Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Sun 310-044 Exam -

Free 310-044 Sample Questions:

1.A workstation does not have access to the network. A system administrator needs to
enable access to a host at IP address Other hosts on the same network must remain inaccessible. Which command accomplishes this?
A.route add myrouter 0
B.netstat ­a
C.route add net myrouter 1
D.route add host myrouter 1
E.ifconfig ­a qfe2 broadcast
Answer: D

2.Which two are benefits of IPv6? (Choose two.)
A.faster ARP/RARP
B.smaller addresses
C.more efficient routing
D.smaller routing tables
E.eliminates broadcast traffic
Answer: C, E

3.When must a local host try to route through an intermediary host to reach a remote host?
A.when the remote host is NOT in the ARP cache
B.when the local host IP address was obtained using RARP
C.when the routing table on the local host has been updated by RIP
D.when the network address of the remote host differs from the network address of the local host
Answer: D

4.Given: route add host lion tiger 1 Which two statements are true? (Choose two.)
A.The command adds a static route to the routing table.
B.The command indicates that tiger is an intermediate host on this route.
C.The command causes hosts tiger and lion to update their routing tables.
D.All hosts on the lion network could be reached as a result of the command.
E.The command indicates that lion is the only intermediate host on this route.
Answer: A, B

5.You have created an IPv6 tunnel between two hosts. Which two statements are true about tunnelling? (Choose two.)
A.Tunnelled traffic is always encrypted.
B.Tunnelled traffic is always TCP or UDP in IPv6.
C.IPv6 Solaris tunnelling always involves an IP datagram encapsulating an IP datagram.
D.The IP header of the datagram that has encapsulated the tunnelled data contains the source address of the tunnel.
E.The tunnel source IP address is always the same as the source IP address in the IP header of the tunnelled (encapsulated) IP datagram.
Answer: C, D

6.Which three statements about fragmentation are true? (Choose three.)
A.The fragment size is determined by the MTU size of the network interface layer.
B.The fragment size always remains constant for a packet across all networks through which the packet passes.
C.Fragmentation is a mechanism for dividing a class of IP addresses to allow more efficient use of the address space.
D.Fragmentation occurs, when necessary, at each router a packet passes through based on the MTU for the interface.
E.Fragmentation is a mechanism for dividing data where the volume of data is more than can be transmitted in a single packet.
F.Fragmentation only applies when the upper layer protocol is TCP because TCP delivers a continuous stream of data that must be fragmented.
Answer: A, D, E

7.A system administrator is attempting to add a default router using the command: route add default 0 You get the error message "Network is unreachable." The IP address of the host you are using is, and the router is reachable using a "direct" route. The router is on the network in question and is a viable default router. What causes the error message "Network is unreachable"?
A.The metric of 0 should be 1.
B.You already have several default routers.
C.Your default router should be reachable indirectly.
D.You should act as the default router to your own network.
E.Default routers can only be added through a file at boot­up .
Answer: A

8.Which three statements about Classless Interdomain Routing (CIDR) are true? (Choose three.)
A.CIDR is also referred to as "supernetting."
B.CIDR uses netmasks to create network prefixes.
C.CIDR can only be applied to Class C network addresses.
D.CIDR applies to address spaces inside an organization only.
E.CIDR involves combining two or more contiguous address ranges.
Answer: A, B, E

9.A system administrator is attempting to configure the virtual interface: hme0:500 by running the command: # ifconfig hme0:500 plumb but the system administrator receives the error: ifconfig: plumb: SIOCLIFADDIF: hme0:500 no such interface Solaris 9 supports up to 8192 virtual interfaces associated with a given physical interface. What is causing the problem?
A.The ifconfig syntax is incorrect.
B.The system administrator needs to reboot.
C.By default, only quad card interfaces support virtual interfaces.
D.By default, the kernel only supports up to 256 virtual interfaces.
Answer: D

10.You have configured an IPv6 router which is having problems routing correctly to a default router connected to the Internet. You need to investigate the machine's routing table and check that the default route is in place. You also need to check the ARP cache to see whether the MAC address of the default router has been learned. Which two commands enable you to perform these tasks? (Choose two.)
A.arp ­n
B.netstat ­r
C.netstat ­m
D.ifconfig ­a
E.netstat ­pn
Answer: B, E

11.Which statement about the in.rarpd daemon is true? is started by inetd on demand. is started whenever the system enters run level 3. is started if the host is configured as a boot server.
D.The arp kernel module receives RARP request packets, starts in.rarpd, and passes the frames to in.rarpd.
Answer: C

12.What protocol defines the Router Discovery (RDISC) messages?
Answer: C

13.Given: host name IP address myhost printsvr The system myhost needs to send data to printsvr. The routing table on myhost has no entry for printsvr. The routing table on myhost has no entry for the network. Which entry does the routing algorithm look for next?
D.ARP cache
Answer: B

14.Which two are necessary requirements for IP Multipathing (IPMP)? (Choose two.)
A.Solaris 8 10/00 or later releases must be enabled in /etc/inetd.conf
C.OBP parameter local­mac­address? set to true
D.a minimum of three physical interfaces available on the system
E./etc/hostname.interface files must contain the multipathing group and test address configuration.
Answer: A, C

15.Which is the meaning of the DEPRECATED interface flag?
A.It is used by in.mpathd to detect test addresses.
B.The interface will ignore any offlining attempts by the if_mpadm command.
C.The IP address will not be used by applications as source address for outbound packets.
D.The IP address will not fail over in case of a failure of the corresponding physical interface.
Answer: C

16.Which layer of the TCP/IP five­layer model contains UDP?
A.Internet Layer
B.Transport Layer
C.Hardware Layer
D.Application Layer
E.Network Interface Layer
Answer: B

17.Given the routes are to the same destination, which route does RIP configure for use?
A.a route through one intermediary host with a bandwidth of 10 Mbits/sec
B.a route through two intermediary hosts with a bandwidth of 10 Gbits/sec
C.a route through two intermediary hosts with a bandwidth of 100 Mbits/sec
D.a route through three intermediary hosts with a bandwidth of 150 Mbits/sec
Answer: A

18.Which three fields can be components of an IP datagram header? (Choose three.)
A.transport protocol type
B.source IP address
C.source MAC address
D.destination IP address
E.destination port number
Answer: A, B, D

19.Which protocol supports Classless Interdomain Routing (CIDR)?
A.Border Gateway Protocol
B.Interior Gateway Protocol
C.Router Discovery Protocol
D.External Gateway Protocol
E.Internet Control Message Protocol
Answer: A

20.Which is the minimum layer reached by all IPv6 datagrams when passing through a router?
A.Internet Layer
B.Physical Layer
C.Transport Layer
D.Application Layer
E.Network Interface Layer
Answer: A

21.A host's IPv6 link­local unicast address is based on the host's Ethernet address. The beginning
of the address is prefixed by a specific Format Prefix (FP) value to indicate that the address is a link­local address. In addition, a 16­bit code is inserted in 64­bit Interface ID portion of the IPv6 address to enable a 48­bit Ethernet address to become 64 bits in length. Which value represents the 16­bit code?
Answer: D

22.Which command can be used to unconfigure and remove the logical interface hme0:2, given that it has the IP address
A.ifconfig hme0:2 down
B.ifconfig hme0:2 unplumb
C.ifconfig hme0 removeif hme0:2
D.ifconfig hme0 rmif
Answer: B

23.In the five­layer TCP/IP model, which two functions does the Internet Layer provide? (Choose two.)
A.routing fragmentation representation
D.physical connections
E.Cyclic Redundancy Checking
Answer: A, B

24.The ping command uses which protocol?
A.TCP encapsulated in IP
B.UDP encapsulated in IP
C.ICMP encapsulated in IP
D.ICMP encapsulated in UDP
E.ICMP encapsulated directly in an Ethernet frame
Answer: C

25.When a system boots, which file configures Ethernet network interfaces?
Answer: D

26.Which two commands can be used to display information about currently configured network
interfaces? (Choose two.)
A.netstat ­i
B.netstat ­n
C.netstat ­s
D.ifconfig ­a
E.ifconfig up
Answer: A, D

27.In the five­layer TCP/IP model, which function does the Transport Layer provide? routing formatting
C.physical connections
D.end­to­end data transfer
Answer: D

28.What can you do to permanently set parameters for the hme interface module so that they are automatically configured on system boot?
A.define parameters in /etc/hostname.hme0
B.define parameters in /kernel/drv/hme.cfg
C.add commands that define the settings to /etc/netconfig
D.add commands that define the settings to a startup script in /etc/rc2.d
Answer: D

29.Which two statements about ICMP are true? (Choose two.)
A.It encapsulates route redirect data.
B.It provides an error detection mechanism.
C.It defines the method used to map an Ethernet address to an IP address.
D.It is a connection­oriented protocol that provides full­duplex stream service.
E.It is a communication protocol that allows remote network administrators to monitor and control network devices.
Answer: A, B

© 2014, All Rights Reserved