

What is the directory location for storing the standard files ofApache Web Server?/var/var/www/html/usr/bin/etc

For providing the graphical installation feature in Kickstart,which parameter needs to be specified in the ks.cfg file?mousekeyboardlanguagemonitor

Statement A: Linux kernel is modular as well as monolithicwhile Windows kernel is only monolithic.Statement B: Linux kernel runs the threads of amultithreaded application as separate processes usingshared memory, while Windows kernel runs everyapplication as a collection of threads.Which of the following options is correct with respect to theabove statements?Statement A is True and Statement B is False.Statement A is False and Statement B is True.Both, Statement A and Statement B, are True.Both, Statement A and Statement B, are False.

Statement A: The file systems, FAT32 and ext3, aresupported by RHEL, but RHEL does not support XFS.Statement B: The file system, ReiserFS is a default filesystem in SuSE.With respect to the above statements, which of the followingoptions is correct?Statement A is True and Statement B is False.Statement A is False and Statement B is True.Both, Statement A and Statement B, are True.Both, Statement A and Statement B, are False.

Page 95: q7 Linux Full

Statement A: Both file systems, ext3 and XFS, support blockjournaling.Statement B: Both file systems, ext3 and NTFS, providePOSIX file permissions.With respect to the above statements, which of the followingoptions is correct?Statement A is True and Statement B is False.Statement A is False and Statement B is True.Both, Statement A and Statement B, are True.Both, Statement A and Statement B, are False.

Statement A: You can export the account settings using thebuilt in Import/Export feature of Internet Explorer.Statement B: You cannot export theFavorites/Bookmarks/Cookie with the help of built-inImport/Export feature of Internet Explorer.With respect to the above statements, which of the followingoptions is correct?Statement A is True and Statement B is False.Statement A is False and Statement B is True.Both, Statement A and Statement B, are True.Both, Statement A and Statement B, are False.

Statement A: While installing Mono RPMs, you should installthe mono-core-1.1.6-1.novell.6.3.i586 RPM before installingthe mono-data-1.1.6-1.novell.6.3.i586.rpm RPM.Statement B: While installing Mono RPMs, you should installthe mono-data-1.1.6-1.novell.6.3.i586.rpmbefore installingthe mono-basic-1.1.6-1.novell.6.3.i586.rpm RPM.Which of the following options is correct with respect to theabove statements?Statement A is True and Statement B is False.Statement A is False and Statement B is True.Both, Statement A and Statement B, are True.Both, Statement A and Statement B, are False.

1. Consider the following statements:Statement A: Linux is supported on almost all types of platforms available.Statement B: Linux provides support to all types of hardware, such as a Palmtop with2 MB of memory storage or petabyte storage cluster with hundreds of nodes.With respect to the above statements, which of the following is correct?a. Statement A is True and Statement B is False.b. Statement A is False and Statement B is True.c. Both, Statement A and Statement B, are True.d. Both, Statement A and Statement B, are False.

Page 96: q7 Linux Full

2. Consider the following statements:Statement A: Linux provides authentication service using PAM.Statement B: Linux provides secure communication using PAM.With respect to above statements, which of the following is correct?a. Statement A is True and Statement B is False.b. Statement A is False and Statement B is True.c. Both, Statement A and Statement B, are True.d. Both, Statement A and Statement B, are False.

3. Consider the following statements:Statement A: Linux provides authorization service using PAM.Statement B: Linux provides secure communication using PAM.With respect to above statements, which of the following is correct?a. Statement A is True and Statement B is False.b. Statement A is False and Statement B is True.c. Both, Statement A and Statement B, are True.d. Both, Statement A and Statement B, are False

4. Consider the following statements:Statement A: Red Hat Enterprise Linux ES supports EMD64T & AMD64 systems.Statement B: Red Hat Enterprise Linux AS supports EMD64T & AMD64 systems.With respect to above statements, which of the following is correct?a. Statement A is True and Statement B is False.b. Statement A is False and Statement B is True.c. Both, Statement A and Statement B, are True.d. Both, Statement A and Statement B, are False.

5. Consider the following statements:Statement A: Red Hat Enterprise Linux ES supports Itanium2 systemsStatement B: Red Hat Enterprise Linux AS supports Itanium2 systemsWith respect to above statements, which of the following is correct?a. Statement A is True and Statement B is False.b. Statement A is False and Statement B is True.c. Both, Statement A and Statement B, are True.d. Both, Statement A and Statement B, are False.

1. APL, Inc. provides IT services to its clients across the world. The company hasLinux-based enterprise set up for its services to the clients. Whenever a new systemis brought in, the Kickstart installation is used to configure it. Steve is a networkadministrator at APL Inc.. In view of increasing client requirements, some newsystems are added to the company. Steve wants to read and edit the Kickstartconfiguration file that may be used to install Linux on these new systems. Which

Page 97: q7 Linux Full

option in Kickstart installation should Steve use to perform the task?a. skipxb. installc. interactived. text

2. EarthenSky, Inc. is an application development organization. The company usesLinux-based enterprise set up for its application development projects. The companyhas got a new application development project. John Warren is working as a projectmanager of this new project. The client has instructed John to ensure the safety andsecurity of application resources related to this project. For this, the company uses anencrypt password system in its Linux-based machines. John needs a server thatsupports this encrypt password system. Which server should John use to perform thistask?a. HTTP serverb. Kerberos Serverc. Samba Serverd. NFS server

3. Earthenmovers, Inc. is an IT company, providing services to its clients all over theworld. The company has a Linux-based enterprise set up. As per the client’srequirements, the company needs to introduce new systems in its enterprise. Thecompany uses the Kickstart installation for this purpose. Henry O’Neil is working asthe network administrator at Earthermovers Inc.. While performing the Kickstartinstallation on a new computer in the enterprise, Henry needs to initialize all theinvalid partitions on the disk and delete the data on those partitions. Which Kickstartcommand should Henry use to perform the task?a. upgradeb. xconfigc. zerombrd. skipx

4. TeamSoftwares, Inc. is a software development organization, and has a Linux-basedenterprise set up. The company needs to add 25 more computers for a new project. The enterprise uses Red Hat installation files from a remote computer for Kickstartinstallation. The enterprise has a DHCP server and a single Ethernet network card forevery machine on the local network. Donna Bard is working as a networkadministrator at TeamSoftware Inc. She needs to configure the network cards onevery new computer. Which command should Donna use to perform the task?a. network --device eth0 –bootproto dhcpb. clearpart --all --drives=sda,sdb,sdcc. part /boot --fstype ext3 --size=100 --ondisk=sdad. part / --fstype ext3 --size=10000 --grow --ondisk=sda

Page 98: q7 Linux Full

5. PQl, Inc. is an IT company, providing the e-greetings services to its clients all overthe world. The organization has a Linux-based set up in its enterprise. It needs to addsome more computers to cater its client requirements. Ken Burton is working as anetwork administrator at PQl Inc., He is assigned the task of installing these newcomputers in the enterprise. He must install Linux on these machines by using theKickstart installation remotely. Ken is instructed to perform this task in the minimumamount of time. Which server system should Ken use to perform this task?a. FTPb. HTTPc. NFSd. Samba

John works as a network administrator at Red Sky ITSystems. While managing virtual memory at the Linuxserver, John wants to specify the maximum number of dirtybuffers that can be stored in the buffer cache. Which of thefollowing parameters of the bdflush file should John edit toperform the required task?a. int ndirtyb. int nfractc. int intervald. int nfract_sync

Donna works as a network administrator at Red Sky ITSystems. While managing virtual memory at the Linuxserver, Donna wants to specify the maximum percentageof memory that can be used as buffer. Which of thefollowing files does Donna need to edit for this?a. buffermemb. freepagesc. bdflushd. kswapd

Ronald Billing works as network administrator at Red EyeExperts. The mail server at the main branch of theorganization provides mail services to all the computers

Page 99: q7 Linux Full

across different branches. To avoid the unnecessary trafficof data, Ronald has been assigned the task of blocking allthe bogus error messages arriving at the mail server. Whatshould Ronald do to perform the required task?a. He needs to assign the value, 1 to theicmp_echo_ignore_all parameterb. He needs to assign the value, 0 to theicmp_echo_ignore_all parameterc. He needs to assign the value, 1 to theicmp_echo_ignore_broadcasts parameterd. He needs to assign the value, 1 to theicmp_ignore_bogus_error_responses parameter

Tom works as a network administrator at PQR, Inc. All theemployees across various branches use a centralizedserver at the main branch of the organization. Tom wantsto increase the file descriptor limit for the MPI jobs thatusers run on the centralized server. What should Tom do toincrease the file descriptor limit for the MPI jobs?a. Only the file, /etc/pam.d/login should be edited.b. Only the file, /etc/security/limits.conf should be edited.c. Both the files, /etc/pam.d/login, and /etc/security/limits.confshould be edited.d. Both the files, /etc/pam.d/rlogin, and /etc/security/limits.confshould be edite

Steve works as a network administrator at Red Sky ITSystems. The employees across various branches of theorganization use the database server, which is based onWindows. The employees of the organization require POSIXfile permissions on the database server and ask Steve forthis. Steve wants block journaling to be enabled on thedatabase server. What should Steve do to perform therequired tasks?a. Steve needs to migrate the database server to a Linuxdistribution that supports ReiserFS.b. Steve needs to migrate the database server to a Linux

Page 100: q7 Linux Full

distribution that supports ext3 filesystem.c. Steve needs to migrate the database server to a Linuxdistribution that supports ext2 filesystem.d. Steve needs to migrate the database server to a Linuxdistribution that supports XFS.

John Barret works as a network administrator at GlobalSystem Inc. The employees of its Software Developmentdepartment develop .NET applications for their clients.Global System Inc. migrates to the Linux platform to avoidthe cost of licensing in Windows. The employees needsupport to develop .NET applications on the Linux platform.What should John do to provide this support?a. John needs to install themono-data-sybase-1.1.6-1.novell.6.3.i586.rpm RPM and allthe RPMs on which it is dependent.b. John needs to install themono-ikvm-1.1.6-1.novell.6.3.i586.rpm RPM and all theRPMs on which it is dependent.c. John needs to install themono-jscript-1.1.6-1.novell.6.3.i586.rpm RPM and all theRPMS on which it is dependent.d. John needs to install themono-devel-1.1.6-1.novell.6.3.i586.rpm RPM and all theRPMs on which it is dependent.

Chris Donald works as a network administrator at QualitySoftware Developers. To avoid the cost of licensing inWindows, the organization migrates to the Linux platform.The employees of the R& D of Quality Software want to test

Page 101: q7 Linux Full

an application written in C# on the Linux platform. Which ofthe following is the correct order of installing the requiredMono RPMs to provide support to run the C# application?a. The RPMs should be installed in the following order:mono-core-1.1.6-1.novell.6.3.i586.rpmmono-data-1.1.6-1.novell.6.3.i586.rpmmono-web-1.1.6-1.novell.6.3.i586.rpmb. The RPMs should be installed in the following order:mono-data-1.1.6-1.novell.6.3.i586.rpmmono-core-1.1.6-1.novell.6.3.i586.rpmmono-web-1.1.6-1.novell.6.3.i586.rpmc. The RPMs should be installed in the following order:mono-core-1.1.6-1.novell.6.3.i586.rpmmono-web-1.1.6-1.novell.6.3.i586.rpmmono-data-1.1.6-1.novell.6.3.i586.rpmd. The RPMs should be installed in the following order:mono-data-1.1.6-1.novell.6.3.i586.rpmmono-web-1.1.6-1.novell.6.3.i586.rpmmono-core-1.1.6-1.novell.6.3.i586.rpm

Statement A: While installing Mono RPMs, you shouldinstall the mono-locale-extras-1.1.6-1.novell.6.3.i586.rpmbefore installing the mono-devel-1.1.6-1.novell.6.3.i586.rpm to avoiddependency error.Statement B: While installing Mono RPMs, you shouldinstall the mono-extras-1.1.6-1.novell.6.3.i586.rpm RPMbefore installing the mono-devel-1.1.6-1.novell.6.3.i586.rpm RPM.Which of the following options is correct with respect to theabove statements?a. Statement A is True and Statement B is False.b. Statement A is False and Statement B is True.c. Both, Statement A and Statement B, are True.d. Both, Statement A and Statement B, are False.

Statement A: You can use the –unsafe option with themcs command to compile the unsafe code written in theC#.Statement B: You can use the – nowarn option with themcs command to ignore the warning messages whilecompiling a C# application.Which of the following options is correct with respect to theabove statements?a. Statement A is True and Statement B is False.b. Statement A is False and Statement B is True.

Page 102: q7 Linux Full

c. Both, Statement A and Statement B, are True.d. Both, Statement A and Statement B, are False

1. Consider the following statements:Statement A: You need to assign the value, -s, to the SMBDOPTIONS parameter storedin the /etc/sysconfig/samba file to specify that the smbd should log to the standardoutput rather than a file.Statement B: You need to assign the value, -F, to the WINBINDOPTIONS parameter ifyou do not want to run winbind as a daemon.With respect to the above statements, which of the following options is correct?a. Statement A is True and Statement B is False.b. Statement A is False and Statement B is True.c. Both, Statement A and Statement B, are True.d. Both, Statement A and Statement B, are False.

2. Consider the following statements:Statement A: The default value of the age_buffer parameter stored in the/proc/sys/vm/bdflush file is 1 second.Statement B: The minimum value of the age_buffer parameter stored in the/proc/sys/vm/bdflush file is 30 seconds.With respect to the above statements, which of the following options is correct?a. Statement A is True and Statement B is False.b. Statement A is False and Statement B is True.c. Both, Statement A and Statement B, are True.d. Both, Statement A and Statement B, are False.

3. Which of the following parameters is used to calculate the maximum number ofpages of virtual memory kswapd tries to free in one round?a. swap_clusterb. tries_minc. tries_based. overcommit_memory

4. Which of the following parameters stored in the /proc/sys/kernel directory specifiesthe maximum number of System V shared memory segments that can be created in asystem?a. shmallb. shmmaxc. overflowgid

Page 103: q7 Linux Full

d. shmmni

5. Consider the following statements:Statement A: The minimum value of the nfrat_sync parameter is 0%.Statement B: The default value of the nfract_sync parameter is 50%.With respect to the above statements, which of the following options is correct?a. Statement A is True and Statement B is False.b. Statement A is False and Statement B is True.c. Both, Statement A and Statement B, are True.d. Both, Statement A and Statement B, are False.

1. Donna works as a network administrator at PQR, Inc. The employees across variousbranches of PQR, Inc. use the database server, which is based on the Windowsplatform. The employees of PQR Inc. want to be able to store files of size up to 6terabyte on the file server. They also require POSIX file permissions on the fileserver. What should Steve do to solve the problem of employees?a. Steve needs to migrate the database server to a Linux distribution that supportsReiserFS.b. Steve needs to migrate the database server to a Linux distribution that supportsext3 filesystem.c. Steve needs to migrate the database server to a Linux distribution that supportsext2 filesystem.d. Steve needs to migrate the database server to a Linux distribution that supportsNTFS.

2. Tom Wilkins works as a network administrator at Smart Software Developers. Theemployees of the Software Development department of the organization developVisual Basic applications for their clients. Smart Software migrates to the Linuxplatform to avoid the cost of licensing in Windows. The employees of the SoftwareDevelopment department need support to run Visual Basic applications on the Linuxplatform. What should John do to help?a. John needs to install the mono-data-sybase-1.1.6-1.novell.6.3.i586.rpm RPMand all the rpms on which it is dependent.b. John needs to install the mono-complete-1.1.6-1.novell.6.3.i586.rpm RPM andall the rpms on which it is dependent.c. John needs to install the mono-basic-1.1.6-1.novell.6.3.i586.rpm RPM and allthe RPMs on which it is dependent.d. John needs to install the mono-devel-1.1.6-1.novell.6.3.i586.rpm RPM and allthe RPMs on which it is dependent.

3. Steve works as a network administrator at Red Sky IT Systems. The organizationmigrates its network to the Linux platform to avoid the cost of licensing in Windows.The employees of the Software Development department of this organization want torun the C# application, payroll.cs, on the Linux computers. Steve installs all therequired Mono RPMs to provide support for running C# applications.After installing the required RPMs, Steve compiles the payroll.cs application. While

Page 104: q7 Linux Full

running the C# application, the employees of the Software Development departmentwant the file, basic, to be loaded into the memory. They also want to activate thesecurity manager while running the C# application. Which command should Steveuse to perform the required tasks?a. # mono –-config basic –-security payroll.exeb. # mono –-config basic payroll.exec. # mono –-config –security payroll.exed. # mono –-security payroll.exe

4. Chris works as a network administrator at Red Eye Experts. This organizationmigrates its network from Windows to Linux. The employees of the ApplicationDevelopment department of the organization want to compile and run the C#application, salary.cs, on Linux computers. They also want that, if any error occurs,an exception should be generated. Which command should Chris use to perform thistask?a. # mcs --fatal salary.csb. # mcs -debug salary.csc. # mcs --nowarn salary.csd. # mcs --unsafe salary.cs

5. Jim works as a network administrator at Infoway Inc. The employees across variousbranches of Infoway Inc. uses Windows-based database server. The employees want to be able to store files of size up to 9EB on the database server. Jim wants to enablethe Metadata only journaling feature on the server. What should he do to solve theproblem of employees?a. Steve needs to migrate the database server to a Linux distribution that supportsReiserFS.b. Steve needs to migrate the database server to a Linux distribution that supportsext3 filesystem.c. Steve needs to migrate the database server to a Linux distribution that supportsNTFS filesystem.d. Steve needs to migrate the database server to a Linux distribution that supportsXFS.

Statement 1: You can use the vmstat command to obtainvirtual memory statistics.Statement 2: You can use the top command to display asorted list of CPU utilization processes.Which of the following is True with respect to the precedingstatements?Statement A is True and Statement B is False.Statement A is False and Statement B is True.

Page 105: q7 Linux Full

Both, Statement A and Statement B, are True.Both, Statement A and Statement B, are False.

Statement A: A managed device is a network terminal thatcontains an SNMP agent and resides on a SNMP managednetwork.Statement B: An agent is a software module for managingthe network that resides in the managed devices.Which is True with respect to above statements?Statement A is True and Statement B is False.Statement A is False and Statement B is True.Both, Statement A and Statement B, are True.Both, Statement A and Statement B, are False.

Statement A: The read command is used by an NMS tomonitor the managed devices.Statement B: The write command is used by an NMS tocontrol the managed devices.Which is True with respect to above statements?Statement A is True and Statement B is False.Statement A is False and Statement B is True.Both, Statement A and Statement B, are True.Both, Statement A and Statement B, are False

Statement A: The snmpd.conf file defines the operationmethods of the snmp agent.dStatement B: The snmptrapd.conf file defines the methodsof operation of the Net-snmp applications.Which is True with respect to above statements?Statement A is True and Statement B is False.Statement A is False and Statement B is True.Both, Statement A and Statement B, are True.Both, Statement A and Statement B, are False.

Statement A: Host Escalations consist of definitions ofoptional escalation levels for host problems.Statement B: Service Escalations consist of definitions ofoptional escalation levels for failed services.Which is True with respect to above statements?Statement A is True and Statement B is False.Statement A is False and Statement B is True.Both, Statement A and Statement B, are True.

Page 106: q7 Linux Full

Both, Statement A and Statement B, are False.

Statement A: MRTG is used to produce graphical images ofthe information, such as network bandwidth and bottlenecksin the network.Statement B: MRTG uses a Web page to display thegraphical images of the monitored information.Which of the following is true, with respect to the abovestatements?Statement A is True and Statement B is False.Statement A is False and Statement B is True.Both, Statement A and Statement B, are True.Both, Statement A and Statement B, are False.

Statement A: Before installing MRTG on your computer, youneed to install the snmp utility on your computer.Statement B: Before installing MRTG on your computer, youneed to install the fping utility on your computer.Which of the following is true, with respect to the abovestatements?Statement A is True and Statement B is False.Statement A is False and Statement B is True.Both, Statement A and Statement B, are True.Both, Statement A and Statement B, are False.

Statement A: The "tcpActiveOpens" TCP-MIB ObjectVariable measures the total number of TCP connectionscompleted.Statement B: The "tcpCurrEstab" TCP-MIB Object Variablemeasures the total number of TCP connections in theestablished state.Which of the following is true, with respect to the abovestatements?Statement A is True and Statement B is False.Statement A is False and Statement B is True.Both, Statement A and Statement B, are True.Both, Statement A and Statement B, are False.

Statement A: You need to create two files, config and users,in the /usr/local/argus/data directory to configure Argus.Statement B: You need to navigate to the /usr/local/argusdirectory to create link to the arguscgi program.Which of the following is true, with respect to the abovestatements?Statement A is True and Statement B is False.Statement A is False and Statement B is True.

Page 107: q7 Linux Full

Both, Statement A and Statement B, are True.Both, Statement A and Statement B, are False.

Statement A: You can customize the NIS component of SFUfor managing users and groups in the network.Statement B: You can customize NFS Component of SFU toenable users to access shared data using NFS protocol.Which of the following is true, with respect to the abovestatements?Statement A is True and Statement B is False.Statement A is False and Statement B is True.Both, Statement A and Statement B, are True.Both, Statement A and Statement B, are False.

Statement A: MRTG generates HTML pages containing GIFimages, which provide a visual representation of thenetwork traffic.Statement B: SNMP operates at the application level usingTCP/IP transport-level protocols so that it can ignore thedifferences in the network hardware.Which of the following is True with respect to the precedingstatements?Statement A is True and Statement B is False.Statement A is False and Statement B is True.Both, Statement A and Statement B, are True.Both, Statement A and Statement B, are False.

Statement A: The iostat command is used for monitoringsystem input/output device loading.Statement B: The hinv command displays the contents ofthe system's hardware inventory.Which is True with respect to above statements?Statement A is True and Statement B is False.Statement A is False and Statement B is True.Both, Statement A and Statement B, are True.Both, Statement A and Statement B, are False.

Statement A: An NMS executes applications that monitorand control managed devices.Statement B: An agent is a software module that resides inthe managed devices and manages the network.Which is True with respect to above statements?Statement A is True and Statement B is False.Statement A is False and Statement B is True.Both, Statement A and Statement B, are True.Both, Statement A and Statement B, are False.

Page 108: q7 Linux Full

Statement A: MIBs do not contain information aboutmanaged objects, which are identified using ObjectIdentifiers (OIDs).Statement B: The trap command is used by manageddevices to asynchronously report events to the NMS.Which is True with respect to above statements?Statement A is True and Statement B is False.Statement A is False and Statement B is True.Both, Statement A and Statement B, are True.Both, Statement A and Statement B, are False.

Statement A: The nagios.cfg file contains global settings forthe nagios package.Statement B: Object configuration files specify only theservices that are to be monitored.Which is True with respect to above statements?Statement A is True and Statement B is False.Statement A is False and Statement B is True.Both, Statement A and Statement B, are True.Both, Statement A and Statement B, are False.

Tom Wilkins works as a system administrator atEarthenWares. The employees of the organization,EarthenWares develop software for its clients. Theorganization receives an order to develop software, whichcan monitor the efficiency of CPU at various instants of timeand display the efficiency on a graph. For this, thedevelopers need MRTG utility on their computers.Tom installs the MRTG utility on the computers of the developersof the organization. Tom is assigned the task to enable thedevelopers to work in US English instead of English UTF-8 to fulfillthe client requirements. Which of the following commands shouldTom use to perform the required task?# import LANG=en_US# export LANGUAGE=en_US# export LANG=en_US_UTF-8# export LANG=en_US

Chris Donald works as a system administrator at QualitySoftware Developers. There are multiple servers in theorganization Quality Software running services, such as theSMTP, IMAP, and DNS. Chris wants to monitor theseservices from the remote computer running Apache Webserver. Therefore, Chris installs Argus on the remotecomputer to monitor the services and configures the configand users files stored in the /usr/local/argus/data directory to

Page 109: q7 Linux Full

specify the services that are to be monitored. Chris alsoassigns the ownership of the /usr/local/argus directory to theApache Web server. To which directory does Chris need tonavigate to create a link to the arguscgi program?/usr/local/argus/sbin/usr/local/argus/usr/local/argus/sbin/arguscgi/var/www/cgi-bin

Don works as a system administrator at SmartLabs, Inc. Allthe employees of SmartLabs use the database server tostore data. Don observes the processing speed of thedatabase server decreases due to improper memoryutilization. To get exact figures about memory utilization ofthe database server, Don needs to prepare a graph showingthe memory utilization at the database server. Therefore,Don installs and configures MRTG utility on the databaseserver. Don observes the graph results produced are eighttimes higher than expected. What of the following can bethe reason for this abnormal output?The bits parameter is set instead of the bytes parameter.Unavailability of the OID values.Avaliability of the OID values.The bytes parameter is set instead of the bits parameter.

SSPT Corporation is an Internet Service Provider (ISP) thatprovides Internet services to its clients. Steve, the networkadministrator, receives complaints from a client about theslow speed of the Internet. Steve wants to check the statusof services, such as HTTP, TCP, and SMTP running on theserver from his own computer. For this, Steve wants toinstall Argus. However, before installing Argus, Steve needsto verify if specific software are already installed on hiscomputer. Which of the following software should Steveverify before installing Argus on his computer?Perl, sendmail, qpage, fping, a cgi capable Web server;Berkeley DB, and perl DB_FilePerl, sendmail, qpage, and GNU C Compiler (GCC)GCC, Perl, Gd, Libpng, and ZlibGCC and Perl

John Barrett works as a system administrator at QualitySoftware Developers. There are multiple servers in theorganization, Quality Software running the services, suchas SMTP, IMAP, and DNS. John wants to monitor theseservices from the remote computer running Apache Webserver. Therefore, John installs Argus on a remote

Page 110: q7 Linux Full

computer . John configures the config and users filesstored in the /usr/local/argus/data directory to specify theservices that are to be monitored. What should John doafter configuring the config and users files?Run Argus by using the argusd script.Open the /usr/local/argus/sbin/arguscgi in the Web browser.Assign the ownership of the /usr/local/argus directory to theApache Web server and run the argusd script.Assign the ownership of the /usr/local/argus directory to theApache Web server, create a link in the cgi-bin directory to thearguscgi program, and run the argusd script.

1. Consider the following statements:Statement A: System monitoring tools are used to monitor the process and filesystems of a network.Statement B: Network monitoring tools are used to keep track of all the services thatare running in the enterprise.With respect to the above statements, which of the following options is correct?a. Statement A is True and Statement B is False.b. Statement A is False and Statement B is True.c. Both, Statement A and Statement B, are True.d. Both, Statement A and Statement B, are False.

2. Consider the following statements:Statement A: Nagios is used to monitor the traffic load on the network links.Statement B: IPTraf is used to monitor network services, such as HTTP, SMTP, andSSH.With respect to the above statements, which of the following options is correct?a. Statement A is True and Statement B is False.b. Statement A is False and Statement B is True.c. Both, Statement A and Statement B, are True.d. Both, Statement A and Statement B, are False.

3. Consider the following statements:Statement A: The snmpset tool is used to set values in remote agents.Statement B: The snmptrapd tool shows network status by using SNMP.With respect to the above statements, which of the following options is correct?a. Statement A is True and Statement B is False.b. Statement A is False and Statement B is True.c. Both, Statement A and Statement B, are True.d. Both, Statement A and Statement B, are False.

4. Consider the following statements:Statement A: Object configuration files specify the hosts and services that aremonitored.Statement B: The resource configuration files define the macros that are used withinother settings for security purposes.

Page 111: q7 Linux Full

With respect to the above statements, which of the following options is correct?a. Statement A is True and Statement B is False.b. Statement A is False and Statement B is True.c. Both, Statement A and Statement B, are True.d. Both, Statement A and Statement B, are False.

5. Consider the following statements:Statement A: The –d iface option for the iptraf command displays the detailedstatistics for the specified interface.Statement B: The –z iface option for the iptraf command starts the TCP/UDP trafficmonitor for the specified interfaces.With respect to the above statements, which of the following options is correct?a. Statement A is True and Statement B is False.b. Statement A is False and Statement B is True.c. Both, Statement A and Statement B, are True.d. Both, Statement A and Statement B, are False.

1. Don Allen, the network administrator at Mountain Marketing, configuresMulti-Router Traffic Grapher (MRTG) to monitor the network of the organization.Don uses a Web browser to display the Web index page. The index page displaysfour graphs. Which of the following graph provides an average of the input trafficand output traffic after every 30 minutes?a. Daily Graphb. Monthly Graphc. Weekly Graphd. Yearly Graph

2. Ed Young, the network administrator at XYZ, Inc. wants to enable the Web server todisplay the output of the MRTG on a Web page. For this, Ed creates the/var/www/html/mrtg directory. After creating this directory, what should he do toenable the Web server to display the output of MRTG in the form of a Web page?a. Ed needs to type the following line in the mrtg.conf file:Alias /mrtg "/var/www/html/mrtg"<Directory "/var/www/html/mrtg">Order allow,denyAllow from allAllow from localhost# Allow from .example.com</Directory>b. Ed needs to type the following line in the mrtg.conf file:/mrtg "/var/www/html/mrtg"<Directory "/var/www/html/mrtg">Order allow,denyAllow from allAllow from localhost# Allow from .example.com</Directory>

Page 112: q7 Linux Full

c. Ed needs to type the alias /mrtg /var/www/html line in the mrtg.conf file.d. Ed needs to type the /mrtg /var/www line in the mrtg.conf file.

3. Blue Moon Computers is an Internet Service Provider. There are multiple Webservers in the organization running services, such as SMTP, HTTP, and DNS. Pat,the system administrator at Blue Moon, wants to monitor these services from aremote computer that is running the Apache Server. Which of the following utilitiesor tools should Pat install on the remote computer to monitor the services?a. Argusb. Perlc. MRTGd. Zlib

4. Pat works as a network administrator at Red Eye Experts. He installs Argus on aremote computer to monitor the services, such as HTTP, IMAP, and SMTP, runningon multiple servers in the organization. Next, Pat wants to specify the services thatare to be monitored. He also wants to specify the username and password to useArgus. For this, Pat needs to create two files, config file and users file. In which ofthe following directories, does Pat need to create these files?a. /usr/local/argusb. /user/local/argus/datac. /usr/local/argus/libd. /usr/local/argus/sbin

5. James works as a network administrator at PQR, Inc. James wants to install anMRTG on a remote computer to monitor the network traffic. What are the minimumsystem requirements to install MRTG?a. SNMP, GCC, Perl, gd, libpng, and zlibb. SNMP, fping, Perl, gd, libpng, and zlibc. SNMP, GCC, Perl, gd, qpage, and zlibd. SNMP, GCC, Perl, fping, libpng, and zlib

Which command should be used to uninstall Wine if it isinstalled using the source code method?# rpm –qa | grep -i wine# make depend# rpm –ivh wine-20050310-1wbel3winehq.i386.rpm# make uninstallJust a minuteWhile installing Wine through the CVS Snapshot method,which command should be used to download the Winesource code tree in the wine directory?/configure && make depend && make$ cvs –z3 checkout wine# make install$ cvs

Page 113: q7 Linux Full

Which key contains the data related to current Windowsinstallation?HKEY_LOCAL_MACHINEHKEY_CURRENT_USERHKEY_USERSHKEY_USERS\.Default

Which command is used to view the control panel applets in aWindow?uninstallerwine controlWINEDEBUG=+all,-relay wine program_nameExportLIB_ODBC_DRIVER_MANAGER=/usr/lib/libodbc.so.1.0.0

Which command line option is used to display the helpmessage of wineserver command line options?Wp[n]Hk[n]

Steve is a network administrator at Smartlabs. Steveidentifies that an rpm package, Xfree86 is not functioning. Toidentify the reason, Steve requires the debugging informationabout the package. Which of the following rpm query shouldSteve use to perform the required task?rpm -qvv XFree86rpm -qc XFree86rpm -scripts XFree86rpm -qf XFree86

Tom Wilkins is a network administrator in Blue MoonComputers. Tom wants to verify the configuration of theApache web server. Which command should he use toverify the configuration of the Apache web server?# apachectl configtest �# telnet �# ssh �# rpm –qa apache �

Statement A: The /etc/httpd/http.conf file is used to store theconfiguration settings for the Apache Web server.Statement B: The apachectl configtest command is used totest the configuration file for the Apache Web server.Which of the following options are correct with respect to the

Page 114: q7 Linux Full

preceding statements?Statement A is True and Statement B is False.Statement A is False and Statement B is True.Both, Statement A and Statement B, are True.Both, Statement A and Statement B, are False.

Jim Lewis is working as a network administrator at Red SkyIT. Jim is assigned the task to share the applications anddata between Linux-based computers and Window–basedcomputers. Which of the following functionalities of SFU 3.5should Jim use to perform the required task?Interoperability toolsPassword synchronizationNFS V2 and NFS V3Interix technology

Jim Lewis, a network administrator at Red Sky IT, is usingSFU 3.5 toolkit to share files between Linux and Windowsbasedcomputers in a network. Which NFS componentshould Jim use to enable Windows-based computers toaccess files and directories, exported by NFS file server?Server for NFSClient for NFSGateway for NFSNFS share component

Ed Young is a network administrator at RedSky IT companyand needs to install SFU 3.5 toolkit on Windows-basedcomputers to run Linux applications on them. What is theleast memory that Ed needs on Windows-based computersto perform SFU installation?10 MB20 MB30 MB40 MB

What is the location on a computer where SFU 3.5 toolkit isinstalled by default?C:\SFU\D:\SFU\C:\windows\SFU\D:\windows\SFU

By default, which of the following shells is not supported by

Page 115: q7 Linux Full

the SFU 3.5 toolkit to run Linux scripts on a Windowsbasedcomputer?Korn shellC shellBash shellSDK shell

Chris Donaldson is a network administrator at Smartlabs.Some processes have modified the dynamic link libraries ofhis Linux machine. Chris wants to identify the processes thathave called those dynamic link libraries. In addition to this,Chris also wants to identify the system calls that wereexecuted along with the library calls. Which ltrace syntaxshould Chris use to perform the required task?ltrace –I <command>ltrace –S <command>ltrace –s <command>ltrace -o <command>

Which of the following Bugzilla feature helps to flag andanalyze the previously reported bugs?Enterprise group supportMultiple authentication methodRequest SystemGeneric Reporting

Tom has encountered a bug in OpenVMS. Which should bethe appropriate field to mention this?ComponentOperating SystemProductVersion

Which of the following Linux forums provide support tocreate CD based games?GentooKnoppixMandrakeFedora

1. Consider the statements:Statement A: A computer System should have Windows operating system to installWine.Statement B: All Windows applications can run on Linux operating system usingWine.With respect to the preceding statements, which of the following is true?

Page 116: q7 Linux Full

a. Statement A is True and Statement B is False.b. Statement A is False and Statement B is True.c. Both, Statement A and Statement B, are True.d. Both, Statement A and Statement B, are False.

2. Ken Burton is working as a system administrator at Mountain Marketing. Ken wantsto install Wine to run Windows applications on Linux. He installs Wine by using thesource archive method. Further, he decides to configure Wine. While configuring theDLL section in the Wine configuration file, native version of which of the followingDLL pairs should Ken use?a. KERNEL, KERNEL32b. USER, USER32c. SHELL, SHELL32d. GDI, GDI32

3. Pat Greene is working as a system administrator at Global Systems. For runningWindows applications on Debian Linux, Pat needs to install Wine. He installs it byusing the apt-get command. Which installation method does Pat use to perform thistask?a. Installing Wine from a packageb. Installing Wine from a source archivec. Installing Wine from CVSd. Installing Wine from a package or Installing Wine from CVS

4. Ed Young is working as a system administrator at Supersoft2000.Ed installs Wine byusing the CVS Snapshot method. Which of the following commands should Edexecute to build the utilities of Wine?a. makeb. make installc. make dependd. ./configure

5. Don Allen is working as a system administrator at AB Corp. Don is able tosuccessfully login to the CVS server and install the CVS package. Now, he wants tocheck the working directory of the newly downloaded Wine directory. Whichcommand should Don execute to perform this task?a. makeb. pwdc. cvs logind. cd wine

1. Global System, Inc. is an application development company based in Woodland. Theorganization works on a Windows-based network system. For a new applicationdevelopment project, the developers need to migrate and run a Linux application ontheir Windows-based computers. For this, the company decides to install a SFU 3.5toolkit in its enterprise. This Linux application has features that restrict this

Page 117: q7 Linux Full

application to run on a Windows-based computer. Nancy Jones, a networkadministrator, is assigned the task of isolating these features in the Linux applicationto enable it to run on a Windows-based computer. Which statement should Nancyuse to isolate these features?a. #ifdefb. ioctl()c. #sdkd. #whichif

2. SmartDevelopers, Inc. is an application development company based in Atlanta. Itworks on a Windows-based network system. The company opens a new center atFlorida, which works on a Linux-based system. For application developmentprojects, the company uses a SFU 3.5 toolkit at the Atlanta center, to run Linuxapplications developed at the Florida center. To allow file sharing between both thenetwork systems, the company needs to use NFS protocol services. For this, KenBurton, the network administrator, is assigned the task of installing the NFS protocolin the enterprise. Which versions of NFS protocol should Ken use that support theSFU 3.5 toolkit for file sharing in an enterprise?a. Any NFS protocol versionb. NFS version 1c. NFS version 1.1d. NFS version 2 and 3

3. Earthenmovers, Inc. is an application development organization that works on theLinux and Windows-based network systems. For a new application developmentproject, the company needs to migrate and run Linux applications on Windows-basedcomputers. Developers working on the Windows-based computers require differentSFU 3.5 toolkit components to run Linux applications on their computers. KathyCarter, the system administrator, is assigned the task of installing an SFU 3.5 toolkiton the Windows-based computers. Which installation method should Kathy usewhile installing the SFU 3.5 toolkit?a. Standard installationb. Custom installationc. Default componentsd. Customizable components

4. ABC, Inc. is an application development organization that works on a Windowsbasednetwork system. The company receives a new application developmentproject, for which it requires its employees to migrate and run some Linuxapplications on the Windows-based computers. For this, the company uses a SFU 3.5toolkit on its Windows-based computers. While migrating a Linux application to aWindows-based computer, the developers face a bug problem. The company assignsthe task of debugging this application to Robert Joseph, a network administrator.Which debugger should Robert use to perform this task?a. The SDK Debuggerb. The Interix Debugger

Page 118: q7 Linux Full

c. The SFU Debuggerd. The GDB Debugger

5. PQR, Inc. an application development organization works, on both Linux andWindows-based network systems. For a new application development project, thecompany needs to use the SFU 3.5 toolkit to run Linux applications on the Windowsbasedcomputers in its enterprise. For this, the company needs to implement remotecommand line access to share files and data resources from Linux to Windows-basedcomputer. Which command line access feature of the SFU 3.5 toolkit should thecompany use to perform the task?a. Interix clientb. Interix serverc. Telnet serverd. Telnet client and Telnet server

1. Steve is working as a network administrator at Red Eye Experts. He finds that usersare not able to transfer data across the network. They are also not able to receivedata. Steve wants to identify the problem of packet loss in the network. Whichcommand should Steve use to perform the required task?a. digb. nslookupc. hostd. tcpdump

2. Consider the following statements:Statement A: Improper boot loader configuration can lead to failure of boot process.Statement B: Improper kernel or init parameter can cause boot process failure.With respect to the preceding statements, which of the following options is correct?a. Statement A is True and Statement B is False.b. Statement A is False and Statement B is True.c. Both, Statement A and Statement B, are True.d. Both, Statement A and Statement B, are False.

3. Tom Wilkins is working as a network administrator at Red Sky IT Systems. Hewants to monitor the traffic flow of the network, which comprises of variousplatforms with different configurations. Tom also wants to monitor the trafficgenerated by specific hosts in order to check if the traffic from their side is creatingany problems in the network. Which of the following tools should Tom use toperform the required task?a. etherealb. tcpdumpc. digd. nslookup

4. Chris Donaldson is working as a network administrator at Global Systems, Inc. He is

Page 119: q7 Linux Full

receiving complaints that users are not able to connect to the DNS server. Chris findsthat the DNS is configured properly. Now, he wants to check whether the clients areconfigured properly. Which file should he view to perform the required task?a. /etc/resolv.confb. /etc/named.confc. /etc/httpd/conf/http.confd. /etc/pam.conf

5. Debbie Howe is working as a network administrator in Smart Software Developers.Debbie is asked to implement a security policy in which permissions are granted tousers based on various parameters, such as time, available resources, priority, orclient location. She wants to implement PAM to apply these types of settings in thenetwork. Which module type should Debbie implement in PAM to perform therequired task?a. Authb. Accountc. Sessiond. password

1. Consider the following statements:Statement A: The Update Module helps in obtaining prior notification about the newupdates in the software.Statement B: The Update Module helps in managing a group of computers in anenterprise.With respect to the preceding statements, which of the following options is correct?a. Statement A is True and Statement B is False.b. Statement A is False and Statement B is True.c. Both, Statement A and Statement B, are False.d. Both, Statement A and Statement B, are True.

2. Consider the following statements:Statement A: The Management Module ensures that all the packages required for thestability of the computer are downloaded with the software.Statement B: The Management Module helps in searching the computers in anenterprise for updates based on different search criteria, such as system specificationand package name.With respect to the preceding statements, which of the following options is correct?a. Statement A is True and Statement B is False.b. Statement A is False and Statement B is True.c. Both, Statement A and Statement B, are False.d. Both, Statement A and Statement B, are True.

3. Consider the following statements:Statement A: Hosted model architecture helps in creating channels according to yourrequirement.Statement B: Hosted model architecture provides a single port number for both

Page 120: q7 Linux Full

inbound and outbound connections.With respect to the preceding statements, which of the following options is correct?a. Statement A is True and Statement B is False.b. Statement A is False and Statement B is True.c. Both, Statement A and Statement B, are False.d. Both, Statement A and Statement B, are True.

4. Consider the following statements:Statement A: Proxy model architecture provides custom channels.Statement B: In Proxy model architecture, the content of RHN database is cachedlocally on the network.With respect to the preceding statements, which of the following options is correct?a. Statement A is True and Statement B is False.b. Statement A is False and Statement B is True.c. Both, Statement A and Statement B, are False.d. Both, Statement A and Statement B, are True.

5. Consider the following statements:Statement A: Knoppix Forum provides support to create CD-based games.Statement B: Knoppix Forum provides support to use its software on laptops.With respect to the preceding statements, which of the following options is correct?a. Statement A is True and Statement B is False.b. Statement A is False and Statement B is True.c. Both, Statement A and Statement B, are False.d. Both, Statement A and Statement B, are True.

1. Tom Wilkins is working as a network administrator at InfoSuper Corp. The management of the organization decides to migrate to the Linux environment to provide file level security and data level security to all the applications. Tom needs to compile and execute a C# application on a Linux platform. To compile the application on the C#application, Tom changes to the /usr/src/ mono directory and enters the following command at the shell prompt to compile the application:# mcs interactive\ Welcome.csHowever, Tom observes that no output is displayed. In addition, he also wants to execute the application. What should Tom do to perform the required task?a. Compilation is performed successfully

Enter the following command to execute the application:# mcs interactive\ Welcome.exe

b. The compilation is performed successfullyEnter the following command to execute the application:# mono interactive \ Welcome.exe

Page 121: q7 Linux Full

c. Chris needs to enter the following commands to compile:# mono interactive \ Welcome.exeEnter the following command to execute the application:# mono interactive \ Welcome.exe

d. Chris needs to enter the following commands to compile:# mcs interactive \ Welcome.exeEnter the following command to execute the application:# mcs interactive \ Welcome.exe

2. InfoSuper Corp. is asoftware development organization, which has a large number of computer systems that are connected through a network. The organization has a centralized directory server. John Barren, the system administrator at InfoSuper Corps, comes to know that a malicious user has breached the security of the directory server. The user uses some software tools to eavesdrop on the data being transmitted on the network. The user then decrypts the passwords and monitors the data on the network. Further, the user gathers the credential information and data being transmitted between the directory server and the authorized users. This information is used by the malicious user to breach the security of the directory server. Which security threat has the malicious user employed to breach the security of the server?

a. Trojan horsesb. Network sniffingc. Credential stealingd. Connection hijacking

3. Which attribute in the sambaAccount object, used to store the Samba related information in OpenLDAP, specifies the time when the Impassword and ntpassword are last modified?

a. SambaNTPasswordb. SambaLMPasswordc. SambaPwdLastSetd. SambaLogonScript

4. Perfect Watch Corp. is a watch manufacturing company. The company needs to implement an LDAP Directory server to communicate with its clients. For implementing the LDAP Directory server, the company asks Donna Band, the system administrator, to define a LDAP Model, which describes the services provided by LDAP Directory server to the LDAP Directory clients of the company. While performing the task, Donna needs to describe the operations that can be performed on the LDAP Directory, such as search, add, delete, bind, unbind. What does Donna do to perform the above task?

a. Define the Functional Modelb. Define the Security Modelc. Define the Naming modeld. Define the Information model

Page 122: q7 Linux Full

5. Donna is working as a network administrator at Safest Software Developers. The organization has three branches at different locations. There are three departments at each branch, named application development, quality assurance, and sales. The users of the same department at different branches are part of a group. There are three groups corresponding to each department, app for application development department, qa for quality assurance department, and sales for sales department. All the employees at different branches use a database server at the main branch to store data. The database server can run 100 processes at a time. The users in the app group run a large number of processes on the database server due to which the users in the qa and sales groups are not able to run their processes. What should Donna do to solve this problem?

a. Donna needs to add the following entries to the /etc/security/limits.conf file:* soft file 560* hard file 860

b. Donna need to add the following entry to the /etc/pam.d/login file:sesion required /lib/security/pam_limits.so

c. Donna needs to add the following entries to the /etc/pam.d/login file:* soft nofile 85* hard nofile 88

d. Donna needs need to add the following entries to the /etc/security/limits.conf file:@app soft nproc 45@app hard nproc 50

6. Red-Eye Experts is a leading developer of computer applications, with its head office in Hew York. The organization has three departments: HR, Research, and Development. A directory service is configured in the HR department and all the employees in the rest of the departments access the directory service. The organization has two branch offices in London and Paris. These branch offices are connected to the head office in Hew York through Virtual Private Network (VPN). The directory service, in the HR department of the head office, is also accessed by the employees in the branch offices. So, there is a potential risk that a network failure between the head office and the branch offices can seriously affect the employees in the branch offices. To prevent this situation, John Barrett, the system administrator at the head office, decides to create multiple replicas of the directory service and configure these replicas in the branch offices. How, to maintain data consistency, John wants to synchronize the data which is stored in the main directory service and the replica servers. John wants to implement amechanism in such a way that when a replica server receives a write operation request from a client, it performs the write operation. After that, the replica server sends the modified updated entry values to all the replica servers and the main server. On receiving the modified entry values, the main server and the replica servers update the stored entries accordingly. How, which Replication Policy and Write Operation performing strategy should be employed by John to implement the above mechanism?

a. Multimaster Replication Policy using referralsb. Single-Master Replication Policy using chainingc. Single-Master Replication Policy using referralsd. Multimaster Replication Policy

Page 123: q7 Linux Full

7. Red-Eye Experts is a .NET applications development organization, based in the US. The organization uses the Windows plattorm to developing .NET applications. For security reasons, Donna Bard, the network administrator, needs to migrate .NET applications to the Linux platform to provide file-level and user-level security to the applications. To migrate the .NET applications to the Linux platform, Donna needs to install the Mono tool that provides a number of APIs that can be used to run the .NET applications on Linux. For this, Donna installs the mono-data-1.1.6-1.novell.6.3.i586.rpm RPM package as the first package of the tool. However, Donna finds an error massage while installing this package. What error message does Donna receive while installing this package?

a. The error message is displayed as follows:"mono-core-1.1.6-1.novell.6.3.i586.rpm andmono-basic-1.1.6-1.novell.6.3.i586.rpm RPM packages should already be installed on the computer."

b. The error message is displayed as follows:"mono-data-oracle-1.1.6-1.novell.6.3.i586.rpm andmono-complete-1.1.6-1 .novell.6.3.i586.rpm RPM packages should already be installed on the computer."

c. The error message is displayed as follows:"mono-extras-1.1.6-1.novell.6.3.i586.rpm andmono-complete-1.1.6-1.novell.6.3.i586.rpm RPM packages should already be installed on the computer."

d. The error message is displayed as follows:"mono-data-oracle-1.1.6-1 .novell.6.3.i586.rpm and mono-data-postgresql-1.1.6-1.novell.6.3.i586.rpm RPM packages should already be installed on the computer."

8. SmartLabs is a rnultii national company that has 78 branches across the world. The company maintains a directory server for storing all the information about the company's product. Clients of the company access the directory server to obtain information about the products. The directory server has come under frequent hacking attacks in the past few months. This has led to hackers stealing and changing the confidential information stored on the server. Debbie Howe, the system administrator at SmartLabs, is assigned the task to provide security to the directory server from the hackers. For this, Debbie divides the data into various categories depending on the frequency of access to the data and the degree of loss to the company if the data is modified. How, Debbie assigns various priority levels to the various categories of data. Which possible security consideration is Debbie implementing to provide security to the directory server?

a. Sensitivity of data of Identifying the Security Requirements of a Directoryb. Directory accessibility of Understanding the Environment of the Organizationc. User community of Understanding the Environment of the Organizationd. Administration of Identifying the Security Requirements of a Directory

9. Countryside Markets is a software application development company in U.S. The company maintains all the details of the software developed by the company in an OpenLDAP server. The company finds that some unauthorized people are accessing the OpenLDAP server to get information about the software contained therein. The company assigns the task to the system administrator, Chris Donaldson, to protect the OpenLDAP server from this threat. Chris finds that the company allows access to the OpenLDAP

Page 124: q7 Linux Full

server to the clients byasking for the DM to be accessed and for the password as plain text. To provide security to the OpenLDAP server, Chris decides to change the accessing method. Chris defines that whenever a client has to connect to the OpenLDAP server, the client sends a connection request to the OpenLDAP server. When the OpenLDAP server receives the request, it creates and sends a challenge to the client, which consists of an encrypted message from the server to the client. If the client has the encrypted key, it sends the key as the response to the challenge sent by the OpenLDAP server. If the key is verified, the OpenLDAP server allows the client to connect and access information from the OpenLDAP server. What kind of implementation is Chris defining to provide security to the OpenLDAP server?

a. ANONYMOUSb. DIGEST-MD5c. KERBEROS _V 4d. CRAM-MD5

10. Larry Williams is work ing as a system administrator at Technology Systems. He wants to implement kickstart installation to configure multiple workstations in the organization. He also wants to redirect the existing Linux server to create scripts for configuring these newly installed workstations that are connected to the network. What should Larry do to perform the task?

a. Use Existing state provisioningb. Use Configuration managementc. Use Bare metal provisioningd. Use Kickstart configuration writer

11. Jim Lewis is working as a network administrator at Good Graphics, Inc. The organization uses Wine installed in Linux operating system to enable the employees of the organization to use existing Windows-based applications. However, Jim finds that some packages of Wine are corrupted; so, he needs to uninstall the all installed Wine packages. What should Jim do to perform the above activity?

a. First, use the following command to identify the Wine packages installed on the system:# rpm -qa | grep -i wine?Then use following command to uninstall the packages# rpm -e <wine-package_name> ?

b. First, use the following command to identify the Wine packages installed on the system:# rpm -ivh wine-20050310-1wbel3winehq.i386.rpm ?Then use following command to uninstall the packages# rpm -e <wine-package_name> ?

c. First, use the following command to identify the Wine packages installed on the system:# rpm -e <wine-package_name> ?Then use following command to uninstall the packages# rpm -ivh <wine-package-name>.rpm ?

d. First, use the following command to identify the Wine packages installed on the system:

Page 125: q7 Linux Full

# rpm -qa | grep -i wine?Then use following command to uninstall the packages# rpm -ivh <wine-package-name>.rpm ?

12. Donna Brad is working as a system administrator at Blue moon Computers. To support the recently acquired hardware, the management asks Donna to upgrade the kernel of the main Linux server. She checks whether the kernel source code is already installed on the main server and finds the code is not installed. Therefore, she downloads the source code from Web and configures the kernel source code on the server. How, Donna needs to compile the kernel source code, and perform the installation steps of kernel. What should Donna do to complete the upgrade of the kernel?

a. Donna should execute the following commands:# make dep# make clean# make bzimage# make modules# make modules_install# make install

b. Donna should execute the following commands:# make dep# make bzimage# make clean# make modules# make install# make modules_install

c. Donna should execute the following commands:# make dep# make bzimage# make cln# make modules# make modules_install# make install

d. Donna should execute the following commands:# make dep# make clean# make bzimage# make modules# make modules_install

13. Consider the statements:Statement A: The # rpm -qa | grep -i wine command is used to identify the installed Wine packages on the system.Statement B: The # rpm -e <wine-package_name> command is used to uninstall the Wine packages from the system.Which of the following options is correct with respect to the above statements?

a. Statement A is true and statement B is false.b. Both statements A and B are false.

Page 126: q7 Linux Full

c. Statement A is false and statement B is true.d. Both statements A and B are true.

14. Supersoft2000 is a software development company that has number of development centers all over America. Larry Williams, the system administrator installs a Directory service to implement an identity management system. In the identity management system, the employee information such as name, employee code, telephone extension number, department code, branch office, and designation, is stored and organized. How, the management of the company wants to expand the business. As a result, Larry faces a problem of insufficient hardware resources and slow read/write process of the directory server. He wants to provide aflexible Directory service that can meet the increasing storage space requirement of the directory service. What should Larry do to solve this problem?

a. Purchase a new server with higher processing speed.b. Use high-speed physical media such as fiber optic cable.c. Distribute the directory server among multiple computers.d. Purchase a new server with more Hard Disk storage space.

15. Pat Greene is working as a network administrator at Technology Systems. The orgnization has implemented LDAP server to enable the employees to access the employee information of the organization. The management asks Pat to index the entries stored in the LDAP database to enable fast searching and retrieval of data. What should Pat do to perform the required task?

a. Add the following indexes in the slapd.conf file:index objectclass eqindex eq

b. Add the following indexes in the slapd.conf file:index objectClass eqindex cnpres,eq

c. Add the following indexes in the slapd.conf file:index objectClass eqindex departmentNumber

d. Add the following indexes in the slapd.conf file:index objectClass eqindex cn, sn, mail eq, subindex departmentNumber eq

16. Which value for the STAGE argument in the rpmbuild command unpacks the source code and applies patches?

a. bb. cc. pd. a

Page 127: q7 Linux Full

17. Which command is used to verify the mapped files of nfs Windows-based << it should be nfs > computer?

a. # mount: 192.168.0.52b. # showmount 192.168.0.52c. # mount –e 192.168.0.52d. # showmount –e 192.168.0.52

18. Which music file format needs to be searched and saved in the Migration folder while migrating from Windows to Linux operating system?

a. AVIb. MPGc. WMVd. WAV

19. Pat Wilkins is working as a network administrator at LMN Inc., which provides storage solutions to its customers. The network of the organization comprises of Red Hat Linux Systems. Pat is assigned the task of managing and monitoring the entire network of the enterprise. To perform the task, he installs Red Hat Network (RHN) software in the network. To enhance the performance of the enterprise network, Pat wants to configure computers in an enterprise according to the requirements of the computers. He also wants to deploy, update, and re-deploy the Linux infrastructure in the enterprise using a GUI. In addition, he wants to configure the Linux computers in the enterprise automatically for asingle user or group. What should Pat do to complete the required tasks?

a. Use the update module of the RHN softwareb. Use the proxy model of RHN softwarec. Use the provisioning module of the RHN softwared. Use errata information and simple Web user interface

20. Ronald Billing is working as system administrator with the Technology Systems. Homelike Hospital Ltd. is a chain of hospitals all over America. Don Alien, the Chief Medical Officer at Homelike Hospital Ltd. directs Ronald to create a directory service to store information about doctors. To implement the directory, Ronald needs to install a software package called OpenLDAP. Ronald finds that he needs to install a package called SASL before installing OpenLDAP. To install the SASL package, Ronald enters the following commands at the shell prompt:

# rpm -ivh cyrus-sasl-md5-2.1.15-3.i386.rpm# rpm -ivh cyrus-sasl-plain-2.1.15-3.i386.rpm

# rpm -ivh cyrus-sasl-2.1.15-3.i386.rpmHowever, Ronald notices that the commands are not producing required results. What should Ronald do to solve the problem?

a. Ronald needs to enter the following command at the shell prompt:# rpm -ivh cyrus-sasl-md5-2.1.15-3.i386.rpm

Page 128: q7 Linux Full

# rpm -ivh cyrus-sasl-plain-2.1.15-3.i386.rpm# rpm -ivh krb5-libs-1.2.7-19.1386.rpm# rpm -ivh cvrus-sasl-gssapi-2.1.15-3.i386.rpm# rpm -ivh cvrus-sasl-devel-2.1.15-3.i386.rpm

b. Ronald needs to enter the following commands at the shell prompt:# rpm -ivh cyrus-sasl-md5-2.1.15-3.i386.rpm# rpm -ivh cyrus-sasl-plain-2.1.15-3.i386.rpm# rpm -ivh cyrus-sasl-2.1.15-3.i386.rpm# rpm -ivh cyrus-sasl-gssapi-2.1.15-3.i386.rpm# rpm -ivh cyrus-sasl-devel-2.1.15-3.i386.rpm

c. Ronald needs to enter the following commands at the shell prompt:# rpm -ivh cyrus-sasl-md5-2.1.15-3.i386.rpm# rpm -ivh cyrus-sasl-plain-2.1.15-3.i386.rpm# rpm -ivh krb5-workstation-1.2.7-19.1386.rpm# rpm -ivh cyrus-sasl-gssapi-2.1.15-3.i386.rpm# rpm -ivh cyrus-sasl-devel-2.1.15-3.i386.rpm

d. Ronald needs to enter the following command at the shell prompt:# rpm -Ivh cyrus-sasl-md5-2.1.15-3.1386.rpm# rpm -Ivh pam_krb5-1.70-1.1386.rpm# rpm -Ivh cyrus-sasl-2.1.15-3.1386.rpm# rpm -Ivh cyrus-sasl-gssapl-2.1.15-3.1386.rpm# rpm -ivh cyrus-sasl-devel-2.1.15-3.i386.rpm

21. Ken Burton is working as a system administrator at Global Systems Inc. The details of the employee information are placed in the NIS-based directory of the organization. Ken needs to migrate the user information from the NIS server to the OpenLDAP server for faster retrieval of data. Ken has added the user accounts information to the OpenLDAP database. How, he needs to verify the entries of user in the LDAP server. What should Ken do to perform the required task?

a. Ken needs to issue the following command:# ldapadd -x -D "cn=Manager,dc=globalsystems,dc=com" -W < /tmp/passwd.ldif

b. Ken needs to issue the following command:# Idapsearch -x -b 'dc=globalsystems,dc=com' '(objectclass=*)'

c. Ken needs to issue the following command:# Idapsearch -x -b "uid=steve,ou=People,dc=globalsystems,dc=com"

d. Ken needs to issue the following command:# Idapadd -x -D "cn=Manager,dc=globalsystems,dc=com" –W

22. MentorGraphics is a leading software solution provider. The management of the organization asks Nancy Jones, the network administrator, to install a sendmail RPM package in the organization network. Nancy observes that the existing RPM package is not secure for sendmail package. Therefore, Nancy decides to update the existing RPM packages to enhance the security for sendmail packages. For this, Nancy needs to register a server computer with Red Hat Network (RHN). In addition, Nancy needs to push updates and patches securely from the server registered with RHN to other remote servers in the organization network. What should Nancy do to perform the task?

Page 129: q7 Linux Full

a. Execute rsync [options] <[user@]sourcehost:> <source filename><[user@]destinationhost:> <destination filename>

b. Execute Patch [options] <[user@]sourcehost:> <source filename><[user@]destinationhost:> <destination filename>

c. Execute rpm [options] <[user@]sourcehost:> <source filename><[user@]destinationhost:> <destination filename>

d. Execute scp [options] <[user@]sourcehost:> <source filename><[user@]destinationhost:> <destination filename>

23. Tom Wilkins is working as a system administrator at Technology Systems. Tom is assigned the task to migrate the NIS information to LDAP. Therefore, Tom needs to map the NIS information stored in /etc/passwd file to attributes of posixAccount object class. Tom needs to translate the parameter, /bin/bash from the entry stored in /etc/passwd file. Which of the following attribute of posixAccount object class maps to the above parameter?

a. loginShellb. HOMEDIRECTORYc. homeDirectoryd. LoginShell

24. Identify the authentication mechanism provided by SASL, which is used with the Transport Layer Security (TLS) to encrypt the connection between the LDAP server and client?

a. DIGEST-MD5 mechanismb. One Time Password (OTP) mechanismc. Shared secret mechanismd. PLAIN mechanism

25. The system administrator at Global Systems, needs to install Red Hat Linux on the organization's server, using kickstart. He wants to use the graphical installation feature in Kickstart. Which default parameter should he provide for starting Red Hat Enterprise Linux installation process and which parameter needs to be specified in the ks.cfg file for the graphical user interface?

a. Root password and keyboardb. Authentication and languagec. Bootloader and moused. Bootloader and monitor

26. Technology Systems is a leading software solution provider based in Kansas. The organization opens a new branch in Chicago to cater to the increasing demands of the customers. The organization assigns Christine Turner, the system administrator, the task of installing an operating system that supports security protocols, such as Kerberos and hash algorithms. The operating system should provide forum support for posting and receiving the solutions for any software problem. Independent Software Vendors (ISVs),

Page 130: q7 Linux Full

such as Oracle, and IBM should support this operating system. What should Christine do to perform the task?

a. Evaluate Linux for Security requirements and install Linuxb. Evaluate Linux Deployment requirements and install Linuxc. Evaluate Linux for Business Requirements and install Linuxd. Evaluate Linux for Maintenance Requirements and install Linux

27. Christine Turner is working as a system administrator at Medical Central Supplies. The organization maintains several directory servers on different platforms to store the data pertaining to the employees. Each directory server uses different data formats, syntaxes, and protocols for communication with the supported application. The organization asks Christine to enable data sharing between the directory servers. To perform the task, Christine decides to integrate applications across the platforms. However, Christine finds that the directory servers are not able to understand the protocols of each other across the servers. What should Christine do to resolve the issue and enable data sharing between different directory servers?

a. Use gatewaysb. Use metadirectoriesc. Use push and pull synchronization agentsd. Use a distributed multivendor directory

28. Pat Greene is working as a system administrator at SuperGraphics Inc. Pat is assigned the task to integrate Samba with OpenLDAP to store the user information of the samba on OpenLDAP. Therefore, Pat uses the sambaAccount object class to store the user information on OpenLDAP. Pat identifies that few of the attributes of sambaAccount object class need to be secured from dictionary attacks. Which set of attributes should Pat secure to prevent dictionary attacks?

a. sambaLMPassword, sambaPwdLastSetb. sambaLMPassword and sambaNTPasswordc. sambaPwdLastSet and sambaNTPasswordd. sambaLMPassword, sambaNTPassword, and sambaPwdLastSet

29. David Johnson is working as a network administrator with Blue Moon Computers that provides customized consulting services. The network of the company contains numerous web servers, files servers, and database servers. David is assigned the task of managing the network of the enterprise. David notices that network congestion has increased due to increase in the number of employees accessing these servers, in the enterprise. This results in low bandwidth and affects the performance of the network. Also, he receives complaints that httpd process is not running properly on the web servers. What should David do to solve the problems?

a. David should check for disk usage in the Access Control Setup section and configure the nagios.cfg file to use object configuration files to check the services running on the hosts.

Page 131: q7 Linux Full

b. David should check for disk usage in the Monitor Various Aspects of the Running Host section and configure the snmpd.conf file to check the name of the process.

c. David should check for disk usage in the Monitor Various Aspects of the Running Host section and configure the minimal.cfg file to add a host to be monitored in the HOSTS section.

d. David should check for disk usage in the Access Control Setup section and configure the cgi.cfg file to set use_authentication=1 entry to use_authentication=0.

30. Tom Wilkins works as a system administrator in EarthenWares that provides Web services to its customers. The organization wants to upgrade its Linux-based web servers to provide enhanced security features. The new version of Linux does not support some of the applications running on the web servers. It also does not provide some security features, which are required. What should he do to update the web servers?

a. Upgrade the kernel by customizing the source code of new version and configure the kernel using make xconfig command

b. Upgrade the kernel using RPM and configure kernel using make oldconfig commandc. Upgrade the kernel by applying patches and configure the kernel using make

menuconfig commandd. Upgrade the kernel by applying patches and configure the kernel using make

oldconfig command

31. Donna Bard, the system administrator at Quality Software Developers, wants to backup sensitive data of the organization regularly. For this, Donna decides to implement Redundant Array of Inexpensive Disks (RAID) on the Linux server. Donna wants to delete some partitions on the server to create the RAID disks. Donna uses fdisk utility to delete the offline partitions and does not delete any extended partitions. However, Donna observes that the server is unable to delete these partitions. What should Donna Do to solve the problem?

a. Donna should use the umount command to delete the partitions.b. Donna should also delete the extended partitions.c. Donna should use any third party tool to delete the specified partitions.d. Donna should delete all the logical partitions.

32. Global Systems Inc. is a leading software development organization. Users in RD frequently download files and packages from the database server through the Internet. Some files and packages downloaded from the Internet are infected with viruses, which affect computers of all users. To overcome this virus problem, instead of installing antivirus programs on every computer. The organization needs to install virus-free operating systems, such as Linux. Chris, the system administrator, automates the installation of the operating system. Pat needs to use an operating system that provides solution for small to medium range of servers used for the majority of businesses, such as file servers and mail servers. He also needs to place pre-installation scripts at the beginning of the Kickstart configuration file. What should Chris do to perform the required task?

Page 132: q7 Linux Full

a. Chris needs to use Red Hat Enterprise Linux operating system and enter the following command:%preecho "My kickstart installation started on ' /bin/date' " > /etc/motd

b. Chris needs to use Red Hat Enterprise Linux operating system and enter the following command:%post --interpreter /usr/bin/python

c. Chris needs to use Red Hat Enterprise Linux operating system and enter the following command:# mkdir /var/ftp/pub/configfiles

d. Chris needs to use Mandriva Linux operating system and enter the following command:network --device eth0 --bootproto dhcp ?

33. Chris Donaldson is an application developer at PQR Inc. The organization is currently working on the Linux platform. The organization receives a new application development project based on the Windows platform. For this, the organization requires developers to work on Windows-based workstations. As a result, Chris needs to migrate and run the Bzip2 Linux application on the Windows-based workstations using SFU. Therefore, Chris downloads the bzip2-1.0.2.tar.gz file from the Internet and saves the file to the local directory of the Windows-based workstation. Then, he enters the following code snippet at the Korn shell prompt to migrate and run the Linux application on Windows platform:

$ gunzip bzip2-1.0.2.tar.gz ?$ tar -xvf bzip2-1 .0.2.tar ?$ made ?$ made install ?However, while executing the preceding code snippet, Chris notices that the code is not providing the required output. What should Chris do to solve the problem?

a. Chris needs to enter the following code snippet:$ cd 0.2 ?$ make ?$ make install ?

b. Chris needs to enter the following code snippet:$ tar -xvf bzip2-1.0.2.tar ?$ cd$ make ?$ make install ?

c. Chris needs to enter the following code snippet:$ gunzipbzip2-1.0.2.tar.gz ?$ tar -xvf bzip2-1.0.2.tar ?$ cd bzip2-1.0.2 ?$ make ?$ make install ?

Page 133: q7 Linux Full

d. Chris needs to enter the following code snippet:$ gunzip bzip2-1.0.2.tar.gz ?$ tar -xvf bzip2-1.0.2.txt ?

34. Donna Bard is working as a network administrator at Global Systems Inc. Donna has deployed an LDAP server to provide information and resources across the organization. Donna is asked to modify the entries in the salary column of the employees who have been promoted in the LDAP directory. Donna wants to use a data file as input source to modify directory data. In addition, Donna wants that the modification process should continue even ifthere is an errorwhile modifying the entry in the LDAP directory. Which command should Donna use to perform the required tasks?

a. Use Idapmodify utility with -f and -c optionb. Use Idapmodify utility with -o logfile and -c optionc. Use Idapmodify utility with -W and -r optiond. Use Idapmodify utility with -b and -E option

35. Which of the following ACLs configuration parameter enables only the authenticated users to access the OpenLDAP server?

a. Anonymousb. Usersc. Selfd. *

36. Jim Lewis is working as a system administrator at Technology Systems The organization has an OpenLDAP server configured to manage the organizational information, such as employee information and business details. However, the performance of the server is decreasing. The management, therefore, asks Jim to configure a server to act as a replica of the master server. Jim uses the following command at the master server to export the database to an LDIF file:

# slapadd -I "dc=technologysystems,dc=com" -b database.IdifHowever, the database files are not exported to an LDIF file. In addition, after exporting the database files to the LDIF file, Jim needs to import the LDIF file to the replica server. What should Jim do to perform the required task?

a. Use the# slapcat -b "dc=technologysystem,dc=com" -l database.Idifand# slapadd -l database.Idifcommand

b. Use the# slapcat -I "dc=technologysystem,dc=com" -b database.Idifand# slapcat -b database.Idifcommand

Page 134: q7 Linux Full

c. Use the# slapadd -b "dc=technologysystem,dc=com" -l database.Idifand# slapadd -b database.Idifcommands

d. Use the# ldapsearch -b "dc=technologysystem,dc=com" -I database.Idifand# slapadd -I database.Idifcommand

37. Tom Wilkins is working as a system administrator at Technology Systems. Tom needs to design a schema for a directory that contains records of employees, such as name, phone, address, and job profile, in the organization. Tom writes a code for the telephoneHumber attribute type in LDAP.

2.5.4.20 NAME 'telephoneHumber' EQUALITY telephoneHumberMatch SUBSTR telephoneHumberSubstringsMatch SYNTAX

1.3.6.1.4.1.1466.115.121.1.1 5{24} Identify the OID of the attribute type and the use of telephoneHumberMatch rule in the preceding code snippet?

a. The OID of the attribute type is 2.5.4.20 and the telephoneHumberMatch rule is used for matching complete telephone numbers.

b. The OID of the attribute type is 1.3.6.1.4.1.1466.115.121.1.15 and the telephoneHumberMatch rule is used to describe the applications that own and use the attribute.

c. The OID of the attribute type is 2.5.4.20 and the telephoneHumberMatch rule is used for matching partial telephone numbers.

d. The OID of the attribute type is 1.3.6.1.4.1.1466.115 and the telephoneHumberMatch rule is used to specify the unique name of an attribute.

38. Which feature of Provisioning module would automatically configure the kickstart file for a single user?

a. Existing state provisioningb. Bare metal provisioningc. Kickstart configuration writerd. Configuration management

39. Which attribute of the migrate_common.ph file is used to customize the mail domain in the mail attribute in the migrate_passwd.pl script?

a. $ DEFAULT_MAIL_DOMAIMb. $ EXTENDED_SCHEMAc. $ DEFAULT_BASEd. $ NAMINGCONTEXT

Page 135: q7 Linux Full

40. Consider the statements:Statement A: Kerberos eliminates the transmission of password over a network by using symmetric key cryptography to authenticate users accessing the network services.Statement B: The master key is used to secure the Kerberos database.Which of the following is true, with respect to the above statements?

a. Statement A is true and statement B is false.b. Both, statements A and B, are false.c. Both, statements A and B, are true.d. Statement A is false and statement B is true.

01 02 03 04 05 06 07 08 09 10 11 12 13 14 15 16 17 18 19 20

b b c a d d a a b d a a d c d c d d a b

21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40

b d a d c c a b b a c a c a b a a d a c

Linux Q7 MMS Review (82 questions for all topics)

No. Question Answer

1

Pat Greene is working as a network administrator at Technology Systems. The orgnization has implemented LDAP server to enable the employees to access the employee information of the organization.

The management asks Pat to index the entries stored in the LDAP database to enable fast searching and retrieval of data. What should Pat do to perform the required task? 1,Add the following indexes in the slapd.conf file:

index objectClass eq

index cn, sn, mail eq, sub

index departmentNumber eq2,Add the following indexes in the slapd.conf file:

index objectClass eq

index departmentNumber 3,Add the following indexes in the slapd.conf file:

index objectClass eq

index cn

pres,eq 4,Add the following indexes in the slapd.conf file:

index objectclass eq

1

Page 136: q7 Linux Full

index eq

2

Donna Bard is working, as a network administrator at Good Graphics Inc. Donna needs to add entries of new employees to the LDAP directory containing employees information. While adding the entries, Donna needs to specify the input file from where the “ldapadd” utility will pick up the entry and add to the LDAP directory. Which one of the following options will Donna use to perform the required task? 1,-f filename 2,-h hostname 3,-U username 4,-D binddn

1

3

Pat Greene is working, as a network administrator at Global Systems inc. The LDAP directory on the network server contains the information of the employees in the organization. Pat needs to add an entry of an employee in the LDAP directory from an LDIF file named temp1.ldif. Pat, therefore, uses the following command:

# slapadd –d temp1.ldif

However, he is not able to add the entry. Which of the following commands will enable Pat to perform the required task? 1,# slapdelete –l temp1.ldif 2,# slapmodify –f temp1.ldif 3,# slapadd –l temp1.ldif4,# slapadd –u

3

4

Donna Bard is working as a network administrator at SuperGraphics Inc. Donna has deployed an LDAP server to provide information and resources across the organization. Now, Donna needs to specify the number of entries that the LDAP server will return in response to a search request. What should Donna do to perform the required task? 1,Use the sizelimit <integer> parameter of the slapd.conf file. 2,Use the timelimit <integer> parameter of the slapd.conf file. 3,Use the ldapmodify utility with –c option 4,Use the ldapdelete utility

1

Page 137: q7 Linux Full

5

Tom Wilkins is working as a network administrator at BlueMoon Computers. Tom needs to search for the name of the employees with first name ‘Steve’ from the LDAP directory containing the details of the employees. Tom needs to specify that a maximum of 50 entries should be retrieved as a result of search request. What should Tom do to perform the required task? 1,Use the ldapsearch command with –l option 2,Use the ldapadd command with -k option 3,Use the ldapmodify utility with –a option 4,Use the ldapsearch command with –z option

4

6

Blue Moon Computers is a software development organization, which has development centers all over the US. Pat Greene, the system administrator at Blue Moon Computers, installs a LDAP server to store the information about the employees and projects running at different development centers. The Internet has facilitated the growth of Blue Moon Computers. Therefore, Pat decides to increase the accessibility of the LDAP server to all development centers through the Internet.

According to the company’s policies, the electronic mail address for a given employee is considered public information and the employee's home address is considered sensitive information. It must be protected to address employee privacy concerns. Easy accessibility to the LDAP server allows malicious users to try and access the LDAP server to obtain the home address and other such private and confidential information about various employees. Therefore, the server needs to be protected against such malicious users. Pat needs to implement Access Control List (ACL) to grant access privileges to the authenticated users.

Which of the following options contains the access control requirements to accomplish this task? 1,-The subjects accessing the LDAP server

-The objects that are accessed

-The level of authentication required

-The accessibility time of the LDAP server

-The access level to an LDAP server2,-Physical security

-Directory accessibility 3,-Read/Write permission

-Sestivity of data

-Administration of directory server

-User community 4,-Replication and synchronization

-Managing the directory server

-Network environment

1

Page 138: q7 Linux Full

7

John Barrett is working as a system administrator at Technology Systems. John has implemented a directory server in the organization to store and manage the information pertaining to the employees and the organizational resources. The directory server contains both the confidential data that is private to the employees and the global information that is publicly readable and accessible to all the employees. Now, it is the responsibility of John to protect the data in the directory server to maintain the integrity of the data. For this, John wants to implement a mechanism so that:

-The activities performed by the directory server, such as the modification of the employee password, are constantly monitored.

-The Log files of the directory server are constantly analyzed to detect loopholes, such as unauthorized access to the Directory server.

-Both the employees and the directory server provide the credential information to each other to verify their identities.

Which security methods are required to be identified and implemented by John to achieve his objective? 1,-One-way Authentication method

-Auditing 2,-Auditing

-Two-way Authentication method3,-Firewall

-One-way Authentication method 4,-Encryption

-Two-way Authentication method

2

8

Identify the authentication mechanism provided by SASL, which is used with the Transport Layer Security (TLS) to encrypt the connection between the LDAP server and client? 1,PLAIN mechanism 2,Shared secret mechanism 3,One Time Password (OTP) mechanism 4,DIGEST-MD5 mechanism

1

9

To set up the primary Kerberos server, you need to create the Kerberos database. Which command do you use to create the Kerberos database? 1,# /usr/kerberos/sbin/kdb5_util create –s2,# /usr/kerberos/sbin/kadmin5.local –q “addprinc ronald/admin” 3,# /usr/kerberos/kadmin5.local –q “addprinc ronald/admin” 4,# /usr/kerberos/kdb5_util create –s

1

Page 139: q7 Linux Full

10

Identify the command that a LDAP Directory client uses to view the list of Ticket to Get Tickets (TGTs) obtained from the Kerberos server. 1,klist2,kinit 3,kadmin.local 4,kdb5_util

1

11

Which of the following ACLs configuration parameter enables only the authenticated users to access the OpenLDAP server? 1,Users2,* 3,Anonymous 4,Self

1

12

You are configuring an OpenLDAP directory. You want to monitor the information related to communication with shell backends and clients. Which of the following options will you select? 1,loglevel 16 2,loglevel 512 3,loglevel 10244,loglevel 64

3

13

Which implementation provided by Cyrus-SASL libraries enables a client to send and receive encrypted data from an OpenLDAP server? 1,ANONYMOUS 2,CRAM-MD53,DIGEST-MD5 4,KERBEROS_V4

2

14

Which of the following parameter of the database section identifies the dn that specifies the common name of the manager of the directory server? 1,rootdn <dn>2,replogfile <filename> 3,updated <dn> 4,Suffix <dn suffix>

1

Page 140: q7 Linux Full

15

Ken Burton is working as a network administrator at SuperGraphics Inc. The organization has implemented an LDAP server to enable the access to employee information of the organization. Therefore, the management decides to build white page service. Now, Ken needs to index the entries stored in the LDAP database to enable fast searching and retrieval of data. What should Ken do to perform the required task? 1,Add the following indexes in the slap.conf file

index objectClass eq

index cn, sn, mail eq, sub

index departmentNumber eq2,Add the following indexes in the slap.conf file

index objectClass eq

index departmentNumber 3,Add the following indexes in the slap.conf file

index objectClass eq

index cn, mail

index departmentNumber eq 4,Add the following indexes in the slap.conf file

index objectClass eq

index cn, sn, mail eq, sub

1

16

Tom Wilkins is working as a network administrator at Good Graphics Inc. The management asks Tom to deploy LDAP server to provide information and resources across the organization. Tom needs to search for the name of the employees whose first name is “Steve”. In addition, Tom wants that ldapsearch utility should prompt for simple authentication. What should Tom do to perform the required task?

1,# ldapsearch cn=Steve* -S–d 2,# ldapsearch cn=Steve* -c -h 3,# ldapsearch cn=Steve* -x -h 4,# ldapadd cn=Steve* -x -h

3

Page 141: q7 Linux Full

17

Chris Donaldson is working as a network administrator at SuperGraphics Inc. The organization has implemented an LDAP server to enable access to employee information of the organization. Therefore, the organization decides to build white page service. The management asks Chris to build white pages for the organization. To perform the required task, Chris uses inetOrgPerson class to store the employee information in the LDAP directory. Now, Chris needs to add the existing schema files to support the attributes and object classes. How should Chris modify the global sections of the slap.conf file to add the schema files? 1,# /usr/local/etc/openldap/slapd.conf

# Global section

## Include the minimum schema required.

include

/usr/local/etc/openldap/schema/core.schema

## Added to support the inetOrgPerson object.

include

/usr/local/etc/openldap/schema/cosine.schema

include

/usr/local/etc/openldap/schema/inetorgperson.schema

## Added logging parameters2,# /usr/local/etc/openldap/slapd.conf

# Global section

## Include the minimum schema required.

include

/usr/local/etc/openldap/schema/core.schema

## Added to support the inetOrgPerson object.

include

/usr/local/etc/openldap/schema

include

/usr/local/etc/openldap/schema/schema

## Added logging parameters 3,# /usr/local/etc/openldap/slapd.conf

# Global section

## Include the minimum schema required.

include

1

Page 142: q7 Linux Full

/usr/local/etc/openldap/schema/core.schema

## Added to support the inetOrgPerson object.

## Added logging parameters 4,# /usr/local/etc/openldap/

# Global section

## Include the minimum schema required.

include

/usr/local/etc/openldap/schema/core.schema

## Added to support the inetOrgPerson object.

## Added logging parameters

18

Tom Wilkins is working as a system administrator at Technology Systems. Tom needs to design a schema for a directory that contains records of employees, such as name, phone, address, and job profile, in the organization. Tom writes a code for the telephoneNumber attribute type in LDAP.

2.5.4.20 NAME 'telephoneNumber' EQUALITY telephoneNumberMatch SUBSTR telephoneNumberSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{24}

Identify the OID of the attribute type and the use of telephoneNumberMatch rule in the preceding code snippet? 1,The OID of the attribute type is 2.5.4.20 and the telephoneNumberMatch rule is used for matching complete telephone numbers. 2,The OID of the attribute type is 2.5.4.20 and the telephoneNumberMatch rule is used for matching partial telephone numbers. 3,The OID of the attribute type is 1.3.6.1.4.1.1466.115.121.1.15 and the telephoneNumberMatch rule is used to describe the applications that own and use the attribute. 4,The OID of the attribute type is 1.3.6.1.4.1.1466.115 and the telephoneNumberMatch rule is used to specify the unique name of an attribute.

1

Page 143: q7 Linux Full

19

Donna Bard is working as a system engineer at ABC corp. The company uses LDAP directory schema to reduce data redundancy problems and to maintain data integrity. This directory stores the record of employees,such as name, age, and year of birth. Now, the company assigns a task to Donna to design a new object class, myPerson, which is extended from the existing object class, inetOrgPerson. The company also asks donna to define a new attribute type, dob, in the my Person object class. The attribute type, dob, stores the date of birth of the employees of the company. Donna uses the following code snippet to define the dob attribute type and the object class, myPerson, respectively:

1.) ( dob-OID NAME DESC 'birthday day-month' EQUALITY caseIgnoreMatch SUBSTR

caseIgnoreSubstringsmatch SYNTAX ‘bob’ 1.3.6.1.4.1.1466.115.121.1.15 )

2.)

( myPerson-OID NAME 'myPerson' DESC 'Extended person' SUP inetOrgPerson

STRUCTURAL MAY dob )

But, Donna finds that the above code snippet is not producing the required results. What code snippet should Donna use to perform the task? 1,1.) ( dob-OID NAME 'dob' DESC 'birthday day-month' EQUALITY caseIgnoreMatch SUBSTR

caseignoresubstringsmatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )

2.)

( myPerson-OID NAME 'myPerson' DESC 'implementing person' SUP inetOrgPerson

STRUCTURAL MAY dob )

2,1.) ( dob-OID NAME 'dob' DESC 'birthday day-month' EQUALITY caseIgnoreMatch SUBSTR

caseIgnoreSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )

2.)

( myPerson-OID NAME 'myPerson' DESC 'Extended person' SUP inetOrgPerson

STRUCTURAL MAY dob )

3,1.) ( dob-OID NAME 'dob' DESC 'birthday day amd month' EQUALITY caseIgnoreMatch SUBSTR

caseIgnoresubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )

2.)

2

Page 144: q7 Linux Full

( myPerson-OID NAME DESC 'Extended person' SUP inetOrgPerson ,myname,

STRUCTURAL MAY dob )

4,1.) ( dob-OID NAME 'dob' DESC EQUALITY caseIgnoreMatch SUBSTR

caseIgnoreSubstringsMatch 1.3.6.1.4.1.1466.115.121.1.15 )

2.)

( myPerson-OID NAME 'myPerson' DESC 'Extended person' SUP inetOrgPerson

STRUCTURAL MAY dob )

20

Tom Wilkins is working as a system administrator at Quality Software Developers. The organization uses a Directory server to access information pertaining to its employees and organizational resources, such as computers and printers. The Directory server contains confidential and private data of the organization. Tom is assigned a task to implement security of confidential data through the authentication method. In the authentication method, a secure connection is established between two networks and information transmitted on this secure connection is encrypted using encryption methods.

Which technology does Tom choose to perform this task? 1,SSL/TLS2,CIPE 3,IPSec 4,Netfilter

1

Page 145: q7 Linux Full

21

InfoSuper Corp. is a software development organization, which has a large number of computer systems that are connected through a network. The organization has a centralized directory server. John Barrett, the system administrator at InfoSuper Corps. comes to know that a malicious user has breached the security of the directory server. The user uses some software tools to eavesdrop on the data being transmitted on the network. The user then decrypts the passwords and monitors the data on the network. Further, the user gathers the credential information and data being transmitted between the directory server and the authorized users. This information is used by the malicious user to breach the security of the directory server.

Which security threat has the malicious user employed to breach the security of the server? 1,Credential stealing 2,Connection hijacking 3,Trojan horses 4,Network sniffing

4

22

Pat Greene is working as a network administrator at XYZ Inc.

Pat implements a directory service to store data at a centralized location. Pat is informed that:

-The authorized users are not able to access the Directory server as a malicious user is identifying the hardware and software environment of the directory server.

-After identifying the capacity of the directory server, the malicious user is sending more traffic than what the server can handle.

Which technique does this type of attack illustrate? 1,SYN attack 2,Buffer overflow attack3,Indirect resource consumption 4,Direct resource consumption

2

23

Supersoft2000, a software development organization has development centers throughout America, which are connected through a network. Larry Williams, a system administrator at Supersoft2000, installs a directory service to implement an identity management system. Employees and clients at different centers access the directory server through the network. Larry wants to prevent unauthorized access to the directory server. So, Larry installs a firewall on the network of the organization such that:

The employees of the internal network are able to establish a connection with external networks.

Incoming requests are processed first by the firewall. Next, the firewall validates the requests and forwards them to the directory server.

Which of the following does Larry use to perform these tasks? 1,SSL/TLS 2,SASL 3,CIPE4,Kerberos

3

Page 146: q7 Linux Full

24Which migration perl script is used to translate the protocol entries that are stored in the /etc/protocols file? 1,migrate_protocols.pl2,migrate_networks.pl 3,migrate_hosts.pl 4,migrate_netgroup_byuser.pl

1

25

Which attribute of the migrate_common.ph file is used to customize the mail domain in the mail attribute in the migrate_passwd.pl script? 1,$DEFAULT_MAIL_DOMAIN2,$DEFAULT_BASE 3,$EXTENDED_SCHEMA 4,NAMINGCONTEXT

1

26Which perl script is used to translate the host entries stored in the NIS infrastructure? 1,Migrate_netgroup_byuser.pl 2,Migrate_netgroup.byhost.pl 3,Migrate_group.pl 4,Migrate_hosts.pl

4

27

Jim Edwin is working as a system administrator with Blue Moon Computers. The management assigns Jim the task to migrate the NIS based network to OpenLDAP. Jim wants to customize the migration script according to the organizational requirements. To customize the script, Jim needs to specify the name suffix to be used as distinguished name in the OpenLDAP information.

Which parameter of migrate_common.ph script should Jim use to accomplish the task? 1,$DEFAULT_MAIL_DOMAIN 2,$DEFAULT_BASE3,$EXTENDED_SCHEMA 4,NAMINGCONTEXT

2

Page 147: q7 Linux Full

28

Ken Burton is working as a system administrator at SuperGraphics Inc. While replicating an LDAP server, Ken needs to configure the master LDAP server to maintain a log of the changes made. Ken, therefore, needs to edit the slapd.conf file to specify the details of the replica server. He needs to specify the name of the replica server, the partition to be replicated, the binding DN of the LDAP server, and the binding method to bind the master LDAP server to the replica server. Which of the following commands should Ken use to perform the required task? 1,replica host=replicaser.supergraphics.com:389

binddn=”cn=replicaser,dc=supergraphics,dc=com”

credentials bindmethod=simple tls=no

2,replica host=replicaser.supergraphics.com:389

tls=”dc=supergraphics,dc=com”

binddn=”cn=replicaser,dc=supergraphics,dc=com”

credentials bindmethod=simple tls=no 3,replica host=replicaser.supergraphics.com:389

suffix=”dc=supergraphics,dc=com”

binddn=”cn=replicaser,dc=supergraphics,dc=com”

credentials bindmethod=simple tls=no4,replica host=replicaser.supergraphics.com:389

suffix=”dc=supergraphics,dc=com”

portnumber=”cn=replicaser,dc=supergraphics,dc=com”

credentials bindmethod=simple tls=no

3

Page 148: q7 Linux Full

29

Larry Williams is working as a system administrator at BlueMoon Computers. Larry observes that the performance of the server is decreasing as the users in the organization are excessively querying one section, employee information, of the server. The management, therefore, asks Larry to distribute the directory to improve the performance of the server. After distributing a directory, such that Server1 maintains the information about the organizational information while the employee information is maintained by Server2. Now, Larry needs to verify the correctness of the data stored in Server2. For this, Larry executes the following command:

# slapcat -H –C ldap://Server2.bluemooncomputers.com/ -LL -x -b "dc=bluemooncomputers,dc=com" "(ou=*)" ou

However, Larry is not able to retrieve results from the Server2, which contains the employee information. What should Larry do to perform the required task? 1,Use

# ldapsearch -H –C ldap://Server2.bluemooncomputers.com/ -LL -x -b "dc=bluemooncomputers,dc=com" "(ou=*)" ou command

2,Use

# slapcat -c –H ldap://Server2.bluemooncomputers.com/ -LL -x -b "dc=bluemooncomputers,dc=com" "(ou=*)" ou command 3,Use

# slapadd -H –C ldap://Server2.bluemooncomputers.com/ -LL -x -b "dc=bluemooncomputers,dc=com" "(ou=*)" ou command 4,Use

# slapindex -H –C ldap://Server2.bluemooncomputers.com/ -LL -x -b "dc=bluemooncomputers,dc=com" "(ou=*)" ou command

1

30

Tom Wilkins is working as a system administrator at Technology Systems. Tom is assigned the task to enable the OpenLDAP support in Samba. Tom needs to provide support to the uid, displayName, and gidNumber attributes in the OpenLDAP. Which of the following schema files must be included in the slapd.conf file to support the above attributes? 1,cosine.schema, nis.schema, and samba.schema 2,cosine.schema, inetorgperson.schema, and autofs.schema 3,cosine.schema,inetorgperson.schema,nis.schema4,inetorgperson.schema, samba.schema, and nis.schema

3

31

Chris Donaldson is working as a system administrator at SuperGraphics Inc. Chris needs to integrate the samba with OpenLDAP to store the user information. Chris adds a new user Ronald in the OpenLDAP directory. Which command should Chris use to verify the existence of user, Ronald in the OpenLDAP directory? 1,# /usr/local/sbin/smbldap-usershow.pl ronald2,# smbldap-usershow.pl ronald 3,# /usr/local/sbin/smbldap-usershow ronald 4,# /usr/local/sbin/smbldap-usershow.pl

1

Page 149: q7 Linux Full

32

Donna Bard is working as a system administrator at Blue Moon Computers, which is a software development organization based in New York. Each department of the organization maintains its own database to store information about the employees. Since the information is stored in multiple data sources, the employees frequently encounter redundant data and inconsistent data. For this, Donna decides to configure a Directory server in the organization. She first creates a Data Design of the organization. She observes that when an employee in a department is shifted to another department, the changes are not reflected in the other related databases. What could be the possible consequence of Donna’s observation? 1,Obsolete data stored in the databases 2,Databases updated without any coordination between the database administrators. 3,Databases updated within short time duration. 4,Databases accessed by a number of database administrators at the same time.

1

33

Perfect Watch Corp. is a watch manufacturing company. The company needs to implement an LDAP Directory server to communicate with its clients. For implementing the LDAP Directory server, the company asks Donna Bard, the system administrator, to define a LDAP Model, which describes the services provided by LDAP Directory server to the LDAP Directory clients of the company. While performing the task, Donna needs to describe the operations that can be performed on the LDAP Directory, such as search, add, delete, bind, unbind. What does Donna do to perform the above task? 1,Define the Information model 2,Define the Naming model 3,Define the Functional Model 4,Define the Security Model

3

34

Jim Lewis is working as a system administrator at Smart Software Developers, a leading developer of computer applications. Jim is assigned the task to implement a Directory service in the organization to provide centralized storage and management of information, such as employee records.

For this, Jim decides to implement an LDAP Directory server in the organization. While implementing the LDAP Directory server, he wants to specify a distinguished name for every entry in the Directory server. He also wants to specify rules to restrict the size of the attributes of the data elements, such as employee ID. Which LDAP models should Jim use to achieve his objective? 1,Information Model and Naming Model 2,Functional Model and Security Model 3,Information Model and Security Model 4,Functional Model and Naming Model

1

Page 150: q7 Linux Full

35

Blue Moon Computers is a leading developer of computer applications. The organization has three departments: HR, Research, and Development. The directory service is configured in the HR department only, and all the employees in the rest of the departments access the directory. Now, if the directory service fails due to a system failure, employees in all the three departments will be affected. To avoid this, Chris Donaldson, the system administrator, wants to make the directory service available in all the three departments. For this, Chris decides to create multiple copies of the directory service and install a copy of the Directory service in each department. Chris employs the Single-Master Replication Policy to synchronize the data stored in the main directory server and the Replica servers, to maintain data consistency.

Now, to perform the write operations to add, modify, or update the data, in the Directory service, Chris wants to implement a mechanism so that when an employee sends a write operation request to a replica server, the replica server sends the IP address of the main directory server to the employee. The replica server also sends a message to the employee along with the IP address. This message requests the employee to send the write operation request to the main directory server.

Which strategy, in the Single-Master Replication policy, is employed by Chris to perform the write operation? 1,Using referrals 2,Using chaining 3,Assigning unique sequence numbers to each update operation performed 4,Using referrals and Using chaining

1

36

Blue Valley Consulting is a leading developer of computer applications. The organization has its head office in New York and two branch offices in California and Paris. There are three departments in the organization: Marketing, Research, and Development. The branch offices are connected to the head office in New York through Virtual Private Network (VPN). Each branch office runs as a separate entity, with its own network, reporting structure, and constraints. The organization has no centralized IT management group, and separate administrators at each branch offices manage the network. Since the organization has multiple servers but no centralized management of the information, it faces the data redundancy and data inconsistency problems.

To avoid the above data related problems by centralizing the storage and management of data in the organization, Tom Wilkins, the system administrator at the head office, decides to install and configure the OpenLDAP Directory service. Before installing OpenLDAP, Tom wants to install the OpenSSL software package to implement secure, encrypted communication between the Directory server and the clients. What are the commands entered by Tom to install the OpenSSL software package? 1,Tom must enter the following commands at the shell prompt to install OpenSSL:

# rpm –ivh openssl-0.9.7a-22.1.i386.rpm

# rpm –ivh openssl-devel-0.9.7a-22.1.i386.rpm

# rpm –ivh openssl096b-0.9.6b-13.i386.rpm2,Tom must enter the following commands at the shell prompt to install OpenSSL:

# rpm –ivh krb5-server-1.2.7-19.i386.rpm

# rpm –ivh pam_krb5-1.70-1.i386.rpm

# rpm –ivh krb5-libs-1.2.7-19.i386.rpm

# rpm –ivh krb5-devel-1.2.7-19.i386.rpm

# rpm –ivh krb5-workstation-1.2.7-19.i386.rpm 3,Tom must enter the following command at the shell prompt to install OpenSSL:

# rpm –qa | grep openssl 4,Tom must enter the following commands at the shell prompt to install OpenSSL:

1

Page 151: q7 Linux Full

# rpm –ivh openssl096b-0.9.6b-13.i386.rpm

# rpm –ivh openssl-devel-0.9.7a-22.1.i386.rpm

37Which the command is used to test the configuration of the Kerberos client? 1,kinit 2,klist 3,kdb5_util 4,kadmin.local

1

38

Smart Software Developers is a leading software development organization with 15 branches across the world. To enhance the security of the LDAP Directory server maintained by the organization, Ken Burton, the system administrator, decides to authenticate the LDAP Directory users using Kerberos support. For this, Ken needs to create the Kerberos Database on the Key Distribution Center (KDC). What should Ken do to perform the above task? 1,Ken should enter the following command to create the Kerberos Database:

# kdb5_util create –s2,Ken should enter the following command to create the Kerberos Database:

# kdb5_util create –c 3,Ken should enter the following command to create the Kerberos Database:

kdb5util create –s 4,Ken should enter the following command to create the Kerberos Database:

# kdb5util create –c

1

Page 152: q7 Linux Full

39

Which parameter in the “smb.conf” file for the OpenLDAP-enabled Samba server specifies the domain where Samba server resides? 1,Workgroup 2,Netbios name 3,Security 4,Encryption

1

40

Which attribute in the sambaAccount object, used to store the Samba related information in OpenLDAP, specifies the time when the lmpassword and ntpassword are last modified? 1,SambaPwdLastSet2,SambaNTPassword 3,SambaLMPassword 4,SambaLogonScript

1

41

Which schema file path should be specified in the samba.schema file to provide the uid attribute of a sambaAccount object? 1,cosine.schema 2,inetorgperson.schema 3,nis.schema 4,core.schema

1

42

Which command is used to verify whether Samba has authenticated a sambaAccount, Mike, stored on the OpenLDAP server? 1,# /usr/local/sbin/smbldap-usershow.pl Mike2,# /usr/local/smbldap-usershow.pl Mike 3,# /usr/sbin/smbldap-usershow.pl Mike 4,# /usr/local/sbin/ldap-usershow.pl Mike

1

43

Christine Turner is working as a system administrator at Medical Central Supplies. The organization maintains several directory servers on different platforms to store the data pertaining to the employees. Each directory server uses different data formats, syntaxes, and protocols for communication with the supported application. The organization asks Christine to enable data sharing between the directory servers. To perform the task, Christine decides to integrate applications across the platforms. However, Christine finds that the directory servers are not able to understand the protocols of each other across the servers. What should Christine do to resolve the issue and enable data sharing between different directory servers?

1,Use gateways 2,Use push and pull synchronization agents 3,Use metadirectories 4,Use a distributed multivendor directory

1

Page 153: q7 Linux Full

44

Jim Lewis is working as a system administrator at Technology Systems. The organization maintains different directory servers on several platforms for running different types of applications. These directory servers use different security mechanisms to provide access to the directories of the directory server. The organization needs to enable sharing and accessing of information between the directory servers for official purposes. Jim decides to perform the task and finds that the directory servers are unable to recognize the clients of different platforms. As a result, the directory services of the directory server are unable to interoperate with the non-native clients. What should Jim do to resolve the problem? 1,Use push and pull synchronization agents 2,Use gateways 3,Create distributed multivendor directories 4,Use cross-platform authentication services

4

45

Certified Carriers is a software application development company based in U.S. The company maintains the details about all the running projects in the OpenLDAP server, installed in the company. The company finds that the server has started running slowly due to some unknown reasons. The company asks the system administrator, Ed Young, to identify the cause of the problem. Ed finds that some unauthorized people are accessing the directory server, which causes the server to run slowly. To solve the problem, Ed needs to specify the kind of information, which should be stored in the system logs. For this, Ed defines the value of the loglevel directive as ‘8’. What kind of information does Ed want to store by using this value? 1,KERBEROS_V4 2,DIGEST-MD53,CRAM-MD5 4,ANONYMOUS

2

46Which feature of Provisioning module would automatically configure the kickstart file for a single user? 1,Bare metal provisioning 2,Existing state provisioning 3,Configuration management4,Kickstart configuration writer

3

47

The Satellite model grants permission to the user to download software using physical media, such as CD and floppy. Which of the following feature helps to accomplish this task? 1,Local database repository 2,Complete off-network capability3,Channel and errata cloning and their management 4,Channel permissions

2

48

Global Systems is a software development organization. Pat Greene, the network administrator, has used the Kickstart installation method to automatically configure workstations and servers according to the requirement of the organization. Which feature of the provisioning module does Pat use? 1,Bare metal provisioning2,Existing state provisioning 3,Configuration management 4,Kickstart configuration writer

1

Page 154: q7 Linux Full

49

Jim Lewis is working as a network administrator at Smart Software Developers. Jim has registered the Linux workstations and servers with Red Hat Network. Jim has identified a workstation on the network that has crashed while running a software application. For resolving the problem, he must identify the location of this error. What should he do to accomplish the task? 1,Implement a GUI to receive automatic updates from Red Hat network 2,Ask for prior notification for updates and receipt of the errors through mail messages 3,Issue a list of Errata4,Check RPM dependencies associated with each new version of the updates

3

50

Quality Software developer is multinational organization. Donna Bard, the network administrator in the organization is responsible for monitoring the network of the organization. While monitoring the network, Donna observes that a large number of data packets are getting lost on the network. As a result, the employees of organization are not able to download the file from the file server although all the connections and protocols related to file server are working perfectly. This is affecting the performance of the enterprise. What should Donna do to solve the problem?

1,Run the tcpdump command at the shell prompt. 2,Run the itrace and strace command at the shell prompt. 3,Run the itrace command at the shell prompt. 4,Run the strace command at the shell prompt.

1

51

Ronald Billing is working as a system administrator at Blue Moon Computers, which provides storage solutions to its customers. Ronald has configured a DNS server in the enterprise, which converts the address of a Web site to its associated IP address. All the employees of Blue Moon Computers are connected to the DNS for routing over the network. The users report complaints to Ronald that they cannot access the enterprise network because DNS is not able to resolve the names into IP addresses. If the problem persists, the network will stop functioning and the performance of the enterprise will go down quickly. What should Ronald do to solve the problem? 1,Use the ps command

Use the kill –STOP command

Use the kill –CONT command 2,Use the fuser command

Use the Isof command

Configure the rpm -q files 3,Use the host or nslookup command

Use the dig command

Configure the chroot files4,Use the host or ltrace command

Use the strace command

Configure the rpm –qc files

3

Page 155: q7 Linux Full

52

Certified Carriers is an established computer-training institute, based in New Jersey. The institute has launched a new course on Linux administration that has been very successful. Therefore, the management wants to launch two new batches within the next week. For this, Corrine Wallace, the network administrator, needs to set up 60 Linux workstations.

Corrine wants to use Kickstart installation that enables automatic installation of the operating systems on several computers simultaneously. To use Kickstart installation, Corrine needs to set up an installation sever, such as NFS server, or Apache server. While setting up NFS server, Corrine wants to copy the Linux installation files to the NFS shared directory.

What of the following sequence of command, should Corrine follow to perform the task? 1,Run the following command sequentially:

# mkdir /mnt/install ?

# mount /dev/cdrom /mnt/cdrom ?

# cp –ar /mnt/cdrom/RedHat /var/www/html/install ?

# cp /mnt/cdrom/.discinfo /mnt/install ?

# umount /mnt/cdrom ?

# mount /dev/cdrom /mnt/cdrom ?

# cp –ar /mnt/cdrom/RedHat/RPMS /mnt/install ?

# umount /mnt/cdrom ?

# mount /dev/cdrom /mnt/cdrom ?

# cp –ar /mnt/cdrom/RedHat/RPMS /mnt/install ? 2,Run the following command sequentially:

# mkdir /mnt/install ?

# mount /dev/cdrom /mnt/cdrom ?

# cp –ar /mnt/cdrom/RedHat /var/ftp/pub/install ?

# cp /mnt/cdrom/.discinfo /mnt/install ?

# umount /mnt/cdrom ?

# mount /dev/cdrom /mnt/cdrom ?

# cp –ar /mnt/cdrom/RedHat/RPMS /mnt/install ?

# umount /mnt/cdrom ?

# mount /dev/cdrom /mnt/cdrom ?

# cp –ar /mnt/cdrom/RedHat/RPMS /mnt/install ? 3,Run the following command sequntially:

4

Page 156: q7 Linux Full

# mkdir /mnt/install ?

# mount /dev/cdrom /mnt/cdrom ?

# cp /mnt/cdrom/.discinfo /mnt/install ?

# cp /mnt/cdrom/.discinfo /mnt/install ?

# umount /mnt/cdrom ?

# mount /dev/cdrom /mnt/cdrom ?

# cp –ar /mnt/cdrom/RedHat/RPMS /mnt/install ?

# umount /mnt/cdrom ?

# mount /dev/cdrom /mnt/cdrom ?

# cp –ar /mnt/cdrom/RedHat/RPMS /mnt/install ? 4,Run the following command sequentially:

# mkdir /mnt/install ?

# mount /dev/cdrom /mnt/cdrom ?

# cp –ar /mnt/cdrom/RedHat /mnt/install ?

# cp /mnt/cdrom/.discinfo /mnt/install ?

# umount /mnt/cdrom ?

# mount /dev/cdrom /mnt/cdrom ?

# cp –ar /mnt/cdrom/RedHat/RPMS /mnt/install ?

# umount /mnt/cdrom ?

# mount /dev/cdrom /mnt/cdrom ?

# cp –ar /mnt/cdrom/RedHat/RPMS /mnt/install ?

Page 157: q7 Linux Full

53

The system administrator at Global Systems needs to install Linux operating system on the computers in the organization. He wants to install a server system that enables the employees at different branches of an organization to share the data. He wants to use the kickstart method to install Linux on all the computers from a main server where he would have the image of the boot floppy stored. Identify the server type along with its installation command that he should use and the image file on the server that would be used to create a boot floppy diskette? 1,Apache web server

# rpm –qa | grep ftp ?

linux.img 2,Network file system server

# rpm –qa | grep nfs-utils ?

root.img 3,file transfer protocol server

# rpm –qa | grep http ?

iso.img 4,Network file system (NFS) server

# rpm –qa | grep nfs ?

bootdisk.img

4

54

Pat Greene, the network administrator, at InfoSuper Corp. The organization needs to implement data encryption and authentication protocols for user and file level security. The management, therefore, decides to implement Linux operating system for all business purposes. Pat installs Linux operating system on all the computers in the network of the organization. Pat is using kickstart installation method to automate installation. While deploying Linux operating system Pat gets an error message stating that “ks.cfg file not accessible”. What should Pat do to solve the problem? 1,Pat needs to need to check the path at root prompt or the directory name should be correct and accurate2,Pat needs to check if the CD-ROM is in readable mode and that you have made the CD-ROM bootable. 3,Pat needs to check for the mouse parameter and mention it in your ks.cfg file. 4,Pat needs to use the recent version of boot image file.

1

Page 158: q7 Linux Full

55

Global Systems Inc. is a leading software development organization. Users in R&D frequently download files and packages from the database server through the Internet. Some files and packages downloaded from the Internet are infected with viruses, which affect computers of all users. To overcome this virus problem, instead of installing antivirus programs on every computer. The organization needs to install virus-free operating systems, such as Linux. Chris, the system administrator, automates the installation of the operating system. Pat needs to use an operating system that provides solution for small to medium range of servers used for the majority of businesses, such as file servers and mail servers. He also needs to place pre-installation scripts at the beginning of the Kickstart configuration file. What should Chris do to perform the required task? 1,Chris needs to use Red Hat Enterprise Linux operating system and enter the following command:

%pre

echo ”My kickstart installation started on ‘ /bin/date’ “ > /etc/motd

2,Chris needs to use Mandriva Linux operating system and enter the following command:

network --device eth0 -–bootproto dhcp ?

3,Chris needs to use Red Hat Enterprise Linux operating system and enter the following command:

%post --interpreter /usr/bin/python 4,Chris needs to use Red Hat Enterprise Linux operating system and enter the following command:

# mkdir /var/ftp/pub/configfiles

1

56

Consider the statements:

Statement A:

The BOOTP server contains the information about the configuration of the computers on which Linux needs to be installed.

Statement B:

During the Kickstart installation of Linux over a network, the Kickstart client needs to have either the network information or the files required for installing the Linux operating system.

Which of the following is true, with respect to the above statements? 1,Statement A is true and statement B is false. 2,Statement A is false and statement B is true. 3,Both, statements A and B, are true. 4,Both, statements A and B, are false.

4

Page 159: q7 Linux Full

57

Jim, the network administrator at Supersoft Inc., has decided to install the Linux operating system on the network at his organization. He needs to deploy an NFS server at a centralized location on the network. After preparing the server, some problem occurred while he was configuring the server. The following set of commands was used by him to configure the NFS server:

/mnt/install *(ro,sync)<ro,asynch>

# exportfs –e

# service nfs start

# showmount –e

Which command should Jim modify to configure the server? 1,# exportfs –e 2,# service nfs start 3,# showmount –e 4,/mnt/install *(ro,sync)

3

58

Red Sky IT Systems is an IT organization that provides software services to its customers. One of the projects being developed at Red Sky requires the use of advanced Perl scripts. For this, Pat Greene, the network administrator installs RPM packages on the computers. Pat observes that a file of RPM package is corrupted during the installation of RPM packages. Therefore, Pat needs to verify the corrupted file to check the attributes of the file. What should Pat do to perform the task? 1,Execute # rpm –-rebuilddb ? 2,Execute # rpm –Vf /bin/umount ?3,Execute # rpm --import /mnt/cdrom/RPM-GPG-KEY ? 4,Execute # rpm -K squirrelmail-1.2.11-1.noarch.rpm ?

2

59

MentorGraphics is a leading software solution provider. The management of the organization asks Nancy Jones, the network administrator, to install a sendmail RPM package in the organization network. Nancy observes that the existing RPM package is not secure for sendmail package. Therefore, Nancy decides to update the existing RPM packages to enhance the security for sendmail packages. For this, Nancy needs to register a server computer with Red Hat Network (RHN).

In addition, Nancy needs to push updates and patches securely from the server registered with RHN to other remote servers in the organization network. What should Nancy do to perform the task? 1,Execute Patch [options] <[user@]sourcehost:> <source filename> <[user@]destinationhost:> <destination filename> 2,Execute rsync [options] <[user@]sourcehost:> <source filename> <[user@]destinationhost:> <destination filename> 3,Execute scp [options] <[user@]sourcehost:> <source filename> <[user@]destinationhost:> <destination filename>4,Execute rpm [options] <[user@]sourcehost:> <source filename> <[user@]destinationhost:> <destination filename>

3

Page 160: q7 Linux Full

60

Which value for the STAGE argument in the rpmbuild command unpacks the source code and applies patches? 1,a 2,p3,b 4,c

2

61Which section of a spec file contains the instructions to prepare the source code for build? 1,%build 2,%prep3,%install 4,%files

2

62Which SRPM directory contains the files that are used to control the RPM build process? 1,/usr/src/redhat/BUILD 2,/usr/src/redhat/RPMS 3,/usr/src/redhat/SPECS4,/usr/src/redhat/SRPMS

3

63

Which character is displayed in the output of the rpm command with –Vf option that is used to check if there is a change in the user ownership attribute of the file? 1,L 2,U3,S 4,M

2

64

Donna is working as a network administrator at Safest Software Developers. The organization has three branches at different locations. There are three departments at each branch, named application development, quality assurance, and sales. The users of the same department at different branches are part of a group. There are three groups corresponding to each department, app for application development department, qa for quality assurance department, and sales for sales department. All the employees at different branches use a database server at the main branch to store data. The database server can run 100 processes at a time. The users in the app group run a large number of processes on the database server due to which the users in the qa and sales groups are not able to run their processes. What should Donna do to solve this problem?

1,Donna needs need to add the following entries to the /etc/security/limits.conf file:

@app soft nproc 45

@app hard nproc 502,Donna need to add the following entry to the /etc/pam.d/login file:

session required /lib/security/pam_limits.so

3,Donna needs to add the following entries to the /etc/pam.d/login file:

* soft nofile 85*

hard nofile 88 4,Donna needs to add the following entries to the /etc/security/limits.conf file:

* soft file 560*

1

Page 161: q7 Linux Full

hard file 860

65

Tom Wilkins is working as a system administrator at SSPT Corporation. To provide communication between these branch offices, Tom needs to provide an e-mail facility and shared Internet access in the organization. For this, he needs to update the Linux kernel of a server to embed the required services into the existing communication system. After updating, he needs to configure the kernel source code, which is of very large size. He also needs to compile the kernel source and resolve all the dependencies after configuring the kernel source code as required. He also wants to remove all the unused files. What should Tom do to accomplish this task?

1,Tom should use the following commands:

# make menuconfig

#make oldconfig

#make mrproper 2,Tom should use the following commands:

#make oldconfig

# make zImage

# make modules_install 3,Tom should use the following commands:

# make oldconfig

# make xconfig

# make install 4,Tom should use the following commands:

4

Page 162: q7 Linux Full

# make dep

# make bzImage

66

Technology Systems is a leading software development organization. The organization uses the Linux operating system on its workstations and servers for security purposes. The organization has a main centralized server that uses kernel-2.6. The organization adds two new divisions, one for its research work and another for its development work. Both divisions access the centralized server and this increases the load on the server.

To improve the performance of server, the organization assigns Diane Frye, the system administrator, the task of upgrading the kernel. For this, Diane downloads, configures, and compiles the upgraded kernel on the server. However, Diane fails to execute the make module command.

What should Diane do to troubleshoot the problem? 1,Run the make dep command.2,Run the make modules command. 3,Run the make bzImage command. 4,Run the make install command.

1

Page 163: q7 Linux Full

67

Donna Brad is working as a system administrator at Blue moon Computers. To support the recently acquired hardware, the management asks Donna to upgrade the kernel of the main Linux server. She checks whether the kernel source code is already installed on the main server and finds the code is not installed. Therefore, she downloads the source code from Web and configures the kernel source code on the server. Now, Donna needs to compile the kernel source code, and perform the installation steps of kernel.

What should Donna do to complete the upgrade of the kernel? 1, Donna should execute the following commands:

# make dep

# make bzImage

# make cln

# make modules

# make modules_install

# make install 2,Donna should execute the following commands:

# make dep

# make clean

# make bzImage

# make modules

# make modules_install 3,Donna should execute the following commands:

# make dep

# make clean

# make bzImage

# make modules

# make modules_install

# make install4,Donna should execute the following commands:

# make dep

# make bzImage

# make clean

# make modules

# make install

3

Page 164: q7 Linux Full

# make modules_install

Page 165: q7 Linux Full

68

Global Systems is a software development organization that provides customized software solutions. The organization uses kernel-2.4.21-4.EL on its Linux server. The management of the organization decides to upgrade the existing kernel to kernel-2.4.24 to enhance security and to acquire new hardware support. Pat Greene, the system administrator is assigned the task of upgrading the Linux kernel.

After downloading the.tar.gz file containing the source code of the kernel in /usr/src directory, Pat needs to install the kernel source code.

What should Pat do to perform the task? 1, Pat needs to execute the following code snippet:

# cd /usr/src

# tar -zxvf linux-2.4.24.tar.gz

# cd linux-2.4.24

# ls –al2,Pat needs to execute the following code snippet:

# cd /src

# tar -zxvf linux-2.4.24.tar.gz

# cd linux-2.4.24

# ls –l 3,Pat needs to execute the following code snippet:

# cd /usr/src

# tar linux-2.24.tar.gz

# cd linux-2.4.24

# ls –al 4,Pat needs to execute the following code snippet:

# cd /usr/src

# tar -zxcf linux-2.4.24.gz

# cd linux-2.4.24

# ls –al

1

Page 166: q7 Linux Full

69

John Barrett is working as a network administrator at Blue Valley Consulting. The organization has a number of branch offices all over US. The employees of the organization access a centralized Linux server located at the main branch. John has recently upgraded the kernel of the centralized Linux server from kernel-2.4 to kernel-2.6. John has also implemented RAID to avoid any data loss. After implementing the RAID, John observes that the RAID acceleration is low. As a result, the server performance is also degraded. To improve the RAID acceleration, John needs to stabilize the speed of the RAID device. For this, he decides to assign the value, 80000, to the parameters specifying the speed of the RAID device. What should John do to perform this task?

1,Execute the following commands at the shell prompt:

# echo 80000 > /sys/dev/raid/speed_limit_max

# echo 80000 > /sys/dev/raid/speed_limit_min

2,Execute the following commands at the shell prompt:

# echo 80000 > /proc/sys/dev/raid/speed_limit_max

# echo 80000 > /proc/sys/dev/raid/speed_limit_min

3,Execute the following commands at the shell prompt:

# echo 80000 > /proc/sys/dev/raid/speed_max

# echo 80000 > /proc/sys/dev/raid/speed_min 4,Execute the following commands at the shell prompt:

# echo 80000 > /proc/sys/raid/speed_limit_max

# echo 80000 > /proc/sys/raid/speed_limit_min

2

Page 167: q7 Linux Full

70

Tom Wilkins is working as a network administrator at InfoSuper Corp. The management of the organization decides to migrate to the Linux environment to provide file level security and data level security to all the applications. Tom needs to compile and execute a C# application on a Linux platform. To compile the application on the C# application, Tom changes to the /usr/src/ mono directory and enters the following command at the shell prompt to compile the application:

# mcs Interactive\ Welcome.cs

However, Tom observes that no output is displayed. In addition, he also wants to execute the application. What should Tom do to perform the required task? 1,Chris needs to enter the following commands to compile:

# mono Interactive\ Welcome.cs

Enter the following command to execute the application:

# mono Interactive\ Welcome.exe 2,The compilation is performed successfully

Enter the following command to execute the application:

# mono Interactive\ Welcome.exe 3,Chris needs to enter the following commands to compile:

# mcs Interactive\ Welcome.cs

Enter the following command to execute the application:

# mcs Interactive\ Welcome.exe 4,Compilation is performed successfully

Enter the following command to execute the application:

# mcs Interactive\ Welcome.exe

2

Page 168: q7 Linux Full

71

Chris Donaldson is working as a network administrator at Quality Software Developers. To provide file and user level security, the management decides to migrate application to a Linux-based system. Chris decides to use mono tool to migrate the .NET application to Linux. To use the tool, Chris downloads the zip files that contains the required RPM packages needed to run the application on Linux platform. Chris installs the first four RPM packages to provide database connectivity and debug information in the following order:

bytefx-data-mysql-1.1.6-1.novell.6.3.i586.rpm

libgdiplus-1.1.5-1.ximian.1.1.i386.rpm

ibm-data-db2-1.1.6-1.novell.6.3.i586.rpm

libgdiplus-debuginfo-1.1.5-1.ximian.1.1.i386.rpm

However, after installing of all the required RPM packages, Chris observes that still the .NET application is not running on Linux platform. What should Chris do to solve the problem? 1,Chris needs to install the RPM packages in the following order:

libgdiplus-debuginfo-1.1.5-1.ximian.1.1.i386.rpm

bytefx-data-mysql-1.1.6-1.novell.6.3.i586.rpm

ibm-data-db2-1.1.6-1.novell.6.3.i586.rpm

libgdiplus-1.1.5-1.ximian.1.1.i386.rpm 2,Chris needs to install the RPM packages in the following order:

bytefx-data-mysql-1.1.6-1.novell.6.3.i586.rpm

ibm-data-db2-1.1.6-1.novell.6.3.i586.rpm

libgdiplus-1.1.5-1.ximian.1.1.i386.rpm

libgdiplus-debuginfo-1.1.5-1.ximian.1.1.i386.rpm3,Chris needs to install the RPM packages in the following order:

bytefx-data-mysql-1.1.6-1.novell.6.3.i586.rpm

libgdiplus-1.1.5-1.ximian.1.1.i386.rpm

ibm-data-db2-1.1.6-1.novell.6.3.i586.rpm

libgdiplus-debuginfo-1.1.5-1.ximian.1.1.i386.rpm 4,Chris needs to install the RPM packages in the following order:

libgdiplus-debuginfo-1.1.5-1.ximian.1.1.i386.rpm

libgdiplus-1.1.5-1.ximian.1.1.i386.rpm

bytefx-data-mysql-1.1.6-1.novell.6.3.i586.rpm

ibm-data-db2-1.1.6-1.novell.6.3.i586.rpm

2

Page 169: q7 Linux Full

72

Tom Wilkins is working as a network administrator at Blue Valley Consulting. The employees of the organization’s Software Development department develop .NET applications for their clients. Now, the organization migrates to the Linux platform to avoid the cost of licensing in Windows. As a result, the employees now need to migrate the .NET applications to the Linux platform. Tom decides to use the Mono tool to allow migration of the .NET applications to the Linux platform. He first compiles the .NET applications on the Windows platform. He then copies the compiled source code of the application to the /usr/src directory on Linux platform. Now, he needs to compile the application source code on the Linux platform. For this, he decides to use the mcs command. During compilation, he wants to generate the exceptions that the debugger can catch. He also wants to generate the debugging information but ignore the warning messages. To perform the above tasks, Tom executes the following command:

mcs –debug -nowarn:WARNLIST

However, Tom notices that the above command is not providing the required results. What should Tom do to solve the above problem? 1,Tom should execute the following command:

mcs –debug –-fatal –nowarn:WARNLIST [source-files]

In this code, source-files parameter refers to the name of files that contain the source code of .NET applications.2,Tom should execute the following command:

mcs –-about –L PATH [source-files]

In this code, source-files parameter refers to the name of files that contain the source code of .NET applications. 3,Tom should execute the following command:

mcs –debug –nowarn:WARNLIST –L PATH [source-files]

In this code, source-files parameter refers to the name of files that contain the source code of .NET applications. 4,Tom should execute the following command:

mcs -debug --fatal [source-files]

In this code, source-files parameter refers to the name of files that contain the source code of .NET applications.

1

73Which RPM of mono-1.1.zip file provides development support for IKVM, for the .NET CLR? 1,mono-ikvm-1.1.6-1.novell.6.3.i586.rpm2,mono-jscript-1.1.6-1.novell.6.3.i586.rpm 3,mono-locale-extras-1.1.6-1.novell.6.3.i586.rpm 4,mono-web-1.1.6-1.novell.6.3.i586.rpm

1

74

Which element in the migration checklist for Windows to the Linux platform migration can be exported with the help of the built-in Import/Export feature of Internet Explorer? 1,Outlook Express mails 2,Documents and files 3,Account settings 4,Favorites/Bookmarks/Cookies

4

Page 170: q7 Linux Full

75Which RPM of mono-1.1.zip file provides development support for Mono tool? 1,mono-data-postgresql 2,mono-data-sqlite 3,mono-devel-1.1.6-1.novell.6.3.i586.rpm4,mono-data-sybase

3

76

Ed Young is a network administrator at Global Systems. The organization implements Linux on all its workstations and servers. Ed wants to open a .zip file on his Linux-based workstation. The file was compressed using the Windows WinZip utility. Therefore, he installs WinZip on his workstation. After installing WinZip, Ed types the following code snippet at the shell prompt to run the WinZip utility:

$ Wine ~/.wine/Program\ Files/WinZip/WINZIP32.EXE ?

However, when Ed executes the snippet, it does not provide the required output. What should Ed do to solve the problem? 1,Ed needs to write the following code snippet:

$ wine drive_c/Program\ Files/WinZip/WINZIP32.EXE ? 2,Ed needs to write the following code snippet:

$ wine /Program\ Files/WinZip/WINZIP32.EXE ? 3,Ed needs to write the following code snippet:

$ wine ~/.wine/drive_c/Program\ Files/WinZip/WINZIP32.TXT ? 4,Ed needs to write the following code snippet:

$ wine ~/.wine/drive_c/Program\ Files/WinZip/WINZIP32.EXE ?

4

77

Steve Irving is working as a network administrator at Deez Inc., a Texas-based organization. To save the licensing costs of the Windows-based applications, the organization decides to migrate from Windows to Linux. Steve is assigned the task of enabling the Windows-based applications to run on the Linux systems. For this, he needs to install Wine, which translates the Windows instructions into its equivalent Linux instructions. To install Wine on Linux using packages with .deb extensions, Steve writes the following code snippet to execute the command at the shell prompt as a root user:

# apt- _0.0.20050419-winehq-1_i386.deb ?

However, while executing the preceding code snippet, Steve notices that the code snippet is not providing the required output. What should Steve do to solve the problem? 1,Steve needs to write the following code snippet:

#apt-get install -winehq-1_i386.deb ? 2,Steve needs to write the following code snippet:

#apt-get install wine_0.0.20050419- ? 3,Steve needs to write the following code snippet:

#apt-get install wine_0.0.20050419-winehq-1_i386.deb ?4,Steve needs to write the following code snippet:

#get install wine_0.0.20050419-winehq-1_i386.txt ?

3

Page 171: q7 Linux Full

78

Chris Donaldson is an application developer at PQR Inc. The organization is currently working on the Linux platform. The organization receives a new application development project based on the Windows platform. For this, the organization requires developers to work on Windows-based workstations. As a result, Chris needs to migrate and run the Bzip2 Linux application on the Windows-based workstations using SFU. Therefore, Chris downloads the bzip2-1.0.2.tar.gz file from the Internet and saves the file to the local directory of the Windows-based workstation. Then, he enters the following code snippet at the Korn shell prompt to migrate and run the Linux application on Windows platform:

$ gunzip bzip2-1.0.2.tar.gz ?

$ tar -xvf bzip2-1.0.2.tar ?

$ made ?

$ made install ?

However, while executing the preceding code snippet, Chris notices that the code is not providing the required output. What should Chris do to solve the problem? 1,Chris needs to enter the following code snippet:

$ tar -xvf bzip2-1.0.2.tar ?

$ cd

$ make ?

$ make install ? 2,Chris needs to enter the following code snippet:

$ cd 0.2 ?

$ make ?

$ make install ? 3,Chris needs to enter the following code snippet:

$ gunzip bzip2-1.0.2.tar.gz ?

$ tar -xvf bzip2-1.0.2.txt ? 4,Chris needs to enter the following code snippet:

$ gunzip bzip2-1.0.2.tar.gz ?

$ tar -xvf bzip2-1.0.2.tar ?

$ cd bzip2-1.0.2 ?

$ make ?

$ make install ?

4

Page 172: q7 Linux Full

79

Don Allen is working as a system administrator at Indestructible Boxes, Inc. The organization asks to Don to install Simple Network Management Protocol (SNMP) on a computer in the organization to monitor networks and systems of the organization. To install SNMP, Don downloads the source code of SNMP available in the tar.gz file. Now, what command should Don use to perform the task? 1,# cp snmp-<x>.tar.gz /usr/src ?

# net-snmp-utils-5.0.8-11

# net-snmp-devel-5.0.8-11

# cd /usr/src/snmp-<x> ?

# ./configure ?

# make all ? 2,# cp snmp-<x>.tar.gz /usr/src ?

# cd /usr/src ?

# tar xzvf snmp-<x>.tar.gz ?

# cd /usr/src/snmp-<x> ?

# ./configure ?

# make all ?3,# cp snmp-<x>.tar.gz /usr/src ?

# mv snmpd.conf snmpd.conf.org ?

# tar xzvf snmp-<x>.tar.gz ?

# cd /usr/src/snmp-<x> ?

# service snmpd status ?

# make all ? 4,# cp snmp-<x>.tar.gz /usr/src ?

# cd /usr/src ?

# mv snmpd.conf snmpd.conf.org ?

# cd /usr/src/snmp-<x> ?

# ./configure ?

# make all ?

2

Page 173: q7 Linux Full

80

Jim Lewis, the network administrator at Simple Solution, implements the Nagios system to monitor the enterprise network. The enterprise provides five mail servers to its employees for retrieving and sending e-mail messages. Jim needs to monitor and manage all the mail servers for better performance. For this, he uses object configuration files to define the Post Office Protocol (POP) service on all the mail servers using the following code:

define service{

use generic-pop

service_description_Check-pop

contact_groups mailadmins1

host_name mailhosts

}

However, Jim observes that the POP service is not defined in the object configuration files. What should Jim do in order to troubleshoot the problem? 1,Jim should use the following code:

define service{

use generic-pop

service_description_Check-pop

contact_groups usergroup1

host_name mailhosts

event_handler eh_pop

}

2,Jim should use the following code:

define service{

use generic-pop

service_description_Check-pop

check_command check_pop

contact_groups usergroup1

event_handler eh_pop

host_name real user

}

3

Page 174: q7 Linux Full

3,

Jim should use the following code:

define service{

use general

name generic-POP

service_description Check pop

check_command check_pop

event_handler eh_pop

contact_groups mailadmin

}4,

Jim should use the following code:

define service {

use general

name generic-pop

service_description_Check-pop

check_command check_pop

event_handler eh_pop

}

81

Tom Wilkins is the network administrator at Safest Software. He installs Wine to facilitate the execution of Windows-based applications on the Linux platform. Tom wants to enable the employees of the organization to use a parallel port to access Wine whenever they want to execute Windows-based applications on the Linux platform. Therefore, he needs to configure the Wine settings in the configuration file of Wine. Which section of Wine should he configure for the purpose? 1,[ppdev]2,[ports] 3,[x11drv] 4,[afmdirs]

1

82Which command is used to copy the passwd file to ssod directory contained in the /etc/pam.d directory? 1,# cp /etc/pam.d/ssod /etc/pam.d/passwd 2,# cp /etc/pam.d/passwd /etc/pam.d/ssod 3,# mount etc/pam.d/ssod /etc/pam.d/passwd 4,# mount /etc/pam.d/passwd etc/pam.d/ssod

2

Page 175: q7 Linux Full