REAL QUESTIONS SUBMIT MATERIAL ADVERTISE
Braindumps

Microsoft

Cisco

Citrix

CIW

CompTia

CWNA

Apple

Adobe

HP

Legato

Exin

Filemaker

Brocade

Ericsson

TIA

Veritas

ISEB

SCP

IISFA

ISM

OMG

Apc

Mile2

Foundry

Huawei

McData

Symantec

TeraData

RedHat

Solar Winds

Blue Coat

Riverbed

 

 
 
Click on name of dumper to view the dump
 
Natalia
 
 

 

Braindumps of 117-202
Linux Network Administration

Exam Questions, Answers, Braindumps (117-202)

Hi, I would like to thanx www.braindumps.org for providing help in such a manner. It was really of great help.

Q: 1
What is the minimum number of partitions you need to install Linux?
Answer: 1.
Explanation: At a bare minimum, Linux requires just one partition to install and boot. This is the root partition, which is known as the / partition. However, a minimum of two partitions is recommended: one for the root partition and one for the swap partition.
Reference: Roderick W. Smith. Sybex Linux + Study Guide: page 37.
Q: 2
What file contains the default environment variables when using the bash shell?
A. ~/.profile
B. /bash
C. /etc/profile
D. ~/bash
Answer: C
Explanation: The file /etc/profile contains shell commands that are executed at login time for any user whose entry in /etc/passwd has a shell specified in the shell field whose name ends in sh.
Reference: http://docsrv.caldera.com/cgi-bin/man/man?profile+4
Incorrect Answers
A: The ~/.profile is the profile file stored in each user’s home directory. This file contains settings that apply to that user only.
B: The default environment variables are stored in the /etc/profile file, not the /bash file.
D: The default environment variables are stored in the /etc/profile file, not the ~/bash file.
Q: 3
You need to delete the group dataproject. Which two of the following tasks should you do first before deleting the group?
A. Check the /etc/passwd file to make sure no one has this group as his default group.
B. Change the members of the dataproject group to another group besides users.
C. Make sure that members listed in the /etc/group file are given new login names.
D. Verify that no file or directory has this group listed as its owner.
A. A and C.- 4 -
B. A and D
C. B and C
D. B and D
Answer: B.
Explanation: You can delete a group by editing the /etc/group file and removing the relevant line for the group. It’s generally better to use groupdel, though, because groupdel checks to see if the group is any user’s primary group. If it is, groupdel refuses to remove the group; you must change the user’s primary group or delete the user account first. As with deleting users, deleting groups can leave “orphaned” files on the computer. It’s usually best to delete the files or assign them other group ownership using the chown or chgrp commands.
Reference: Roderick W. Smith. Sybex Linux + Study Guide: page 274.
Incorrect Answers
A: It is not necessary to assign new login names to the members listed in the /etc/group file.
C: It is not necessary to assign new login names to the members listed in the /etc/group file.
D: It is only necessary to change the users’ default group if the default group is the dataproject group.
Q: 4
All groups are defined in the /etc/group file. Each entry contains four fields in the following order.
A. groupname, password, GID, member list
B. GID, groupname, password, member list
C. groupname, GID, password, member list
D. GID, member list, groupname, password
Answer: A
Explanation: A typical line in the /etc/group file looks like the following: project1:x:501:sally,sam,ellen,george
Each field is separated from the others by a colon. The meanings of the four fields are as follows:
Group name The first field (project1 in the preceding example) is the name of the group.
Password The second field (x in the preceding example) is the group password. Distributions that use shadow passwords typically place an x in this field; others place the encrypted password directly in this field.
GID The group ID number goes in this field.
User list The final field is a comma-separated list of group members..- 5 –
Reference: Roderick W. Smith. Sybex Linux + Study Guide: page 273.
Incorrect Answers
B: This is the incorrect order of fields.
C: This is the incorrect order of fields.
D: This is the incorrect order of fields.
Q: 5
You issue the following command
useradd –m bobm
But the user cannot logon. What is the problem?
A. You need to assign a password to bobm’s account using the passwd command.
B. You need to create bobm’s home directory and set the appropriate permissions.
C. You need to edit the /etc/passwd file and assign a shell of bobm’s account.
D. The username must be at least five characters long.
Answer: A
Explanation: When you add a user, the account is disabled until you specify a password for the account. You can use the –p option with the useradd command, but that requires you to enter an encrypted password. For this reason it is easier to use the passwd command. This enables you to enter a plain text password which will then be automatically encrypted.
Reference: Roderick W. Smith. Sybex Linux + Study Guide: page 262.
Incorrect Answers
B: The home directory will be created automatically with the useradd command.
C: The user will use the default shell.
D: The username does not have to be five characters long.
Q: 6
You create a new user account by adding the following line to your /etc/passwd file. Bobm:baddog:501:501:Bob Morris:/home/bobm:/bin/bash
Bob calls you and tells you that he cannot logon. You verify that he is using the correct username and password. What is the problem?
A. The UID and GID cannot be identical.
B. You cannot have spaces in the line unless they are surrounded with double quotes.
C. You cannot directly enter the password; rather you have to use the passwd command to assign a password to the user.
D. The username is too short, it must be at least six characters long..- 6 -
Answer: C
Explanation: The password saved in the /etc/passwd file is encrypted. For this reason, you cannot directly enter the password in this file. Rather, you must use the passwd command. The passwd command will take the plain text password and save it in encrypted form in the /etc/passwd file.
Reference: Roderick W. Smith. Sybex Linux + Study Guide: page 262.
Incorrect Answers
A: The UID and the GID can be the same.
B: You can have spaces because each field is separated by a colon (:).
D: The username does not have to be at least six characters long.
Q: 7
Which field in the passwd file is used to define the user’s default shell?
Answer: command
Explanation: The last field, known as the command field or login command, is used to specify what shell the user will use when he/she logs in.
Q: 8
There are seven fields in the /etc/passwd file. Which of the following lists all the fields in the correct order?
A. username, UID, password, GID, home directory, command, comment
B. username, password, UID, GID, comment, home directory, command
C. UID, username, GID, home directory, password, comment, command
D. username, password, UID, group name, GID, home directory, comment
Answer: B
Explanation: The first field contains the username. The second field contains the encrypted password or an ‘x’ if a shadow password file is used. The third field is the User ID number. The fourth field is the primary Group ID number. The fifth field is the comments field. The sixth field is the home directory field. The seventh field is the command field which specifies the user’s default shell.
Reference: http://www.unet.univie.ac.at/aix/files/aixfiles/passwd_etc.htm
Incorrect Answers
A: The order of these fields is not correct.
C: The order of these fields is not correct..- 7 –
D: The order of these fields is not correct.
Q: 9
What file defines the levels of messages written to system log files?
Answer: syslog.conf
Explanation: The file /etc/syslog.conf contains information used by the system log daemon, syslogd to forward a system message to appropriate log files and/or users.
Reference: http://www.unidata.ucar.edu/cgi-bin/man-cgi?syslog.conf+4
Q: 10
Which utility can you use to automate rotation of logs?
Answer: logrotate
Explanation: The logrotate utility is used to manipulate log files. This includes the rotation of log files and the creation of new log files.
Reference: http://www.oreillynet.com/linux/cmd/l/logrotate.html

117-202



 

 

Braindumps Real exam questions and verified answers - 100% passing guarantee - cheap prices.

 

Free brain dumps Braindumps, notes, books for free

 

Braindumps and Exams - Instant download real exam questions - Passing guarantee.

Follow us on FaceBook
Braindumps on Facebook
 
 
 
 
 

CheckPoint

Linux

Novell

DB/2

Network Appliance

EC-Council

Nortel

McAfee

Juniper

ISACA

PMI

Sybase

EMC

HDI

SNIA

ISC

Sair

IBM

Lotus

Exam Express

3COM

BICSI

DeLL

Enterasys

Extreme Networks

Guidance Software

Computer Associates

Network General

SAS Institute

Alcatel Lucent

SeeBeyond

TruSecure

Polycom

Hyperion

Hitachi

Nokia

Fortinet

Vmware

Fujitsu

Tibco

Intel

PostgreSQLCE

BusinessObjects

RESSoftware

BlackBerry

AccessData

ICDL

Isilon

SAP

The Open Group

ACSM

Altiris

Avaya

Cognos

F5

Genesys

SDI

ACI

ASQ

Google

H3C

HIPAA

HRCI

SOA

IIBA

Zend