Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

SAIR 3X0-201 Exam - Cheat-Test.com

Free 3X0-201 Sample Questions:

1. Which of the following statements are TRUE regarding the ext2 file system? (Choose two.)
A. The fsck program is necessary to reconcile the file system.
B. There is no limit on the length of a file name.
C. It implements journaling.
D. It ignores timestamps.
E. Larger file system blocks enable larger file sizes.
Answer: AE

2. A system administrator notices that the server frequently writes to the swap partition. She wants to improve system performance without adding more RAM to the server. Which of the following options will improve the server's performance? (Choose two.)
A. Creating a separate swap partition
B. Increasing the buffer size of the L2 cache in the /proc directory
C. Making the swap space the first partition on the hard drive
D. Setting the amount of swap space as a multiple of 1000
Answer: AC

3. The server responsible for running the site www.linuxsite.org stores the results of a DNS lookup in its own database for future reference. After a period of time (the time to live), this address is purged, and if a user wants to visit the same site, a DNS lookup must occur. What is this called, and why is it used?
A. Super DNS resolution; it is used so that DNS lookups can be achieved more quickly.
B. Passing; it is used so fewer refusal messages are returned when looking up a name.
C. Caching; it is used to return subsequent name resolutions more quickly.
D. Delegation; it is used to decentralize administration on the Internet.
Answer: C

4. Pat is configuring NIS for the domain "training". He issues the following commands on his NIS master server. What is Pat most likely doing?
ypcat -k ypservers > /tmp/ypservers
cd /var/yp
cat /tmp/ypservers | makedbm - /var/yp/training/ypservers
A. Configuring NIS clients to recognize the NIS master's map file
B. Adding additional NIS slave servers
C. Modifying user accounts on the NIS master
D. Adding a fault-tolerant database to the master server
Answer: B

5. You are the system administrator of a local, caching-only DNS server. Clients have been experiencing problems connecting to some Web sites. You check the local DNS server and see that named is running and that the /etc/resolve.conf file is properly configured. You also check the /etc/resolve.conf files of the complaining clients and verify that those files are also configured properly. Which of the following could be the problem?
A. The clients do not have the current version of BIND installed on their machines.
B. The ypbind program is not properly installed on the local DNS server.
C. The named.ca file on the local DNS server is not current.
D. The named program is not running on the clients.
Answer: C

6. When deploying multiple client workstations with similar configurations, which of the following are NOT advantages of imaging (cloning) these workstations? (Choose two.)
A. Easier backup
B. Faster disk access
C. Quicker system recovery
D. Mass installation
E. Individual customization
Answer: BE

7. You have two RAID 1 arrays on the system. The first array consists of a 10 gigabyte disk and a 20 gigabyte disk. The second array consists of a 15 gigabyte disk and a 40 gigabyte disk. What is the largest volume size possible on each array? (Choose two.)
A. 10 gigabytes
B. 15 gigabytes
C. 20 gigabytes
D. 30 gigabytes
E. 40 gigabytes
Answer: AB

8. Tom wants to put a RAID on his NIS server, chewy. Tom is concerned about the integrity of the data on chewy, and he wants to be able to sustain a one-disk failure without having to restore from backup. He also wants to use four hard disks. Which of the following arrays should he NOT use?
A. RAID 0
B. RAID 5
C. RAID 10
D. RAID 0+1
Answer: A

9. Jane wants to install a Linux distribution on her desktop. She has decided to perform an NFS installation. Which of the following programs MUST be running on the NFS server in order for her to accomplish this? (Choose three.)
A. rpc.portmapper
B. rpc.mountd
C. rpc.pcnfs
D. rpc.nfsd
E. rpc.rstat
Answer: ABD

10. Wes has made an image of the network boot disk and wants read and write permissions. The source files are in /src/version, and the client machine's IP address and subnet mask are 192.168.2.2 and 255.255.255.0, respectively. Which of the following entries should Wes add to the /etc/exports file to enable sharing of the installation media from the NFS server?
A. /src/version 192.168.2.2/255.255.255.0(all)
B. 192.168.2.2/255.255.255.0 /src/version(rw)
C. 192.168.2.2/255.255.255.0 /src/version (all)
D. /src/version 192.168.2.2/255.255.255.0(rw)
Answer: D

11. After editing the /etc/exports file on the NFS server, which of the following best describes what MUST be done before an NFS installation can begin?
A. The rpc.nfsd and rpc.mountd daemons MUST be restarted.
B. The rpc.etherstat and rpc.portmapper daemons MUST be restarted.
C. The NFS daemon MUST re-initialize rpc.nfsd and rpc.nfsclientd.
D. The kernel MUST be recompiled to update the necessary shared libraries.
Answer: A

12. Joni has copied the kernel to a floppy recovery disk and wants to copy the root file system to a second empty disk. Three hundred and twelve records were reported when the kernel was copied, and she wants to copy the file system to floppy /dev/fd0. Which of the following commands should Joni use?
A. dd if=rootfs.gz of=/dev/fd0 bs=1k seek=312
B. dd of=rootfs.gz if=/dev/fd0 bs=1k seek=312
C. cp if=rootfs.gz if=/dev/fd0 bs=1k
D. cp of=rootfs.gz if=/dev/fd0 bs=1k
E. dd if=rootfs.gz of=/dev/fd0 bs=1k
Answer: E

13. In the event that a Linux system is unbootable, what basic parts MUST be on a rescue disk in order to boot Linux? (Choose two.)
A. kernel
B. fdisk
C. file system
D. XFree86Config
E. /etc/passwd
Answer: AC

14. Pat is making a file system that will reside on a recovery disk. The kernel and the file system will be on the recovery disks instead of the physical hard drive. Why would Pat have to alter some of the files (such as the rc file) in the /etc directory for this recovery disk?
A. Certain files need to be altered so they know to read from the recovery disk instead of the hard disk.
B. Some files need to be altered so they can copy the file system and kernel to the hard drive.
C. Without altering some of the files, the system will not be able to boot because shared libraries will not be included.
D. Some files should be altered so the root user can log into the X display manager.
Answer: A

15. After creating a recovery file system and building a kernel for the recovery disk, which command will directly copy the kernel to the floppy /dev/fd0?
A. cp if=KERNEL of=/dev/fd0
B. cp -b if=/dev/fd0 of=KERNEL bs=10k
C. rawrite of=KERNEL if=/dev/fd0 bs=1k
D. dd if=KERNEL of=/dev/fd0 bs=1k
Answer: D

16. The following block of code was taken from the /etc/X11/prefdm configuration file. What is it responsible for doing?
preferred=
if [ -f /etc/sysconfig/desktop ]; then
source /etc/sysconfig/desktop >/dev/null 2>&1
[ -n "$DISPLAYMANAGER" ] && DESKTOP=$DISPLAYMANAGER
if [ "$DESKTOP" = GNOME ]; then
preferred=gdm
elif [ "$DESKTOP" = "KDE" -o "$DESKTOP" = "KDE1" -o "$DESKTOP" = "KDE2" ]; then
preferred=/usr/bin/kdm
elif [ "$DESKTOP" = AnotherLevel ] ; then
preferred=/usr/X11R6/bin/xdm
fi
fi
A. It specifies the background in the display manager.
B. It specifies the gdm login manager logo.
C. It specifies the preferred display manager.
D. It specifies the default shell to be used.
Answer: C

17. Emilie wants to change the gdm logo. Which of the following lines should she edit in the gdm.conf file?
Line1 [greeter]
Line2 Browser=0
Line3 DefaultFace=/usr/share/pixmaps/nobody.png
Line4 DefaultLocale=english
Line5 Exclude=bin,daemon,adm,lp,sync,shutdown,halt,mail,news, uucp,operator,nobody
Line6 Font=adobe-helvetica-bold-r-normal-*-*-180-*-*-*-*-*-*
Line7 GlobalFaceDir=/usr/share/faces
Line8 Icon=/usr/share/pixmaps/gdm.xpm
Line9 LocaleFile=/etc/X11/gdm/locale.alias
Line10 Logo=/usr/share/pixmaps/gnome-logo-large.png
A. Line 3
B. Line 4
C. Line 8
D. Line 9
E. Line 10
Answer: E

18. The following lines were taken from the "/var/X11R6/lib/gdm/Init/Default" configuration file. What do they do?
#!/bin/bash
pidof -s kdm > /dev/null 2>&1
if [ $? -eq 0 -a -x /usr/bin/kdmdesktop ]; then
/usr/bin/kdmdesktop
else
/usr/X11R6/bin/xsetroot -solid "#356390"
fi
if [ -x /usr/bin/xsri ]; then
/usr/bin/xsri -geometry +5+5 -avoid 300x250 -keep-aspect \
/usr/share/pixmaps/transparent.png
A. They specify the gdm logo.
B. They specify the background in the display manager.
C. They specify the default shell to be used.
D. They specify the preferred display manager.
Answer: B

19. A system administrator has just finished recompiling the kernel and must now run LILO. She copied the new kernel to the same file as the old kernel and did not back up the old kernel image. The system is configured to put the boot loader in the MBR. Which of the following statements best describes the action that will be performed when the lilo command is given?
A. The LILO daemon will be restarted and copied to the Master Boot Record.
B. LILO will re-read its configuration file and back up the old configuration to the Master Boot Record.
C. LILO will write lilo.conf to the Master Boot Record.
D. LILO will rewrite the Master Boot Record.
Answer: D

20. Paul, a system administrator, runs a Web server that is prone to frequent unannounced power disruptions. When an unannounced power loss occurs, Paul needs to get the server back online as quickly as possible after the power has been restored. Which of the following would facilitate the fastest recovery?
A. Advanced Power Management Daemon
B. Automated fsck
C. Software RAID 0
D. Hardware RAID 0
E. File system journaling
Answer: E

21. Journaling allows file systems to recover more quickly after a system has crashed because it uses a journal to keep track of __________.
A. Directory Structure
B. The File System Hierarchy
C. File Metadata
D. File Contents
Answer: C

22. A Linux system administrator wants to implement journaling on the system. Which of the following file systems should he use?
A. minixfs
B. NTFS v5.0
C. FAT32
D. EXT2
E. ReiserFS
Answer: E

23. Joe has a Linux machine with a working firewire (IEEE 1394) based scanner. Ali just bought the same device, but he is unable to configure the scanner on his Linux machine. Which of the following is a valid fix for Ali's problem?
A. Use an unpatched 2.4.0 kernel and compile it with firewire support.
B. Use an unpatched 2.2.0 kernel and compile it with firewire support.
C. Download the appropriate driver from IEEE.org.
D. Enable plug-and-play support in the BIOS.
Answer: A

24. Which of the following command sequences will correctly recompile the kernel, make it bootable, and correctly recompile and place modules in the proper location?
A. make modules; make modules_install; lilo; make bzImage
B. make modules_install; make modules; make bzImage;lilo
C. make modules; lilo; make modules_install; make bzImage
D. make modules; make modules_install; make bzImage; lilo
Answer: D

25. The system administrator would like to view the memory usage of process 1900. He decides to mine /proc for the necessary information. Which file in /proc contains such information?
A. 1900/vusage
B. 1900/smem
C. 1900/statm
D. 1900/mem
Answer: C

26. The tool ProcMaker is used to convert /proc data into readable information. What else can ProcMaker do? (Choose three.)
A. Monitor e-mail
B. Display /proc data in a graphical format
C. Adjust partition sizes
D. Monitor the temperature of the processor
E. Adjust the DMA zone
Answer: ABD

27. When monitoring the performance of a computer system, to what does the Heinsberg Principle refer?
A. The unpredictable effects on performance when the configuration is changed
B. The effect that the monitoring process has on the system being monitored
C. The periodic degradation of the system resources as systems are allowed to run
D. The use of a remote method of monitoring and analyzing the data of an entire system
Answer: B

28. The system administrator is mining the /proc file trying to find out the speed of his processor. In which of the following files should the administrator look?
A. cpuinfo
B. cputype
C. cputime
D. cpustat
E. cpu
Answer: A

29. Which of the following correctly defines /proc and describes its function?
A. It is a pseudo file system that can be used to access internal system information. It helps the administrator keep track of a system's vital information.
B. It is a directory that allows procedures to run without affecting other applications. It maintains and manages the free resources of a system.
C. It is a pseudo file system that allows a normal user to reassign system resources to RAM.
D. It is a directory. It acts as a storage bin for process logs and any other monitoring information produced by the system.
Answer: A

30. The log files on a particular system have grown to nearly fill the local hard disk. How can the system administrator continue to create logs without filling the hard disk?
A. Use the syslog.conf file to limit the file size with the directive "logsize=Xkb."
B. Enter the line "*.*@servername" in the syslog.conf file to send the logs to a separate server.
C. Use the " -C" flag after the directory name in the syslog.conf file to compress the logs.
D. Use the "wu_ftpd.*" directive in the syslog.conf file to FTP the existing log files to an archive server.
Answer: B


© 2014 Cheat-Test.com, All Rights Reserved