Professional Documents
Culture Documents
Version : R6.1
www.Prepking.com
www.Prepking.com
1. When mounting a file system from an NFS client, which configuration file is used to name the local mount point? A. fstab B. nfstab C. exports D. nfs.conf Answer: A
2. What is the meaning of the following ARP table entry? = # arp -a foo (10.0.0.2) at (incomplete) A. Node foo only supports proxy ARP. B. The ARP table entry for node foo has expired. C. An ARP request was sent for node foo, but there was no ARP response. D. An ARP request was sent for node foo, but only a partial response was received. Answer: C
3. How should you grant NFS filesystem access to individual users as opposed to all users? A. create a group accessible mount point B. specify a netgroup in the /etc/exports file C. add the users to the /etc/exports file using the form host:uid/gid D. add the users to the /etc/exports file using the form host:username Answer: B
4. Which protocol allows your server to discover the IP address of another server based on the other server's name? A. ARP B. PPP C. DNS D. DHCP
www.Prepking.com
E. BOOTP Answer: C
5. What is used for the implementation of Internet name designations as specified in RFC 1034 and RFC 1035? A. INS B. BIND C. SIND D. DHCP Answer: B
6. A customer reports that pings to node FOO take a long time, then fail with "unknown host". Of the options given, what is the next logical troubleshooting step? A. telnet FOO B. nslookup FOO C. ps -ade | grep ping D. ping the IP address of FOO Answer: B
7. Which directory does the template for your new sendmail.cf file reside? A. /etc/mail/ B. /etc/mail/sendmail/ C. /usr/share/sendmail-cf/ D. /usr/newconfig/etc/mail/ E. /var/templates/shared/mail/ Answer: D
8. Given the following configuration in the named zone file: hp.com IN MX 10 tiger.hp.com IN MX 20 mail.hp.com
www.Prepking.com
IN MX 30 relay.hp.com
Assuming tiger.hp.com is NOT accessible through the firewall, which statement is true regarding messages addressed to tiger.hp.com? A. Incoming mail will be returned to sender as undeliverable. B. Incoming mail will arrive on mail and will be forwarded to relay waiting on tiger. C. Incoming mail will arrive on tiger but will not be accessible until the firewall is turned off. D. Incoming mail will arrive on mail and will be forwarded to tiger as it becomes accessible. Answer: D
9. When you start the sendmail service, you would like to have the mail written to /var/adm/syslog/mail.log. What should you do? A. Modify the mail.conf file to add the new location. B. No special action is required because that is the default location. C. Append -oL/var/adm/syslog/mail.log to the end of command line. D. Append -f/var/adm/syslog/mail.log to the end of the command line. E. Append -lf/var/adm/syslog/mail.log to the end of the command line. Answer: B
10. When you set up an 8 CPU DHCP server, how many subnets can you configure per pool? A. 1 B. 2 C. 4 D. 8 Answer: A
11. Which states are valid for DHCP? (Select two.) A. init B. select C. rebind D. reboot
www.Prepking.com
E. broadcast Answer: DE
12. Which combination of NFS mount options provides the best chance of avoiding client hangs? A. retry=2,hard B. retry=4,soft C. retry=6,hard,intr D. retry=3,retrans=6 Answer: B
13. Which command dismounts an NFS mounted filesystem? A. mount -r /mnt B. unmount /mnt C. mntab -x /mnt D. umount server:/mnt Answer: D
14. During the configuration process for sendmail, which command is run to determine the default hostname to be used for delivery? A. uname -s B. getuname C. sendmail -h D. hostname -s E. gethostname Answer: E
15. What does the DHCP device group allow for? A. automatic startup of DHCP tools B. multiple subnets to be specified for each pool C. callback routines within the /etc/dcptab file
www.Prepking.com
16. Execution of the telnet foo command results in a connection refused by foreign host error message. Which file on node foo could be modified to allow TELNET connections? A. /etc/hosts B. /etc/networks C. /etc/inetd.conf D. /etc/svc.conf Answer: C
17. What is an SNMP trap? A. an event sent by the Network Management Station to a client B. host response to a Network Management Station status request C. an unsolicited event notifying the Network Management Station of a change D. Network Management protocol interrupt generated by a Management Station Answer: C
18. Which file is the configuration file for the Network Time Protocol daemon? A. rc.conf B. ntp.conf C. timed.conf D. ntp_config.file Answer: B
19. Which /etc/inetd.conf entries should be disabled in order to disable the remote procedure calls to the system? (Select two.) A. rpc.rexd B. rpc.ncall C. rpc.rusers
www.Prepking.com
D. rpc.remsh Answer: AC
20. In order to restrict the access to the /etc/passwd file through ftp, which statement should be included in the /etc/ftpd/ftpaccess file? A. noaccess B. noretrieve C. accessdeny /etc/passwd /etc/passwd /etc/passwd
21. Which file can be used to protect NIS clients from binding to an unauthorized NIS server? A. /var/yp/securenets B. /var/yp/securebinds C. /var/yp/secureclients D. /var/yp/secureservers Answer: D
22. In order to avoid including the ftpd version in the FTP login banner, which statement should be included in the /etc/ftpd/ftpaccess file? A. suppresssysinfo B. suppressversion C. avoidftpdversion yes yes yes
23. The sendmail is configured to run as a central post office for your group. Users are able to send mail to any location but cannot receive mail. What is the problem? A. Users need to configure sendmail client to view thier mail.
www.Prepking.com
B. Users cannot use sendmail to deliver their mail to a workstation. C. The system adminstrator needs to set permissions on, so sendmail has privileges. D. Users need to set permissions on thier mail directory so sendmail has write privileges. Answer: B
24. A customer wants to secure their network services. Which file should be edited to deny access to the NFS rpc.mountd by special systems? A. /etc/services B. /etc/inetd.conf C. /var/adm/inetd.sec D. /etc/rc.config.d/netconf E. /etc/rc.config.d/nfsconf Answer: C
25. In order to avoid including the system's hostname in the FTP login banner, which statement should be included in the /etc/ftpd/ftpaccess file? A. suppresssystemid B. avoidhostname C. suppresshostname yes yes yes
26. Which file can be used to protect an NIS server from binding to an unauthorized NIS client? A. /var/yp/securenets B. /var/yp/securebinds C. /var/yp/secureclients D. /var/yp/secureservers Answer: A
www.Prepking.com
27. Your corporate security policy dictates that the operating system version must not be displayed before or after a successful login. Which file should be modified after installing the operating system to meet the stated policy? A. /etc/motd B. /etc/issue C. /etc/services D. /var/adm/inetd.sec Answer: B
28. You new to ensure that only approved networks and hosts are allowed to use the telnet service on the system. Only the 128.1 network, subnets 1-9 on the 128.2 network, and maintenance clients host1 - host4 can be granted access to the telnet service. Which file must be configured and how? A. Configure the GSP for the system to control telnet access. B. Edit the /etc/securtty file and comment out the telnet service. C. Edit the /etc/inetd.conf file and comment out the telnet service. Execute the command inetd -c to commit the change. D. Edit the /etc/default/security file and include the entry "telnet allow 128.1.*.* deny 128.2.10*.* host1-4". E. Edit the /var/adm/inetd.sec file and include the entry "telnet allow 128.1.*.* 128.2.1-9.* host1 host2 host3 host4". Answer: E
29. In order to restrict the access to the /etc/shadow file through ftp, which statement should be included in the /etc/ftpd/ftpaccess file? A. noaccess B. noretrieve C. accessdeny /etc/shadow /etc/shadow /etc/shadow
30. To restrict root login to the console, which file must be configured?
www.Prepking.com
100% Pass Guaranteed or Full Refund Word to Word Real Exam Questions from Real Test Buy full version of exam from this link below http://www.prepking.com/HP0-094.htm