Upload
ganesh-sharma
View
112
Download
2
Embed Size (px)
Citation preview
Which security protocol is a virtual private network most likely to use?
Point to point tunneling protocol
SSL secure socket layer
Frame relay
One way encryption
When is NetBIOS routable?
Never
Only on an IP network
Only on an IPX network
When combined with NetBEUI or TCP/IP
Which body regulates and assigns network addresses.
InterNIC
NIC
User
None of the above
Why is the wc command used?
It is used for sorting.
It reads the file.
It counts lines and char from file.
It gives the line index.
___________________ are collections of user and computer configuration settings that can be linked to computers, sites, domains, and OUs to modify computer settings and specify the behavior of users’ desktops.
Groups
Group Policies
OU
Profiles
Ans=b
You are preparing a package for deployment. Which of the following actions should you perform if you receive the message Cannot Prepare Package For Deployment?
Check your permissions for the GPO
Check connectivity with the SDP
Check your permissions for the SDP
Set the appropriate category for the package
Ans=b
Which mode starts the system in debugging mode that is useful only for troubleshooting operating system bugs?
Debugging mode
Enable boot logging
Safe mode
None of the Above
Ans=cWhich tracks events related to user rights,auditing and trust relationships?
Audit Policy Change
Audit Account Logon Events
Audit Object Access
None of the Above
Ans=bYou need to find out the total size of users mailbox.What should yo do?
Run Get-MailboxStatistics cmdlet
Run Get-MailboxDatabase cmdlet
Run Get-MailboxData cmdlet
None of the above
A mailbox has 60 KB of mailbox rules.You need to move the mailbox from your Exchange Server 2007 computer to an Exchange Server 2003 computer at a remote site.How should yo do?
Run the Move-Mailbox cmdlet with the IgnoreRuleLimitErrors parameters.
Run the Move-Mailbox cmdlet with the IgnorePolicyMatch parameters.
Run the Make-Mailbox cmdlet with the IgnorePolicyMatch parameters.
None of the above
Your Exchange Server 2007 organistaion contains a Client Access Server and Hub Transport server.The Client Access Server fails.You need to add the Client Access Server role to the existing Hub Transport server.What will you do?
Use the Add or Remove Programs applet in control panel
Run the exsetup /mode:install/roles:ClientAccess command.
Both
None of the above
What parameter is handy in situations where the mailbox already exists on the target system?
AllowMerge
RetryTimeout
ExcludeFolders
None of the above
Ans=aWhich group has complete access to all exchange properties and object organisation wide?
Exchange organisation administrators
Exchange recipient administrators
Exchange server administrators
Exchange view-only administrators
Ans=a
What is responsible for updating recipient information in the Edge Transport servers ADAM
ADAMUpdate
EdgeSync
RecipientUpdate
EdgeUpdate
Which role service allows users to access terminal servers hosted behind firewalls in a private network from any internet based client?
TS Gateway
TS RemoteApp
TS Web access
All the above
Ans=a
Which of the following best describes the registered port numbers?
Port Numbers ranging from 1024-49151 that any process can use.
Port numbers that ranging from 1 to 1023 used by TCP and UDP to identify well known services that a host can provide.
Port numbers reserved exclusively for World Wide Web services.
Port numbers reserved exclusively for DNS services.
Answer = B
Which of the following best describes the registered port numbers?
Port Numbers ranging from 1024-49151 that any process can use.
Port numbers that ranging from 1 to 1023 used by TCP and UDP to identify well known services that a host can provide.
Port numbers reserved exclusively for World Wide Web services.
Port numbers reserved exclusively for DNS services.
Ans=bWhich security protocol is a virtual private network most likely to use?
Point to point tunneling protocol
SSL secure socket layer
Frame relay
One way encryption
Ans=bWhen is NetBIOS routable?
Never
Only on an IP network
Only on an IPX network
When combined with NetBEUI or TCP/IP
Ans=dWhich body regulates and assigns network addresses.
InterNIC
NIC
User
None of the above
Ans=a
Which command changes the existing route?
route change
route delete
route print
None of the above
Ans=a
Which command lists the contents of the NetBIOS name cache by IP adddress?
nbtstat -c
nbtstat -p
nbtstat -a
None of the above
Ans=aA Linux system crashes everyday at the same time and need to be re-booted. Which of the following would provide evidence of what was happening on the system at that time?
Run dmesg
Run uptime
Look in /etc/shutdown
Look in /var/log/messages
Ans=dYou know that the info utility provides easier to understand documentation but you have never used it. How can you access a tutorial on using info?
man info
info
info info
info help
Answer=a
Which body regulates and assigns network addresses.
InterNIC
NIC
User
None of the above
Answer=a
Which command changes the existing route?
route change
route delete
route print
None of the above
Answer=a
A Linux system crashes everyday at the same time and need to be re-booted. Which of the following would provide evidence of what was happening on the system at that time?
Run dmesg
Run uptime
Look in /etc/shutdown
Look in /var/log/messages
Answer=dYou know that the info utility provides easier to understand documentation but you have never used it. How can you access a tutorial on using info?
man info
info
info info
info help
Answer=cWhat does the command "rpm -Uvh package-update-3.5.i386.rpm" do?
Uninstalls the package and releated hidden files.
Upgrades the package and provides installation status.
Allows the user to view hidden files installed with the package.
Verifies that the package is installed correctly and report errors.
Answer=bAfter installing Linux onto a dual-processor machine, the administrator suspects that only 1 processor initialized successfully during the boot process.How could this be verified?
Run cpuinfo.
Check /var/log/messages for errors.
Run dmesg to review the log file.
Run ps to see if both CPUs appear.
Answer=aFirewall rules can be configured in linux through_______.
IPTables
SMB
IPP
All of the above
Answer=a
From where can the passwd file be accessed?
/usr/bin
/etc/passwd
/sbin/passwd
/root/Desktop
Answer=bWhy is the wc command used?
It is used for sorting.
It reads the file.
It counts lines and char from file.
It gives the line index.
Answer=c