Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

SAIR 3X0-204 Exam - Cheat-Test.com

Free 3X0-204 Sample Questions:

1. What will the following command cause Sendmail to do?
/usr/lib/sendmail -q2h
A. It will remove all messages that have been in the queue for two hours or more
B. It will run in quiet mode and wake up every two hours
C. It will notify users of new mail every two hours
D. It will process the queue every two hours
E. It will print all headers from messages received the last two hours
Answer: D

2. Bobby, a user, wishes to access her e-mail from her machine at work and at home. She has multiple folders in her e-mail account, which she would like to preserve between the two locations. Which of the following is the best protocol for the user to retrieve her mail from the mail server?
A. POP
B. IMAP
C. SMTP
D. FTP
E. UUCP
Answer: B

3. Which of the following are reasonable steps for a system administrator to take to reduce the amount of spam received by users of an e-mail system?
A. Only accept e-mail from trusted hosts
B. Only accept inbound e-mail for users in this domain
C. Use the DNS blacklist service to refuse e-mail from known spam sources
D. Disable any accounts which receive spam
E. Filter e-mail headers for known spam subject lines
Answer: BCE

4. Which of the following is processed before any other precedence in the mail queue?
A. special-delivery
B. bulk
C. junk
D. first-class
E. list
Answer: A

5. The system administrator has stopped the sendmail daemon for maintainence, but now wishes to make another attempt to deliver all messages in the mail queue. Which of the following Sendmail commands tells Sendmail to process the mail queue once?
A. sendmail -q
B. sendmail -f
C. sendmail -b
D. sendmail -p
Answer: A

6. A user (joebloggs) on a Sendmail-based system would like to have any incoming e-mail forwarded to a new account with the name jbloggs. What are the necessary steps to make this possible?
A. Edit the .mail file in joebloggs's home directory and enter the line "fwd jbloggs"
B. Create a file called ".forward" in joebloggs's home directory then enter the line "jbloggs@example-domain.org"
C. Create the file ".fwd" in joebloggs's home directory and enter the line "fwd jbloggs"
D. Edit the .forward file in jbloggs's home directory and then enter the line "joebloggs@example-domain.org"
E. Edit the .email file in the home directory; under the inbox directive change forwarding from "null" to "jbloggs@example-domain.org"
Answer: B

7. Which of the following functionalities do MTAs provide?
A. They deliver outbound e-mail to remote servers
B. They allow users to read their e-mail
C. They listen for inbound mail from remote servers
D. They pass e-mail for local users to the MDA
E. They accept e-mails from the MDA
Answer: ACD

8. Which of the following are well-known MTAs?
A. Procmail
B. Sendmail
C. Netscape
D. Pine
E. Qmail
Answer: BE

9. The system administrator is installing a new e-mail server, and has decided to use separate partitions for /var/spool/mqueue and for /var/spool/mail. Which of the following partition file-system choices would be most appropriate?
A. /var/spool/mail should have a larger blocksize than /var/spool/mqueue
B. /var/spool/mail should have more inodes than /var/spool/mqueue
C. /var/spool/mqueue should have a larger blocksize than /var/spool/mail
D. /var/spool/mqueue should have more inodes than /var/spool/mail
E. /var/spool/mail should be mounted read-only
Answer: AD

10. Which of the following is a result of remounting a partition with the option "noatime" for a separately mounted /var/spool/mqueue?
A. Quicker disk access on systems with a lot of messages
B. Slower disk access on systems with few messages
C. Maximized disk space
D. Quicker mounting of the partition
Answer: A

11. A system administrator routinely has trouble with Sendmail not processing mail due to too many client POP and IMAP requests. Which of the following is the best way to correct this problem?
A. Disable connections if the load average gets too high
B. Disable processing if the load average gets too high
C. Disable queuing if the load average gets too high
D. Install additional mail servers and distribute users and/or email services among them
E. Run Sendmail with the lowest possible priority
Answer: D

12. The system administrator has determined that mail processing is putting too much load on the e-mail server. Which of the following is the best way to lower the general overhead of message processing?
A. Disable user connections with the RefuseLA option
B. Disable mail queuing with the QueueLA option
C. Disable spam checking
D. Place mail queues on RAID
Answer: C

13. Which of the following tools can be used to set the appropriate blocksize and inode count for partitions, such as those used for the mail queue or mail spool?
A. df
B. dumpe2fs
C. mount
D. du
E. mke2fs
Answer: E

14. The system administrator wants to add the noatime option to the mail queue directory. Given that the /dev/hda6 is currently mounted as /var/spool/mqueue, what command will achieve this?
A. mount /dev/hda3 /var/spool/mqueue noatime
B. mount -o remount,noatime /dev/hda3
C. setfs /dev/hda3 noatime
D. mount -o noatime /var/spool/mqueue /dev/hda3
E. mount -r /dev/hda3 -o noatime
Answer: B

15. Sendmail gives users the option to modify the "From:" address if the user has been added to the trusted users list. By default, general user accounts will not be listed. Why?
A. to prevent users from faking the receiving e-mail address
B. to prevent users from faking the originating e-mail address
C. to allow users to send anonymous e-mail
D. to allow users to send e-mails to anonymous e-mail addresses
Answer: B

16. Which of the following list of features does Webmin provide?
A. Webmin allows limits on the disk space and memory usage of Sendmail
B. Webmin allows easy configuration of many Sendmail settings
C. Webmin provides a web-based e-mail client
D. Webmin adds extra security features to Sendmail
E. Webmin can start and stop the Sendmail daemon
Answer: ABE

17. What can be determined from the following excerpt from a DNS record?
IN MX 21 server1.testdomain.com
IN MX 20 server2.testdomain.com
IN MX 19 server3.testdomain.com
A. The primary mail server for testdomain.com is server1
B. The primary mail server for testdomain.com is server2
C. The primary mail server for testdomain.com is server3
D. testdomain.com has no primary mail server
E. DNS will be unable to reconcile the primary name server
Answer: C

18. Which of the following does Sendmail check to ensure the identity of a server from which it is receiving e-mails?
A. The From: field in the header
B. The SMTP interface
C. The HELO message
D. The Hmessage-id: field in the header
Answer: C

19. What does Sendmail generally do with incoming messages from a server with a forged identity?
A. The message is delivered with the forged address as the sender, but the real address is listed in the "Received:" field in the header
B. The message is delivered with the correct address in place of the forged address
C. The message is returned to the real address
D. The message is ignored and removed from the system
E. The message is delivered with the real address as the sender, but the forged address is listed in the "Received:" field in the header
Answer: A

20. What security feature does the /etc/shells file provide to Sendmail?
A. It prevents forged mail from entering the system
B. It prevents unauthorized intrusion through the SMTP interface
C. It prevents users without login permission from running programs on the mail server
D. It prevents the queue from accepting mail that has a suspicious address
E. It prevents unauthorized users from sending mail from the system
Answer: C

21. Any commands placed in the __________ file will be run by Sendmail upon receiving mail, allowing a possible security risk.
A. .forward
B. .queue
C. .include
D. .progs
E. .sh
Answer: A

22. What does Sendmail do with qf files that have failed the security test?
A. It renames them to Qf files and logs the problem
B. It places the file in the queue and logs the problem
C. It ignores errors in qf files
D. It halts operation and logs the problem
E. It removes the qf file from the system and logs the problem
Answer: A

23. Polly, an administrator, would like to turn off Sendmail's aliasing. What command would she most likely use?
A. /usr/lib/sendmail -n
B. /usr/lib/sendmail -alias
C. /usr/lib/sendmail -noalias
D. /usr/lib/sendmail -aliasoff
E. /usr/lib/sendmail -a
Answer: A

24. When connecting to a mail server using the POP3 protocol, a user enters the Authenticate state. Which of the following can the user do in this state?
A. Perform Authentication
B. Change username
C. Change password
D. Change encryption type
E. Quit
Answer: AE

25. Which of the following are states of the IMAP protocol?
A. AUTHENTICATED
B. UPDATED
C. SELECTED
D. TRANSACTION
E. LOGIN
Answer: AC

26. A user (login: user1) wishes to have Sendmail deliver mail to himself, then execute a shell script called "redirect." Which of the following is the fastest way to do this?
A. Put "\user1, | redirect" in .forward
B. Put "\user1, | redirect" in sendmail.cf
C. Edit sendmail.cf to include the REDIRECT option
D. Create a symbolic link from /var/spool/mqueue to redirect
Answer: A

27. Which of the following methods of managing mailing lists is the LEAST efficient method to use?
A. Creating separate mail accounts for each user
B. Creating separate mail accounts for each user, and symbolically linking them
C. Placing a list of recipients in /etc/aliases
D. Using ":include:" in a .forward file
Answer: D

28. User jdoe has mail accounts on two separate systems, system1 and system2. She has created a .forward file on system1 containing the following line. What will be the result?
\jdoe, jdoe@system2.com
A. All mail will be sent to system2 only
B. All mail will be sent to system1 only
C. Mail will be sent to system1 and errors will be returned from system2
D. Mail will be sent to system2 and errors will be returned from system1
E. Mail will be saved locally and be forwarded to system2
F. Mail will not be saved locally and be forwarded to system2
Answer: E

29. How can a user create a forged e-mail message on an e-mail system?
A. Alter an MX record
B. Change the value of MAILER in the sendmail.mc file
C. Connect to the SMTP port with Telnet
D. Add an entry to /etc/aliases without updating the alias database
E. Forward incoming mail to another address
Answer: C

30. Which of the following is NOT a useful security measure for securing Sendmail?
A. Setting read and write access for /var/spool/mqueue and /var/spool/mail to "sendmail" only
B. Restricting access to the SMTP port
C. Performing DNS lookup on remote hosts
D. Performing ident checks on remote hosts
E. Setting permissions on the aliases file to rw-r--r--
Answer: A


© 2014 Cheat-Test.com, All Rights Reserved