- 论坛徽章:
- 0
|
<p align="left"><p align="left">最新3x0-201题库分享</p></p><p align="left"><p align="left">1. The server responsible for running the site www.linuxsite.org is also responsible for the DNS resolution of its specific subdomain. What is this responsibility called, and why is it used?</p></p><p align="left"><p align="left">A. Super DNS resolution; it is used so that DNS lookups can be achieved more quickly.</p></p><p align="left"><p align="left">B. Passing; it is used so fewer refusal messages are returned when looking up a name.</p></p><p align="left"><p align="left">C. Caching; it is used to return names more quickly</p></p><p align="left"><p align="left">D. Delegation; it is used to decentralize administration on the Internet.</p></p><p align="left"><p align="left">Answer: D</p></p><p align="left"><p align="left">2. After a client queries a name server for a particular domain name, the name server passes the exact domain name on to other name servers until one knows the address. This best describes which of the following name resolutions?</p></p><p align="left"><p align="left">A. iterative resolution</p></p><p align="left"><p align="left">B. recursive resolution</p></p><p align="left"><p align="left">C. incremental resolution</p></p><p align="left"><p align="left">D. inverse resolution</p></p><p align="left"><p align="left">Answer: B</p></p><p align="left"><p align="left">3. A system administrator has just detected that the system has been compromised. Which of the following should he do first? (Choose the best answer.)</p></p><p align="left"><p align="left">A. Restore the system from backup</p></p><p align="left"><p align="left">B. Reformat and reinstall all software</p></p><p align="left"><p align="left">C. Disconnect the system from the network</p></p><p align="left"><p align="left">D. Find a bug fix for the compromise</p></p><p align="left"><p align="left">E. Reboot immediately</p></p><p align="left"><p align="left">Answer: C</p></p><p align="left"><p align="left">4. Which of the following command sequences will correctly recompile the kernel, make it bootable, and correctly recompile and place modules in the proper location?</p></p><p align="left"><p align="left">A. make modules; make modules_install; lilo; make bzImage</p></p><p align="left"><p align="left">B. make modules_install; make modules; make bzImage;lilo</p></p><p align="left"><p align="left">C. make modules; lilo; make modules_install; make bzImage</p></p><p align="left"><p align="left">D. make modules; make modules_install; make bzImage; lilo</p></p><p align="left"><p align="left">Answer: D</p></p><p align="left"><p align="left">5. The most common type of Linux network configuration is the ______ network, using _______.</p></p><p align="left"><p align="left">A. Ethernet, TCP/IP</p></p><p align="left"><p align="left">B. token ring, TCP/IP</p></p><p align="left"><p align="left">C. Ethernet, IPX</p></p><p align="left"><p align="left">D. token ring, IPX</p></p><p align="left"><p align="left">Answer: A</p></p><p align="left"><p align="left">6. A system administrator is sending all of the log messages for a server to a specific terminal to be monitored in real-time. The syslog.conf file contains the line below. Assuming a default configuration, how can the administrator access the virtual terminal that is displaying the log messages? *.* /dev/tty4</p></p><p align="left"><p align="left">A. Press <Ctrl-Alt-Tab> until virtual terminal four appears.</p></p><p align="left"><p align="left">B. Press <Ctrl-Shift-F4>.</p></p><p align="left"><p align="left">C. Press <Alt-Shift-F4>.</p></p><p align="left"><p align="left">D. Press <Ctrl-Alt-Tab> four times.</p></p><p align="left"><p align="left">E. Press <Ctrl-Alt-F4>.</p></p><p align="left"><p align="left">Answer: E</p></p><p align="left"><p align="left">7. The tool ProcMaker is used to convert /proc data into readable information. What else can ProcMaker do? (Choose three.)</p></p><p align="left"><p align="left">A. Monitor e-mail</p></p><p align="left"><p align="left">B. Display /proc data in a graphical format</p></p><p align="left"><p align="left">C. Adjust partition sizes</p></p><p align="left"><p align="left">D. Monitor the temperature of the processor</p></p><p align="left"><p align="left">E. Adjust the DMA zone</p></p><p align="left"><p align="left">Answer: ABD</p></p><p align="left"><p align="left">8. Your system appears to be running slowly. You run the "/bin/ps aux" command, and it displays all the processes currently running on your system. After analyzing the output, you notice a significant gap in the PID sequence. You issue the command "ls -al /bin/ps" and realize that the ps program has an unusual creation date. Which of the following best describes your altered ps program?</p></p><p align="left"><p align="left">A. It is a virus.</p></p><p align="left"><p align="left">B. It is a program that exploits a buffer overrun.</p></p><p align="left"><p align="left">C. It is a program that exploits a buffer overflow.</p></p><p align="left"><p align="left">D. It is a worm.</p></p><p align="left"><p align="left">E. It is a Trojan horse.</p></p><p align="left"><p align="left">Answer: E</p></p><p align="left"><p align="left">9. Sheila, a Webmaster, understands the risks associated with overclocking and has overclocked two processors on two different Web servers. Which of the following results should she expect to see from the system if the overclocked processors are working properly? (Choose two.)</p></p><p align="left"><p align="left">A. Increased CPU instruction speed</p></p><p align="left"><p align="left">B. Increased RAM storage</p></p><p align="left"><p align="left">C. Increased hard drive write speed</p></p><p align="left"><p align="left">D. Increased memory bus speed</p></p><p align="left"><p align="left">E. Increased SCSI peripheral speed</p></p><p align="left"><p align="left">Answer: AD</p></p><p align="left"><p align="left">10. Sharon wants to set up her Linux machine to be a firewall. She also needs to filter packets based on the MAC addresses of Ethernet cards. How should she do this?</p></p><p align="left"><p align="left">A. Use ipchains to filter the appropriate MAC addresses.</p></p><p align="left"><p align="left">B. Use iptables to filter the appropriate MAC addresses.</p></p><p align="left"><p align="left">C. Use ipfwadm to filter the appropriate MAC addresses.</p></p><p align="left"><p align="left">D. Use ipmasq to filter the appropriate MAC addresses.</p></p><p align="left"><p align="left">Answer: B</p></p> |
|