image


3X0-201 Dumps

3X0-201 Braindumps 3X0-201 Real Questions 3X0-201 Practice Test

3X0-201 Actual Questions


Sair


3X0-201


Core Concepts and Practices (Level 2)


https://killexams.com/pass4sure/exam-detail/3X0-201


QUESTION: 40

After creating a recovery file system and building a kernel for the recovery disk, which command will directly copy the kernel to the floppy /dev/fd0?


  1. cp if=KERNEL of=/dev/fd0

  2. cp -b if=/dev/fd0 of=KERNEL bs=10k

  3. rawrite of=KERNEL if=/dev/fd0 bs=1k

  4. dd if=KERNEL of=/dev/fd0 bs=1k


Answer: D


QUESTION: 41

Which of the following is a task that the netstat command can perform?


  1. It determines where on a network a packet is dropped.

  2. It prints the individual packet status of a network.

  3. It measures the baud rate between two machines.

  4. It lists all current connections on a particular machine.

  5. It monitors the number of collisions on a network.


Answer: D


QUESTION: 42

Which of the following tasks does the netperf command perform?


  1. It monitors the traffic on a network.

  2. It measures the number of packets traveling over an entire network with multiple machines.

  3. It measures the baud rate between two machines.

  4. It monitors the number of collisions on a network.

  5. It changes the precedence of given packets over a network.


Answer: C


QUESTION: 43

Betsy wants to build a more sophisticated ipchains rule set for her firewall by adding a user-defined rule list. This customized rule list will be a single chain that will provide the highest level of security to the protected network. What is the minimum number of chains in Betsy's firewall?


  1. One

  2. Two

  3. Three

  4. Four


Answer: D


QUESTION: 44

Jim needs to put a new application on his machine, but he is not sure exactly how much hard drive space he has left on his machine. Which of the following commands will show Jim how much space he has left on his drive?


  1. du

  2. df

  3. hdparm

  4. fdisk


Answer: B


QUESTION: 45

An administrator needs to implement specialized packet alteration beyond the usual scope of iptables filtering. Which of the following iptables rulesets will the administrator need to customize to accomplish this goal?


  1. filter

  2. custom

  3. nat

  4. mangle


Answer: D


QUESTION: 46

Lisa has recently implemented a series of ipchains rules to secure a Local Area Network (LAN). She is doing maintenance on the rule sets and has entered the sequence of commands below. Which of the following statements does NOT describe a result of the appended rules?

ipchains -A input -i eth0 -s 192.168.1.0/24 -j ACCEPT ipchains -A output -i eth0 -s 192.168.1.0/24 -j REJECT ipchains -A input -i eth0 -d 192.158.1.0/24 -j REJECT ipchains -A output -i eth0 -d 12.6.178.250/32 -j ACCEPT ipchains -A forward -i eth0 -s 192.168.1.0/24 -j MASQ


  1. Packets destined for 12.6.178.250 will be routed to the correct host.

  2. Packets destined for 192.158.1.0/24 will not be allowed into the system or routed.

  3. Packets to be forwarded from 192.168.1.0/24 will appear to come from the local host.

  4. Packets coming from 192.158.1.0/24 will be forwarded to the local host.


Answer: D


QUESTION: 47

Which of the following programs can be used to perform integrity checks on important system files that do not change often?


  1. PGP

  2. SAINT

  3. SATAN

  4. Big Brother

  5. Tripwire


Answer: E


QUESTION: 48

A system administrator is having trouble getting a new client to successfully mount a remote NFS file system. The other hosts on the network can successfully mount the file system. Which of the following options could cause this problem? (Choose two.)


  1. The directory is exported as read/write and the client is mounting it read-only.

  2. The system administrator did not run the exportfs command on the server.

  3. There is no entry for the client in the server's /etc/exports file.

  4. The portmapper port has been closed on the server.

  5. There is no entry for the server in the client's /etc/imports file.


Answer: B, C


QUESTION: 49

The NFS server is experiencing intermittent power disruptions. Each time the server goes down, the program requesting NFS data exits abnormally. This is probably caused by which of the following?


  1. A secondary NIS server on the subnet

  2. NIS being used instead of NIS+


  3. A kernel before 2.1 being used on the server

  4. Improper values for RSIZE and WSIZE in /etc/fstab

  5. Using Soft mounting on the client


Answer: E


QUESTION: 50

Brad, the system administrator, wants to verify that DNS is functioning properly. In order to do this, he points his browser to a high-traffic Web site that he and other employees in the company visit frequently (www.google.com). The Web browser loads the appropriate page for Brad. From this test, Brad concludes that DNS is working properly. Which of the following is TRUE concerning Brad's testing method?


  1. In addition to what he has already done, Brad needs to run the "named" program on his machine in order to get an authoritative response from the name server.

  2. Instead of using a Web browser, Brad should have used the command "ping www.google.com"; ICMP packets are more reliable for name server resolutions.

  3. The test that Brad performed guarantees that DNS is working properly.

  4. If the name server has www.google.com in its cache, then the test does not necessarily prove that DNS is working properly.


Answer: D


image

6$03/( 48(67,216


7KHVH TXHVWLRQV DUH IRU GHPR SXUSRVH RQO\ )XOO YHUVLRQ LV XS WR GDWH DQG FRQWDLQV DFWXDO TXHVWLRQV DQG DQVZHUV


.LOOH[DPV FRP LV DQ RQOLQH SODWIRUP WKDW RIIHUV D ZLGH UDQJH RI VHUYLFHV UHODWHG WR FHUWLILFDWLRQ H[DP SUHSDUDWLRQ 7KH SODWIRUP SURYLGHV DFWXDO TXHVWLRQV H[DP GXPSV DQG SUDFWLFH WHVWV WR KHOS LQGLYLGXDOV SUHSDUH IRU YDULRXV FHUWLILFDWLRQ H[DPV ZLWK FRQILGHQFH +HUH DUH VRPH NH\ IHDWXUHV DQG VHUYLFHV RIIHUHG E\ .LOOH[DPV FRP


$FWXDO ([DP 4XHVWLRQV .LOOH[DPV FRP SURYLGHV DFWXDO H[DP TXHVWLRQV WKDW DUH H[SHULHQFHG LQ WHVW FHQWHUV 7KHVH TXHVWLRQV DUH XSGDWHG UHJXODUO\ WR HQVXUH WKH\ DUH XS WR GDWH DQG UHOHYDQW WR WKH ODWHVW H[DP V\OODEXV %\ VWXG\LQJ WKHVH DFWXDO TXHVWLRQV FDQGLGDWHV FDQ IDPLOLDUL]H WKHPVHOYHV ZLWK WKH FRQWHQW DQG IRUPDW RI WKH UHDO H[DP


([DP 'XPSV .LOOH[DPV FRP RIIHUV H[DP GXPSV LQ 3') IRUPDW 7KHVH GXPSV FRQWDLQ D FRPSUHKHQVLYH FROOHFWLRQ RI TXHVWLRQV DQG DQVZHUV WKDW FRYHU WKH H[DP WRSLFV %\ XVLQJ WKHVH GXPSV FDQGLGDWHV FDQ HQKDQFH WKHLU NQRZOHGJH DQG LPSURYH WKHLU FKDQFHV RI VXFFHVV LQ WKH FHUWLILFDWLRQ H[DP


3UDFWLFH 7HVWV .LOOH[DPV FRP SURYLGHV SUDFWLFH WHVWV WKURXJK WKHLU GHVNWRS 9&( H[DP VLPXODWRU DQG RQOLQH WHVW HQJLQH 7KHVH SUDFWLFH WHVWV VLPXODWH WKH UHDO H[DP HQYLURQPHQW DQG KHOS FDQGLGDWHV DVVHVV WKHLU UHDGLQHVV IRU WKH DFWXDO H[DP 7KH SUDFWLFH WHVWV FRYHU D ZLGH UDQJH RI TXHVWLRQV DQG HQDEOH FDQGLGDWHV WR LGHQWLI\ WKHLU VWUHQJWKV DQG ZHDNQHVVHV


*XDUDQWHHG 6XFFHVV .LOOH[DPV FRP RIIHUV D VXFFHVV JXDUDQWHH ZLWK WKHLU H[DP GXPSV 7KH\ FODLP WKDW E\ XVLQJ WKHLU PDWHULDOV FDQGLGDWHV ZLOO SDVV WKHLU H[DPV RQ WKH ILUVW DWWHPSW RU WKH\ ZLOO UHIXQG WKH SXUFKDVH SULFH 7KLV JXDUDQWHH SURYLGHV DVVXUDQFH DQG FRQILGHQFH WR LQGLYLGXDOV SUHSDULQJ IRU FHUWLILFDWLRQ H[DPV


8SGDWHG &RQWHQW .LOOH[DPV FRP UHJXODUO\ XSGDWHV LWV TXHVWLRQ EDQN DQG H[DP GXPSV WR HQVXUH WKDW WKH\ DUH FXUUHQW DQG UHIOHFW WKH ODWHVW FKDQJHV LQ WKH H[DP V\OODEXV 7KLV KHOSV FDQGLGDWHV VWD\ XS WR GDWH ZLWK WKH H[DP FRQWHQW DQG LQFUHDVHV WKHLU FKDQFHV RI VXFFHVV


7HFKQLFDO 6XSSRUW .LOOH[DPV FRP SURYLGHV IUHH [ WHFKQLFDO VXSSRUW WR DVVLVW FDQGLGDWHV ZLWK DQ\ TXHULHV RU LVVXHV WKH\ PD\ HQFRXQWHU ZKLOH XVLQJ WKHLU VHUYLFHV 7KHLU FHUWLILHG H[SHUWV DUH DYDLODEOH WR SURYLGH JXLGDQFH DQG KHOS FDQGLGDWHV WKURXJKRXW WKHLU H[DP SUHSDUDWLRQ MRXUQH\


'PS .PSF FYBNT WJTJU IUUQT LJMMFYBNT DPN WFOEPST FYBN MJTU

.LOO \RXU H[DP DW )LUVW $WWHPSW *XDUDQWHHG