Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

HP HP0-094 Exam - Cheat-Test.com

Free HP0-094 Sample Questions:

Q: 1 When mounting a file system from an NFS client, which configuration file is used to name the local mount point?
A. fstab
B. nfstab
C. exports
D. nfs.conf
Answer: A

Q: 2 What is the meaning of the following ARP table entry?
# arp -a
foo (10.0.0.2) at (incomplete)
A. Node foo only supports proxy ARP.
B. The ARP table entry for node foo has expired.
C. An ARP request was sent for node foo, but there was no ARP response.
D. An ARP request was sent for node foo, but only a partial response was received.
Answer: C

Q: 3 How should you grant NFS filesystem access to individual users as opposed to all users?
A. create a group accessible mount point
B. specify a netgroup in the /etc/exports file
C. add the users to the /etc/exports file using the form host:uid/gid
D. add the users to the /etc/exports file using the form host:username
Answer: B

Q: 4 Which protocol allows your server to discover the IP address of another server based on the other server's name?
A. ARP
B. PPP
C. DNS
D. DHCP
E. BOOTP
Answer: C

Q: 5 What is used for the implementation of Internet name designations as specified in RFC 1034 and RFC 1035?
A. INS
B. BIND
C. SIND
D. DHCP
Answer: B

Q: 6 A customer reports that pings to node FOO take a long time, then fail with"unknown host". Of the options given, what is the next logical troubleshooting step?
A. telnet FOO
B. nslookup FOO
C. ps -ade | grep ping
D. ping the IP address of FOO
Answer: B

Q: 7 Which directory does the template for your new sendmail.cf file reside?
A. /etc/mail/
B. /etc/mail/sendmail/
C. /usr/share/sendmail-cf/
D. /usr/newconfig/etc/mail/
E. /var/templates/shared/mail/
Answer: D

Q: 8 Given the following configuration in the named zone file:
hp.com IN MX 10 tiger.hp.com
IN MX 20 mail.hp.com
IN MX 30 relay.hp.com
Assuming tiger.hp.com is NOT accessible through the firewall, which statement is true regarding
messages addressed to tiger.hp.com?
A. Incoming mail will be returned to sender as undeliverable.
B. Incoming mail will arrive on mail and will be forwarded to relay waiting on tiger.
C. Incoming mail will arrive on tiger but will not be accessible until the firewall is turned off.
D. Incoming mail will arrive on mail and will be forwarded to tiger as it becomes accessible.
Answer: D

Q: 9 When you start the sendmail service, you would like to have the mail written to /var/adm/syslog/mail.log. What should you do?
A. Modify the mail.conf file to add the new location.
B. No special action is required because that is the default location.
C. Append -oL/var/adm/syslog/mail.log to the end of command line.
D. Append -f/var/adm/syslog/mail.log to the end of the command line.
E. Append -lf/var/adm/syslog/mail.log to the end of the command line.
Answer: B

Q: 10 When you set up an 8 CPU DHCP server, how many subnets can you configure per pool?
A. 1
B. 2
C. 4
D. 8
Answer: A

Q: 11 Which states are valid for DHCP? (Select two.)
A. init
B. select
C. rebind
D. reboot
E. broadcast
Answer: D, E

Q: 12 Which combination of NFS mount options provides the best chance of avoiding client hangs?
A. retry=2,hard
B. retry=4,soft
C. retry=6,hard,intr
D. retry=3,retrans=6
Answer: B

Q: 13 Which command dismounts an NFS mounted filesystem?
A. mount -r /mnt
B. unmount /mnt
C. mntab -x /mnt
D. umount server:/mnt
Answer: D

Q: 14 During the configuration process for sendmail, which command is run to determine the default hostname to be used for delivery?
A. uname -s
B. getuname
C. sendmail -h
D. hostname -s
E. gethostname
Answer: E

Q: 15 What does the DHCP device group allow for?
A. automatic startup of DHCP tools
B. multiple subnets to be specified for each pool
C. callback routines within the /etc/dcptab file
D. different types of clients to receive different parameters
Answer: D

Q: 16 Execution of the telnet foo command results in a connection refused by foreign host error message. Which file on node foo could be modified to allow TELNET connections?
A. /etc/hosts
B. /etc/networks
C. /etc/inetd.conf
D. /etc/svc.conf
Answer: C

Q: 17 What is an SNMP trap?
A. an event sent by the Network Management Station to a client
B. host response to a Network Management Station status request
C. an unsolicited event notifying the Network Management Station of a change
D. Network Management protocol interrupt generated by a Management Station
Answer: C

Q: 18 Which file is the configuration file for the Network Time Protocol daemon?
A. rc.conf
B. ntp.conf
C. timed.conf
D. ntp_config.file
Answer: B

Q: 19 Which /etc/inetd.conf entries should be disabled in order to disable the remote procedure calls to the system? (Select two.)
A. rpc.rexd
B. rpc.ncall
C. rpc.rusers
D. rpc.remsh
Answer: A, C

Q: 20 In order to restrict the access to the /etc/passwd file through ftp, which statement should be included in the /etc/ftpd/ftpaccess file?
A. noaccess /etc/passwd
B. noretrieve /etc/passwd
C. accessdeny /etc/passwd
D. suppressaccess /etc/passwd
Answer: B

Q: 21 Which file can be used to protect NIS clients from binding to an unauthorized NIS server?
A. /var/yp/securenets
B. /var/yp/securebinds
C. /var/yp/secureclients
D. /var/yp/secureservers
Answer: D

Q: 22 In order to avoid including the ftpd version in the FTP login banner, which statement should be included in the /etc/ftpd/ftpaccess file?
A. suppresssysinfo yes
B. suppressversion yes
C. avoidftpdversion yes
D. suppressftpdversion yes
E. DO_NOT_PRINT_VERSION yes
Answer: B

Q: 23 The sendmail is configured to run as a central post office for your group.
Users are able to send mail to any location but cannot receive mail. What is the problem?
A. Users need to configure sendmail client to view thier mail.
B. Users cannot use sendmail to deliver their mail to a workstation.
C. The system adminstrator needs to set permissions on, so sendmail has privileges.
D. Users need to set permissions on thier mail directory so sendmail has write privileges.
Answer: B

Q: 24 A customer wants to secure their network services. Which file should be edited to deny access to the NFS rpc.mountd by special systems?
A. /etc/services
B. /etc/inetd.conf
C. /var/adm/inetd.sec
D. /etc/rc.config.d/netconf
E. /etc/rc.config.d/nfsconf
Answer: C

Q: 25 In order to avoid including the system's hostname in the FTP login banner, which statement should be included in the /etc/ftpd/ftpaccess file?
A. suppresssystemid yes
B. avoidhostname yes
C. suppresshostname yes
D. DO_NOT_PRINT_HOST_NAME yes
E. suppresssysinfo yes
Answer: C

Q: 26 Which file can be used to protect an NIS server from binding to an unauthorized NIS client?
A. /var/yp/securenets
B. /var/yp/securebinds
C. /var/yp/secureclients
D. /var/yp/secureservers
Answer: A

Q: 27 Your corporate security policy dictates that the operating system version must not be displayed before or after a successful login. Which file should be modified after installing the operating system to meet the stated policy?
A. /etc/motd
B. /etc/issue
C. /etc/services
D. /var/adm/inetd.sec
Answer: B

Q: 28 You new to ensure that only approved networks and hosts are allowed to use the telnet service on the system. Only the 128.1 network, subnets 1-9 on the 128.2 network, and maintenance clients host1 - host4 can be granted access to the telnet service. Which file must be
configured and how?
A. Configure the GSP for the system to control telnet access.
B. Edit the /etc/securtty file and comment out the telnet service.
C. Edit the /etc/inetd.conf file and comment out the telnet service. Execute the command inetd -c to commit the change.
D. Edit the /etc/default/security file and include the entry "telnet allow 128.1.*.* deny 128.2.10*.* host1-4".
E. Edit the /var/adm/inetd.sec file and include the entry "telnet allow 128.1.*.* 128.2.1-9.* host1 host2 host3 host4".
Answer: E

Q: 29 In order to restrict the access to the /etc/shadow file through ftp, which statement should be included in the /etc/ftpd/ftpaccess file?
A. noaccess /etc/shadow
B. noretrieve /etc/shadow
C. accessdeny /etc/shadow
D. suppressaccess /etc/shadow
Answer: B

Q: 30 To restrict root login to the console, which file must be configured?
A. /etc/services
B. /etc/securetty
C. /etc/inetd.conf
D. /etc/default/security
Answer: B


© 2014 Cheat-Test.com, All Rights Reserved