REAL QUESTIONS SUBMIT MATERIAL ADVERTISE
Braindumps

Microsoft

Cisco

Citrix

CIW

CompTia

CWNA

Apple

Adobe

HP

Legato

Exin

Filemaker

Brocade

Ericsson

TIA

Veritas

ISEB

SCP

IISFA

ISM

OMG

Apc

Mile2

Foundry

Huawei

McData

Symantec

TeraData

RedHat

Solar Winds

Blue Coat

Riverbed

 

 
 
Click on name of dumper to view the dump
 
Ingeborg
 
 

 

Braindumps of 117-201
Linux Advanced Administration

Exam Questions, Answers, Braindumps (117-201)

These are Guaranteed Questions for Linux Advanced Administration exam. I only used www.exams.ws guide and i was through.

QUESTION NO: 1
Which two utilities can you use to set up a job to run at a specified time?
A. at and crond
B. atrun and crontab
C. at and crontab
D. atd and crond
Answer: C
Explanation: The ‘at’ command is used to execute commands at a specified time and optional date.
A cron job is a program or script scheduled at a specified time. The ‘crontab’ program is used to create user cron jobs.
Reference: http://www.oreillynet.com/linux/cmd/a/at.html
http://www.oreillynet.com/linux/cmd/c/crontab.html
Incorrect Answers.
A: The Cron daemon (crond) is the program that runs the cron job at the specified time. It is not used to set up a cron job.
B: Atrun is used to run jobs scheduled by the ‘at’ program. It is not used to set up a job to run at a specified time.
D: Atd is the ‘at’ deamon. Similar to the cron daemon, it is the program that runs the jobs scheduled with the ‘at’ command.
QUESTION NO: 2
After creating a backup of the users home directories called backup.cpio you are asked to restore a file called memo.ben. What command should you type?
Answer: cpio –iF backup.cpio memo.ben
Explanation: The ‘cpio’ command is used to create backups or restore files from a backup. The –i option is to extract something. The F option is to specify a file. Here we are extracting memo.ben from a file named backup.cpio.
Reference: http://www.oreillynet.com/linux/cmd/c/cpio.html
QUESTION NO: 3
You wish to restore the file memo.ben which was backed up in the tarfile MyBackup.tar. What command should you type?.- 4 -
Answer: tar xf MyBackup.tar memo.ben
Explanation: Tarfiles are created using the ‘tar’ utility. Therefore, you should use the ‘tar’ utility to extract the files. The x option is to extract and the f option is to specify a filename to extract from.
Reference: http://www.oreillynet.com/linux/cmd/t/tar.html
QUESTION NO: 4
When is the most important time to restore a file from your backup?
A. On a regular scheduled basis to verify that the data is available.
B. When the system crashes.
C. When a user inadvertently loses a file.
D. When your boss asks to see how restoring a file works.
Answer: A
Explanation: According to ‘best practice’, you should regularly restore files to verify that your backup procedures are working. It’s no good backing up files regularly if you are unable to restore files when needed.
Incorrect Answers:
B: When the system crashes, you may need to restore your whole system. However, this shouldn’t be the only time you restore files.
C: When a user loses a file, it will need to be restored. However, you should prepare for this eventuality by regularly testing your backup/restore process to ensure you are able to restore a file when needed.
D: When your boss asks to see how restoring a file works, you want it to work when you show him. This is why you should test your backup/restore processes.
QUESTION NO: 5
Which one of the following factors does not play a role in choosing the type of backup media to use?
A. How frequently a file changes.
B. How long you need to retain the backup.
C. How much data needs to be backed up.
D. How frequently the backed up data needs to be accessed.
Answer: A
Explanation: Your choice of backup media will depend on its capacity, its shelf life and the time it takes to access the data. The frequency of file changes is irrelevant.
Incorrect Answers:
B: Different backup media can be kept for varying periods of time. You should find out from the manufacturers how long a backup media can be kept without losing its data.
C: Obviously, your choice of backup media will depend on the amount of data to be backed up. For example, a CD-ROM can hold around 700MB of data while tapes can hold up to hundreds of gigabytes of data.
D: Your choice of backup media will also depend on the time it takes to retrieve data from the media.
Reading data from a CD-ROM or DVD is much quicker than reading data from a tape.
QUESTION NO: 6
You attempt to log out but receive an error message that you cannot. When you issue the jobs command, you see a process that is running in the background. How can you fix thus so that you can logout?
A. Issue the kill command with the PID of each running command of the pipeline as an argument.
B. Issue the kill command with the job number as an argument.
C. Issue the kill command with the PID of the last command as an argument.
D. Issue the kill command without any arguments.
Answer: C
Explanation: The kill command is used to send a signal to kill one or more process IDs. You must own the process or be a privileged user, otherwise the kill command will be ignored.
Reference: http://www.oreillynet.com/linux/cmd/k/kill.html
Incorrect Answers
A: You need to end the background process. You know its process ID; therefore you should issue the process ID with the kill command to kill the appropriate process.
B: You cannot use the job number with the kill command. You should use the process ID or process name.
D: The kill command won’t work if it doesn’t know what process you want it to kill.
QUESTION NO: 7
The top utility can be used to change the priority of a running process? Another utility that can also be used to change priority is_______?
Answer: nice
Explanation: The ‘nice’ command enables you to run a command with a different priority. Nice –n <adjustment> command, increments the priority of ‘command’ by <adjustment>. You can increase the priority of a command my specifying a negative adjustment. For example, ‘nice –n-5 command’ will run ‘command’ with the priority increased by 5.
Reference: http://www.oreillynet.com/linux/cmd/n/nice.html.- 6 -
QUESTION NO: 8
You need to search the entire directory structure to locate a specific file. How could you do this and still be able to run other commands while the find command is still searching for you file?
A. find / -name filename &
B. find / -name filename
C. bg find / -name filename
D. &find / -name filename &
Answer: A
Explanation: The find command is used to locate files. / is the root directory, so searching from / will search the entire directory tree. The –name <filename> enables you to search for a file named <filename>.
The ampersand character (&) is used to return control of the shell returning you to the command prompt, without have to wait for the command to execute.
Reference: http://www.oreillynet.com/linux/cmd/f/find.html
Incorrect Answers
B: With no ampersand (&) following the command, you will not be able to run other commands until the find command has completed its search.
C: The bg command is used to run a suspended job in the background if job control is enabled. However, the program or command would have to started and then suspended for this to work.
D: The ampersand (&) must follow the command, not precede it.

117-201


 

 

Braindumps Real exam questions and verified answers - 100% passing guarantee - cheap prices.

 

Free brain dumps Braindumps, notes, books for free

 

Braindumps and Exams - Instant download real exam questions - Passing guarantee.

Follow us on FaceBook
Braindumps on Facebook
 
 
 
 
 

CheckPoint

Linux

Novell

DB/2

Network Appliance

EC-Council

Nortel

McAfee

Juniper

ISACA

PMI

Sybase

EMC

HDI

SNIA

ISC

Sair

IBM

Lotus

Exam Express

3COM

BICSI

DeLL

Enterasys

Extreme Networks

Guidance Software

Computer Associates

Network General

SAS Institute

Alcatel Lucent

SeeBeyond

TruSecure

Polycom

Hyperion

Hitachi

Nokia

Fortinet

Vmware

Fujitsu

Tibco

Intel

PostgreSQLCE

BusinessObjects

RESSoftware

BlackBerry

AccessData

ICDL

Isilon

SAP

The Open Group

ACSM

Altiris

Avaya

Cognos

F5

Genesys

SDI

ACI

ASQ

Google

H3C

HIPAA

HRCI

SOA

IIBA

Zend