Exam Code : 3X0-201
Exam Name : Core Concepts and Practices (Level 2)
Vendor Name :
"Sair"
3X0-201 Dumps
3X0-201 Braindumps 3X0-201 Real Questions 3X0-201 Practice Test
3X0-201 Actual Questions
killexams.com
Core Concepts and Practices (Level 2)
https://killexams.com/pass4sure/exam-detail/3X0-201
After creating a recovery file system and building a kernel for the recovery disk, which command will directly copy the kernel to the floppy /dev/fd0?
cp if=KERNEL of=/dev/fd0
cp -b if=/dev/fd0 of=KERNEL bs=10k
rawrite of=KERNEL if=/dev/fd0 bs=1k
dd if=KERNEL of=/dev/fd0 bs=1k
Which of the following is a task that the netstat command can perform?
It determines where on a network a packet is dropped.
It prints the individual packet status of a network.
It measures the baud rate between two machines.
It lists all current connections on a particular machine.
It monitors the number of collisions on a network.
Which of the following tasks does the netperf command perform?
It monitors the traffic on a network.
It measures the number of packets traveling over an entire network with multiple machines.
It measures the baud rate between two machines.
It monitors the number of collisions on a network.
It changes the precedence of given packets over a network.
Betsy wants to build a more sophisticated ipchains rule set for her firewall by adding a user-defined rule list. This customized rule list will be a single chain that will provide the highest level of security to the protected network. What is the minimum number of chains in Betsy's firewall?
One
Two
Three
Four
Jim needs to put a new application on his machine, but he is not sure exactly how much hard drive space he has left on his machine. Which of the following commands will show Jim how much space he has left on his drive?
du
df
hdparm
fdisk
An administrator needs to implement specialized packet alteration beyond the usual scope of iptables filtering. Which of the following iptables rulesets will the administrator need to customize to accomplish this goal?
filter
custom
nat
mangle
Lisa has recently implemented a series of ipchains rules to secure a Local Area Network (LAN). She is doing maintenance on the rule sets and has entered the sequence of commands below. Which of the following statements does NOT describe a result of the appended rules?
ipchains -A input -i eth0 -s 192.168.1.0/24 -j ACCEPT ipchains -A output -i eth0 -s 192.168.1.0/24 -j REJECT ipchains -A input -i eth0 -d 192.158.1.0/24 -j REJECT ipchains -A output -i eth0 -d 12.6.178.250/32 -j ACCEPT ipchains -A forward -i eth0 -s 192.168.1.0/24 -j MASQ
Packets destined for 12.6.178.250 will be routed to the correct host.
Packets destined for 192.158.1.0/24 will not be allowed into the system or routed.
Packets to be forwarded from 192.168.1.0/24 will appear to come from the local host.
Packets coming from 192.158.1.0/24 will be forwarded to the local host.
Which of the following programs can be used to perform integrity checks on important system files that do not change often?
PGP
SAINT
SATAN
Big Brother
Tripwire
A system administrator is having trouble getting a new client to successfully mount a remote NFS file system. The other hosts on the network can successfully mount the file system. Which of the following options could cause this problem? (Choose two.)
The directory is exported as read/write and the client is mounting it read-only.
The system administrator did not run the exportfs command on the server.
There is no entry for the client in the server's /etc/exports file.
The portmapper port has been closed on the server.
There is no entry for the server in the client's /etc/imports file.
The NFS server is experiencing intermittent power disruptions. Each time the server goes down, the program requesting NFS data exits abnormally. This is probably caused by which of the following?
A secondary NIS server on the subnet
NIS being used instead of NIS+
A kernel before 2.1 being used on the server
Improper values for RSIZE and WSIZE in /etc/fstab
Using Soft mounting on the client
Brad, the system administrator, wants to verify that DNS is functioning properly. In order to do this, he points his browser to a high-traffic Web site that he and other employees in the company visit frequently (www.google.com). The Web browser loads the appropriate page for Brad. From this test, Brad concludes that DNS is working properly. Which of the following is TRUE concerning Brad's testing method?
In addition to what he has already done, Brad needs to run the "named" program on his machine in order to get an authoritative response from the name server.
Instead of using a Web browser, Brad should have used the command "ping www.google.com"; ICMP packets are more reliable for name server resolutions.
The test that Brad performed guarantees that DNS is working properly.
If the name server has www.google.com in its cache, then the test does not necessarily prove that DNS is working properly.