Documente Academic
Documente Profesional
Documente Cultură
1 From which Windows configuration tool can a user perform hardware and network
configurations?
Window Manager
My Computer
Control Panel
Task Manager
4 Though obsolete in current desktop environments, what are three valid reasons for the
continued use of MS-DOS? (Choose three.)
MS-DOS supports legacy applications.
MS-DOS is an intuitive, high-overhead operating system.
MS-DOS rarely crashes because it is a multitasking operating system.
MS-DOS is relatively easy to use.
MS-DOS can run on inexpensive hardware.
7 What is meant by the statement, "We have to support our legacy system"?
Support must be provided for the newest Linux system.
Support must be provided for the system called legacy.
Support must be provided for the newest Microsoft system.
Support must be provided for outdated software.
8 Which three of the following file systems does Windows 2000 use? (Choose three.)
EXT2
FAT16
FAT32
NTFS
HPFS
9 Windows and Linux both use a file system that resembles an upside-down tree. What is
the name of this type of file structure?
binary
hierarchical
empirical
subsystem
10 Which part of the OS, loaded into memory at boot time, controls memory allocation?
user interface
application software
kernel
file system
14 Which command is entered in the Run dialog box of a Windows XP system to open a
command prompt window?
run
start
cmd
dosprompt
15 Which two statements describe the security features of Linux? (Choose two.)
Compared to Windows, Linux is virtually virus-free.
Users must have a valid username and password to log into a Linux system, by
default.
Linux security is one dimensional.
Most security features for Linux must be purchased from a third party.
16 Which two of the following shells are commonly available for Linux? (Choose two.)
Bore shell
Korn shell
Cash shell
C shell
PC shell
17 With the FAT file system, what is the basic unit of logical storage on a disk?
megabyte
cluster
directory
logical drive
18 Which two statements describe security in the Windows operating system? (Choose
two.)
Windows is less susceptible to viruses than Linux.
By default, users must have a username and password to log into Windows.
Windows security is generally one dimensional.
Windows security is improved through the use of third-party applications.
Windows can securely support multiple users with the Terminal service installed by
default on personal computers.
19 What are three reasons why a company may choose Linux over Windows as an
operating system? (Choose three.)
The entire Linux installation can be completed using either a GUI or CLI.
The entire Windows installation can be completed using either a GUI or CLI.
Windows can be run entirely from a CD.
Compared to Windows, Linux is virtually virus-free.
Linux is a true multi-user system.
Linux has superior one-dimensional security.
20 Network operating systems were designed to provide which of the following tasks?
(Select three.)
file security
multitasking
user privileges
resource access for a single user
resource sharing among multiple users
Module 2: Study questions
8 What is the physical topology when all the computers in a network connect to a central
point?
point-to-point
star
ring
bus
12 Which technology provides the best support for upload-intensive Internet tasks?
ISDN
cable modem service
analog modem service
ADSL
13 What do transport layer protocols use to identify the application needed to process
data?
ports
MAC addresses
IP addresses
DNS
flags
20 Which network layer protocol enables routers to discover the best path between
networks using hop count?
IP
RIP
ARP
OSPF
2 Which term refers to the path that signals take from one point on a network to another?
address resolution
logical topology
dynamic host configuration
physical topology
3 Which data link layer device can segment a network into different collision domains?
a router
a switch
a gateway
a transceiver
7 Which two devices are at the core of wireless communications? (Choose two.)
satellites
light emitting diodes
transmitters
receivers
modulators
10 What are three important considerations when selecting a NIC? (Choose three.)
network type
operating system
system bus
network media
number of network users
11 Which list contains important considerations when selecting a NIC to use on a network?
type of network, type of RAM, type of system bus
type of media, type of system bus, type of RAM
type of network, type of media, type of system bus
type of system bus, processor speed, type of media
12 What are the two most common wireless networking technologies? (Choose two.)
radio frequency
microwave
laser
infrared
satellite wavelength
15 What are three options for assigning logical addresses to hosts? (Choose three.)
static
dynamic
negotiation
automatic
holistic
16 Which of the following devices is used to segment a network into different broadcast
domains?
switch
active hub
bridge
router
19 What are two advantages of using dynamic address assignment instead of manual address
assignment? (Choose two.)
On a large network, manually assigning addresses can be very time consuming.
Manual address assignment requires network administrators to understand physical
addressing.
Dynamic address assignment can help segment a large network.
Manual address assignment requires network administrators to understand logical
addressing.
20 Which two of the following statements accurately describe a default gateway? (Choose two.)
A default gateway is used when a host transfers data to another host on the same
network segment.
A default gateway is the IP address assigned to the near-side router interface.
A default gateway is the IP address assigned to the near-side switch interface.
A default gateway is used when a host transfers data to a host on another network
segment.
Module 4: Study questions
3 A technician needs to log into a remote Linux PC to perform some maintenance. Which
application layer protocol could be used?
Telnet
FTP
HTTP
SNMP
9 Which utility is used in Windows and Linux to view network connections and protocol
statistics?
arp
netstat
nbstat
ipconfig
14 Which Linux command is used to temporarily change the default gateway of a host?
arp
ifconfig
netstat
route
ping
18 What is the range of numbers that can be used in the first octet of a Class A network?
1-126
128-191
192-223
1-255
19 Which IP address range, as indicated by the first octet, is reserved for testing, and
includes the loopback address?
127.x.x.x
168.x.x.x
255.x.x.x
192.x.x.x
4Which two protocols are used to control the transfer of web resources from a web server
to a client browser? (Choose two.)
ASP
FTP
HTML
HTTP
HTTPS
IP
7Which scripting language can be used on a Linux server to notify users that a print job
is complete?
batch script
JavaScript
JScript
shell script
VBScript
8What is the default order in which print jobs are processed when using a FIFO queue?
The last job placed in the queue is the first to be printed.
The oldest job in the queue is printed first.
Smaller jobs are printed before larger jobs.
Larger jobs are printed before smaller jobs.
The network administrator determines which jobs are printed first.
3What are two benefits of having more than one processor in a system?
support for remote locations and automatic job queuing
faster speeds and increased work capacity
reduced need for IP addresses and decreased boot time
reduced need for IP addresses and increased manageability
4Why might the administrator of a small company choose Windows 2000 Server instead of
Windows 2000 Professional?
The operating system is to run on a dual-processor system.
The system is to act as a DNS server.
The company needs an intranet based on a small web server.
The server will be accessed by up to ten simultaneous users.
6Which of the following is a better choice than Telnet for Remote Login Servers on a Linux
system?
SSL
SSH
Kerberos
Remote Access
7In a Windows NT environment, what is the meaning of the term domain?
a dedicated server containing the database of all IP and MAC addresses on the network
a group of computers located in a specific physical or geographic region
the OU that contains all user accounts
groups of computers, users, and resources that form an administrative boundary
8Which program, running on a Linux server, allows Windows-based clients to see the Linux
file system without installing client software?
NFS
Apache
Samba
KDE
11How many Primary Domain Controllers (PDCs) are allowed in a Windows NT environment?
1
2
4
9
12Which of the following criteria must software meet in order to display the Open Source
Initiative trademark?
It must be easily altered and adapted to all major operating systems and source code
must be limited.
It must be compatible with third party add-ons and use standard source code.
It must be provided in multiple languages and cost must be minimal.
It must be freely distributed without restriction and the source code must be available.
13Which client/server file system is used by most varieties of Linux file servers?
FAT32
NFS
NT
SMB
15What are three important considerations when selecting a Linux distribution? (Choose
three.)
whether the computer will be used as a client or a server
whether or not the computer will be connected to a network
whether or not a GUI interface is required
whether or not a command line user interface is required
the experience level of the user
16Windows 2000 Professional supports plug-and-play technology. What is one of the major
advantages of this technology?
An administrator can add devices from any manufacturer to the system and they will
work.
Devices no longer need software drivers to interact with the system.
Components will interact with the system if plugged in prior to system boot.
An administrator or user can easily add components to the system without manual
configuration.
17Which one of the following office tools is available for both Linux and Windows?
ClarisWorks
ApplixWare
Lyx
StarOffice
18Which statement accurately describes the Slackware Linux distribution?
It is designed for Linux novices.
It has a range of user interfaces and uses RPM.
It is designed for advanced users and uses text-based configuration tools.
It is intended solely for non-profit organizations and uses the Debian package
manager.
19A user account on a server enables the server to do which of the following?
automatically download appropriate applications and print queues to that user
authenticate that user and allocate those resources the user is allowed to access
assign a specific IP and MAC address to the user's workstation
assign the user to a specific domain and user group
Module 7: study questions
2 What are two valid file systems for a Linux partition? (Choose two.)
ext1
ext2
ext3
HFS
boot
FAT
3 Which Windows file performs the same function as the Linux LILO files?
HAL
NTLDR
NTDETECT
NTOSKRNL
The figure shows a section of the display from Device Manager. What does it
show about the laser printer?
The network cable is unplugged.
Windows recognized the device but could not locate a suitable driver.
Windows does not know the proper name of the device.
Windows could not locate the device in the expected location.
5 When setting up a hard disk, what are the three possible types of partitions?
primary, secondary, and logical
primary, logical, and extended
C, D, and E
boot, program, and data
8 Most NOSs will only run on certain hardware configurations. For which four
items are minimum requirements specified? (Choose four.)
CPU speed
CPU type
RAM
CD-ROM drive
hard disk space
NIC
11 Which of the following Windows file systems is the most appropriate for a
network file server?
FAT16
FAT32
NTFS
HFS
18 What is the first step every computer will perform when it is turned on,
regardless of the operating system?
boot
RAM
POST
SCSI
Module 8: Study questions
2 An administrator has written a script in VBScript and saved the file. What
must the administrator do to ensure that WSH is aware that this is a
VBScript file?
The first line of the script file must be VBS.
The WSH configuration file needs to be updated with the name of the
new script file.
The file must have the extension .vbs.
WSH must be informed that it is a VBScript file when it is loaded.
3Which command can be used in Windows 2000 to capture the output from a printer
port and redirect it to a network printer?
net use
capture
lpt1 > net
netprint
4An administrator needs an account that can be used to manage all the computers in a
domain. What is the name of the group that Windows 2000 provides to allow the
administrator to perform this function?
Root
Admin
Domain Admins
Enterprise Admins
Administrator
8 When installing Windows 2000 Professional on a new machine, what must you do
to boot from the CD?
Nothing, it will automatically boot from the CD.
Select the correct install device option from the menu.
Enter the CMOS setup and set the boot sequence to boot from the CD-ROM
drive first.
Insert the Windows 2000 CD in the CD-ROM drive and press Enter.
9 In Windows 2000, which of the following is a required field when creating a new user
account?
the full name
the password
the user name
he description
10 What is the main reason that NTFS is the preferred file system for a Windows 2000
partition?
It is the only file system that is available to a Windows 2000 administrator.
It cannot be accessed by Linux systems.
It supports a bigger file system than any of the alternatives.
It offers better security than any of the alternatives.
Most Windows 2000 administrators are trained to use NTFS.
11 What is the purpose of the user's full name in the New User account box?
It is informational only.
It authenticates the username.
It allows the user to logon.
It matches the user to permissions.
13Which two of the following statements about passwords are correct? (Choose two.)
No two users should have the same password.
Passwords should be at least five characters long.
Passwords should contain at least one non-alphabetic character.
Passwords should be easy to remember such as a favorite sports team.
14In Windows 2000, what is the name of the HTTP web service located in the
Administrative Tools menu?
Default FTP Site
Default Web Site
Default Web Service
Default Internet Information Service
15An administrator has just finished setting up a Windows 2000 PC. What should the
administrator do first to ensure that the NIC has been correctly configured?
run the ifconfig -a command
run the ipconfig /all command
ping the local host
ping the default gateway
16Which two statements about computer names in Windows 2000 are correct? (Choose
two.)
A computer name is optional.
The maximum length for a computer name is 15 characters.
The maximum length for a computer name is 255 characters.
There is a default computer name based on the organization name.
Computer names on a network do not need to be unique if they have unique IP
addresses.
17In the Windows 2000 NOS, which tools must be loaded to run FTP services?
FTP Services
Network Services
Internet Information Services
Site Services
19 Which Windows tool allows an administrator to easily view or navigate a file system?
Internet Explorer
Windows Explorer
WinNT Explorer
File Explorer
20 Which three of the following groups can be created in Windows 2000? (Choose
three.)
local groups
global groups
domain local groups
domain global groups
audit groups
21 What must a Windows 2000 client do in order to assign a logical drive letter to a
shared folder on a network file server?
map to the network drive
link to the file server
share the network folder
create a path to the file server
22 Which two of the following tasks are performed before the Setup wizard stage of a
Windows 2000 installation? (Choose two.)
reconfigure hard disk partitions if necessary
enter the product registration key
format the disk
configure networking
Module 9: Study questions
1 You would like to install the samba program on your Linux machine. You have located
the file samba-2.0.7.tar.gz. Which command should you use to completely unpack the
files in this package?
gunzip samba-2.0.7.tar.gz
tar -xvf samba-2.0.7.tar.gz
tar -xvzf samba-2.0.7.tar.gz
gunzip -xvf samba-2.0.7.tar.gz
4 What is the name of the X Window package that is supplied with most distributions of
Linux?
X Window
Xfree86
Xfree386
Xlib86
Xlib386
5 Which of the following are valid boot loader options for most Linux installations? (Choose
two.)
BOOT.INI
AUTOEXEC.BAT
LILO
GRUB
Loadlite
RPM Loader
6 A user wishes to install Linux on a PC with an Intel compatible Pentium class processor
and 64 MB of RAM. What is the recommended minimum amount of free space on the
hard drive to complete the installation?
200 MB
500 MB
900 MB
1 GB
2 GB
7 Which of the following commands would assign a default gateway of 172.16.5.3 to the
local host?
ifconfig eth0 def-gate 172.16.5.3
ifconfig eth0 gw 172.16.5.3
ifconfig eth0 default gw 172.16.5.3
route add def-gate 172.16.5.3
route add gw 172.16.5.3
route add default gw 172.16.5.3
8 You have formatted a drive while doing a Linux installation for a production server. The
formatting revealed that there were several bad blocks. You see that the bad blocks make
up about four percent of the total disk. Which of the following would be the best course of
action?
reformat the drive with a high level format
reformat the drive with a low level format
replace the drive
mark the blocks as "bad" and continue the installation
9 Which three statements are correct when describing the ifconfig command? (Choose
three.)
Settings must be saved following this command or they will be lost when the
computer is rebooted.
Printers can be shared using this command.
The NIC card can be set up and configured using this command.
The IP address of the local host can be assigned using this command.
The hardware address of the local host can be assigned using this command.
10 You are installing RedHat 7.2 and have decided to use the installation class called
"Workstation". Which of the following packages will not be installed? (Select two.)
X Windows
Telnet daemon
HTTP daemon
Vi editor
Sendmail daemon
Browser
11Which of the following would be standard file system types that Linux would use during
an installation? (Select two.)
NTFS
FAT16
FAT32
ext2
ext3
VFAT
12Which of the following can be set within the LILO configuration file?
an option to ask for a DNS server
an option to clear the /tmp directory at boot
an option to boot to runlevel 5
an option to use DHCP
13 You would like to perform a high-level format on a hard disk. Which of the following
Linux commands will accomplish this?
format
fdformat
hformat
mkfs
mkhfs
14 Which of the following directories stores the package database for the Red Hat Package
Manager?
/etc/var/rpm
/var/lib/rpm
/etc/lib/rpm
/var/rpm/db
15A technician is setting up a Linux workstation to automatically get all of the correct IP
settings as soon as it boots. Which protocol should be configured on the workstation to
accomplish this?
DNS
ARP
DHCP
NetBEUI
default gateway
16Which of the following is the most widely supported package type available in Linux?
RPMs
DPMs
tarballs
gzip
17 You have decided to install your new Linux distribution by using the bootable CD that
came with it. What must be configured before you can boot from the CD?
CMOS
NVRAM
BIOS
Hard drive
18You have tried to install a particular RedHat package but it keeps telling you that it has
a "failed dependency". What would cause this error?
The package depends on certain user input.
The package depends on operating system input.
The package depends on another package being installed.
The package depends on hardware that is not present in the computer.
19A file system is written to a partition when a hard drive is formatted. Which three of the
following file systems can be used in a typical Linux installation? (Choose three.)
NTFS
ext2
ext3
FAT
FAT32
Reiser
Module 10: Study questions
1 Which of the following commands will allow only the owner of a file named
programs to execute the file?
chmod 664 programs
chmod 544 programs
chmod 422 programs
chmod 462 programs
2 In Linux, which command allows users to learn more about any command?
cal
man
help
doskey
3 In Linux, which command is used to switch from the X Window GUI to the CLI?
Ctrl+Alt+(F1-F6)
Shift+Ctrl+(F1-F6)
Shift+Alt+(F1-F6)
Ctrl+Delete+(F1-F6)
4 Which of the following is a translator that allows Linux and UNIX systems using
PostScript to print to non-PostScript printers?
Printcap
Chatscript
Linuxscript
Ghostscript
Printscript
5 A user wants to disable the Telnet and FTP services in Linux. In the configuration
file, which character would the user place at the beginning of the Telnet or FTP
line?
x
?
#
!
6 Which file must be edited by the Linux administrator to manually disable a user's
password?
/etc/passwd
/user/shadow
/etc/shadow
/root/shadow
7 In which file does the activation of the Linux FTP service take place?
/etc/conf/init.d
/etc/conf.d
/etc/rc.d/init.d/xinetd
/etc/activate/inetd
9 Which of the following Linux daemons listens for incoming requests and forwards
each request to the appropriate daemon?
HTTPD
LPD
crond
syslogd
inetd
10 What is X Window?
It is server software to setup web services in Linux.
It is software that allows users to set the number of open Telnet windows in
Linux.
It is a GUI interface for Linux.
It is mail client software for Linux.
13 Which of the following configuration files determines the default runlevel at system
startup?
/etc/rc/init
/etc/inittab
/etc/init/rc.d
/etc/rc.d/inittab
14 Which of the following files can be edited to allow a user other than root to use the
umount command?
/etc/lilo.conf
/etc/fstab
/etc/var/mnt
/var/mnt
15 On a computer running Linux, which attribute prevents anyone other than the
owner of a file, the directory owner, or root from renaming or removing files in a
directory?"
owner bit
no override
lock
sticky bit
19 Which of the following indicates only read and write permissions when used with
the chmod command?
4
5
6
7
21 Which Linux process will automatically run scheduled tasks at a specified time?
run
crond
sched
auto
2 What are two guidelines that an administrator should follow to maintain a healthy hard
drive? (Choose two.)
limit the amount of RAM available to individual users
defragment the hard drive regularly
allow users to use all available storage with no limits
continually manage available disk space
do not limit the size of user home directories
3 Which statement is true when the SUID bit is set as the root account for a program?
Root cannot execute the program.
Only root can execute the program.
Any user can execute the program using root account permission.
Users can execute the program only if they belong to the same group as the owner
of the program.
Only the owner of the program can execute the program.
4 Which setting determines if a program will run with the permissions of its assigned
group or the permissions of the user's groups?
SUID
GUID
SSID
SGID
5 What are three key concepts when analyzing and optimizing network performance?
bottlenecks, baselines, and best practices
baselines, base logs, and best practices
best practices, base logs, and bottlenecks
baseline, bottlenecks, and backups
6 Which of the following can be used to monitor system resources in Windows XP and
Windows 2000?
Event Viewer
Scandisk
Performance Tool
Task Scheduler
Checkdisk
9 Which Linux command can be used to terminate processes that are consuming too
many system resources?
at
stop
kill
term
kip
10 Which output does the df command produce when executed from the Linux CLI?
detailed information about the file system
detailed information about the top-level directory
detailed information about CPU and RAM usage
detailed information about the data stored on the disk
11 Which file can be studied by programmers to determine the potential cause of a
program crash?
Core Dump
Script Debugger
Process Tracker
Trace File
Error Pack
12 Which of the following statements is true about the use of Performance Tool?
Performance Tool is only available for use on Linux computers.
Performance Tool should be used sparingly since it uses valuable system resources.
Performance Tool can only be used to monitor network computers.
Performance Tool can only be used in conjunction with a pre-established baseline.
13 A system unexpectedly shuts down due to power failure. As a result, the file system is
damaged. Which Linux command could be used to repair the file system?
mkfs
fsck
diskcheck
filrep
ps
17 Which Linux command can be used to terminate a group of processes that have the
same name instead of terminating them with their PID numbers?
term
stop
killall
halt
19 Which disk management tool is available to limit the amount of data a user can store
on a network?
disk quota
disk ceiling
disk limit
disk wall
disk container
Module 12: Study questions
1 Which version of the Linux kernel includes ISA PnP support that does not require the isapnp
program?
2.1.x
2.2.x
2.3.x
2.4.x
2 Which insmod option will automatically unload the module when it is no longer being used?
-s
-p
-f
-k
4 What would be the most important feature to consider when selecting a video card for a
workstation based on performance?
warranty
amount of on-board RAM
manufacturer
price
5 Which two steps should a technician perform first when troubleshooting a new EIDE hard
drive installation that a computer does not recognize? (Choose two.)
check CMOS to ensure that the hard drive settings are correct
ensure that the drive has the correct master or slave jumper settings
ensure that the kernel contains the correct drivers for the drive
make sure the device number and termination are correct
6 Which option of the insmod program will send output to a log file instead of the console?
-s
-p
-f
-k
7 A new EIDE hard drive has been added to a Linux workstation. The hard drive is functioning
but performance is poor. What should the administrator do first to check the installation?
ensure that the ribbon cable connector being used is the one closest to the motherboard
ensure that the jumpers on the hard disk are set to configure it as the master drive on
EIDE channel 1
repartition the disk to create smaller partitions
use the hdparm utility to test the disk and set options
9 Some PCMCIA driver packages allow drivers to be mounted while a device is installed and
unmounted when the device is removed from a laptop. Which feature makes this possible?
ACPI
Card Services
lsmod
mount
sleep
umount
10 Which insmod option will instruct the program to load the module even if the module was
compiled for a different kernel?
-s
-p
-f
-k
11 What is the main concept to be aware of when installing hardware on a Linux system?
price
type of device
compatibility
number of slots available
12 Which Linux file needs to be edited to specify an IRQ for an Ethernet card?
/lilo.conf
/irq.conf
/etc/lilo.conf
etc/loli.conf
/etc/irq.conf
13 A technician is adding an internal PnP modem to a system, but a check of system resources
shows that all available IRQs are reserved or being used by other devices. What could the
technician do to get the device to work?
manually assign the IRQ of another device that is not expected to be used at the same
time as the modem
use trial and error to find an IRQ that will work with the modem
configure the modem to work without an IRQ
change CMOS settings to allow the BIOS to free up an unused IRQ
configure the modem to use a DMA address instead of an IRQ
14 Which two of the following statements about SCSI devices and configuration are true?
(Choose two.)
The SCSI controller needs to be terminated if it is at the end of a chain.
A forked chain occurs when two SCSI cables are connected to a single controller.
Throughput can be reduced if all SCSI devices are not the same variant.
All SCSI devices in a chain must have the same device number.
15 Which program is used to insert a single module into the Linux kernel?
imsmod
smod
ismod
insmod
16 How is PnP handled in a Linux system? (Choose two.)
isapnp program
iopnp program
ISA configuration option in control panel
ISA configuration option in the Linux kernel
17 Which of the following factors should be considered when installing a SCSI drive to ensure
system compatibility? (Choose three.)
variant
RPM
ID
termination
drive size
average seek time
18 A module needs to be loaded. However, confirmation that the Linux kernel can load the
module is important. Which of the following options of the insmod program will accomplish
this task?
-s
-p
-f
-k
19 Which of the following Linux files can be viewed to see resource allocations? (Choose three.)
/proc/interrupt
/proc/dma
/proc/imports
/proc/ioports
/proc/alloc
20 On a Linux system, which of the following files will show the interrupt request number
allocation?
/dev/interrupt
/proc/interrupt
/interrupt
/var/interrupt
Module 13: Study questions
3 In a Linux system, the set of recent kernel messages is known as the kernel ring buffer.
Which command displays these messages?
dmesg
imesg
kmsg
rmesg
4 What is the simplest and most recommended method of creating a custom emergency boot
disk for Linux?
Run the btdisk command.
Modify one of the existing boot disks.
Copy individual boot files to a floppy.
Download a custom configuration from a Web site.
5 Which type of files can be helpful in identifying several types of problems in a Linux server?
security files
user data files
log files
text files
6 What is the easiest way to stop a non-responsive process in a Linux system?
issue the stop command
issue the kill command
log out and log back in again
press Ctrl-Alt-Del and click Stop when the Task Manager appears
7 Which two files are commonly used to access the tape backup devices? (Choose two.)
/dev/ht0
/dev/hd0
/dev/nst0
/dev/tp0
8 Why is it necessary to use the appropriate Sys V script to stop some processes?
It is the only way to stop some services.
It is the best way to stop zombie processes.
It will prevent lock files from causing error messages.
It will save the data that has been processed.
9 While booting a Linux server, the booting process has stopped. Upon troubleshooting, an 'L'
error code is discovered. What does this indicate?
No part of LILO loaded.
The second stage of LILO did not load.
The first and second stages both loaded, but the second stage will not run.
The disk descriptor table (/boot/map) is corrupt.
11 Which parameter can be used with tar to list the contents of an archive?
-a
-i
-l
-t
12 In Linux, what is the first program that takes control of the boot process from the BIOS?
kernel
LILO
config.sys
linux.sys
13 What is the loopback address that a technician would ping to verify that TCP/IP is correctly
installed?
192.0.0.1
127.0.0.1
168.0.0.1
223.0.0.1
15 Which Linux log file is most likely to contain the word oops?
/var/log/messages
/var/log/error
/var/log/syslog
/var/log/secure
Module 14: Study questions
2 According to SANS, which three of the following services are among the top ten security
vulnerabilities of Linux? (Choose three.)
Remote Procedure Calls
Dynamic Host Configuration Protocol
MySQL
Secure Shell
Apache Web Server
RMON
3 Several computers on a network are running slow and many user tasks are timing out. The
administrator checks the network and finds duplicate copies of program code in the active
memory of each computer. Which of the following options best describes this self-
replicating code?
virus
Trojan horse
worm
bug
4 Which three of the following terms refer to the public network that acts as a buffer area
between a firewall and a boundary router? (Choose three.)
Internet
DMZ
extranet
sacrificial LAN
dirty LAN
demarcation zone
5 Which directory should be used for decompressing LSAT?
/usr/bin
/etc/bin
/usr/local/bin
/usr/sbin
/etc/local/bin
6 Which three of the following items should be included in a security policy to increase the
level of password control? (Choose three.)
Passwords should expire after random periods of time.
Passwords should be familiar names or words, so that users will not have to keep
written reminders near computers.
Passwords should be a combination of letters and numbers.
Written rules should be distributed to advise users of password expiration and lockout
policies.
All passwords should be changed by the user after a specified period of time.
8 Which three OSI model layers are used for packet filtering? (Choose three.)
Layer 2
Layer 3
Layer 4
Layer 5
Layer 6
Layer 7
13 Which two of the following options provide a basic firewall solution by using rules to
control network traffic? (Choose two.)
proxy services
ip masquerade
packet filters
Network Address Translation
access control lists
14 Which two of the following protocols are used by IPSec? (Choose two.)
Encrypted Secure Header
Encapsulating Security Payload
Authentication Header
Authenticated Secure Header
15 Which of the following options best describes the characteristics of an IDS?
hardware, inspects all network activity, denies or permits access using filters, signals
an alarm
hardware or software, limits access to prevent intrusion, inspects all network traffic
software, designed to identify intrusion using a set of patterns, signals an alert
inspects all network activity, identifies suspicious patterns, signals an alert
16 Which three of the following vulnerabilities have been overcome in newer versions of
operating system software? (Choose three.)
ping of death attack
land attack
Teardrop
buffer overflow
17 Which three of the following options are necessary to protect against the threat of viruses?
(Choose three.)
Outgoing traffic should be filtered at all gateways.
Incoming traffic should be filtered at all gateways.
Current virus protection software should only be installed on incoming gateways.
One administrator should issue all virus warnings.
Policies should be created to control outgoing e-mail.
Virus protection software should be current on all computers.
18 Which two of the following statements correctly describe audit trails? (Choose two.)
Audit trails secure a network.
Audit trails help maintain security on a network.
Audit trails back up data on a network.
Audit trails are used to recover lost data.
Audit trails are used to allocate network resources.
19 To create a security policy, which of the following actions should occur first?
All servers should be placed in a secure, central location.
All users should be surveyed to identify potential security threats.
All users should receive written guidelines of what is acceptable and allowed on the
network.
All users should receive instructions outlining how to install and upgrade virus
software.
20 Which DoS attack uses fragments with overlapping reassembly information to take
advantage of the way IP handles fragmentation?
SYN attack
Teardrop
ping of death
land