Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

CIW 1D0-475 Exam -

Free 1D0-475 Sample Questions:

1. Which of the following steps may be necessary when adding a new device to a Linux machine?
A. Copy the device driver to the device driver directory.
B. Add a module.
C. Insert the device into the Linux system, and allow the system to choose the device files from its device directory.
D. Insert the CD-ROM with the device driver into the machine; Linux will detect it and prompt you through installation.
Answer: B

2. Bjorn is installing a Linux system and needs to change the IP address. He uses the ifconfig command to change the address, but he notices that it reverts back to the original address when he reboots the system. Why does the address revert after Bjorn has changed it?
A. The ifconfig command is used to change the broadcast address only.
B. The ifconfig command is not permanent; it changes parameters only for the current session.
C. The ifconfig command is used to change the default subnet mask only.
D. The ifconfig command syntax has been changed to ipconfig for Linux systems.
Answer: B

3. Which of the following is a characteristic of the linuxconf program?
A. It can be used to install device drivers and is used only on remote systems.
B. It is a command line-driven program with no GUI interface.
C. It can be used to configure a system host name and IP address.
D. It can be used to install new applications.
Answer: C

4. Armine is looking for information on her network card. She enters the dmesg command in Linux, but the output fills several text screens. Which additional command can Armine use to obtain only the information she wants?
A. get
B. | grep
C. -a
D. chmod
Answer: B

5. Jonas is a Linux administrator. He learns from a user that it takes an unusually long time to receive a response from another host system. Which command can Jonas enter to discover how many hops exist from the user’s system to the target host system?
A. traceroute
B. tracert
C. ifconfig
D. chmod
Answer: A

6. Korin is a user on a Linux-based network. She notices that a non-root user named jonas has been accessing a file called Reports, in which she keeps proprietary company information. Korin owns the file. Which command should she enter to secure the Reports file from other users?
A. chmod 700 Reports
B. chmod 007 Reports
C. chmod 000 Reports
D. chmod 444 Reports
Answer: A

7. Luis is the administrator for a Linux system. He is told that Rita needs ownership of the job file. Which command should Luis enter to grant ownership of the file to Rita?
A. chown rita jobfile
B. chmod rita jobfile
C. cp rita jobfile
D. chgrp jobfile rita
Answer: A

8. Rita is a Linux administrator at a new job. Her new boss tells her to ensure that all of the passwords on the Linux system are secure. Which action should Rita perform first to ensure password security?
A. Implement a strong password policy by editing the /etc/shadow file.
B. Verify that passwords are being stored in a password shadow file.
C. Implement a password aging policy by editing the /etc/shadow and /etc/passwd files.
D. Instruct all users to change their passwords.
Answer: B

9. Luis is a Linux systems administrator. He was recently assigned new responsibilities, and now he is looking for default system profile files for all users on the system. If the previous administrator kept the files in the default location, where will Luis find the files?
A. /etc/shadow
B. /usr/sbin
C. /etc/skel
D. /etc/profile
Answer: C

10. Bjorn is administrator of a large Linux network. He does not have access to linuxconf, but he wants to alter the default values to suit his current situation. How can Bjorn simplify this process?
A. Establish a default system profile file, and use the useradd –D command.
B. Establish a default system profile file, and use the useradd –d command.
C. Establish a default system profile file, and use the useradd –G command.
D. Establish a default system profile file, and use the useradd –g command.
Answer: A

11. You are the administrator on a Linux network. You created a strong password policy that requires users to change passwords every 30 days, and you are ready to implement the policy. Which Linux command should you enter to accomplish this task?
A. chmod – M 30
B. chgrp – d 30
C. chage – M 30
D. useradd – D 30
Answer: C

12. Armine is installing DNS on her Linux server. Which address should she enter into the named.local file?
A. The loopback address
B. The IP address of the DNS server
C. The IP address of the gateway
D. The broadcast address
Answer: A

13. Which file is not necessary when configuring DNS in Linux?
A. The named.conf file
B. The resolv.conf file
C. The named.local file
D. The lmhosts file
Answer: D

14. Jonas is a systems administrator who administers a network of Windows 2000, Windows NT and Linux servers. He is attempting to use Samba to allow the Linux systems to communicate with the Windows NT and 2000 systems. Jonas has Samba set up, but user-level security is not working properly, and he cannot connect from his Windows servers to the Samba system. Which of the following is the most likely problem?
A. By default, Samba expects encrypted passwords, whereas Windows NT and 2000 send passwords in cleartext.
B. Samba is not completely installed, and user-level security is the final element in the installation routine.
C. Samba does not accommodate user-level security, so Jonas must first install the Gnome-Swa utility, then restart Samba.
D. By default, Samba expects cleartext passwords, whereas Windows NT and 2000 send encrypted passwords.
Answer: D

15. Korin is a Linux administrator. She notices that a user is continually abusing the FTP service on the Linux server by downloading extremely large files. Korin adds this user name to the hosts.deny file, but the user is still able to use FTP. Why does the user still have access?
A. Korin must add the user name only to the hosts.allow file.
B. The FTP daemon cannot be excluded with the hosts.deny file because the FTP daemon is not controlled by TCPWrappers.
C. Korin must add the user name to both the hosts.deny and hosts.allow files to ensure that a conflict does not exist.
D. The user name is in the hosts.allow file, which is considered before the hosts.deny file.
Answer: D

16. Luis is a Red Hat Linux systems administrator. He wants to install Apache Server on his Linux system. Which command could Luis enter to determine whether Apache is already installed?
A. ps aux | grep apache
B. lynx localhost
C. rpm –q apache
D. rpm –i apache
Answer: C

17. Bjorn's supervisor asks him about the benefits of using the Apache Server. Which of the following is the best reason for using Apache?
A. Apache provides a graphical user interface for administration.
B. Apache uses root to run most of its processes, ensuring that the processes can be monitored and stopped easily in case of an attack.
C. Apache uses child processes that are spawned from root, using fewer system resources.
D. Apache does not allow virtual servers, making the Web server more secure.
Answer: C

18. Armine is using Apache Server, and she creates a virtual server on the same machine as an existing server. She decides not to create a DNS record for the virtual server because few users will access it. How will those few users access the virtual server?
A. Armine should instruct users to access the virtual server by its IP address.
B. Armine should instruct users to access the virtual server by specifying port 8080 in the URL.
C. Users will not be able to access the virtual server without a DNS entry.
D. Armine should instruct the users to create an lmhosts file to access the virtual server.
Answer: A

19. Jonas installed a Perl script in the cgi-bin directory of his Apache server. He accesses the script via a Web browser, but the script does not execute. He executes the command “ls –al” on the cgi-bin directory, and notices that the permissions on the file are 700. Which command should Jonas enter to ensure that his Perl script will execute?
A. chage 711
B. chmod 100
C. chmod 711
D. chage 700
Answer: C

20. Which permission is necessary for a CGI script to run on an Internet Information Server (IIS) directory?
A. Read
B. Write
C. Execute
D. Change
Answer: C

21. You are a systems administrator implementing a streaming media server. Your content consists of static files. You decide to use the RealNetworks RealServer, and you are using the default RealServer port. Which URL are you most likely to use to access your content?
Answer: B

22. Korin is expecting an e-mail message from a person at another company. She opens her Microsoft Outlook client and sees that the message has arrived. She clicks on the message and reads it. Which of the following terms describes the component that Korin is using?
A. Mail Transfer Agent (MTA)
B. Mail User Agent (MUA)
C. Mail Delivery Agent (MDA)
D. Mail Exchange Record (MX)
Answer: B

23. Which service is an example of a Mail Transfer Agent (MTA)?
A. Sendmail
B. Microsoft Exchange Client
D. Netscape Messenger POP3 Server
Answer: A

24. Rita is configuring her new mail server, but she cannot remember the well-known port for SMTP. How should she configure her mail server?
A. Rita should configure the server using port 80.
B. Rita should configure the server using port 25.
C. Rita should configure the server using port 23.
D. Rita should configure the server using port 21.
Answer: B

25. Luis is a systems administrator for a large network. His company has a large DNS structure that he does not want to reveal to outsiders. He alters the SMTP headers of all messages so that his users appear to be sending mail from a different address. What is the term for this process?
A. Aliasing
B. Masquerading
C. Forwarding
D. Relaying
Answer: B

26. Consider the following Mail Exchange (MX) entry: IN MX 15
Which of the following can you determine from only this entry?
A. The number of mail servers at
B. The IP address of the e-mail server at
C. The priority of the record
D. The type of mail server
Answer: C

27. Bjorn is assigned to set up a secure Web server to use SSL. To do this, he must configure the server to listen at which port?
A. 80
B. 119
C. 443
D. 433
Answer: C

28. SSL is conducted in six phases. Which choice lists the steps that are collectively known as the handshake?
A. The client requests to connect to the secure server, and the server sends its pre-signed certificate to the client.
B. The certificate authority (CA) validates the server to the client, and the client tells the server which types of encryption keys it supports.
C. The server sends its pre-signed certificate to the client, and the client verifies that the certificate was issued by a trusted certificate authority (CA).
D. The client requests to connect to the secure server, and the trusted certificate authority (CA) sends a pre-signed certificate to the server.
Answer: A

29. Armine has created a custom e-commerce application on her desktop. She gives it to her site administrator to install on the application server. The application code runs well when it starts, but an access error appears when Armine tries to log on to the database. What should the site administrator do to make sure Armine’s program runs correctly?
A. Grant Armine administrative access to the database.
B. Grant Armine's application permission to execute her queries on the database.
C. Check the application server for malfunctions using the appropriate performance monitor counter.
D. Verify that Armine’s query executes differently on the application server and does not have permission to access new tables.
Answer: B

30. Bjorn wants to use dump to create a backup of the /etc/ directory on his local system. The backup will be an epochal (full) backup. He enters the following command:
host# dump –0uf /etc/ dev/ht0
Bjorn receives an error message. What can he do to properly dump the /etc/ directory?
A. Enter the following command:
dump –0uf /dev/ht0 /etc/
B. Enter the following command:
dump –1uf /dev/ht0 /etc
C. Enter the following command:
dump /etc > /dev/ht0
D. Enter the following command:
dump -r /etc/ dev/ht0
Answer: A

© 2014, All Rights Reserved