免费注册 查看新帖 |

Chinaunix

  平台 论坛 博客 文库
最近访问板块 发新帖
查看: 1273 | 回复: 1
打印 上一主题 下一主题

3x0-201题库下载 [复制链接]

论坛徽章:
0
跳转到指定楼层
1 [收藏(0)] [报告]
发表于 2011-01-10 09:08 |只看该作者 |倒序浏览
<p align="left"><p align="left">最新3x0-201题库分享</p></p><p align="left"><p align="left">1. The server responsible for running the site www.linuxsite.org is also responsible for the DNS resolution of its specific subdomain. What is this responsibility called, and why is it used?</p></p><p align="left"><p align="left">A. Super DNS resolution; it is used so that DNS lookups can be achieved more quickly.</p></p><p align="left"><p align="left">B. Passing; it is used so fewer refusal messages are returned when looking up a name.</p></p><p align="left"><p align="left">C. Caching; it is used to return names more quickly</p></p><p align="left"><p align="left">D. Delegation; it is used to decentralize administration on the Internet.</p></p><p align="left"><p align="left">Answer: D</p></p><p align="left"><p align="left">2. After a client queries a name server for a particular domain name, the name server passes the exact domain name on to other name servers until one knows the address. This best describes which of the following name resolutions?</p></p><p align="left"><p align="left">A. iterative resolution</p></p><p align="left"><p align="left">B. recursive resolution</p></p><p align="left"><p align="left">C. incremental resolution</p></p><p align="left"><p align="left">D. inverse resolution</p></p><p align="left"><p align="left">Answer: B</p></p><p align="left"><p align="left">3. A system administrator has just detected that the system has been compromised. Which of the following should he do first? (Choose the best answer.)</p></p><p align="left"><p align="left">A. Restore the system from backup</p></p><p align="left"><p align="left">B. Reformat and reinstall all software</p></p><p align="left"><p align="left">C. Disconnect the system from the network</p></p><p align="left"><p align="left">D. Find a bug fix for the compromise</p></p><p align="left"><p align="left">E. Reboot immediately</p></p><p align="left"><p align="left">Answer: C</p></p><p align="left"><p align="left">4. Which of the following command sequences will correctly recompile the kernel, make it bootable, and correctly recompile and place modules in the proper location?</p></p><p align="left"><p align="left">A. make modules; make modules_install; lilo; make bzImage</p></p><p align="left"><p align="left">B. make modules_install; make modules; make bzImage;lilo</p></p><p align="left"><p align="left">C. make modules; lilo; make modules_install; make bzImage</p></p><p align="left"><p align="left">D. make modules; make modules_install; make bzImage; lilo</p></p><p align="left"><p align="left">Answer: D</p></p><p align="left"><p align="left">5. The most common type of Linux network configuration is the ______ network, using _______.</p></p><p align="left"><p align="left">A. Ethernet, TCP/IP</p></p><p align="left"><p align="left">B. token ring, TCP/IP</p></p><p align="left"><p align="left">C. Ethernet, IPX</p></p><p align="left"><p align="left">D. token ring, IPX</p></p><p align="left"><p align="left">Answer: A</p></p><p align="left"><p align="left">6. A system administrator is sending all of the log messages for a server to a specific terminal to be monitored in real-time. The syslog.conf file contains the line below. Assuming a default configuration, how can the administrator access the virtual terminal that is displaying the log messages? *.* /dev/tty4</p></p><p align="left"><p align="left">A. Press &lt;Ctrl-Alt-Tab&gt; until virtual terminal four appears.</p></p><p align="left"><p align="left">B. Press &lt;Ctrl-Shift-F4&gt;.</p></p><p align="left"><p align="left">C. Press &lt;Alt-Shift-F4&gt;.</p></p><p align="left"><p align="left">D. Press &lt;Ctrl-Alt-Tab&gt; four times.</p></p><p align="left"><p align="left">E. Press &lt;Ctrl-Alt-F4&gt;.</p></p><p align="left"><p align="left">Answer: E</p></p><p align="left"><p align="left">7. The tool ProcMaker is used to convert /proc data into readable information. What else can ProcMaker do? (Choose three.)</p></p><p align="left"><p align="left">A. Monitor e-mail</p></p><p align="left"><p align="left">B. Display /proc data in a graphical format</p></p><p align="left"><p align="left">C. Adjust partition sizes</p></p><p align="left"><p align="left">D. Monitor the temperature of the processor</p></p><p align="left"><p align="left">E. Adjust the DMA zone</p></p><p align="left"><p align="left">Answer: ABD</p></p><p align="left"><p align="left">8. Your system appears to be running slowly. You run the &quot;/bin/ps aux&quot; command, and it displays all the processes currently running on your system. After analyzing the output, you notice a significant gap in the PID sequence. You issue the command &quot;ls -al /bin/ps&quot; and realize that the ps program has an unusual creation date. Which of the following best describes your altered ps program?</p></p><p align="left"><p align="left">A. It is a virus.</p></p><p align="left"><p align="left">B. It is a program that exploits a buffer overrun.</p></p><p align="left"><p align="left">C. It is a program that exploits a buffer overflow.</p></p><p align="left"><p align="left">D. It is a worm.</p></p><p align="left"><p align="left">E. It is a Trojan horse.</p></p><p align="left"><p align="left">Answer: E</p></p><p align="left"><p align="left">9. Sheila, a Webmaster, understands the risks associated with overclocking and has overclocked two processors on two different Web servers. Which of the following results should she expect to see from the system if the overclocked processors are working properly? (Choose two.)</p></p><p align="left"><p align="left">A. Increased CPU instruction speed</p></p><p align="left"><p align="left">B. Increased RAM storage</p></p><p align="left"><p align="left">C. Increased hard drive write speed</p></p><p align="left"><p align="left">D. Increased memory bus speed</p></p><p align="left"><p align="left">E. Increased SCSI peripheral speed</p></p><p align="left"><p align="left">Answer: AD</p></p><p align="left"><p align="left">10. Sharon wants to set up her Linux machine to be a firewall. She also needs to filter packets based on the MAC addresses of Ethernet cards. How should she do this?</p></p><p align="left"><p align="left">A. Use ipchains to filter the appropriate MAC addresses.</p></p><p align="left"><p align="left">B. Use iptables to filter the appropriate MAC addresses.</p></p><p align="left"><p align="left">C. Use ipfwadm to filter the appropriate MAC addresses.</p></p><p align="left"><p align="left">D. Use ipmasq to filter the appropriate MAC addresses.</p></p><p align="left"><p align="left">Answer: B</p></p>

论坛徽章:
0
2 [报告]
发表于 2011-01-13 11:18 |只看该作者
谢谢分享
您需要登录后才可以回帖 登录 | 注册

本版积分规则 发表回复

  

北京盛拓优讯信息技术有限公司. 版权所有 京ICP备16024965号-6 北京市公安局海淀分局网监中心备案编号:11010802020122 niuxiaotong@pcpop.com 17352615567
未成年举报专区
中国互联网协会会员  联系我们:huangweiwei@itpub.net
感谢所有关心和支持过ChinaUnix的朋友们 转载本站内容请注明原作者名及出处

清除 Cookies - ChinaUnix - Archiver - WAP - TOP