Anda di halaman 1dari 11

Exam Title

: Novell 050-710 : Novell Certified Linux Administrator

Version : R6.1

www.Prepking.com

Prepking - King of Computer Certification Important Information, Please Read Carefully


Other Prepking products A) Offline Testing engine Use the offline Testing engine product to practice the questions in an exam environment. B) Study Guide (not available for all exams) Build a foundation of knowledge which will be useful also after passing the exam. Latest Version We are constantly reviewing our products. New material is added and old material is updated. Free updates are available for 90 days after the purchase. You should check your member zone at Prepking and update 3-4 days before the scheduled exam date. Here is the procedure to get the latest version: 1.Go towww.Prepking.com 2.Click on Member zone/Log in (right side) 3. Then click My Account 4.The latest versions of all purchased products are downloadable from here. Just click the links. For most updates,it is enough just to print the new questions at the end of the new version, not the whole document. Feedback If you spot a possible improvement then please let us know. We always interested in improving product quality. Feedback should be send to feedback@Prepking.com. You should include the following: Exam number, version, page number, question number, and your login ID. Our experts will answer your mail promptly. Copyright Each PDF file contains a unique serial number associated with your particular name and contact information for security purposes. So if we find out that a particular PDF file is being distributed by you, Prepking reserves the right to take legal action against you according to the International Copyright Laws. Explanations This product does not include explanations at the moment. If you are interested in providing explanations for this exam, please contact feedback@Prepking.com.

www.Prepking.com

1. Which command is used to enter or change the quota for user tux? A. quotacheck B. repquota tux C. edquota -u tux D. edquota -g tux E. /sbin/quotaon tux Answer: C 2. In which file is the host name of a Linux computer configured? (Hint: You do not need to include the entire patH. ) Answer:______ Answer: 3. Which is the main configuration file for logrotate? A. /etc/logrotate B. /etc/logr.conf C. /etc/cron/logrotate D. /etc/logrotatE. conf Answer: D 4. Which statement about the /sbin/ldconfig command is correct? A. The ldconfig command is used to link directories. B. The ldconfig command is used to configure an LDAP connection. C. The ldconfig command is used to update the software library cachE. D. The ldconfig command is used to show dynamic libraries needed by a program. Answer: C 5. As system administrator root, you use the lpoptions command to change printer options, such as the page sizE. To which file are these options saved? A. ~/.bashrc B. ~/.lpoptions C. /etc/cups/lpoptions D. /etc/sysconfig/cups Answer: C 6. You want to view the last 20 lines of the /var/log/messages file and any new lines that are subsequently added by syslog to this filE. Which command would you use? A. tail -20f /var/log/messages B. end -20f /var/log/messages C. less -20f /var/log/messages

www.Prepking.com

D. follow -20 /var/log/messages Answer: A 7. You would like to run command1 and then command2, whether or not command1 completed successfully. Which command accomplishes this task? A. command1 | command2 B. command1 ; command2 C. command1 > command2 D. command1 & command2 Answer: B 8. What is the minimum number of partitions required by a SLES 10 system? A. None B. 1 C. 2 D. 4 Answer: C 9. Which statements about partitions are correct? (Choose 3.) A. Extended partitions can be subdivided into logical partitions. B. A primary partition consists of a continuous range of cylinders. C. Logical partitions do not require entries in the main partition tablE. D. If you use only primary partitions, you are limited to eight partitions per disk. E. SUSE Linux Enterprise Server 10 can only be installed on a primary partition. F. To install more than one operating system on a partition, the partition has to include the entire cylinder rangE. Answer: ABC 10. Which user authentication methods can be used with SLES 10? (Choose 4.) A. NIS B. WEP C. SSH D. PAM E. LDAP F. Handshake G. Windows Domain H. Local (/etc/passwd) Answer: AEGH 11. What information do you need to set up an LDAP client? (Choose 4.)

www.Prepking.com

A. LDAP version B. LDAP base DN C. Kind of encryption D. Synchronization frequency E. Address of the LDAP server F. File name of the LDAP database Answer: ABCE 12. Which are journaling file systems? (Choose 3.) A. XFS B. ext2 C. ext3 D. VFAT E. minix F. VFAT32 G. ReiserFS Answer: ACG 13. How large is an inode? A. 256 bits B. 64 Kbytes C. 128 bytes D. 1 Mbyte Answer: C 14. Which command can be used to view the inode assigned to a filename? A. ls -i B. fsck -h -i C. inode --list D. cat /proc/inodes Answer: A 15. Why are the noauto and users options used with /etc/fstab? A. A normal user is not allowed to access this partition. B. They allow any user to mount and unmount a partition. C. They specify the partitions that are bootable by a user. D. They specify the partitions that are not bootable by a user. Answer: B 16. What is the correct order of steps to change the partition table using fdisk?

www.Prepking.com

A. You can't use fdisk to change a partition tablE. B. Start fdisk > Change the partition table > Write the partition table to hard disk > Exit fdisk > Reboot. C. Start fdisk > Change the partition table > Write the partition table to hard disk > Exit fdisk > Load the partition table from the boot prompt. D. Start fdisk > Change the partition table > Write the partition table to floppy disk or USB stick > Exit fdisk > Boot from floppy disk or USB stick. Answer: B 17. Which command can you use to create a Reiser file system on the sda6 partition? (Choose 2.) A. mkreiserfs /dev/sda6 B. fdisk.reiserfs /dev/sda6 C. makE. reiserfs /dev/sda6 D. fdisk -t reiserfs /dev/sda6 E. mkfs -t reiserfs /dev/sda6 Answer: AE 18. Which command can you use to check an ext2/ext3 file system for a correct superblock, faulty data blocks, or faulty allocation of data blocks? A. df B. du C. fdisk D. e2fsck E. reiserfsck Answer: D 19. Waht is the correct syntax for mounting the second partition of the first SCSI hard disk? A. mount /mnt /dev/hda2 B. mount /dev/hda2 /mnt C. mount /dev/sdb1 /mnt D. mount /mnt /dev/sdb1 E. mount /dev/sda2 /mnt F. mount /mnt /dev/sda2 Answer: E 20. Which statements about the LVM components are correct? (Choose 2.) A. A volume group is part of a logical volumE. B. Logical volumes are grouped in a master group. C. A volume group always consists of one physical volumE. D. A physical volume can be a partition or an entire hard disk.

www.Prepking.com

E. A volume group can be reduced in size by removing physical volumes. F. The operating system accesses the volume groups like conventional physical partitions. Answer: DE 21. Which are benefits of using LVM? (Choose 4.) A. You can increase data security. B. You can create extremely large logical volumes. C. You can add logical volumes in a running system. D. You can add hard disks to a volume group in a running system. E. You can reduce the size of a logical volume without unmounting it. F. The snapshot feature allows consistent backups in a running system. Answer: BCDF 22. What is the result of the following command? (Choose 2.) dd if=/dev/zero of=/dev/hdd bs=512 count=1 A. Overwrites an existing partition table B. Creates a LVM partition of 512 blocks C. Backs up the /dev/zero and /dev/hdd files D. Writes zeros in the first 512 bytes of the first hard disk block E. Assigns the physical volume zero to the logical volume hdd Answer: AD 23. Which RAID level is described by the following sentence? This level improves the performance of your data access; however, it does not provide redundancy. A. RAID 0 B. RAID 1 C. RAID 4 D. RAID 5 E. RAID 6 Answer: A 24. You entered your quota information in /etc/fstaB. What do you have to do next? A. Generate a quota report. B. Initialize the quota system. C. Configure limits for users and groups. D. Remount the file system for the quotas to be defineD. Answer: D 25. Which statements about PAM are correct? (Choose 3.) A. To enable authentication with PAM, you need a smart cart reader.

www.Prepking.com

B. Each line in a PAM configuration file contains 6 columns plus optional arguments. C. Configuration files of PAM modules can be found in /etc/pam.d/ and /etc/security/. D. After the PAM configuration has been adjusted for an application, this application can be used by SSH. E. The /etc/pam.d/other file contains a default configuration if no application-specific file is found in /etc/pam.d/. F. PAM creates a software level with defined interfaces between applications and the current authentication mechanism. Answer: CEF 26. Which options are PAM module types that can be used in a PAM configuration file? (Choose 4.) A. key B. auth C. card D. account E. session F. password Answer: BDEF 27. Which statement about the sudo command is correct? A. You can edit the sudo configuration file /etc/sudo.conf directly with vI. B. You can edit the su configuration file /etc/su.conf with the sudo commanD. C. You can edit the sudo configuration file /etc/sudoers with the visudo commanD. D. You can edit the sudo configuration file /etc/visudo with the sudoers commanD. Answer: C 28. What does the following line of the sudo configuration file mean? geeko ALL = /sbin/shutdown A. All users are allowed to shut down the computer. B. It allows the user geeko to shut down the computer. C. All users (except geeko) are allowed to shut down the computer. D. User geeko is allowed to shut down the computer with name ALL. E. All users of the computer with the name geeko are allowed to shut down the computer. Answer: B 29. Which group name is stored in /etc/passwd? A. Primary group B. Effective group C. Secondary group D. No group name is stored therE.

www.Prepking.com

Answer: A 30. The useradd command is used to create new users. Which file contains information on the primary group, shell, and other parameters to be used by useradd when not specified on the command line? A. /etc/profile B. /etc/passwd C. /etc/shadow D. /etc/default/useradd Answer: D 31. How do you activate an ACL when mounting a file system manually? A. mount --acl /dev/hda5 /data B. mount -f acl /dev/hda5 /data C. mount -o acl /dev/hda5 /data D. mount --use-acl /dev/hda5 /data Answer: C 32. Which file system type supports ACLs without a special mount option? A. ext2 B. ext3 C. XFS D. ReiserFS Answer: C 33. How can you list the ACLs (if there are any) of a file test? A. ls -l test B. lsacl test C. getfacl test D. ls -l --acl test Answer: C 34. How do you create a file called destination containing the same ACLs currently set for the file called source? A. getfacl source > destination B. getfacl -c source destination C. getfacl source | cp destination D. getfacl -x source > destination Answer: A 35. You want to disable the network device eth0. Which command can you use? A. ifconfig halt eth0

www.Prepking.com

B. ipconfig eth0 halt C. ip link set eth0 down D. ip param set eth0 halt Answer: C 36. You want to use the ip command to set a new address for your network device eth0. It is a standard class C network. The broadcast address and network route should be set accordingly. Which command is correct? A. ip address set 192.168.0.10/24 dev eth0 B. ip address add 192.168.0.10/24 dev eth0 C. ip addr add 192.168.0.10/24 dev eth0 brd + D. ip addr add eth0 192.168.0.10/24 eth0 broadcast 192.168.255.255 Answer: C 37. The /etc/sysconfig/network/ifcfg-eth-id-macaddress configuration file contains a BOOTPRO option. Which are possible values of BOOTPROTO? A. static or dhcp B. master or slave C. onboot, ifpluged, or manual D. ethernet, wireless, or manual Answer: A 38. Routes to the directly connected network are automatically set up when a device is starteD. All other routes are saved in which configuration file? A. /etc/route B. /etc/routes C. /etc/routes.conf D. /etc/network/routes E. /etc/sysconfig/routes F. /etc/sysconfig/network/routes Answer: F 39. Which protocol is used to send messages by the ping command? A. NTP B. FTP C. TCP D. ICMP E. HTTP F. LDAP

www.Prepking.com

100% Pass Guaranteed or Full Refund Word to Word Real Exam Questions from Real Test Buy full version of exam from this link below http://www.prepking.com/050-710.htm

Anda mungkin juga menyukai