Selasa, 30 Maret 2010

modul 9

1.You have decided to install your new Linux distribution by using the bootable CD that came with it. What must be configured before you can boot from the CD?
CMOS
NVRAM
*BIOS
Hard drive

2. You are installing RedHat 7.2 and have decided to use the installation class called "Workstation". Which of the following packages will not be installed? (Select two.)
X Windows
*Telnet daemon
*HTTP daemon
Vi editor
Sendmail daemon
Browser

3. Which of the following would be standard file system types that Linux would use during an installation? (Select two.)
NTFS
FAT16
FAT32
*ext2
*ext3
VFAT

4. You have formatted a drive while doing a Linux installation for a production server. The formatting revealed that there were several bad blocks. You see that the bad blocks make up about four percent of the total disk. Which of the following would be the best course of action?
reformat the drive with a high level format
reformat the drive with a low level format
*replace the drive
mark the blocks as "bad" and continue the installation

5. You would like to perform a high-level format on a hard disk. Which of the following Linux commands will accomplish this?
format
fdformat
hformat
*mkfs
mkhfs

6. You have tried to install a particular RedHat package but it keeps telling you that it has a "failed dependency". What would cause this error?
The package depends on certain user input.
The package depends on operating system input.
*The package depends on another package being installed.
The package depends on hardware that is not present in the computer.

7. When is the root account typically created in Linux?
at first login
*during NOS installation
when configuring NOS user accounts
after user accounts are created

8. Which statement correctly describes shadow passwords?
They allow users to have two different passwords.
They are stored in encrypted form in /etc/passwd.
They are stored in encrypted form in a file all users can read.
*They are stored in a file which is not accessible by all users.

9. Which term describes the Linux superuser account?
sys
*root
power user
wheel
daemon

10. Where, on a Linux server, would you find the main password file that is readable by any logged-in user?
/etc/password
/etc/shadow
*/etc/passwd
/var/password
/var/passwd

11. You are setting up a Linux workstation and you would like it to automatically get all of the correct IP settings as soon as it boots. Which protocol should you set the workstation to use to accomplish this?
DNS
ARP
*DHCP
NetBEUI
Default Gateway

12. Which of the following are valid boot loader options for most Linux installations? (Select two.)
Boot.ini
Autoexec.bat
*LILO
*GRUB
Loadlite
RPM Loader

13. Which of the following can be set within the LILO configuration file?
an option to ask for a DNS server
*an option to clear the /tmp directory at boot
an option to boot to runlevel 5
an option to use DHCP

14. You have successfully installed your Linux server but notice that it only seems to be using 64 megabytes of RAM. You know that there are actually 128 megabytes of RAM in the server. How can you force Linux to use the full 128 megabytes of RAM?
adjust the RAM setting in the BIOS
create a file called SYSRAM in /etc
*put the actual amount of RAM in the LILO configuration file
manually enter the amount of RAM in the /dev directory

15. What is the name of the X Windows package that is supplied with most distributions of Linux?
X Windows
*Xfree86
Xfree386
Xlib86
Xlib386

16. You have successfully installed your Linux workstation complete with working X Windows. However, your supervisor tells you that you should check for a new video driver. Why might you want to do this?
RedHat writes their own video drivers but factory ones are better.
*The manufacturer may have improved the performance with new drivers.
Specific video drivers are not included on the distribution disks.
All of the video drivers on the distribution disks are limited to 800 x 600 resolution.


17. You are installing X Windows on your RedHat server. Which command would be similar to what you would need to type at the command prompt in order to install X Windows?
dpkg -i xserver-xfree86_4.0.2-7_i386.deb
install -UvH X-Windows_4.0.2-7_i386
*rpm -Uvh XFree86-server-4.0.2-11.i386.rpm
tarrpm -Uvh XFree86-server-4.0.2-11.i386.tar

18. Where would the driver files for Xfree86 be stored?
/etc/X11R6/lib/modules/drivers
*/usr/X11R6/lib/modules/drivers
/var/X11R6/lib/modules/drivers
/dev/X11R6/lib/modules/drivers

19. Which command will terminate an X Windows session and present the user with a text mode login prompt?
Xend
init 5
*telinit 3
xstop 3
telinit 5
stopx

20. You have installed X Windows version 4.0.x and it will not work. Which of the following could be used to reconfigure it? (Select two.)
Xf86cfg
Xf86setup
Xf86config
*Xconfigurator
*XFree86

21. Focus-follows-mouse and click-to-focus are two types of focus models. Which software would be responsible for configuring an X Windows installation to use one of these models?
desktop environment
environment variables
*windows manager
mouse driver

22.You would like to install the samba program on your Linux machine. You have located the file samba-2.0.7.tar.gz. Which command should you use to completely unpack the files in this package?
gunzip samba-2.0.7.tar.gz
tar -xvf samba-2.0.7.tar.gz
*tar -xvzf samba-2.0.7.tar.gz
gunzip -xvf samba-2.0.7.tar.gz

23. You are examining lilo.conf and see a line that says "prompt". What will this command prompt a user for?
a password
*an operating system
a username
boot parameters
modul 8

1. Which account, created during installation, allows someone to manage the Windows 2000 NOS?
Manager
Supervisor
*Administrator
SuperUser

2. When installing Windows 2000 Professional on a new machine, what must you do to boot from the CD?
Nothing, it will automatically boot from the CD.
Select the correct install device option from the menu.
*Enter the CMOS setup and set the boot sequence to boot from the CD-ROM drive first.
Insert the Windows 2000 CD in the CD-ROM drive and press Enter.

3. In a Windows 2000 environment, which key combination is used to enable the Windows logon window?
Alt+Shift+Enter
Ctrl+Shift+Delete
*Ctrl+Alt+Delete
Ctrl+Alt+Enter

4. When entered in the Run box, which command will launch the Windows 2000 CLI?
doskey
cli
*cmd
msdos

5. Which key combination, when executed in the Windows 2000 CLI, will display the command interpreter window in full screen mode?
Shift+Enter
Ctrl+Enter
*Alt+Enter
Delete+Enter

6. Which Windows tool provides administrators with an easy way to view or navigate a file system?
Internet Explorer
*Windows Explorer
WinNT Explorer
File Explorer

7. What is the purpose of the user's full name in the New User account box?
*It is informational only.
It authenticates the username.
It allows the user to logon.
It matches the user to permissions.

8. In Windows 2000, which of the following is a required field when creating a new user account?
the full name
the password
*the user name
the description

9. Which Windows 2000 Administrative Tools submenu provides configuration options for storage, shared resources, hardware devices, and other key components?
Component Services
Configure Your Server
*Computer Management
Server Extensions Administrator

10. In Windows 2000, what is the best way to restore a deleted user account?
Select undelete from the popup menu.
Create a new account with the same user name.
Select undo from the Edit menu.
*Delete cannot be undone.


11. What is the proper way to shut down Windows?
Push the power off button.
Open a DOS window and enter the shut down command.
*Choose Shut Down from the Start menu.
Log off, then push the power off button.

12. The network administrator needs to setup a new user account. After clicking on Start --> Programs --> Administrative Tools, which menu option from Administrative Tools should be selected to complete the task?
Event Viewer
Performance
Local Security Policy
*Computer Management

13. All of the following groups can be created in Windows 2000 except:
local groups
global groups
domain local groups
*domain global groups

14. In the graphic, which type of permissions are being set?
share
domain
*NTFS
FAT32

15. What are the most basic user-related security tools available to an administrator?
logons, permissions
permissions, groups
*permissions, passwords
passwords, logons

16. Where does the address http://127.0.0.1 point?
to the closest web server
*to the local host
to the nearest DNS server
to the local intranet

17. In Windows 2000, what is the name of the HTTP web service located in the Administrative tools menu?
Default FTP site
*Default Web site
Default Web service
Default Internet Information Service

18. In the Windows 2000 NOS, which tools must be loaded to run FTP services?
FTP Services
Network Services
*Internet Information Services
Site Services

19. What must occur for a user to telnet to a Windows 2000 machine?
The Telnet client must be configured on the Windows 2000 machine.
*The user must have a valid user account on the Windows 2000 machine.
The Telnet service must be stopped on the Windows 2000 machine.
The user must physically be at the Windows 2000 machine.

20. Which Start Menu item would the administrator choose to configure Telnet services in Windows 2000?
Programs > Administrative Tools > Telnet Client
Programs> System tools > Administration > Telnet
*Programs > Administrative Tools > Telnet Server Administration
Programs > Accessories > System Administration > Telnet Server

21. In Windows 2000, which command terminates a Telnet session?
end
*exit
bye
logout

22. What is the default authentication method for Windows 2000 Telnet sessions?
NTFS
*NTLM
clear text
security access method

23. What is meant by the "store-and-forward" nature of e-mail?
All messages are automatically stored on the server until the recipient forwards them to another user's account.
*The recipients do not need to be present when an e-mail is delivered to their account.
The recipients receive e-mail messages on the server and then must forward them to their personal e-mail accounts.
The recipients must be present to receive and store their messages.

24. What should a Windows 2000 administrator do to restrict Telnet access to specific users?
Start the Telnet service.
Change user permissions to include Telnet.
List user names in the file telnet.ini.
*Create a Telnet Client group.

25. Which component of Windows 2000 accommodates many types of scripting languages?
VBScript
JScript
*WSH
ShellScript

Senin, 29 Maret 2010

modul 7

1. Which of the following is an advantage of getting a device with a pre-installed NOS or OS?
*It is optimized for the particular hardware installed.
It compounds the need for a complex installation process.
It does not support custom and legacy applications.
It completes configuration of server-specific features.

2. Which task should be performed before installing a NOS?
Change the system hardware and peripherals before beginning.
*Verify that the NOS supports all application software that will run on the server.
Run the evaluator software prior to loading to establish hardware settings.
Be familiar with the NOS so configuration questions can be ignored.

3. Most NOSs will only run on certain hardware configurations. There are typically 4 key elements of the system's hardware that must meet the minimum requirements of the NOS. Choose the list that contains these elements.

1. CPU speed, RAM, NIC, hard disk space.
2. CPU type, CPU speed, RAM, hard disk space.
3. CPU type, RAM, NIC, CD ROM drive.
4. CPU type, RAM, CPU speed, CD ROM drive.

1
*2
3
4

4. What is the best source of information for the latest hardware compatibility list?
*the World Wide Web
a hardware manual
a software manual
the CD-ROM Read Me document

5. Which Windows utility can be used to perform a hardware inventory?
Administrative Tools
ScanDisk
Windows Explorer
*Device Manager

6. The ping command is used to test network connectivity. What is the best IP address to ping for this test?
the DNS address
the loopback address
the local NIC address
*the default gateway address

7. When preparing for a CD-ROM based NOS installation, which BIOS setting is important to the system administrator?
Boot Up Floppy Seek: Enabled
Swap Floppy Drive: Disabled
*Boot Sequence: CD-ROM, C
Quick Power On Self Test: Enabled

8. All of the following are functions of an installation program except:
*ensure interoperability of components
request user input for configuration information
provide a default set of configuration options
simplify the installation process

9. What are logical divisions on a hard disk called?
*partitions
sectors
divisions
cylinders

10. How is the root partition identified in Linux?
?
Root
/root
*/

11. When setting up a hard disk, what are the three possible types of partitions?
primary, secondary, and logical
*primary, logical, and extended
C, D, and E
boot, program, and data

12. In Windows 9x and Linux, why is it important to keep a startup floppy containing the MBR?
The startup floppy disk with the MBR must be used to boot from multiple partitions.
*The floppy disk can be used to boot the system if the MBR on the first sector of the hard disk is corrupt.
The MBR on the floppy keeps an error log for troubleshooting purposes.
The startup floppy disk with MBR defines the size of partitions on startup.

13. A DOS-type partition table can describe how many primary partitions?
one
two
*four
eight

14. What is the maximum number of extended partitions supported in any partitioning scheme?
*one
two
four
eight

15. What is the first sector of a hard drive called on systems that use DOS-type partitioning?
partition table
drive C
swap space
*MBR

16. What is virtual memory?
logical RAM that is created during installation
memory that is installed on the logic board
memory that can only be used by high-end programs
*hard disk space that is used to supplement RAM

17. UNIX systems typically dedicate an entire partition to virtual memory. What is this partition called?
the RAM partition
*the swap partition
the page partition
the memory partition

18. What are valid file systems for a UNIX or Linux partition?
EXT1 and EXT2
*EXT3 and UFS
UFS and EXT1
LFS and EXT2

19. What are the default names of the administrative accounts on a Windows and UNIX NOS, respectively?
root, Administrator
Admin, root
*Administrator, root
root, Admin

20. What is the maximum number of primary partitions allowed in a Sun-type partition table?
one
two
four
*eight

21. When a computer is turned on, what is the first step every computer will do regardless of the operating system?
Boot
RAM
*POST
SCSI

22. In Windows 2000, which file is only used when the computer is set up to dual-boot?
*BOOTSECT.DOS
NTDETECT.COM
NTLDR
BOOT.INI
modul 6

1. What are Network Operating Systems designed to do?
*share resources across a network with multiple users
remotely control other computers on the network
access and control the local hard disk
run stand-alone computers that are not LAN capable

2. A user account on a server enables the server to do which of the following?
automatically download appropriate applications and print queues to that user
*authenticate that user and allocate those resources the user is allowed to access
assign a specific IP and MAC address to the user's workstation
assign the user to a specific domain and user group

3. What are two benefits of having more than one processor in a system?
support for remote locations and automatic job queuing
*faster speeds and increased work capacity
reduced need for IP addresses and decreased boot time
reduced need for IP addresses and increased manageability

4. How is redundancy built into a server system?
*by including additional hardware components that can take over if other components fail
by including a tape back-up system to preserve data
by adding redundancy software to the system
by keeping duplicates of all data

5. What are two important features provided by security on a NOS?
*authentication and encryption
reliable performance and account management
virus protection and prevention from spamming
processor balance and sustained work load

6. Which of the following are Network Operating Systems?
Linux, Windows 2000, Windows 98
Windows 2000, Windows 98, Novell NetWare
*Novell NetWare, Linux, Windows 2000
Novell NetWare, Linux, Windows 98

7. In a Windows NT environment, what is the meaning of the term domain?
a dedicated server containing the database of all IP and MAC addresses on the network
a group of computers located in a specific physical or geographic region
the OU that contains all user accounts
*groups of computers, users, and resources that form an administrative boundary

8. How many Primary Domain Controllers (PDCs) are allowed in a Windows NT environment?
*1
2
4
9

9. In Windows 2000, administrative tasks are accomplished using the Microsoft Management Console. Which type of module does this tool require for specific administrative functions?
plug-in
add-on
*snap-in
clip-on

10. Windows 2000 Professional supports plug-and-play technology. What is one of the major advantages of this technology?
An administrator can add devices from any manufacturer to the system and they will work.
Devices no longer need software drivers to interact with the system.
Components will interact with the system if plugged in prior to system boot.
*An administrator or user can easily add components to the system without manual configuration.

11. Which type of authentication security does Windows 2000 Professional support?
Secure Socket Layer
*Kerberos
Samba
Apache

12.How many simultaneous connections does Windows 2000 Professional support?
3
*10
40
25

13.What is the primary intended use of Windows 2000 Professional?
FTP server
enterprise network server
DNS server
*client-side OS

14. In Windows 2000 Server, what is the function of symmetric multiprocessing?
*It allows multiple processors to work together to share the workload in a computer.
It provides for redundancy of data over multiple processors to prevent data loss.
It assures that each processor in the server works on the same projects simultaneously.
It monitors the processors for errors, performance levels, and queued jobs to ensure quality.

15. Windows .NET Server is tailored to provide what types of services?
reliable application and database services
*reliable web and FTP services
remote access and application services
IPSec and remote access services

16. Which of the following is open source?
all versions of UNIX
Windows 2000
all versions of NetWare
*Linux

17. Which of the following criteria must software meet in order to display the Open Source Initiative trademark?
It must be easily altered and adapted to all major operating systems and source code must be limited.
It must be compatible with third party add-ons and use standard source code.
It must be provided in multiple languages and cost must be minimal.
*It must be freely distributed without restriction and the source code must be available.

18. Which Linux distribution was built solely for nonprofit uses?
*Debian GNU/Linux
Caldera eDesktop and eServer
SuSE Linux
LinuxPPC

19. Which program, running on a Linux server, allows Windows-based clients to see the Linux file system without installing client software?
NFS
Apache
*Samba
KDE

20. Which client/server file system is used by most varieties of Linux file servers?
FAT32
*NFS
NT
SMB

21. What are two popular Desktop Environments that run on Linux?
*GNOME and KDE
Apache and Samba
Xfree86 and GNOME
Apache and KDE

22. What is the name of a mail server software package that is popular in Linux distributions?
POP
SMTP
Postoffice
*Sendmail