Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Sun 310-560 Exam - Cheat-Test.com

Free 310-560 Sample Questions:

1. You are using RAID 1+0. Which log file should be on a disk by itself?
A. error log
B. audit log
C. access log
D. transaction log
Answer: D

2. Which statement about the migration process using the migrateInstance5 script is true?
A. The migrateInstance5 script only runs on a UNIX platform.
B. If you do not stop the legacy server before running the script, the migration process will stop.
C. Before running the migration script, you should copy the slapd.conf and custom schema files to a safe place.
D. The migration script detects if the standard schema has been modified and then pauses to let you copy the custom schema to separate files.
E. Once the migration script has completed, the Netscape Directory Server 4.x instance can no longer run at the same time the new Sun ONE Directory Server 5.x is running.
Answer: C

3. You want to do a search on all entries that contain the attribute value of Cincinnati, but you are not sure how to spell it. You do a search with the spelling of Cincinatti and you still get the results you need.
Which index type was used?
A. equality
B. browsing
C. presence
D. substring
E. approximate
Answer: E

4. When designing your directory tree and your naming entries, which two are traditional attributes used to uniquely identify your person entries? (Choose two.)
A. cn
B. dc
C. dn
D. uid
E. mail
Answer: DE

5. Before deciding to replicate databases, which two tasks should you perform? (Choose two.)
A. analyze the directory schema
B. estimate the number of directory entries in each database
C. estimate the amount of replication traffic that will occur over the network
D. estimate the query traffic that would occur over the network if you did not replicate databases
Answer: CD

6. Which two statements are true regarding the db2bak command? (Choose two.)
A. It can back up individual databases.
B. You can use this command while the server is running.
C. You can use this command to back up all the databases in your directory.
D. It backs up the server configuration found directly under the default ./config directory.
E. You can use this command to back up the data contained by databases on a remote server that you chain to use database links.
Answer: BC

7. What are the two default LDAP ports? (Choose two.)
A. 21
B. 23
C. 80
D. 161
E. 389
F. 636
Answer: EF

8. Which two steps do you perform to delete an index using the command line? (Choose two.)
A. restart the server
B. run the vlvindex script
C. run the delindex script
D. run the db2index.pl script
E. use the ldapdelete utility to delete the index
F. use the ldapsearch utility to delete the index
Answer: DE

9. Which log do you look at to check unindexed searches and determine whether or not the attribute needs to be indexed?
A. error log
B. audit log
C. change log
D. access log
E. transaction log
Answer: D

10. If a directory name is not specified when backing up the directory database, a default backup directory is created. Which two components are used to create the directory name? (Choose two.)
A. platform
B. server ID
C. backup size
D. backup date
E. backup time
Answer: DE

11. You need to manually create an ACI for all users in the Marketing subtree of dc=Siroe,dc=com that targets the password (userPassword) attribute. Which portion of the LDIF ACI correctly specifies these entries and the attribute?
A. (attribute="userPassword") (targetfilter("ou=Marketing"))
B. (targetattr="ldap:///userPassword,ou=Marketing,dc=Siroe,dc=com")
C. (target="ldap:///ou=Marketing,dc=Siroe,dc=com") (attribute="userPassword")
D. (target="ldap:///ou=Marketing,dc=Siroe,dc=com") (targetattr="userPassword")
Answer: D

12. On a Solaris 8 system, the maximum database cache and entry cache size should not exceed _____ GB.
A. 1.8
B. 2.2
C. 2.9
D. 3.7
E. 4.5
Answer: D

13. Which two types of data should be stored in an LDAP directory? (Choose two.)
A. data designed for file systems
B. data that are frequently written
C. data that are modified frequently
D. data that are read often and written infrequently
E. data that are accessed from more than one physical location
Answer: DE

14. Which two types of data should not be stored in an LDAP directory? (Choose two.)
A. data that change frequently
B. data that are written frequently
C. data that are read often and written infrequently
D. data that are useful for more than one audience
E. data that are accessed from more than one physical location
Answer: AB

15. Your organization currently accesses directory data using a protocol other than LDAP. You want to move the directory data into Sun ONE Directory Server.
What question would be the least valuable to ask during data analysis?
A. What LDAP directory-enabled applications will you deploy?
B. Where does current directory data exist in your environment?
C. On which operating systems are your applications currently deployed?
D. What directory applications and tools do you currently have deployed, and who uses them?
E. What applications, tools, and processes will need to change if the data are accessed using LDAP?
Answer: C

16. You have both directory applications and data stores to consider when designing your directory. There are both LDAP and non-LDAP data stores that may be included in your directory.
Which is an LDAP data store?
A. PBX system
B. Lotus Notes
C. Microsoft Exchange
D. Windows NT Domains
E. Sun ONE Directory Server
Answer: E

17. What is the purpose of the -w option in the following command?
ldapdelete -D "cn=Directory Manager" -w sun "cn=George McKnight,ou=people,dc=sun,dc=com"
A. to specify a user
B. to specify a server
C. to specify a context
D. to specify a directory
E. to specify a password
Answer: E

18. What is the purpose of the -s option in the following command?
ldapsearch -b "ou=people,dc=sun,dc=com" -s sub "cn=*"
A. to specify a password
B. to specify a search context
C. to specify the scope of a search
D. to specify the LDAP server to query
E. to display the results in LDIF format
Answer: C

19. Which ldapsearch command searches at only the root DSE for all entries that have the attribute object class defined?
A. ldapsearch -b "" -s one "objectclass=*"
B. ldapsearch -b "" -s sub "objectclass=*"
C. ldapsearch -b "" -s base "objectclass=*"
D. ldapsearch -b "*" -s base "objectclass=*"
E. ldapsearch -b "root" -s base "objectclass=*"
Answer: C

20. Which ldapsearch command performs the search on a remote host named corporation and returns the distinguished names of all first level organizational units?
A. ldapsearch -h corporation -b "" -s one "ou=*" dn
B. ldapsearch -d corporation -b "" -s base "ou=*" dn
C. ldapsearch -h corporation -b "dc=sun,dc=com" -s one "ou=*" dn
D. ldapsearch -b corporation -h "dc=sun,dc=com" -s sub "ou=*" dn
E. ldapsearch -h corporation -b "dc=sun,dc=com" -s base "ou=*" dn
Answer: C

21. Which command eliminates the need for a change type: add LDIF update statement?
A. ldap -a
B. ldapmodrdn
C. ldapmodify -a
D. ldapmodify -add
Answer: C

22. The -s option in an ldapsearch command specifies the scope of the search. If the -s option is not specified in the command, what will be the scope of the search?
A. a one level search
B. a base object search
C. an entire subtree search
D. A scope must be specified for a search to be initiated.
Answer: C

23. What is used to separate entries when creating an LDIF file?
A. dash
B. period
C. semi-colon
D. hard return
E. a blank line
Answer: E

24. Which is used to rename an entry within an LDIF file?
A. changetype: add
B. changetype: modify
C. changetype: modrdn
D. changetype: rename
Answer: C

25. You want to add a fax number attribute and telephone number attribute to an entry. Which is the proper method to enter this entry into an LDIF file?
A. dn: cn=Sarah Johnson,ou=People,dc=siroe,dc=com
changetype: modify
add: faxnumber
fax number: (408) 555-2468
;
add: telephonenumber
telephone number: (408) 555-2490
B. dn: cn=Sarah Johnson,ou=People,dc=siroe,dc=com
changetype: modify
add: facsimileTelephoneNumber
facsimileTelephoneNumber: (408) 555-2468
-
add: telephoneNumber
telephoneNumber: (408) 555-2490
C. dn: cn=Sarah Johnson,ou=People,dc=siroe,dc=com
changetype: modify
add: faxnumber
fax number: (408) 555-2468
add: telephonenumber
telephone number: (408) 555-2490
D. dn: cn=Sarah Johnson,ou=People,dc=siroe,dc=com
changetype: modify
add: faxnumber
fax number: (408) 555-2468
add: telephonenumber
telephone number: (408) 555-2490
E. dn: cn=Sarah Johnson,ou=People,dc=siroe,dc=com
changetype: modify
add: faxnumber
fax number: (408) 555-2468
:
add: telephonenumber
telephone number: (408) 555-2490
Answer: B

26. Which operational size limit affects the maximum number of entries the server checks in response to a search request?
A. nsSizeLimit
B. nsTimeLimit
C. nsIdleTimeout
D. nsLookthroughLimit
Answer: D

27. What does the nsSizeLimit operational size limit do?
A. It limits the maximum time a server spends performing a search request.
B. It limits the time the server maintains an idle connection before timing out.
C. It limits the maximum number of entries returned for client search operations.
D. It limits the maximum number of entries the server checks in response to a search request.
Answer: C

28. You want to optimize write performance. When using RAID 1+0, what should you do?
A. place all log files on the same disk
B. place the transaction log on its own disk
C. place the transaction log and change log on the same disk
D. place the database on the same disk as the transaction log
E. place indexes and applications on the same disk as the access, error, and audit logs
Answer: B

29. Operational size limit parameters can be specified at multiple levels within the architecture. Which two statements are true? (Choose two.)
A. Application operational size limits can override global operational size limits.
B. Global operational size limits can override application operational size limits.
C. Bind DN applied operational size limits can override global operational size limits.
D. Global operational size limits can override Bind DN applied operational size limits.
E. Application operational size limits can override Bind DN applied operational size limits.
Answer: BC


© 2014 Cheat-Test.com, All Rights Reserved