QFX Q5 Net - Cau Hoi Va Dap an Linux

21
Q5 Linux MMS Review No. Question Ans wer 1 You are the system administrator at Red Sky IT Systems. You are assigned the responsibility to establish a secure communication channel among users while accessing the Internet. You also want to provide access to the users to log on to a remote computer and copy the required files between remotely located hosts on a network. However, it takes a long time for a user to copy the files. To avoid this, users are allowed to use compression techniques while copying the files. Which command should you use to accomplish the given task? 1,$ scp c <remotehost> 2,$ scp C <remotehost> 3,$ scp P <remotehost> 4,$ scp B <remotehost> 2 2 You are the system administrator at Global Systems Inc. You are assigned the responsibility to scan large networks and determine which hosts are running and what UDP type services they are offering. You want to perform port scanning on the computer of user, John, whose computer’s IP address is 192.168.0.154. Which command should you use to accomplish the given task? 1,# nmap -sS -O 192.168.0.154 2,# n map sV -O 192.168.0.154 3,# nmap -sP -O 192.168.0.154 4,# nmap sU -O 192.168.0.154 4 3 John Irving is working as a C programmer at Deez Telecommunications. He has been assigned the task of modifying an existing payroll application written in C Programming Language. While going through the existing code, John found that the existing source code contain long lines of comment that reduces the readability of the codes. To improve the readability, John decides to split the comment lines. Which of the following command should John use? Assume that the name of the application is, payroll.c. 1,fmt –w “#” payroll.c 2,fmt -p "#" payroll.c 3,fold “#” payroll.c 4,fmt –t “#” payroll.c 2

Transcript of QFX Q5 Net - Cau Hoi Va Dap an Linux

Q5 Linux MMS Review

No. Question Ans wer

1

You are the system administrator at Red Sky IT Systems. You are assigned the

responsibility to establish a secure communication channel among users while

accessing the Internet. You also want to provide access to the users to log on to

a remote computer and copy the required files between remotely located hosts

on a network. However, it takes a long time for a user to copy the files. To

avoid this, users are allowed to use compression techniques while copying the

files. Which command should you use to accomplish the given task?

1,$ scp –c <remotehost>

2,$ scp –C <remotehost>

3,$ scp –P <remotehost>

4,$ scp –B <remotehost> 2

2

You are the system administrator at Global Systems Inc. You are assigned the

responsibility to scan large networks and determine which hosts are running and

what UDP type services they are offering. You want to perform port scanning

on the computer of user, John, whose computer’s IP address is 192.168.0.154.

Which command should you use to accomplish the given task?

1,# nmap -sS -O 192.168.0.154

2,# nmap –sV -O 192.168.0.154

3,# nmap -sP -O 192.168.0.154

4,# nmap –sU -O 192.168.0.154 4

3

John Irving is working as a C programmer at Deez Telecommunicat ions. He has

been assigned the task of modifying an existing payroll application written in C

Programming Language. While going through the existing code, John found

that the existing source code contain long lines of comment that reduces the

readability of the codes. To improve the readability, John decides to split the

comment lines. Which of the fo llowing command should John use? Assume

that the name of the application is, payroll.c.

1,fmt –w “#” payroll.c

2,fmt -p "#" payroll.c

3,fo ld “#” payroll.c

4,fmt –t “#” payroll.c 2

4

Chris Donald has recently resigned from Blue Moon Computers. As a company

policy, all the user informat ion for the user, chris, should be deleted from the

system. However, before deleting the user informat ion, the backup of the home

directory of the user to be deleted need to be taken. For this, Donna Bard, who

is the system administrator in Blue Moon, need to determine the home directory

of the user, chris. Which command should Donna use to perform the task?

1,gawk -F " :" '$2 == "chris" {print $0}' /etc/passwd

2,gawk -F " :" '$0 == "chris" {print $0}' /etc/passwd

3,gawk -F ":" '$1 == "chris" {print $6}' /etc/passwd

4,gawk -F " :" '$1 == "chris" {print $2}' /etc/passwd 3

5

John Anderson, who is a programmer working in Softcell Solutions, has created

a shell script to perform simple mathematical calcu lations. Susan Hathway is an

employee in Softcell and decides to use the shell script to perform some

calculations involving addition, multiplication, and div ision. However, Susan

accidentally performs the div ision with 0. This results in abnormal termination

of the script. Identify which of the fo llowing signal is generated by the shell

script?

1,SIGKILL

2,SIGTERM

3,SIGINT

4,SIGFPE 4

6

Which of the following shortcut keys enables you to run the spell checker in

OpenOffice.org Calc utility?

1,F2

2,F5

3,F7

4,F9 3

7

Which component of OpenOffice.org Impress window is used to display

options such as insert slide and modify slide layout?

1,Main Toolbar

2,Menu Bar

3,Function Bar

4,Presentation Toolbar 4

8

Tom is a System Administrator with Deez Telecommunications. He wants to

know the total number of user logins created in the Linux network. Which of

the following command displays this information?

1,who | wc –w

2,grep –c "users" /etc/users

3,w | wc –c

4,wc -l /etc/passwd 4

9

Stephen Sterling is working as a Pro ject Manager in Smart Software.. He is

handling a team of developers who are working on Linux platform. The whole

team belongs to same group. Stephen has created a new file, Guidelines, which

has default file permission 664. Stephen wants to change the file permission so

that other members of his group cannot write to the Guidelines file and no other

users could read this file . Which command will change the permission of the

Guidelines file, as required by Stephen?

1,chmod u+x,g-w,o+r Guidelines

2,chmod 600 Guidelines

3,chmod 622 Guidelines

4,chmod g-w,o-r Guidelines 4

10

Stella is working in Personnel Department of SuperGraphics. She has less disk

space on her computer. Most of her files are stored in her home directory.

Therefore, she decides to display all the files and directories contained in her

home directory with their sizes. Assuming that Stella is currently in her home

directory, which of the fo llowing is the correct command?

1,

ls -l | tr -s " " | cut -d" " –f2,5

2,

ls -l | cut -d" " -f9,5 | tr –s “ “

3,

ls -l | tr -s " " | cut -d" " -f9,5

4,

ls -l | cut -d" " -f9,5 3

11

Philip has a file , Emp_records, containing at least 1500 records of the

employees who work in h is company. The fields in Emp_records file are

separated by a space. The format of the file is as shown below:

ID FirstName LastName Contact

Philip wants to sort all records on the basis of LastName, within which on the

basis of FirstName, but in descending order and redirect the output to

SortEmplNames file . Which command will he use to perform the above task?

1,sort +2 –3 +1 –2 –r –o SortEmplNames Emp_records

2,sort +1 –2 +2 –3 –r –o SortEmplNames Emp_records

3,sort -2 +1 –3 +2 -r –o SortEmplNames Emp_records

4,sort +1 –2 –3 –r –o SortedEmployeeNames Emp_records 1

12

Alice has created four files, Expense1.txt, Expense2.txt, Expense3.txt, and

Expense4.txt that contain the informat ion about the expenses of each quarter,

respectively. She needs to redirect the output of each file to the file,

YearExpense. Any error, should be redirected to the /root/error/err file. Which

of the following commands will accomplish the task?

1,cat E*[1-4].txt 0>> YearExpense > /root/error/err

2,cat E*[1-4].txt 1>> YearExpense 2> /root/error/err

3,cat E*[1-4].txt 1>> YearExpense 0> /root/error/err

4,cat E*.txt 0>> YearExpense 2> / root/error/err 2

13

Jim is creating a file in the vi editor. He is typing the text in the insert mode.

While typing the text, he notices that the line number two, which he inserted, is

wrong. He will have to delete the line number two. He tries dd command at line

number two, but it does not solve his purpose. What can be the reason?

1,He needs to use the dw command to delete the line.

2,He needs to press <Ctrl> dd to delete the line.

3,He needs to press <Esc> dd to delete the line.

4,He needs to press <Ctrl> 2dd to delete the line. 3

14

The CustomerCalls file present under the Customer d irectory needs to be edited.

The Customer d irectory is present in your home d irectory. Which of the

following commands should you use to edit the file?

1,cat ~/CustomerCalls

2,vi ~/CustomerCalls

3,vi ~/Customer/CustomerCalls

4,cat ~/Customer/CustomerCalls 3

15

Stella wants to change the password for her login id on the Linux server. She

gives the command passwd. As she enters her old password, the system displays

passwd: Authentication token manipulation erro r. What can be the reason?

1,Stella should have used password command.

2,Stella does not have permission to change her password.

3,The old password entered by Stella is incorrect.

4,The Linux server is not running. 3

16

Consider the following statements:

Statement A: Character device files read and write data one character at a time.

Statement B: A modem is an example of a character device file.

Which of the following is correct with respect to the above two statements?

1,Statement A is True and Statement B is False.

2,Statement A is False and Statement B is True.

3,Both, Statement A and Statement B, are True.

4,Both, Statement A and Statement B, are False. 3

17

Identify the output of the following shell script:

dt=24

echo “Today is $dtth”

echo “Today is ${dt}th”

1,Today is 24th

Today is 24th

2,Today is dtth

Today is 24th

3,Today is

Today is 24th

4,Today is 24th

Today is 3

18

You need to change the prompt on the screen so that it displays, Welcome, with

your current working directory. Which of the following commands should you

use?

1,PS1="Welcome \u >"

2,PS1 "Welcome \u >"

3,PS1="Welcome \w >"

4,PS1 "Welcome \w >" 3

19

Chris has written the following shell script that accepts a number from the user

and displays the square of all odd numbers from 1 up to that number. Line

numbers are added in front of each line of the script to improve readability.

1. a=1

2. echo "Enter a number"

3. read num

4. until test $a -eq $num

5. do

6. echo "Square of $a: `expr $a \* $a `"

7. a=`expr $a + 2`

8. done

However, the shell script does not give the desired result. Identify the error in

the script.

1,Incorrect mult iplication symbol (\*) is used in the expression specified to

calculate the square of a number in line 6.

2,The variable, a, is incremented by wrong value in the loop.

3,There is no break statement in the loop to terminate it.

4,There is wrong usage of the test condition in the loop condition. 4

20

Chris wants to print numbers from 1 to 10 on the screen. Whenever he executes

the following shell script, the numbers from 1 to 9 are d isplayed. Identify the

error(s) in the shell script.

a=1

until test $a -ge 10

do

echo "$a"

a=`expr $a + 1`

done

1,The variable, a, should be init ialized within the until loop.

2,The –gt arithmetic operator should be used instead of –ge.

3,The while loop should be used instead of the until loop.

4,The –le arithmetic operator should be used instead of –ge. 2

21

Which test option checks that the specified file exists on your computer and the

file is not empty?

1,test –e filename

2,test –f filename

3,test –s filename

4,test –l filename 3

22

Which string test option checks that the length of the string is zero?

1,string1 != string2

2,-z string

3,-n string

4,string1 = string2 2

23

Which positional parameter will contain string of arguments passed at the

command line?

1,$*

2,$#

3,$1

4,$2 1

24

Which command is used to resume execution at the beginning of the while

loop?

1,exit

2,continue

3,break

4,until 2

25

What will be the output of the following command?

a=10

b=`expr $a / 2`

echo $a

1,The command will generate an error when executed

2,5

3,10

4,2 3

26

Ronald, an employee at Blue Moon Computers, gives the following command:

gzip –S ".txt" *

Then, he gives the command:

gunzip *

What will be the output of both the commands?

1,The first command will compress all the files present in current directory and

give .txt extension to all compressed files. The second command will

uncompress all compressed files.

2,The first command will compress all the files present in the root directory and

give .txt extension to all compressed files. The second command will

uncompress all compressed files.

3,The first command will compress all the files present in current directory

and give .txt extension to all compressed files. The second command will

give an error.

4,The first command will compress all the files that have .txt at the end of their

file names present in current directory. The second command will uncompress

all compressed files. 3

27

Phillip created a shell script that displays the calendar of a specified month or

range of month. A part of the shell script is shown below:

read month

echo month=August

echo 'The current month is $month.'

What output should be displayed when he executes this shell script with month

specified as July?

1,month=August

The current month is July.

2,month=August

The current month is $month.

3,month=July

The current month is $month.

4,month=August

The current month is July. 2

28

Consider the following statements:

Statement A: The –d option in the gzip command allows you to decompress a

file.

Statement B: The gunzip command allows you to decompress a file.

Which of the follo wing is correct with respect to above two statements?

1,Statement A is True and Statement B is False.

2,Statement A is False and Statement B is True.

3,Both, Statement A and Statement B, are True.

4,Both, Statement A and Statement B, are False. 3

29

What will be the output of following command:

find /home/steve -mt ime +2

1,The command will display all the files in the directory, /home/steve, which

have been modified within last two days.

2,The command will display all the files in the directory, /home/steve, which

have been modified exactly two days ago.

3,The command will display all the files in the directory, /home/steve,

which have been modified more last two days ago.

4,The command will give an error. 3

30

Which menu contains options to perform system-related tasks, such as format a

floppy, display a terminal, and configure the Internet settings?

1,Accessories

2,System Tools

3,Graphics

4,System Settings 2

31

Which menu option in GNOME Main Menu allows you to run utilities and

applications by specifying commands?

1,Help

2,Log Out

3,Run Application

4,Search for Files 3

32

Which GNOME Control Center module allows you to specify the mode to

connect to the Internet?

1,Windows

2,Network Proxy

3,Password

4,Accessibility 2

33

Which is the default window manager of GNOME?

1,Enlightenment

2,KWin

3,KWM

4,Metacity 4

34

Which utility is availab le in the GNOME panel by default?

1,Calculator

2,KAlarm

3,KPaint

4,Print Manager 4

35

Deez Telecommunications Inc. call center provides support for various IT

products. Chris is a system admin istrator with the company and he needs to

create three virtual desktops. Chris wants to specify different background for

each desktop to able to distinguish between the desktops. However, when Chris

configures the desktops, the same setting is applied to all desktops.

What should Chris do to display different desktop configuration for each

desktop?

1,Chris needs to right-click on each of the virtual desktop and from the shortcut

menu, select Configure Virtual Desktops.

2,Chris needs to right-click on an empty area of the KDE and select

Configure Desktop from the shortcut menu displayed. Select Background

module and s pecify background for each desktop.

3,Chris needs to change the configuration by right clicking one of the virtual

desktop buttons and selecting Preferences option to open the Desktop Switcher

Preferences dialog box.

4,Chris should click on each desktop, specify the background image for the

desktop, and log out of KDE. This step should be repeated for each of the

desktop. 2

36

Chris has joined Blue Moon Computers as a Team leader.

He is giving a presentation on the latest software that Blue Moon organizat ion

has developed. Chris is giving the presentation by connecting a newly installed

Linux computer with a pro jector. The Linux computer is using the KDE desktop

environment. Chris is facing problems while g iving the presentation. If the

system is id le fo r more than five minutes, the display goes blank and starts

displaying graphical animat ions.

Identify the reason for the problem and how he should solve the problem.

1,The pro jector does not support the KDE desktop environment.

2,The lead of pro jector is not connected to the system’s display adapter. This

lead should be tightened to rectify the problem.

3,Chris is a normal user and KDE system locks the screen after five minutes, by

default. Therefore, he needs to login as a root user and disable the automatic

locking of screen in the Screensaver module.

4,By default, the KDE system locks the screen if the system remains idle for

more than five minutes. Therefore, he needs to disable the automatic

locking of screen in the Screensaver module by deselecting the check box,

Start screen saver automatically. 4

37

You need to change the file access permissions for a CustDetails file . The file

owner should have read, write, and execute permissions. The group owner

should have read and execute permissions and others should have read and

execute permissions on the file . Which of the fo llowing commands should you

use to change the file access permission of the CustDetails file?

1,chmod 664 CustDetails

2,chmod 755 CustDetails

3,chmod 711 CustDetails

4,chmod 611 CustDetails 2

38

Help on the grep command needs to be sought in Linux. Which of the fo llowing

commands should you use to get information about the grep command?

1,mesg grep

2,talk grep

3,man grep

4,who grep 3

39

Which shell is the original command processor developed at AT&T?

1,C Shell

2,Korne shell

3,Restricted Shell

4,Bourne Shell 4

40

Which type of variables is used to customize the shell p rompt?

1,User-defined variables

2,Local variab les

3,Global variab les

4,Environment variables 4

41

Which variable contains the shell level that you are currently working in?

1,SHLVL variable

2,SHELL variable

3,PS2 variable

4,PATH variable 1

42

What will be the output of the following shell script?

for dept in sales finance purchase

do

echo "${dept}"

done

1,The script will generate an error.

2,sales, finance, purchase

3,sales

4,sales

finance

purchase 4

43

Which command is used to print files?

1,lprm

2,lpq

3,lpc

4,lpr 4

44

Which command is used to update the slocate.db database?

1,update

2,updatedb

3,update.exe

4,update.rpm 2

45

Which command will you use to search all files that contain sale in the file

name in your home directory?

1,find . -name "sale" –print

2,find ~ -name "sale" –print

3,find /root/home -name "sale" –print

4,find /home -name "sale" –print 2

46

Charlie, the system administrator at Blue Valley manages the Linux network.

He needs to search all b lock special and characters special files in the root

directory. What command should he specify?

1,find / -type c b

2,find / -type b, c

3,find . –type b|c

4,find / -type b

find / -type c 4

47

Blue Valley has the Linux network. All the employees have been given

permissions to work with different file systems. Ronald has created a file, File1,

on one file system. He wants to create link o f this file for another employee,

Susan, who is working with a d ifferent file system. What command should

Ronald use?

1,ln File1 copyFile1

2,link File1 copyFile1

3,ln –s File1 copyFile1

4,link –s File1 copyFile1 3

48

Steve Irving is a new employee in the Quality Software Developers

organization. The organizat ion uses a centralized Linux server, which also

serves as a proxy server to connect to the Internet.

Steve has been provided with a newly installed co mputer with Linux operating

system and GNOME desktop environment. He needs to use Internet to study

about the project, which is assigned to him. However, when Steve Irving tries to

open Websites, an error page is displayed and he is not able to connect to the

Internet. System admin istrator has already checked and indicated that the LAN

card and cable of Steve’s machine are properly working.

What is the cause of the problem and how can this be solved?

1,The Network proxy settings are wrong in Steve’s newly installed Linux

machine and Steve needs to select the Direct internet connection radio button to

connect to Internet.

2,The Network proxy settings are wrong in Steve’s newly installed Linux

machine and Steve needs to specify the address of the proxy s erver’s in the

Network Proxy submodule to connect to Internet.

3,The Network proxy settings are wrong in Steve’s newly installed Linux

machine and Steve needs to select the Autmatic proxy configuration radio

button to enable the Linux machine to detect the connection settings

automatically and connect to Internet.

4,Steve cannot connect to the Internet because he is a normal user and only root

user can access the Internet. 2

49

Chris has joined the Blue Moon organizat ion as an animat ion specialist. He has

been assigned a new Linux system with latest hardware and software tools.

Chris is left-handed and he uses mouse to drag and drop small images from one

location on the screen to another in graphical editors. Despite being experienced

in various graphical ed itors, Chris is having problems while dragging images

from one location to another. The action associated with right-click button of

mouse is being performed by left-click button and vice-versa. The system

administrator has already checked the mouse and its properly working on other

machines.

1,Mouse is not connected properly and Chris needs to reconnect the mouse and

restart the machine.

2,Mouse is not configured properly and Chris needs to run the Mouse

submodule in the Control Center and select the radio button, Right handed.

3,Mouse is not configured properly and Chris needs to run the Mouse

submodule in the Control Center and select the Reverse scroll polarity radio

button.

4,Mouse is not configured properly and Chris needs to run the Mouse

submodule in the Control Center and select the radio button, Left handed. 4

50

Which of the following command enables you to either display the current

default values or update the default values related to user management?

1,useradd –L

2,useradd –U

3,useradd –G

4,useradd –D 4

51

Which command is used to check the integrity of the /etc/group and the

/etc/gshadow files?

1,useradd

2,umask

3,newgrp

4,grpck 4

52

You are the system administrator at Certified Carriers Institute. You made the

entries of students who are pursuing the Linux course on Linux computer. A

few days later, you decided to verify the entries of students whose user id is

going to expire in the next 2 days. Which file would you need to access the

required in formation?

1,/etc/default/useradd

2,/etc/passwd

3,/etc/shadow

4,/etc/skel 3

53

Which of the following shortcut keys will you to use to close the GNOME

terminal window?

1,<Shift><Ctrl>C

2,<Shift><Ctrl>D

3,<Shift><Ctrl>X

4,<Shift><Ctrl>Q 4

54

Consider the following statements:

Statement A: You can set the mode of the file as read-only after you open it in a

KWrite ed itor.

Statement B: You can highlight a line for later reference using the bookmark

feature of KWrite editor.

Which of the follo wing is correct with respect to the above statements?

1,Statement A is true and statement B is false

2,Statement A is false and statement B is true

3,Both statements A and B are true

4,Both statements A and B are false 3

55

Consider the following statements:

Statement A: POP3 enables you to retrieve e-mail messages from a mail server.

Statement B: POP3 enables mult i-user access because it is designed to support

offline message access.

Which of the following is correct with respect to the above statements?

1,Statement A is true and statement B is false

2,Statement A is false and statement B is true

3,Both statements A and B are true

4,Both statements A and B are false 1

56

Which of the following is the network component of LAN?

1,Router

2,Brouter

3,Bridge

4,Gateway 3

57

Which of the following is the process of sending data packets to a group of

hosts that are identified by a single IP address?

1,Mult iplexing

2,Multicasting

3,Mult itasking

4,Mult iprocessing 2

58

Which of the following RFC Standards is achieved after the detailed assessment

of at least two successful independent and interoperable implementation of a

specification?

1,Proposed Standard

2,Draft Standard

3,Historic Standard

4,Internet standard 2

59

Which of the following organizat ions is a large working committee of

operators, vendors, and researchers concerned with the evolution of the Internet

architecture and the smooth operation of the Internet?

1,Internet Engineering Task Force (IETF)

2,Internet Research Task Force (IRTF)

3,Internet Architecture Board (IAB)

4,Internet Corporation for assigned Names and Numbers (ICANN) 1

60

Which of the following protocols functions at the Internet Layer of the TCP/IP

Architecture?

1,TCP

2,FTP

3,ICMP

4,SMTP 3

61

Which of the following technology is known as Thinnet Ethernet?

1,10Base5 Ethernet

2,10BaseT Ethernet

3,100BaseT Ethernet

4,10Base2 Ethernet 4

62

What is the min imum length of an Ethernet data field?

1,1500 Bytes

2,512 Bytes

3,24 Bytes

4,46 Bytes 4

63

Which of the following protocols lie above the Internet Protocol in the TCP/IP

architecture?

1,ICMP and IGMP

2,ICMP and ARP

3,IGMP and RARP

4,Network Access Layer 1

64

What is the min imum length of IP header?

1,40 Bytes

2,60 Bytes

3,46 Bytes

4,20 Bytes 4

65

Which of the following field in the IP header indicates reliability, precedence

delay and throughput parameters?

1,Service

2,Fragment Offset

3,Options

4,Flags 1

66

For which of the fo llowing field the length varies in the IP header?

1,Flag

2,Options

3,Fragment Offset

4,Protocol 2

67

An IPv6 address consists of ___________ bytes.

1,12 Bytes

2,16 Bytes

3,24 Bytes

4,32 Bytes 2

68

To enable reverse lookups over the Internet, a special domain called the

__________ domain has been built into the DNS structure over the Internet.

1,in.addr.arpa

2,in-addr.arpa

3,arpa-in.addr

4,arpa.in.addr 2

69

You are developing a shockwave application. Which of the types of port

shockwave use?

1,Dynamic Ports

2,Private Ports

3,Registered Ports

4,Ephemeral ports 3

70

Node X request’s Node Y to set up a connection. Node X sends a SYN segment

to node Y. Node Y sends an acknowledgement to Node X to start the data

communicat ion. Node Y sends the second segment; a combination of SYN and

ACK segment to Node X. Node X sends a confirmat ion to Node Y. Which of

the following flag will be set active by node X?

1,SYN

2,PSH

3,RST

4,ACK 4

71

Statement A: Internet protocol version 6 (IPv6) is the next generation protocol

designed by the Internet Engineering Task Force (IETF) to replace the current

version Internet Protocol, IPv4.

Statement B: Internet protocol version 5 (IPv5) was a proposal based on OSI

model but this version never went beyond the proposal stage due to the

projected cost.

Which of the following options is correct about the above statement?

1,Statement A is true and Statement B is false.

2,Statement A is false and Statement B is true.

3,Both, Statement A and Statement B are true.

4,Both, Statement A and Statement B are false. 3

72

Which of the following field in the ARP packet format helps to define the type

of network on which ARP is running?

1,PTYPE field

2,HLEN field

3,HTYPE field

4,PLEN field 3

73

Statement A: FCS contains an 8-byte CRC value used for error checking.

Statement B: The sending node creates the CRC value in Network Access layer.

Which of the following options is correct about the above statements?

1,Statement A is true, and statement B is false

2,Statement A is false, and statement B is true

3,Both, Statement A and Statement B are false.

4,Both, Statement A and Statement B are t rue. 2

74

Statement A: The SA field of Ethernet data frame identifies the node or nodes,

which receives the frame.

Statement B: The PRE field of the Ethernet data frame indicates the start of the

frame.

Which of the following options is correct about the above statements?

1,Statement A is true, and statement B is false

2,Statement A is false, and statement B is true

3,Both, Statement A and Statement B are false.

4,Both, Statement A and Statement B are t rue. 3

75

Statement A: CSMA/CA is the access method used in Ethernet and wireless

Ethernet networks.

Statement B: CSMA/CD is a slower access method than CSMA/CA.

Which of the following options is correct about the above statements?

1,Statement A is true, and statement B is false

2,Statement A is false, and statement B is true

3,Both, Statement A and Statement B are false.

4,Both, Statement A and Statement B are t rue. 3

76

You are analysing TCP data packets through a network analyzer. Which of the

following informat ion can you read from a IP header?

A. The total lifet ime of a datagram

B. The hardware address of the source node

C. The IP address of the destination node

D. The final destination protocol to which the data packet or datagram should

be delivered

1,A, B and D

2,A, C and D

3,B, C, and D

4,A, B, C and D 4

77

You have four subnets with one DHCP server to support 120 Windows 2000

Professional nodes and 10 Windows 2000 Servers. DHCP server needs to

assign the same IP addresses to your servers every time they are started. Your

organization wants to implement the following IP scheme:

Gateways: 1 to 19

Clients: 20 to 99 and 200 to 254

Servers: 100 to 199

How many scopes will you create?

1,Create four DHCP scopes for each range of IP address.

2,Create three DHCP scopes for each range of IP address.

3,Create one DHCP scope that is configured to exclude a range of

addresses for the gateways. Create a client reservation for each server.

4,Create one DHCP scope that is configured to exclude a range of addresses for

the servers. Create a client reservation for each gateway . 3

78

Jim could not send a data packet from Node A to Node X. He wants to find the

reason. He reads the configuration details of the nodes and the router. The

configuration of Node A is the following:

IP address: 192.168.18.8

Subnet Mask: 255:255:255.0

Default Gateway: 192.168.18.4

The configuration of Node X is the following:

IP address: 192.168.10.4

Subnet Mask: 255:255:255.0

Default Gateway: 192.168.10.1

The IP address of the router is 192.168.18.1 and 192.168.10.1.

Can you find the erro r?

1,The default gateway for node X should be 192.168.18.1

2,The default gateway for node A should be 192.168.10.1

3,The default gateway for node A should be 192.168.18.1

4,The default gateway for node X should be 192.168.18.8 3

79

Assertion: BOOTP was evolved because of limitations of RARP.

Reason: RARP does not provide IP address.

1,Both, the assertion and reason are true, and the reason IS a correct exp lanation

of the assertion.

2,Both, the assertion and reason are true, and the reason IS NOT a correct

explanation of the assertion.

3,The assertion is true and the reason is false.

4,The assertion is false and hence the reason does not apply. 3

80

John is analysing IP data packets through a network analyzer. He wants to view

the following information :

The port number of the application program in the node that is sending the

segment

The number assigned to the first byte of the data contained in the segment

The error control

Which fields of IP data packet will he find the above information?

1,Checksum, Urgent Pointer, Options, Source Port Address

2,Checksum, Sequence Number, Source Port Address

3,Checkum, Destination Address, Acknowledgement Number

4,Destination Address, Urgent Pointer, Acknowledgement Number 2

81

Philip has a file , Cust_records, containing details of all the customers of his

company. The fields in Cust_records file are separated by delimiter, -. The

format of the file is given below:

Cust_ID-Cust_Name-State-Contact

He wants a list of the customer names who live in New York and their contacts.

He also wants to know the total number of customers residing in New York.

Which command will he use to display both results?

1,grep –c "New York" Cust_records | tr –s " " | cut –d " " –f2,3,4

2,grep "New York" Cust_records | cut –d "-" –f2,4; grep -c "New York"

Cust_records

3,grep "New York" Cust_records | wc –l | cut –f2,3,8

4,grep "New York" Cust_records | tr –s " " | wc –f2,3,8 | wc –l 2