Latest 3X0-201 Practice Tests with Actual Questions

Get Complete pool of questions with Premium PDF and Test Engine

Exam Code : 3X0-201
Exam Name : Core Concepts and Practices (Level 2)
Vendor Name : "Sair"







3X0-201 Dumps

3X0-201 Braindumps 3X0-201 Real Questions 3X0-201 Practice Test

3X0-201 Actual Questions


killexams.com


Sair


3X0-201


Core Concepts and Practices (Level 2)


https://killexams.com/pass4sure/exam-detail/3X0-201



Question: 40

After creating a recovery file system and building a kernel for the recovery disk, which command will directly copy the kernel to the floppy /dev/fd0?


  1. cp if=KERNEL of=/dev/fd0

  2. cp -b if=/dev/fd0 of=KERNEL bs=10k

  3. rawrite of=KERNEL if=/dev/fd0 bs=1k

  4. dd if=KERNEL of=/dev/fd0 bs=1k




Answer: D



Question: 41

Which of the following is a task that the netstat command can perform?


  1. It determines where on a network a packet is dropped.

  2. It prints the individual packet status of a network.

  3. It measures the baud rate between two machines.

  4. It lists all current connections on a particular machine.

  5. It monitors the number of collisions on a network.




Answer: D



Question: 42

Which of the following tasks does the netperf command perform?


  1. It monitors the traffic on a network.

  2. It measures the number of packets traveling over an entire network with multiple machines.

  3. It measures the baud rate between two machines.

  4. It monitors the number of collisions on a network.

  5. It changes the precedence of given packets over a network.




Answer: C



Question: 43

Betsy wants to build a more sophisticated ipchains rule set for her firewall by adding a user-defined rule list. This customized rule list will be a single chain that will provide the highest level of security to the protected network. What is the minimum number of chains in Betsy's firewall?


  1. One

  2. Two

  3. Three

  4. Four




Answer: D



Question: 44

Jim needs to put a new application on his machine, but he is not sure exactly how much hard drive space he has left on his machine. Which of the following commands will show Jim how much space he has left on his drive?


  1. du

  2. df

  3. hdparm

  4. fdisk




Answer: B



Question: 45

An administrator needs to implement specialized packet alteration beyond the usual scope of iptables filtering. Which of the following iptables rulesets will the administrator need to customize to accomplish this goal?


  1. filter

  2. custom

  3. nat

  4. mangle




Answer: D



Question: 46

Lisa has recently implemented a series of ipchains rules to secure a Local Area Network (LAN). She is doing maintenance on the rule sets and has entered the sequence of commands below. Which of the following statements does NOT describe a result of the appended rules?

ipchains -A input -i eth0 -s 192.168.1.0/24 -j ACCEPT ipchains -A output -i eth0 -s 192.168.1.0/24 -j REJECT ipchains -A input -i eth0 -d 192.158.1.0/24 -j REJECT ipchains -A output -i eth0 -d 12.6.178.250/32 -j ACCEPT ipchains -A forward -i eth0 -s 192.168.1.0/24 -j MASQ


  1. Packets destined for 12.6.178.250 will be routed to the correct host.

  2. Packets destined for 192.158.1.0/24 will not be allowed into the system or routed.

  3. Packets to be forwarded from 192.168.1.0/24 will appear to come from the local host.

  4. Packets coming from 192.158.1.0/24 will be forwarded to the local host.




Answer: D



Question: 47

Which of the following programs can be used to perform integrity checks on important system files that do not change often?


  1. PGP

  2. SAINT

  3. SATAN

  4. Big Brother

  5. Tripwire




Answer: E



Question: 48

A system administrator is having trouble getting a new client to successfully mount a remote NFS file system. The other hosts on the network can successfully mount the file system. Which of the following options could cause this problem? (Choose two.)


  1. The directory is exported as read/write and the client is mounting it read-only.

  2. The system administrator did not run the exportfs command on the server.

  3. There is no entry for the client in the server's /etc/exports file.

  4. The portmapper port has been closed on the server.

  5. There is no entry for the server in the client's /etc/imports file.




Answer: B, C



Question: 49

The NFS server is experiencing intermittent power disruptions. Each time the server goes down, the program requesting NFS data exits abnormally. This is probably caused by which of the following?


  1. A secondary NIS server on the subnet

  2. NIS being used instead of NIS+


  3. A kernel before 2.1 being used on the server

  4. Improper values for RSIZE and WSIZE in /etc/fstab

  5. Using Soft mounting on the client




Answer: E



Question: 50

Brad, the system administrator, wants to verify that DNS is functioning properly. In order to do this, he points his browser to a high-traffic Web site that he and other employees in the company visit frequently (www.google.com). The Web browser loads the appropriate page for Brad. From this test, Brad concludes that DNS is working properly. Which of the following is TRUE concerning Brad's testing method?


  1. In addition to what he has already done, Brad needs to run the "named" program on his machine in order to get an authoritative response from the name server.

  2. Instead of using a Web browser, Brad should have used the command "ping www.google.com"; ICMP packets are more reliable for name server resolutions.

  3. The test that Brad performed guarantees that DNS is working properly.

  4. If the name server has www.google.com in its cache, then the test does not necessarily prove that DNS is working properly.




Answer: D