You are on page 1of 175

Pat Greene is working as a network administrator at XYZ Inc. Pat implements a directory service to store data at a centralized location.

Pat is informed that: -The authorized users are not able to access the Directory server as a malicious user is identifying the hardware and software environment of the directory server. -After identifying the capacity of the directory server, the malicious user is sending more traffic than what the server can handle. Which technique does this type of attack illustrate? SYN attack Buffer overflow attack Indirect resource consumption Direct resource consumption Jim Lewis wants to migrate a .NET application to a Linux platform. To perform the task, Jim compiles the application on the Windows platform. He then copies the compiled source code of the application to the /usr/src directory of the Linux computer, on which the application will be run. After copying the source code to the /usr/src directory, Jim needs to compile the application source code on the Linux platform. In addition, Jim wants to generate debugging information and ignore the warning messages displayed during the compilation of the source code. What should Jim do to perform the required tasks? Use mcs command with debug and fatal options. Use mono command with security and v option Use mcs command with debug and nowarn options. Use mono command with aot and config filename options. Technology Systems is an IT organization based at Atlanta. The organization decides to open a new development center at Florida. The management of the organization asks John Barrett, the network administrator, to configure a mail server at this new center. For this, John needs to install send-email packages. John observes that the binary RPM package for send-email package is not available on the network, however, the Source RPM (SRPM) package is available. Therefore, John decides to build binary RPM package from SRPM. What should John do to perform the task?

Execute rpmbuild bSTAGE [options] /usr/src/redhat/SRPMS Execute rpmbuild bSTAGE [options] /usr/src/redhat/SPECS Execute rpmbuild bSTAGE [options] /usr/src/redhat/SOURCES Execute rpmbuild bSTAGE [options] /usr/src/redhat/BUILD Technology Systems is a .NET applications development organization, based in the US. The organization uses the Window platform for developing .NET applications. To provide more security to the .NET applications, the organization asks to Tom Wilkins, the network administrator, to migrate the .NET applications to the Linux platform. The organization also asks to Tom to precompile the code in an assembly language. To perform the task, Tom compiles the source code of the .NET application to generate the .exe file, named temp.exe. Now, to execute the .NET application, Tom uses following the code snippet: # mono-config filename sample.exe However, Tom finds that the above code snippet is not giving the desired results. What should Tom do to solve the problem? Tom should use the following: # mono-V sample.exe Tom should use the following: # mono--aot sample.exe Tom should use the following: # mono--security sample.exe Tom should use the following: # mono--config filename sample.exe

Larry Williams is working as a system administrator at BlueMoon Computers. Larry observes that the performance of the server is decreasing as the users in the organization are excessively querying one section, employee information, of the server. The management, therefore, asks Larry to distribute the directory to improve the performance of the server. After distributing a directory, such that Server1 maintains the information about the organizational information while the employee information is maintained by Server2. Now, Larry needs to verify the correctness of the data stored in Server2. For this, Larry executes the following command:

# slapcat -H C ldap://Server2.bluemooncomputers.com/ -LL -x -b "dc=bluemooncomputers,dc=com" "(ou=*)" ou However, Larry is not able to retrieve results from the Server2, which contains the employee information. What should Larry do to perform the required task? Use # ldapsearch -H C ldap://Server2.bluemooncomputers.com/ -LL -x -b "dc=bluemooncomputers,dc=com" "(ou=*)" ou Use # slapindex -H C ldap://Server2.bluemooncomputers.com/ -LL -x -b "dc=bluemooncomputers,dc=com" "(ou=*)" ou Use # slapadd -H C ldap://Server2.bluemooncomputers.com/ -LL -x -b "dc=bluemooncomputers,dc=com" "(ou=*)" ou Use # slapcat -c H ldap://Server2.bluemooncomputers.com/ -LL -x -b "dc=bluemooncomputers,dc=com" "(ou=*)" ou command command command command

Ed Young is a network administrator at Global Systems. The organization implements Linux on all its workstations and servers. Ed wants to open a .zip file on his Linux-based workstation. The file was compressed using the Windows WinZip utility. Therefore, he installs WinZip on his workstation. After installing WinZip, Ed types the following code snippet at the shell prompt to run the WinZip utility: $ Wine ~/.wine/Program\ Files/WinZip/WINZIP32.EXE ? However, when Ed executes the snippet, it does not provide the required output. What should Ed do to solve the problem? Ed needs to write the following code snippet: $ wine ~/.wine/drive_c/Program\ Files/WinZip/WINZIP32.TXT ? Ed needs to write the following code snippet: $ wine drive_c/Program\ Files/WinZip/WINZIP32.EXE ? Ed needs to write the following code snippet: $ wine /Program\ Files/WinZip/WINZIP32.EXE ? Ed needs to write the following code snippet: $ wine ~/.wine/drive_c/Program\ Files/WinZip/WINZIP32.EXE ?

Consider the statements: Statement A: The BOOTP server contains the information about the configuration of the computers on which Linux needs to be installed. Statement B: During the Kickstart installation of Linux over a network, the Kickstart client needs to have either the network information or the files required for installing the Linux operating system. Which of the following is true, with respect to the above statements? Both, statements A and B, are false. Statement A is false and statement B is true. Statement A is true and statement B is false. Both, statements A and B, are true. Which ACLs configuration parameter disables all the permissions of the authorized users accessing the OpenLDAP server? Write Compare Auth None Tom Wilkins is working as network administrator at Quality Software Developers. All workstations and servers in the organization form a Local Area Network (LAN). Tom wants to implement a Red Hat Network (RHN) to manage these systems. He needs to configure a server to enable the RHN and LAN users to exchange information, such as software updates and solutions to software related problems, even when the users are offline. He also wants to prevent unauthorized access to the LAN servers. What should Tom do to accomplish this task? Tom should configure a Firewall server. Tom should configure a Proxy server. Tom should configure a Satellite server. Tom should configure a Hosted server. Nancy Jones the network administrator at Technology Systems is responsible for monitoring the network of the organization. While

monitoring the network, Nancy observes that the RPM packages installed on the Linux servers are of an older version than required and do not provide required functionalities. Therefore, Nancy decides to install an updated version of the RPM packages. For this, Nancy downloads a new RPM package, but observes that the package installation files are not executing properly. What should Nancy do to solve the problem? Run the ethereal command at the shell prompt Run the strace command at the shell prompt Run the tcpdump command at the shell prompt Run the itrace command at the shell prompt Technology Systems is a leading developer of computer applications. The organization has its head office in California and two branch offices in New York and Toronto. There are three departments in the organization: Marketing, Programming, and Accounting. The Programming department is divided into two groups, Windows group and Linux group. The branch offices are connected to the head office by a 56 Kbps leased line. Now, each branch office runs as a separate entity, with its own network, reporting structure, and constraints. The organization has no centralized IT management group, and separate administrators at each branch office manage the network. Since the organization has multiple servers but no centralized management of the information, it faces the data-related problems, such as data redundancy and data inconsistency. To avoid these data-related problems in the organization, Jim Lewis, the system administrator at the head office, decides to install and configure the OpenLDAP Directory service. Through the use of OpenLDAP Directory service, Jim wants to provide authentication service in the organization. This authentication service authenticates the employees to the directory server by providing the employees encrypted tickets for a short duration. During the period when the ticket is valid, an employee can access the directory service without providing a password. Now, to implement the above authentication mechanism, which prerequisite software package must be installed and configured by Jim before installing OpenLDAP, and what is the command entered by Jim to install the prerequisite software package?

Jim must install the Kerberos software package Jim must enter the following command to install Kerberos: # rpm qa | grep krb5-server Jim must install the Kerberos software package Jim must enter the following commands to install Kerberos: # rpm ivh krb5-server-1.2.7-19.i386.rpm # rpm ivh pam_krb5-1.70-1.i386.rpm # rpm ivh krb5-libs-1.2.7-19.i386.rpm # rpm ivh krb5-devel-1.2.7-19.i386.rpm # rpm ivh krb5-workstation-1.2.7-19.i386.rpm Jim must install the SASL software package Jim must enter the following commands to install SASL: # rpm ivh cyrus-sasl-md5-2.1.15-3.i386.rpm # rpm ivh cyrus-sasl-plain-2.1.15-3.i386.rpm # rpm ivh cyrus-sasl-2.1.15-3.i386.rpm # rpm ivh cyrus-sasl-gssapi-2.1.15-3.i386.rpm # rpm ivh cyrus-sasl-devel-2.1.15-3.i386.rpm Jim must install the OpenSSL software package. Jim must enter the following commands to install OpenSSL: # rpm ivh openssl-0.9.7a-22.1.i386.rpm # rpm ivh openssl-devel-0.9.7a-22.1.i386.rpm # rpm ivh openssl096b-0.9.6b-13.i386.rpm Which of the following Bugzilla feature helps in searching and displaying the identified bug in the bug lists of the bug tracking system? Localization Request System Enterprise group support Sanity check Tom Wilkins is working as a system administrator at SSPT Corporation. To provide communication between these branch offices, Tom needs to provide an e-mail facility and shared Internet access in the organization. For this, he needs to update the Linux kernel of a server to embed the required services into the existing communication system. After updating, he needs to configure the kernel source code, which is of very large size. He also needs to compile the kernel

source and resolve all the dependencies after configuring the kernel source code as required. He also wants to remove all the unused files. What should Tom do to accomplish this task? Tom should use the following commands: #make oldconfig # make zImage # make modules_install Tom should use the following commands: # make oldconfig # make xconfig # make install Tom should use the following commands: # make dep # make bzImage Tom should use the following commands: # make menuconfig #make oldconfig #make mrproper Safest Software Co. is a multinational company that has opened its new branch at New York. The company needs to maintain the data of all the employees in a directory to reduce all data related problems, such as data redundancy and to allow the employees of the company to view the data. The company assigns the task of deploying a directory server in the company to the system administrator, Tom Wilkins. Tom deploys OpenLDAP server to perform the task and decides to configure the overall performance of the OpenLDAP server, such as size of log files and connection timeout value. Tom uses a parameter that allows him to enable or disable a specific set of users from accessing a set of attributes or entries on the OpenLDAP server. Which parameter does Tom use to perform the desired task? access to<what> [ by <who> <access> <control> ]access to<what> [ by <who> <access> <control> ]+ Nodefaultaccess { none | auth | compare | search | read | write} defaultaccess { none | auth | compare | search | read | write} Donna Bard is working as a system engineer at ABC corp. The company uses LDAP directory schema to reduce data redundancy problems and to maintain data integrity. This directory stores the record of

employees,such as name, age, and year of birth. Now, the company assigns a task to Donna to design a new object class, myPerson, which is extended from the existing object class, inetOrgPerson. The company also asks donna to define a new attribute type, dob, in the my Person object class. The attribute type, dob, stores the date of birth of the employees of the company. Donna uses the following code snippet to define the dob attribute type and the object class, myPerson, respectively: 1.) ( dob-OID NAME DESC 'birthday day-month'

EQUALITY caseIgnoreMatch SUBSTR caseIgnoreSubstringsmatch SYNTAX bob 1.3.6.1.4.1.1466.115.121.1.15 ) 2.) ( myPerson-OID NAME 'myPerson' DESC 'Extended person' SUP inetOrgPerson STRUCTURAL MAY dob ) But, Donna finds that the above code snippet is not producing the required results. What code snippet should Donna use to perform the task? 1.) ( dob-OID NAME 'dob' DESC 'birthday day-month' EQUALITY caseIgnoreMatch SUBSTR caseIgnoreSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.1 15.121.1.15 ) 2.) ( myPerson-OID NAME 'myPerson' DESC 'Extended person' SUP inetOrgPerson STRUCTURAL MAY dob )

1.) SUBSTR

( dob-OID NAME 'dob' DESC EQUALITY caseIgnoreMatch

caseIgnoreSubstringsMatch 1.3.6.1.4.1.1466.115.121.1.15 ) 2.) ( myPerson-OID NAME 'myPerson' DESC 'Extended person' SUP inetOrgPerson STRUCTURAL MAY dob ) 1.) ( dob-OID NAME 'dob' DESC 'birthday day-month'

EQUALITY caseIgnoreMatch SUBSTR caseignoresubstringsmatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 ) 2.) ( myPerson-OID NAME 'myPerson' DESC 'implementing person' SUP inetOrgPerson STRUCTURAL MAY dob )

1.)

( dob-OID NAME 'dob' DESC 'birthday day amd month'

EQUALITY caseIgnoreMatch SUBSTR caseIgnoresubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 ) 2.) ( myPerson-OID NAME DESC 'Extended person' SUP inetOrgPerson ,myname, STRUCTURAL MAY dob ) Pat Greene is working, as a network administrator at Global Systems inc. The LDAP directory on the network server contains the information of the employees in the organization. Pat needs to add an entry of an employee in the LDAP directory from an LDIF file named temp1.ldif. Pat, therefore, uses the following command: # slapadd d temp1.ldif However, he is not able to add the entry. Which of the following commands will enable Pat to perform the required task? # slapmodify f temp1.ldif # slapadd u # slapdelete l temp1.ldif # slapadd l temp1.ldif Pat Wilkins is a system administrator with the Red Sky IT Systems. ABC Books, a client of the company, is an online bookstore, which stores information about books in a directory. The directory is accessed by multiple directory-enabled applications and accessed by multiple users. Tom Allen, the Business Manager at ABC Books, wants to expand companys business in the global market. To manage the increasing load required on the existing directory service, Tom directs Pat to create a new directory service. To implement the directory, Pat needs to install a software package called OpenLDAP. However, Pat finds that he needs to install a package called OpenSSL before installing OpenLDAP. To verify whether OpenSSL is already installed on the node, Pat enters the following command at the shell

prompt: # rpm ivh openssl-0.9.7a-22.1.i386.rpm However, Pat notices that the command is not producing required results. What should Pat do to solve the problem? Pat needs to enter the following command at the shell prompt: # rpm ivh openssl096b-0.9.6b-13.i386.rpm Pat needs to enter the following command at the shell prompt: # rpm ivh openssl-devel-0.9.7a-22.1.i386.rpm Pat needs to enter the following command at the shell prompt: # rpm qa | grep openssl Pat needs to enter the following command at the shell prompt: # rpm qa grep openssl Smartdevelopers is a leading software development organization. The organization maintains an LDAP Directory server to store information about employees of the organization. To enhance the security of the LDAP Directory server, Ronald Billing, the system administrator, needs to configure the LDAP Directory server to support Kerberos authentication. For this, Ronald needs to create Kerberos service principals for the LDAP server and extract them to a keytab file. What should Ronald do to perform the above task? Ronald should execute the following commands: # kadmin addprinc randkey ldap/smartdevelopers.com # ktadd k /etc/openldap/ldap.keytab ldap/smartdevelopers.com # chgrp ldap /etc/openldap/ldap.keytab # chmod 640 /etc/openldap/ldap.keytab Ronald should execute the following commands: # kadmin addprinc randkey ldap/smartdevelopers.com # ktadd k /etc/openldap/ldap.keytab ldap/smartdevelopers.com Ronald should execute the following commands: # chgrp ldap /etc/openldap/ldap.keytab # chmod 640 /etc/openldap/ldap.keytab Ronald should execute the following commands: # ktadd k /etc/openldap/ldap.keytab ldap/smartdevelopers.com # chgrp ldap /etc/openldap/ldap.keytab # chmod 640 /etc/openldap/ldap.keytab Which RPM of mono-1.1.zip file provides development support for IKVM, for the .NET CLR? mono-ikvm-1.1.6-1.novell.6.3.i586.rpm

mono-jscript-1.1.6-1.novell.6.3.i586.rpm mono-locale-extras-1.1.6-1.novell.6.3.i586.rpm mono-web-1.1.6-1.novell.6.3.i586.rpm Ken Burton is working as a network administrator at SuperGraphics Inc. The organization has implemented an LDAP server to enable the access to employee information of the organization. The management asks Ken to add entry of a new employee, Steve, to the LDAP directory. Ken wants to specify the input file from where the entry is added to the LDAP directory. In addition, Ken wants that new entry be added only when the password is correctly entered. Which of the following commands should Ken use to perform the required tasks? ldapadd command with c and r option ldapadd command with k and v option ldapmodify command with a and b option ldapadd command with f filename and W option SmartLabs is a multi national company that has 78 branches across the world. The company maintains a directory server for storing all the information about the companys product. Clients of the company access the directory server to obtain information about the products. The directory server has come under frequent hacking attacks in the past few months. This has led to hackers stealing and changing the confidential information stored on the server. Debbie Howe, the system administrator at SmartLabs, is assigned the task to provide security to the directory server from the hackers. For this, Debbie divides the data into various categories depending on the frequency of access to the data and the degree of loss to the company if the data is modified. Now, Debbie assigns various priority levels to the various categories of data. Which possible security consideration is Debbie implementing to provide security to the directory server? Administration of Identifying the Security Requirements of a Directory Sensitivity of data of Identifying the Security Requirements of a Directory User community of Understanding the Environment of the Organization Directory accessibility of Understanding the Environment of the Organization

Pat Greene, the network administrator, at InfoSuper Corp. The organization needs to implement data encryption and authentication protocols for user and file level security. The management, therefore, decides to implement Linux operating system for all business purposes. Pat installs Linux operating system on all the computers in the network of the organization. Pat is using kickstart installation method to automate installation. While deploying Linux operating system Pat gets an error message stating that ks.cfg file not accessible. What should Pat do to solve the problem? Pat needs to check for the mouse parameter and mention it in your ks.cfg file. Pat needs to check if the CD-ROM is in readable mode and that you have made the CD-ROM bootable. Pat needs to use the recent version of boot image file. Pat needs to need to check the path at root prompt or the directory name should be correct and accurate To set up the primary Kerberos server, you need to create the Kerberos database. Which command do you use to create the Kerberos database? # /usr/kerberos/kdb5_util create s # /usr/kerberos/kadmin5.local q addprinc ronald/admin # /usr/kerberos/sbin/kadmin5.local q addprinc ronald/admin # /usr/kerberos/sbin/kdb5_util create s Certified Carriers is an established computer-training institute, based in New Jersey. The institute has launched a new course on Linux administration that has been very successful. Therefore, the management wants to launch two new batches within the next week. For this, Corrine Wallace, the network administrator, needs to set up 60 Linux workstations. Corrine wants to use Kickstart installation that enables automatic installation of the operating systems on several computers simultaneously. To use Kickstart installation, Corrine needs to set up an installation sever, such as NFS server, or Apache server. While setting up NFS server, Corrine wants to copy the Linux installation files to the NFS shared directory. What of the following sequence of command, should Corrine follow to perform the task?

Run the following command sequentially: # mkdir /mnt/install ? # mount /dev/cdrom /mnt/cdrom ? # cp ar /mnt/cdrom/RedHat /var/www/html/install ? # cp /mnt/cdrom/.discinfo /mnt/install ? # umount /mnt/cdrom ? # mount /dev/cdrom /mnt/cdrom ? # cp ar /mnt/cdrom/RedHat/RPMS /mnt/install ? # umount /mnt/cdrom ? # mount /dev/cdrom /mnt/cdrom ? # cp ar /mnt/cdrom/RedHat/RPMS /mnt/install ? Run the following command sequentially: # mkdir /mnt/install ? # mount /dev/cdrom /mnt/cdrom ? # cp ar /mnt/cdrom/RedHat /mnt/install ? # cp /mnt/cdrom/.discinfo /mnt/install ? # umount /mnt/cdrom ? # mount /dev/cdrom /mnt/cdrom ? # cp ar /mnt/cdrom/RedHat/RPMS /mnt/install ? # umount /mnt/cdrom ? # mount /dev/cdrom /mnt/cdrom ? # cp ar /mnt/cdrom/RedHat/RPMS /mnt/install ? Run the following command sequntially: # mkdir /mnt/install ? # mount /dev/cdrom /mnt/cdrom ? # cp /mnt/cdrom/.discinfo /mnt/install ? # cp /mnt/cdrom/.discinfo /mnt/install ? # umount /mnt/cdrom ? # mount /dev/cdrom /mnt/cdrom ? # cp ar /mnt/cdrom/RedHat/RPMS /mnt/install ? # umount /mnt/cdrom ? # mount /dev/cdrom /mnt/cdrom ? # cp ar /mnt/cdrom/RedHat/RPMS /mnt/install ? Run the following command sequentially: # mkdir /mnt/install ? # mount /dev/cdrom /mnt/cdrom ? # cp ar /mnt/cdrom/RedHat /var/ftp/pub/install ? # cp /mnt/cdrom/.discinfo /mnt/install ?

# umount /mnt/cdrom ? # mount /dev/cdrom /mnt/cdrom ? # cp ar /mnt/cdrom/RedHat/RPMS /mnt/install ? # umount /mnt/cdrom ? # mount /dev/cdrom /mnt/cdrom ? # cp ar /mnt/cdrom/RedHat/RPMS /mnt/install ? Chris Donaldson is working as a system administrator at Red-Eye Experts. The organization uses different directories supplied by different vendors to store the data pertaining to the clients of the organization. The organization needs to integrate the directories with each other to facilitate data sharing. Chris attempts to integrate the directories, however the inconsistency and synchronization issues between data arise. Chris finds that the synchronization issues arise because the data stored in either of the directories can be modified without notifying the changes to the other directories. Therefore, the data stored in the directories becomes inconsistent due to these changes. What should Chris do to resolve the issues? By replicating the data from one directory to another. By joining and storing the information present in different directories on different platforms in a common and logical directory By converting one protocol format to another By integrating the distinct, isolated information stored at different places into one common logical volume Global Systems is a software development organization. Pat Greene, the network administrator, has used the Kickstart installation method to automatically configure workstations and servers according to the requirement of the organization. Which feature of the provisioning module does Pat use? Existing state provisioning Bare metal provisioning Configuration management Kickstart configuration writer Chris Donaldson is working as a system administrator at SuperGraphics Inc. Chris needs to integrate the samba with OpenLDAP to store the user information. Chris adds a new user Ronald in the OpenLDAP directory. Which command should Chris use to verify the existence of

user, Ronald in the OpenLDAP directory? # /usr/local/sbin/smbldap-usershow.pl ronald # smbldap-usershow.pl ronald # /usr/local/sbin/smbldap-usershow.pl # /usr/local/sbin/smbldap-usershow ronald Larry Williams is working as a system administrator at SSPT Corporation, which is a leading developer of computer applications. The organization has various departments and each department maintains its own database for storing information about the employees. Since information is stored in multiple data sources, the employees need to access several data sources for searching and retrieving information. This leads to data related problems, such as data redundancy and data inconsistency. To solve the data related problems, Larry decides to configure a directory service to centrally manage the data of the organization. Larry first creates a data design of the organization. She needs to specify the permissions of the directory-enabled applications installed in the organization, to update the data entries stored in the directory. She also needs to specify the authentication level for accessing the directory, for the various employees. What should Larry do to perform the above tasks? Define the data access and the data replication policies. Define a simple process for handling exceptions to the general policies. Define the data sources and data elements to be included in the Directory. Define the data access and data modification policies for the data stored in the Directory. Which option can be used with the scp command to recursively copy all subdirectories and files in the source directory to the destination directory? -q -r -p -v Which attribute of the migrate_common.ph file is used to customize the mail domain in the mail attribute in the migrate_passwd.pl

script? $DEFAULT_BASE $EXTENDED_SCHEMA $DEFAULT_MAIL_DOMAIN NAMINGCONTEXT Global Systems is a software development organization that provides customized software solutions. The organization uses kernel-2.4.21-4.EL on its Linux server. The management of the organization decides to upgrade the existing kernel to kernel-2.4.24 to enhance security and to acquire new hardware support. Pat Greene, the system administrator is assigned the task of upgrading the Linux kernel. After downloading the.tar.gz file containing the source code of the kernel in /usr/src directory, Pat needs to install the kernel source code. What should Pat do to perform the task? Pat needs to execute the following code snippet: # cd /usr/src # tar -zxcf linux-2.4.24.gz # cd linux-2.4.24 # ls al Pat needs to execute the following code snippet: # cd /src # tar -zxvf linux-2.4.24.tar.gz # cd linux-2.4.24 # ls l Pat needs to execute the following code snippet: # cd /usr/src # tar -zxvf linux-2.4.24.tar.gz # cd linux-2.4.24 # ls al Pat needs to execute the following code snippet: # cd /usr/src # tar linux-2.24.tar.gz # cd linux-2.4.24 # ls al Which attribute in the sambaAccount object, used to store the Samba related information in OpenLDAP, specifies the time when the

lmpassword and ntpassword are last modified? SambaLMPassword SambaNTPassword SambaPwdLastSet SambaLogonScript Pat Greene is working as a system administrator at InfoSuper Corp. The management asks Pat to migrate user information from the NIS server configured in the network of the organization to the OpenLDAP server configured on the same host. Pat needs to add user accounts and groups information contained in the LDIF format to the OpenLDAP database. What should Pat do to perform the required task? Create a file infosuper.ldif in the /tmp directory Specify the domain and base of your network in the /usr/share/openldap/migration/migrate_common.ph file. Edit the values of the DEFAULT_MAIL_DOMAIN and DEFAULT_BASE parameters Edit the migrate_common.ph file Which commands is used to set execute permission for /usr/bin/ssod directory? # mount 192.168.0.52:/list /usr/bin/ssod # service /mnt/nfs1 # ls /mnt/nfs1 # chmod +x /usr/bin/ssod Pat Greene is working as a network administrator at XYZ Inc. that has many offices at different locations. Pat wants to implement a Directory service in the company to store data at a centralized location. This enables Pat to access different directory services at a particular location in the network. Clients also access the directory. For security reasons, he also wants to restrict the clients and employees in a particular subnet from accessing important data in the directory. He also wants to specify the time intervals within which authorized users would be able to access the directory. What should Pat do to accomplish this task? Create replicas of the directory Implement Access Control List (ACL) Partition the directory Implement Microsoft Metadirectory Service (MMS).

company has a network of Linux- based computers at its offices. Each server provides a specific amount of memory space that can be shared among multiple users. Ron needs to increase the amount of shared memory in the server for additional users at the new branch office. The users at the new branch office need to use the shared memory and run processes on the servers. How should Ron modify the parameters on the Linux server to add the users from the new branch office? John needs to modify the min_percent parameter in the /proc/sys/vm directory and the shmmall parameter in the /proc/sys/kernel. John needs to modify the threads-max parameter in the /proc/sys/kernel and the max_percent parameter in the /proc/sys/vm. Ron needs to edit the shmmin parameter in the /proc/sys/kernel/shmmin file and threads-max parameter, stored in the /proc/sys/kernel. Ron needs to edit the shmmax parameter in the /proc/sys/kernel/shmmax file and threads-max parameter, stored in the /proc/sys/kernel. Don Allen is working as a network administrator at Technology Systems that provides software solutions to its customers. The enterprise maintains 100 database servers. Don needs to monitor free disk space and load average on these database servers. Therefore, he configures the Nagios monitoring tool in the enterprise and defines hosts and services that are to be monitored on the network. However, he observes that when any of the servers are not available on the network, he does not get any alerts and notifications regarding these network failures. Therefore, he is not able to resolve these failures on time, which is affecting the network performance. What should Don do to resolve the issue? Don should specify the maximum number of times to recheck failures using the max_check_attempts attribute while defining the hosts. Don should specify the time period for notification using the notification_period attribute while defining the hosts. Don should specify the time period to repeat failure notifications using the notification_interval attribute while defining the hosts. Don should enable the host event handler using the event_handler_enabled attribute while defining the hosts.

Don Allen is working as a system administrator at Indestructible Boxes, Inc. The organization asks to Don to install Simple Network Management Protocol (SNMP) on a computer in the organization to monitor networks and systems of the organization. To install SNMP, Don downloads the source code of SNMP available in the tar.gz file. Now, what command should Don use to perform the task? # cp snmp-<x>.tar.gz /usr/src ? # cd /usr/src ? # tar xzvf snmp-<x>.tar.gz ? # cd /usr/src/snmp-<x> ? # ./configure ? # make all ? # cp snmp-<x>.tar.gz /usr/src ? # net-snmp-utils-5.0.8-11 # net-snmp-devel-5.0.8-11 # cd /usr/src/snmp-<x> ? # ./configure ? # make all ? # cp snmp-<x>.tar.gz /usr/src ? # mv snmpd.conf snmpd.conf.org ? # tar xzvf snmp-<x>.tar.gz ? # cd /usr/src/snmp-<x> ? # service snmpd status ? # make all ? # cp snmp-<x>.tar.gz /usr/src ? # cd /usr/src ? # mv snmpd.conf snmpd.conf.org ? # cd /usr/src/snmp-<x> ? # ./configure ? # make all ? Pat Greene is working as a system administrator at SuperGraphics Inc. Pat is assigned the task to migrate the information about the hosts contained in NIS network to LDIF format using perl scripts. Which perl scripts should Pat use to accomplish the task? migrate_netgroup.pl migrate_networks.pl migrate_group.pl migrate_hosts.pl

John Barrett is the network administrator at Quality Software Developers. He needs to run the Windows applications on the Debian Linux platform. He also needs to ensure that the execution of the Windows applications should not stop because of the incompatible instructions of Windows-based application with Linux applications. Therefore, he decides to install a prepackaged version of Wine, which is a program that translates the instructions of the Window application into its equivalent Debian Linux instructions. Which command should he use to perform the task? # get-apt install wine_0.0.20050419-winehq-1_i386.deb # apt-get install wine_0.0.20050419-winehq-1_i386.deb # get-rpm install wine_0.0.20050419-winehq-1_i386.deb # rpm-get install wine_0.0.20050419-winehq-1_i386.deb

Donna Bard, the system administrator at Quality Software Developers, wants to backup sensitive data of the organization regularly. For this, Donna decides to implement Redundant Array of Inexpensive Disks (RAID) on the Linux server. Donna wants to delete some partitions on the server to create the RAID disks. Donna uses fdisk utility to delete the offline partitions and does not delete any extended partitions. However, Donna observes that the server is unable to delete these partitions. What should Donna Do to solve the problem? Donna should also delete the extended partitions. Donna should delete all the logical partitions. Donna should use the umount command to delete the partitions. Donna should use any third party tool to delete the specified partitions. Pat Greene is working as a system administrator at SuperGraphics Inc. Pat is assigned the task to migrate the information about the hosts contained in NIS network to LDIF format using perl scripts. Which perl scripts should Pat use to accomplish the task? migrate_group.pl migrate_netgroup.pl migrate_hosts.pl migrate_networks.pl

Which value for the STAGE argument in the rpmbuild command unpacks the source code and applies patches? b c p a Tom Wilkins works as a system administrator in EarthenWares that provides Web services to its customers. The organization wants to upgrade its Linux-based web servers to provide enhanced security features. The new version of Linux does not support some of the applications running on the web servers. It also does not provide some security features, which are required. What should he do to update the web servers? Upgrade the kernel using RPM and configure kernel using make oldconfig command Upgrade the kernel by applying patches and configure the kernel using make oldconfig command Upgrade the kernel by customizing the source code of new version and configure the kernel using make xconfig command Upgrade the kernel by applying patches and configure the kernel using make menuconfig command Corrine Wallace is working as a network administrator at SSPT Corporation. The organization has the Linux operating system installed on its servers and workstations. The management of the organization asks Corrine to upgrade the Linux kernel to implement the enhanced security features available. Corrine downloads the source code from the Internet and configures the kernel source code on the one of the main servers. After configuring the kernel source code, Corrine compiles the source code and installs the kernel. However, the server fails to boot. What should Corrine do to solve the problem? Use /etc/sysconfig/grub utility to specify the device from which the server boots Use /etc/sysconfig/syslog utility to specify the device from which

the server boots Use /etc/sysconfig/samba utility to specify the device from which the server boots Use /etc/sysconfig/ sendmail utility to specify the device from which the server boots Smartdevelopers is a leading software development organization. The organization maintains an LDAP Directory server to store information about employees of the organization. To enhance the security of the LDAP Directory server, Ronald Billing, the system administrator, needs to configure the LDAP Directory server to support Kerberos authentication. For this, Ronald needs to create Kerberos service principals for the LDAP server and extract them to a keytab file. What should Ronald do to perform the above task? Ronald should execute the following commands: # kadmin addprinc randkey ldap/smartdevelopers.com # ktadd k /etc/openldap/ldap.keytab ldap/smartdevelopers.com # chgrp ldap /etc/openldap/ldap.keytab # chmod 640 /etc/openldap/ldap.keytab Ronald should execute the following commands: # chgrp ldap /etc/openldap/ldap.keytab # chmod 640 /etc/openldap/ldap.keytab Ronald should execute the following commands: # kadmin addprinc randkey ldap/smartdevelopers.com # ktadd k /etc/openldap/ldap.keytab ldap/smartdevelopers.com Ronald should execute the following commands: # ktadd k /etc/openldap/ldap.keytab ldap/smartdevelopers.com # chgrp ldap /etc/openldap/ldap.keytab # chmod 640 /etc/openldap/ldap.keytab Tom Wilkins is working as a network administrator at Blue Valley Consulting. The employees of the organizations Software Development department develop .NET applications for their clients. Now, the organization migrates to the Linux platform to avoid the cost of licensing in Windows. As a result, the employees now need to migrate the .NET applications to the Linux platform. Tom decides to use the Mono tool to allow migration of the .NET applications to the Linux platform. He first compiles the .NET applications on the Windows platform. He then copies the compiled source code of the application to the /usr/src directory on Linux platform. Now, he needs to compile the application source code on the Linux platform. For this, he

decides to use the mcs command. During compilation, he wants to generate the exceptions that the debugger can catch. He also wants to generate the debugging information but ignore the warning messages. To perform the above tasks, Tom executes the following command: mcs debug -nowarn:WARNLIST However, Tom notices that the above command is not providing the required results. What should Tom do to solve the above problem? Tom should execute the following command: mcs debug nowarn:WARNLIST L PATH [source-files] In this code, source-files parameter refers to the name of files that contain the source code of .NET applications. Tom should execute the following command: mcs debug -fatal nowarn:WARNLIST [source-files] In this code, source-files parameter refers to the name of files that contain the source code of .NET applications. Tom should execute the following command: mcs -about L PATH [source-files] In this code, source-files parameter refers to the name of files that contain the source code of .NET applications. Tom should execute the following command: mcs -debug --fatal [source-files] In this code, source-files parameter refers to the name of files that contain the source code of .NET applications. Donna Johnson is an HR Manager at ABC Inc. Donna uses a shell script, Attendance.sh to extract the attendance of each team member for a particular month from the Attendance.txt file. The Attendance file includes six columns, Employee Code, Employee Name, TL Code, TL Name, In Time, and Out Time. Donna needs to save and display the attendance records of team members working on a new project. Donna also wants to run the Attendance.sh shell script on a Windows-based machine. To perform this task, Donna performs the following steps: Enters the following command at the Korn shell prompt to change the current shell directory to C drive: $ cd \dev\fs ? Enters the following command at the shell prompt to run the Attendance.sh shell script: $ sh Attendance.txt Enters the following command at the shell prompt to display the

attendance record of the employees store in a new file, Attendance_Report.txt, on C drive: $ cat Attendance_Report.txt ? However, while executing the preceding code snippets, Donna notices that the code is not providing the required output. What should Donna do to solve the problem? Donna needs to use the following code snippet: $ sh Attendance.sh ? $ cate Attendance_Report.exe ? Donna needs to use the following code snippet: $ cd \dev\fs\C ? $ sh Attendance.sh ? $ cat Attendance_Report.txt ? Donna needs to use the following code snippet: $ dev\fs\C ? $ sh Attendance.shi ? $ cat Attendance_Report.exe ? Donna needs to use the following code snippet: $ cd \C ? $ sha Attendance.sh ? $ cat Attendance_Report.exe ? Tom Wilkins is working as a network administrator at BlueMoon Computers. Tom needs to search for the name of the employees with first name Steve from the LDAP directory containing the details of the employees. Tom needs to specify that a maximum of 50 entries should be retrieved as a result of search request. What should Tom do to perform the required task? Use the ldapadd command with -k option Use the ldapmodify utility with a option Use the ldapsearch command with l option Use the ldapsearch command with z option Donna Bard is working as a system administrator at Blue Moon Computers, which is a software development organization based in New York. Each department of the organization maintains its own database to store information about the employees. Since the information is stored in multiple data sources, the employees frequently encounter

redundant data and inconsistent data. For this, Donna decides to configure a Directory server in the organization. She first creates a Data Design of the organization. She observes that when an employee in a department is shifted to another department, the changes are not reflected in the other related databases. What could be the possible consequence of Donnas observation? Databases accessed by a number of database administrators at the same time. Databases updated without any coordination between the database administrators. Databases updated within short time duration. Obsolete data stored in the databases Consider the statements: Statement A: To create a Kickstart configuration file for an FTP server, you must ensure that the authentication technique is implemented. Statement B: To create a Kickstart configuration file for an FTP server, you need to install X Windows System, as the users and the administrators will access the FTP server remotely most of the time. Which of the following is true, with respect to the above statements? Statement A is false and statement B is true. Both, statements A and B, are false. Both, statements A and B, are true. Statement A is true and statement B is false. Safest Software, Inc. has recently implemented the Argus network monitoring tool on its enterprise network to monitor and mange the network traffic. Corrine Wallace, the network engineer, wants to monitor Simple Mail Transfer Protocol (SMTP) and Domain Name Services (DNS) services running on the Web servers of the enterprise from a remote computer. Therefore, Corrine installs Argus-3.3 on a remote computer to monitor these services from the remote location. However,

she is unable to monitor the network as Argus fails to initialize. Corrine has verified the network and checked all connectivity tools, which are working properly. But still she is unable to monitor the network. What should Corrine do in this situation? Corrine should restart the http service using the service httpd restart command. Corrine should configure argus-3.3 to run the script # . /argusd Corrine should add the content username encrypted_password home_obj groups in the user file. Corrine should type the following command at the shell prompt to extract the argus-3.3.tgz file: tar zxvf argus-3.3.tgz Global Systems Inc. is a leading software development organization. Users in RD frequently download files and packages from the database server through the Internet. Some files and packages downloaded from the Internet are infected with viruses, which affect computers of all users. To overcome this virus problem, instead of installing antivirus programs on every computer. The organization needs to install virus-free operating systems, such as Linux. Chris, the system administrator, automates the installation of the operating system. Pat needs to use an operating system that provides solution for small to medium range of servers used for the majority of businesses, such as file servers and mail servers. He also needs to place pre-installation scripts at the beginning of the Kickstart configuration file. What should Chris do to perform the required task? Chris needs to use Red Hat Enterprise Linux operating system and enter the following command: # mkdir /var/ftp/pub/configfiles

Chris needs to use Mandriva Linux operating system and enter the following command: network --device eth0 -bootproto dhcp ?

Chris needs to use Red Hat Enterprise Linux operating system and

enter the following command: %pre echo My kickstart installation started on /bin/date /etc/motd Chris needs to use Red Hat Enterprise Linux operating system and enter the following command: %post --interpreter /usr/bin/python Larry Williams is working as a network administrator at Quality Software Developers. The employees of the Software Development department develop applications in .NET for their clients. These are Graphic User interface (GUI) applications and use the Oracle as a database server. To avoid the cost of licensing, the management decides to migrate from Windows to the Linux platform. Larry decides to use mono tool to deploy the .NET application on Linux platform. Now, Larry needs to install RPM packages to run .NET applications. Larry has already installed 15 RPM packages on the computer where he wants to run the .NET application. Now, he wants to install the remaining RPM packages to enable Web services and support Windows form implementation. What should Larry do to perform the required task? Larry needs to install the rpm packages in the following order: mono-jscript-1.1.6-1.novell.6.3.i586.rpm mono-web-1.1.6-1.novell.6.3.i586.rpm mono-winforms-1.1.6-1.novell.6.3.i586.rpm mono-locale-extras-1.1.6-1.novell.6.3.i586.rpm Larry needs to install the rpm packages in the following order: mono-locale-extras-1.1.6-1.novell.6.3.i586.rpm mono-jscript-1.1.6-1.novell.6.3.i586.rpm mono-web-1.1.6-1.novell.6.3.i586.rpm mono-winforms-1.1.6-1.novell.6.3.i586.rpm Larry needs to install the rpm packages in the following order: mono-jscript-1.1.6-1.novell.6.3.i586.rpm mono-locale-extras-1.1.6-1.novell.6.3.i586.rpm mono-web-1.1.6-1.novell.6.3.i586.rpm mono-winforms-1.1.6-1.novell.6.3.i586.rpm Larry needs to install the rpm packages in the following order: mono-jscript-1.1.6-1.novell.6.3.i586.rpm mono-locale-extras-1.1.6-1.novell.6.3.i586.rpm >

mono-winforms-1.1.6-1.novell.6.3.i586.rpm mono-web-1.1.6-1.novell.6.3.i586.rpm Red-Eye Experts is a leading developer of computer applications, with its head office in New York. The organization has three departments: HR, Research, and Development. A directory service is configured in the HR department and all the employees in the rest of the departments access the directory service. The organization has two branch offices in London and Paris. These branch offices are connected to the head office in New York through Virtual Private Network (VPN). The directory service, in the HR department of the head office, is also accessed by the employees in the branch offices. So, there is a potential risk that a network failure between the head office and the branch offices can seriously affect the employees in the branch offices. To prevent this situation, John Barrett, the system administrator at the head office, decides to create multiple replicas of the directory service and configure these replicas in the branch offices. Now, to maintain data consistency, John wants to synchronize the data which is stored in the main directory service and the replica servers. John wants to implement a mechanism in such a way that when a replica server receives a write operation request from a client, it performs the write operation. After that, the replica server sends the modified updated entry values to all the replica servers and the main server. On receiving the modified entry values, the main server and the replica servers update the stored entries accordingly. Now, which Replication Policy and Write Operation performing strategy should be employed by John to implement the above mechanism? Single-Master Replication Policy using chaining Multimaster Replication Policy using referrals Multimaster Replication Policy Single-Master Replication Policy using referrals Global Systems is a leading software organization with multiple branches spread across the world Workstations and servers across the organization have the Windows family of operating systems configured. The organization wants to migrate from Windows to Linux due to enhanced security features offered by Linux. Mike Womack, the network administrator, is assigned the task to implement Linux in text mode across the major branches, including the corporate head office. Mike

installs Linux on existing systems which have the following hardware configuration: Motorola 68K processor Industry Standard Architecture (ISA) architecture 60 MB RAM However, the Linux installation fails on these systems. What should Mike do to solve the problem? Verify the security considerations for implementing Linux Verify the architecture supported for implementing Linux Verify the memory requirements for implementing Linux Verify the processor required for implementing Linux Which command is used to copy the passwd file to ssod directory contained in the /etc/pam.d directory? # cp /etc/pam.d/ssod /etc/pam.d/passwd # mount etc/pam.d/ssod /etc/pam.d/passwd # mount /etc/pam.d/passwd etc/pam.d/ssod # cp /etc/pam.d/passwd /etc/pam.d/ssod

Supersoft2000 is a software development company that has number of development centers all over America. Larry Williams, the system administrator installs a Directory service to implement an identity management system. In the identity management system, the employee information such as name, employee code, telephone extension number, department code, branch office, and designation, is stored and organized. Now, the management of the company wants to expand the business. As a result, Larry faces a problem of insufficient hardware resources and slow read/write process of the directory server. He wants to provide a flexible Directory service that can meet the increasing storage space requirement of the directory service. What should Larry do to solve this problem? Purchase a new server with more Hard Disk storage space. Use high-speed physical media such as fiber optic cable. Purchase a new server with higher processing speed. Distribute the directory server among multiple computers. Blue Moon Computers is a multinational company, which is manufacturing mainframe computers for a space research organization. Blue Moon Computers has 41 branches in the US.

The organization uses a directory server to store all their confidential information. Employees are provided a username and a password to access the directory server. Ken Burton, a system administrator at Blue Moon Computers, is responsible for maintaining the security of the directory server. Ken receives a report that some confidential data stored in the directory server has been tampered with. Ken examines the directory server and discovers that a malicious user has attempted to obtain passwords of certain employees. The malicious user has tried each possible combination to hack the passwords by using some software tools. What type of security threat has Ken discovered and what method has the malicious user employed to hack the passwords? Kind of security threat Unauthorized Access Method used - Dictionary attack Kind of security threat Denial of Service (DoS) Attack Method used - Smurf attack Kind of security threat Denial of Service (DoS) Attack Method used - Distributed denial of service (DoS) attack Kind of security threat Unauthorized Access Method used - Brute-force attack Which command is used to verify whether Samba has authenticated a sambaAccount, Mike, stored on the OpenLDAP server? # /usr/local/sbin/smbldap-usershow.pl Mike # /usr/sbin/smbldap-usershow.pl Mike # /usr/local/sbin/ldap-usershow.pl Mike # /usr/local/smbldap-usershow.pl Mike Quality Software developer is multinational organization. Donna Bard, the network administrator in the organization is responsible for monitoring the network of the organization. While monitoring the network, Donna observes that a large number of data packets are getting lost on the network. As a result, the employees of organization are not able to download the file from the file server although all the connections and protocols related to file server are working perfectly. This is affecting the performance of the enterprise. What should Donna do to solve the problem?

Run the itrace and strace command at the shell prompt. Run the strace command at the shell prompt. Run the itrace command at the shell prompt. Run the tcpdump command at the shell prompt. The migration perl scripts translate the system files into which file format? .rpm format .doc format .LDIF format .conf format Which the command is used to test the configuration of the Kerberos client? kadmin.local klist kinit kdb5_util Which of the following Bugzilla feature helps in searching and displaying the identified bug in the bug lists of the bug tracking system? Enterprise group support Sanity check Request System Localization Tom Wilkins is working as a network administrator at Good Graphics Inc. The management asks Tom to deploy LDAP server to provide information and resources across the organization. Tom needs to search for the name of the employees whose first name is Steve. In addition, Tom wants that ldapsearch utility should prompt for simple authentication. What should Tom do to perform the required task? # ldapsearch cn=Steve* -Sd # ldapsearch cn=Steve* -x -h # ldapadd cn=Steve* -x -h # ldapsearch cn=Steve* -c -h

Donna Bard is working as a network administrator at Quality Softwares Inc based at U.S. For business expansion, the organization opens a new branch office in California. Donna installs Red Hat Linux operating system at the new branch office. Donna also wants to install Wine using RPM package to enable the employees of the organization to use existing Windows-based applications. To install Wine, Donna executes the following command: # apt-get install wine_0.0.20050419-winehq-1_i386.deb ? However, Donna notices that he is cannot install Wine using the above command. What should Donna do to solve the problem? Use the following command # rpm qa | grep -i wine ? Use the following command # rpm sf /usr/local/etc/wine.systemreg system.reg ? Use the following command # rpm ivh <wine-package-name>.rpm ? Use the following command # rpm -e <wine-package_name> ?

Jim Lewis is working as a system administrator at Technology Systems. The organization maintains different directory servers on several platforms for running different types of applications. These directory servers use different security mechanisms to provide access to the directories of the directory server. The organization needs to enable sharing and accessing of information between the directory servers for official purposes. Jim decides to perform the task and finds that the directory servers are unable to recognize the clients of different platforms. As a result, the directory services of the directory server are unable to interoperate with the non-native clients. What should Jim do to resolve the problem? Use cross-platform authentication services

Use push and pull synchronization agents Use gateways Create distributed multivendor directories Which implementation provided by Cyrus-SASL libraries enables a client to send and receive encrypted data from an OpenLDAP server? DIGEST-MD5 KERBEROS_V4 CRAM-MD5 ANONYMOUS Technology Systems, a software development organization has a number of branch offices at different locations. The branch offices are connected through a network, so that the employees at different offices can communicate. Ed Young a system administrator in Technology Systems is implementing a directory service to store information about users, customers, and projects. Ed wants to implement a security mechanism that can avoid a man-in-middle attack used by a malicious user for tampering with directory data. In this security threat, a malicious user listens the communication and captures the data packets between the client and the Directory. Next, the malicious user modifies the requests, which a client sends to the directory. Which technology should Ed use to detect this security threat? Network Intrusion Detection System (NIDS) Simple Authentication and Security Layer (SASL) Log File Monitors (LFM) System Integrity Verifiers (SIV) Ken Burton is working as a system administrator at SuperGraphics Inc. While replicating an LDAP server, Ken needs to configure the master LDAP server to maintain a log of the changes made. Ken, therefore, needs to edit the slapd.conf file to specify the details of the replica server. He needs to specify the name of the replica server, the partition to be replicated, the binding DN of the LDAP server, and the binding method to bind the master LDAP server to the replica server. Which of the following commands should Ken use to perform the required task? replica host=replicaser.supergraphics.com:389

tls=dc=supergraphics,dc=com binddn=cn=replicaser,dc=supergraphics,dc=com credentials bindmethod=simple tls=no replica host=replicaser.supergraphics.com:389

suffix=dc=supergraphics,dc=com binddn=cn=replicaser,dc=supergraphics,dc=com credentials bindmethod=simple tls=no replica host=replicaser.supergraphics.com:389

suffix=dc=supergraphics,dc=com portnumber=cn=replicaser,dc=supergraphics,dc=com credentials bindmethod=simple tls=no replica host=replicaser.supergraphics.com:389

binddn=cn=replicaser,dc=supergraphics,dc=com credentials bindmethod=simple tls=no Red Sky IT Systems is an IT organization that provides software services to its customers. One of the projects being developed at Red Sky requires the use of advanced Perl scripts. For this, Pat Greene, the network administrator installs RPM packages on the computers. Pat observes that a file of RPM package is corrupted during the installation of RPM packages. Therefore, Pat needs to verify the corrupted file to check the attributes of the file. What should Pat do to perform the task? Execute # rpm -rebuilddb ? Execute # rpm -K squirrelmail-1.2.11-1.noarch.rpm ? Execute # rpm Vf /bin/umount ? Execute # rpm --import /mnt/cdrom/RPM-GPG-KEY ? Which RPM of mono-1.1.zip file provides development support for Mono tool? mono-data-sqlite mono-data-sybase mono-devel-1.1.6-1.novell.6.3.i586.rpm mono-data-postgresql Chris Donaldson is working as a system administrator at SuperGraphics Inc. Chris needs to integrate the samba with OpenLDAP to store the

user information. Chris adds a new user Ronald in the OpenLDAP directory. Which command should Chris use to verify the existence of user, Ronald in the OpenLDAP directory? # smbldap-usershow.pl ronald # /usr/local/sbin/smbldap-usershow ronald # /usr/local/sbin/smbldap-usershow.pl ronald # /usr/local/sbin/smbldap-usershow.pl Tom Wilkins is working as a system administrator at Technology Systems. Tom needs to design a schema for a directory that contains records of employees, such as name, phone, address, and job profile, in the organization. Tom writes a code for the telephoneNumber attribute type in LDAP. 2.5.4.20 NAME 'telephoneNumber' EQUALITY telephoneNumberMatch SUBSTR telephoneNumberSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{24} Identify the OID of the attribute type and the use of telephoneNumberMatch rule in the preceding code snippet? The OID of the attribute type is 2.5.4.20 and the telephoneNumberMatch rule is used for matching partial telephone numbers. The OID of the attribute type is 1.3.6.1.4.1.1466.115 and the telephoneNumberMatch rule is used to specify the unique name of an attribute. The OID of the attribute type is 1.3.6.1.4.1.1466.115.121.1.15 and the telephoneNumberMatch rule is used to describe the applications that own and use the attribute. The OID of the attribute type is 2.5.4.20 and the telephoneNumberMatch rule is used for matching complete telephone numbers. Consider the statements: Statement A: The # rpm qa | grep -i wine command is used to identify the installed Wine packages on the system. Statement B: The # rpm -e <wine-package_name> command is used to uninstall the Wine packages from the system. Which of the following options is correct with respect to the above statements? Both statements A and B are true.

Statement A is false and statement B is true. Statement A is true and statement B is false. Both statements A and B are false. John Barrett is working at EarthenWares as a system administrator. EarthenWares uses the OpenLDAP server to manage data about the employees working in the company. All the employees of the company have access to the data included in the OpenLDAP server. As a result, the company finds some unwanted changes made to the data contained in the OpenLDAP directory server. The company assigns the task to John to implement a mechanism to monitor each activity taking place on the OpenLDAP server. For this, John needs to add the following statements in the slapd.conf file: include pidfile /usr/local/etc/openldap/schema/core.schema /usr/local/var/slapd.pid

argsfile/usr/local/var/slapd.args But, John finds that this code snippet is not working properly. Which code snippet should John use to perform the task? include loglevel pidfile argsfile include loglevel pidfile argsfile include loglevel pidfile argsfile include loglevel pidfile argsfile /usr/local/etc/openldap/schema/core.schema 1 /usr/local/var/slapd.pid /usr/local/var/slapd.args /usr/local/etc/openldap/schema/core.schema 2048 /usr/local/var/slapd.pid /usr/local/var/slapd.args /usr/local/etc/openldap/schema/core.schema -1 /usr/local/var/slapd.pid /usr/local/var/slapd.args /usr/local/etc/openldap/schema/core.schema 0 /usr/local/var/slapd.pid /usr/local/var/slapd.args

Donna is working as a network administrator at Safest Software Developers. The organization has three branches at different locations. There are three departments at each branch, named

application development, quality assurance, and sales. The users of the same department at different branches are part of a group. There are three groups corresponding to each department, app for application development department, qa for quality assurance department, and sales for sales department. All the employees at different branches use a database server at the main branch to store data. The database server can run 100 processes at a time. The users in the app group run a large number of processes on the database server due to which the users in the qa and sales groups are not able to run their processes. What should Donna do to solve this problem? Donna needs need to add the following entries to the /etc/security/limits.conf file: @app @app soft nproc hard nproc 45 50

Donna needs to add the following entries to the /etc/pam.d/login file: * soft nofile 88 85* hard nofile file: session required /lib/security/pam_limits.so

Donna need to add the following entry to the /etc/pam.d/login

Donna needs to add the following entries to the /etc/security/limits.conf file: * soft file 860 560* hard file

Technology Systems is a software development organization. Jim Lewis, the system administrator, has implemented a NIS-based directory containing the details of the employees of the organization. The management of the organization decides to migrate the existing NIS infrastructure to OpenLDAP server. Chris needs to convert system files, stored in /etc/ directory of NIS server, into LDIF format. Chris, therefore, needs to migrate user information from /etc/passwd to the LDIF file. What should Chris do to perform the required task? Use the following command: # /usr/share/openldap/migration/migrate_group.pl /etc/group /tmp/group.ldif Use the following command:

# /usr/share/openldap/migration/migrate_passwd.pl /etc/ passwd /tmp/passwd.ldif Use the following command: # /usr/share/openldap/migration/migrate_group.pl /etc/group /tmp/group.ldif Use the following command: # /usr/share/openldap/migration/migrate_passwd.pl /etc/ /passwd.ldif command

Don Allen is working as application developer at Safest Software Developers. Don wants to use a software application that helps keep track of bugs in any of software products developed. He needs to identify and analyze errors in the programming code of software product. While detecting the bugs, Don wants to identify the name and component of the software product in which a bug is encountered. He wants to define the state, such as fixed, modified, or closed of the bug. He also wants to display a short summary about the bug. What should Don do to perform this task? Don should understand Bug Anatomy. Don should use Bug Lists. Don should Search bugs. Don should create a Bugzilla account. Which option can be used with the scp command to recursively copy all subdirectories and files in the source directory to the destination directory? -v -r -p -q EarthenWares is a leading developer of computer applications. The organization assigns Ken Burton, the system administrator, the task

to implement a Directory server to provide centralized storage and management of information, such as employee records. Ken decides to implement the LDAP Directory server in the organization. He needs to provide a framework to protect the LDAP Directory from unauthorized access. For this, he decides to use the LDAP Security model to ensure that when an LDAP Directory client tries to establish a connection with the LDAP Directory server, an authentication protocol exchange is initiated. This exchange consists of a series of requests and responses between the LDAP Directory client and the LDAP Directory server. Based on the nature of responses, authentication is performed between the LDAP Directory client and the LDAP Directory server. Which authentication mode does Ken implement? Provide the LDAP client, full access to the LDAP Directory server, in anonymous mode. Implement passwords using TLS. Provide the LDAP client, read only access to the LDAP Directory server, in anonymous mode. Secure the LDAP server using the DIGEST-MD5 authentication mechanism. The Satellite model grants permission to the user to download software using physical media, such as CD and floppy. Which of the following feature helps to accomplish this task? Local database repository Channel and errata cloning and their management Complete off-network capability Channel permissions which provides e-commerce services to its customers. Ken is assigned the task of monitoring and controlling the network of the enterprise. For this, Ken configures the Nagios monitoring tool on the network enterprise and modifies the object configuration files to specify the hosts and services that are to be monitored. The employees of Red Eye Experts report problems in the httpd service of some of the hosts. Therefore, Ken decides to monitor these hosts using the Nagios tool. However, Ken observes that he is not able to detect the hosts that are facing the problems. What should Ken do to identify the hosts? Ken should enable the host event handler, event_handler_enabled in the template used for defining the hosts and hosts groups.

Ken should specify the contact group in the template used for creating the host groups. Ken should specify the check_command check-host-alive command in the template used for defining the hosts and hosts groups. Ken should specify the event_handler command in the template used for defining the hosts and hosts groups. Which video file format needs to be searched and saved in the Migration folder while migrating from Windows to Linux operating system? AIFF OGG WMV WAV Global Systems is a software development organization that provides customized software solutions. The organization uses kernel-2.4.21-4.EL on its Linux server. The management of the organization decides to upgrade the existing kernel to kernel-2.4.24 to enhance security and to acquire new hardware support. Pat Greene, the system administrator is assigned the task of upgrading the Linux kernel. After downloading the.tar.gz file containing the source code of the kernel in /usr/src directory, Pat needs to install the kernel source code. What should Pat do to perform the task? Pat needs to execute the following code snippet: # cd /usr/src # tar -zxcf linux-2.4.24.gz # cd linux-2.4.24 # ls al Pat needs to execute the following code snippet: # cd /usr/src # tar linux-2.24.tar.gz # cd linux-2.4.24 # ls al Pat needs to execute the following code snippet: # cd /src # tar -zxvf linux-2.4.24.tar.gz

# cd linux-2.4.24 # ls l Pat needs to execute the following code snippet: # cd /usr/src # tar -zxvf linux-2.4.24.tar.gz # cd linux-2.4.24 # ls al Which parameter in the smb.conf file for the OpenLDAP-enabled Samba server specifies the domain where Samba server resides? Workgroup Encryption Security Netbios name Corrine Wallace is working as a system administrator at Countryside Markets. The organization runs multiple LDAP servers for storing the data pertaining to the organization. Every department stores their own data in their respective databases and directories, supplied by different vendors. For official reasons, the LDAP servers need to be integrated to share the data contained therein. However, Corrine finds that the Integrating the Access to different Directories issue arises because the schema design for the LDAP schema referral differs from vendor to vendor. What should Corrine do to solve the issue? Use push and pull agents Create distributed multivendor directories Use metadirectories Use gateways Consider the statements: Statement A: To create a Kickstart configuration file for an FTP server, you must ensure that the authentication technique is implemented. Statement B: To create a Kickstart configuration file for an FTP server, you need to install X Windows System, as the users and the administrators will

access the FTP server remotely most of the time. Which of the following is true, with respect to the above statements? Statement A is false and statement B is true. Statement A is true and statement B is false. Both, statements A and B, are true. Both, statements A and B, are false. Global Systems Inc. is a leading software development organization. Users in RD frequently download files and packages from the database server through the Internet. Some files and packages downloaded from the Internet are infected with viruses, which affect computers of all users. To overcome this virus problem, instead of installing antivirus programs on every computer. The organization needs to install virus-free operating systems, such as Linux. Chris, the system administrator, automates the installation of the operating system. Pat needs to use an operating system that provides solution for small to medium range of servers used for the majority of businesses, such as file servers and mail servers. He also needs to place pre-installation scripts at the beginning of the Kickstart configuration file. What should Chris do to perform the required task? Chris needs to use Red Hat Enterprise Linux operating system and enter the following command: %post --interpreter /usr/bin/python Chris needs to use Red Hat Enterprise Linux operating system and enter the following command: # mkdir /var/ftp/pub/configfiles

Chris needs to use Red Hat Enterprise Linux operating system and enter the following command: %pre echo My kickstart installation started on /bin/date /etc/motd Chris needs to use Mandriva Linux operating system and enter the following command: >

network --device eth0 -bootproto dhcp ? Smartdevelopers is a leading software development organization. The organization maintains an LDAP Directory server to store information about employees of the organization. To enhance the security of the LDAP Directory server, Ronald Billing, the system administrator, needs to configure the LDAP Directory server to support Kerberos authentication. For this, Ronald needs to create Kerberos service principals for the LDAP server and extract them to a keytab file. What should Ronald do to perform the above task? Ronald should execute the following commands: # chgrp ldap /etc/openldap/ldap.keytab # chmod 640 /etc/openldap/ldap.keytab Ronald should execute the following commands: # kadmin addprinc randkey ldap/smartdevelopers.com # ktadd k /etc/openldap/ldap.keytab ldap/smartdevelopers.com # chgrp ldap /etc/openldap/ldap.keytab # chmod 640 /etc/openldap/ldap.keytab Ronald should execute the following commands: # ktadd k /etc/openldap/ldap.keytab ldap/smartdevelopers.com # chgrp ldap /etc/openldap/ldap.keytab # chmod 640 /etc/openldap/ldap.keytab Ronald should execute the following commands: # kadmin addprinc randkey ldap/smartdevelopers.com # ktadd k /etc/openldap/ldap.keytab ldap/smartdevelopers.com

Nancy Jones the network administrator at Technology Systems is responsible for monitoring the network of the organization. While monitoring the network, Nancy observes that the RPM packages installed on the Linux servers are of an older version than required and do not provide required functionalities. Therefore, Nancy decides to install an updated version of the RPM packages. For this, Nancy downloads a new RPM package, but observes that the package installation files are not executing properly. What should Nancy do to solve the problem? Run the itrace command at the shell prompt Run the ethereal command at the shell prompt Run the tcpdump command at the shell prompt Run the strace command at the shell prompt

Donna Bard is working, as a network administrator at Good Graphics Inc. Donna needs to add entries of new employees to the LDAP directory containing employees information. While adding the entries, Donna needs to specify the input file from where the ldapadd utility will pick up the entry and add to the LDAP directory. Which one of the following options will Donna use to perform the required task? -D binddn -U username -f filename -h hostname Tom Wilkins is working as a network administrator at Good Graphics Inc. The management asks Tom to deploy LDAP server to provide information and resources across the organization. Tom needs to search for the name of the employees whose first name is Steve. In addition, Tom wants that ldapsearch utility should prompt for simple authentication. What should Tom do to perform the required task? # ldapsearch cn=Steve* -Sd # ldapsearch cn=Steve* -c -h # ldapsearch cn=Steve* -x -h # ldapadd cn=Steve* -x -h Tom Wilkins is working as a system administrator at Technology Systems. Tom is assigned the task to migrate the NIS information to LDAP. Therefore, Tom needs to map the NIS information stored in /etc/passwd file to attributes of posixAccount object class. Tom needs to translate the parameter, /bin/bash from the entry stored in /etc/passwd file. Which of the following attribute of posixAccount object class maps to the above parameter? homeDirectory LoginShell loginShell HOMEDIRECTORY Donna Bard is working as system administrator with Quality Software Developers. Sharp Clothing Inc. is a garment manufacturing organization, which stores information about its employees, customers, and suppliers in a directory. All the employees of the

organization and customers access the directory. Tom Allen, the Business Manager at Sharp Clothing Inc., decides to set up new manufacturing units at different locations. As a result the load on the existing directory service increases. To solve this problem, Tom directs Donna to create a new directory service. To implement the directory, Donna wants to install a software package called OpenLDAP. However, Donna observes that a package called SASL needs to be installed before installing OpenLDAP. To verify whether SASL is already installed on the server, Donna enters the following command at the shell prompt: # rpm ivh openssl-0.9.7a-22.1.i386.rpm However, Donna notices that the command is not producing required results. What should Donna do to solve the problem? Donna needs to enter the following command at the shell prompt: # rpm ivh sasl-devel-0.9.7a-22.1.i386.rpm Donna needs to enter the following command at the shell prompt: # rpm grep | qa sasl Donna needs to enter the following command at the shell prompt: # rpm qa grep openssl Donna needs to enter the following command at the shell prompt: # rpm qa | grep sasl Which command is used to verify that the result of # ls / > /soft/list command has been copied to the list file? # cat /soft # cat /list # cat /soft/list # cat Jim Lewis is working as a system administrator in AB Corp. He uses Linux operating system at the datacentre. He upgraded the Linux kernel-2.2 to kernel2.4 to provide support for Oracle9i database server. He compiled the kernel using the make modules command, but the system was not able to boot. Identify the reason and the solution for this problem? Dependencies were not resolved before compiling the kernel. Resolve all the dependencies using the make dep command. Initial RAM disk was not created. Create RAM disk using the mkinitrd command. Symbolic links described in the README file were not set up

correctly. Reinstall the kernel Unused files were not removed before compiling. Use make clean command The migration perl scripts translate the system files into which file format? .LDIF format .rpm format .doc format .conf format Identify the command that a LDAP Directory client uses to view the list of Ticket to Get Tickets (TGTs) obtained from the Kerberos server. kinit klist kadmin.local kdb5_util Donna Bard is the network administrator at PQR Corp. She needs to provide the alternative input devices, such as touchscreen and trackball to the employees of the organization to allow them to enter data using different input devices. She also needs to facilitate the troubleshooting of different Windows and Linux-based applications by providing a debugger. Therefore, she decides to install Wine using Concurrent Versions System (CVS) Snapshot method on one of the main servers. Which command should Donna use to download the Wine source code tree in the wine directory on the server? $ cvs $ export CVSROOT=:pserver:cvs@cvs.winehq.org:/home/wine $ cvs z3 checkout wine $ ./configure & make depend & make Technology Systems is an IT organization based at Atlanta. The organization decides to open a new development center at Florida. The management of the organization asks John Barrett, the network administrator, to configure a mail server at this new center. For this, John needs to install send-email packages. John observes that the binary RPM package for send-email package is not available on the network, however, the Source RPM (SRPM) package is available.

Therefore, John decides to build binary RPM package from SRPM. What should John do to perform the task? Execute rpmbuild bSTAGE [options] /usr/src/redhat/SOURCES Execute rpmbuild bSTAGE [options] /usr/src/redhat/SRPMS Execute rpmbuild bSTAGE [options] /usr/src/redhat/SPECS Execute rpmbuild bSTAGE [options] /usr/src/redhat/BUILD Tom is working as a system engineer at ABC corp. The company assigns a task to Donna to implement LDAP directory schema to reduce data redundancy problems and to maintain data integrity. To perform the task, Tom implements an attribute type, which specifies the information that can be stored in the attribute of the directory. The company also asks Tom to use the specification given below to implement attribute type: OID: 2.5.4.20 and the attribute name is telephoneNumber. telephoneNumberMatch rule: To match complete telephone numbers telephoneNumberSubstringMatch: To match partial telephone numbers. The OID of the encoding rule: 1.3.6.1.4.1.1466.115.121.1.15. Maximum length: 24 What code snippet should Tom use to perform the task? SYNTAX 1.3.6.1.4.1.1466.115.121.1.15, 2.5.4.20 NAME 'telephoneNumber' EQUALITY telephoneNumberMatch SUBSTR telephoneNumberSubstringsMatch {24} SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 NAME 'telephoneNumber' EQUALITY telephoneNumberMatch SUBSTR telephoneNumberSubstringsMatch length 24 2.5.4.20 NAME 'telephoneNumber' EQUALITY telephoneNumberMatch SUBSTR telephoneNumberSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{24} 2.5.4.20 NAME telephoneNumber EQUALITY telephoneNumberMatch SUBSTR telephoneNumberSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 length 24 Red-Eye Experts is a .NET applications development organization, based in the US. The organization uses the Windows platform for developing .NET applications. For security reasons, Donna Bard, the network administrator, needs to migrate .NET applications to the Linux platform to provide file-level and user-level security to the applications. To migrate the .NET applications to the Linux

platform, Donna needs to install the Mono tool that provides a number of APIs that can be used to run the .NET applications on Linux. For this, Donna installs the mono-data-1.1.6-1.novell.6.3.i586.rpm RPM package as the first package of the tool. However, Donna finds an error massage while installing this package. What error message does Donna receive while installing this package? The error message is displayed as follows:mono-data-oracle-1.1.6-1.novell.6.3.i586.rpm and mono-complete-1.1.6-1.novell.6.3.i586.rpm RPM packages should already be installed on the computer. The error message is displayed as follows: mono-core-1.1.6-1.novell.6.3.i586.rpm and mono-basic-1.1.6-1.novell.6.3.i586.rpm RPM packages should already be installed on the computer. e error message is displayed as follows:mono-data-oracle-1.1.6-1.novell.6.3.i586.rpm and mono-data-postgresql-1.1.6-1.novell.6.3.i586.rpm RPM packages should already be installed on the computer. The error message is displayed as follows:mono-extras-1.1.6-1.novell.6.3.i586.rpm and mono-complete-1.1.6-1.novell.6.3.i586.rpm RPM packages should already be installed on the computer. Blue Moon Computers is a software development organization, which has development centers all over the US. Pat Greene, the system administrator at Blue Moon Computers, installs a LDAP server to store the information about the employees and projects running at different development centers. The Internet has facilitated the growth of Blue Moon Computers. Therefore, Pat decides to increase the accessibility of the LDAP server to all development centers through the Internet. According to the companys policies, the electronic mail address for a given employee is considered public information and the employee's home address is considered sensitive information. It must be protected to address employee privacy concerns. Easy accessibility to the LDAP server allows malicious users to try and access the LDAP server to obtain the home address and other such private and confidential information about various employees. Therefore, the server needs to be protected against such malicious users. Pat needs to implement Access Control List (ACL) to grant access privileges to

the authenticated users. Which of the following options contains the access control requirements to accomplish this task? -Replication and synchronization -Managing the directory server -Network environment -Physical security -Directory accessibility -Read/Write permission -Sestivity of data -Administration of directory server -User community -The subjects accessing the LDAP server -The objects that are accessed -The level of authentication required -The accessibility time of the LDAP server -The access level to an LDAP server Mike Womack is working as a network administrator at Super Graphics Inc. The accounts department of the organization operates its business processes using a. NET-based accounting application. The organization notices that unauthorized users are accessing the confidential data from its network. Therefore, the organization decides to migrate the accounting application from Windows 98 to the Linux platform to provide file and user-level security to its network. To perform the task, Mike compiles the source code of the .NET application to generate a .exe file. Now, he needs to execute the application by passing the .exe file as an argument. In addition, he wants to determine the version information of the Just in time (JIT) compiler and activate the security manager. What should Mike do to perform the required task? Use the mono command with v and security option Use the mcs command with about and fatal option Use the mcs command with L PATH and debug option Use the mono command with aot and security option John Barrett is working as a network administrator at Blue Valley Consulting. The organization has a number of branch offices all over US. The employees of the organization access a centralized Linux

server located at the main branch. John has recently upgraded the kernel of the centralized Linux server from kernel-2.4 to kernel-2.6. John has also implemented RAID to avoid any data loss. After implementing the RAID, John observes that the RAID acceleration is low. As a result, the server performance is also degraded. To improve the RAID acceleration, John needs to stabilize the speed of the RAID device. For this, he decides to assign the value, 80000, to the parameters specifying the speed of the RAID device. What should John do to perform this task? Execute the following commands at the shell prompt: # echo 80000 > /proc/sys/dev/raid/speed_max # echo 80000 > /proc/sys/dev/raid/speed_min Execute the following commands at the shell prompt: # echo 80000 > /sys/dev/raid/speed_limit_max # echo 80000 > /sys/dev/raid/speed_limit_min Execute the following commands at the shell prompt: # echo 80000 > /proc/sys/dev/raid/speed_limit_max # echo 80000 > /proc/sys/dev/raid/speed_limit_min Execute the following commands at the shell prompt: # echo 80000 > /proc/sys/raid/speed_limit_max # echo 80000 > /proc/sys/raid/speed_limit_min Which implementation provided by Cyrus-SASL libraries enables a client to send and receive encrypted data from an OpenLDAP server? KERBEROS_V4 CRAM-MD5 DIGEST-MD5 ANONYMOUS Jim Lewis is a network administrator at Blue Moon Computers. All the employees of the organization are working on the Windows platform. Recently, the organization receives a project to develop inventory management software based on the Linux platform. Therefore, Jim is assigned the task to install Linux on the workstations and servers in the software development department of the organization. However, the employees of the company need to run some Windows-based applications on the Linux systems. To perform this task, Jim installs the Wine software. Now, to configure Wine, Jim writes the following code

snippet at the shell prompt: $ mkdir ~/.wine/ ? $ cp documentation/samples/config ~/.wine/config ? However, while executing the preceding code snippet, Jim notices that code snippet has many errors because of which it is not providing the required output. What should Jim do to solve the problem? Jim needs to write the following code snippet: $ mkdir ~/.wine/ ? $ cp <dir_to_wine_source_code>/documentation/samples/config ~/.wine/config ? Jim needs to write the following code snippet: <dir_to_wine_source_code>/documentation/samples/config Jim needs to write the following code snippet: $ mkdir wine/ ? $ cp <dir_to_wine_source_code>/documentation/samples/ Jim needs to write the following code snippet: $ mkdir ~/.wine/ ? <dir_to_wine_source_code>/documentation/samples/ con Red-Eye Experts is a leading developer of educational courseware. The organization is located in California, and has about 200 employees. The organization is divided into three departments: Production, HR, and Marketing. In the existing setup, an NIS server is used to authenticate the employees. However, the organization has decided to recruit another 300 persons in the next two months. Due to the expansion plans, Tom Wilkins, the system administrator, has decided to configure an OpenLDAP server in the organization with the domain redeye.com, to better manage the information about the employees. For this, Tom needs to edit the slapd.conf file to specify the domain components for the LDAP domain, and to specify the location of the OpenLDAP database. Which directives of the slapd.conf file should Tom use and how is Tom going to edit these directives to achieve his objective?

To specify the domain components for the LDAP domain, Tom should edit the Suffix directive, as shown:

suffix

dc= redeye,dc=com

To specify the location of the OpenLDAP database, Tom should edit the directory directive, as shown: directory /var/lib/redeye.com To specify the domain components for the LDAP domain, Tom should edit the Suffix directive, as shown: suffix dc= redeye, dc=com To specify the location of the OpenLDAP database, Tom should edit the directory directive, as shown: directory /var/lib/ldap/redeye.com To specify the domain components for the LDAP domain, Tom should edit the Suffix directive, as shown: suffix dc= redeye.com To specify the location of the OpenLDAP database, Tom should edit the directory directive, as shown: directory /lib/ldap/redeye.com To specify the domain components for the LDAP domain, Tom should edit the Suffix directive, as shown: suffix dc= redeye.com To specify the location of the OpenLDAP database, Tom should edit the directory directive, as shown: directory /var/lib/ldap/redeye.com Technology Systems is a leading developer of computer applications. The organization has its head office in California and two branch offices in New York and Toronto. There are three departments in the organization: Marketing, Programming, and Accounting. The Programming department is divided into two groups, Windows group and Linux group. The branch offices are connected to the head office by a 56 Kbps leased line. Now, each branch office runs as a separate entity, with its own network, reporting structure, and constraints. The organization has no centralized IT management group, and separate administrators at each branch office manage the network. Since the organization has multiple servers but no centralized management of the information, it faces the data-related problems, such as data redundancy and data inconsistency. To avoid these data-related problems in the organization, Jim Lewis, the system administrator at the head office, decides to install and configure the OpenLDAP Directory service. Through the use of OpenLDAP Directory service, Jim wants to provide authentication service in the

organization. This authentication service authenticates the employees to the directory server by providing the employees encrypted tickets for a short duration. During the period when the ticket is valid, an employee can access the directory service without providing a password. Now, to implement the above authentication mechanism, which prerequisite software package must be installed and configured by Jim before installing OpenLDAP, and what is the command entered by Jim to install the prerequisite software package? Jim must install the SASL software package Jim must enter the following commands to install SASL: # rpm ivh cyrus-sasl-md5-2.1.15-3.i386.rpm # rpm ivh cyrus-sasl-plain-2.1.15-3.i386.rpm # rpm ivh cyrus-sasl-2.1.15-3.i386.rpm # rpm ivh cyrus-sasl-gssapi-2.1.15-3.i386.rpm # rpm ivh cyrus-sasl-devel-2.1.15-3.i386.rpm Jim must install the Kerberos software package Jim must enter the following command to install Kerberos: # rpm qa | grep krb5-server Jim must install the OpenSSL software package. Jim must enter the following commands to install OpenSSL: # rpm ivh openssl-0.9.7a-22.1.i386.rpm # rpm ivh openssl-devel-0.9.7a-22.1.i386.rpm # rpm ivh openssl096b-0.9.6b-13.i386.rpm Jim must install the Kerberos software package Jim must enter the following commands to install Kerberos: # rpm ivh krb5-server-1.2.7-19.i386.rpm # rpm ivh pam_krb5-1.70-1.i386.rpm # rpm ivh krb5-libs-1.2.7-19.i386.rpm # rpm ivh krb5-devel-1.2.7-19.i386.rpm # rpm ivh krb5-workstation-1.2.7-19.i386.rpm Ken Burton is working as a system administrator with Global Systems Inc. Ken is assigned the task to integrate Samba with OpenLDAP. Ken is asked to store the user information in OpenLDAP. He wants to store the sambaAccount information for validating the Windows user, John. Which of the following command should Ken use to accomplish the task?

# smbpasswd s john # smbpasswd s john a john124 # smbpasswd a john s john123 # smbpasswd a john S john123 Ed Young is working as a system administrator at InfoSuper Corp. Don Allen, the Business Manager at XYZ Inc. decides to setup new offices in US, UK, and China. So, Don directs Ed to implementa centralizedDirectory service in the organization. To perform this task, Ed selects and implements a directory, and tests the reliability, redundancy, and fault tolerance of the directory. Ed also studies the organizational environment and identifies the data sources, directory users, and directory-enabled applications. Ed also updates the directory to incorporate new requirements, makes backup of directory, and monitors the performance of the directory. Which sequence of steps should Ed follow to complete the task? 1. Test the reliability, redundancy, and fault tolerance of the directory. 2. Update the directory 3. Examine the organizational environment. 1. Test the reliability, redundancy, and fault tolerance of the directory. 2. Examine the organization environment 3. Update the directory 1. Examine the organizational environment. 2. Test the reliability, redundancy, and fault tolerance of the directory. 3. Update the directory 1. Update the directory 2. Test the reliability, redundancy, and fault tolerance of the directory. 3. Examine the organizational environment. Don Allen is working as a system administrator at Indestructible Boxes, Inc. The organization asks to Don to install Simple Network Management Protocol (SNMP) on a computer in the organization to monitor networks and systems of the organization. To install SNMP, Don downloads the source code of SNMP available in the tar.gz file. Now, what command should Don use to perform the task?

# cp snmp-<x>.tar.gz /usr/src ? # mv snmpd.conf snmpd.conf.org ? # tar xzvf snmp-<x>.tar.gz ? # cd /usr/src/snmp-<x> ? # service snmpd status ? # make all ? # cp snmp-<x>.tar.gz /usr/src ? # cd /usr/src ? # tar xzvf snmp-<x>.tar.gz ? # cd /usr/src/snmp-<x> ? # ./configure ? # make all ? # cp snmp-<x>.tar.gz /usr/src ? # net-snmp-utils-5.0.8-11 # net-snmp-devel-5.0.8-11 # cd /usr/src/snmp-<x> ? # ./configure ? # make all ? # cp snmp-<x>.tar.gz /usr/src ? # cd /usr/src ? # mv snmpd.conf snmpd.conf.org ? # cd /usr/src/snmp-<x> ? # ./configure ? # make all ? Ken Burton is working as a system administrator at SuperGraphics Inc. While replicating an LDAP server, Ken needs to configure the master LDAP server to maintain a log of the changes made. Ken, therefore, needs to edit the slapd.conf file to specify the details of the replica server. He needs to specify the name of the replica server, the partition to be replicated, the binding DN of the LDAP server, and the binding method to bind the master LDAP server to the replica server. Which of the following commands should Ken use to perform the required task? replica host=replicaser.supergraphics.com:389

binddn=cn=replicaser,dc=supergraphics,dc=com credentials bindmethod=simple tls=no replica host=replicaser.supergraphics.com:389

tls=dc=supergraphics,dc=com binddn=cn=replicaser,dc=supergraphics,dc=com credentials bindmethod=simple tls=no replica host=replicaser.supergraphics.com:389

suffix=dc=supergraphics,dc=com binddn=cn=replicaser,dc=supergraphics,dc=com credentials bindmethod=simple tls=no replica host=replicaser.supergraphics.com:389

suffix=dc=supergraphics,dc=com portnumber=cn=replicaser,dc=supergraphics,dc=com credentials bindmethod=simple tls=no Quality Software Developers is a software development organization, based at Atlanta. All computer systems in the organization run on the Windows family of operating systems. The management assigns Jim Lewis, the system administrator, the task of enabling remote installation of an operating system across several machines. The operating system should: Provide support for different services, such as Samba and FTP Specify the maximum number of files that can be opened by a user at a time Support e-mail services, such as Sendmail, Qmail, and Postfix services Enhance the security of the organization network by providing security services, such as VPN and firewalls in the network What should Jim do to perform the task? Evaluate Linux for Security Requirements and install Linux Evaluate Linux Deployment Requirements and install Linux Evaluate Linux for Business Requirements and install Linux Evaluate Linux for Maintenance Requirements and install Linux Supersoft2000, a software development organization has development centers throughout America, which are connected through a network. Larry Williams, a system administrator at Supersoft2000, installs a directory service to implement an identity management system. Employees and clients at different centers access the directory server through the network. Larry wants to prevent unauthorized access to the directory server. So, Larry installs a firewall on the network of the organization such that:

The employees of the internal network are able to establish a connection with external networks. Incoming requests are processed first by the firewall. Next, the firewall validates the requests and forwards them to the directory server. Which of the following does Larry use to perform these tasks? SASL SSL/TLS CIPE Kerberos Jim Lewis is working as a network administrator at Smart Software Developers. Jim has registered the Linux workstations and servers with Red Hat Network. Jim has identified a workstation on the network that has crashed while running a software application. For resolving the problem, he must identify the location of this error. What should he do to accomplish the task? Implement a GUI to receive automatic updates from Red Hat network Check RPM dependencies associated with each new version of the updates Issue a list of Errata Ask for prior notification for updates and receipt of the errors through mail messages Pat Greene is working as a system administrator at InfoSuper Corp. The management asks Pat to migrate user information from the NIS server configured in the network of the organization to the OpenLDAP server configured on the same host. Pat needs to add user accounts and groups information contained in the LDIF format to the OpenLDAP database. What should Pat do to perform the required task? Edit the migrate_common.ph file Specify the domain and base of your network in the /usr/share/openldap/migration/migrate_common.ph file. Create a file infosuper.ldif in the /tmp directory Edit the values of the DEFAULT_MAIL_DOMAIN and DEFAULT_BASE parameters

Which of the following components is installed on a directory server or a client that will access the directory? Directory-enabled application Directory servers Access policies Directory clients Which of the following directory types help develop company white pages? Application-specific directories General-purpose directories NOS directories Purpose-specific directories You have configured a directory. You want to grant directory access to specific clients between 10:00 AM and 1:00 PM every day. How will you achieve this? Create replicas of the directory Create ACLs Create directory partitions Configure MMS In which of the following directory stages should you test the reliability and fault-tolerance of the directory server? Design stage Deployment stage Maintenance stage Both design and deployment stage The parameters used to measure directory performance are: Latency Throughput Robustness Both latency and throughput The LDAP client and server communicate using the ___ port number? 80 389 60 79 Which of the following models defines the basic building

blocks of LDAP directory? Functional model Naming model Security model Information model Which of the following data format will you use to store digital certificate in a directory? String Digit Date Binary Which of the following directory servers is an example of the application-specific directory type? a. OpenLDAP b. IBM/Lotus Notes Name c. Active Directory d. Switchboard Directory In which of the following directory stages should you take feedback from the users? a. Design stage b. Deployment stage c. Maintenance stage d. Both design and deployment stage Which of the following feature of a directory allows you to personalize the directory according to your business needs? a. Distribute data b. Flexibility c. Replicate data d. Dynamic The attribute type, ces represents a. Strings, where case of strings is significant during searching and comparisons b. Distinguished name of the object that owns the entry c. Strings, where case of strings cannot be specified during searching and comparisons d. String class Which of the following directory components represents device drivers that will be accessed by a directory server?

a. Directory-enabled application b. Software c. Supporting software d. Directory clients Which of the following directory features enables you to store data of different formats on a directory server? a. Dynamic nature b. Flexibility c. Personalization d. Data distribution Which of the following elements is a platform-independent directory server? a. Active Directory b. MMS c. Novell Directory Server d. Netscape Directory Server In order to ensure that the clients in the branch offices are not affected in case the directory server breaks down, how would you make the directory fault-tolerant? a. Store data hierarchically in the directory b. Make the directory interoperable with the other servers in the branch offices c. Configure replicas of the directory in the branch offices d. Secure the directory against unauthorized access from branch offices In which of the following directory stages should you make backups of the directory server? a. Deployment stage b. Design stage c. Maintenance stage d. Backup stage Which of the following tree designs is the correct representation of a DIT? a. Horizontal tree b. Inverted tree c. Vertical tree with root node at the lowest level of the tree d. Cannot be represented by any tree design

Identify the LDAP model that specifies how to organize and identify data in a directory. a. Information model

b. Naming model c. Functional model d. Security model In an inventory database, the product ID must be alphabetically ordered, composed of alphanumeric characters only, and be unique. Which one of the following is an example of this definition? a. Rules for matching equality b. Rules for sorting attribute values c. Syntax d. Entry If contained in a Dn, which one of the following characters is NOT escaped? a. Backslash (\) b. Less-than symbol (<) c. Greater-than symbol (>) d. Dollar sign ($) Identify the operation that takes a single parameter, message ID. a. Abandon operation b. Bind operation c. Unbind operation d. Rename operation Which of the following attribute types describes the applications that own and use the attribute? OID Associated attribute syntax Usage indicator Matching rules Which of the following directory schema elements governs the search and compare operations performed on attribute values? Attribute Attribute Syntax Matching Rules Object Classes

In which of the following classes are the optional object class attributes defined? Structural class Auxiliary class

Abstract class Both Structural class and Abstract class The OID of an object class defines A unique number to identify the object The number of attributes in the class The name of the class The optional attributes in the class Which of the following attribute can be used to represent the departments in a DIT? ou dc cn uid Which of the following is the correct representation of RDN of the root node for an organization whose Internet domain name is www.developsol.com? dc=developsol,dc=com dc=com,dc=developsol dc=developsol.com dc=developsol Which of the following factor does not affect the directory design topology? Subnet mask of the network DNS namespace Physical location of the network Schema documentation Which of the following determine the way the data, which is stored in the main directory server and the replica servers, is synchronized? Replication Policies Unit of replication Incremental update Total update Identify the replication strategy for the above statement. Single master replication using chaining Single master replication using referrals Multimaster replication using partial update Multimaster replication using complete update

Identify the protocol that consists of two layers, the record protocol and handshake protocol, which provide encrypted communication between communication hosts on a network. TLS SASL TCP/IP DIGEST-MD5 Which of the following rpms will you use to implement this authentication mechanism? # rpm ivh pam_krb5-1.70-1.i386.rpm # rpm ivh cyrus-sasl-md5-2.1.15-3.i386.rpm # rpm ivh openssl-0.9.7a-22.1.i386.rpm # rpm ivh cyrus-sasl-gssapi-2.1.15-3.i386.rpm Which of the following data format represent ASCII text string? a. IA5String b. OctetString c. DirectoryString d. CountryString In which replication policy do the main server and the replica servers store a writable copy of the directory entries? a. Multimaster replication b. Dualmaster replication c. Hybrid replication d. Multiclient replication Which of the following specifies how attribute value should be represented in the directory? a. Associated attribute syntax b. Attribute c. Object classes d. Matching rules

From the following, identify the standard syntax that represents text strings, which are encoded in UTF-8 of ISO 10646. a. CountryString b. DirectoryString c. IA5String d. PrintableString

Which of the following standard matching rules is used to compare case of letters during comparisons, ignoring the leading, trailing, and multiple spaces? a. caseIgnoreMatch b. caseExactMatch c. integerMatch d. octetStringMatch Which of the following types of object class is used to create a new class from the existing LDAP class, top? a. Structural b. Alias c. Auxiliary d. Abstract In the ASN.1 schema format, what does SUBMATCHINGRULE specify? a. The rule applied when comparing two attributes for equality b. The rules applied on attributes when performing comparison operations c. The rules applied on attribute when comparing the attribute value with a substring d. The rules applied on attribute when deleting the attribute value with a substring

Consider the following problem and solution: Problem: You have multimaster directory server setup in your organization. However, you are facing a conflict problem in upgrading. Solution: You have assigned sequence numbers to the attribute names. Identify the correct option for the solution. a. The solution fully solves the problem b. The solution partially solves the problem c. The solution does not solve the problem d. Both the problem and solution are incorrect

You have configured a directory server in an organization. Whenever a user has to access the server, the user has to provide his/her user name and password. After a user connects to the directory server, you would like the user to remain connected for the next five hours. To solve the problem, you need to: a. Configure Kerberos b. Configure single master directory c. Configure OpenSSL

d. Configure multimaster directory You have configured a directory server and a slave directory server in an organization. However, you find that the master directory server and the slave directory are synchronized after every 12 hours. Which one of the following options is the correct reason for the mismatch between master and slave directory servers? a. The servers are configured in multimaster mode b. The servers are updated through chaining approach c. The servers are configure in single master mode d. The servers are configured for incremental updating The main server performs the write operation on the request of the replica server and sends back the results. The replica server receives the result and forwards it to the client. In which of the following replication policies does the preceding scenario unfold? a. Multimaster replication b. Single-master replication using referrals c. Single-master replication using chaining d. Multimaster replication using incremental update Donna Bard, a network administrator at RedSky Inc., is assigned the task of enabling the replica server to send the IP address of the main server to the client of the company. What should Donna do to perform the task? a. Send a write operation by using referrals. b. Send a write operation by using chaining. c. Use multimaster replication to send a write operation. d. Use single Master replication to send a write operation. You have to configure an OpenLDAP server. To save disk space, however, you have to disable logging in the OpenLDAP server. Which one of the following options can you use to achieve this? a. Remove the log files from /var/log files b. Add loglevel 0 in slapd.conf file c. Add local4.debug 0 in slapd.conf file d. Add loglevel 2048 in slapd.conf file

Tom Wilkins is working as a network administrator at Blue Moon Computers. Blue Moon Computers has deployed an LDAP server to provide information and resources across the organization. Tom is asked to modify salary entries of employees who got increments. He wants the modification process to continue even if there is an error in the

modified entry. Tom also wants that all the incorrect entries should be recorded in an errorlog file, log_file. Which command should Tom use to perform the required task? a. ldapmodify c o log_file b. ldapmodify o log_file c. ldapmodify c-w log_file d. ldapmodify o w log_file Identify the command that you will issue to add the details of user contained in an LDIF file named, user.ldif from an LDAP client. The LDAP server is configured on 192.168.0.202. a. slapadd l h 192.168.0.202 user.ldif b. slapadd l h 192.168.0.202 f user.ldif c. ldapadd -x h 192.168.0.202 -D "cn=Manager,dc=newmoon,dc=com" -W user.ldif d. ldapadd -x h 192.168.0.202 -D "cn=Manager,dc=newmoon,dc=com" -W -f peter.ldif Which one of the following files will you use to find the arguments that were passed to the slapd daemon for starting an OpenLDAP server? a. /etc/openldap/slapd.conf b. /var/run/slapd.args c. /var/run/slapd.pid d. /var/log/slapd.conf

You have to configure a directory-enabled application. Which one of the following security mechanisms can you use to provide programmable authentication interface to the application? a. CRAM-MD5 b. GSSAPI c. KERBEROS_V4 d. DIGEST-MD5 Which of the following directives is used configure logging on the OpenLDAP server? a. loglevel b. pidfile c. replogfile d. logserver Which of the following files contains the information about the FQDN of a

directory server? a. slapd.conf b. slapd c. sasl.conf d. slurpd.conf Which one of the following parameters can be used in ACLs to restrict clients from accessing a specific attribute in a directory? a. dn[<dnstyle>]=<users> b. attrs=<attribute list> c. attrs=<auth> d. users Ed Young is working as a system administrator at Red Sky IT Systems. The organization has implemented an LDAP server to enable its users and clients to access the organizations information. Ed finds that the LDAP directory is displaying numerous irrelevant entries in response to the search requests of the clients. He wants to restrict the number of entries that a server retrieves in response to search requests. Which of the following parameters of the slapd.conf file on LDAP server should Ed modify to perform the task? a. sizelimit <integer> b. timelimit <integer> c. l <integer> d. z <integer> Tom Wilkins is working as a system administrator at Technology Systems. The management asks Tom to identify the employees who have received salary increments. Tom writes all the search requests in a data file. He uses the ldapsearch utility to search the bulk entries by using a single command. Which option should Tom use with ldapsearch utility to read lines from a data file and perform LDAP search for each line? a. -S b. f c. x d. D Ed Young, a system administrator at Mastery Mechanics is working on an LDAP directory. He finds that some entries of the inventory department require immediate updating. Ed writes all the required modifications in a file. He wants to use this file as an input to the ldapmodify utility. In addition, he does not want the modification process to stop even if there is an error in it. Which of the following commands should Ed use to perform the task? a. ldapmodify a -f b. ldapmodify b -f c. ldapmodify c -f

d. ldapmodify r f You have configured an LDAP directory server on a node having the IP address 172.17.27.154. The suffix of the directory is dc=newmoon,dc=com. You have to identify only the e-mail ids of all the users whose surname is Carter. Which of the following commands will you use to perform the task? a. ldapsearch sn=carter -h 172.17.27.154 mail b. ldapsearch sn=carter -x -D "cn=manger,dc=newmoon,dc=com" c. ldapsearch sn=carter -x -D -W "cn=manger,dc=newmoon,dc=com" d. ldapsearch sn=carter -x -h 172.17.27.154 mail John Barret is working as a system administrator at SuperGraphics. John needs to delete some entries from the LDAP directory by using the ldapdelete command. He also wants the ldapdelete command to prompt the user for the password before deleting the entry from the directory. In addition to this, John requires the input to be read from the data file instead of the standard input. Which command should John use to perform the task? a. ldapdelete x c b. ldapdelete c -f c. ldapdelete f -x d. ldapdelete W f Identify the directive that is used to specify the name of the log file in which changes will be logged on the master server. replogfile replica binddn credentials replica directive, specifies the binding method to bind the master OpenLDAP server to the replica? suffix bindmethod binddn credentials What should be considered while copying the database files from the master server to the slave server? Master server and slave should use the same or compatible database versions Master server and slave should use the same byte ordering. Master server and slave should not use the same byte ordering. Master server and slave should use the same or compatible database versions and should use the same byte ordering.

Identify the command that you will issue at the master server to export the database to an LDIF file, backup.ldif. # slapaddb l backup.ldif #ldapadd l backup.ldif # ldapadd b -l backup.ldif #slapadd l backup.ldif What is the knowledge reference that points to the nodes directly under a directory partition s held by a domain controller known as? Referral Reference Superior Knowledge Reference Referral Link Mike Womack is working as a network administrator at Quality Software developers. He is performing cross platform integration of multiple directory services across the platforms. When he tries to integrate multiple directory services from different vendors, Mike has a problem in synchronizing data. Which utility should Mike use to carry out the transfer and conversion of data between multiple directories? Both, Connector and Driver agents Connector agent Driver agent Meta Directory

When does the need for integrating databases and directories across the network arise? Multiple vendor directories are used to store the data. Each directory uses its own database. Single vendor directories are used to store the data. Multiple vendor directories are used to store the data and each directory uses its own database What are the major issues in cross platform integration? Security of data Integrity of data

Security and integrity of data Security and integrity of data stored on the LDAP directory In order to work with LDAP, what would you do to configure the Active Directory? Update the schema. Extend the interface of Microsofts Users and Group Manager Directory administration. Update the schema and extend the interface of Microsofts Users and Group Manager Directory administration. Secure data stored on the LDAP directory. Which of the following directives is used to edit the configuration file, /etc/openldap/ldap.conf? BASE <search base> Replogfile Replica BASE <search base> and HOST<server name> To breach the security of the directory server, Steve eavesdrops on the credential information transmitted to the directory server. Identify the threat that Steve is using to breach the security. Connection hijacking Credential forging Network sniffing Masquerading Steve, the system administrator at APL Inc. needs to know the controls supported by the OpenLDAP server. Which of the following commands should Steve use to perform the task? a. # ldapsearch -x -s base -b "" "(objectclass=*)" + b. # ldapsearch -x -s base -b "" "(objectclass=*)" c. # ldapsearch -x base -b "" "(objectclass=*)" + d. # ldapsearch -x -s base -b "" +"(objectclass=*)" You want to dump the content of OpenLDAP directory entries into an LDIF file. Which of the following commands should you use? a. slapadd b. slapcat c. ldapadd d. ldapmod Steve, the system administrator at APL Inc. needs to

create a replica OpenLDAP server of the master OpenLDAP server. Which of the following should Steve use to create a replica OpenLDAP server? a. # slapadd l dbfile.ldif b. # slapcat l dbfile.ldif c. # slapadd b dc=apl,dc=inc l dbfile.ldif d. # slapcat b dc=apl,dc=inc l dbfile.ldif To allow users to search anonymously within the active directory, you have to configure the __________of the Active Directory. a. Access Control List (ACL) b. Metadirectory c. Multivendor directory d. LDAP directory Which of the following is an LDAP replication daemon that is used to synchronize the databases of master server and slave servers? a. slurpd b. slapd c. replicad d. ncsd Which of the following files is used to enable replication in the slave LDAP server? a. slapd.conf a. slurpd.conf b. master.conf c. nsswitch.conf

Which of the following parameters in slapd.conf file of a replica allows you to bypass the modification request from slave LDAP server to master LDAP server? a. rootpw b. updatedn c. rootdn d. updateref Which of the following configuration parameters with the replica directive can be used to specify the partition to be replicated? a. Host b. Port c. Suffix d. credentials

5. Which of the following sections of the slapd.conf file should be same in both, the master server and replicas? a. Global b. Database c. The Global and Database section should be same in both, the master server and replicas d. The Global and Database section should be different in the master server and replicas Multistore uses Windows and Linux-based computer systems in two different departments. Ed, the system administrator at Multistore, is asked to enable the computer systems to communicate with each other. To achieve this, Ed implements the LDAP server on the Linux-based computer system but has a problem of synchronization between the computer systems. Which synchronization agent should Ed use to solve the problem? a. Push agent b. Pull agent c. Push and Pull agent d. Both, Push and Pull agents Technology Systems is a computer systems manufacturing company. The various departments maintain different databases and directories to store their respective data. The General Manager of Technology Systems needs to see an integrated view of the databases and directories of all the departments. Which service should the company use to perform the task? a. Metadirectory b. Connector Synchronization agent c. Driver Synchronization agent d. Connector and Driver Synchronization agents Mastery Mechanics maintains the information of its employees in databases and directories in different computer systems operating on different platforms. The information contained in directories is different from the information contained in databases. Therefore, the management asks Ed Young, the system administrator, to integrate these multiple directories across the platform for business purposes. Ed has a problem in integrating all the information sources to perform the task. Which technology should Ed use to solve the problem? a. Metadirectory b. Multivendor Directory c. Singlevendor Directory d. Singlevendor and Multivendor directories both True Travel Services maintains the data of its employees in different directory servers. These directory servers are operating on Windows- and Linux-based

platforms. The company needs to perform cross-platform integration between the directory servers to enable users on different platforms to communicate with each other. Donna Bard, the system administrator, is asked to perform the task. Which method should Donna use to integrate Windows clients with Linux clients? a. LDAP proxy server b. Both, Connector and Driver agents c. Metadirectory d. NIS/Active Directory gateway or PAM and NSS LDAP libraries SSPT Corporation uses the LDAP directory to store all the information about its employees. The management allows the employees to search and access the information anonymously. The employees find that they are unable to read their passwords. What can be the possible cause of the problem? a. The permission set of Read all properties does not include reading of password permission b. Error in the directory c. Entry does not exist in the directory d. No password is required in anonymous access Steve tries to hack the LDAP server of Blue Moon Inc. by using keystroke sniffer software that records the keystrokes made by a user. What type of security threat does Steve use? a. Script kiddie b. Trojan Horse c. Virus d. Zombie

Consider the following statements: Statement A: You need to generate a public and private key pair for digital certificates. Statement B: SSL uses public-key cryptography to establish a secure connection between communicating hosts. a. Statement A is True, and Statement B is False. b. Statement A is False, and Statement B is True. c. Both, Statement A and Statement B, are True. d. Both, Statement A and Statement B, are False. Identify the authentication scheme where the directory server and the client need to present credential information to each other. a. Anonymous authentication

b. One way authentication c. Authentication based on a simple password d. Mutual authentication Statement A: SASL is used to provide authentication support to connection less protocols, such as TCP/IP. Statement B: The client tools, such as ldapsearch and ldapmodify, by default uses the SASL to authenticate the users. Which is correct with respect to the above statements? a. Statement A is True and Statement B is False. b. Statement A is False and Statement B is True. c. Both, Statement A and Statement B, are True. d. Both, Statement A and Statement B, are False. In which of the following security threats, existing programs are used to exploit the security loopholes on the directory server? a. Connection hijacking b. Credential forging c. Network sniffing d. Script kiddie John has made use of disk space and CPU of the directory server to an extent that directory server is unavailable to authorized clients. Which of the following method John has used to launch DoS attack on the directory? a. Distributed DoS attack b. Direct resource consumption c. SYN attack d. Indirect resource consumption Which of the following method should you use to monitor the activities such as the modification of user password? a. Intrusion detection system (IDS) b. Auditing c. Authentication d. Host-based detection systems Identify the tool that prepares reports regarding identified security loophole, causes of the loophole, impact of the loophole, and solutions to handle the identified problem. a. SASL b. SATAN c. SSL d. TLS Consider the following statements: Statement A: SSL always uses digital certificates to authenticate users over an

SSL-encrypted connection. Statement B: Authentication based on digital certificate over SSL becomes complex due to the use of digital certificates that use a lot of system resources. a. Both, Statement A and Statement B, are true. b. Both, Statement A and Statement B, are false. c. Statement A is true, and Statement B is false. d. Statement A is false, and Statement B is true. John, the system administrator at Red Eye Sky IT Systems, decides to implement the SASL authentication mechanism on his OpenLDAP server. John decides to share the password between OpenLDAP client and server. Therefore, John uses the DIGESTMD5 mechanism to encrypt the password. Which format should John use to produce the SASL authentication id using the DIGEST-MD5 mechanism? a. uid=<username>, cn=<realm>, cn=digest-md5 b. uid=<username>, cn=<realm>, cn=auth c. uid=<username>, cn=digest-md5, cn=auth d. uid=<username>, cn=<realm>, cn=digest-md5, cn=auth Steve, the system administrator at Smartlabs, has implemented the SASL authentication mechanism on his OpenLDAP server. John Barrett has recently joined the organization and Steve is asked to create the user account for John. Which command should Steve use to generate an encrypted password for the new user John? a. # saslpasswd2 u John b. # saslpasswd c Johnu John c. # saslpasswd2 c John d. # saslpasswd2 John Donna Bard is working as a system administrator at Blue Moon Computers Inc. Blue Moon uses various authentication mechanisms, such as DIGEST-MD5, for authentication purposes. Donna is required to retrieve information about the user Steve from the OpenLDAP server. Which of the following ldapsearch commands should Donna use to perform the above task? a. $ ldapsearch U u000997 b dc=smartdevelopers, dc=com cn=Steve* b. $ ldapsearch Y U u000997 b dc=smartdevelopers, dc=com cn=Ronald* c. $ ldapsearch b dc=smartdevelopers, dc=com cn=Ronald* d. $ ldapsearch Y DIGEST-MD5 U u000997 b dc=smartdevelopers, dc=com cn=Ronald* Ronald Billing is working as a system administrator at Smartlabs. Ronald is asked to setup the Kerberos servers in the organization to enable the Kerberos based authentication. Ronald needs to specify the domain name and realm to set up the primary Kerberos server. Which of the following configuration files should Ronald modify to configure the primary Kerberos server?

a. /etc/kerb5.conf b. /var/kerberos/krb5kdc/kdc.conf c. /var/kerberos/krb5kdc/kadm5.acl d. /var/kerberos/krb5kdc/kadm5.acl, and /etc/kerb5.conf Steve Barnard is working as a system administrator at Smartdevelopers Inc. Steve is asked to setup Kerberos server to enable Kerberos-based authentication in the organization. After modifying the configuration files, Steve needs to create the Kerberos database that will store the authentication information. Which command should Steve use to perform the above task? a. # /usr/kerberos/sbin/kdb5_util create b. # /usr/kerberos/kdb5_util create s c. # /usr/kerberos/sbin/kdb5_util create s d. # /usr/sbin/kdb5_util create s To which of the following attributes of posixAccount object class will the first entry of 325 be mapped? gecos attribute uid attribute uidNumber attribute gidNumber attribute

Steve, the system administrator at APL Inc. is changing the NIS infrastructure to LDAP infrastructure. Steve needs to convert the group information in the LDIF format. Identify the migration perl script that Steve should use to perform the specified task. migrate_group.pl migrate_netgroup.pl migrate_netgroup_byhost.pl migrate_netgroup_byuser.pl Jim Lewis is working as a system administrator at RedSky IT Systems. The management of the organization decides to migrate the existing NIS infrastructure to OpenLDAP server. Jim decides to customize the migration script, migrate_common.ph file to create the migration scripts according to the requirements. Which of the following parameter should Jim use to provide default name suffix in the customized migration script?

$DEFAULT_MAIL_DOMAIN $DEFAULT_BASE $EXTENDED_SCHEMA $NAMING CONTEXT John, the system administrator needs to create the encrypted password for the ldap admin dn of the OpenLDAP directory. Which command should John use to perform the required task? # smbpasswd w secret # smbpasswd W secret # /usr/bin/smbpasswd w secret # /usr/bin/smbpasswd W secret Steve is working as a system administrator at Smartlabs. Steve needs to retrieve the modification time of lmpassword and ntpassword since 1970. Which attribute if the sambaAccount object should Steve use to perform the required task? sambaNTPassword sambaPwdLastSet sambaAcctFlags SambaLMPassword

Identify the attribute of sambaAccount object that specifies the path where user profiles are stored. sambaHomeDrive sambaLogonScript sambaProfilePath sambaHomePath Consider the following statements Statement A: You can store all the Samba related information in the OpenLDAP server by using the smbAccount object. Statement B: The operating system of the OpenLDAP server should provide a valid set of UNIX attributes for the smbAccount object. With respect to the preceding statements, which of the following options is correct? Both, Statement A and Statement B, are False. Both, Statement A and Statement B, are True. Statement A is False and Statement B is True.

Statement A is True and Statement B is False. Steve is working as a system administrator at Smartlabs. Steve needs to add a new user account, Ronald as a samba user. Which command should Steve use to perform the required task? # smbpasswd ronald s ronald123 # smbpasswd s ronald123 # smbpasswd a ronald ronald123 # smbpasswd a ronald s ronald123 Steve, the system administrator at APL Inc., is changing the NIS infrastructure to LDAP infrastructure. He needs to convert the password files stored in /etc/password and /etc/shadow in the LDIF format. Identify the migration perl script that Steve should use to perform the specified task. a. migrate_group.pl b. migrate_netgroup.pl c. migrate_passwd.pl d. migrate_netgroup_byuser.pl

Which perl script is used to translate the entries of the file /etc/networks into the LDIF format? a. migrate_networks.pl b. migrate_netgroup_byhost.pl c. migrate_netgroup.pl d. migrate_netgroup_byuser.pl Statement A: You need to use a cosine.schema file to provide Samba support in the LDAP server. Statement B: The pre-requisite schema files for samba.schema are inetorgperson.schema and cosine.schema. With respect to the preceding statements, which of the following options is correct? a. Both, Statement A and Statement B, are False. b. Statement A is False and Statement B is True. c. Both, Statement A and Statement B, are True. d. Statement A is True and Statement B is False. Statement A: You use SMB protocol for file sharing and printer sharing.

Statement B: A login request from the Windows clients performs maximum two lookups in the Samba server. With respect to the preceding statements, which of the following options is correct? a. Statement A is True and Statement B is False. b. Statement A is False and Statement B is True. c. Both, Statement A and Statement B, are True. d. Both, Statement A and Statement B, are False. Steve, the system administrator with Blue Moon Inc., needs to configure Samba with ldap support. Identify the parameter that Steve needs to use to bind the smbd daemon to the LDAP server. a. ldap admin dn b. ldap suffix c. ldap ssl d. ldap server

Ronald Irving, the system administrator at RedSky IT, Inc., is changing the NIS infrastructure to LDAP infrastructure. He needs to convert the hosts information into LDIF format. Identify the migration Perl script that Ronald should use to perform the specified task. a. migrate_passwd.pl b. migrate_hosts.pl c. migrate_networks.pl d. migrate_base.pl Which of the following posixAccount object class attributes specify the user name? a. Username b. Uid c. Uidnumber d. Gecos Which of the following statements is true when migrating from NIS to LDAP? a. Only those attributes that have a many-to-many mapping are migrated from NIS to LDAP. b. Only those attributes that have a many-to-one mapping are migrated from NIS to LDAP. c. Only those attributes that have a one-to-many mapping are migrated from NIS to

LDAP. d. Only those attributes that have a one-to-one mapping are migrated from NIS to LDAP. Which of the following posixAccount object class attributes can be used to specify the office contact number of a user? a. Cn b. Description c. Gecos d. homedirectory John, the system administrator at Red Eye Sky IT Systems, decides to integrate samba with OpenLDAP to enable the Linux server to be a part of Windows network and provide various services to the users. Which of the following services is not provided by Samba? a. File sharing b. Printer Sharing c. Messaging d. User Authentication

Steve, the system administrator at Smartlabs, is asked to integrate the Linux server with Windows server using Samba. To do this, Steve needs to install a specific RPM package, smbldap-0.7-1.i386.rpm on the Linux machine. Which of the following command should Steve use to perform the required task? a. # rpm vh smbldap-tools-0.7-1.i386.rpm b. # rpm -ivh smbldap-0.7-1.i386.rpm c. # rpm ivh smbldap-tools-0.7-1.i386 d. # rpm ivh smbldap-tools-0.7-1.i386.rpm Donna Bard is working as a system administrator at Blue Moon Computers Inc. Blue Moon asks Donna to integrate the Linux network with Windows using Samba. Donna is required to modify the /etc/samba/smb.conf file to configure the samba to support OpenLDAP. Which of the following parameters should Donna implement to perform the required task? a. workgroup, netbios name, security, and encryption b. workgroup, netbios, and security c. workgroup, netbios, and encryption d. workgroup and encryption Ronald Billing is working as a system administrator at Smartlabs. Ronald is asked to integrate the Samba with OpenLDAP server. Ronald decides to configure the OpenLDAP to support Samba. To perform the task, Ronald needs to define the

16-byte hashed LANMAN password. This password will be generated by DES encryption method. Which attribute should Ronald implement to perform the required task? a. SambaLMPassword b. SambaNTPassword c. SambaAcctFlags d. SambaLogonScripts Steve Barnard is working as a system administrator at Smartdevelopers Inc. Steve is asked to integrate the Samba with OpenLDAP. To integrate the Samba with OpenLDAP, Steve needs to include some additional attributes, such as uid, displayName, and gidNumber. Which of the schema files should Steve include in the slapd.conf file to include these attributes? a. inetorgperson.schema, cosine.schema,nis.schema,autofs.schema b. inetorgperson.schema, cosine.schema,autofs.schema c. inetorgperson.schema, nis.schema d. inetorgperson.schema, cosine.schema,nis.schema

Statement A: You need to use the b option of rpmbuild command to build the binary package after the completion of %prep, %build, and %install stages. Statement B: You need to use the s option of rpmbuild command to perform the %build stage from the spec file. Which of the following options is correct with respect to the above statements? Statement A is True and Statement B is False. Statement A is False and Statement B is True. Both, Statements A and B, are True. Both, Statements A and B, are False. Statement A: You need to issue the patch command from the/usr/src directory to apply a patch. Statement B: You need to use the patch p0 command always to apply a patch. Which of the following options is correct with respect to the above statements? Statement A is True and Statement B is False. Statement A is False and Statement B is True. Both, Statements A and B, are True. Both, Statements A and B, are False.

Statement A: The B option of the scp command is used to disable password authentication mechanism. Statement B: The p option of the scp command is used to disable the status indicator for each file transferred. Which of the following options is correct with respect to the above statements? Statement A is True and Statement B is False. Statement A is False and Statement B is True. Both, Statements A and B, are True. Both, Statements A and B, are False. Steve works as a system administrator at Good Graphics, Inc. He types the following command to check the integrity of the tracepath command: # rpm Vf /bin/tracepath Which of the following character will be displayed in the output if the file is unreadable? S G M ?

Donna Johnson works as a system administrator at Red-Eye Experts. While upgrading a package, she encounters the dependency problem. Which option of the rpm command should Donna use to ignore the dependency error? --nodeps -F --aids -V Steve works as a network administrator at Red Sky IT Systems at Denvor. He wants to upgrade the existing kernel of the Linux server with a new kernel to enable enhanced security features. Steve downloads the required kernel source code and wants to configure it. Steve has to change only few configuration settings. Steve has to upgrade the kernel at the earliest and the GUI mode of Linux is not working. Which of the following command should Steve use at the shell prompt to configure the kernel? make menuconfig make xconfig make oldconfig make config

Tom works as a network administrator at PQR Inc. He wants to upgrade the kernel version 2.4.0 of Linux computer with kernel version 2.6.0 to improve the speed of processing of kernel. While configuring the kernel, he enables the module support feature for the File system option in the Main menu. After configuring the kernel version 2.6.0, which command should Tom issue at the shell prompt to compile the modules? make modules make modules_install make clean make dep

John works as a network administrator at Deez, Inc. There is a Linux server in the organization that uses processor of architecture i686. John has been assigned a task of upgrading the kernel version 2.4.2 of Linux server to kernel version 2.4.22. After configuring and compiling the kernel, John wants to install the kernel. For this, first, he needs to copy the kernel to the /boot/vmlinuz-2.4.24Upgrade directory. Which command should John issue at the shell prompt to copy the kernel to the /boot/vmlinuz2.4.24Upgrade directory? cp /usr/src/linux-2.4.22/arch/i686/bzImage/boot/vmlinuz-2.4.22Upgrade cp /usr/src/linux-2.4.22/arch/i686/boot/bzImage /boot/vmlinuz-2.4.22Upgrade cp /usr/src/bzImage /boot/vmlinuz-2.4.22Upgrade cp /usr/src/linux-2.4.22/bzImage/boot/vmlinuz-2.4.22Upgrade Statement A: If the kernel compiles ok, but does not boot, then you need to run the make clean command to troubleshoot the problem and then recompile the kernel. Statement B: If the kernel compiles ok but make modues fail, then you need to run make dep command only to troubleshoot the problem. Which of the following options is correct with respect to the above statements? Statement A is True and Statement B is False.

Statement A is False and Statement B is True. Both, Statement A and Statement B, are True. Both, Statement A and Statement B, are False. Statement A: The Unresolved symbols error message occurs when the kernel fails to load a module. Statement B: The Unresolved symbols error message can be troubleshooted by running the make clean command before compiling the kernel. Which of the following options is correct with respect to the above statements? Statement A is True and Statement B is False. Statement A is False and Statement B is True. Both, Statement A and Statement B, are True. Both, Statement A and Statement B, are False.

Nancy Jones works as a network administrator at Global System, Inc. The organization has its two branches at Houston and New York, and both are connected in a network. The employees of the organization generally communicate through e-mail messages. Nancy receives a complaint from John, a software developer at Houston, that he is not able to send and receive mails to James, a software developer at the New York branch. Nancy uses the traceroute command to view the route through which the e-mail messages go from source to the destination. She observes that the traceroute command is not working properly. As a result, she wants to check the integrity of the traceroute command. What should Nancy do to check the integrity of the traceroute command? a. She needs to type the rpm Vf /bin/traceroute command at the shell prompt b. She needs to type the rpm K /bin/traceroute command at the shell prompt c. She needs to import the RPM-GPG-KEY key and type the rpm Vf /bin/traceroute command at the shell prompt d. She needs to import the RPM-GPG-KEY key and type the rpm K /bin/traceroute command at the shell prompt Steve, a network administrator, downloads the

squirrelmail-1.2.11-1.src.rpm SRPM and installs it on his computer. Now, he wants to make binary RPM of the squirrelmail-1.2.11-1.src.rpm SRPM. While building the binary RPM, Steve also wants to view the debugging information. How can he perform the required task? a. He needs to navigate to the /usr/src/redhat/SPECS directory and type the following command to build binary RPM of squirrelmail package: # rpmbuild bb squirrelmail.spec  b. He needs to navigate to the /usr/src/redhat/SPECS directory and type the following command to build binary RPM of squirrelmail package: # rpmbuild bp squirrelmail.spec  c. He needs to navigate to the /usr/src directory and type the following command to build binary RPM of squirrelmail package: # rpmbuild bb vv squirrelmail.spec  d. He needs to navigate to the /usr/src/redhat/SPECS directory and type the following command to build binary RPM of squirrelmail package: # rpmbuild bb vv squirrelmail.spec  Donna Johnson works as a network administrator at PQR, Inc. She has the httpd-2.0.i386.rpm installed on her computer. Donna finds that the httpd.conf file in the httpd-2.0.i386.rpm has been corrupted. She wants to extracts the httd.conf file from the httpd-2.0.i386.rpm package. What should Donna do to perform the required task? a. He needs to convert the httpd-2.0.i386.rpm to the cpio archive by using the cpio command and copy the httpd.conf file from the cpio archive to the /etc/httpd/conf directory. b. She needs to convert the httpd-2.0.i386.rpm to the cpio archive by using the rpm2cpio command and copy the httpd.conf file from the cpio archive to the /etc/httpd/conf directory. c. She needs to convert the httpd-2.0.i386.rpm to the cpio archive by using the cpio command and copy the httpd.conf file from the cpio archive to the /etc/httpd directory. d. She needs to convert the httpd-2.0.i386.rpm to the cpio archive by using the rpm2cpio command and copy the httpd.conf file from the cpio archive to the /etc/httpd directory. John works as a network administrator at Global System, Inc. He has the squirrelmail-1.2.11-1.noarch.rpm package installed on his computer. He wants to verify the integrity of the squirrelmail-1.2.11-1.noarch.rpm package. How can

John perform the required task? a. He needs to type the rpm K squirrelmail-1.2.11-1.noarch.rpm command at the shell prompt b. He needs to type the rpm Vf squirrelmail-1.2.11-1.noarch.rpm command at the shell prompt c. He needs to import the RPM-GPG-KEY key and type the rpm Vf squirrelmail-1.2.11-1.noarch.rpm command at the shell prompt d. He needs to import the RPM-GPG-KEY key and type the rpm K squirrelmail-1.2.11-1.noarch.rpm command at the shell prompt

Joe Garnett works as a system administrator in RedSky IT Services. Joe recently downloaded the latest kernel source code and updated it. However, Joe is unable to boot from the new kernel and views the following error message: Warning: unable to open an initial console Kernel panic: no init found. Try passing init = option to Kernel . What should Joe do to troubleshoot the problem? a. Joe needs to set the root= parameter correctly in the /etc/lilo.conf file b. Joe needs to assign the value, 0, to the default parameter c. Joe needs to assign the value, 1, to the default parameter d. Joe needs to set the image= parameter correctly in the /etc/lilo.conf file John Barred, the system administrator at Red Sky IT System wants to check whether or not the kernel on a Linux computer detects the full amount of RAM. For this, John issues the cat/proc/meminfo command and observes that the displayed quantity of memory is not the same as the installed RAM of 256 MB. What should John do so that the kernel detects the full amount of RAM? a. John needs to add the following entry to the /boot/grub/grub.conf: mem=256M b. John needs to add the following entry to the

/boot/grub/grub.conf: mem=256M. After adding this entry, John needs to reboot the computer. c. John needs to add the following entry to the /boot/grub/grub.conf: linux mem=256M. After adding this entry, John needs to reboot the computer. d. John needs to add the following entry to the /boot/grub/grub.conf: linux mem=256M Statement A: The make xconfig command works only in the GUI mode. Statement B: The make oldconfig prompts all the questions that are required for configuration of kernel. Which of the following options is correct with respect to the above statements? a. Statement A is True and Statement B is False. b. Statement A is False and Statement B is True. c. Both, Statement A and Statement B, are True. d. Both, Statement A and Statement B, are False.

What do you need to do if you see the following error message after running the make bzImage command: warning: kernel is too big for standalone boot from floppy a. Use the make zImage command instead of the bzImage command. b. Disable the configuration settings that are not required and recompile the kernel using the make bzImage command. c. Disable the configuration settings that are not required and recompile the kernel using the make zImage command. d. Use the make dep command and then recompile the kernel using the make bzImage command. Mike Womack works as a network administrator at PQR, Inc. Mike upgrades the existing kernel of the Linux server to a new version to obtain new hardware support. He upgrades the kernel and reboots the computer after upgrading. He observes that the computer hangs just before the LILO is displayed. What should Mike do to troubleshoot the problem? a. Mike needs to restart the computer and press the DEL key to set up the BIOS. Then, Mike needs to select the IDE settings and set the proper primary hard drive and slave drives. b. Mike needs to restart the computer and press the F10 key to

set up the BIOSd. Then, Mike needs to select the IDE settings and set the proper primary hard drive and slave drives. c. Mike needs to restart the computer and press the DEL key to set up the BIOS. Then, Mike needs to select the IDE settings and set the proper secondary hard drive and slave drives. d. Mike needs to restart the computer and press the DEL key to set up the BIOS. Then, Mike needs to select the IDE settings and set the proper primary hard drive. Chris Donald, the system administrator, at Smart Software Developers wants to make a binary RPM from the source code of slang-1.4.5-18.src.rpm SRPM. Before making the binary RPM, Chris wants to specify the location of the README file. Which of the following sections does Chris need to modify to perform the required task? a. Preamble b. %prep c. %file d. %build

Steve works as a network administrator at Red Sky IT Systems. He downloads the source code of postfix RPM to provide support to the mail server in the organization. Which of the following options should Steve use with rpmbuild command to unpack the SRPM of postfix? a. bb b. bp c. bc d. bs Nancy, the network administrator at Quality Software Developers wants to check the integrity of an rpm package installed on her computer. Which option of the rpm command should Nancy use to perform the required task? a. v b. Vf c. K d. qi Statement A: You can use the cpio command to extract a single file from a package. Statement B: You can use the --replacefiles or --nodeps option with the rpm command to resolve dependencies. With respect to the above statements, which of the following options is correct? a. Statement A is True and Statement B is False. b. Statement A is False and Statement B is True. c. Both, Statement A and Statement B, are True.

d. Both, Statement A and Statement B, are False. Statement A: The ? symbol in the output of rpm Vf command shows that the file is unreadable. Statement B: The Vf of rpm command can check the integrity of any command. With respect to the above statements, which of the following options is correct? a. Statement A is True and Statement B is False. b. Statement A is False and Statement B is True. c. Both, Statement A and Statement B, are True. d. Both, Statement A and Statement B, are False. 1. Which of the following commands cannot be used to configure the kernel if you work in a CLI mode? a. make config b. make oldconfig c. make menuconfig d. make xconfig

2. Steve works as a network administrator at Global System, Inc. He needs to upgrade the kernel version 2.4.0 of Linux server to kernel version 2.6.0. To configure the kernel version 2.6.0, from which directory Steve should issue the make xconfig command? a. /root b. /usr/src c. /usr/src/linux-2.4.0 d. /usr/src/linux-2.6.0 3. Donna works as a network administrator at Deez, Inc. There is a Linux server in the organization that uses a processor of architecture i486. Donna needs to upgrade the kernel version 2.4.0 of Linux server to kernel version 2.4.24. She issues the make bzImage command to create the gzip compressed kernel image named bzImage. In which directory is the bzImage file stored? a. /usr/src/linux-2.4.24 b. /usr/src c. /usr/src/linux-2.4.24/arch/i486/boot d. /usr/src/linux-2.4.24/arch/i486 4. Which of the following options when used with the mkbootdisk command instructs the user to insert a floppy? a. --device devicefile b. --noprompt c. iso

d. --size size 5. Don Allen works as a network administrator at Good Graphics, Inc. He needs to upgrade kernel version 2.4.2 of Linux server to kernel version 2.6.0. After configuring and compiling the kernel version 2.6.0, Don types the make modules_install command to install the modules. What task does this command perform? a. Copies the new modules to the /lib directory b. Copies the new modules to the /lib/modules directory c. Copies the new modules to the /lib/modules/2.6.0 directory d. Copies the new modules to the /lib/modules/2.6.0/build directory Statement A: To install Linux on a computer using FTP, you need to install FTP on the Linux computer. Statement B: To install Linux on a computer using NFS, you need to install NFS on the Linux computer. Which is correct with respect to above statements? Statement A is True and Statement B is False. Statement A is False and Statement B is True. Both, Statement A and Statement B, are True. Both, Statement A and Statement B, are False. Statement A: SNMP can be used to monitor a network and its components. Statement B: Strace can be used as a monitoring tool. Which is correct with respect to above statements? Statement A is True and Statement B is False. Statement A is False and Statement B is True. Both, Statement A and Statement B, are True. Both, Statement A and Statement B, are False. Statement A: Providing network based services, such as FTP and samba makes different ports vulnerable for network attacks. Statement B: Malicious users can cause an application or an operating system to break down by triggering its buffer overrun. Which is correct with respect to above statements? Statement A is True and Statement B is False. Statement A is False and Statement B is True. Both, Statement A and Statement B, are True. Both, Statement A and Statement B, are False. Statement A: Auditing in Linux can be done using syslog. Statement B: Stealth scanning is used to scan a host

without being detected by applications, such as Synlogger. Which is correct with respect to above statements? Statement A is True and Statement B is False. Statement A is False and Statement B is True. Both, Statement A and Statement B, are True. Both, Statement A and Statement B, are False. Statement A: RHEL 3 supports kernel 2.6. Statement B: Mandrake corporate server 3.0 supports kernel 2.6. Which is correct with respect to above statements? Statement A is True and Statement B is False. Statement A is False and Statement B is True. Both, Statement A and Statement B, are True. Both, Statement A and Statement B, are False.

Statement A: The syslog.conf file is stored in the /etc/sysconfig directory, and the syslog file is stored in the /etc directory. Statement B: The r option of the SYSLOGD_OPTIONS parameter in the /etc/sysconfig/syslog file enables logging from the remote machines. Which of the following options is correct with respect to the above statements? Statement A is True and Statement B is False. Statement A is False and Statement B is True. Both, Statement A and Statement B, are True. Both, Statement A and Statement B, are False. Statement A: kswapd is a part of the kernel that frees memory when it gets fragmented or full. Statement B: kswapd contains a parameter tries_min, which specifies the number of pages kswapd writes in one turn. Which of the following options is correct with respect to the above statements? Statement A is True and Statement B is False. Statement A is False and Statement B is True. Both, Statement A and Statement B, are True. Both, Statement A and Statement B, are False. Statement A: A Linux computer is said to be shutting down

gracefully if before shutting down it does not terminate all the processes that are running currently. Statement B: A non-zero value of the ctrl-alt-del parameter specifies that the computer will reboot immediately without terminating all the running services and processes. Which of the following options is correct with respect to the above statements? Statement A is True and Statement B is False. Statement A is False and Statement B is True. Both, Statement A and Statement B, are True. Both, Statement A and Statement B, are False.

Statement A: The parameter, panic_on_oops can be modified to control the behavior of the kernel when a bug is encountered. Statement B: The value, 0, of the panic_on_oops parameter specifies that the kernel delays for few seconds if a bug is encountered and then reboots. Which of the following options is correct with respect to the above statements? Statement A is True and Statement B is False. Statement A is False and Statement B is True. Both, Statement A and Statement B, are True. Both, Statement A and Statement B, are False. Which of the following commands will you use to verify the installation of the appropriate HTTP services, while preparing an Apache Server? # rpm qa | grep nfs-utils # redhat-config-nfs-1.0.13-1 # rpm qa | grep http # rpm qa | grep ftp What is the directory location of storing the standard files of FTP server? /usr /var/vsftp

/usr/ftp/ /var/ftp/pub What is the directory location for storing the standard files of Apache Web Server? /var /var/www/html /usr/bin /etc For providing the graphical installation feature in Kickstart, which parameter needs to be specified in the ks.cfg file? mouse keyboard language monitor

Statement A: Linux kernel is modular as well as monolithic while Windows kernel is only monolithic. Statement B: Linux kernel runs the threads of a multithreaded application as separate processes using shared memory, while Windows kernel runs every application as a collection of threads. Which of the following options is correct with respect to the above statements? Statement A is True and Statement B is False. Statement A is False and Statement B is True. Both, Statement A and Statement B, are True. Both, Statement A and Statement B, are False. Statement A: The file systems, FAT32 and ext3, are supported by RHEL, but RHEL does not support XFS. Statement B: The file system, ReiserFS is a default file system in SuSE. With respect to the above statements, which of the following options is correct? Statement A is True and Statement B is False. Statement A is False and Statement B is True. Both, Statement A and Statement B, are True. Both, Statement A and Statement B, are False.

Statement A: Both file systems, ext3 and XFS, support block journaling. Statement B: Both file systems, ext3 and NTFS, provide POSIX file permissions. With respect to the above statements, which of the following options is correct? Statement A is True and Statement B is False. Statement A is False and Statement B is True. Both, Statement A and Statement B, are True. Both, Statement A and Statement B, are False. Statement A: You can export the account settings using the built in Import/Export feature of Internet Explorer. Statement B: You cannot export the Favorites/Bookmarks/Cookie with the help of built-in Import/Export feature of Internet Explorer. With respect to the above statements, which of the following options is correct? Statement A is True and Statement B is False. Statement A is False and Statement B is True. Both, Statement A and Statement B, are True. Both, Statement A and Statement B, are False. Statement A: While installing Mono RPMs, you should install the mono-core-1.1.6-1.novell.6.3.i586 RPM before installing the mono-data-1.1.6-1.novell.6.3.i586.rpm RPM. Statement B: While installing Mono RPMs, you should install the mono-data-1.1.6-1.novell.6.3.i586.rpmbefore installing the mono-basic-1.1.6-1.novell.6.3.i586.rpm RPM. Which of the following options is correct with respect to the above statements? Statement A is True and Statement B is False. Statement A is False and Statement B is True. Both, Statement A and Statement B, are True. Both, Statement A and Statement B, are False. 1. Consider the following statements: Statement A: Linux is supported on almost all types of platforms available. Statement B: Linux provides support to all types of hardware, such as a Palmtop with 2 MB of memory storage or petabyte storage cluster with hundreds of nodes. With respect to the above statements, which of the following is correct? a. Statement A is True and Statement B is False. b. Statement A is False and Statement B is True. c. Both, Statement A and Statement B, are True. d. Both, Statement A and Statement B, are False.

2. Consider the following statements: Statement A: Linux provides authentication service using PAM. Statement B: Linux provides secure communication using PAM. With respect to above statements, which of the following is correct? a. Statement A is True and Statement B is False. b. Statement A is False and Statement B is True. c. Both, Statement A and Statement B, are True. d. Both, Statement A and Statement B, are False. 3. Consider the following statements: Statement A: Linux provides authorization service using PAM. Statement B: Linux provides secure communication using PAM. With respect to above statements, which of the following is correct? a. Statement A is True and Statement B is False. b. Statement A is False and Statement B is True. c. Both, Statement A and Statement B, are True. d. Both, Statement A and Statement B, are False

4. Consider the following statements: Statement A: Red Hat Enterprise Linux ES supports EMD64T & AMD64 systems. Statement B: Red Hat Enterprise Linux AS supports EMD64T & AMD64 systems. With respect to above statements, which of the following is correct? a. Statement A is True and Statement B is False. b. Statement A is False and Statement B is True. c. Both, Statement A and Statement B, are True. d. Both, Statement A and Statement B, are False. 5. Consider the following statements: Statement A: Red Hat Enterprise Linux ES supports Itanium2 systems Statement B: Red Hat Enterprise Linux AS supports Itanium2 systems With respect to above statements, which of the following is correct? a. Statement A is True and Statement B is False. b. Statement A is False and Statement B is True. c. Both, Statement A and Statement B, are True. d. Both, Statement A and Statement B, are False. 1. APL, Inc. provides IT services to its clients across the world. The company has Linux-based enterprise set up for its services to the clients. Whenever a new system is brought in, the Kickstart installation is used to configure it. Steve is a network administrator at APL Inc.. In view of increasing client requirements, some new systems are added to the company. Steve wants to read and edit the Kickstart configuration file that may be used to install Linux on these new systems. Which

option in Kickstart installation should Steve use to perform the task? a. skipx b. install c. interactive d. text 2. EarthenSky, Inc. is an application development organization. The company uses Linux-based enterprise set up for its application development projects. The company has got a new application development project. John Warren is working as a project manager of this new project. The client has instructed John to ensure the safety and security of application resources related to this project. For this, the company uses an encrypt password system in its Linux-based machines. John needs a server that supports this encrypt password system. Which server should John use to perform this task? a. HTTP server b. Kerberos Server c. Samba Server d. NFS server

3. Earthenmovers, Inc. is an IT company, providing services to its clients all over the world. The company has a Linux-based enterprise set up. As per the clients requirements, the company needs to introduce new systems in its enterprise. The company uses the Kickstart installation for this purpose. Henry ONeil is working as the network administrator at Earthermovers Inc.. While performing the Kickstart installation on a new computer in the enterprise, Henry needs to initialize all the invalid partitions on the disk and delete the data on those partitions. Which Kickstart command should Henry use to perform the task? a. upgrade b. xconfig c. zerombr d. skipx 4. TeamSoftwares, Inc. is a software development organization, and has a Linux-based enterprise set up. The company needs to add 25 more computers for a new project. The enterprise uses Red Hat installation files from a remote computer for Kickstart installation. The enterprise has a DHCP server and a single Ethernet network card for every machine on the local network. Donna Bard is working as a network administrator at TeamSoftware Inc. She needs to configure the network cards on every new computer. Which command should Donna use to perform the task? a. network --device eth0 bootproto dhcp b. clearpart --all --drives=sda,sdb,sdc c. part /boot --fstype ext3 --size=100 --ondisk=sda d. part / --fstype ext3 --size=10000 --grow --ondisk=sda

5. PQl, Inc. is an IT company, providing the e-greetings services to its clients all over the world. The organization has a Linux-based set up in its enterprise. It needs to add some more computers to cater its client requirements. Ken Burton is working as a network administrator at PQl Inc., He is assigned the task of installing these new computers in the enterprise. He must install Linux on these machines by using the Kickstart installation remotely. Ken is instructed to perform this task in the minimum amount of time. Which server system should Ken use to perform this task? a. FTP b. HTTP c. NFS d. Samba

John works as a network administrator at Red Sky IT Systems. While managing virtual memory at the Linux server, John wants to specify the maximum number of dirty buffers that can be stored in the buffer cache. Which of the following parameters of the bdflush file should John edit to perform the required task? a. int ndirty b. int nfract c. int interval d. int nfract_sync Donna works as a network administrator at Red Sky IT Systems. While managing virtual memory at the Linux server, Donna wants to specify the maximum percentage of memory that can be used as buffer. Which of the following files does Donna need to edit for this? a. buffermem b. freepages c. bdflush d. kswapd Ronald Billing works as network administrator at Red Eye Experts. The mail server at the main branch of the organization provides mail services to all the computers

across different branches. To avoid the unnecessary traffic of data, Ronald has been assigned the task of blocking all the bogus error messages arriving at the mail server. What should Ronald do to perform the required task? a. He needs to assign the value, 1 to the icmp_echo_ignore_all parameter b. He needs to assign the value, 0 to the icmp_echo_ignore_all parameter c. He needs to assign the value, 1 to the icmp_echo_ignore_broadcasts parameter d. He needs to assign the value, 1 to the icmp_ignore_bogus_error_responses parameter

Tom works as a network administrator at PQR, Inc. All the employees across various branches use a centralized server at the main branch of the organization. Tom wants to increase the file descriptor limit for the MPI jobs that users run on the centralized server. What should Tom do to increase the file descriptor limit for the MPI jobs? a. Only the file, /etc/pam.d/login should be edited. b. Only the file, /etc/security/limits.conf should be edited. c. Both the files, /etc/pam.d/login, and /etc/security/limits.conf should be edited. d. Both the files, /etc/pam.d/rlogin, and /etc/security/limits.conf should be edite Steve works as a network administrator at Red Sky IT Systems. The employees across various branches of the organization use the database server, which is based on Windows. The employees of the organization require POSIX file permissions on the database server and ask Steve for this. Steve wants block journaling to be enabled on the database server. What should Steve do to perform the required tasks? a. Steve needs to migrate the database server to a Linux distribution that supports ReiserFS. b. Steve needs to migrate the database server to a Linux

distribution that supports ext3 filesystem. c. Steve needs to migrate the database server to a Linux distribution that supports ext2 filesystem. d. Steve needs to migrate the database server to a Linux distribution that supports XFS.

John Barret works as a network administrator at Global System Inc. The employees of its Software Development department develop .NET applications for their clients. Global System Inc. migrates to the Linux platform to avoid the cost of licensing in Windows. The employees need support to develop .NET applications on the Linux platform. What should John do to provide this support? a. John needs to install the mono-data-sybase-1.1.6-1.novell.6.3.i586.rpm RPM and all the RPMs on which it is dependent. b. John needs to install the mono-ikvm-1.1.6-1.novell.6.3.i586.rpm RPM and all the RPMs on which it is dependent. c. John needs to install the mono-jscript-1.1.6-1.novell.6.3.i586.rpm RPM and all the RPMS on which it is dependent. d. John needs to install the mono-devel-1.1.6-1.novell.6.3.i586.rpm RPM and all the RPMs on which it is dependent. Chris Donald works as a network administrator at Quality Software Developers. To avoid the cost of licensing in Windows, the organization migrates to the Linux platform. The employees of the R& D of Quality Software want to test

an application written in C# on the Linux platform. Which of the following is the correct order of installing the required Mono RPMs to provide support to run the C# application? a. The RPMs should be installed in the following order: mono-core-1.1.6-1.novell.6.3.i586.rpm mono-data-1.1.6-1.novell.6.3.i586.rpm mono-web-1.1.6-1.novell.6.3.i586.rpm b. The RPMs should be installed in the following order: mono-data-1.1.6-1.novell.6.3.i586.rpm mono-core-1.1.6-1.novell.6.3.i586.rpm mono-web-1.1.6-1.novell.6.3.i586.rpm c. The RPMs should be installed in the following order: mono-core-1.1.6-1.novell.6.3.i586.rpm mono-web-1.1.6-1.novell.6.3.i586.rpm mono-data-1.1.6-1.novell.6.3.i586.rpm d. The RPMs should be installed in the following order: mono-data-1.1.6-1.novell.6.3.i586.rpm mono-web-1.1.6-1.novell.6.3.i586.rpm mono-core-1.1.6-1.novell.6.3.i586.rpm

Statement A: While installing Mono RPMs, you should install the mono-locale-extras-1.1.6-1.novell.6.3.i586.rpm before installing the mono-devel-1.1.6-1.novell.6.3.i586.rpm to avoid dependency error. Statement B: While installing Mono RPMs, you should install the mono-extras-1.1.6-1.novell.6.3.i586.rpm RPM before installing the mono-devel-1.1.6-1.novell.6.3.i586.rpm RPM. Which of the following options is correct with respect to the above statements? a. Statement A is True and Statement B is False. b. Statement A is False and Statement B is True. c. Both, Statement A and Statement B, are True. d. Both, Statement A and Statement B, are False. Statement A: You can use the unsafe option with the mcs command to compile the unsafe code written in the C#. Statement B: You can use the nowarn option with the mcs command to ignore the warning messages while compiling a C# application. Which of the following options is correct with respect to the above statements? a. Statement A is True and Statement B is False. b. Statement A is False and Statement B is True.

c. Both, Statement A and Statement B, are True. d. Both, Statement A and Statement B, are False 1. Consider the following statements: Statement A: You need to assign the value, -s, to the SMBDOPTIONS parameter stored in the /etc/sysconfig/samba file to specify that the smbd should log to the standard output rather than a file. Statement B: You need to assign the value, -F, to the WINBINDOPTIONS parameter if you do not want to run winbind as a daemon. With respect to the above statements, which of the following options is correct? a. Statement A is True and Statement B is False. b. Statement A is False and Statement B is True. c. Both, Statement A and Statement B, are True. d. Both, Statement A and Statement B, are False.

2. Consider the following statements: Statement A: The default value of the age_buffer parameter stored in the /proc/sys/vm/bdflush file is 1 second. Statement B: The minimum value of the age_buffer parameter stored in the /proc/sys/vm/bdflush file is 30 seconds. With respect to the above statements, which of the following options is correct? a. Statement A is True and Statement B is False. b. Statement A is False and Statement B is True. c. Both, Statement A and Statement B, are True. d. Both, Statement A and Statement B, are False. 3. Which of the following parameters is used to calculate the maximum number of pages of virtual memory kswapd tries to free in one round? a. swap_cluster b. tries_min c. tries_base d. overcommit_memory 4. Which of the following parameters stored in the /proc/sys/kernel directory specifies the maximum number of System V shared memory segments that can be created in a system? a. shmall b. shmmax c. overflowgid

d. shmmni 5. Consider the following statements: Statement A: The minimum value of the nfrat_sync parameter is 0%. Statement B: The default value of the nfract_sync parameter is 50%. With respect to the above statements, which of the following options is correct? a. Statement A is True and Statement B is False. b. Statement A is False and Statement B is True. c. Both, Statement A and Statement B, are True. d. Both, Statement A and Statement B, are False. 1. Donna works as a network administrator at PQR, Inc. The employees across various branches of PQR, Inc. use the database server, which is based on the Windows platform. The employees of PQR Inc. want to be able to store files of size up to 6 terabyte on the file server. They also require POSIX file permissions on the file server. What should Steve do to solve the problem of employees? a. Steve needs to migrate the database server to a Linux distribution that supports ReiserFS. b. Steve needs to migrate the database server to a Linux distribution that supports ext3 filesystem. c. Steve needs to migrate the database server to a Linux distribution that supports ext2 filesystem. d. Steve needs to migrate the database server to a Linux distribution that supports NTFS. 2. Tom Wilkins works as a network administrator at Smart Software Developers. The employees of the Software Development department of the organization develop Visual Basic applications for their clients. Smart Software migrates to the Linux platform to avoid the cost of licensing in Windows. The employees of the Software Development department need support to run Visual Basic applications on the Linux platform. What should John do to help? a. John needs to install the mono-data-sybase-1.1.6-1.novell.6.3.i586.rpm RPM and all the rpms on which it is dependent. b. John needs to install the mono-complete-1.1.6-1.novell.6.3.i586.rpm RPM and all the rpms on which it is dependent. c. John needs to install the mono-basic-1.1.6-1.novell.6.3.i586.rpm RPM and all the RPMs on which it is dependent. d. John needs to install the mono-devel-1.1.6-1.novell.6.3.i586.rpm RPM and all the RPMs on which it is dependent. 3. Steve works as a network administrator at Red Sky IT Systems. The organization migrates its network to the Linux platform to avoid the cost of licensing in Windows. The employees of the Software Development department of this organization want to run the C# application, payroll.cs, on the Linux computers. Steve installs all the required Mono RPMs to provide support for running C# applications. After installing the required RPMs, Steve compiles the payroll.cs application. While

running the C# application, the employees of the Software Development department want the file, basic, to be loaded into the memory. They also want to activate the security manager while running the C# application. Which command should Steve use to perform the required tasks? a. # mono -config basic -security payroll.exe b. # mono -config basic payroll.exe c. # mono -config security payroll.exe d. # mono -security payroll.exe 4. Chris works as a network administrator at Red Eye Experts. This organization migrates its network from Windows to Linux. The employees of the Application Development department of the organization want to compile and run the C# application, salary.cs, on Linux computers. They also want that, if any error occurs, an exception should be generated. Which command should Chris use to perform this task? a. # mcs --fatal salary.cs b. # mcs -debug salary.cs c. # mcs --nowarn salary.cs d. # mcs --unsafe salary.cs

5. Jim works as a network administrator at Infoway Inc. The employees across various branches of Infoway Inc. uses Windows-based database server. The employees want to be able to store files of size up to 9EB on the database server. Jim wants to enable the Metadata only journaling feature on the server. What should he do to solve the problem of employees? a. Steve needs to migrate the database server to a Linux distribution that supports ReiserFS. b. Steve needs to migrate the database server to a Linux distribution that supports ext3 filesystem. c. Steve needs to migrate the database server to a Linux distribution that supports NTFS filesystem. d. Steve needs to migrate the database server to a Linux distribution that supports XFS.

Statement 1: You can use the vmstat command to obtain virtual memory statistics. Statement 2: You can use the top command to display a sorted list of CPU utilization processes. Which of the following is True with respect to the preceding statements? Statement A is True and Statement B is False. Statement A is False and Statement B is True.

Both, Statement A and Statement B, are True. Both, Statement A and Statement B, are False. Statement A: A managed device is a network terminal that contains an SNMP agent and resides on a SNMP managed network. Statement B: An agent is a software module for managing the network that resides in the managed devices. Which is True with respect to above statements? Statement A is True and Statement B is False. Statement A is False and Statement B is True. Both, Statement A and Statement B, are True. Both, Statement A and Statement B, are False. Statement A: The read command is used by an NMS to monitor the managed devices. Statement B: The write command is used by an NMS to control the managed devices. Which is True with respect to above statements? Statement A is True and Statement B is False. Statement A is False and Statement B is True. Both, Statement A and Statement B, are True. Both, Statement A and Statement B, are False Statement A: The snmpd.conf file defines the operation methods of the snmp agent.d Statement B: The snmptrapd.conf file defines the methods of operation of the Net-snmp applications. Which is True with respect to above statements? Statement A is True and Statement B is False. Statement A is False and Statement B is True. Both, Statement A and Statement B, are True. Both, Statement A and Statement B, are False.

Statement A: Host Escalations consist of definitions of optional escalation levels for host problems. Statement B: Service Escalations consist of definitions of optional escalation levels for failed services. Which is True with respect to above statements? Statement A is True and Statement B is False. Statement A is False and Statement B is True. Both, Statement A and Statement B, are True.

Both, Statement A and Statement B, are False. Statement A: MRTG is used to produce graphical images of the information, such as network bandwidth and bottlenecks in the network. Statement B: MRTG uses a Web page to display the graphical images of the monitored information. Which of the following is true, with respect to the above statements? Statement A is True and Statement B is False. Statement A is False and Statement B is True. Both, Statement A and Statement B, are True. Both, Statement A and Statement B, are False. Statement A: Before installing MRTG on your computer, you need to install the snmp utility on your computer. Statement B: Before installing MRTG on your computer, you need to install the fping utility on your computer. Which of the following is true, with respect to the above statements? Statement A is True and Statement B is False. Statement A is False and Statement B is True. Both, Statement A and Statement B, are True. Both, Statement A and Statement B, are False. Statement A: The "tcpActiveOpens" TCP-MIB Object Variable measures the total number of TCP connections completed. Statement B: The "tcpCurrEstab" TCP-MIB Object Variable measures the total number of TCP connections in the established state. Which of the following is true, with respect to the above statements? Statement A is True and Statement B is False. Statement A is False and Statement B is True. Both, Statement A and Statement B, are True. Both, Statement A and Statement B, are False. Statement A: You need to create two files, config and users, in the /usr/local/argus/data directory to configure Argus. Statement B: You need to navigate to the /usr/local/argus directory to create link to the arguscgi program. Which of the following is true, with respect to the above statements? Statement A is True and Statement B is False. Statement A is False and Statement B is True.

Both, Statement A and Statement B, are True. Both, Statement A and Statement B, are False. Statement A: You can customize the NIS component of SFU for managing users and groups in the network. Statement B: You can customize NFS Component of SFU to enable users to access shared data using NFS protocol. Which of the following is true, with respect to the above statements? Statement A is True and Statement B is False. Statement A is False and Statement B is True. Both, Statement A and Statement B, are True. Both, Statement A and Statement B, are False. Statement A: MRTG generates HTML pages containing GIF images, which provide a visual representation of the network traffic. Statement B: SNMP operates at the application level using TCP/IP transport-level protocols so that it can ignore the differences in the network hardware. Which of the following is True with respect to the preceding statements? Statement A is True and Statement B is False. Statement A is False and Statement B is True. Both, Statement A and Statement B, are True. Both, Statement A and Statement B, are False. Statement A: The iostat command is used for monitoring system input/output device loading. Statement B: The hinv command displays the contents of the system's hardware inventory. Which is True with respect to above statements? Statement A is True and Statement B is False. Statement A is False and Statement B is True. Both, Statement A and Statement B, are True. Both, Statement A and Statement B, are False. Statement A: An NMS executes applications that monitor and control managed devices. Statement B: An agent is a software module that resides in the managed devices and manages the network. Which is True with respect to above statements? Statement A is True and Statement B is False. Statement A is False and Statement B is True. Both, Statement A and Statement B, are True. Both, Statement A and Statement B, are False.

Statement A: MIBs do not contain information about managed objects, which are identified using Object Identifiers (OIDs). Statement B: The trap command is used by managed devices to asynchronously report events to the NMS. Which is True with respect to above statements? Statement A is True and Statement B is False. Statement A is False and Statement B is True. Both, Statement A and Statement B, are True. Both, Statement A and Statement B, are False. Statement A: The nagios.cfg file contains global settings for the nagios package. Statement B: Object configuration files specify only the services that are to be monitored. Which is True with respect to above statements? Statement A is True and Statement B is False. Statement A is False and Statement B is True. Both, Statement A and Statement B, are True. Both, Statement A and Statement B, are False. Tom Wilkins works as a system administrator at EarthenWares. The employees of the organization, EarthenWares develop software for its clients. The organization receives an order to develop software, which can monitor the efficiency of CPU at various instants of time and display the efficiency on a graph. For this, the developers need MRTG utility on their computers. Tom installs the MRTG utility on the computers of the developers of the organization. Tom is assigned the task to enable the developers to work in US English instead of English UTF-8 to fulfill the client requirements. Which of the following commands should Tom use to perform the required task? # import LANG=en_US # export LANGUAGE=en_US # export LANG=en_US_UTF-8 # export LANG=en_US Chris Donald works as a system administrator at Quality Software Developers. There are multiple servers in the organization Quality Software running services, such as the SMTP, IMAP, and DNS. Chris wants to monitor these services from the remote computer running Apache Web server. Therefore, Chris installs Argus on the remote computer to monitor the services and configures the config and users files stored in the /usr/local/argus/data directory to

specify the services that are to be monitored. Chris also assigns the ownership of the /usr/local/argus directory to the Apache Web server. To which directory does Chris need to navigate to create a link to the arguscgi program? /usr/local/argus/sbin /usr/local/argus /usr/local/argus/sbin/arguscgi /var/www/cgi-bin Don works as a system administrator at SmartLabs, Inc. All the employees of SmartLabs use the database server to store data. Don observes the processing speed of the database server decreases due to improper memory utilization. To get exact figures about memory utilization of the database server, Don needs to prepare a graph showing the memory utilization at the database server. Therefore, Don installs and configures MRTG utility on the database server. Don observes the graph results produced are eight times higher than expected. What of the following can be the reason for this abnormal output? The bits parameter is set instead of the bytes parameter. Unavailability of the OID values. Avaliability of the OID values. The bytes parameter is set instead of the bits parameter. SSPT Corporation is an Internet Service Provider (ISP) that provides Internet services to its clients. Steve, the network administrator, receives complaints from a client about the slow speed of the Internet. Steve wants to check the status of services, such as HTTP, TCP, and SMTP running on the server from his own computer. For this, Steve wants to install Argus. However, before installing Argus, Steve needs to verify if specific software are already installed on his computer. Which of the following software should Steve verify before installing Argus on his computer? Perl, sendmail, qpage, fping, a cgi capable Web server; Berkeley DB, and perl DB_File Perl, sendmail, qpage, and GNU C Compiler (GCC) GCC, Perl, Gd, Libpng, and Zlib GCC and Perl John Barrett works as a system administrator at Quality Software Developers. There are multiple servers in the organization, Quality Software running the services, such as SMTP, IMAP, and DNS. John wants to monitor these services from the remote computer running Apache Web server. Therefore, John installs Argus on a remote

computer . John configures the config and users files stored in the /usr/local/argus/data directory to specify the services that are to be monitored. What should John do after configuring the config and users files? Run Argus by using the argusd script. Open the /usr/local/argus/sbin/arguscgi in the Web browser. Assign the ownership of the /usr/local/argus directory to the Apache Web server and run the argusd script. Assign the ownership of the /usr/local/argus directory to the Apache Web server, create a link in the cgi-bin directory to the arguscgi program, and run the argusd script. 1. Consider the following statements: Statement A: System monitoring tools are used to monitor the process and file systems of a network. Statement B: Network monitoring tools are used to keep track of all the services that are running in the enterprise. With respect to the above statements, which of the following options is correct? a. Statement A is True and Statement B is False. b. Statement A is False and Statement B is True. c. Both, Statement A and Statement B, are True. d. Both, Statement A and Statement B, are False. 2. Consider the following statements: Statement A: Nagios is used to monitor the traffic load on the network links. Statement B: IPTraf is used to monitor network services, such as HTTP, SMTP, and SSH. With respect to the above statements, which of the following options is correct? a. Statement A is True and Statement B is False. b. Statement A is False and Statement B is True. c. Both, Statement A and Statement B, are True. d. Both, Statement A and Statement B, are False. 3. Consider the following statements: Statement A: The snmpset tool is used to set values in remote agents. Statement B: The snmptrapd tool shows network status by using SNMP. With respect to the above statements, which of the following options is correct? a. Statement A is True and Statement B is False. b. Statement A is False and Statement B is True. c. Both, Statement A and Statement B, are True. d. Both, Statement A and Statement B, are False. 4. Consider the following statements: Statement A: Object configuration files specify the hosts and services that are monitored. Statement B: The resource configuration files define the macros that are used within other settings for security purposes.

With respect to the above statements, which of the following options is correct? a. Statement A is True and Statement B is False. b. Statement A is False and Statement B is True. c. Both, Statement A and Statement B, are True. d. Both, Statement A and Statement B, are False. 5. Consider the following statements: Statement A: The d iface option for the iptraf command displays the detailed statistics for the specified interface. Statement B: The z iface option for the iptraf command starts the TCP/UDP traffic monitor for the specified interfaces. With respect to the above statements, which of the following options is correct? a. Statement A is True and Statement B is False. b. Statement A is False and Statement B is True. c. Both, Statement A and Statement B, are True. d. Both, Statement A and Statement B, are False. 1. Don Allen, the network administrator at Mountain Marketing, configures Multi-Router Traffic Grapher (MRTG) to monitor the network of the organization. Don uses a Web browser to display the Web index page. The index page displays four graphs. Which of the following graph provides an average of the input traffic and output traffic after every 30 minutes? a. Daily Graph b. Monthly Graph c. Weekly Graph d. Yearly Graph 2. Ed Young, the network administrator at XYZ, Inc. wants to enable the Web server to display the output of the MRTG on a Web page. For this, Ed creates the /var/www/html/mrtg directory. After creating this directory, what should he do to enable the Web server to display the output of MRTG in the form of a Web page? a. Ed needs to type the following line in the mrtg.conf file: Alias /mrtg "/var/www/html/mrtg" <Directory "/var/www/html/mrtg"> Order allow,deny Allow from all Allow from localhost # Allow from .example.com </Directory> b. Ed needs to type the following line in the mrtg.conf file: /mrtg "/var/www/html/mrtg" <Directory "/var/www/html/mrtg"> Order allow,deny Allow from all Allow from localhost # Allow from .example.com </Directory>

c. Ed needs to type the alias /mrtg /var/www/html line in the mrtg.conf file. d. Ed needs to type the /mrtg /var/www line in the mrtg.conf file. 3. Blue Moon Computers is an Internet Service Provider. There are multiple Web servers in the organization running services, such as SMTP, HTTP, and DNS. Pat, the system administrator at Blue Moon, wants to monitor these services from a remote computer that is running the Apache Server. Which of the following utilities or tools should Pat install on the remote computer to monitor the services? a. Argus b. Perl c. MRTG d. Zlib 4. Pat works as a network administrator at Red Eye Experts. He installs Argus on a remote computer to monitor the services, such as HTTP, IMAP, and SMTP, running on multiple servers in the organization. Next, Pat wants to specify the services that are to be monitored. He also wants to specify the username and password to use Argus. For this, Pat needs to create two files, config file and users file. In which of the following directories, does Pat need to create these files? a. /usr/local/argus b. /user/local/argus/data c. /usr/local/argus/lib d. /usr/local/argus/sbin 5. James works as a network administrator at PQR, Inc. James wants to install an MRTG on a remote computer to monitor the network traffic. What are the minimum system requirements to install MRTG? a. SNMP, GCC, Perl, gd, libpng, and zlib b. SNMP, fping, Perl, gd, libpng, and zlib c. SNMP, GCC, Perl, gd, qpage, and zlib d. SNMP, GCC, Perl, fping, libpng, and zlib Which command should be used to uninstall Wine if it is installed using the source code method? # rpm qa | grep -i wine # make depend # rpm ivh wine-20050310-1wbel3winehq.i386.rpm # make uninstall Just a minute While installing Wine through the CVS Snapshot method, which command should be used to download the Wine source code tree in the wine directory? /configure && make depend && make $ cvs z3 checkout wine # make install $ cvs

Which key contains the data related to current Windows installation? HKEY_LOCAL_MACHINE HKEY_CURRENT_USER HKEY_USERS HKEY_USERS\.Default Which command is used to view the control panel applets in a Window? uninstaller wine control WINEDEBUG=+all,-relay wine program_name Export LIB_ODBC_DRIVER_MANAGER=/usr/lib/libodbc.so.1.0.0 Which command line option is used to display the help message of wineserver command line options? W p[n] H k[n] Steve is a network administrator at Smartlabs. Steve identifies that an rpm package, Xfree86 is not functioning. To identify the reason, Steve requires the debugging information about the package. Which of the following rpm query should Steve use to perform the required task? rpm -qvv XFree86 rpm -qc XFree86 rpm -scripts XFree86 rpm -qf XFree86 Tom Wilkins is a network administrator in Blue Moon Computers. Tom wants to verify the configuration of the Apache web server. Which command should he use to verify the configuration of the Apache web server? # apachectl configtest  # telnet  # ssh  # rpm qa apache  Statement A: The /etc/httpd/http.conf file is used to store the configuration settings for the Apache Web server. Statement B: The apachectl configtest command is used to test the configuration file for the Apache Web server. Which of the following options are correct with respect to the

preceding statements? Statement A is True and Statement B is False. Statement A is False and Statement B is True. Both, Statement A and Statement B, are True. Both, Statement A and Statement B, are False. Jim Lewis is working as a network administrator at Red Sky IT. Jim is assigned the task to share the applications and data between Linux-based computers and Windowbased computers. Which of the following functionalities of SFU 3.5 should Jim use to perform the required task? Interoperability tools Password synchronization NFS V2 and NFS V3 Interix technology Jim Lewis, a network administrator at Red Sky IT, is using SFU 3.5 toolkit to share files between Linux and Windowsbased computers in a network. Which NFS component should Jim use to enable Windows-based computers to access files and directories, exported by NFS file server? Server for NFS Client for NFS Gateway for NFS NFS share component Ed Young is a network administrator at RedSky IT company and needs to install SFU 3.5 toolkit on Windows-based computers to run Linux applications on them. What is the least memory that Ed needs on Windows-based computers to perform SFU installation? 10 MB 20 MB 30 MB 40 MB

What is the location on a computer where SFU 3.5 toolkit is installed by default? C:\SFU\ D:\SFU\ C:\windows\SFU\ D:\windows\SFU By default, which of the following shells is not supported by

the SFU 3.5 toolkit to run Linux scripts on a Windowsbased computer? Korn shell C shell Bash shell SDK shell Chris Donaldson is a network administrator at Smartlabs. Some processes have modified the dynamic link libraries of his Linux machine. Chris wants to identify the processes that have called those dynamic link libraries. In addition to this, Chris also wants to identify the system calls that were executed along with the library calls. Which ltrace syntax should Chris use to perform the required task? ltrace I <command> ltrace S <command> ltrace s <command> ltrace -o <command> Which of the following Bugzilla feature helps to flag and analyze the previously reported bugs? Enterprise group support Multiple authentication method Request System Generic Reporting Tom has encountered a bug in OpenVMS. Which should be the appropriate field to mention this? Component Operating System Product Version Which of the following Linux forums provide support to create CD based games? Gentoo Knoppix Mandrake Fedora 1. Consider the statements: Statement A: A computer System should have Windows operating system to install Wine. Statement B: All Windows applications can run on Linux operating system using Wine. With respect to the preceding statements, which of the following is true?

a. Statement A is True and Statement B is False. b. Statement A is False and Statement B is True. c. Both, Statement A and Statement B, are True. d. Both, Statement A and Statement B, are False. 2. Ken Burton is working as a system administrator at Mountain Marketing. Ken wants to install Wine to run Windows applications on Linux. He installs Wine by using the source archive method. Further, he decides to configure Wine. While configuring the DLL section in the Wine configuration file, native version of which of the following DLL pairs should Ken use? a. KERNEL, KERNEL32 b. USER, USER32 c. SHELL, SHELL32 d. GDI, GDI32 3. Pat Greene is working as a system administrator at Global Systems. For running Windows applications on Debian Linux, Pat needs to install Wine. He installs it by using the apt-get command. Which installation method does Pat use to perform this task? a. Installing Wine from a package b. Installing Wine from a source archive c. Installing Wine from CVS d. Installing Wine from a package or Installing Wine from CVS 4. Ed Young is working as a system administrator at Supersoft2000.Ed installs Wine by using the CVS Snapshot method. Which of the following commands should Ed execute to build the utilities of Wine? a. make b. make install c. make depend d. ./configure 5. Don Allen is working as a system administrator at AB Corp. Don is able to successfully login to the CVS server and install the CVS package. Now, he wants to check the working directory of the newly downloaded Wine directory. Which command should Don execute to perform this task? a. make b. pwd c. cvs login d. cd wine 1. Global System, Inc. is an application development company based in Woodland. The organization works on a Windows-based network system. For a new application development project, the developers need to migrate and run a Linux application on their Windows-based computers. For this, the company decides to install a SFU 3.5 toolkit in its enterprise. This Linux application has features that restrict this

application to run on a Windows-based computer. Nancy Jones, a network administrator, is assigned the task of isolating these features in the Linux application to enable it to run on a Windows-based computer. Which statement should Nancy use to isolate these features? a. #ifdef b. ioctl() c. #sdk d. #whichif 2. SmartDevelopers, Inc. is an application development company based in Atlanta. It works on a Windows-based network system. The company opens a new center at Florida, which works on a Linux-based system. For application development projects, the company uses a SFU 3.5 toolkit at the Atlanta center, to run Linux applications developed at the Florida center. To allow file sharing between both the network systems, the company needs to use NFS protocol services. For this, Ken Burton, the network administrator, is assigned the task of installing the NFS protocol in the enterprise. Which versions of NFS protocol should Ken use that support the SFU 3.5 toolkit for file sharing in an enterprise? a. Any NFS protocol version b. NFS version 1 c. NFS version 1.1 d. NFS version 2 and 3 3. Earthenmovers, Inc. is an application development organization that works on the Linux and Windows-based network systems. For a new application development project, the company needs to migrate and run Linux applications on Windows-based computers. Developers working on the Windows-based computers require different SFU 3.5 toolkit components to run Linux applications on their computers. Kathy Carter, the system administrator, is assigned the task of installing an SFU 3.5 toolkit on the Windows-based computers. Which installation method should Kathy use while installing the SFU 3.5 toolkit? a. Standard installation b. Custom installation c. Default components d. Customizable components 4. ABC, Inc. is an application development organization that works on a Windowsbased network system. The company receives a new application development project, for which it requires its employees to migrate and run some Linux applications on the Windows-based computers. For this, the company uses a SFU 3.5 toolkit on its Windows-based computers. While migrating a Linux application to a Windows-based computer, the developers face a bug problem. The company assigns the task of debugging this application to Robert Joseph, a network administrator. Which debugger should Robert use to perform this task? a. The SDK Debugger b. The Interix Debugger

c. The SFU Debugger d. The GDB Debugger 5. PQR, Inc. an application development organization works, on both Linux and Windows-based network systems. For a new application development project, the company needs to use the SFU 3.5 toolkit to run Linux applications on the Windowsbased computers in its enterprise. For this, the company needs to implement remote command line access to share files and data resources from Linux to Windows-based computer. Which command line access feature of the SFU 3.5 toolkit should the company use to perform the task? a. Interix client b. Interix server c. Telnet server d. Telnet client and Telnet server 1. Steve is working as a network administrator at Red Eye Experts. He finds that users are not able to transfer data across the network. They are also not able to receive data. Steve wants to identify the problem of packet loss in the network. Which command should Steve use to perform the required task? a. dig b. nslookup c. host d. tcpdump 2. Consider the following statements: Statement A: Improper boot loader configuration can lead to failure of boot process. Statement B: Improper kernel or init parameter can cause boot process failure. With respect to the preceding statements, which of the following options is correct? a. Statement A is True and Statement B is False. b. Statement A is False and Statement B is True. c. Both, Statement A and Statement B, are True. d. Both, Statement A and Statement B, are False. 3. Tom Wilkins is working as a network administrator at Red Sky IT Systems. He wants to monitor the traffic flow of the network, which comprises of various platforms with different configurations. Tom also wants to monitor the traffic generated by specific hosts in order to check if the traffic from their side is creating any problems in the network. Which of the following tools should Tom use to perform the required task? a. ethereal b. tcpdump c. dig d. nslookup 4. Chris Donaldson is working as a network administrator at Global Systems, Inc. He is

receiving complaints that users are not able to connect to the DNS server. Chris finds that the DNS is configured properly. Now, he wants to check whether the clients are configured properly. Which file should he view to perform the required task? a. /etc/resolv.conf b. /etc/named.conf c. /etc/httpd/conf/http.conf d. /etc/pam.conf 5. Debbie Howe is working as a network administrator in Smart Software Developers. Debbie is asked to implement a security policy in which permissions are granted to users based on various parameters, such as time, available resources, priority, or client location. She wants to implement PAM to apply these types of settings in the network. Which module type should Debbie implement in PAM to perform the required task? a. Auth b. Account c. Session d. password 1. Consider the following statements: Statement A: The Update Module helps in obtaining prior notification about the new updates in the software. Statement B: The Update Module helps in managing a group of computers in an enterprise. With respect to the preceding statements, which of the following options is correct? a. Statement A is True and Statement B is False. b. Statement A is False and Statement B is True. c. Both, Statement A and Statement B, are False. d. Both, Statement A and Statement B, are True. 2. Consider the following statements: Statement A: The Management Module ensures that all the packages required for the stability of the computer are downloaded with the software. Statement B: The Management Module helps in searching the computers in an enterprise for updates based on different search criteria, such as system specification and package name. With respect to the preceding statements, which of the following options is correct? a. Statement A is True and Statement B is False. b. Statement A is False and Statement B is True. c. Both, Statement A and Statement B, are False. d. Both, Statement A and Statement B, are True. 3. Consider the following statements: Statement A: Hosted model architecture helps in creating channels according to your requirement. Statement B: Hosted model architecture provides a single port number for both

inbound and outbound connections. With respect to the preceding statements, which of the following options is correct? a. Statement A is True and Statement B is False. b. Statement A is False and Statement B is True. c. Both, Statement A and Statement B, are False. d. Both, Statement A and Statement B, are True. 4. Consider the following statements: Statement A: Proxy model architecture provides custom channels. Statement B: In Proxy model architecture, the content of RHN database is cached locally on the network. With respect to the preceding statements, which of the following options is correct? a. Statement A is True and Statement B is False. b. Statement A is False and Statement B is True. c. Both, Statement A and Statement B, are False. d. Both, Statement A and Statement B, are True. 5. Consider the following statements: Statement A: Knoppix Forum provides support to create CD-based games. Statement B: Knoppix Forum provides support to use its software on laptops. With respect to the preceding statements, which of the following options is correct? a. Statement A is True and Statement B is False. b. Statement A is False and Statement B is True. c. Both, Statement A and Statement B, are False. d. Both, Statement A and Statement B, are True.

1. Tom Wilkins is working as a network administrator at InfoSuper Corp. The management of the organization decides to migrate to the Linux environment to provide file level security and data level security to all the applications. Tom needs to compile and execute a C# application on a Linux platform. To compile the application on the C# application, Tom changes to the /usr/src/ mono directory and enters the following command at the shell prompt to compile the application: # mcs interactive\ Welcome.cs However, Tom observes that no output is displayed. In addition, he also wants to execute the application. What should Tom do to perform the required task? a. Compilation is performed successfully Enter the following command to execute the application: # mcs interactive\ Welcome.exe b. The compilation is performed successfully Enter the following command to execute the application: # mono interactive \ Welcome.exe

c. Chris needs to enter the following commands to compile: # mono interactive \ Welcome.exe Enter the following command to execute the application: # mono interactive \ Welcome.exe d. Chris needs to enter the following commands to compile: # mcs interactive \ Welcome.exe Enter the following command to execute the application: # mcs interactive \ Welcome.exe

2. InfoSuper Corp. is asoftware development organization, which has a large number of computer systems that are connected through a network. The organization has a centralized directory server. John Barren, the system administrator at InfoSuper Corps, comes to know that a malicious user has breached the security of the directory server. The user uses some software tools to eavesdrop on the data being transmitted on the network. The user then decrypts the passwords and monitors the data on the network. Further, the user gathers the credential information and data being transmitted between the directory server and the authorized users. This information is used by the malicious user to breach the security of the directory server. Which security threat has the malicious user employed to breach the security of the server? a. b. c. d. Trojan horses Network sniffing Credential stealing Connection hijacking

3. Which attribute in the sambaAccount object, used to store the Samba related information in OpenLDAP, specifies the time when the Impassword and ntpassword are last modified? a. b. c. d. SambaNTPassword SambaLMPassword SambaPwdLastSet SambaLogonScript

4. Perfect Watch Corp. is a watch manufacturing company. The company needs to implement an LDAP Directory server to communicate with its clients. For implementing the LDAP Directory server, the company asks Donna Band, the system administrator, to define a LDAP Model, which describes the services provided by LDAP Directory server to the LDAP Directory clients of the company. While performing the task, Donna needs to describe the operations that can be performed on the LDAP Directory, such as search, add, delete, bind, unbind. What does Donna do to perform the above task? a. b. c. d. Define the Functional Model Define the Security Model Define the Naming model Define the Information model

5. Donna is working as a network administrator at Safest Software Developers. The organization has three branches at different locations. There are three departments at each branch, named application development, quality assurance, and sales. The users of the same department at different branches are part of a group. There are three groups corresponding to each department, app for application development department, qa for quality assurance department, and sales for sales department. All the employees at different branches use a database server at the main branch to store data. The database server can run 100 processes at a time. The users in the app group run a large number of processes on the database server due to which the users in the qa and sales groups are not able to run their processes. What should Donna do to solve this problem? a. Donna needs to add the following entries to the /etc/security/limits.conf file: * soft file 560* hard file 860 b. Donna need to add the following entry to the /etc/pam.d/login file: sesion required /lib/security/pam_limits.so c. Donna needs to add the following entries to the /etc/pam.d/login file: * soft nofile 85* hard nofile 88 d. Donna needs need to add the following entries to the /etc/security/limits.conf file: @app soft nproc 45 @app hard nproc 50

6. Red-Eye Experts is a leading developer of computer applications, with its head office in Hew York. The organization has three departments: HR, Research, and Development. A directory service is configured in the HR department and all the employees in the rest of the departments access the directory service. The organization has two branch offices in London and Paris. These branch offices are connected to the head office in Hew York through Virtual Private Network (VPN). The directory service, in the HR department of the head office, is also accessed by the employees in the branch offices. So, there is a potential risk that a network failure between the head office and the branch offices can seriously affect the employees in the branch offices. To prevent this situation, John Barrett, the system administrator at the head office, decides to create multiple replicas of the directory service and configure these replicas in the branch offices. How, to maintain data consistency, John wants to synchronize the data which is stored in the main directory service and the replica servers. John wants to implement amechanism in such a way that when a replica server receives a write operation request from a client, it performs the write operation. After that, the replica server sends the modified updated entry values to all the replica servers and the main server. On receiving the modified entry values, the main server and the replica servers update the stored entries accordingly. How, which Replication Policy and Write Operation performing strategy should be employed by John to implement the above mechanism? a. b. c. d. Multimaster Replication Policy using referrals Single-Master Replication Policy using chaining Single-Master Replication Policy using referrals Multimaster Replication Policy

7. Red-Eye Experts is a .NET applications development organization, based in the US. The organization uses the Windows plattorm to developing .NET applications. For security reasons, Donna Bard, the network administrator, needs to migrate .NET applications to the Linux platform to provide file-level and user-level security to the applications. To migrate the .NET applications to the Linux platform, Donna needs to install the Mono tool that provides a number of APIs that can be used to run the .NET applications on Linux. For this, Donna installs the mono-data-1.1.6-1.novell.6.3.i586.rpm RPM package as the first package of the tool. However, Donna finds an error massage while installing this package. What error message does Donna receive while installing this package? a. The error message is displayed as follows: "mono-core-1.1.6-1.novell.6.3.i586.rpm and mono-basic-1.1.6-1.novell.6.3.i586.rpm RPM packages should already be installed on the computer." b. The error message is displayed as follows: "mono-data-oracle-1.1.6-1.novell.6.3.i586.rpm and mono-complete-1.1.6-1 .novell.6.3.i586.rpm RPM packages should already be installed on the computer." c. The error message is displayed as follows: "mono-extras-1.1.6-1.novell.6.3.i586.rpm and mono-complete-1.1.6-1.novell.6.3.i586.rpm RPM packages should already be installed on the computer." d. The error message is displayed as follows: "mono-data-oracle-1.1.6-1 .novell.6.3.i586.rpm and mono-data-postgresql-1.1.61.novell.6.3.i586.rpm RPM packages should already be installed on the computer."

8. SmartLabs is a rnultii national company that has 78 branches across the world. The company maintains a directory server for storing all the information about the company's product. Clients of the company access the directory server to obtain information about the products. The directory server has come under frequent hacking attacks in the past few months. This has led to hackers stealing and changing the confidential information stored on the server. Debbie Howe, the system administrator at SmartLabs, is assigned the task to provide security to the directory server from the hackers. For this, Debbie divides the data into various categories depending on the frequency of access to the data and the degree of loss to the company if the data is modified. How, Debbie assigns various priority levels to the various categories of data. Which possible security consideration is Debbie implementing to provide security to the directory server? a. b. c. d. Sensitivity of data of Identifying the Security Requirements of a Directory Directory accessibility of Understanding the Environment of the Organization User community of Understanding the Environment of the Organization Administration of Identifying the Security Requirements of a Directory

9. Countryside Markets is a software application development company in U.S. The company maintains all the details of the software developed by the company in an OpenLDAP server. The company finds that some unauthorized people are accessing the OpenLDAP server to get information about the software contained therein. The company assigns the task to the system administrator, Chris Donaldson, to protect the OpenLDAP server from this threat. Chris finds that the company allows access to the OpenLDAP

server to the clients byasking for the DM to be accessed and for the password as plain text. To provide security to the OpenLDAP server, Chris decides to change the accessing method. Chris defines that whenever a client has to connect to the OpenLDAP server, the client sends a connection request to the OpenLDAP server. When the OpenLDAP server receives the request, it creates and sends a challenge to the client, which consists of an encrypted message from the server to the client. If the client has the encrypted key, it sends the key as the response to the challenge sent by the OpenLDAP server. If the key is verified, the OpenLDAP server allows the client to connect and access information from the OpenLDAP server. What kind of implementation is Chris defining to provide security to the OpenLDAP server? a. b. c. d. ANONYMOUS DIGEST-MD5 KERBEROS _V 4 CRAM-MD5

10. Larry Williams is work ing as a system administrator at Technology Systems. He wants to implement kickstart installation to configure multiple workstations in the organization. He also wants to redirect the existing Linux server to create scripts for configuring these newly installed workstations that are connected to the network. What should Larry do to perform the task? a. b. c. d. Use Existing state provisioning Use Configuration management Use Bare metal provisioning Use Kickstart configuration writer

11. Jim Lewis is working as a network administrator at Good Graphics, Inc. The organization uses Wine installed in Linux operating system to enable the employees of the organization to use existing Windows-based applications. However, Jim finds that some packages of Wine are corrupted; so, he needs to uninstall the all installed Wine packages. What should Jim do to perform the above activity? a. First, use the following command to identify the Wine packages installed on the system: # rpm -qa | grep -i wine? Then use following command to uninstall the packages # rpm -e <wine-package_name> ? b. First, use the following command to identify the Wine packages installed on the system: # rpm -ivh wine-20050310-1wbel3winehq.i386.rpm ? Then use following command to uninstall the packages # rpm -e <wine-package_name> ? c. First, use the following command to identify the Wine packages installed on the system: # rpm -e <wine-package_name> ? Then use following command to uninstall the packages # rpm -ivh <wine-package-name>.rpm ? d. First, use the following command to identify the Wine packages installed on the system:

# rpm -qa | grep -i wine? Then use following command to uninstall the packages # rpm -ivh <wine-package-name>.rpm ?

12. Donna Brad is working as a system administrator at Blue moon Computers. To support the recently acquired hardware, the management asks Donna to upgrade the kernel of the main Linux server. She checks whether the kernel source code is already installed on the main server and finds the code is not installed. Therefore, she downloads the source code from Web and configures the kernel source code on the server. How, Donna needs to compile the kernel source code, and perform the installation steps of kernel. What should Donna do to complete the upgrade of the kernel? a. Donna should execute the following commands: # make dep # make clean # make bzimage # make modules # make modules_install # make install b. Donna should execute the following commands: # make dep # make bzimage # make clean # make modules # make install # make modules_install c. Donna should execute the following commands: # make dep # make bzimage # make cln # make modules # make modules_install # make install d. Donna should execute the following commands: # make dep # make clean # make bzimage # make modules # make modules_install

13. Consider the statements: Statement A: The # rpm -qa | grep -i wine command is used to identify the installed Wine packages on the system. Statement B: The # rpm -e <wine-package_name> command is used to uninstall the Wine packages from the system. Which of the following options is correct with respect to the above statements? a. Statement A is true and statement B is false. b. Both statements A and B are false.

c. Statement A is false and statement B is true. d. Both statements A and B are true.

14. Supersoft2000 is a software development company that has number of development centers all over America. Larry Williams, the system administrator installs a Directory service to implement an identity management system. In the identity management system, the employee information such as name, employee code, telephone extension number, department code, branch office, and designation, is stored and organized. How, the management of the company wants to expand the business. As a result, Larry faces a problem of insufficient hardware resources and slow read/write process of the directory server. He wants to provide aflexible Directory service that can meet the increasing storage space requirement of the directory service. What should Larry do to solve this problem? a. b. c. d. Purchase a new server with higher processing speed. Use high-speed physical media such as fiber optic cable. Distribute the directory server among multiple computers. Purchase a new server with more Hard Disk storage space.

15. Pat Greene is working as a network administrator at Technology Systems. The orgnization has implemented LDAP server to enable the employees to access the employee information of the organization. The management asks Pat to index the entries stored in the LDAP database to enable fast searching and retrieval of data. What should Pat do to perform the required task? a. Add the following indexes in the slapd.conf file: index objectclass eq index eq b. Add the following indexes in the slapd.conf file: index objectClass eq index cn pres,eq c. Add the following indexes in the slapd.conf file: index objectClass eq index departmentNumber d. Add the following indexes in the slapd.conf file: index objectClass eq index cn, sn, mail eq, sub index departmentNumber eq

16. Which value for the STAGE argument in the rpmbuild command unpacks the source code and applies patches? a. b. c. d. b c p a

17. Which command is used to verify the mapped files of nfs Windows-based << it should be nfs > computer? a. b. c. d. # mount: 192.168.0.52 # showmount 192.168.0.52 # mount e 192.168.0.52 # showmount e 192.168.0.52

18. Which music file format needs to be searched and saved in the Migration folder while migrating from Windows to Linux operating system? a. b. c. d. AVI MPG WMV WAV

19. Pat Wilkins is working as a network administrator at LMN Inc., which provides storage solutions to its customers. The network of the organization comprises of Red Hat Linux Systems. Pat is assigned the task of managing and monitoring the entire network of the enterprise. To perform the task, he installs Red Hat Network (RHN) software in the network. To enhance the performance of the enterprise network, Pat wants to configure computers in an enterprise according to the requirements of the computers. He also wants to deploy, update, and re-deploy the Linux infrastructure in the enterprise using a GUI. In addition, he wants to configure the Linux computers in the enterprise automatically for asingle user or group. What should Pat do to complete the required tasks? a. b. c. d. Use the update module of the RHN software Use the proxy model of RHN software Use the provisioning module of the RHN software Use errata information and simple Web user interface

20. Ronald Billing is working as system administrator with the Technology Systems. Homelike Hospital Ltd. is a chain of hospitals all over America. Don Alien, the Chief Medical Officer at Homelike Hospital Ltd. directs Ronald to create a directory service to store information about doctors. To implement the directory, Ronald needs to install a software package called OpenLDAP. Ronald finds that he needs to install a package called SASL before installing OpenLDAP. To install the SASL package, Ronald enters the following commands at the shell prompt: # rpm -ivh cyrus-sasl-md5-2.1.15-3.i386.rpm # rpm -ivh cyrus-sasl-plain-2.1.15-3.i386.rpm # rpm -ivh cyrus-sasl-2.1.15-3.i386.rpm However, Ronald notices that the commands are not producing required results. What should Ronald do to solve the problem? a. Ronald needs to enter the following command at the shell prompt: # rpm -ivh cyrus-sasl-md5-2.1.15-3.i386.rpm

# rpm -ivh cyrus-sasl-plain-2.1.15-3.i386.rpm # rpm -ivh krb5-libs-1.2.7-19.1386.rpm # rpm -ivh cvrus-sasl-gssapi-2.1.15-3.i386.rpm # rpm -ivh cvrus-sasl-devel-2.1.15-3.i386.rpm b. Ronald needs to enter the following commands at the shell prompt: # rpm -ivh cyrus-sasl-md5-2.1.15-3.i386.rpm # rpm -ivh cyrus-sasl-plain-2.1.15-3.i386.rpm # rpm -ivh cyrus-sasl-2.1.15-3.i386.rpm # rpm -ivh cyrus-sasl-gssapi-2.1.15-3.i386.rpm # rpm -ivh cyrus-sasl-devel-2.1.15-3.i386.rpm c. Ronald needs to enter the following commands at the shell prompt: # rpm -ivh cyrus-sasl-md5-2.1.15-3.i386.rpm # rpm -ivh cyrus-sasl-plain-2.1.15-3.i386.rpm # rpm -ivh krb5-workstation-1.2.7-19.1386.rpm # rpm -ivh cyrus-sasl-gssapi-2.1.15-3.i386.rpm # rpm -ivh cyrus-sasl-devel-2.1.15-3.i386.rpm d. Ronald needs to enter the following command at the shell prompt: # rpm -Ivh cyrus-sasl-md5-2.1.15-3.1386.rpm # rpm -Ivh pam_krb5-1.70-1.1386.rpm # rpm -Ivh cyrus-sasl-2.1.15-3.1386.rpm # rpm -Ivh cyrus-sasl-gssapl-2.1.15-3.1386.rpm # rpm -ivh cyrus-sasl-devel-2.1.15-3.i386.rpm

21. Ken Burton is working as a system administrator at Global Systems Inc. The details of the employee information are placed in the NIS-based directory of the organization. Ken needs to migrate the user information from the NIS server to the OpenLDAP server for faster retrieval of data. Ken has added the user accounts information to the OpenLDAP database. How, he needs to verify the entries of user in the LDAP server. What should Ken do to perform the required task? a. Ken needs to issue the following command: # ldapadd -x -D "cn=Manager,dc=globalsystems,dc=com" -W < /tmp/passwd.ldif b. Ken needs to issue the following command: # Idapsearch -x -b 'dc=globalsystems,dc=com' '(objectclass=*)' c. Ken needs to issue the following command: # Idapsearch -x -b "uid=steve,ou=People,dc=globalsystems,dc=com" d. Ken needs to issue the following command: # Idapadd -x -D "cn=Manager,dc=globalsystems,dc=com" W

22. MentorGraphics is a leading software solution provider. The management of the organization asks Nancy Jones, the network administrator, to install a sendmail RPM package in the organization network. Nancy observes that the existing RPM package is not secure for sendmail package. Therefore, Nancy decides to update the existing RPM packages to enhance the security for sendmail packages. For this, Nancy needs to register a server computer with Red Hat Network (RHN). In addition, Nancy needs to push updates and patches securely from the server registered with RHN to other remote servers in the organization network. What should Nancy do to perform the task?

a. Execute rsync [options] <[user@]sourcehost:> <source filename> <[user@]destinationhost:> <destination filename> b. Execute Patch [options] <[user@]sourcehost:> <source filename> <[user@]destinationhost:> <destination filename> c. Execute rpm [options] <[user@]sourcehost:> <source filename> <[user@]destinationhost:> <destination filename> d. Execute scp [options] <[user@]sourcehost:> <source filename> <[user@]destinationhost:> <destination filename>

23. Tom Wilkins is working as a system administrator at Technology Systems. Tom is assigned the task to migrate the NIS information to LDAP. Therefore, Tom needs to map the NIS information stored in /etc/passwd file to attributes of posixAccount object class. Tom needs to translate the parameter, /bin/bash from the entry stored in /etc/passwd file. Which of the following attribute of posixAccount object class maps to the above parameter? a. b. c. d. loginShell HOMEDIRECTORY homeDirectory LoginShell

24. Identify the authentication mechanism provided by SASL, which is used with the Transport Layer Security (TLS) to encrypt the connection between the LDAP server and client? a. b. c. d. DIGEST-MD5 mechanism One Time Password (OTP) mechanism Shared secret mechanism PLAIN mechanism

25. The system administrator at Global Systems, needs to install Red Hat Linux on the organization's server, using kickstart. He wants to use the graphical installation feature in Kickstart. Which default parameter should he provide for starting Red Hat Enterprise Linux installation process and which parameter needs to be specified in the ks.cfg file for the graphical user interface? a. b. c. d. Root password and keyboard Authentication and language Bootloader and mouse Bootloader and monitor

26. Technology Systems is a leading software solution provider based in Kansas. The organization opens a new branch in Chicago to cater to the increasing demands of the customers. The organization assigns Christine Turner, the system administrator, the task of installing an operating system that supports security protocols, such as Kerberos and hash algorithms. The operating system should provide forum support for posting and receiving the solutions for any software problem. Independent Software Vendors (ISVs),

such as Oracle, and IBM should support this operating system. What should Christine do to perform the task? a. b. c. d. Evaluate Linux for Security requirements and install Linux Evaluate Linux Deployment requirements and install Linux Evaluate Linux for Business Requirements and install Linux Evaluate Linux for Maintenance Requirements and install Linux

27. Christine Turner is working as a system administrator at Medical Central Supplies. The organization maintains several directory servers on different platforms to store the data pertaining to the employees. Each directory server uses different data formats, syntaxes, and protocols for communication with the supported application. The organization asks Christine to enable data sharing between the directory servers. To perform the task, Christine decides to integrate applications across the platforms. However, Christine finds that the directory servers are not able to understand the protocols of each other across the servers. What should Christine do to resolve the issue and enable data sharing between different directory servers? a. b. c. d. Use gateways Use metadirectories Use push and pull synchronization agents Use a distributed multivendor directory

28. Pat Greene is working as a system administrator at SuperGraphics Inc. Pat is assigned the task to integrate Samba with OpenLDAP to store the user information of the samba on OpenLDAP. Therefore, Pat uses the sambaAccount object class to store the user information on OpenLDAP. Pat identifies that few of the attributes of sambaAccount object class need to be secured from dictionary attacks. Which set of attributes should Pat secure to prevent dictionary attacks? a. b. c. d. sambaLMPassword, sambaPwdLastSet sambaLMPassword and sambaNTPassword sambaPwdLastSet and sambaNTPassword sambaLMPassword, sambaNTPassword, and sambaPwdLastSet

29. David Johnson is working as a network administrator with Blue Moon Computers that provides customized consulting services. The network of the company contains numerous web servers, files servers, and database servers. David is assigned the task of managing the network of the enterprise. David notices that network congestion has increased due to increase in the number of employees accessing these servers, in the enterprise. This results in low bandwidth and affects the performance of the network. Also, he receives complaints that httpd process is not running properly on the web servers. What should David do to solve the problems? a. David should check for disk usage in the Access Control Setup section and configure the nagios.cfg file to use object configuration files to check the services running on the hosts.

b. David should check for disk usage in the Monitor Various Aspects of the Running Host section and configure the snmpd.conf file to check the name of the process. c. David should check for disk usage in the Monitor Various Aspects of the Running Host section and configure the minimal.cfg file to add a host to be monitored in the HOSTS section. d. David should check for disk usage in the Access Control Setup section and configure the cgi.cfg file to set use_authentication=1 entry to use_authentication=0.

30. Tom Wilkins works as a system administrator in EarthenWares that provides Web services to its customers. The organization wants to upgrade its Linux-based web servers to provide enhanced security features. The new version of Linux does not support some of the applications running on the web servers. It also does not provide some security features, which are required. What should he do to update the web servers? a. Upgrade the kernel by customizing the source code of new version and configure the kernel using make xconfig command b. Upgrade the kernel using RPM and configure kernel using make oldconfig command c. Upgrade the kernel by applying patches and configure the kernel using make menuconfig command d. Upgrade the kernel by applying patches and configure the kernel using make oldconfig command

31. Donna Bard, the system administrator at Quality Software Developers, wants to backup sensitive data of the organization regularly. For this, Donna decides to implement Redundant Array of Inexpensive Disks (RAID) on the Linux server. Donna wants to delete some partitions on the server to create the RAID disks. Donna uses fdisk utility to delete the offline partitions and does not delete any extended partitions. However, Donna observes that the server is unable to delete these partitions. What should Donna Do to solve the problem? a. b. c. d. Donna should use the umount command to delete the partitions. Donna should also delete the extended partitions. Donna should use any third party tool to delete the specified partitions. Donna should delete all the logical partitions.

32. Global Systems Inc. is a leading software development organization. Users in RD frequently download files and packages from the database server through the Internet. Some files and packages downloaded from the Internet are infected with viruses, which affect computers of all users. To overcome this virus problem, instead of installing antivirus programs on every computer. The organization needs to install virus-free operating systems, such as Linux. Chris, the system administrator, automates the installation of the operating system. Pat needs to use an operating system that provides solution for small to medium range of servers used for the majority of businesses, such as file servers and mail servers. He also needs to place pre-installation scripts at the beginning of the Kickstart configuration file. What should Chris do to perform the required task?

a. Chris needs to use Red Hat Enterprise Linux operating system and enter the following command: %pre echo "My kickstart installation started on ' /bin/date' " > /etc/motd b. Chris needs to use Red Hat Enterprise Linux operating system and enter the following command: %post --interpreter /usr/bin/python c. Chris needs to use Red Hat Enterprise Linux operating system and enter the following command: # mkdir /var/ftp/pub/configfiles d. Chris needs to use Mandriva Linux operating system and enter the following command: network --device eth0 --bootproto dhcp ? 33. Chris Donaldson is an application developer at PQR Inc. The organization is currently working on the Linux platform. The organization receives a new application development project based on the Windows platform. For this, the organization requires developers to work on Windows-based workstations. As a result, Chris needs to migrate and run the Bzip2 Linux application on the Windows-based workstations using SFU. Therefore, Chris downloads the bzip2-1.0.2.tar.gz file from the Internet and saves the file to the local directory of the Windows-based workstation. Then, he enters the following code snippet at the Korn shell prompt to migrate and run the Linux application on Windows platform: $ gunzip bzip2-1.0.2.tar.gz ? $ tar -xvf bzip2-1 .0.2.tar ? $ made ? $ made install ? However, while executing the preceding code snippet, Chris notices that the code is not providing the required output. What should Chris do to solve the problem?

a. Chris needs to enter the following code snippet: $ cd 0.2 ? $ make ? $ make install ? b. Chris needs to enter the following code snippet: $ tar -xvf bzip2-1.0.2.tar ? $ cd $ make ? $ make install ? c. Chris needs to enter the following code snippet: $ gunzipbzip2-1.0.2.tar.gz ? $ tar -xvf bzip2-1.0.2.tar ? $ cd bzip2-1.0.2 ? $ make ? $ make install ?

d. Chris needs to enter the following code snippet: $ gunzip bzip2-1.0.2.tar.gz ? $ tar -xvf bzip2-1.0.2.txt ?

34. Donna Bard is working as a network administrator at Global Systems Inc. Donna has deployed an LDAP server to provide information and resources across the organization. Donna is asked to modify the entries in the salary column of the employees who have been promoted in the LDAP directory. Donna wants to use a data file as input source to modify directory data. In addition, Donna wants that the modification process should continue even ifthere is an errorwhile modifying the entry in the LDAP directory. Which command should Donna use to perform the required tasks? a. b. c. d. Use Idapmodify utility with -f and -c option Use Idapmodify utility with -o logfile and -c option Use Idapmodify utility with -W and -r option Use Idapmodify utility with -b and -E option

35. Which of the following ACLs configuration parameter enables only the authenticated users to access the OpenLDAP server? a. b. c. d. Anonymous Users Self *

36. Jim Lewis is working as a system administrator at Technology Systems The organization has an OpenLDAP server configured to manage the organizational information, such as employee information and business details. However, the performance of the server is decreasing. The management, therefore, asks Jim to configure a server to act as a replica of the master server. Jim uses the following command at the master server to export the database to an LDIF file: # slapadd -I "dc=technologysystems,dc=com" -b database.Idif However, the database files are not exported to an LDIF file. In addition, after exporting the database files to the LDIF file, Jim needs to import the LDIF file to the replica server. What should Jim do to perform the required task? a. Use the # slapcat -b "dc=technologysystem,dc=com" -l database.Idif and # slapadd -l database.Idif command b. Use the # slapcat -I "dc=technologysystem,dc=com" -b database.Idif and # slapcat -b database.Idif command

c. Use the # slapadd -b "dc=technologysystem,dc=com" -l database.Idif and # slapadd -b database.Idif commands d. Use the # ldapsearch -b "dc=technologysystem,dc=com" -I database.Idif and # slapadd -I database.Idif command

37. Tom Wilkins is working as a system administrator at Technology Systems. Tom needs to design a schema for a directory that contains records of employees, such as name, phone, address, and job profile, in the organization. Tom writes a code for the telephoneHumber attribute type in LDAP. 2.5.4.20 NAME 'telephoneHumber' EQUALITY telephoneHumberSubstringsMatch SYNTAX telephoneHumberMatch SUBSTR

1.3.6.1.4.1.1466.115.121.1.1 5{24} Identify the OID of the attribute type and the use of telephoneHumberMatch rule in the preceding code snippet? a. The OID of the attribute type is 2.5.4.20 and the telephoneHumberMatch rule is used for matching complete telephone numbers. b. The OID of the attribute type is 1.3.6.1.4.1.1466.115.121.1.15 and the telephoneHumberMatch rule is used to describe the applications that own and use the attribute. c. The OID of the attribute type is 2.5.4.20 and the telephoneHumberMatch rule is used for matching partial telephone numbers. d. The OID of the attribute type is 1.3.6.1.4.1.1466.115 and the telephoneHumberMatch rule is used to specify the unique name of an attribute.

38. Which feature of Provisioning module would automatically configure the kickstart file for a single user? a. b. c. d. Existing state provisioning Bare metal provisioning Kickstart configuration writer Configuration management

39. Which attribute of the migrate_common.ph file is used to customize the mail domain in the mail attribute in the migrate_passwd.pl script? a. b. c. d. $ DEFAULT_MAIL_DOMAIM $ EXTENDED_SCHEMA $ DEFAULT_BASE $ NAMINGCONTEXT

40. Consider the statements: Statement A: Kerberos eliminates the transmission of password over a network by using symmetric key cryptography to authenticate users accessing the network services. Statement B: The master key is used to secure the Kerberos database. Which of the following is true, with respect to the above statements? a. b. c. d. Statement A is true and statement B is false. Both, statements A and B, are false. Both, statements A and B, are true. Statement A is false and statement B is true.

01 02 03 04 05 06 07 08 09 10 11 12 13 14 15 16 17 18 19 20 b b c a d d a a b d a a d c d c d d a b

21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 b d a d c c a b b a c a c a b a a d a c

Linux Q7 MMS Review (82 questions for all topics)


No. Question Pat Greene is working as a network administrator at Technology Systems. The orgnization has implemented LDAP server to enable the employees to access the employee information of the organization. The management asks Pat to index the entries stored in the LDAP database to enable fast searching and retrieval of data. What should Pat do to perform the required task? 1,Add the following indexes in the slapd.conf file: index objectClass eq index cn, sn, mail eq, sub index departmentNumber eq 2,Add the following indexes in the slapd.conf file: 1 index objectClass eq index departmentNumber 3,Add the following indexes in the slapd.conf file: index objectClass eq index cn pres,eq 4,Add the following indexes in the slapd.conf file: index objectclass eq 1 Answer

index eq

Donna Bard is working, as a network administrator at Good Graphics Inc. Donna needs to add entries of new employees to the LDAP directory containing employees information. While adding the entries, Donna needs to specify the input file from where the ldapadd utility will pick up the entry and add to the LDAP directory. Which one of the following options will Donna use to perform the required task? 1,-f filename 2,-h hostname 3,-U username 4,-D binddn Pat Greene is working, as a network administrator at Global Systems inc. The LDAP directory on the network server contains the information of the employees in the organization. Pat needs to add an entry of an employee in the LDAP directory from an LDIF file named temp1.ldif. Pat, therefore, uses the following command: # slapadd d temp1.ldif

3 However, he is not able to add the entry. Which of the following commands will enable Pat to perform the required task? 1,# slapdelete l temp1.ldif 2,# slapmodify f temp1.ldif 3,# slapadd l temp1.ldif 4,# slapadd u

Donna Bard is working as a network administrator at SuperGraphics Inc. Donna has deployed an LDAP server to provide information and resources across the organization. Now, Donna needs to specify the number of entries that the LDAP server will return in response to a search request. What should Donna do to perform the required task? 1,Use the sizelimit <integer> parameter of the slapd.conf file. 2,Use the timelimit <integer> parameter of the slapd.conf file. 3,Use the ldapmodify utility with c option 4,Use the ldapdelete utility

Tom Wilkins is working as a network administrator at BlueMoon Computers. Tom needs to search for the name of the employees with first name Steve from the LDAP directory containing the details of the employees. Tom needs to specify that a maximum of 50 entries should be retrieved as a result of search request. What should Tom do to perform the required task? 1,Use the ldapsearch command with l option 2,Use the ldapadd command with -k option 3,Use the ldapmodify utility with a option 4,Use the ldapsearch command with z option Blue Moon Computers is a software development organization, which has development centers all over the US. Pat Greene, the system administrator at Blue Moon Computers, installs a LDAP server to store the information about the employees and projects running at different development centers. The Internet has facilitated the growth of Blue Moon Computers. Therefore, Pat decides to increase the accessibility of the LDAP server to all development centers through the Internet. According to the companys policies, the electronic mail address for a given employee is considered public information and the employee's home address is considered sensitive information. It must be protected to address employee privacy concerns. Easy accessibility to the LDAP server allows malicious users to try and access the LDAP server to obtain the home address and other such private and confidential information about various employees. Therefore, the server needs to be protected against such malicious users. Pat needs to implement Access Control List (ACL) to grant access privileges to the authenticated users. Which of the following options contains the access control requirements to accomplish this task? 1,-The subjects accessing the LDAP server -The objects that are accessed

-The level of authentication required -The accessibility time of the LDAP server -The access level to an LDAP server 2,-Physical security -Directory accessibility 3,-Read/Write permission -Sestivity of data -Administration of directory server -User community 4,-Replication and synchronization -Managing the directory server -Network environment

John Barrett is working as a system administrator at Technology Systems. John has implemented a directory server in the organization to store and manage the information pertaining to the employees and the organizational resources. The directory server contains both the confidential data that is private to the employees and the global information that is publicly readable and accessible to all the employees. Now, it is the responsibility of John to protect the data in the directory server to maintain the integrity of the data. For this, John wants to implement a mechanism so that:

-The activities performed by the directory server, such as the modification of the employee password, are constantly monitored. -The Log files of the directory server are constantly analyzed to detect loopholes, such as unauthorized access to the Directory server. -Both the employees and the directory server provide the credential information to each other to verify their identities.

Which security methods are required to be identified and implemented by John to achieve his objective? 1,-One-way Authentication method -Auditing 2,-Auditing -Two-way Authentication method 3,-Firewall -One-way Authentication method 4,-Encryption -Two-way Authentication method Identify the authentication mechanism provided by SASL, which is used with the Transport Layer Security (TLS) to encrypt the connection between the LDAP server and client? 1,PLAIN mechanism 2,Shared secret mechanism 3,One Time Password (OTP) mechanism 4,DIGEST-MD5 mechanism To set up the primary Kerberos server, you need to create the Kerberos database. Which command do you use to create the Kerberos database? 1,# /usr/kerberos/sbin/kdb5_util create s 2,# /usr/kerberos/sbin/kadmin5.local q addprinc ronald/admin 3,# /usr/kerberos/kadmin5.local q addprinc ronald/admin 4,# /usr/kerberos/kdb5_util create s

10

Identify the command that a LDAP Directory client uses to view the list of Ticket to Get Tickets (TGTs) obtained from the Kerberos server. 1,klist 2,kinit 3,kadmin.local 4,kdb5_util Which of the following ACLs configuration parameter enables only the authenticated users to access the OpenLDAP server? 1,Users 2,* 3,Anonymous 4,Self You are configuring an OpenLDAP directory. You want to monitor the information related to communication with shell backends and clients. Which of the following options will you select? 1,loglevel 16 2,loglevel 512 3,loglevel 1024 4,loglevel 64 Which implementation provided by Cyrus-SASL libraries enables a client to send and receive encrypted data from an OpenLDAP server? 1,ANONYMOUS 2,CRAM-MD5 3,DIGEST-MD5 4,KERBEROS_V4 Which of the following parameter of the database section identifies the dn that specifies the common name of the manager of the directory server? 1,rootdn <dn> 2,replogfile <filename> 3,updated <dn> 4,Suffix <dn suffix>

11

12

13

14

Ken Burton is working as a network administrator at SuperGraphics Inc. The organization has implemented an LDAP server to enable the access to employee information of the organization. Therefore, the management decides to build white page service. Now, Ken needs to index the entries stored in the LDAP database to enable fast searching and retrieval of data. What should Ken do to perform the required task? 1,Add the following indexes in the slap.conf file index objectClass eq index cn, sn, mail eq, sub index departmentNumber eq 2,Add the following indexes in the slap.conf file 15 index objectClass eq index departmentNumber 3,Add the following indexes in the slap.conf file index objectClass eq index cn, mail index departmentNumber eq 4,Add the following indexes in the slap.conf file index objectClass eq index cn, sn, mail eq, sub Tom Wilkins is working as a network administrator at Good Graphics Inc. The management asks Tom to deploy LDAP server to provide information and resources across the organization. Tom needs to search for the name of the employees whose first name is Steve. In addition, Tom wants that ldapsearch utility should prompt for simple authentication. What should Tom do to perform the required task? 16 1,# ldapsearch cn=Steve* -Sd 2,# ldapsearch cn=Steve* -c -h 3,# ldapsearch cn=Steve* -x -h 4,# ldapadd cn=Steve* -x -h 3 1

Chris Donaldson is working as a network administrator at SuperGraphics Inc. The organization has implemented an LDAP server to enable access to employee information of the organization. Therefore, the organization decides to build white page service. The management asks Chris to build white pages for the organization. To perform the required task, Chris uses inetOrgPerson class to store the employee information in the LDAP directory. Now, Chris needs to add the existing schema files to support the attributes and object classes. How should Chris modify the global sections of the slap.conf file to add the schema files? 1,# /usr/local/etc/openldap/slapd.conf # Global section ## Include the minimum schema required. include /usr/local/etc/openldap/schema/core.schema ## Added to support the inetOrgPerson object. include /usr/local/etc/openldap/schema/cosine.schema include /usr/local/etc/openldap/schema/inetorgperson.schema ## Added logging parameters 2,# /usr/local/etc/openldap/slapd.conf # Global section ## Include the minimum schema required. include /usr/local/etc/openldap/schema/core.schema ## Added to support the inetOrgPerson object. include /usr/local/etc/openldap/schema include /usr/local/etc/openldap/schema/schema ## Added logging parameters 3,# /usr/local/etc/openldap/slapd.conf # Global section ## Include the minimum schema required. include

17

/usr/local/etc/openldap/schema/core.schema ## Added to support the inetOrgPerson object. ## Added logging parameters 4,# /usr/local/etc/openldap/ # Global section ## Include the minimum schema required. include /usr/local/etc/openldap/schema/core.schema ## Added to support the inetOrgPerson object. ## Added logging parameters

Tom Wilkins is working as a system administrator at Technology Systems. Tom needs to design a schema for a directory that contains records of employees, such as name, phone, address, and job profile, in the organization. Tom writes a code for the telephoneNumber attribute type in LDAP. 2.5.4.20 NAME 'telephoneNumber' EQUALITY telephoneNumberMatch telephoneNumberSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{24} SUBSTR

18

Identify the OID of the attribute type and the use of telephoneNumberMatch rule in the preceding code snippet? 1,The OID of the attribute type is 2.5.4.20 and the telephoneNumberMatch rule is used for matching complete telephone numbers. 2,The OID of the attribute type is 2.5.4.20 and the telephoneNumberMatch rule is used for matching partial telephone numbers. 3,The OID of the attribute type is 1.3.6.1.4.1.1466.115.121.1.15 and the telephoneNumberMatch rule is used to describe the applications that own and use the attribute. 4,The OID of the attribute type is 1.3.6.1.4.1.1466.115 and the telephoneNumberMatch rule is used to specify the unique name of an attribute.

Donna Bard is working as a system engineer at ABC corp. The company uses LDAP directory schema to reduce data redundancy problems and to maintain data integrity. This directory stores the record of employees,such as name, age, and year of birth. Now, the company assigns a task to Donna to design a new object class, myPerson, which is extended from the existing object class, inetOrgPerson. The company also asks donna to define a new attribute type, dob, in the my Person object class. The attribute type, dob, stores the date of birth of the employees of the company. Donna uses the following code snippet to define the dob attribute type and the object class, myPerson, respectively:

1.)

( dob-OID NAME DESC 'birthday day-month'

EQUALITY caseIgnoreMatch SUBSTR

caseIgnoreSubstringsmatch SYNTAX bob 1.3.6.1.4.1.1466.115.121.1.15 ) 2.) ( myPerson-OID NAME 'myPerson' DESC 'Extended person' SUP inetOrgPerson STRUCTURAL MAY dob )

But, Donna finds that the above code snippet is not producing the required results. What code snippet should Donna use to perform the task? 1,1.) ( dob-OID NAME 'dob' DESC 'birthday day-month' EQUALITY caseIgnoreMatch SUBSTR caseignoresubstringsmatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 ) 19 2.) ( myPerson-OID NAME 'myPerson' DESC 'implementing person' SUP inetOrgPerson STRUCTURAL MAY dob ) 2

2,1.)

( dob-OID NAME 'dob' DESC 'birthday day-month'

EQUALITY caseIgnoreMatch SUBSTR

caseIgnoreSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 ) 2.) ( myPerson-OID NAME 'myPerson' DESC 'Extended person' SUP inetOrgPerson STRUCTURAL MAY dob )

3,1.) ( dob-OID NAME 'dob' DESC 'birthday day amd month' SUBSTR caseIgnoresubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 ) 2.)

EQUALITY caseIgnoreMatch

( myPerson-OID NAME DESC 'Extended person' SUP inetOrgPerson ,myname, STRUCTURAL MAY dob )

4,1.)

( dob-OID NAME 'dob' DESC EQUALITY caseIgnoreMatch SUBSTR

caseIgnoreSubstringsMatch 1.3.6.1.4.1.1466.115.121.1.15 ) 2.) ( myPerson-OID NAME 'myPerson' DESC 'Extended person' SUP inetOrgPerson STRUCTURAL MAY dob )

20

Tom Wilkins is working as a system administrator at Quality Software Developers. The organization uses a Directory server to access information pertaining to its employees and organizational resources, such as computers and printers. The Directory server contains confidential and private data of the organization. Tom is assigned a task to implement security of confidential data through the authentication method. In the authentication method, a secure connection is established between two networks and information transmitted on this secure connection is encrypted using encryption methods. Which technology does Tom choose to perform this task? 1,SSL/TLS 2,CIPE 3,IPSec 4,Netfilter

21

InfoSuper Corp. is a software development organization, which has a large number of computer systems that are connected through a network. The organization has a centralized directory server. John Barrett, the system administrator at InfoSuper Corps. comes to know that a malicious user has breached the security of the directory server. The user uses some software tools to eavesdrop on the data being transmitted on the network. The user then decrypts the passwords and monitors the data on the network. Further, the user gathers the credential information and data being transmitted between the directory server and the authorized users. This information is used by the malicious user to breach the security of the directory server.

Which security threat has the malicious user employed to breach the security of the server? 1,Credential stealing 2,Connection hijacking 3,Trojan horses 4,Network sniffing Pat Greene is working as a network administrator at XYZ Inc. Pat implements a directory service to store data at a centralized location. Pat is informed that:

-The authorized users are not able to access the Directory server as a malicious user is identifying the hardware and software environment of the directory server. 22 -After identifying the capacity of the directory server, the malicious user is sending more traffic than what the server can handle. 2

Which technique does this type of attack illustrate? 1,SYN attack 2,Buffer overflow attack 3,Indirect resource consumption 4,Direct resource consumption Supersoft2000, a software development organization has development centers throughout America, which are connected through a network. Larry Williams, a system administrator at Supersoft2000, installs a directory service to implement an identity management system. Employees and clients at different centers access the directory server through the network. Larry wants to prevent unauthorized access to the directory server. So, Larry installs a firewall on the network of the organization such that:

The employees of the internal network are able to establish a connection with external networks. 23 Incoming requests are processed first by the firewall. Next, the firewall validates the requests and forwards them to the directory server. 3

Which of the following does Larry use to perform these tasks? 1,SSL/TLS 2,SASL 3,CIPE 4,Kerberos

24

Which migration perl script is used to translate the protocol entries that are stored in the /etc/protocols file? 1,migrate_protocols.pl 2,migrate_networks.pl 3,migrate_hosts.pl 4,migrate_netgroup_byuser.pl Which attribute of the migrate_common.ph file is used to customize the mail domain in the mail attribute in the migrate_passwd.pl script? 1,$DEFAULT_MAIL_DOMAIN 2,$DEFAULT_BASE 3,$EXTENDED_SCHEMA 4,NAMINGCONTEXT Which perl script is used to translate the host entries stored in the NIS infrastructure? 1,Migrate_netgroup_byuser.pl 2,Migrate_netgroup.byhost.pl 3,Migrate_group.pl 4,Migrate_hosts.pl Jim Edwin is working as a system administrator with Blue Moon Computers. The management assigns Jim the task to migrate the NIS based network to OpenLDAP. Jim wants to customize the migration script according to the organizational requirements. To customize the script, Jim needs to specify the name suffix to be used as distinguished name in the OpenLDAP information.

25

26

27 Which parameter of migrate_common.ph script should Jim use to accomplish the task? 1,$DEFAULT_MAIL_DOMAIN 2,$DEFAULT_BASE 3,$EXTENDED_SCHEMA 4,NAMINGCONTEXT

Ken Burton is working as a system administrator at SuperGraphics Inc. While replicating an LDAP server, Ken needs to configure the master LDAP server to maintain a log of the changes made. Ken, therefore, needs to edit the slapd.conf file to specify the details of the replica server. He needs to specify the name of the replica server, the partition to be replicated, the binding DN of the LDAP server, and the binding method to bind the master LDAP server to the replica server. Which of the following commands should Ken use to perform the required task? 1,replica host=replicaser.supergraphics.com:389 binddn=cn=replicaser,dc=supergraphics,dc=com credentials bindmethod=simple tls=no

2,replica

host=replicaser.supergraphics.com:389 tls=dc=supergraphics,dc=com

28

binddn=cn=replicaser,dc=supergraphics,dc=com credentials bindmethod=simple tls=no host=replicaser.supergraphics.com:389 suffix=dc=supergraphics,dc=com binddn=cn=replicaser,dc=supergraphics,dc=com credentials bindmethod=simple tls=no host=replicaser.supergraphics.com:389 suffix=dc=supergraphics,dc=com portnumber=cn=replicaser,dc=supergraphics,dc=com credentials bindmethod=simple tls=no

3,replica

4,replica

Larry Williams is working as a system administrator at BlueMoon Computers. Larry observes that the performance of the server is decreasing as the users in the organization are excessively querying one section, employee information, of the server. The management, therefore, asks Larry to distribute the directory to improve the performance of the server. After distributing a directory, such that Server1 maintains the information about the organizational information while the employee information is maintained by Server2. Now, Larry needs to verify the correctness of the data stored in Server2. For this, Larry executes the following command:

# slapcat -H C ldap://Server2.bluemooncomputers.com/ -LL -x -b "dc=bluemooncomputers,dc=com" "(ou=*)" ou

29

However, Larry is not able to retrieve results from the Server2, which contains the employee information. What should Larry do to perform the required task? 1,Use # ldapsearch -H C ldap://Server2.bluemooncomputers.com/ -LL -x -b "dc=bluemooncomputers,dc=com" "(ou=*)" ou command

2,Use # slapcat -c H ldap://Server2.bluemooncomputers.com/ -LL -x -b "dc=bluemooncomputers,dc=com" "(ou=*)" ou command 3,Use # slapadd -H C ldap://Server2.bluemooncomputers.com/ -LL -x -b "dc=bluemooncomputers,dc=com" "(ou=*)" ou command 4,Use # slapindex -H C ldap://Server2.bluemooncomputers.com/ -LL -x -b "dc=bluemooncomputers,dc=com" "(ou=*)" ou command

30

Tom Wilkins is working as a system administrator at Technology Systems. Tom is assigned the task to enable the OpenLDAP support in Samba. Tom needs to provide support to the uid, displayName, and gidNumber attributes in the OpenLDAP. Which of the following schema files must be included in the slapd.conf file to support the above attributes? 1,cosine.schema, nis.schema, and samba.schema 2,cosine.schema, inetorgperson.schema, and autofs.schema 3,cosine.schema,inetorgperson.schema,nis.schema 4,inetorgperson.schema, samba.schema, and nis.schema Chris Donaldson is working as a system administrator at SuperGraphics Inc. Chris needs to integrate the samba with OpenLDAP to store the user information. Chris adds a new user Ronald in the OpenLDAP directory. Which command should Chris use to verify the existence of user, Ronald in the OpenLDAP directory? 1,# /usr/local/sbin/smbldap-usershow.pl ronald 2,# smbldap-usershow.pl ronald 3,# /usr/local/sbin/smbldap-usershow ronald 4,# /usr/local/sbin/smbldap-usershow.pl

31

32

Donna Bard is working as a system administrator at Blue Moon Computers, which is a software development organization based in New York. Each department of the organization maintains its own database to store information about the employees. Since the information is stored in multiple data sources, the employees frequently encounter redundant data and inconsistent data. For this, Donna decides to configure a Directory server in the organization. She first creates a Data Design of the organization. She observes that when an employee in a department is shifted to another department, the changes are not reflected in the other related databases. What could be the possible consequence of Donnas observation? 1,Obsolete data stored in the databases 2,Databases updated without any coordination between the database administrators. 3,Databases updated within short time duration. 4,Databases accessed by a number of database administrators at the same time.

33

Perfect Watch Corp. is a watch manufacturing company. The company needs to implement an LDAP Directory server to communicate with its clients. For implementing the LDAP Directory server, the company asks Donna Bard, the system administrator, to define a LDAP Model, which describes the services provided by LDAP Directory server to the LDAP Directory clients of the company. While performing the task, Donna needs to describe the operations that can be performed on the LDAP Directory, such as search, add, delete, bind, unbind. What does Donna do to perform the above task? 1,Define the Information model 2,Define the Naming model 3,Define the Functional Model 4,Define the Security Model Jim Lewis is working as a system administrator at Smart Software Developers, a leading developer of computer applications. Jim is assigned the task to implement a Directory service in the organization to provide centralized storage and management of information, such as employee records.

34

For this, Jim decides to implement an LDAP Directory server in the organization. While implementing the LDAP Directory server, he wants to specify a distinguished name for every entry in the Directory server. He also wants to specify rules to restrict the size of the attributes of the data elements, such as employee ID. Which LDAP models should Jim use to achieve his objective? 1,Information Model and Naming Model 2,Functional Model and Security Model 3,Information Model and Security Model 4,Functional Model and Naming Model

Blue Moon Computers is a leading developer of computer applications. The organization has three departments: HR, Research, and Development. The directory service is configured in the HR department only, and all the employees in the rest of the departments access the directory. Now, if the directory service fails due to a system failure, employees in all the three departments will be affected. To avoid this, Chris Donaldson, the system administrator, wants to make the directory service available in all the three departments. For this, Chris decides to create multiple copies of the directory service and install a copy of the Directory service in each department. Chris employs the Single-Master Replication Policy to synchronize the data stored in the main directory server and the Replica servers, to maintain data consistency. 35 Now, to perform the write operations to add, modify, or update the data, in the Directory service, Chris wants to implement a mechanism so that when an employee sends a write operation request to a replica server, the replica server sends the IP address of the main directory server to the employee. The replica server also sends a message to the employee along with the IP address. This message requests the employee to send the write operation request to the main directory server. Which strategy, in the Single-Master Replication policy, is employed by Chris to perform the write operation? 1,Using referrals 2,Using chaining 3,Assigning unique sequence numbers to each update operation performed 4,Using referrals and Using chaining Blue Valley Consulting is a leading developer of computer applications. The organization has its head office in New York and two branch offices in California and Paris. There are three departments in the organization: Marketing, Research, and Development. The branch offices are connected to the head office in New York through Virtual Private Network (VPN). Each branch office runs as a separate entity, with its own network, reporting structure, and constraints. The organization has no centralized IT management group, and separate administrators at each branch offices manage the network. Since the organization has multiple servers but no centralized management of the information, it faces the data redundancy and data inconsistency problems. To avoid the above data related problems by centralizing the storage and management of data in the organization, Tom Wilkins, the system administrator at the head office, decides to install and configure the OpenLDAP Directory service. Before installing OpenLDAP, Tom wants to install the OpenSSL software package to implement secure, encrypted communication between the Directory server and the clients. What are the commands entered by Tom to install the OpenSSL software package? 1,Tom must enter the following commands at the shell prompt to install OpenSSL: # rpm ivh openssl-0.9.7a-22.1.i386.rpm 36 # rpm ivh openssl-devel-0.9.7a-22.1.i386.rpm # rpm ivh openssl096b-0.9.6b-13.i386.rpm 2,Tom must enter the following commands at the shell prompt to install OpenSSL: # rpm ivh krb5-server-1.2.7-19.i386.rpm # rpm ivh pam_krb5-1.70-1.i386.rpm # rpm ivh krb5-libs-1.2.7-19.i386.rpm # rpm ivh krb5-devel-1.2.7-19.i386.rpm # rpm ivh krb5-workstation-1.2.7-19.i386.rpm 3,Tom must enter the following command at the shell prompt to install OpenSSL: # rpm qa | grep openssl 4,Tom must enter the following commands at the shell prompt to install OpenSSL: 1 1

# rpm ivh openssl096b-0.9.6b-13.i386.rpm # rpm ivh openssl-devel-0.9.7a-22.1.i386.rpm

37

Which the command is used to test the configuration of the Kerberos client? 1,kinit 2,klist 3,kdb5_util 4,kadmin.local Smart Software Developers is a leading software development organization with 15 branches across the world. To enhance the security of the LDAP Directory server maintained by the organization, Ken Burton, the system administrator, decides to authenticate the LDAP Directory users using Kerberos support. For this, Ken needs to create the Kerberos Database on the Key Distribution Center (KDC). What should Ken do to perform the above task? 1,Ken should enter the following command to create the Kerberos Database: # kdb5_util create s 2,Ken should enter the following command to create the Kerberos Database: # kdb5_util create c 3,Ken should enter the following command to create the Kerberos Database: kdb5util create s 4,Ken should enter the following command to create the Kerberos Database: # kdb5util create c

38

39

Which parameter in the smb.conf file for the OpenLDAP-enabled Samba server specifies the domain where Samba server resides? 1,Workgroup 2,Netbios name 3,Security 4,Encryption Which attribute in the sambaAccount object, used to store the Samba related information in OpenLDAP, specifies the time when the lmpassword and ntpassword are last modified? 1,SambaPwdLastSet 2,SambaNTPassword 3,SambaLMPassword 4,SambaLogonScript Which schema file path should be specified in the samba.schema file to provide the uid attribute of a sambaAccount object? 1,cosine.schema 2,inetorgperson.schema 3,nis.schema 4,core.schema Which command is used to verify whether Samba has authenticated a sambaAccount, Mike, stored on the OpenLDAP server? 1,# /usr/local/sbin/smbldap-usershow.pl Mike 2,# /usr/local/smbldap-usershow.pl Mike 3,# /usr/sbin/smbldap-usershow.pl Mike 4,# /usr/local/sbin/ldap-usershow.pl Mike Christine Turner is working as a system administrator at Medical Central Supplies. The organization maintains several directory servers on different platforms to store the data pertaining to the employees. Each directory server uses different data formats, syntaxes, and protocols for communication with the supported application. The organization asks Christine to enable data sharing between the directory servers. To perform the task, Christine decides to integrate applications across the platforms. However, Christine finds that the directory servers are not able to understand the protocols of each other across the servers. What should Christine do to resolve the issue and enable data sharing between different directory servers?

40

41

42

43

1,Use gateways 2,Use push and pull synchronization agents 3,Use metadirectories 4,Use a distributed multivendor directory

44

Jim Lewis is working as a system administrator at Technology Systems. The organization maintains different directory servers on several platforms for running different types of applications. These directory servers use different security mechanisms to provide access to the directories of the directory server. The organization needs to enable sharing and accessing of information between the directory servers for official purposes. Jim decides to perform the task and finds that the directory servers are unable to recognize the clients of different platforms. As a result, the directory services of the directory server are unable to interoperate with the nonnative clients. What should Jim do to resolve the problem? 1,Use push and pull synchronization agents 2,Use gateways 3,Create distributed multivendor directories 4,Use cross-platform authentication services

45

Certified Carriers is a software application development company based in U.S. The company maintains the details about all the running projects in the OpenLDAP server, installed in the company. The company finds that the server has started running slowly due to some unknown reasons. The company asks the system administrator, Ed Young, to identify the cause of the problem. Ed finds that some unauthorized people are accessing the directory server, which causes the server to run slowly. To solve the problem, Ed needs to specify the kind of information, which should be stored in the system logs. For this, Ed defines the value of the loglevel directive as 8. What kind of information does Ed want to store by using this value? 1,KERBEROS_V4 2,DIGEST-MD5 3,CRAM-MD5 4,ANONYMOUS Which feature of Provisioning module would automatically configure the kickstart file for a single user? 1,Bare metal provisioning 2,Existing state provisioning 3,Configuration management 4,Kickstart configuration writer The Satellite model grants permission to the user to download software using physical media, such as CD and floppy. Which of the following feature helps to accomplish this task? 1,Local database repository 2,Complete off-network capability 3,Channel and errata cloning and their management 4,Channel permissions Global Systems is a software development organization. Pat Greene, the network administrator, has used the Kickstart installation method to automatically configure workstations and servers according to the requirement of the organization. Which feature of the provisioning module does Pat use? 1,Bare metal provisioning 2,Existing state provisioning 3,Configuration management 4,Kickstart configuration writer

46

47

48

49

Jim Lewis is working as a network administrator at Smart Software Developers. Jim has registered the Linux workstations and servers with Red Hat Network. Jim has identified a workstation on the network that has crashed while running a software application. For resolving the problem, he must identify the location of this error. What should he do to accomplish the task? 1,Implement a GUI to receive automatic updates from Red Hat network 2,Ask for prior notification for updates and receipt of the errors through mail messages 3,Issue a list of Errata 4,Check RPM dependencies associated with each new version of the updates Quality Software developer is multinational organization. Donna Bard, the network administrator in the organization is responsible for monitoring the network of the organization. While monitoring the network, Donna observes that a large number of data packets are getting lost on the network. As a result, the employees of organization are not able to download the file from the file server although all the connections and protocols related to file server are working perfectly. This is affecting the performance of the enterprise. What should Donna do to solve the problem?

50

1,Run the tcpdump command at the shell prompt. 2,Run the itrace and strace command at the shell prompt. 3,Run the itrace command at the shell prompt. 4,Run the strace command at the shell prompt. Ronald Billing is working as a system administrator at Blue Moon Computers, which provides storage solutions to its customers. Ronald has configured a DNS server in the enterprise, which converts the address of a Web site to its associated IP address. All the employees of Blue Moon Computers are connected to the DNS for routing over the network. The users report complaints to Ronald that they cannot access the enterprise network because DNS is not able to resolve the names into IP addresses. If the problem persists, the network will stop functioning and the performance of the enterprise will go down quickly. What should Ronald do to solve the problem? 1,Use the ps command Use the kill STOP command Use the kill CONT command 2,Use the fuser command 51 Use the Isof command Configure the rpm -q files 3,Use the host or nslookup command Use the dig command Configure the chroot files 4,Use the host or ltrace command Use the strace command Configure the rpm qc files 3

Certified Carriers is an established computer-training institute, based in New Jersey. The institute has launched a new course on Linux administration that has been very successful. Therefore, the management wants to launch two new batches within the next week. For this, Corrine Wallace, the network administrator, needs to set up 60 Linux workstations.

Corrine wants to use Kickstart installation that enables automatic installation of the operating systems on several computers simultaneously. To use Kickstart installation, Corrine needs to set up an installation sever, such as NFS server, or Apache server. While setting up NFS server, Corrine wants to copy the Linux installation files to the NFS shared directory. What of the following sequence of command, should Corrine follow to perform the task? 1,Run the following command sequentially: # mkdir /mnt/install ? # mount /dev/cdrom /mnt/cdrom ? # cp ar /mnt/cdrom/RedHat /var/www/html/install ? # cp /mnt/cdrom/.discinfo /mnt/install ? # umount /mnt/cdrom ? # mount /dev/cdrom /mnt/cdrom ? 52 # cp ar /mnt/cdrom/RedHat/RPMS /mnt/install ? # umount /mnt/cdrom ? # mount /dev/cdrom /mnt/cdrom ? # cp ar /mnt/cdrom/RedHat/RPMS /mnt/install ? 2,Run the following command sequentially: # mkdir /mnt/install ? # mount /dev/cdrom /mnt/cdrom ? # cp ar /mnt/cdrom/RedHat /var/ftp/pub/install ? # cp /mnt/cdrom/.discinfo /mnt/install ? # umount /mnt/cdrom ? # mount /dev/cdrom /mnt/cdrom ? # cp ar /mnt/cdrom/RedHat/RPMS /mnt/install ? # umount /mnt/cdrom ? # mount /dev/cdrom /mnt/cdrom ? # cp ar /mnt/cdrom/RedHat/RPMS /mnt/install ? 3,Run the following command sequntially: 4

# mkdir /mnt/install ? # mount /dev/cdrom /mnt/cdrom ? # cp /mnt/cdrom/.discinfo /mnt/install ? # cp /mnt/cdrom/.discinfo /mnt/install ? # umount /mnt/cdrom ? # mount /dev/cdrom /mnt/cdrom ? # cp ar /mnt/cdrom/RedHat/RPMS /mnt/install ? # umount /mnt/cdrom ? # mount /dev/cdrom /mnt/cdrom ? # cp ar /mnt/cdrom/RedHat/RPMS /mnt/install ? 4,Run the following command sequentially: # mkdir /mnt/install ? # mount /dev/cdrom /mnt/cdrom ? # cp ar /mnt/cdrom/RedHat /mnt/install ? # cp /mnt/cdrom/.discinfo /mnt/install ? # umount /mnt/cdrom ? # mount /dev/cdrom /mnt/cdrom ? # cp ar /mnt/cdrom/RedHat/RPMS /mnt/install ? # umount /mnt/cdrom ? # mount /dev/cdrom /mnt/cdrom ? # cp ar /mnt/cdrom/RedHat/RPMS /mnt/install ?

The system administrator at Global Systems needs to install Linux operating system on the computers in the organization. He wants to install a server system that enables the employees at different branches of an organization to share the data. He wants to use the kickstart method to install Linux on all the computers from a main server where he would have the image of the boot floppy stored. Identify the server type along with its installation command that he should use and the image file on the server that would be used to create a boot floppy diskette? 1,Apache web server # rpm qa | grep ftp ? linux.img 2,Network file system server 53 # rpm qa | grep nfs-utils ? root.img 3,file transfer protocol server # rpm qa | grep http ? iso.img 4,Network file system (NFS) server # rpm qa | grep nfs ? bootdisk.img 4

54

Pat Greene, the network administrator, at InfoSuper Corp. The organization needs to implement data encryption and authentication protocols for user and file level security. The management, therefore, decides to implement Linux operating system for all business purposes. Pat installs Linux operating system on all the computers in the network of the organization. Pat is using kickstart installation method to automate installation. While deploying Linux operating system Pat gets an error message stating that ks.cfg file not accessible. What should Pat do to solve the problem? 1,Pat needs to need to check the path at root prompt or the directory name should be correct and accurate 2,Pat needs to check if the CD-ROM is in readable mode and that you have made the CD-ROM bootable. 3,Pat needs to check for the mouse parameter and mention it in your ks.cfg file. 4,Pat needs to use the recent version of boot image file.

Global Systems Inc. is a leading software development organization. Users in R&D frequently download files and packages from the database server through the Internet. Some files and packages downloaded from the Internet are infected with viruses, which affect computers of all users. To overcome this virus problem, instead of installing antivirus programs on every computer. The organization needs to install virus-free operating systems, such as Linux. Chris, the system administrator, automates the installation of the operating system. Pat needs to use an operating system that provides solution for small to medium range of servers used for the majority of businesses, such as file servers and mail servers. He also needs to place pre-installation scripts at the beginning of the Kickstart configuration file. What should Chris do to perform the required task? 1,Chris needs to use Red Hat Enterprise Linux operating system and enter the following command: %pre echo My kickstart installation started on /bin/date > /etc/motd

55

2,Chris needs to use Mandriva Linux operating system and enter the following command: network --device eth0 -bootproto dhcp ?

3,Chris needs to use Red Hat Enterprise Linux operating system and enter the following command: %post --interpreter /usr/bin/python 4,Chris needs to use Red Hat Enterprise Linux operating system and enter the following command: # mkdir /var/ftp/pub/configfiles

Consider the statements:

Statement A: The BOOTP server contains the information about the configuration of the computers on which Linux needs to be installed. Statement B: 56 During the Kickstart installation of Linux over a network, the Kickstart client needs to have either the network information or the files required for installing the Linux operating system. 4

Which of the following is true, with respect to the above statements? 1,Statement A is true and statement B is false. 2,Statement A is false and statement B is true. 3,Both, statements A and B, are true. 4,Both, statements A and B, are false.

Jim, the network administrator at Supersoft Inc., has decided to install the Linux operating system on the network at his organization. He needs to deploy an NFS server at a centralized location on the network. After preparing the server, some problem occurred while he was configuring the server. The following set of commands was used by him to configure the NFS server:

/mnt/install *(ro,sync)<ro,asynch> # exportfs e 57 # service nfs start # showmount e 3

Which command should Jim modify to configure the server? 1,# exportfs e 2,# service nfs start 3,# showmount e 4,/mnt/install *(ro,sync)

58

Red Sky IT Systems is an IT organization that provides software services to its customers. One of the projects being developed at Red Sky requires the use of advanced Perl scripts. For this, Pat Greene, the network administrator installs RPM packages on the computers. Pat observes that a file of RPM package is corrupted during the installation of RPM packages. Therefore, Pat needs to verify the corrupted file to check the attributes of the file. What should Pat do to perform the task? 1,Execute # rpm -rebuilddb ? 2,Execute # rpm Vf /bin/umount ? 3,Execute # rpm --import /mnt/cdrom/RPM-GPG-KEY ? 4,Execute # rpm -K squirrelmail-1.2.11-1.noarch.rpm ? MentorGraphics is a leading software solution provider. The management of the organization asks Nancy Jones, the network administrator, to install a sendmail RPM package in the organization network. Nancy observes that the existing RPM package is not secure for sendmail package. Therefore, Nancy decides to update the existing RPM packages to enhance the security for sendmail packages. For this, Nancy needs to register a server computer with Red Hat Network (RHN).

59

In addition, Nancy needs to push updates and patches securely from the server registered with RHN to other remote servers in the organization network. What should Nancy do to perform the task? 1,Execute Patch [options] <[user@]sourcehost:> <source filename> <[user@]destinationhost:> <destination filename> 2,Execute rsync [options] <[user@]sourcehost:> <source filename> <[user@]destinationhost:> <destination filename> 3,Execute scp [options] <[user@]sourcehost:> <source filename> <[user@]destinationhost:> <destination filename> 4,Execute rpm [options] <[user@]sourcehost:> <source filename> <[user@]destinationhost:> <destination filename>

60

Which value for the STAGE argument in the rpmbuild command unpacks the source code and applies patches? 1,a 2,p 3,b 4,c Which section of a spec file contains the instructions to prepare the source code for build? 1,%build 2,%prep 3,%install 4,%files Which SRPM directory contains the files that are used to control the RPM build process? 1,/usr/src/redhat/BUILD 2,/usr/src/redhat/RPMS 3,/usr/src/redhat/SPECS 4,/usr/src/redhat/SRPMS Which character is displayed in the output of the rpm command with Vf option that is used to check if there is a change in the user ownership attribute of the file? 1,L 2,U 3,S 4,M Donna is working as a network administrator at Safest Software Developers. The organization has three branches at different locations. There are three departments at each branch, named application development, quality assurance, and sales. The users of the same department at different branches are part of a group. There are three groups corresponding to each department, app for application development department, qa for quality assurance department, and sales for sales department. All the employees at different branches use a database server at the main branch to store data. The database server can run 100 processes at a time. The users in the app group run a large number of processes on the database server due to which the users in the qa and sales groups are not able to run their processes. What should Donna do to solve this problem?

61

62

63

1,Donna needs need to add the following entries to the /etc/security/limits.conf file: @app 64 soft nproc 45 1

@app hard nproc 50 2,Donna need to add the following entry to the /etc/pam.d/login file: session required /lib/security/pam_limits.so

3,Donna needs to add the following entries to the /etc/pam.d/login file: * soft nofile 85*

hard nofile 88 4,Donna needs to add the following entries to the /etc/security/limits.conf file: * soft file 560*

hard file

860

Tom Wilkins is working as a system administrator at SSPT Corporation. To provide communication between these branch offices, Tom needs to provide an e-mail facility and shared Internet access in the organization. For this, he needs to update the Linux kernel of a server to embed the required services into the existing communication system. After updating, he needs to configure the kernel source code, which is of very large size. He also needs to compile the kernel source and resolve all the dependencies after configuring the kernel source code as required. He also wants to remove all the unused files. What should Tom do to accomplish this task?

1,Tom should use the following commands: # make menuconfig #make oldconfig 65 #make mrproper 2,Tom should use the following commands: #make oldconfig # make zImage # make modules_install 3,Tom should use the following commands: # make oldconfig # make xconfig # make install 4,Tom should use the following commands: 4

# make dep # make bzImage

Technology Systems is a leading software development organization. The organization uses the Linux operating system on its workstations and servers for security purposes. The organization has a main centralized server that uses kernel-2.6. The organization adds two new divisions, one for its research work and another for its development work. Both divisions access the centralized server and this increases the load on the server. To improve the performance of server, the organization assigns Diane Frye, the system administrator, the task of upgrading the kernel. For this, Diane downloads, configures, and compiles the upgraded kernel on the server. However, Diane fails to execute the make module command. What should Diane do to troubleshoot the problem? 1,Run the make dep command. 2,Run the make modules command. 3,Run the make bzImage command. 4,Run the make install command.

66

Donna Brad is working as a system administrator at Blue moon Computers. To support the recently acquired hardware, the management asks Donna to upgrade the kernel of the main Linux server. She checks whether the kernel source code is already installed on the main server and finds the code is not installed. Therefore, she downloads the source code from Web and configures the kernel source code on the server. Now, Donna needs to compile the kernel source code, and perform the installation steps of kernel. What should Donna do to complete the upgrade of the kernel? 1, Donna should execute the following commands: # make dep # make bzImage # make cln # make modules # make modules_install # make install 2,Donna should execute the following commands: # make dep # make clean # make bzImage 67 # make modules # make modules_install 3,Donna should execute the following commands: # make dep # make clean # make bzImage # make modules # make modules_install # make install 4,Donna should execute the following commands: # make dep # make bzImage # make clean # make modules # make install 3

# make modules_install

Global Systems is a software development organization that provides customized software solutions. The organization uses kernel-2.4.21-4.EL on its Linux server. The management of the organization decides to upgrade the existing kernel to kernel-2.4.24 to enhance security and to acquire new hardware support. Pat Greene, the system administrator is assigned the task of upgrading the Linux kernel. After downloading the.tar.gz file containing the source code of the kernel in /usr/src directory, Pat needs to install the kernel source code. What should Pat do to perform the task? 1, Pat needs to execute the following code snippet: # cd /usr/src # tar -zxvf linux-2.4.24.tar.gz # cd linux-2.4.24 # ls al 2,Pat needs to execute the following code snippet: # cd /src 68 # tar -zxvf linux-2.4.24.tar.gz # cd linux-2.4.24 # ls l 3,Pat needs to execute the following code snippet: # cd /usr/src # tar linux-2.24.tar.gz # cd linux-2.4.24 # ls al 4,Pat needs to execute the following code snippet: # cd /usr/src # tar -zxcf linux-2.4.24.gz # cd linux-2.4.24 # ls al 1

John Barrett is working as a network administrator at Blue Valley Consulting. The organization has a number of branch offices all over US. The employees of the organization access a centralized Linux server located at the main branch. John has recently upgraded the kernel of the centralized Linux server from kernel-2.4 to kernel-2.6. John has also implemented RAID to avoid any data loss. After implementing the RAID, John observes that the RAID acceleration is low. As a result, the server performance is also degraded. To improve the RAID acceleration, John needs to stabilize the speed of the RAID device. For this, he decides to assign the value, 80000, to the parameters specifying the speed of the RAID device. What should John do to perform this task?

1,Execute the following commands at the shell prompt: # echo 80000 > /sys/dev/raid/speed_limit_max # echo 80000 > /sys/dev/raid/speed_limit_min 69 2

2,Execute the following commands at the shell prompt: # echo 80000 > /proc/sys/dev/raid/speed_limit_max # echo 80000 > /proc/sys/dev/raid/speed_limit_min

3,Execute the following commands at the shell prompt: # echo 80000 > /proc/sys/dev/raid/speed_max # echo 80000 > /proc/sys/dev/raid/speed_min 4,Execute the following commands at the shell prompt: # echo 80000 > /proc/sys/raid/speed_limit_max # echo 80000 > /proc/sys/raid/speed_limit_min

Tom Wilkins is working as a network administrator at InfoSuper Corp. The management of the organization decides to migrate to the Linux environment to provide file level security and data level security to all the applications. Tom needs to compile and execute a C# application on a Linux platform. To compile the application on the C# application, Tom changes to the /usr/src/ mono directory and enters the following command at the shell prompt to compile the application: # mcs Interactive\ Welcome.cs However, Tom observes that no output is displayed. In addition, he also wants to execute the application. What should Tom do to perform the required task? 1,Chris needs to enter the following commands to compile: # mono Interactive\ Welcome.cs Enter the following command to execute the application: 70 # mono Interactive\ Welcome.exe 2,The compilation is performed successfully Enter the following command to execute the application: # mono Interactive\ Welcome.exe 3,Chris needs to enter the following commands to compile: # mcs Interactive\ Welcome.cs Enter the following command to execute the application: # mcs Interactive\ Welcome.exe 4,Compilation is performed successfully Enter the following command to execute the application: # mcs Interactive\ Welcome.exe 2

Chris Donaldson is working as a network administrator at Quality Software Developers. To provide file and user level security, the management decides to migrate application to a Linux-based system. Chris decides to use mono tool to migrate the .NET application to Linux. To use the tool, Chris downloads the zip files that contains the required RPM packages needed to run the application on Linux platform. Chris installs the first four RPM packages to provide database connectivity and debug information in the following order: bytefx-data-mysql-1.1.6-1.novell.6.3.i586.rpm libgdiplus-1.1.5-1.ximian.1.1.i386.rpm ibm-data-db2-1.1.6-1.novell.6.3.i586.rpm libgdiplus-debuginfo-1.1.5-1.ximian.1.1.i386.rpm However, after installing of all the required RPM packages, Chris observes that still the .NET application is not running on Linux platform. What should Chris do to solve the problem? 1,Chris needs to install the RPM packages in the following order: libgdiplus-debuginfo-1.1.5-1.ximian.1.1.i386.rpm bytefx-data-mysql-1.1.6-1.novell.6.3.i586.rpm ibm-data-db2-1.1.6-1.novell.6.3.i586.rpm libgdiplus-1.1.5-1.ximian.1.1.i386.rpm 2,Chris needs to install the RPM packages in the following order: bytefx-data-mysql-1.1.6-1.novell.6.3.i586.rpm ibm-data-db2-1.1.6-1.novell.6.3.i586.rpm libgdiplus-1.1.5-1.ximian.1.1.i386.rpm libgdiplus-debuginfo-1.1.5-1.ximian.1.1.i386.rpm 3,Chris needs to install the RPM packages in the following order: bytefx-data-mysql-1.1.6-1.novell.6.3.i586.rpm libgdiplus-1.1.5-1.ximian.1.1.i386.rpm ibm-data-db2-1.1.6-1.novell.6.3.i586.rpm libgdiplus-debuginfo-1.1.5-1.ximian.1.1.i386.rpm 4,Chris needs to install the RPM packages in the following order: libgdiplus-debuginfo-1.1.5-1.ximian.1.1.i386.rpm libgdiplus-1.1.5-1.ximian.1.1.i386.rpm bytefx-data-mysql-1.1.6-1.novell.6.3.i586.rpm ibm-data-db2-1.1.6-1.novell.6.3.i586.rpm

71

Tom Wilkins is working as a network administrator at Blue Valley Consulting. The employees of the organizations Software Development department develop .NET applications for their clients. Now, the organization migrates to the Linux platform to avoid the cost of licensing in Windows. As a result, the employees now need to migrate the .NET applications to the Linux platform. Tom decides to use the Mono tool to allow migration of the .NET applications to the Linux platform. He first compiles the .NET applications on the Windows platform. He then copies the compiled source code of the application to the /usr/src directory on Linux platform. Now, he needs to compile the application source code on the Linux platform. For this, he decides to use the mcs command. During compilation, he wants to generate the exceptions that the debugger can catch. He also wants to generate the debugging information but ignore the warning messages. To perform the above tasks, Tom executes the following command: mcs debug -nowarn:WARNLIST However, Tom notices that the above command is not providing the required results. What should Tom do to solve the above problem? 1,Tom should execute the following command: mcs debug -fatal nowarn:WARNLIST [source-files] 72 In this code, source-files parameter refers to the name of files that contain the source code of .NET applications. 2,Tom should execute the following command: mcs -about L PATH [source-files] In this code, source-files parameter refers to the name of files that contain the source code of .NET applications. 3,Tom should execute the following command: mcs debug nowarn:WARNLIST L PATH [source-files] In this code, source-files parameter refers to the name of files that contain the source code of .NET applications. 4,Tom should execute the following command: mcs -debug --fatal [source-files] In this code, source-files parameter refers to the name of files that contain the source code of .NET applications. Which RPM of mono-1.1.zip file provides development support for IKVM, for the .NET CLR? 1,mono-ikvm-1.1.6-1.novell.6.3.i586.rpm 2,mono-jscript-1.1.6-1.novell.6.3.i586.rpm 3,mono-locale-extras-1.1.6-1.novell.6.3.i586.rpm 4,mono-web-1.1.6-1.novell.6.3.i586.rpm Which element in the migration checklist for Windows to the Linux platform migration can be exported with the help of the built-in Import/Export feature of Internet Explorer? 1,Outlook Express mails 2,Documents and files 3,Account settings 4,Favorites/Bookmarks/Cookies 1

73

74

75

Which RPM of mono-1.1.zip file provides development support for Mono tool? 1,mono-data-postgresql 2,mono-data-sqlite 3,mono-devel-1.1.6-1.novell.6.3.i586.rpm 4,mono-data-sybase Ed Young is a network administrator at Global Systems. The organization implements Linux on all its workstations and servers. Ed wants to open a .zip file on his Linux-based workstation. The file was compressed using the Windows WinZip utility. Therefore, he installs WinZip on his workstation. After installing WinZip, Ed types the following code snippet at the shell prompt to run the WinZip utility: $ Wine ~/.wine/Program\ Files/WinZip/WINZIP32.EXE ? However, when Ed executes the snippet, it does not provide the required output. What should Ed do to solve the problem? 1,Ed needs to write the following code snippet:

76 $ wine drive_c/Program\ Files/WinZip/WINZIP32.EXE ? 2,Ed needs to write the following code snippet: $ wine /Program\ Files/WinZip/WINZIP32.EXE ? 3,Ed needs to write the following code snippet: $ wine ~/.wine/drive_c/Program\ Files/WinZip/WINZIP32.TXT ? 4,Ed needs to write the following code snippet: $ wine ~/.wine/drive_c/Program\ Files/WinZip/WINZIP32.EXE ? Steve Irving is working as a network administrator at Deez Inc., a Texas-based organization. To save the licensing costs of the Windows-based applications, the organization decides to migrate from Windows to Linux. Steve is assigned the task of enabling the Windows-based applications to run on the Linux systems. For this, he needs to install Wine, which translates the Windows instructions into its equivalent Linux instructions. To install Wine on Linux using packages with .deb extensions, Steve writes the following code snippet to execute the command at the shell prompt as a root user: # apt- _0.0.20050419-winehq-1_i386.deb ? However, while executing the preceding code snippet, Steve notices that the code snippet is not providing the required output. What should Steve do to solve the problem? 1,Steve needs to write the following code snippet: #apt-get install -winehq-1_i386.deb ? 2,Steve needs to write the following code snippet: #apt-get install wine_0.0.20050419- ? 3,Steve needs to write the following code snippet: #apt-get install wine_0.0.20050419-winehq-1_i386.deb ? 4,Steve needs to write the following code snippet: #get install wine_0.0.20050419-winehq-1_i386.txt ?

77

Chris Donaldson is an application developer at PQR Inc. The organization is currently working on the Linux platform. The organization receives a new application development project based on the Windows platform. For this, the organization requires developers to work on Windows-based workstations. As a result, Chris needs to migrate and run the Bzip2 Linux application on the Windows-based workstations using SFU. Therefore, Chris downloads the bzip2-1.0.2.tar.gz file from the Internet and saves the file to the local directory of the Windows-based workstation. Then, he enters the following code snippet at the Korn shell prompt to migrate and run the Linux application on Windows platform: $ gunzip bzip2-1.0.2.tar.gz ? $ tar -xvf bzip2-1.0.2.tar ? $ made ? $ made install ? However, while executing the preceding code snippet, Chris notices that the code is not providing the required output. What should Chris do to solve the problem? 1,Chris needs to enter the following code snippet: $ tar -xvf bzip2-1.0.2.tar ? $ cd 78 $ make ? $ make install ? 2,Chris needs to enter the following code snippet: $ cd 0.2 ? $ make ? $ make install ? 3,Chris needs to enter the following code snippet: $ gunzip bzip2-1.0.2.tar.gz ? $ tar -xvf bzip2-1.0.2.txt ? 4,Chris needs to enter the following code snippet: $ gunzip bzip2-1.0.2.tar.gz ? $ tar -xvf bzip2-1.0.2.tar ? $ cd bzip2-1.0.2 ? $ make ? $ make install ? 4

Don Allen is working as a system administrator at Indestructible Boxes, Inc. The organization asks to Don to install Simple Network Management Protocol (SNMP) on a computer in the organization to monitor networks and systems of the organization. To install SNMP, Don downloads the source code of SNMP available in the tar.gz file. Now, what command should Don use to perform the task? 1,# cp snmp-<x>.tar.gz /usr/src ? # net-snmp-utils-5.0.8-11 # net-snmp-devel-5.0.8-11 # cd /usr/src/snmp-<x> ? # ./configure ? # make all ? 2,# cp snmp-<x>.tar.gz /usr/src ? # cd /usr/src ? # tar xzvf snmp-<x>.tar.gz ? # cd /usr/src/snmp-<x> ? 79 # ./configure ? # make all ? 3,# cp snmp-<x>.tar.gz /usr/src ? # mv snmpd.conf snmpd.conf.org ? # tar xzvf snmp-<x>.tar.gz ? # cd /usr/src/snmp-<x> ? # service snmpd status ? # make all ? 4,# cp snmp-<x>.tar.gz /usr/src ? # cd /usr/src ? # mv snmpd.conf snmpd.conf.org ? # cd /usr/src/snmp-<x> ? # ./configure ? # make all ? 2

Jim Lewis, the network administrator at Simple Solution, implements the Nagios system to monitor the enterprise network. The enterprise provides five mail servers to its employees for retrieving and sending email messages. Jim needs to monitor and manage all the mail servers for better performance. For this, he uses object configuration files to define the Post Office Protocol (POP) service on all the mail servers using the following code: define service{ use generic-pop

service_description_Check-pop contact_groups host_name } However, Jim observes that the POP service is not defined in the object configuration files. What should Jim do in order to troubleshoot the problem? 1,Jim should use the following code: define service{ use generic-pop mailadmins1 mailhosts

service_description_Check-pop 80 contact_groups usergroup1 host_name event_handler } mailhosts eh_pop 3

2,Jim should use the following code: define service{ use generic-pop

service_description_Check-pop check_command contact_groups event_handler host_name } check_pop usergroup1 eh_pop real user

3, Jim should use the following code: define service{ use name general generic-POP

service_description Check pop check_command event_handler contact_groups } 4, Jim should use the following code: define service { use name general generic-pop check_pop eh_pop mailadmin

service_description_Check-pop check_command event_handler check_pop eh_pop

81

Tom Wilkins is the network administrator at Safest Software. He installs Wine to facilitate the execution of Windows-based applications on the Linux platform. Tom wants to enable the employees of the organization to use a parallel port to access Wine whenever they want to execute Windows-based applications on the Linux platform. Therefore, he needs to configure the Wine settings in the configuration file of Wine. Which section of Wine should he configure for the purpose? 1,[ppdev] 2,[ports] 3,[x11drv] 4,[afmdirs] Which command is used to copy the passwd file to ssod directory contained in the /etc/pam.d directory? 1,# cp /etc/pam.d/ssod /etc/pam.d/passwd 2,# cp /etc/pam.d/passwd /etc/pam.d/ssod 3,# mount etc/pam.d/ssod /etc/pam.d/passwd 4,# mount /etc/pam.d/passwd etc/pam.d/ssod

82

You might also like