IT Essentials 2: Module questions and answers Module 1: Study questions

1 From which Windows configuration tool can a user perform hardware and network configurations? Window Manager My Computer Control Panel Task Manager

2

When compared to a command line interface, what is a major disadvantage of a GUI? It requires an understanding of commands. It requires more memory and storage space. It is more difficult to use. Most server operating systems do not support a GUI.

3

What is a beneficial feature of preemptive multitasking? Applications share the use of the processor by time slicing. The processor dynamically adjusts the amount of memory needed by the application programs. Application programs share memory addresses and exchange information. The operating system controls the allocation of processor time.

4

Though obsolete in current desktop environments, what are three valid reasons for the continued use of MS-DOS? (Choose three.) MS-DOS supports legacy applications. MS-DOS is an intuitive, high-overhead operating system. MS-DOS rarely crashes because it is a multitasking operating system. MS-DOS is relatively easy to use. MS-DOS can run on inexpensive hardware.

5

Which acronyms describe the two general categories of OS user interfaces? DOS and UNIX DOS and GUI UNIX and GUI CLI and GUI

6

Which of the following is a valid concern for a company considering a move from Windows to Linux? Linux generally allows companies to recycle old hardware and software. Users may need special training to become productive with Linux. Special third party software may be necessary to secure and configure Linux. Linux generally requires more disk space than Windows.

7

What is meant by the statement, "We have to support our legacy system"? Support must be provided for the newest Linux system. Support must be provided for the system called legacy. Support must be provided for the newest Microsoft system. Support must be provided for outdated software.

8

Which three of the following file systems does Windows 2000 use? (Choose three.) EXT2 FAT16 FAT32 NTFS HPFS

9

Windows and Linux both use a file system that resembles an upside-down tree. What is the name of this type of file structure? binary hierarchical empirical subsystem

10

Which part of the OS, loaded into memory at boot time, controls memory allocation? user interface application software kernel file system

11

What is the main reason FAT32 was created? New operating systems required the use of filenames greater than eight characters. Earlier versions of FAT used disk space inefficiently. FAT32 was needed to support drives up to 4 GB. The maximum length of file extensions needed to be increased to three characters.

12

Which of the following is generally regarded as the standard GUI for Linux? Red Hat Desktop CDE GNOME Star Office

13

Which two of the following statements are true? (Choose two.) Linux is a true 16-bit operating system that uses preemptive multitasking. Linux supports all Windows applications through the use of cooperative multitasking. Linux operating system code is available for anyone to modify and use. Linux is a true 48-bit operating system that uses minimal virtual memory. Linux is a true 32-bit operating system that uses preemptive multitasking.

14

Which command is entered in the Run dialog box of a Windows XP system to open a command prompt window? run start cmd dosprompt

15

Which two statements describe the security features of Linux? (Choose two.) Compared to Windows, Linux is virtually virus-free. Users must have a valid username and password to log into a Linux system, by default. Linux security is one dimensional. Most security features for Linux must be purchased from a third party.

16

Which two of the following shells are commonly available for Linux? (Choose two.) Bore shell Korn shell Cash shell C shell PC shell

17

With the FAT file system, what is the basic unit of logical storage on a disk? megabyte cluster directory logical drive

18

Which two statements describe security in the Windows operating system? (Choose two.) Windows is less susceptible to viruses than Linux. By default, users must have a username and password to log into Windows. Windows security is generally one dimensional. Windows security is improved through the use of third-party applications. Windows can securely support multiple users with the Terminal service installed by default on personal computers.

19

What are three reasons why a company may choose Linux over Windows as an operating system? (Choose three.) The entire Linux installation can be completed using either a GUI or CLI. The entire Windows installation can be completed using either a GUI or CLI. Windows can be run entirely from a CD. Compared to Windows, Linux is virtually virus-free. Linux is a true multi-user system. Linux has superior one-dimensional security.

20 Network operating systems were designed to provide which of the following tasks? (Select three.) file security multitasking user privileges resource access for a single user resource sharing among multiple users

Module 2: Study questions
1 What does the term media access control describe? the rules for coordinating the use of the medium a list of users allowed to use the network the system administrator's role in controlling access to the network how to determine which media type is best for a network

2

Which two types of cabling will support 100BASE-X? (Choose two.) Category 2 Category 5 two-strand fiber-optic 50-ohm coaxial

3

What is one disadvantage of a client/server network? It can have a single point of failure. It does not scale well to large networks. It requires each user to be trained to perform administrative tasks. It is less secure than a peer-to-peer network.

4

Peer-to-peer and client/server networks share many characteristics. What is unique to the client/server environment? Passwords may be required to access shared resources. Local data files and devices can be shared by several users. Computers typically communicate using request/response protocols. Security and resource management scales easily as the network grows.

5

Why are open source technologies appealing to many people? A more organized source of funding and development is available. Proprietary technologies involve cooperation between many companies. De facto standards allow for more choice. Users are not bound by copyright laws.

6

Which of the following statements best describes full-duplex transmission? Data can be sent across bus hubs and switches. Data can be simultaneously sent and received. Data can only be sent in one direction. Data can be sent and then received.

7

Which access control method is specified in the IEEE 802.3 standard? CSMA/CA CSMA/CD token passing store and forward

8

What is the physical topology when all the computers in a network connect to a central point? point-to-point star ring bus

9

Which of the following statements is true of print sharing? It requires a company to purchase more printers. It makes it more difficult for an administrator to control printers. It allows for more efficient use of printers. It limits the user to a single network printer.

10

Which statement is true of peer-to-peer networks? They scale easily as the size of the network grows. Security is easily maintained. Computers may change roles from client to server as needed. At least one computer functions as a dedicated server.

11

What is a major advantage of UTP? It is inexpensive. It is highly resistant to electromagnetic interference. It limits the number of hosts on a network. It is an inexpensive way to interconnect remote locations.

12

Which technology provides the best support for upload-intensive Internet tasks? ISDN cable modem service analog modem service ADSL

13

What do transport layer protocols use to identify the application needed to process data? ports MAC addresses IP addresses DNS flags

14

Which statement best describes a serial link? Bits of information are transmitted across the link one after another. Bits of information are randomly transmitted across the link. Bits of information are sent across a dedicated link in one direction only. Bits of information are only sent using dial-up or ISDN lines.

15

What is one advantage of directory and name services? All directories are kept in a single location. User names have a standardized format. Text names are easier to remember than numeric addresses. Network resources are bound to a physical location.

16

What is an advantage of Linux? Linux is easy to use. With copyrights, Linux experiences fast technological growth. Linux is free for public use. Linux has an organized source of development.

17

What is the purpose of protocols? to provide a controlled sequence of messages between systems to define which users have access to the network to allow the network administrator to decentralize control to limit access to network resources

18

Which of the following is the most popular physical LAN topology? ring star bus fiber

19

Which DSL technology is most commonly used? SDSL ADSL VDSL IDSL

20

Which network layer protocol enables routers to discover the best path between networks using hop count? IP RIP ARP OSPF

21

Which of the following works as a "storage and retrieval" application? Telnet e-mail DNS SNMP

22

Which features are LANs generally designed to accommodate? many users, high speed, limited geographical area many users, high speed, broad geographical area few users, low speed, limited geographical area few users, low speed, broad geographical area

23

What are two advantages of Windows over Linux? (Choose two.) Windows can be used publicly for free. Windows is easier to use than Linux. Unlike Linux, Windows is standardized through the efforts of many independent sources. Unlike Linux, Windows has an organized source of funding and development.

Module 3: Study questions
1 Which list indicates advantages associated with fiber-optic cable? capable of running long distances, inexpensive to install, not susceptible to electromagnetic interference not susceptible to electromagnetic interference, expensive to install, lower data rates not susceptible to electromagnetic interference, higher data rates, capable of running long distances lower data rates, inexpensive to install, capable of running long distances

2

Which term refers to the path that signals take from one point on a network to another? address resolution logical topology dynamic host configuration physical topology

3

Which data link layer device can segment a network into different collision domains? a router a switch a gateway a transceiver

4

What is the function of a DHCP server? It stores websites that are used frequently. It dynamically assigns IP addresses to hosts. It determines the subnet mask of a network. It serves as a "first line of defense" firewall.

5

Which of the following statements best describes DNS? DNS servers are used to map an IP address to a physical address. DNS servers are used to map a name to an IP address. DNS servers are used to configure logical address information for host computers. DNS servers are used to translate from private addresses to public addresses.

6

Which three of the following items can a DHCP server provide to a host computer? (Choose three.) subnet mask MAC address default gateway IP address DHCP server address

7

Which two devices are at the core of wireless communications? (Choose two.) satellites light emitting diodes transmitters receivers modulators

8

How many bits are in an IP address? 16 64 32 48

9

What is the main function of the DNS? to scan the network for viruses to translate computer names to their corresponding IP addresses to assign IP addresses to nodes on the network to provide names to all the nodes on a network

10

What are three important considerations when selecting a NIC? (Choose three.) network type operating system system bus network media number of network users

11

Which list contains important considerations when selecting a NIC to use on a network? type of network, type of RAM, type of system bus type of media, type of system bus, type of RAM type of network, type of media, type of system bus type of system bus, processor speed, type of media

12

What are the two most common wireless networking technologies? (Choose two.) radio frequency microwave laser infrared satellite wavelength

13

What is the purpose of the twists in Category 5/5e UTP cable? to prevent the cable from breaking to make the cable easier to install and terminate properly to make the cable cheaper to produce to limit signal degradation caused by cross talk

14

Which of the following options correctly describes APIPA? APIPA allows a privately addressed host to assign itself a public IP address in order to access a remote network. APIPA enables a computer to assign itself an IP address if it cannot contact a DHCP server. APIPA is fault-tolerant feature that allows a server to mirror another server on a local network. APIPA enables a computer to translate domain names into IP addresses if it cannot contact a DNS server.

15

What are three options for assigning logical addresses to hosts? (Choose three.) static dynamic negotiation automatic holistic

16

Which of the following devices is used to segment a network into different broadcast domains? switch active hub bridge router

17

What is a major disadvantage of the bus topology? It is expensive. It requires a lot of cabling. A break in any one part of the cable brings down the entire network. All computers must be placed in a straight line.

18

What is the most commonly used architecture in Ethernet LANs? bus star mesh ring

19

What are two advantages of using dynamic address assignment instead of manual address assignment? (Choose two.) On a large network, manually assigning addresses can be very time consuming. Manual address assignment requires network administrators to understand physical addressing. Dynamic address assignment can help segment a large network. Manual address assignment requires network administrators to understand logical addressing.

20 Which two of the following statements accurately describe a default gateway? (Choose two.) A default gateway is used when a host transfers data to another host on the same network segment. A default gateway is the IP address assigned to the near-side router interface. A default gateway is the IP address assigned to the near-side switch interface. A default gateway is used when a host transfers data to a host on another network segment.

Module 4: Study questions
1 What must a computer have when connected to a network? one unique name per function one unique address per service one unique address per connection point one unique network

2

What is the range of numbers in the first octet of a Class C address? 1-127 192-223 128-191 224-255

3

A technician needs to log into a remote Linux PC to perform some maintenance. Which application layer protocol could be used? Telnet FTP HTTP SNMP

4

Which protocol is used to translate a domain name into an IP address? ARP DNS UDP NetBIOS

5

Which classes of IP addresses are used by commercial organizations for host addressing? A,C,D B,C,D C,D,E A,B,C

6

Which of the following rely on ICMP? sending an Echo Request logging in to a remote host mapping an IP address to a MAC address resolving a host name

7

What is subnetting? dividing large networks into smaller ones using the same network number allowing several small networks to communicate over the common carrier infrastructure combining several networks into a single larger network allowing separate companies to share an IP address by taking turns using it

8

How would a technician permanently change the IP address of an Ethernet card on a Red Hat Linux PC to 192.168.34.4? use the command ifconfig eth0 192.168.34.4 use the command route add default IP 192.168.34.4 dev eth0 use the command ping 192.168.34.4 edit the IPADDRESS line in the file /etc/sysconfig/network-scripts/ifcfg-eth0

9

Which utility is used in Windows and Linux to view network connections and protocol statistics? arp netstat nbstat ipconfig

10 What is a unique characteristic of the IP addressing scheme? flat addressing hierarchical addressing internetwork addressing single-octet addressing

11 In which layer of the TCP/IP model does ICMP operate? Application Transport Internet Network Access

12 Which address class contains the IP address 168.12.0.0? A B C D

13 How many octets are contained in an IP address? 1 2 4 8

14 Which Linux command is used to temporarily change the default gateway of a host? arp ifconfig netstat route ping

15 What is the primary function of NAT? convert a MAC address to a domain name translate between a local IP address and a global IP address allocate IP addresses to commercial organizations determine the best route through a network 16 Which service is used to enable individual computers to automatically obtain an IP address? WINS DNS ARP DHCP

17 Which service does ARP provide? It resolves a physical address to a TCP port number. It resolves a broadcast address to an IP address. It resolves an IP address to a MAC address. It resolves a URL to a MAC address.

18 What is the range of numbers that can be used in the first octet of a Class A network? 1-126 128-191 192-223 1-255

19 Which IP address range, as indicated by the first octet, is reserved for testing, and includes the loopback address? 127.x.x.x 168.x.x.x 255.x.x.x 192.x.x.x

20 The performance of a network has dropped. Which command should an administrator use in a Linux system to determine which routers are causing the problem? ping traceroute tracert route ifconfig

Module 5: Study questions
1 Which statement correctly describes an NIS slave? An NIS slave is another name for an NIS client. An NIS slave is where the NIS database is maintained. An NIS slave is where the NIS database is created. An NIS slave contains a copy of the NIS database. An NIS slave contains the portions of the NIS database needed by the clients it serves.

2

What are three characteristics of an intranet? (Choose three.) communication with outside business partners firewalls multiple networks across the company public access local area network only web servers

3Which version of Directory Service does Linux use? NDS NIS NFS NDAP

4Which two protocols are used to control the transfer of web resources from a web server to a client browser? (Choose two.) ASP FTP HTML HTTP HTTPS IP

5

Which TCP/IP protocol is responsible for file sharing? DNS NFS UDP IPX

6

Which popular web server software is only available for Windows operating systems? Apache Firefox Internet Explorer Internet Information Server Netscape Server Opera

7Which scripting language can be used on a Linux server to notify users that a print job is complete? batch script JavaScript JScript shell script VBScript

8What is the default order in which print jobs are processed when using a FIFO queue? The last job placed in the queue is the first to be printed. The oldest job in the queue is printed first. Smaller jobs are printed before larger jobs. Larger jobs are printed before smaller jobs. The network administrator determines which jobs are printed first.

9

Which of the following is a list of common FTP commands? get, put, cd, bye download, upload, dir, chdir, exit send, receive, dir, cd, exit transfer [from | to], list, dir, exit

10

What are two common uses of scripting languages? (Choose two.) automate administrative tasks, such as cycling log files provide user interaction with a compiled program run scheduled tasks at user login deliver files to remote users on request download required drivers to printers

11

Which protocol controls web page transmission?

FTP HTTP SMTP DNS

12

A network administrator is operating in the GNOME desktop environment. Which application would the administrator start in order to establish a command line session with a remote server? gFTP Mozilla Star Office xterm

13

Which syntax is invalid for opening an FTP connection? ftp connect hostname ftp <hostname | IP_address> ftp 192.127.34.219 ftp computer.company.com

14

Which protocol was designed for file sharing on the Internet? HTTP FTP SMTP TCP

15

Where do print jobs wait to be printed? print list print queue wait list print job roster

16

What is the purpose of a directory service? It increases the need for redundant logins. It provides administrators with centralized control of users and resources across the network. It impairs network security and must therefore be used with a firewall. It keeps track of the home addresses and phone numbers of all users.

17

Which of the following is a list of popular scripting languages?

X Window script, vi script, Gnome script XML script, Sequel, Gnomepad UNIX shell script, pico script, EmacsScript VBScript, Linux shell script, JavaScript

Module 6: Practice questions
1Which Linux distribution was built solely for nonprofit uses? Debian GNU/Linux Caldera eDesktop and eServer SuSE Linux LinuxPPC

2Which of the following is open source? all versions of UNIX Windows 2000 all versions of NetWare Linux

3What are two benefits of having more than one processor in a system? support for remote locations and automatic job queuing faster speeds and increased work capacity reduced need for IP addresses and decreased boot time reduced need for IP addresses and increased manageability

4Why might the administrator of a small company choose Windows 2000 Server instead of Windows 2000 Professional? The operating system is to run on a dual-processor system. The system is to act as a DNS server. The company needs an intranet based on a small web server. The server will be accessed by up to ten simultaneous users.

5How is redundancy built into a server system? by including additional hardware components that can take over if other components fail by including a tape back-up system to preserve data by adding redundancy software to the system by keeping duplicates of all data

6Which of the following is a better choice than Telnet for Remote Login Servers on a Linux system? SSL SSH Kerberos Remote Access

7In a Windows NT environment, what is the meaning of the term domain? a dedicated server containing the database of all IP and MAC addresses on the network a group of computers located in a specific physical or geographic region the OU that contains all user accounts groups of computers, users, and resources that form an administrative boundary

8Which program, running on a Linux server, allows Windows-based clients to see the Linux file system without installing client software? NFS Apache Samba KDE

9 What are two important features provided by security on a NOS? authentication and encryption reliable performance and account management virus protection and prevention from spamming processor balance and sustained work load

10Which type of authentication security does Windows 2000 Professional support? Secure Socket Layer Kerberos Samba Apache

11How many Primary Domain Controllers (PDCs) are allowed in a Windows NT environment? 1 2 4 9

12Which of the following criteria must software meet in order to display the Open Source Initiative trademark? It must be easily altered and adapted to all major operating systems and source code must be limited. It must be compatible with third party add-ons and use standard source code. It must be provided in multiple languages and cost must be minimal. It must be freely distributed without restriction and the source code must be available.

13Which client/server file system is used by most varieties of Linux file servers? FAT32 NFS NT SMB

14What are two popular Desktop Environments that run on Linux? GNOME and KDE Apache and Samba Xfree86 and GNOME Apache and KDE

15What are three important considerations when selecting a Linux distribution? (Choose three.) whether the computer will be used as a client or a server whether or not the computer will be connected to a network whether or not a GUI interface is required whether or not a command line user interface is required the experience level of the user

16Windows 2000 Professional supports plug-and-play technology. What is one of the major advantages of this technology? An administrator can add devices from any manufacturer to the system and they will work. Devices no longer need software drivers to interact with the system. Components will interact with the system if plugged in prior to system boot. An administrator or user can easily add components to the system without manual configuration.

17Which one of the following office tools is available for both Linux and Windows? ClarisWorks ApplixWare Lyx StarOffice

18Which statement accurately describes the Slackware Linux distribution? It is designed for Linux novices. It has a range of user interfaces and uses RPM. It is designed for advanced users and uses text-based configuration tools. It is intended solely for non-profit organizations and uses the Debian package manager.

19A user account on a server enables the server to do which of the following? automatically download appropriate applications and print queues to that user authenticate that user and allocate those resources the user is allowed to access assign a specific IP and MAC address to the user's workstation assign the user to a specific domain and user group

Module 7: study questions
1 What must be done when setting up a RAID array in Linux? All the disks must be partitioned as primary partitions. All the partitions need an extended partition. The disks must be mounted using LVM. The disks must be formatted using NFS.

2

What are two valid file systems for a Linux partition? (Choose two.) ext1 ext2 ext3 HFS boot FAT

3

Which Windows file performs the same function as the Linux LILO files? HAL NTLDR NTDETECT NTOSKRNL

4

The figure shows a section of the display from Device Manager. What does it show about the laser printer? The network cable is unplugged. Windows recognized the device but could not locate a suitable driver. Windows does not know the proper name of the device. Windows could not locate the device in the expected location.

5

When setting up a hard disk, what are the three possible types of partitions? primary, secondary, and logical primary, logical, and extended C, D, and E boot, program, and data

6

How is the root partition identified in Linux? ? Root /root /

7

How many partitions can an MS-DOS-type partition table describe? one two four eight

8

Most NOSs will only run on certain hardware configurations. For which four items are minimum requirements specified? (Choose four.) CPU speed CPU type RAM CD-ROM drive hard disk space NIC

9

A technician is trying to configure a PC to dual boot with Windows XP and Linux. XP has already been installed and configured in one partition. Linux has been installed in another partition. The technician wishes to replace the LILO loader with grub but is having problems. What is the most likely cause of the problem? The technician did not remove the LILO files first. Grub will not work with XP. Linux should have been loaded first. The technician did not run /sbin/grub-install.

10

The ping command is used to test network connectivity. What is the best IP address to ping for this test? the DNS address the loopback address the local NIC address the default gateway address

11

Which of the following Windows file systems is the most appropriate for a network file server? FAT16 FAT32 NTFS HFS

12

Which four items of information are required for TCP/IP network configuration? (Choose four.) IP address of host subnet mask MAC address IP address of default gateway IP address of DNS server host name

13

Which task should be performed before installing a NOS? Change the system hardware and peripherals before beginning. Verify that the NOS supports all application software that will run on the server. Run the evaluator software prior to loading to establish hardware settings. Be familiar with the NOS so configuration questions can be ignored.

14

Linux systems typically dedicate an entire partition to virtual memory. What is this partition called? the RAM partition the swap partition the pagefile partition the page partition the memory partition

15

Which Windows utility can be used to perform a hardware inventory? Administrative Tools ScanDisk Windows Explorer Device Manager

16

ext3 introduced journaling capabilities to Linux file systems. What is an advantage of a journaling file system? It reduces the time spent recovering a file system after a crash. It allows administrators to determine the owners of files created on the system. It keeps file clusters attached to the files to which they are allocated. It enables Linux systems to interoperate with Windows systems.

17

What is the best source of hardware compatibility information? the World Wide Web a hardware manual a software manual the CD-ROM readme document

18

What is the first step every computer will perform when it is turned on, regardless of the operating system? boot RAM POST SCSI

Module 8: Study questions
1 Which method should an administrator use to provide for securely sharing files on a larger network? arrange for each host on the network to share files with the other hosts on the network to distribute the load only allow clients used by trusted users to share files with others on the network require users to map to a network drive on a network file server on the LAN set up an area on a web server that can then be accessed from anywhere through web browsers

2

An administrator has written a script in VBScript and saved the file. What must the administrator do to ensure that WSH is aware that this is a VBScript file? The first line of the script file must be VBS. The WSH configuration file needs to be updated with the name of the new script file. The file must have the extension .vbs. WSH must be informed that it is a VBScript file when it is loaded.

3Which command can be used in Windows 2000 to capture the output from a printer port and redirect it to a network printer? net use capture lpt1 > net netprint

4An administrator needs an account that can be used to manage all the computers in a domain. What is the name of the group that Windows 2000 provides to allow the administrator to perform this function? Root Admin Domain Admins Enterprise Admins Administrator

5

What are three desirable characteristics of a print server? (Choose three.) good graphics fast processor adequate RAM adequate disk space adequate tape backup

6

In Windows 2000, what is the best way to restore a deleted user account? Select undelete from the popup menu. Create a new account with the same user name. Select undo from the Edit menu. Delete cannot be undone.

7

Which component of Windows 2000 accommodates many types of scripting languages? VBScript JScript WSH ShellScript

8

When installing Windows 2000 Professional on a new machine, what must you do to boot from the CD? Nothing, it will automatically boot from the CD. Select the correct install device option from the menu. Enter the CMOS setup and set the boot sequence to boot from the CD-ROM drive first. Insert the Windows 2000 CD in the CD-ROM drive and press Enter.

9

In Windows 2000, which of the following is a required field when creating a new user account? the full name the password the user name he description

10

What is the main reason that NTFS is the preferred file system for a Windows 2000 partition? It is the only file system that is available to a Windows 2000 administrator. It cannot be accessed by Linux systems. It supports a bigger file system than any of the alternatives. It offers better security than any of the alternatives. Most Windows 2000 administrators are trained to use NTFS.

11

What is the purpose of the user's full name in the New User account box? It is informational only. It authenticates the username. It allows the user to logon. It matches the user to permissions.

12

What is the default method of authentication used by Telnet in a Windows 2000 environment? plain text NTLM kerberos ND5 .net passport

13Which two of the following statements about passwords are correct? (Choose two.) No two users should have the same password. Passwords should be at least five characters long. Passwords should contain at least one non-alphabetic character. Passwords should be easy to remember such as a favorite sports team.

14In Windows 2000, what is the name of the HTTP web service located in the Administrative Tools menu? Default FTP Site Default Web Site Default Web Service Default Internet Information Service

15An administrator has just finished setting up a Windows 2000 PC. What should the administrator do first to ensure that the NIC has been correctly configured? run the ifconfig -a command run the ipconfig /all command ping the local host ping the default gateway

16Which two statements about computer names in Windows 2000 are correct? (Choose two.) A computer name is optional. The maximum length for a computer name is 15 characters. The maximum length for a computer name is 255 characters. There is a default computer name based on the organization name. Computer names on a network do not need to be unique if they have unique IP addresses.

17In the Windows 2000 NOS, which tools must be loaded to run FTP services? FTP Services Network Services Internet Information Services Site Services

18

A network administrator is setting up a web presence for a small company. The company plans to use the address www.thecompany.com but has not created a DNS entry for the server yet. The administrator has set up a new web server on a networked machine with the IP address 111.111.111.111. What should the administrator initially do to determine if the web server is functioning? Run a web browser on the server machine and enter the address http://127.0.0.1. Run a web browser on a host connected to the same network and enter the address http://111.111.111.111. Ask someone outside the organization to try to access the website using the address http://111.111.111.111. Ask someone outside the organization to try to access the website using the address http://www.thecompany.com. Run a web browser on a host connected to the same network and enter the address http://www.thecompany.com.

19

Which Windows tool allows an administrator to easily view or navigate a file system? Internet Explorer Windows Explorer WinNT Explorer File Explorer

20

Which three of the following groups can be created in Windows 2000? (Choose three.) local groups global groups domain local groups domain global groups audit groups

21

What must a Windows 2000 client do in order to assign a logical drive letter to a shared folder on a network file server? map to the network drive link to the file server share the network folder create a path to the file server

22

Which two of the following tasks are performed before the Setup wizard stage of a Windows 2000 installation? (Choose two.) reconfigure hard disk partitions if necessary enter the product registration key format the disk configure networking

Module 9: Study questions
1 You would like to install the samba program on your Linux machine. You have located the file samba-2.0.7.tar.gz. Which command should you use to completely unpack the files in this package? gunzip samba-2.0.7.tar.gz tar -xvf samba-2.0.7.tar.gz tar -xvzf samba-2.0.7.tar.gz gunzip -xvf samba-2.0.7.tar.gz

2

When is the root account typically created in Linux? at first login during NOS installation when configuring NOS user accounts after user accounts are created

3

Which term describes the Linux superuser account? sys root power user wheel daemon

4

What is the name of the X Window package that is supplied with most distributions of Linux? X Window Xfree86 Xfree386 Xlib86 Xlib386

5

Which of the following are valid boot loader options for most Linux installations? (Choose two.) BOOT.INI AUTOEXEC.BAT LILO GRUB Loadlite RPM Loader

6

A user wishes to install Linux on a PC with an Intel compatible Pentium class processor and 64 MB of RAM. What is the recommended minimum amount of free space on the hard drive to complete the installation? 200 MB 500 MB 900 MB 1 GB 2 GB

7

Which of the following commands would assign a default gateway of 172.16.5.3 to the local host? ifconfig eth0 def-gate 172.16.5.3 ifconfig eth0 gw 172.16.5.3 ifconfig eth0 default gw 172.16.5.3 route add def-gate 172.16.5.3 route add gw 172.16.5.3 route add default gw 172.16.5.3

8

You have formatted a drive while doing a Linux installation for a production server. The formatting revealed that there were several bad blocks. You see that the bad blocks make up about four percent of the total disk. Which of the following would be the best course of action? reformat the drive with a high level format reformat the drive with a low level format replace the drive mark the blocks as "bad" and continue the installation

9

Which three statements are correct when describing the ifconfig command? (Choose three.) Settings must be saved following this command or they will be lost when the computer is rebooted. Printers can be shared using this command. The NIC card can be set up and configured using this command. The IP address of the local host can be assigned using this command. The hardware address of the local host can be assigned using this command.

10 You are installing RedHat 7.2 and have decided to use the installation class called "Workstation". Which of the following packages will not be installed? (Select two.) X Windows Telnet daemon HTTP daemon Vi editor Sendmail daemon Browser

11Which of the following would be standard file system types that Linux would use during an installation? (Select two.) NTFS FAT16 FAT32 ext2 ext3 VFAT

12Which of the following can be set within the LILO configuration file? an option to ask for a DNS server an option to clear the /tmp directory at boot an option to boot to runlevel 5 an option to use DHCP

13 You would like to perform a high-level format on a hard disk. Which of the following Linux commands will accomplish this? format fdformat hformat mkfs mkhfs

14 Which of the following directories stores the package database for the Red Hat Package Manager? /etc/var/rpm /var/lib/rpm /etc/lib/rpm /var/rpm/db

15A technician is setting up a Linux workstation to automatically get all of the correct IP settings as soon as it boots. Which protocol should be configured on the workstation to accomplish this? DNS ARP DHCP NetBEUI default gateway 16Which of the following is the most widely supported package type available in Linux? RPMs DPMs tarballs gzip

17 You have decided to install your new Linux distribution by using the bootable CD that came with it. What must be configured before you can boot from the CD? CMOS NVRAM BIOS Hard drive

18You have tried to install a particular RedHat package but it keeps telling you that it has a "failed dependency". What would cause this error? The package depends on certain user input. The package depends on operating system input. The package depends on another package being installed. The package depends on hardware that is not present in the computer.

19A file system is written to a partition when a hard drive is formatted. Which three of the following file systems can be used in a typical Linux installation? (Choose three.) NTFS ext2 ext3 FAT FAT32 Reiser

Module 10: Study questions
1 Which of the following commands will allow only the owner of a file named programs to execute the file? chmod 664 programs chmod 544 programs chmod 422 programs chmod 462 programs

2

In Linux, which command allows users to learn more about any command? cal man help doskey

3

In Linux, which command is used to switch from the X Window GUI to the CLI? Ctrl+Alt+(F1-F6) Shift+Ctrl+(F1-F6) Shift+Alt+(F1-F6) Ctrl+Delete+(F1-F6)

4

Which of the following is a translator that allows Linux and UNIX systems using PostScript to print to non-PostScript printers? Printcap Chatscript Linuxscript Ghostscript Printscript

5

A user wants to disable the Telnet and FTP services in Linux. In the configuration file, which character would the user place at the beginning of the Telnet or FTP line? x ? # !

6

Which file must be edited by the Linux administrator to manually disable a user's password? /etc/passwd /user/shadow /etc/shadow /root/shadow

7

In which file does the activation of the Linux FTP service take place? /etc/conf/init.d /etc/conf.d /etc/rc.d/init.d/xinetd /etc/activate/inetd

8

Which command character allows users to enter the vi edit mode? # i e >

9

Which of the following Linux daemons listens for incoming requests and forwards each request to the appropriate daemon? HTTPD LPD crond syslogd inetd

10 What is X Window? It is server software to setup web services in Linux. It is software that allows users to set the number of open Telnet windows in Linux. It is a GUI interface for Linux. It is mail client software for Linux.

11 What are Pico and vi? versions of Linux Linux CLI commands text editors user desktop environments

12 Which file is used by a Linux computer to determine which printers are online and available for printing? /etc/printcap /etc/lpd /etc/print/lpr /etc/lprd

13 Which of the following configuration files determines the default runlevel at system startup? /etc/rc/init /etc/inittab /etc/init/rc.d /etc/rc.d/inittab

14 Which of the following files can be edited to allow a user other than root to use the umount command? /etc/lilo.conf /etc/fstab /etc/var/mnt /var/mnt

15 On a computer running Linux, which attribute prevents anyone other than the owner of a file, the directory owner, or root from renaming or removing files in a directory?" owner bit no override lock sticky bit

16 In the path /etc/rc.d/rc#.d, what is specified by the #? the number of columns in the file the priority associated with the file in the directory the runlevel associated with the file the number of users who can concurrently access the file

17 In Linux, which command is used to rename a directory? mv cd dir mkdir

18 In Linux, which command is used to create a new directory? md mdir dir mkdir

19 Which of the following indicates only read and write permissions when used with the chmod command? 4 5 6 7

20 Which service can be deployed as a more secure alternative to Telnet? FTP NFS SSH TFTP

21 Which Linux process will automatically run scheduled tasks at a specified time? run crond sched auto

22 Which scripting language is basic to the Linux OS? VBScript shell script JavaScript Perl Script

23 On a Linux system, which configuration files contain user account information? (Choose two.) \etc\shadow /etc/passwd /etc/user/passwd \etc\passwd /etc/shadow /etc/user/passwd

Module 11: Study questions
1 Which Linux command is used to create partitions on a hard disk? mkdev fdisk mkfs fsck

2

What are two guidelines that an administrator should follow to maintain a healthy hard drive? (Choose two.) limit the amount of RAM available to individual users defragment the hard drive regularly allow users to use all available storage with no limits continually manage available disk space do not limit the size of user home directories

3

Which statement is true when the SUID bit is set as the root account for a program? Root cannot execute the program. Only root can execute the program. Any user can execute the program using root account permission. Users can execute the program only if they belong to the same group as the owner of the program. Only the owner of the program can execute the program.

4

Which setting determines if a program will run with the permissions of its assigned group or the permissions of the user's groups? SUID GUID SSID SGID

5

What are three key concepts when analyzing and optimizing network performance? bottlenecks, baselines, and best practices baselines, base logs, and best practices best practices, base logs, and bottlenecks baseline, bottlenecks, and backups

6

Which of the following can be used to monitor system resources in Windows XP and Windows 2000? Event Viewer Scandisk Performance Tool Task Scheduler Checkdisk

7

What is the function of the /etc/crontab file in Linux? to schedule system jobs to schedule user jobs to validate created processes to remove cron jobs

8

Linux administrators have several CLI commands available to display information on system resources. What is the output associated with using the du command? a display of disk usage for a file system a display of disk usage for a directory a display of disk usage for file information a display of the user's remaining disk space

9

Which Linux command can be used to terminate processes that are consuming too many system resources? at stop kill term kip

10

Which output does the df command produce when executed from the Linux CLI? detailed information about the file system detailed information about the top-level directory detailed information about CPU and RAM usage detailed information about the data stored on the disk

11

Which file can be studied by programmers to determine the potential cause of a program crash? Core Dump Script Debugger Process Tracker Trace File Error Pack

12

Which of the following statements is true about the use of Performance Tool? Performance Tool is only available for use on Linux computers. Performance Tool should be used sparingly since it uses valuable system resources. Performance Tool can only be used to monitor network computers. Performance Tool can only be used in conjunction with a pre-established baseline.

13

A system unexpectedly shuts down due to power failure. As a result, the file system is damaged. Which Linux command could be used to repair the file system? mkfs fsck diskcheck filrep ps

14

Which of the following can be used to execute a series of Linux commands at a specified time? which run time at when

15

When should a baseline reading of network performance be made? at the busiest time of day when the network is running normally at the least busy time of day when the network is not in use

16

Which of the following tools can be used to analyze Linux system log files? Logcheck Regscan Filecheck Scanfile

17

Which Linux command can be used to terminate a group of processes that have the same name instead of terminating them with their PID numbers? term stop killall halt

18

Which Linux command is used to create filesystems on a partition? mkdev fdisk mkfs fsck

19

Which disk management tool is available to limit the amount of data a user can store on a network? disk quota disk ceiling disk limit disk wall disk container

Module 12: Study questions
1 Which version of the Linux kernel includes ISA PnP support that does not require the isapnp program? 2.1.x 2.2.x 2.3.x 2.4.x

2

Which insmod option will automatically unload the module when it is no longer being used? -s -p -f -k

3

Which of the following is an OS-independent component that is responsible for basic hardware and resource configuration before the OS loads? USB ports SCSI BIOS CPU

4

What would be the most important feature to consider when selecting a video card for a workstation based on performance? warranty amount of on-board RAM manufacturer price

5

Which two steps should a technician perform first when troubleshooting a new EIDE hard drive installation that a computer does not recognize? (Choose two.) check CMOS to ensure that the hard drive settings are correct ensure that the drive has the correct master or slave jumper settings ensure that the kernel contains the correct drivers for the drive make sure the device number and termination are correct

6

Which option of the insmod program will send output to a log file instead of the console? -s -p -f -k

7

A new EIDE hard drive has been added to a Linux workstation. The hard drive is functioning but performance is poor. What should the administrator do first to check the installation? ensure that the ribbon cable connector being used is the one closest to the motherboard ensure that the jumpers on the hard disk are set to configure it as the master drive on EIDE channel 1 repartition the disk to create smaller partitions use the hdparm utility to test the disk and set options

8

What is the most common cause of core system hardware failure? static discharge overheating incorrect drivers excessive use and age physical damage

9

Some PCMCIA driver packages allow drivers to be mounted while a device is installed and unmounted when the device is removed from a laptop. Which feature makes this possible? ACPI Card Services lsmod mount sleep umount

10

Which insmod option will instruct the program to load the module even if the module was compiled for a different kernel? -s -p -f -k

11

What is the main concept to be aware of when installing hardware on a Linux system? price type of device compatibility number of slots available

12

Which Linux file needs to be edited to specify an IRQ for an Ethernet card? /lilo.conf /irq.conf /etc/lilo.conf etc/loli.conf /etc/irq.conf

13

A technician is adding an internal PnP modem to a system, but a check of system resources shows that all available IRQs are reserved or being used by other devices. What could the technician do to get the device to work? manually assign the IRQ of another device that is not expected to be used at the same time as the modem use trial and error to find an IRQ that will work with the modem configure the modem to work without an IRQ change CMOS settings to allow the BIOS to free up an unused IRQ configure the modem to use a DMA address instead of an IRQ

14

Which two of the following statements about SCSI devices and configuration are true? (Choose two.) The SCSI controller needs to be terminated if it is at the end of a chain. A forked chain occurs when two SCSI cables are connected to a single controller. Throughput can be reduced if all SCSI devices are not the same variant. All SCSI devices in a chain must have the same device number.

15

Which program is used to insert a single module into the Linux kernel? imsmod smod ismod insmod

16

How is PnP handled in a Linux system? (Choose two.) isapnp program iopnp program ISA configuration option in control panel ISA configuration option in the Linux kernel

17

Which of the following factors should be considered when installing a SCSI drive to ensure system compatibility? (Choose three.) variant RPM ID termination drive size average seek time

18

A module needs to be loaded. However, confirmation that the Linux kernel can load the module is important. Which of the following options of the insmod program will accomplish this task? -s -p -f -k

19

Which of the following Linux files can be viewed to see resource allocations? (Choose three.) /proc/interrupt /proc/dma /proc/imports /proc/ioports /proc/alloc

20 On a Linux system, which of the following files will show the interrupt request number allocation? /dev/interrupt /proc/interrupt /interrupt /var/interrupt

Module 13: Study questions
1 An administrator is responsible for a mixed Linux/Windows network. The administrator has configured a new computer with the Windows XP operating system. The administrator then attempts to ping it from a Linux computer but fails. What should the administrator do next? try to ping the Windows computer from another Windows computer run ifconfig on the Linux machine and specify the IP address of the Windows computer run ipconfig on the Windows machine to ensure it is set up correctly run ping 127.0.0.1 on the Windows system

2

Which command is used to determine the active TCP connections on a computer? ping ICMP ifconfig traceroute netstat

3

In a Linux system, the set of recent kernel messages is known as the kernel ring buffer. Which command displays these messages? dmesg imesg kmsg rmesg

4

What is the simplest and most recommended method of creating a custom emergency boot disk for Linux? Run the btdisk command. Modify one of the existing boot disks. Copy individual boot files to a floppy. Download a custom configuration from a Web site.

5

Which type of files can be helpful in identifying several types of problems in a Linux server? security files user data files log files text files

6

What is the easiest way to stop a non-responsive process in a Linux system? issue the stop command issue the kill command log out and log back in again press Ctrl-Alt-Del and click Stop when the Task Manager appears

7

Which two files are commonly used to access the tape backup devices? (Choose two.) /dev/ht0 /dev/hd0 /dev/nst0 /dev/tp0

8

Why is it necessary to use the appropriate Sys V script to stop some processes? It is the only way to stop some services. It is the best way to stop zombie processes. It will prevent lock files from causing error messages. It will save the data that has been processed.

9

While booting a Linux server, the booting process has stopped. Upon troubleshooting, an 'L' error code is discovered. What does this indicate? No part of LILO loaded. The second stage of LILO did not load. The first and second stages both loaded, but the second stage will not run. The disk descriptor table (/boot/map) is corrupt.

10

Which statement best describes the LOADLIN program? It is a text editor. It is an MS-DOS utility used to load a Linux kernel. It is a command line interpreter. It is a Linux kernel program that loads and executes applications.

11

Which parameter can be used with tar to list the contents of an archive? -a -i -l -t

12

In Linux, what is the first program that takes control of the boot process from the BIOS? kernel LILO config.sys linux.sys

13

What is the loopback address that a technician would ping to verify that TCP/IP is correctly installed? 192.0.0.1 127.0.0.1 168.0.0.1 223.0.0.1

14

What is the best way for an administrator to determine if a server is overloaded? ask users if the service has declined keep a record of the frequency of server crashes monitor the network load and note when it becomes very high check the server log files

15 Which Linux log file is most likely to contain the word oops? /var/log/messages /var/log/error /var/log/syslog /var/log/secure

Module 14: Study questions
1 Which two options accurately describe network security? (Choose two.) As security increases, the level of accessibility increases. As security increases, the level of accessibility decreases. Users want more accessibility and administrators want more security. The level of security required is the same for all organizations.

2

According to SANS, which three of the following services are among the top ten security vulnerabilities of Linux? (Choose three.) Remote Procedure Calls Dynamic Host Configuration Protocol MySQL Secure Shell Apache Web Server RMON

3

Several computers on a network are running slow and many user tasks are timing out. The administrator checks the network and finds duplicate copies of program code in the active memory of each computer. Which of the following options best describes this selfreplicating code? virus Trojan horse worm bug

4

Which three of the following terms refer to the public network that acts as a buffer area between a firewall and a boundary router? (Choose three.) Internet DMZ extranet sacrificial LAN dirty LAN demarcation zone

5

Which directory should be used for decompressing LSAT? /usr/bin /etc/bin /usr/local/bin /usr/sbin /etc/local/bin

6

Which three of the following items should be included in a security policy to increase the level of password control? (Choose three.) Passwords should expire after random periods of time. Passwords should be familiar names or words, so that users will not have to keep written reminders near computers. Passwords should be a combination of letters and numbers. Written rules should be distributed to advise users of password expiration and lockout policies. All passwords should be changed by the user after a specified period of time.

7

Which of the following options best describes Network Address Translation? Network Address Translation usually replaces proxy services and packet filters. Network Address Translation uses private addressing to hide inside hosts from outsiders. Network Address Translation is used to alter the destination address of packets leaving a secure network. Network Address Translation allows packets to be filtered as they enter or leave the network.

8

Which three OSI model layers are used for packet filtering? (Choose three.) Layer 2 Layer 3 Layer 4 Layer 5 Layer 6 Layer 7

9

Which statement accurately describes a Smurf attack? The IP headers of ping requests are spoofed so that replies will overwhelm the target host. The IP headers of SYN requests are spoofed so that a target will attempt to reply to itself. This DoS attack overflows buffers by sending illegally large ping requests to the target. This attack exploits the three-way handshake used with TCP.

10

Which of the following options refers to a software-based, real-time network IDS that is designed for smaller networks? PIX Snort Smurf proxy server

11

Which statement is true about username and password standards? Complex usernames are less important than complex passwords. Standards should only be applied to passwords. Users should select their own usernames. Usernames should expire every three months. Passwords should be simple and easy to remember.

12

How can developing an e-mail policy protect a network from viruses? An e-mail policy will state what can be sent and received so that users will no longer need to be made aware of security issues. An e-mail policy will make it safe for users to open all attachments. An e-mail policy will define what can be sent and received to make users more aware of security issues on the network. An e-mail policy will require users to notify the other users on the network as soon as a threat is suspected.

13

Which two of the following options provide a basic firewall solution by using rules to control network traffic? (Choose two.) proxy services ip masquerade packet filters Network Address Translation access control lists

14

Which two of the following protocols are used by IPSec? (Choose two.) Encrypted Secure Header Encapsulating Security Payload Authentication Header Authenticated Secure Header

15

Which of the following options best describes the characteristics of an IDS? hardware, inspects all network activity, denies or permits access using filters, signals an alarm hardware or software, limits access to prevent intrusion, inspects all network traffic software, designed to identify intrusion using a set of patterns, signals an alert inspects all network activity, identifies suspicious patterns, signals an alert

16

Which three of the following vulnerabilities have been overcome in newer versions of operating system software? (Choose three.) ping of death attack land attack Teardrop buffer overflow

17

Which three of the following options are necessary to protect against the threat of viruses? (Choose three.) Outgoing traffic should be filtered at all gateways. Incoming traffic should be filtered at all gateways. Current virus protection software should only be installed on incoming gateways. One administrator should issue all virus warnings. Policies should be created to control outgoing e-mail. Virus protection software should be current on all computers.

18

Which two of the following statements correctly describe audit trails? (Choose two.) Audit trails secure a network. Audit trails help maintain security on a network. Audit trails back up data on a network. Audit trails are used to recover lost data. Audit trails are used to allocate network resources.

19

To create a security policy, which of the following actions should occur first? All servers should be placed in a secure, central location. All users should be surveyed to identify potential security threats. All users should receive written guidelines of what is acceptable and allowed on the network. All users should receive instructions outlining how to install and upgrade virus software.

20 Which DoS attack uses fragments with overlapping reassembly information to take advantage of the way IP handles fragmentation? SYN attack Teardrop ping of death land

Sign up to vote on this title
UsefulNot useful