Core Concepts and Practices
Exam Questions, Answers,
Completed my paper, It
was bcuz of www.4exam.com . All the questions in the
exam are from their study guide.
Goodluck to u too.
I have managed some questions.
Top-level domains are located under which of the following?
A. ARPANET root
B. NIC root
C. ARP root
D. DNS root
The most common type of Linux network configuration
is the ______ network, using__________
a. Ethernet, TCP/IP
b. Token ring. TCP/IP
c. Ethernet, IPX
d. Token ring, IPX
James download a variety of tools to exploit a system,
including Trojan Horse programs that replace system
binaries and programs that can mask the presence of
system crackers. What did James download?
A. The Common System Administration Troubleshooting
B. A rootkit
C. A crackkit
D. A wormkit
E. A systemmaskkit
Tom wants to put a RAID on his NIS server, chewy.
Tom is concerned about the integrity of the data on
chewy, and he wants to be able to sustain a one-disk
failure without having to restore from backup. He
also wants to use four hard disks. Which of the following
arrays should he NOT use?
A. RAID 0
B. RAID 5
C. RAID 10
D. RAID 0+1
Backside bus speed refers to the connection between
_____ and the processor.
A. Level 1 cache
B. Level 2 cache
C. The hard drive
D. Main memory
Your system appears to be running slowly. You run
the "/bin/ps aux" command., and it displays
all the processes currently running on your system.
After analyzing the output, you notice a significant
gap in the PID sequence. You issue the command "Is-al/bin/ps"
and realize that the ps program has an unusual creation
date. Which of the following best describes your altered
A. It is a virus
B. It is a program that exploits a buffer overrun.
C. It is a program that exploits a buffer overflow
D. It is a worm
E. It is a Trojan horse.
A system administrator is securing a Web server. In
order to prevent local user from adding directives
to the https.conf file, she decides to change the
permissions on the httpd.conf. The Web server runs
as user and group web, and no other users are in this
group. Which of the following would be secure file
permissions to set on the httpd.conf file? (Choose
Which of the following is NOT a characteristic of
a hardware-based RAID?
A. Performance is degraded because the RAID controller
competes with other devices on the bus.
B. The RAID system is managed independently from the
C. It presents the host with only one disk per RAID
D. It is possible for the RAID subsystem tp span over
multiple SCSI channels