2. The table shows the users and groups that have permission to access a file and the permissions they have in a Windows XP system. If User1 is a member of the User group but not a member of the Administrator group, which users can delete the file?
administrators only**
any member of the Administrator and User groups
User1 and any member of the Administrator group
any member of the User group only
User1 only
3. A technician in a small company has been asked to install Windows 2000 onto a laptop that belongs to a manager. Which installation option should the technician choose?
typical
mobile
custom
portable**
compact
4. What is the name of the standard X Window terminal program?
Xterm**
xshell
cli-win
cli-shell
5. When developing a network security plan, what are three factors that should be considered? (Choose three.)
the type of business conducted by the company and any laws pertaining to confidentiality of data**
the type of hardware being used by the company**
the geographic location and industry ranking of the company
the type of data stored on the company network**
the management philosophy and how it is presented to employees
6. Which of the following is the most popular type of package manager available for Linux?
DBM
RPM**
WINZIP
PKZIP
7. The administrator of a Windows 2000 system believes that the reason for the reduced performance of the network is due to the condition of the server's disks. What Windows 2000 tool can the administrator use to get the most complete information regarding the status of the disks on the server?
Right-click on My Computer and select Properties.
Click on Start > Control Panel > Administrative Tools > Computer Management.
Click on Run and enter msconfig in the text box.
Click Start > Accessories > System Tools > Disk Management.**
8. Which command is used to change groups after a user has logged into a system?
newgrp
changegrp
switchgrp
sgrp
chgrp**
chgroup
9. Which mode of the vi text editor will be accessed by typing a colon (:)?
edit
entry
command**
last-line
10. Which two of the following commands can be used to configure security for a Linux system that is acting as a dedicated firewall? (Choose two.)
ipconfig
ipchains**
iptrans
iptables**
ifconfig
11. What are two ways a Windows client can connect to a shared network printer? (Choose two.)
Add Printer Wizard
Net Connection Wizard**
net connect command
net use command**
12. Which of the following Linux commands is used to create a directory?
diradd
mkdir**
dir
touch
makedr
13. What is the function of the netstat utility?
It displays the manufacturer and version of network devices.
It is the part of the SNMP suite, which collects network usage information.
It is a Linux utility for collecting information about other devices that are connected to a network.
It converts an IP address to a MAC address.
It displays information about a network such as connections, routing tables, and interfaces.**
14. Which of the following statements is true of NIS?
The NIS domain name must be the same as the Internet DNS domain name.
Changes to the NIS database can be made on any NIS server and will be replicated throughout the system.
Slave servers provide load sharing for the NIS server.
All NIS configuration changes to an NIS client must be performed in an ASCII text editor.
For security purposes, it is recommended that the yppasswd command be used to set a different NIS user password than the one on the local machine.**
15. A technician is given a Windows 2000 computer that apparently has an inoperable modem card. What should the technician do first?
take the case off the computer and make sure the modem card is properly seated in the expansion slot**
remove the suspect card and replace it with another one to see if the fault goes away
check in Device Manager to see if there are any icons next to the modem device
left-click on My Computer and then click on Explore to detect any faults within the system
double-click on My Computer and then Dialup Network Connections to determine if Windows recognizes the modem device
16. Which two of the following are common Linux super-servers? (Choose two.)
inetd.d**
initd.d
inet.d
xinetd.d**
xinit.d
xinitd.d
17. A technician wishes to load Linux onto a new computer system that currently has no operating system loaded on the single hard drive. The technician wishes to boot from the installation CD but the message 'Media error' keeps appearing. What should the technician do next?
check the BIOS to make sure the CD-ROM is the first boot device**
make sure the cable to the CD-ROM is inserted correctly
partition the disk using fdisk
boot from a boot floppy
try booting from a different Linux distribution
18. Which file system type is recommended for a Linux hard disk partition to be used for applications and data?
ext2
ext3
reiser**
boot
swap
19. Which of the following, when used with the telinit command, will cause a system to read the /etc/inittab file and implement new changes?
s
o
q**
z
20. If network users cannot access an FTP server, what are two ways to stop and restart the FTP service on a Windows 2000 server? (Choose two.)
use the IIS Wizard
click on the Services and Applications > Services tab in the MMC**
enter netstat -halt at the command line
select Control Panel > Administrative Tools > Services**
select IIS Maintenance Console > Services
21. In Windows 2000 Professional, which of the following functions can a user perform without administrator rights?
add a mapping to a network printer
manage the domain configuration**
assign permissions to a user account
manage security policies
22. Which of the following situations can be addressed by using the fsck command?
A user has been given the job of creating two new partitions on an existing hard drive.
A user must change the permissions on three existing files without changing any existing permissions on the directory where the files are stored.
A user must repair the file structure after an unexpected power failure causes a system to abruptly shut down.**
A user must batch create home directories for seven new users.
23. An instructor in a small college is putting together systems on which students will practice installing Windows 2000 Advanced Server. The instructor has been given 133 MHz Pentium computers with 128 MB of RAM, 2 GB hard drive, and a 12X CD-ROM drive. Which component needs to be upgraded to bring the machines up to the recommended standard for Windows 2000 Advanced Server?
CPU
RAM**
hard drive
CD-ROM drive
24. Which four parts of a Linux file system are often located in dedicated partitions? (Choose four.)
/**
/boot**
/etc/httpd
/home**
/mnt
swap file**
25. A technician has determined that the reason a Linux system refuses to boot is that the /etc/fstab file is corrupt. What should the technician do to try to repair the system?
use an MS-DOS boot disk to boot the system and then use the MS-DOS edit utility to repair the /etc/fstab file**
boot the system using an emergency boot disk floppy and then edit the /etc/fstab file on the hard drive
boot the system using the emergency repair disk and then run fdisk /mbr
run the Linux installation program from the installation CD and select Repair fstab when it reaches the disk partitioning step
26. Which Linux partition generally contains the kernel?
/boot**
/
root
swap
27. Which two of the following standards describe proper security for usernames and passwords? (Choose two.)
A complex password convention is less important than having a complex standard regarding usernames.
All passwords should be a short combination of easily remembered letters and numbers so that users will not need to write their passwords down.**
The level of password control for assigning passwords should match the level of protection required.
Both usernames and passwords should periodically expire to ensure maximum security.**
Password expiration and lockout rules should be clearly defined and communicated to network users.
28. What is the System Monitor tool?
It is an MS-DOS utility that displays current CPU usage only.
It is an MS-DOS tool that displays information about the usage of a variety of resources.
It is a tool available in Windows 2000 and XP that will display the current state of a number of system resources in a textual format.
It is a Windows 2000 and XP tool that shows graphically the utilization of a number of system resources over a period of time.**
29. Which of the following commands will show a listing of all the Linux commands and a brief description?
man man
man intro**
man list
man more
man command
30. What are three network operating systems? (Choose three.)
Windows XP**
Windows 98
Windows ME
Windows NT**
Windows 2000**
31. Which of the following commands can be used to specify the user and group ownership of a file?
Chown**
chgrp
usermod
groupmod
filemod
more
32. A technician is setting up a Windows workstation that has an IP address of 192.168.64.23 to work on a network that contains a Linux file server with the IP address 192.168.64.2. What should the technician do to view the IP configuration on the workstation?
run ipconfig /all on the workstation**
run ipconfig 192.168.64.23 on the workstation
run ping 192.168.64.2 on the workstation
run ifconfig addr 192.168.64.23 on the server
run ping 192.168.64.23 on the server
33. Which of the following is considered good practice when partitioning a hard disk for a new OS? (Choose two.)
A third party partitioning tool that supports the operating systems to be installed should be used.**
MS-DOS fdisk should be used, as it creates partitions that are compatible with all major operating systems.
The partitioning tool that comes with the OS should be used to create the partitions for that OS, if no other options are available.
Partitions should be as large as the disk will allow to provide room for future expansion.
Partitions should be made as small as possible and FIPS used to adjust them later as necessary.**
34. Which three of the following statements about memory are true? (Choose three.)
RAM is faster than the hard disk of a computer.**
Hard disks normally have smaller storage capacity than RAM.
Virtual memory can be used to compensate for a lack of physical memory.**
Virtual memory must be managed manually.
A lack of available RAM will impact the performance of a computer.**
35. Which are three reasons a company may choose Linux over Windows as an operating system? (Choose three.)
It is difficult to buy a new computer with a server version of Windows pre-installed.
There is more application software available for Linux.**
Running a Linux server without a GUI will increase efficiency and reliability. This option is not available in server versions of Windows.**
After a user has purchased a copy of Linux, it can be installed on any number of computers for no additional charge.
After a user has purchased a copy of Windows, it can be installed on any number of computers for no additional charge.
By default, users must provide a username and password to log into a Linux system, which improves system security.**
36. A user wants to give other network users access to a folder on a Windows 2000 system. After right-clicking on the folder, which item should the user select?
Sharing**
Rights
Permissions
Properties
Security
37. Which three of the following file systems can be used to format a Windows NOS partition? (Choose three.)
ext2
FAT**
FAT32**
HFS
NTFS**
vfat
38. Which of the following commands would allow a user to switch from a user account to the root account to execute a program that requires root permissions?
switch
flip
logon
su**
jump
39. Which tool, native to Windows XP, is used to monitor system resources?
SysScan
Performance Tool**
XPMON
XP Benchmark Tool
System Safeguard
40. Why might the administrator of a small company choose Windows 2000 Server instead of Windows 2000 Professional?
The operating system is to run on a dual-processor system.
The system is to act as a DNS server.**
The company needs an intranet based on a small web server.
The server will be accessed by up to ten simultaneous users.
41. How can an administrator assist a Windows 2000 user with a forgotten password?
set a new password for the user in the Computer Management tool**
enter the Computer Management tool, click on the user, and then select Properties > Password to display the password
switch to the user account from the administrator account and select Set Password from the Control Panel
log in as the user using the administrator password, enter Ctrl-Alt-Del, and click on Change Password
delete the user account from the Computer Management tool and create a new user account
e-mail Microsoft to request a new password for the account, which will then be e-mailed directly to the user
42. Which two of the following standards are necessary for proper virus protection? (Choose two.)
Virus protection software should only be installed on client workstations that have Internet access.
Virus protection software should only be installed on servers that can be accessed by remote clients.
Virus protection software should be installed on all workstations and servers.*
All virus warnings should come from at least two network support technicians.
One person should be responsible for communicating virus alerts to all users.*
43. What are three important considerations when designing a server? (Choose three.)
monitor screen size
memory requirements**
CPU speed**
speaker quality
hard disk type**
sound card capabilities
44. Which three of the following statements correctly describe topologies? (Choose three.)
The physical topology of a network refers to the path data travels from a source to a destination.**
The logical topology of a network refers to the path signals travel from a source to a destination.**
A ring topology can refer to either a physical or logical topology.
A logical topology refers to the actual map and layout of a network.
A physical topology describes the actual layout of network devices.**
45. Which extension is found on the end of files that have been compressed using the compress program?
.gz**
.Z
.c
.XZ
46. What allows Linux applications to print to non-PostScript printers?
/etc/lpn
Ghostscript**
LPRng
/etc/printcap
printtool
47. The Apache web server has been installed on a Linux server and is being configured. The administrator wishes to change the location of the web pages that will be served to /home/www and knows that the main configuration file contains this directive. What is the name of the file that needs to be edited?
access.conf
apache.conf
httpd.conf**
inetd.conf
initd.conf
www.conf
48. After configuring Web services with Windows XP, what two methods can be used to view the default web page? (Choose two.)
Users can view the default web page by using the View Web Page tool found under Administrative Tools in the IIS Manager.
Users can view the default web page by submitting the address http://127.0.0.1 via a web browser on the Windows XP server.**
Users can view the default web page by submitting http://www.localstart.asp in the web browser on the Windows XP server.**
Users can view the default web page by submitting the IP address of the Windows XP server via a web browser on the Windows XP server.
49. What are two steps in the creation of a Windows 2000 or Windows XP script? (Choose two.)
write the script code and save as ASCII text
make sure the first line of the script defines the scripting language used**
compile the script into a bytecode file
compile the script into a binary executable file
save the script with the appropriate filename extension for the scripting language used**
50. Which statement accurately describes the Slackware Linux distribution?
It is designed for Linux novices.
It has a range of user interfaces and uses RPM.
It is designed for advanced users and uses text-based configuration tools.**
It is intended solely for non-profit organizations and uses the Debian package manager.
51. What is the name of a free software program that is useful for monitoring security breaches on Linux servers without enhancing security?
3DES
LSAT*
PC Guardian
Winzap
PortSentry
52. A new administrator has discovered that kernel messages are not saved to a log file when the system is booted. The LILO boot loader is used. What can the administrator do to correct this?
put the line dmesg > /var/log/boot.messsages in the /etc/rc.d/rc.local file**
put the line dmesg in the init.conf file
press the F8 button when the system is booted
hold the F6 key down when the system is powered up
put the line messages = /etc/log/boot.messages in lilo.conf
53. Which distribution is one of the oldest and viewed as being one of the most significant?
Caldera
Debian**
SuSE
Red Hat
Slackware
54. While using a non-administrator Windows 2000 account, an administrator is asked to add a new user to the system. What is the easiest way for the administrator to create a new user?
The administrator enters Administrator Tools and then clicks on Computer Management. The administrator will then be able to create a new user.
The administrator enters Administrator Tools without changing to the Administrator account then right-clicks on Computer Management and selects Run as. After entering the Administrator account password the administrator can create a new user.
The administrator clicks on Start > Switch User. The administrator then chooses the Administrator account to create the new user.
The administrator logs out from the the non-administrator account and then logs in as the administrator. The administrator will then be able to create a new user.**
55. If the kill command is used on a computer running Linux without specifying a signal, which signal is used by default?
SIGEND
SIGCTRLC
SIGKILL
SIGTERM**
SIGNAL
56. When using Linux, which of the following commands is used to perform a low-level format?
mkfs
format
df
fdformat**
du
57. Which two of the following statements are true about Linux scripts? (Choose two.)
Scripts cannot contain loops.
Scripts are executed in a top down fashion.*
Scripts can be created using the vi text editor.*
Scripts cannot contain commands.
A script is part of the OS.
58. In Windows 2000, which two categories within Computer Management under System Tools store logged information? (Choose two.)
System Log
Warnings, Errors, and Alerts
Service Log
Performance Logs and Alerts**
Event Viewer**
Network Log
59. Which of the following directories contains most of the Linux system log files?
/etc/log
/etc/sys/log
/var/log**
/var/sys/log
60. Which three of the following network configuration parameters can be set during installation? (Choose three.)
IP address**
MAC address
file server address
DNS server address**
subnet mask**
network type
61. A technician is troubleshooting a Windows machine that is not communicating with the network server. The technician verifies that the server is not reachable and ipconfig shows that the workstation is configured properly. What should the technician do next?
ping the default gateway*
ping 127.0.0.1
check the configuration of the server
tracert to the server
62. Which Microsoft option will use the Internet to contact a vendor's website in search of patches, fixes, and updates?
Secure Update
Flash Update
Windows Update**
Update Manager
Patch Manager
63. Which two of the following devices are most likely to have drivers that are already compiled into a modern Linux kernel? (Choose two.)
1. IRQL_NOT_LESS_OR_EQUAL (0X0000000A) Ini merupakan biangnya biang kerok pada BsOD. Karena umumnya pada BsOD, pesan ini yang paling sering muncul. Pesan kesalahan ini disebabkan umumnya kerena ada ketidakcocokan driver yang terinstall di komputer.
Daftar Penyebab: ? Masalah driver yang bentrok atau tidak cocok ? Masalah Video Card, hal ini mencakup video card yang di overclock melebihi batas atau Anda baru berganti Video card dan Anda belum menguninstall driver Video card lama dari chipset berbeda ? Masalah Audio Card, meliputi kesalahan konfigurasi atau bug dalam driver sound card
2. NTFS_FILE_SYSTEM atau FAT_FILE_SYSTEM (0X00000024) atau (0X00000023) Nah, pesan ini setidaknya sudah sedikit “nyambung” memberikan gambaran di mana kerusakan berada, yaitu ada di partisi atau filesystemnya tetapi bukan di harddisknya. Kita bisa melakukan pengecekan dengan memeriksa kabel SATA atau PATA atau bisa mengecek partisi dengan tool chkdsk.
3. UNEXPECTED_KERNEL_MODE_TRAP (0X0000007F) Bila Anda mendapatkan pesan seperti ini, dapat disebabkan karena: ? Overclock Hardware yang berlebihan ? Komponen komputer yang kepanasan ? BIOS yang korup ? Memory dan CPU yang cacat
4. DATA_BUS_ERROR Pesan ini disebabkan karena adanya kemungkinan bahwa memory atau slot memory di motherboard rusak.
5. PAGE_FAULT_IN_NONPAGED_AREA Disebabkan karena adanya kerusakan hardware, termasuk memory utama, memory video card, atau memory di processor (L2 Cache)
6. INACCESSIBLE_BOOT_DEVICE Disebabkan karena adanya kesalahan dalam konfigurasi jumper harddisk yang salah, virus boot sector, driver IDE controller yang salah, atau kesalahan driver chipset.
7. VIDEO_DRIVER_INIT_FAILURE Kesalahan terjadi pada instalasi driver video card yang kurang sempurna, restart pada saat instalasi atau juga dapat terjadi karena kesalahan dalam instalasi driver.
8. BAD_POOL_CALLER Kesalahan ini dapat terjadi karena kesalahan atau driver yang tidak kompatibel. Sering terjadi saat melakukan instalasi XP dari upgrade, atau bukan dari instalasi baru.
9. PEN_LIST_CORRUPT Pesan ini disebabkan karena adanya kerusakan RAM
10. MACHINE_CHECK_EXCEPTION Disebabkan oleh cacatnya CPU, atau yang di overclock secara agresif, serta power supply yang kekurangan daya atau rusak.