A
A
A
TIS Base
1 Wintel Which of the following modules manages bindings in NDIS? Protocol manager
TIS Base
2 Wintel RAID 1 offers what type of fault tolerance? Mirroring
TIS Base
3 Wintel Which coaxial cable type would be used with Thicknet? A.RG-8
TIS Base
4 Wintel MMC is an acronym for: Microsoft Management Console
TIS Base When connecting IIS to an external data source through ODBC (Open Data
5 Wintel Base Connector), which type of ODBC DSN must be specified? System
TIS Base
6 Wintel Which of the following are Windows 2003 Executive Services? Window Manager
TIS Base
7 Wintel Which of the following operating systems is ideal for Web servers? Windows 2003 Standard Server
TIS Base
8 Wintel The gradual weakening of a signal on a wire or other medium? Attenuation
TIS Base If you are planning a dual boot system which will boot either Windows XP or
9 Wintel Windows 7, which operating system should be loaded first? Windows XP
TIS Base When installing a dual-boot configuration with Windows 7 and Windows XP Each operating system must be installed in a separate partition or disk
10 Wintel Professional? drive
TIS Base
11 Wintel Which IEEE standard defines internetworking and the OSI model? 802.1
TIS Base When using WINNT32, the file WINNT32.LOG is the default file name for the
12 Wintel parameter. /DEBUG
You are the desktop administrator for your company. All employees have
Windows XP Professional computers. Twenty engineers at the company use
portable computers. An engineer named Tom wants to install an external
parallel-port tape backup drive to use the removable storage features of
Windows XP Professional. The tape drive is included on the Hardware
Compatibility List (HCL) Tom connects the tape drive to his computer and
installs the manufacturer-provided drivers and software. When Tom attempts
to create a media library for removable storage, the tape drive is not listed as
TIS Base an available library to select. You need to enable Tom to install the driver for
13 Wintel the tape drive. What should you do? Add Tom to the local Backup Operator group on his computer
You are the desktop administrator for Wingtip Toys. Management requires
that a standard user profile be created for all domain user accounts.
Additionally, the standard profile must be protected so that domain users
cannot make permanent changes to the standard profile. You create a
company standard user profile. You require all domain us accounts to use this
profile. Later, users report that the changes they make to their desktop are
TIS Base overwriting the standard profile settings. What should you do to ensure
14 Wintel permanent changes cannot be made to the standard user profile? Open the local default user profile. Rename ntuser.dat to ntuser.man
You are the desktop administrator for your company. You install a new driver
for the network adapter card on your Windows XP Professional computer.
When you restart the computer, the monitor displays a STOP error with no
text before you are able to log on. Every time you restart the computer, a
STOP error halts the start process. You need to correct the error without
TIS Base affecting the user data on the computer. You also need to restore the original
15 Wintel network adapter driver. What should you do? Restart the computer with the last known good configuration
TIS Base
16 Wintel Which tools can be used to convert a disk from basic to dynamic? Disk management snap-in
TIS Base How do you prevent or ensure the inappropriate use of the domain
17 Wintel Administrator account. Renaming the Administrator account and change password
You want to install windows XP professional on 30 PXE-compliant computers
and 35 non-PXE-compliant computers. All 65 computers are included on the
TIS Base current hardware compatibility list (HCL). You create a RIS image. You load
18 Wintel the Image on the RIS server. You then start the 65 computers. You find that Run Rbfg.exe to create a Non-PXE-compliant startup disk
the 30 PXE-Compliant computers can connect to the RIS server. However, the
35 non-PXE-compliant computers have to connect to the RIS server. What
should you do?
TIS Base Telnet, FTP, SMTP, DNS, HTTP are examples of protocols that are used in
28 Wintel ____________________. application layer of OSI reference model
TIS Base
29 Wintel SNMP used the below port 161
You are the network administrator for Wipro. The network consists of a single
Active Directory domain named wipro.com. All network servers run Windows
Server 2003, and all client computers run Windows XP Professional. XML
Web services for the internal network run on a member server named
WiproSrv1, which is configured with default settings. You are a member of the
local Administrators group on WiproSrv1. You need the ability to remotely
manage WiproSrv1. You have no budget to purchase any additional licensing
TIS Base for your network until the next fiscal year. How should you reconfigure
30 Wintel WiproSrv1? In the System Properties dialog box, enable Remote Desktop.
TIS Base Which of the following OSI layers is responsible for identifying
31 Wintel communications partners Application
TIS Base
32 Wintel A Hub operates at which of the following layers of the OSI model? Physical
The manager of the finance department has two spreadsheets that contain
sensitive information. She has used Windows XP encryption to ensure the
TIS Base security of the files on her local computer. She would like to make a backup of
33 Wintel the files. What should you advise her to do? Copy the files to a network share on an NTFS volume
TIS Base Which of the following is the fastest way to view the real-time CPU Utilization
34 Wintel within a Microsoft Windows 2003 Server environment? Task Manager
TIS Base
35 Wintel Which of the following is a typical VMware virtual machine configuration file? .vmx
TIS Base
36 Wintel Which of the following is a benefit of ESX Server 3i over ESX Server? Increased Security and Reliability
TIS Base
37 Wintel TCP ICA communication port is 1494
TIS Base
38 Wintel The ICA protocol operates on the ______ layer of the OSI model presentation
Introduction which component handles interrupt and trap handling, system clocks,
47 to unix scheduling, file descriptor, etc. kernel
Introduction
48 to unix which is the common kernel name? genunix
Introduction
49 to unix Default shell of UNIX c,korn,bourne
Files &
50 directories The command used to see data flow in ftp hash
Files &
51 directories When you run ls -la to list the file, you find "rw-", what it means ? read and write but no execute
Access to
files and Which of the following tool/utility cannot be used to login to a Unix
52 directories system NFS
Access to
files and Lists all words that has the keyword "unnec" in the file -
53 directories what does the command "grep unnec /usr/share/dict/words" return /usr/share/dict/words
Access to
files and
54 directories what will pwd command return present working directory
Access to
files and
55 directories what happens when cd /usr is executed changes the current directory to /usr
Access to
files and
56 directories what is the octect number, with respect to permissions for rwxr-xr-- 754
Access to
files and
57 directories which command can tell you if the file has (or is ) a soft link ls
Access to
files and
58 directories what is the possible output for "cat test1" command? contents of the file called test1, if file exists
Access to
files and
59 directories which command cannot be used for seeing filesystem utilization ls
Access to
files and
60 directories Remove or delete FILE ? rm FILE
To find and replace the word "Moon" to "Sun" only the first occurance word
62 Editors in the file old is? sed '/s/Moon/Sun/' old
65 Editors The command to quit the vi editor without saving the file is? :q
66 Editors The command 3dd in the VI editor command mode_____. Deletes three lines from current cursor position downwards
67 Editors The command to redo the change in VI editor is? ctrl-r
Another way to save your changes and exit out of VI is______, It is the simplest
68 Editors way for the same. zz
______ command deletes from current cursor position to the beginning of the
69 Editors line in VI editor. d^
The command to enter insert mode in a new line above the current cursor
70 Editors position in VI editor is? O
73 Print services The command sends a job to the queue to be printed lpr
75 Print services Command to print a file with multiple copies lp -n num-copies filename
76 Print services Command to print a file with multiple copies lpr # num-copies filename
79 Print services The /etc/shadow file contains encrypted password and it is a read-only file. TRUE
80 Print services The /etc/password file stores group information or defines the user groups TRUE
85 Handling IO Which of the following is the descriptor of the standard input stream? 0
Which of the below option in grep can be used to print a list files that contain
88 Handling IO at least one line matching the pattern? l
89 Handling IO To select the lines beginning with an uppercase character and ending with “!” egrep ‘^[A-Z.*\!.$’ file
90 Handling IO To find out wipro is currently logged into the system, choose the correct one? $ who | grep “wipro”
92 Handling IO How do you redirect both stdout and sderr the script to file name? command &>filename
93 Handling IO How to discard error for the command? find / -name "*" -print 2> /dev/null
Its mainly used for showing up all parameter values passed in shell
94 Handling IO What is $*? script.
Disk what is the command to list files from directory in decreasing order of their file
95 Management size. du /directory_path | sort -nr
Disk
96 Management Which command used to make driectory 'dir' private chmod 700 dir
Disk
97 Management Which command is used to limit filesizes limit
Disk
98 Management Which command displays the size of a directory? du
Disk
99 Management How do you search the a word 'unix' from a file 'file_name'? cat file_name | grep 'unix'
Disk
100 Management Which command is used to uncompress compressed file uncompress
Disk
101 Management Which command used to finds text within a file grep
Disk
102 Management Which command is used list all files having a ".txt" extension ls *.txt
Disk Which command is used reducing an existing file to a file 'somefile' with the
103 Management same name that is 0 bytes cp /dev/null somefile
Disk
104 Management How do you send a mail message to somebody? mail somebody@wipro.com -s ‘Your subject’
Disk
105 Management du stands for? disk usage
Disk
106 Management in df -h commnad what is -h means Humanreadable
Disk
107 Management If a file has permissions 000, then who can access the file? root
Disk Which command displayssummary of disk space used in all the mounted file
108 Management system? du -sk
Disk
109 Management Which utility is used to reduce size of a file? compress
Disk
110 Management Which command is used to create a new directory? mkdir
Disk
111 Management What's so special about files and directories starting with a period? The are considered as “hidden files/dirs”
Disk
112 Management Can you use > and | together? Yes
Disk
113 Management What is the command to limit filesizes inC and Turbo c shell limit
Process prints the process status for some or all of the running
115 Management What is "ps" command for? processes
Process
116 Management How would you kill a process? Using by kill command
Process
117 Management What are the process states in Unix? Choose the correct combination. Running,Waiting,Stopped,Zombie
Process
119 Management Positive integer that uniquely identifies this process. process-ID
Process
120 Management It is system monitor tool. top
Process Following command can be issued to send the kill signal to all
121 Management processes. kill -9 -1
Process
123 Management The fork() creates new process called ? Child process
125 Networking which are the FTP commands ? get, put, mget, mput
126 Networking what is the command to view the routing table ? netstat -rn
128 Networking network tool used to show the route taken by packets across an IP network ? traceroute
129 Networking what are the security concerns addressed on FTP ? Port Stealing,Sniffing
Job insert # at the beginning of the line you want to stop for a while
130 Scheduling how to disable crontab tasks ? save and exit
Job
131 Scheduling which command executesthe task at a specified time. at
Job
132 Scheduling How to set the file transfer type If the file is readable text file ? ascii
Job using a at command schedule a job to compile a C program at 11:35 a. m. on
133 Scheduling January 14 echo "cc -o foo foo.c" | at 1135 jan 14
Job
134 Scheduling Configuration file for a cron is crontab
How will you execute backup and restore using the tar
135 Unix utilities command in a single command ? tar cvf - /attachments/abc.txt | tar xvf -
136 Unix utilities Which command provides an ongoing processor activity in real time? top
You wish to restore the file memo.test which was backed up in the tarfile
137 Unix utilities mybackup.tar. What command should you type? tar -xf mybackup.tar memo.test
138 Unix utilities What utility can you use to show a dynamic listing of running processes? top
The top utility can be used to change the priority of a running process?
139 Unix utilities Another utility that can also be used to change priority is nice
What command would you type to use the cpio to create a backup called
140 Unix utilities backup.cpio of all the users' home directories? find /home | cpio -o > backup.cpio
141 Unix utilities What does iostat do? Reports about I/O activity on the server.
142 Unix utilities what is the SAR ? Displays the activity for the CPU
143 Unix utilities what is TOP ? display a continually updating report of system resource usage.
which command reports such as the system time, uptime, CPU usage, physical
144 Unix utilities ans swap memory usage, and number of processes? TOP
How do you get current CPU utilization, memory and disk space usage in
145 Unix utilities Unix? iostat.
146 Unix utilities Copies files into and out of archive storage and directories. cpio
The utility found on all UNIX systems that monitors various system functions
147 Unix utilities cpu,hard disk, process running ,terminal IO sar
148 Unix utilities what is the command to display the Interface statistics ? netstat -i
149 Unix utilities how to view only the device report using iostat command? iostat -d
The Tool that does not impact the system performance while collecting the
152 Unix utilities performance report ? sar
153 Unix utilities what is the sar command options to check only the disk activity? sar -d
The command used to diagnose the network problems when the connectivity is
156 Unix utilities there but it is slow in response . netstat -i
157 Unix utilities what does options -d do in iostat command ? Display the device utilization report
158 Unix utilities what does options -x do in iostat command ? Display extended statistics including disk utilization
159 Unix utilities Which command (and options) will show the state of all sockets using netstat? netstat -a
160 Unix utilities what does the SIZE refers to in the Top output ? refers to the virtual memory
161 Unix utilities what does the RES refers to in the Top output ? refers to the resident memory used in the RAM
You want to create a compressed backup of the users' home directories. What
162 Unix utilities utility should you use? tar
163 Unix utilities The "tar" command stands for ? tape archive
Account What is the file name where the default user SHELL variable is stored and
164 Management used when adding a user /etc/default/useradd
Account
165 Management What does 'userdel -r User01' do ? Delete user User01 from system
Account
166 Management The gid for root group is : 0
Account
167 Management To lock an account User01 you can issue command usermod -L User01
TIS Base Which one of the following is NOT a specific roles and responsibilities
168 ITIL associated with the execution of a successful service design ? A)Change Manager
TIS Base Who is responsible for providing actual resources to support the ITSM
169 ITIL Lifecycle. A)Technical Management
TIS Base A)Through testing, to ensure that services are designed to meet
170 ITIL Which of the following is NOT an objective of Service Operation? business needs
TIS Base
171 ITIL Which of the following is NOT one of the ITIL core publications? A)Service Optimization
TIS Base
172 ITIL Which of these is NOT a recognized Service Desk structure? A)Remedial Service Desk
TIS Base In 7 Step Improvement process, each step is driven by 1. Strategic goals 2.
173 ITIL Tactical Goals 3. ? A)Operational Goals
TIS Base Setting policies and objectives is the primary concern of which of the following
174 ITIL elements of the Service Lifecycle? A)Service Strategy
TIS Base A)The ability to detect events, make sense of them and determine the
175 ITIL Which of the following BEST describes the purpose of Event Management? appropriate control action
TIS Base Which of the following statements about Supplier Management is A)Supplier Management negotiates internal and external agreements
176 ITIL INCORRECT? to support the delivery of services
TIS Base A)A definite level of utility and warranty associated with a core service
177 ITIL A Service Level Package is best described as? package
TIS Base
178 ITIL For which of these activities is the Change Manager responsible? A)Chairing the CAB
TIS Base Which one of the following is NOT a specific roles and responsibilities
179 ITIL associated with the execution of a successful service strategy ? A)Service Level Manager
TIS Base What is the CORRECT order of the first four activities in the 7 Step A)Define what you should measure, define what you can measure,
180 ITIL Improvement Process? gather data and process data
TIS Base Which of the following statements is CORRECT about patterns of demand
181 ITIL generated by the customer’s business? A)They are driven by patterns of business activity
TIS Base
182 ITIL The goal of Problem Management is: A)To prevent Problems and resulting Incidents from happening
A)1-Define what you should measure. 2-Define what you can measure.
TIS Base Which of the following is the CORRECT order of the activities in the 7-Step 3-Gather data. 4-Process data. 5-Analyse data. 6-Present information.
185 ITIL Improvement Process (first activity first)? 7-Implement corrective action.
TIS Base
186 ITIL What is the purpose of the Request Fulfillment Process? A)Dealing with Service Requests from the users
TIS Base The objective of the Change Management process is most accurately described A)Ensuring that all changes are recorded, managed, tested and
187 ITIL as? implemented in a controlled manner
TIS Base Which of the following statements CORRECTLY defines Insourcing and A)Insourcing relies on internal resources; outsourcing relies on
188 ITIL Outsourcing delivery model options? external organization(s) resources
TIS Base Why should monitoring and measuring be used when trying to improve
189 ITIL services? A)To validate, direct, justify and intervene
TIS Base
190 ITIL Previous knowledge of incidents and problems are stored is? A)Known Error Database
A)To build, test and deliver the capability to provide the services
TIS Base Which of the following statements fully describes the aim of Release and specified by Service Design and that will accomplish the stakeholders’
191 ITIL Deployment Management? requirements and deliver the Intended objectives
TIS Base A)A process is continuous and has no end date, whereas a project has a
192 ITIL What is the difference between a process and a project? finite lifespan.
TIS Base Which process manages IT service assets from the point of acquisition through
194 ITIL to disposal and manages the asset inventory? A)Service Asset and Configuration Management (SACM)
TIS Base
195 ITIL Availability Management is responsible for availability of? A)Services and Resources
198 How many no. of domain can added in a single fabric? 256
199 Multi mode fibre cable for Short Distance
202 How many no. of domain can added into a single fabric? 256
203 Full volume flash copy functions are Backend Copy or No Copy
A LUN is presented from a Array to a Solaris Host through SAN Fabric, how
206 does it would appear in the Host Disk
207 How Many drive failures in a RAID 5 data set can be protected 1 Drive failure
208 State the benefit of the fiber channel SAN compared to DAS More flexible and scalable connectivity
In IP-SAN how many HBA ports are mandatory on Solaris host to access
209 storage 0
212 Name of the characteericstic of file level host storage access Data is accessed using NFS,CIFS, and FTP
213 Name the access method which is used for file sharing over an IP NAS
215 Name two ways in which an IP address can be assigned the computer Dynamicall or Statically
What is the correct order of operations for array-based synchronous
replication? A: Write is received by the
source array from the host/server
B: Remote array sends acknowledgement to the source array
C: Source array signals write complete to the host/server
216 D: Write is transmitted by the source array to the remote array A, B, C, D
Which EMC product family allows for the configuration and management of
217 Fibre Channel switched fabrics? Celerra
All of the following are individual tasks handled by the Host during the process
of allocating storage to a new server in an existing SAN environment
219 EXCEPT: Assignment of new volumes to array front end ports
220 Which technology is designed for storage of fixed content data? CAS
222 Name a characteristic of file level host storage access Data is accessed suing NFS, CIFS, and FTP
223 Name the access method which is used for file sharing over an IP network NAS
What is the most common use of its serial port (COMM port), for A Fibre
225 Channel switch? Assigning an IP address to the switch via CLI
226 How many no. of domain can added in a single fabric 256
228 Full volume flash copy functions are Backend Copy or No Copy
A LUN is presented from a Array to a Solaris Host through SAN Fabric, how
230 does it would appear in the Host Disk
Which type of Backup, backs up all the files in a selected folder or drive
231 resetting the “archive bit” attribute? Full Backup
232 Which three backup types are considered automatic backups? (Choose three.) Full Backup
Which native utility can be used to ensure that Windows 2000 can read and
233 write to a tape drive? NTBACKUP
234 What is a correct statement when describing NAS clients? Access data irrespective of their physical locality
237 What is a benefit of centralizing storage using a NAS device? Can reduce the complexity of business operations
239 What is true of the source LUN during a reverse synchronization? Accepts all incoming I/Os
240 What describes the Buffer Credits parameter? A flow control mechanism within a FC SAN
241 Which statement about Network backup is correct? Both Metadata and Data passes over the network infrastructure
242 What is the primary purpose of iSNS? To assist with discovery of iSCSI targets
245 What is an advantage of WWPN zoning? Existing zones remain valid even if cable connections are rearranged
250 Which technology is designed for storage of fixed content data? CAS
253 What best describes a Fibre Channel SAN? Dedicated storage network
254 Which Celerra component is used to manage and configure the NAS solution? Control Station
255 Which statement is true about iSCSI names? Every initiator or target has a unique iSCSI name
256 What is a requirement for a client initiated restore? Backup catalog must be available
257 What is a key management task that applies to all data center elements? Capacity management
258 What is the advantage of using multiple ISLs between two FC switches? Availability
A five disk set is configured as RAID 5. Each disk has a Mean Time Between
259 Failure (MTBF) of 500,000 hours. What is the MTBF of the set? 100,000 hours
260 What does a cache dirty bit flag? Changed data not yet written to disk
261 What failure does RAID technology guard against? Disk failure
265 What do you monitor as part of an array capacity check? Allocated storage
266 Which management task eliminates single points of failure in a data center? Availability
267 Which statement describes logical volumes? May be a partition of a larger physical disk
268 What is a disadvantage of storage array based local replication? Cannot span storage arrays
A company has two SAN islands approximately one mile apart. The company
wants to create a single fabric over its public WAN connection. Which protocol
269 is recommended to connect the sites? FCIP
271 What is a reason for implementing single HBA zoning? Decrease reset time for any change made in the state of the fabric
272 What is a disadvantage of array based remote replication? Cannot manage log shipping
273 What is a benefit of disk mirroring compared to a single disk? Improved read performance
274 Which event is known as a head crash? A R/W head has touched the disk data area
275 What are three requirements of storage systems? Availability, Capacity, Scalability
276 What are the four components of an intelligent storage system? Back-end, cache, front-end, physical disks
278 Which SAN topology allows IP initiators to communicate with FC targets? Bridged
279 What is a role of the backup client in a backup and recovery environment? Gather data for backup
281 Which disk drive component is responsible for positioning the R/W heads? Actuator arm assembly
You are planning for disaster recovery of your backup and recovery
285 environment. Which backup server component must be included? Catalog
Which component in an EMC Symmetrix Array handles physical disk I/O
286 operations? Back-end adaptor
During DR planning in a two data center setup you determine that: The
remote site B will hold a copy of data that is 5 minutes behind the production
to site An additional 3 hours will be needed to power up the servers, bring up
the network and redirect users to site B can be reproductive. What is the
287 Recover Point Objective (RPO) of this plan? . Five minutes
288 What are the physical ports that interconnect two FC switches referred to as? E_Ports
289 What is a concern of NAS management? Configuring the system to meet application performance requirements
291 How many devices can a single (parallel) SCSI chain handle ? 15
296 What is Arbitrated Loop FC Topology? Devices attached to a shared "loop". Analogous to Token Ring.
300 Name the characteristic of block-level host storage access. Storage systems present Logical Volumes or LUNs to hosts
301 Which component on an intelligent storage system provides host connectivity? Front-end
305 What is a disadvantage of storing fixed content on tape versus CAS? Data is either offline or subject to high retrieval time
306 What is a limitation of host-based replicas? Replicas add overhead on host CPUs
307 What are two [2] advantages of Centralized Networked Storage? Consolidated data storage and retrieval
IP-based gateway-to-gateway protocol that can be used for SAN
308 What describes the iFCP protocol? extension
310 What is the fundamental purpose of Zoning? To expose array ports and host HBAs to each other
311 Name the database which can be used by iSCSI initiator to discover Targets. iSNS
312 Name two ways in which an IP address can be assigned to a computer. Dynamically or Statically
318 What are two disadvantages of using a parallel interface? as the bus length increases, the chance of skew increases
319 What is the most significant advantage of tape as a storage medium? Ideally suited for random access
324 ATA/IDE, SATA, and Parallel SCSI are primarily used in Internal DAS
325 External DAS could use for open systems Serial SCSI
326 what are two types of cable employed in a SAN Multi mode and single mode
TIS Base
328 Wintel Which layer(s) of the OSI model is/are included in the NDIS specification? 2
TIS Base
329 Wintel Which RAID level is also called mirroring? 1
TIS Base
330 Wintel What is the maximum segment length on 10Base2 media? 185 meters
TIS Base
331 Wintel What is a set of rules for communication between computers called? protocol
TIS Base Which standard divides the data link layer into the LLC and the MAC
332 Wintel sublayers? 802.2
TIS Base
333 Wintel Which IRQ has a standard function as COM4? 3
TIS Base Which of the following network devices sends packets from a central point
334 Wintel based upon MAC addresses? Switch
TIS Base What is the minimum physical memory required for Windows XP
335 Wintel professional? 256MB
TIS Base You have a Corpus of 100 MB.What would be the approximate disk space The disk The disk space required to index the documents is roughly
336 Wintel required to index these documents? 40% of the Corpus.
TIS Base
337 Wintel RG-58 coaxial cable is commonly used with- Thinnet
TIS Base Write the name of layer of the OSI model that maintains a connection between
338 Wintel nodes? Session Layer
TIS Base
339 Wintel What is the another name for Raid 1? Mirroring
TIS Base
340 Wintel Which RAID level is also called duplexing? 1
TIS Base
341 Wintel During a RIS installation, after the client system boots, it initiates a- DHCP request
TIS Base
342 Wintel Which level of RAID provides mirroring only? 1
TIS Base
343 Wintel What is the minimum physical Memory required for Windows 2003? 256MB
TIS Base
344 Wintel Which IRQ has a standard function as COM3? 4
You are moving files from the folder \OLD to the folder \NEW on the same
volume. The \OLD folder is compressed using Windows XP NTFS
TIS Base compression, but the \NEW folder is not. What will the compression status of
345 Wintel the files be once the move has completed? The files are compressed
You and Stephan are the desktop administrators for your company. You
install a printer on your Windows XP Professional computer. You share his
printer on the company network. You want to ensure that only members of the
DTAdmins local group can use this printer, and that only you and Stephan can
manage the printer and all print jobs. You also want to ensure that members of Grant Allow-Print permission to the DTAdmins group. Grant Allow-
TIS Base the DTAdmins local group can manage only their own print jobs. How should Manage Documents and Allow-Manage Printers permissions to your
346 Wintel you configure security on this printer? user account and to Stephan's user account
You are the desktop administrator for your company. Initially, all employees
use Windows XP Professional computers. You upgrade all computers to
Windows 7 Professional users experience no problems after the upgrade is
complete. A new user is issued a new client computer that is identical to all
other client computer in the company.The user installs Windows 7 on this
computer from a network installation point. The user now reports that he
cannot change his Display settings to anything other than 640 x 480 resolution
with 16 color. You verify that this computer has the same video hardware as all
the other client computers. You also verify that the hardware vendor does not
currently offer a video driver for Windows 7.You need to enable the user to
TIS Base change his Display settings to higher resolution and color quality. What should Install the Windows XP Professional version of the video drivers on
347 Wintel you do? the computer
You are the desktop administrator for your company's network. All employees
use Windows XP Professional computers. All employees in the research
department use both desktop and portable computers. All computers in the
TIS Base research department have four-port USB hubs attached. A user in the research Replace the portable computer's bus-powered USB hub with a self-
348 Wintel department connects a portable USB hard disk to the USB hub attached to his powered USB hub
portable computer. However, the port on the USB hub shuts down and the
hard disk does not function.The user experiences no problem when he attaches
the same hard disk to his desktop computer's USB hub.When the user attaches
a USB mouse or keyboard to the portable computer's USB hub, the port and
device function normally. When he attaches the hard disk directly to the USB
port on his portable computer, the device functions normally. You need to
ensure that the USB hub on the user's portable computer can use the USB
hard disk. What should you do?
You are the network administrator for your company. An employee named
Bruno uses a Windows XP Professional portable computer. When he starts the
computer, Windows XP prompts him to select either a docked or an undocked
mode. Bruno primarily works out of the office and does not use a docking
station when he is in the office. He asks you to configure his portable computer
TIS Base so that it will not prompt him to select a docked or an undocked mode. What Modify the portable computer's hardware profiles, to remove the
349 Wintel should you do? Docked hardware profile
You copy the contents of the Windows XP Professional CD to a shared
network folder named \\Server1\WinXPp. You use the shared folder to
perform over-the-network installations of Windows XP Professional on new
computers purchased by your company. You receive a Windows XP Service
Pack CYou apply the Service Pack to Server1 and to the \\Server1\WinXPp
folder. You discover that the Service Pack contains several files that are
incompatible with the new computers.You want to make sure that the Service Copy the contents of the Windows XP Professional CD to
TIS Base Pack files are not installed on any new computers until the problem has been \\Server1\WinXPp again, allowing the operating system to overwrite
350 Wintel correcteWhat can you do? newer files while copying
You upgrade 6 MPS-compliant computers from Windows XP to Windows 7.
Each computer has two 550 MHz processors. The computers are used for high-
resolution graphics applications that require exceptional performance. After
TIS Base the upgrade users complain that the processing time for graphic applications is Use Device Manager to install the MPS-compliant drivers for the
351 Wintel much slower than before. What should you do? second processor
You are using Windows XP Professional on your desktop computer. You are
working on the company's financial report and you want other users on the
network to able to modify your documents for the report. You want users to
share the financial report folder on the network. Because the network contains
confidential information you want to prevent users from the enabling off line
TIS Base access for the network share that contains the financial report. What should Using Windows Explorer, disable the cache for the reports on the
352 Wintel you do? network share
You are the desktop administrator for your company’s sales department. You
need to perform a clean installation of Windows XP Professional on a
computer that currently runs Windows 2000. You start the installation. The
text-based portion of Setup finishes successfully. Before the GUIbased portion
of Setup starts, the computer stops responding. You investigate and discover
TIS Base that there is a problem with a device driver. You want to know which device is
353 Wintel causing the problem. What should you do? Modify the Boot.ini file to include the /sos switch
You and Stephan are the desktop administrators for your company. You
install a printer on your Windows XP Professional computer. You share his
printer on the company network. You want to ensure that only members of the
DTAdmins local group can use this printer, and that only you and Stephan
can manage the printer and all print jobs. You also want to ensure that Grant Allow-Print permission to the DTAdmins group. Grant Allow-
TIS Base members of the DTAdmins local group can manage only their own print jobs. Manage Documents and Allow-Manage Printers permissions to your
354 Wintel How should you configure security on this printer? user account and o Stephan's user account
After several installation failures, you determine that you need to examin a
TIS Base debug log for the setup routine. You want the setup routine to create the most
355 Wintel detailed debug log possible. Which command do you use? Winnt32 /debug4: Debug.log
TIS Base
356 Wintel The equipment that connects subnets at the Network Layer is called a: Router
TIS Base
357 Wintel FTP uses the TCP port 21
TIS Base
358 Wintel Default HTTP port is 80
. You are the network administrator for Wipro.com Active Directory domain.
The domain includes Windows Server 2003 domain controllers and Windows
XP Professional client computers. A new administrator named Sandra is hired
to assist you in deploying Windows XP Professional to 100 new computers.
Sandra installs the operating system on a new computer named Wipro11.
However, when Sandra tries to log on to the domain from Wipro11, she is
unsuccessful. The logon dialog box does now allow her to view and select the
TIS Base domain name. You need to ensure that Sandra can log on to the domain from
359 Wintel Wipro11. What should you do? Configure Wipro11 as a member of the domain.
TIS Base
360 Wintel Which type of connector does a 10BaseT Ethernet cable use? RJ-45
You are the workgroup administrator for a small office. The office contains 12
Windows XP professional computers. Each computer is assigned a private IP
address in the 172.10.X.X range. One computer has a dial-up connection to the
Internet. To enable all users to access the Internet, you enable ICS (Internet
Connection Sharing) on the computer with the dial up connection. You
TIS Base configure ICS and reboot the computer. You notice that none of the other Configure the other computers to receive their IP address
361 Wintel users can connect to the ICS computer, and the ICS computer cannot see the automatically.
other computers in the network. What could be the problem?
TIS Base What is the default share permissions when creating a new share in Microsoft
362 Wintel Windows 2003? Everyone Group will get read access.
TIS Base
363 Wintel What is the another name for Raid 1? Mirroring
TIS Base
364 Wintel Which of the following is an IP address reserved by the InterNIC? 127.0.0.1
TIS Base What is the maximum number of VMFS datastores that can be configured per
365 Wintel ESX Host? 256
TIS Base
366 Wintel Which of the following is a typical VMware virtual machine disk file? .vmdk
TIS Base
367 Wintel TCP IMA Communication Port is 2512
TIS Base What type of network is composed of a number of computers that connect to a
368 Wintel central computer for file storage, printing, and shared applications Client/Server
An administrator needs to ensure that users on Windows XP workstations
launch published applications
with 16-bit colors in a 1024X768 session window. Users in this environment are
launching published applications in
TIS Base seamless mode. Which user experience setting should the administrator use in
369 Wintel the ICAClient.ADM template? Display
An administrator would like to ensure consistency of hotfixes across all the
Citrix XenApp servers running on
TIS Base Windows Server 2008 in a farm. Which hotfix list specification should the
370 Wintel administrator use to create the hotfix list? OS platform
TIS Base In computing, ____ is a commonly used name for a command-line utility that
371 Wintel provides disk partitioning functions in an operating system. fdisk
TIS Base
372 Wintel Virtual memory is configured through which system tool? System control panel
As portable computers are used in a variety of locations, one of
thecharacteristic of Windows operating system lets a user change which
devices his computer uses when he moves it from location tolocation. For
example, a portable computer with a docking station is generally connected to
a local wired network; however, if it is used in a hotel or on an airplane, the
TIS Base portable computer willautomatically connect to a wireless network. Which of
373 Wintel the following feature enables that? Hardware profile
The Domain Name System (DNS) is a hierarchical naming system for
computers, services, or any resource connected to the Internet or a private
TIS Base network. Which of the following statement most appropriately describes the
374 Wintel function of a Domain Name System server? Provides resolution of host names to IP addresses.
You have just set up a network that will use the TCP/IP protocol, and you ant
client computers to
TIS Base automatically obtain IP configuration information. Which type of server do
375 Wintel you need for this? DHCP
Introduction
377 to unix which of the following statements is not true operating system is a substitute for firmware
Files &
378 directories What are the contents of lib directory Essential shared libraries and kernel modules
Files &
379 directories What is special about hidden files their filename begin with a dot
Access to
files and
380 directories which command will change the password of the user? passwd
Access to
files and What happens when "ls ../" command is executed when the user is
381 directories currently in /usr/local/bin It will list the content of /usr/local
Access to
files and
382 directories which command is used to change file ownership chown
Access to
files and
383 directories what method cannot be used to logout from a unix system type out at unix shell
Access to
files and
384 directories what will the below command return - find /etc -name passwd -print ? /etc/passwd
Access to
files and
385 directories what is the octect number, with respect to permissions for rwxr-xr-x 755
Access to
files and
386 directories What is most basic file systems in UNIX UFS
387 Editors To find and replace the word "Moon" to "Sun" globally in the file old is? sed '/s/Moon/Sun/g' old
388 Editors The command to delete the word "Moon" in the file old is? sed '/s/Moon//g' old
389 Editors The key to switch from Insert to Command mode is? Esc
390 Editors The command to undo most recent change in VI editor is? u
391 Editors ______ command deletes from current cursor position to the end of the line. d$
The command to enter insert mode in a new line below the current cursor
392 Editors position in VI editor is? o
393 Print services The profile files are created under Home directory of the user
394 Print services The profile files can be listed with ls option ls -a
/etc/cups/
395 Print services The configuration file for cups service is printers.conf
396 Print services Command to print a file on both sides of the paper lp -o sides=two-sided-long-edge filename
397 Print services Command to print a file on both sides of the paper lpr -o sides=two-sided-long-edge filename
398 Print services The /etc/password file contains encrypted password. FALSE
Which statement is true as for as backslash (\) The backslash character changes only one
399 Handling IO character is concerned character – the one immediately following it
402 Handling IO In which of the below option appends the value of data to the file named file1? date >> file1
403 Handling IO Which of the following commands displays your login shell? echo $SHELL
405 Handling IO Which of the following is the descriptor of the standard output stream? 1
407 Handling IO Which of the following not belongs to the grep family? rgrep
409 Handling IO i option with grep is used for? Ignores upper/lowercase in matching text
411 Handling IO Most Powerful grep Utility - choose the best one egrep
In grep, which of the below is correct one of the regular expression that is the
412 Handling IO complement of the given criterion instead of the criterion itself? grep –v “pattern” file_name
To count the number of blank lines in the file called “file1”, which one is the
413 Handling IO correct answer? egrep –c ‘^$’ file1
If the regular expression contains more complex search pattern means which is
414 Handling IO the best one to use with? egrep
415 Handling IO To count the number of non-blank lines in a file, which one is the correct? egrep –c ‘.’ file
Disk The process of reducing an existing file to a file with the same name that is 0
416 Management bytes large is called truncating
Disk
417 Management What are the commands used to compress files in Unix COMPRESS, BZIP, GZIP and TAR
Disk
418 Management Which command is used to seand a mail mail
Disk
419 Management gunzip and zcat command are used to uncompress a compressed file
Disk
420 Management Which command is used to display the last part of the file. tail
Disk Which command is used to delete all files in the current directory and all its sub-
421 Management directories? rm -r *
Disk
422 Management What is the command to fetch first 10 records in a file 'file_name'? head file_name
Disk
423 Management Which command is used to Change to the home directory? cd
Disk
424 Management What is the symbol | used for? “pipe” symbol connects output of one command to another command
Disk
425 Management Which command you will use to count no of characters? wc
Process
426 Management To run a command in the background. Add the "&" character at the end of the comand line
Process
427 Management Expand the term IPC stands for ? Inter- Process Communication
Process
428 Management If kill() returns 0 This implies that a process exists with the given PID
Process
429 Management Command to change priority of a Process in Unix? nice
Process
430 Management What command can be used to wait and then resuming job execution sleep
Process
431 Management What is the command to delete a at job ? atrm or at -r option
Process
432 Management What is signal used by kill command ? SIGKILL
Process
434 Management Command which kill a process by name. killall xfaces
Process Which of the command is used to change the nice number of the task
435 Management ? renice
436 Networking what is SSH ? SSH is a protocol allowing command line access to a unix
443 Networking which command is used to add the default gateway IP ? route add default
444 Networking The file is used to map port numbers and protocols to service names, /etc/services
standard network protocol used to copy a file from one host to another over a
445 Networking TCP/IP-based network is FTP
Job
446 Scheduling lists the user's pending jobs,number, date, hour, job class. atq
Job
447 Scheduling Time-based job scheduler and used to automate system maintenance in unix cron
which system monitor tool that produces a updated list of processes and CPU
448 Unix utilities usage in most unix systems ? top
449 Unix utilities using the cpio command what is the syntax to copy files onto diskette cpio -ov < filenames > /dev/rfd0
450 Unix utilities what is the command to see established and open TCP/UDP sockets ? netstat -a -n -f inet
Account
451 Management What is the command used to unlock account User01 passwd -u User01
Account
453 Management Command to add existing user User01 to supplementary groups dev & test is useradd -G dev,test User01
Account
454 Management What is the significance of the -m switch with su command (su -m) do not reset shell variables
In which core publication can you find detailed descriptions of the following?
1. Service Portfolio Management
TIS Base 2. Demand Management
455 ITIL 3. Financial Management B)Service Strategy
TIS Base
456 ITIL Which of the following statements is CORRECT for all processes? B)They create value for stakeholders
TIS Base
457 ITIL What is Business Process Outsourcing? B)Outsource all the business processes
TIS Base Good Service Design is dependent on effective and efficient use of the four Ps –
458 ITIL people, processes, partners and: B)Products
TIS Base
459 ITIL "Financial Management is not responsible for which of the following - ? B)Market study
TIS Base B)An occurrence that is significant for the management of the IT
461 ITIL The BEST definition of an event is? infrastructure or delivery of services
A remote site has recently had its network upgraded. The users are now
TIS Base complaining of slow responses and have heard that this is due to problems with
462 ITIL capacity. Who should they contact for assistance? B)The Service Desk
TIS Base When analyzing an outcome for creation of value for customers, what
463 ITIL attributes of the service should be considered? B)Business Objectives, IT objectives, Process metrics
TIS Base
464 ITIL Which of the following is a good use of a baseline? B)A marker or starting point for later comparison
TIS Base B)A user calls the Service Desk because they would like to change the
466 ITIL Which of the following is NOT an example of a Service Request? functionality of an application
TIS Base Which of the following is NOT described as a function but as a process in the
467 ITIL ITIL Service Management Practices framework? B)Service Portfolio Management
TIS Base
468 ITIL ITIL is BE characterized as: B)Good practice scheme
TIS Base Which of the following is the most appropriate approach to carrying out B)Service Operations should maintain a balance between an internal
469 ITIL Service Operations? IT view and an external business view
TIS Base
470 ITIL How does an organization use Resources and Capabilities in creating value? B)They are used to create value in the form of goods and services
TIS Base
471 ITIL Demand Management is primarily used to? B)Eliminate excess capacity needs
TIS Base If something cannot be measured, it should not be documented within which of
472 ITIL the following? B)A Service Level Agreement
TIS Base
473 ITIL Which of the following statements is CORRECT about ‘good practice’? B)It is something that is in wide industry use
TIS Base Which process reviews Operational Level Agreements (OLAs) on a regular
474 ITIL basis? B)Service Level Management
TIS Base How can an organization determine the effectiveness of the Service Level
477 ITIL Management process? B)By measuring customer satisfaction
TIS Base
478 ITIL What is a request to replace something within the IT infrastructure called? B)Request for Change
TIS Base
479 ITIL How does an organisation use Resources and Capabilities in creating value? B)They are used to create value in the form of goods and services
TIS Base
480 ITIL Demand Management is used to: B)Understand patterns of business activity
A user reports a PC problem to the Service Desk. A Service Desk
representative determines that the PC is defective and indicates that according
to the services catalogue, the PC will be replaced within three hours. Which
TIS Base ITIL process is responsible for having this user’s PC replaced within three
481 ITIL hours? B)Change Management
TIS Base
482 ITIL What is a "Known Error"? B)A Problem that has a documented root cause and a workaround.
TIS Base
483 ITIL Which is NOT a type of Service Provider? B)Co Service Provider
Write cache for LUN 101 is disabled in its Properties. But the Write cache is
Configured and enabled for the Array. Choose the correct Write Request
487 operation Writes will be directly written to the LUN
You are in the process of Installing Emulex LP10000 HBA card in a Solaris
Host. Now you want to configure the topology for the car Which file will you
488 edit. /kernel/drv/lpfconf
You need to urgently Increase the size of a LUN and your host needs the
expanded LUN Size immediately. Which type of expansion will suit for this
489 requirement Concatenation
490 What are the copy service are available in DS4000 series storage? Flash copy, Volume copy, and remote mirror
495 What is the Name of the Port which is used to connect ISLs. E Port
With IP Version four (IPV4) addresses , How many octets make up the
501 address? 4
502 Which is not served by the Ethernet RJ45 port on fiber channel switch Block data transfer between connected hosts and storage arrays
504 What are two valid types of zoning in a SAN Hard Zoning and Soft Zoning
505 What do VLANs allow administrator to do To limit traffic to specific elements of a network
506 How LUN will be detected in Solaris It will detect as normal disk
When compared with 10 GB Ethernet port over a LAN and SAN 4GB will give
508 better performance FALSE
509 What is fundamental purpose of zoning To expose LUNs on a storage array to different HBAs
510 what is the benfit of using hard zoning in SAN Securit at the switch port level
511 Name the protocols which uses TCP/IP to tunnel fiber channel Frames FCIP
512 Explain what is zoneset Collection of aones
513 Name the protocol in a unix enviorment which is used to share the file system NFS
Name in the windows enviorment which is used to share the file system to
514 client CIFA
515 What are five core elements of a data center infrastructure? Applications, Databases, Servers/Operating Systems, DAS, and NAS
516 Why would an iSCSI solution be implemented? Block storage over IP is much faster than FC
517 Which management task eliminates single points of failure in a data center? Capacity
519 Which data center element organizes customer and product information? DBMS
520 What is the function of a bus? Interconnect between CPU, memory, and disks
521 Which event is known as a head crash? A read/write head has touched the disk data area
522 What is a metric that could be used as part of Monitoring Performance? Number of I/Os to disks in a storage array
523 What should be provided by a good end-to-end monitoring system? Identify the performance characteristics of all network components
526 What is the process that writes physical address information to a disk? Formatting
527 State a benefit of using hard zoning in a SAN. Security at the switch port level
528 Name the protocols which uses TCP/IP to tunnel Fibre Channel frames FCIP
532 What are two advantages of multiplexing? (Choose two.) shorter backup time
533 Name the protocol which can be used to manage multi-vendor switches. SNMP
Explain the difference between Storage Area Networks (S and Network NAS I/O operations use filesystem level I/O protocols
534 Attached Storage (NAS). SAN I/O operations use block level I/O protocols
How many host addressable volumes are in one Parity RAID (3+1)
535 rank/group? 3
536 With IP version four (IPv4) addresses, how many octets make up the address? 4
To ensure that host device names remain constant, even if new storage
538 What is the purpose of persistent binding on a host? targets are presented to the host
539 What do VLANs allow administrators to do? To limit traffic to specific elements of a network
540 What is a functionality of Fabric Failover policy? Provides support for back-end failover
542 What is a NetWorker remote device? A device managed by a storage node other than the NetWorker server
How many memory connections are supported on each memory card in the
544 Direct Matrix Architecture? 16
What name is used to describe the largest amount of data that is written to disk
545 before moving to the next disk in a RAID Group? Element
Which conectivity allows hosts to connect via iSCSI to Fibre Channel storage
549 arrays Bridged solution
551 Host HBA Should register which prot in switched fabic? F-Port
Data is being replicated from Site A to site B using disk buffering to create
extended distance consistent point in time copies every hour. In the event of a
site failure at A, what is the maximum amount of data that will be missing at
552 site B? 2 hours
554 What is the process that writes physical address information to a disk? Formatting
A disk has Cylinder Head Sector (CHS) values of 1000, 4 and 25. What address
555 range will be used for the Logical Block Address (LBA) values for this disk? 0 – 99,999
Which Data Center element stores customer and product information when
556 the server is connected to an array? Database
557 Which storage method will make data most accessible? Magnetic Disk
558 When is it necessary to hold application I/O to ensure a consistent copy? Just before creating a point in time replica
559 What is an advantage of using tape over disk as the backup destination device? Portability
560 What is a reason for implementing single HBA zoning? Minimizes impact to nodes after an RSCN
563 What is a role of the backup server in a backup and recovery environment? Maintains the backup catalog
A Copy on First Access target is being used for decision support operations.
564 When is data copied from the source to the target? A read or write issued for the first time to a location on the target
566 Which task is an example of monitoring the health of a data center object? Examining the operational status of a device port
In a given environment, the peak writes are 50 MB/s and average writes are 25
MB/. Peak reads are 45 MB/s and average reads are 20 MB/s. How much
network bandwidth must be provided if asynchronous remote replication will
567 be used in this environment? 25 MB/s
You have a SAN environment and want to introduce NAS functionality. Which
570 NAS solution is most appropriate? Gateway NAS system solution
571 What is the process of dividing a disk into logical containers? Partitioning
572 Which statement is true about integrated NAS systems? NAS components and storage arrays are managed by NAS software
573 What is the advantage of single-mode fiber over multi-mode fiber? Enables optical connections over longer distances
575 What is a fundamental characteristic of a CAS implementation? Globally unique identifier for every data object
576 How many simultaneous operations can an eight disk RAID 5 set perform? 4 reads or 8 writes
When is data copied from the source to the target using Copy on First Access
577 replica technology? A write issued for the first time to a location on the source
Which aspect of monitoring will allow you quickly respond to the failure of a
578 Host Bus Adaptor (HBA)? Health
Which host component is the high speed interconnect between the Central
580 Processing Unit and memory? Bus
What provides maximum data protection and availability on the back end of a
581 storage array? Dual controllers
582 How is the Content Address derived in CAS? From the contents of the object
A disk drive has a rotational speed of 100 revolutions per secon What is the
583 average rotational latency? 5 ms
584 What is a disadvantage of multi-mode fiber relative to single-mode fiber? Limited distance
585 Which statement describes the choice of cylinders used in a partition? Cylinders must be contiguous and may be in the same zone
589 What does partitioning do to a physical disk? Divides a disk into logical containers
590 Which statement applies to Internal DAS? Internally deployed parallel protocol storage
What does the number of files to be backed up affect in a backup and recovery
592 environment? Catalog size
What is the correct order of operations for array based synchronous
replication?
1. Write is received by the source array from host/server
2. Remote array sends acknowledgement to the source array 3.
Source array signals write complete to host/server 4.
593 Write is transmitted by source array to the remote array 1, 4, 2, 3
594 What is CIM? A language and methodology for describing management data
597 What does partitioning do? Divides physical disk into logical volumes
598 What are two valid types of zoning in a SAN? Hard Zoning and Soft Zoning
Which component of an intelligent disk system provides the communication
599 between cache and the disks for Read and Write operations? Operating system
603 What were two [2] problems with decentralized, client-server based storage? Difficult to enforce uniform processes
What name is used to describe the largest amount of data that is written to disk
605 before moving to the next disk in a RAID Group? Element
How many memory connections are supported on each memory card in the
606 Direct Matrix Architecture? 16
608 What do VLANs allow administrators to do? To limit traffic to specific elements of a network
To ensure that host device names remain constant, even if new storage
609 What is the purpose of persistent binding on a host? targets are presented to the host
Name the in the Windows environment which is used to share the filesystem to
611 clients. CIFS
Name the function which is NOT served by the Ethernet (RJ45) port on a
612 Fibre Channel Switch Block data transfer between connected hosts and storage arrays
613 Name the protocols which uses TCP/IP to tunnel Fibre Channel frames. FCIP
614 What is an advantage of ATA disk drives on a CLARiiON array? Low cost backup-to-disk solution
616 Which protocol is used for backups on an ethernet based network? NDMP
617 What are the SCSI addressing components handled by the SCSI protocol? SCSI bus, target ID, logical unit
622 In a fiber channel analogous to the token ring which topology? FC-AL
which protocol creates virtual FC links that connect devices and fabric
624 elements FCIP
625 VLAN configuration management element used for which solution IP storage
626 what are the common applications of IP SAN technology Remote Backup and Restore
TIS Base Which component of the Windows 2003 Executive is responsible for handling
627 Wintel input and output from installed devices? The I/O Manager
TIS Base
628 Wintel Which of the following categories for UTP has the least expensive cable? 3
TIS Base
630 Wintel Which of the following IRQs are used for the secondary IDE controller? 15
TIS Base
631 Wintel Which coaxial cable type would be used with Thinnet? RG-58
TIS Base
632 Wintel What is another name for 10Base5 ? Thicknet
TIS Base
633 Wintel What is the middle layer of the OSI reference model? Transport
TIS Base A network where each workstation can make resources available (ie files and
634 Wintel printers) to any other workstation is called as? peer-to-peer
TIS Base
635 Wintel What is the maximum segment length on 10Base5 media? 500 meters
TIS Base
636 Wintel Which protocol cannot be routed? NetBEUI
TIS Base
637 Wintel What is a MAC address in an Ethernet network? The physical address assigned by the NIC manufacturer.
You are the desktop administrator for Wide World Importers. You have
installed Windows XP Professional on a portable computer for a user named
Bruno. Bruno travels between the main office in New York and the branch
office in Tokyo. Bruno needs to create documents in the English and Japanese
languages. You need to provide an easy method for Bruno to switch between
languages. You also need to allow Bruno to create documents in the selected
TIS Base language immediately. How should you configure the Regional and Language In the Languages options, select the Install Files for East Asian
638 Wintel Options on Bruno's computer? languages check box. Add Japanese as an input language
You are the desktop administrator for your company. You are responsible for
automating the deployment of Windows XP Professional to new computers in
your company. You are preparing a Windows XP Professional computer,
which you will use to test disk imaging. You install Windows XP Professional
on the test computer and run the Sysprep utility. You use a third-party
software package to create a disk image to a new computer and then restart
the computer. Instead of completing the Windows XP Professional installation,
the computer starts the Windows Welcome program, requiring you to enter
additional setup information. Because you will be deploying a large number of Use setup manager to create a Sysprep Answer: file. Copy the Answer:
TIS Base computers, you want to ensure that the disk image can be applied without file to a floppy disk, and insert the disk into new computers when the
639 Wintel additional user interaction.What should you do? disk image is applied
You are a help desk technician for your company. Irene is a user in the human
resources department. She often works with documents that contain
confidential information. Irene creates a folder named Private on volume
Volume C is an NTFS volume on her Windows XP Professional computer.
Then she adds the confidential files to the Private folder. Whenever Irene
opens a file, any subsequent temporary files are created within the same folder
as the source document. You need to configure Irene's computer so that only Instruct Irene to modify the properties of the Private folder by
she can access the confidential documents. You also need to minimize the selecting the option to encrypt the contents of the folder. Then instruct
TIS Base impact of the configuration on her computer's performance. What should you Irene to accept the default setting on the Confirm Attributes Changes
640 Wintel do? dialog box
You are the desktop administrator of your company. A user named Andrew
has just dropped his Windows XP Professional portable computer on the floor.
Andrew reports that when he turns on his portable computer, he receives the
following message: System disk not found. You confirm that the hard disk on
Andrew's computer is functioning properly. The portable computer has an
Automated System Recovery (ASR) backup of the original system state. You
verify that Andrew had created a restore point before the accident. You need
TIS Base to ensure that Andrew's computer can start Windows XP Professional from Restart the computer by using a Windows XP Professional CPerform
641 Wintel the hard disk. What should you do? an ASR restore
You install Windows XP Professional on a Windows 2000 computer with one
hard disk. During the installation, the C drive is converted to NTFS. Later you
TIS Base decide to use the system to dual-boot with Windows 2000 You want to convert
642 Wintel the drive back to FAT32. What should you do? Reformat the partition, and restore the data from backup
You install a new AGP video adapter in your Windows XP Professional
Computer. You start the computer and notice that the video display has
retained the default setting of 16 color, 640 x 480 resolution. You install the
manufacturer's drivers for the new video adapter. You then restart the
computer. During the startup process, the monitor goes blank. After several
minutes the screen is still blank. You restart the computer and experience the
TIS Base same problem again. You want to enable Windows XP Professional to start Start the computer by using the Recovery Console. Rename the AGP
643 Wintel successfully. What should you do? driver
You are configuring five computers for Windows 7 CLients and Windows XP
Professional. Each computer has an 8 GB hard disk. You configure the hard
disk on each computer to have two 10 GB partitions. Windows 7 Clients is
installed on drive C and Windows XP Professional on drive D. In Windows XP
Professional, you configure a disk quota on drive D to prevent users from
saving work files on the disk. You restart your computer and load Windows 7
Client You notice that users can save files to drive D. You want to prevent
users from saving the files to drive D in either operating system. You also want
TIS Base to ensure that users can access both drives while using either operating system. Use Windows 7 Client to configure NTFS permissions on drive D to
644 Wintel What should you do? deny the users write permission
You recently upgraded all Windows 2000 Professional computers to Windows
XP Professional. You want to give a new employee named Maria the ability to
back up files, share resources, and install programs on a client computer that
TIS Base she shares with other users. You do not want Maria to be able to read other
645 Wintel users' files. What should you do to accomplish these goals? Add Maria's user account to the Power Users group
Your Windows XP Professional computer has a single Pentium III 400-Mhz
processor, 256 MB of RAM, and an IDE hard disk. You use your computer to
design graphics ads for web sites and newspapers. When you are working on
multiple ads simultaneously, you notice that your computer responds very
slowly. You are also experiencing long delays when loading color palettes and
TIS Base importing graphics. You want to improve the performance of your computer
646 Wintel based on the performance results. What should you do? Add a second Pentium III 400-MHz processor
You are the administrator of your company's network. You configure a local
group named Accounting to have a mandatory user profile. The mandatory
profile has been configured to include a custom logo that was saved with 16-bit
color and 1024x768 resolution.Some of the Windows XP Professional
computers in the accounting department have standard VGA video adapters,
and others have SVGA video adapters.Several users report that when they log
on to certain Windows XP Professional computers, the custom bitmap becomes
very pixilated and distorted, and does not reflect the proper color depth. You
TIS Base want users to be able to correctly view the custom bitmap on any computer in Change the custom bitmap to a 16-color bitmap that has 640x480
647 Wintel the accounting department. What should you do? resolution, and reconfigure the mandatory user profile
You have 17GB of private files on drive D on your Windows XP Professional
computer. You have shared the files as private_files. You do not want other
TIS Base users to see this share name in the browse list. You want all other share names
648 Wintel to continue to appear in the browser list. What should you do? Change the share name to private_files$
You need to create a web share on your Windows XP Professional computer
named Admin01. You create a folder named reports. Then you configure web
sharing on Reports. You name the share WebReports and allow Read
permissions on the share. You test the web share by pointing to
http://admin01/WebReports from another computer. You receive the following
TIS Base error message, 'You are not authorized to view this page.'You need to be able
649 Wintel to access the folder. What must you do? In the IIS console, enable anonymous access to WebReports
TIS Base How to ensure offline files on laptop not accessible to unauthorized persons if
652 Wintel lost? GPO "Encrypt the offline file cache" on the domain level
TIS Base Which command launches the file signature verification tool that is used to
653 Wintel identify unsigned drivers installed on a windows XP Professional system? Sigverif.exe
You are the desktop administrator for your company. You install Windows XP
Professional on your portable computer. The computer is configured to use an
IEEE 1394 PC carYou use the computer to download pictures from a digital
camera while you are at the office. You attend a meeting every Monday.
During the meeting you use a battery to supply power to your portable
computer. Occasionally, the battery runs out of power during these meetings.
You need to configure the computer to conserve battery power while you
TIS Base attend your weekly meeting without affecting your power options when you use Create an additional hardware profile, and disable the IEEE 1394 PC
654 Wintel the computer at your Office. How should you configure your computer? card for this profile
TIS Base A DNS server that sends all name resolution requests for a specific domain to
656 Wintel another server Conditional forwarding
TIS Base
657 Wintel Which of the following commands is used to demote a domain controller? dcpromo
You install a scanner on a computer running Windows Server 2003. When you
try to restart your computer, the operating system will not start. Which of the
TIS Base following would be the least invasive recovery method to try first to restore the
658 Wintel system to operation? Safe Mode
TIS Base You have an IP of 156.233.42.56 with a subnet mask of 7 bits. How many hosts
659 Wintel and subnets are possible? 510 hosts and 126 subnets
TIS Base
660 Wintel HTTPS use the below default port 443
You are the administrator of the Wipro company network. The network
consists
of a single Active Directory domain Wipro.com. The network includes 20
servers running Windows Server 2003 and 200 client computers running
Windows XP Professional. The office uses a single class C private IP address
range.
The company announces a major expansion. Wipro will open 12 branch
offices. The 12 branch offices will connect to the existing office by direct T1
lines. Each branch office will have the same number of computers as the main
office. You need to plan the IP addressing for the new company. You want to
TIS Base assign all company IP addresses from a single classful private IP address Assign each office a subnet from a new class B private IP address
661 Wintel range. What should you do? range.
TIS Base Which of the following network topologies have each computer connected to a
662 Wintel central point? Star
TIS Base
663 Wintel A hub works in conjunction with which of the following network topologies? Star
TIS Base Which of the following devices operate at the Data Link layer of the OSI
664 Wintel model? A Switch
TIS Base Which of the following tool is available in Micrsoft Windows Server 2003 to
665 Wintel terminate processes that are unwanted or in a "not responding" state? Task Manager
TIS Base Datagrams and packets are associated with which layer of the OSI reference
666 Wintel model? Network
__________ is the fastest and most modern interface used as an
expansionmethod for external
peripherals, such as mice, web cams, scanners, and printers, and is popular on
TIS Base laptops and
667 Wintel desktops alike. USB
There are many computers in a small office. Which of the following is a
hardware device that
allows a technician to control multiple computers with a single keyboard, video
TIS Base monitor and
668 Wintel mouse? Add a KVM switch to the technician's computer.
TIS Base
669 Wintel What is the first file used in the boot-up of Windows XP? ntldr
Refer to the following descriptions, which one about the Virtual Private
TIS Base Network (VPN) is the most A VPN is a secured line of communication between two points through
670 Wintel appropriate? a public network.
TIS Base
671 Wintel In a computer running Windows XP, __ is the page file size by default. 1.5 times the physical memory
A system is malfunctioning and the technician asks the user about any recent
changes to the system. Thinking for a moment, the user says that the system
crashes after the installation of a new driver for his video adapter. Which of
TIS Base the following is applicable when a user cannot start
672 Wintel Windows XP after he makes a change to his computer? Last Known Good Configuration
Introduction which component of operating system allows the end user to interact
673 to unix with the computer directly shell
Introduction
674 to unix which is not a unix shell yp
Introduction
675 to unix what is /sbin commonly used for? system binaries
Introduction
676 to unix Which of the following is false? Default shell is always "/usr/bin/sh" and can't be modified
Files &
677 directories What does /etc directory have? host config files
Access to
files and what happens if the cd command is executed without any parameters It changes to the home directory of the user executing the
678 directories on a Unix shell command
Access to
files and
679 directories what happens when cd ~unix is executed navigates to the home directory of the user, called "unix"
Access to
files and
680 directories which option is not available directly with find command? to search based on the password of the user
Access to
files and
681 directories which is one of the property of soft link? can span across filesystems
Access to
files and
682 directories which command creates hard link ln without any option
Access to
files and
683 directories what is file command used for? gives the type of data based on code at the beginning of the file
Access to
files and read permission for the file and all parent directories above the
684 directories what is the minimum permission required to read a file directory where file resides
685 Editors What are the two modes of VI editor? Command, Insert mode
686 Editors The VI editor has how many buffers for storing pieces of text? 36
687 Editors ______ command letes from current cursor position to the end of the word. dw
689 Print services The command to view the contents of the print queue lpq
690 Print services Command for formatting files to be printed is both a and b
691 Print services Command for formatting files to be printed is both a and b
692 Print services Setting the Number of Characters Per Inch for printing both a and b
693 Print services Setting the Number of Lines Per Inch for printing both a and b
696 Handling IO Which of the below is termed as Redirection substitution operator? >&
697 Handling IO Choose the output redirection error override from the given options who >| file1
698 Handling IO Which of the following statement is true? All the above
699 Handling IO Which of the following commands creats a Korn subshell? ksh
700 Handling IO Which of the following is the descriptor of the standard error stream? 2
In grep, which of the following option gives an output of inverse output i.e.,
702 Handling IO prints the lines that do not match the pattern? v
In grep Utility, to print only a count of the number of lines matching the
703 Handling IO pattern c
To show the line number before each line in the output, which option can be
704 Handling IO used with grep Utility? n
If the search criteria requires only sequence expressions, which of the grep is
705 Handling IO best Utility? fgrep
706 Handling IO To select the lines from the file called file1 that have the string OS All the above
707 Handling IO Find the odd man-out for redirecting standard output All the above
Disk
708 Management Which command will displays individual file sizes. ls -la
Disk
709 Management How to compress file 'file_name' using compress command compress file_name
Disk
710 Management Which is command is used to change permission of a file chmod
Disk
711 Management Which command is used to Copy "fileA" to "fileB" cp fileA fileB
Disk
712 Management How to display last 20 lines of a file 'file_name' tail -20 file_name
Disk archives and extracts files to and from a single file called a
713 Management What is the functionality of tar command tarfile.
Disk
714 Management Give a file myfile.zip which command should you use to unzip? unzip myfile.zip
Disk
715 Management How do you list currently running process? ps
Disk
716 Management Which command is used to display current working directory? pwd
Disk
717 Management How can you best see how much free space you have in your current directory? df .
Process
718 Management How to check all running process in the unix system? ps -ef
Process The command which displays how long a system has been running
719 Management and some information about the current load. uptime
Process
720 Management kill all your processes except your current shell session. kill -9
Process
721 Management System call responsible for splitting of a program into copies. fork()
Process
722 Management What is "waiting" process state ? The process is waiting for an event or for a resource
Process
723 Management If kill() returns 1 no process exists with the given PID
Process
724 Management What are signals in UNIX ? It is a message which can be sent to a running process
Process
725 Management What command can be used to display memory and swap use ? top
Process
726 Management What is the utility used to run a job regularly? cron
Process At system startup the cron daemon searches for cron entries in which
727 Management directory ? /var/spool/cron
Process
728 Management What is key combination causes the process to suspend execution? Ctrl-Z
Process
729 Management Signal sent to a process when its controlling terminal is closed. SIGHUP
Process
732 Management The command which displays all the process of a user. pgrep -l -u userA
Process
733 Management Which option with ps command will list information for all processes. ans ) ps -A
Process
734 Management In the nice command increment value must be in the range. 1-19
Process Which of the option will kill the most recently created "acroread"
735 Management process ? pkill -n acroread
Process
736 Management What is the status field indicates for Zombie state? "Z"
737 Networking what is the port used for telnet ? 23
738 Networking you can ping a server, but can't telnet or ssh to it, what could be the problem? telnet ,ssh ports and services are not enable
739 Networking what is the command to set binary mode to transfer the file using FTP > ans ) bin
741 Networking if telnet is not running ? What need to be checked ? Need to check telnet daemons,ports are running.
what is the command for printing for each data block transferred in FTP file
742 Networking transfer ? hash
How to write the file1 and file2 files to a new archive on the default tape drive
743 Unix utilities ? tar -c file1 file2
You need to view the contents of the tarfile called MyBackup.tar. What
744 Unix utilities command would you use? tar -tf MyBackup.tar
Account
745 Management What is 'su' command ? switch user
Account
746 Management The command to add dba group with gid 600 groupadd -g 600 dba
TIS Base
747 ITIL Which one of the following is not the goal of "Financial Management"? C)Manage service portfolio
The primary goal of which process is to provide the rights for users to be able
TIS Base to access a service or group of services, while preventing access to non-
748 ITIL authorized users. C)Access Management
TIS Base Which of the following best means Combination of Internal & External
749 ITIL Sourcing? C)Co-Sourcing
TIS Base
750 ITIL Which one of the following is NOT a major CI type? C)Purchase order
TIS Base
751 ITIL The wording of SLAs and OLAs should be: C)Clear and concise, leaving no room for ambiguity
TIS Base Does Problem Management depend entirely on having a mature Incident C)No, because progress can still be made on solving long-standing
752 ITIL Management process in place? Problems
TIS Base If an organization is able to become more proactive in its ITSM processes,
754 ITIL what is likely to happen to support costs? C)They are likely to gradually reduce
TIS Base C)A Service Desk that is situated in the same location as the users it
755 ITIL Which of the following BEST describes a Local Service Desk structure? serves
TIS Base Which of the following is NOT a step in the Continual Service Improvement
756 ITIL (CSI) model? C)Is there budget?
TIS Base
757 ITIL Which of the following is NOT an activity in the Change Management process? C)Change Design
TIS Base
758 ITIL Which of the following metrics types is NOT a typical type of metrics? C)Baseline metrics
TIS Base C)Service Management is a set of specialized organizational
759 ITIL Which of the following is the CORRECT definition of Service Management? capabilities for providing value to customers in the form of services.
TIS Base C)A database or structured document with information about all live
760 ITIL Which is the best description of a Service Catalogue? IT services, including those available for deployment.
TIS Base
761 ITIL The ITIL V3 core is best described as C)A Service Lifecycle
TIS Base C)A set of pre-defined steps to be followed when dealing with a known
763 ITIL What is the best definition of an Incident Model? type of Incident
TIS Base
764 ITIL Which of the following CANNOT be stored and managed by a tool? C)Wisdom
TIS Base Which ITIL process has the objective of helping to monitor the IT services by
765 ITIL maintaining a logical model of the IT infrastructure and IT services? C)Configuration Management
TIS Base Which of the following will complete the Four P's of Service Design? 1.
766 ITIL Perspectives 2. Positioning 3. Plan 4. ??? C)Patterns
TIS Base C)The business unit that requires the service fully funds for all its IT
768 ITIL What is "Managed Service"? services.
770 Benefit of NAS Solution is Enables ability to share data across platforms
772 Which topology best suits for Availability and if cost is not a concern Full Mesh
774 What is LUN (Logical Unit Number)? 2nd level of device identification/addressing
775 See the below figure and find out what technology is? Storage Area Network
779 Benefit of NAS Solution is Enables ability to share data across platforms
784 Which RAID group will give better performance, redundancy and Economical RAID 5
A LUN is created from three disks using one partition from each of the
disks.When this LUN is presented to the host, how does the host view the
786 LUN? As a concatenated partition
787 What is the failure that RAID technology guards against? Host failures
788 In an intelligent disk system, what is the role of the back-end? To move data between a host and the array cache
789 Which storage device requires the least data access time? Hard Disk
790 What is host memory? Temporary location for commands and data
792 What is a metric that could be used as part of Monitoring Security? Login failures
796 Benefit of NAS Solution is Enables ability to share data across platforms
799 Which three backup types are considered automatic backups? (Choose three.) User Backup
What is the maximum number of disks you can use in a RAID 1/0 RAID
802 Group? 16
803 What do VLANs reduce? The router traffic overhead in the network infrastructure
804 Each segment of an IP version 4 (IPv4) address contains how many bits? 8
Which data state represents the relationship between the Primary and
805 Secondary arrays? Consistent
809 Multimode cable can be used for short distance up to ? 500 meters
811 What are replicated in storage based remote replication? writes to source devices
812 What are two parts of cache? Data store and tag RAM
What is the name of the drive subassembly containing the platters and R/W
814 heads? HDA
815 What are replicated in storage based remote replication? writes to source devices
Which aspect of monitoring will allow you to predict the possible failure of FC
817 Switch ports before the ports actually fail? Performance
What are the three key data center management activities that are
818 interdependent? Provisioning, Monitoring, Reporting
820 Which feature applies only to an integrated NAS device? Manages storage devices via NAS software
You have five disks in a RAID 0 set, and have assigned a stripe depth of 128
821 blocks (64kB). What is the STRIPE size (kB)? 320
A company has two SAN islands approximately one mile apart. The company
wants to link both sites over its public WAN connection. The fabrics must
remain separate but allow device access from either site. Which protocol is
822 recommended to connect the sites? iFCP
823 What does partitioning do? Divides a physical disk into logical volumes
824 Which statement applies to NAS? Specialized server for block level data access
825 Which protocol is used by a host to access block level storage over IP? iSCSI
The queued writes on the source side exceed the size of the dedicated log file.
Which remote replication technology requires a full synchronization between
826 source and target in this situation? LVM based remote replication
An identifier that uniquely addresses the content of a file and not its
827 Which statement describes Content Address (CA)? location
828 Which layer of the protocol stack re-transmits dropped packets in iSCSI? TCP
829 Which remote replication technology absolutely requires host involvement? Logical volume manager (LVM) Mirroring
An application uses ten 9 GB Devices. A pointer based replica of the
application is required every 4 hours. Each replica will be kept for 24 hours.
The data changes by 10% every 4 hours. How many replica devices are
830 required? 60
831 What describes DAS? Internally deployed block level access storage
Which tool can be used to view the logical and physical topology of an MDS
832 SAN? Fabric Manager
You have a backup and recovery solution in your environment. Several tapes
are available. You want to use different tapes for each set of backup clients.
833 Which backup component do you configure? Pool
837 What is a purpose of zoning? To logically connect array ports and host HBAs
A Copy on First Access replica has been create The source devices are being
used for production operations. When is data copied from the source to the
838 target? All write issued for the first time to a location on the source
839 What is the role of a bus? High speed interconnect among CPU, memory, and disks
841 What is a benefit of a NAS solution? Centralizes storage and simplifies the management
Which sequence of activities describes a read cache hit? 1. Read data is sent
to the host 2. Host sends read request to
843 storage system 3. Cache is searched, and data is found . 2, 3, 1
844 What is stored in tag RAM? Pointers to the location of data in cache and on disk
An application uses ten 10 GB Devices. A pointer based replica of the
application is require The replica will be kept for 24 hours. The data changes
by 20% every 24 hours. How much storage should be allocated for the
845 replication? 20 GB
What channel is valid for connecting storage arrays directly to IP networks for
846 remote replication? Gigbit Ethernet
847 Which requirement is a reason for deploying NAS? Global access to data
849 Which statement is true of parity-based RAID? Parity is updated each time a write is performed
Which network technology uses time division multiplexing for sending data
850 from multiple subscribers as an optical signal? SONET
851 In which management task would you collect and analyze ISL traffic metrics? Performance
Which aspect of monitoring will allow you to prevent a file system from
853 running out of space? Server Capacity
856 In fiber channel physical layer data rate of up to? 200 MBps or 2 Gbps.
In an order processing system, which data center element manages the order
857 entry process? Application
Which term refers to the information that can be accessed on a disk drive by
858 all the heads without having to seek? cylinder
859 Which RAID type uses a single drive to maintain parity? RAID 3
861 What are SC and LC connectors? Standard connectors for fiber optic cables
862 In a SAN-based backup environment, how does metadata travel? Over SAN
865 Each segment of an IP version 4 (IPv4) address contains how many bits? 8
What is the maximum number of disks you can use in a RAID 1/0 RAID
866 Group? 16
870 What type of Fabric switch ports are joined to form an ISL? E_Port to E_Port
871 Which IP Storage protocol requires iSNS for discovery and management? iFCP
TIS Base
875 Wintel Which of the following IRQs are used for LPT1? 7
TIS Base
876 Wintel What is another name for 10BaseT? Twisted Pair
TIS Base
877 Wintel If a network has a Windows NT domain controller, what kind of network is it? Server-based
TIS Base Which of the following operating systems is designed for servers used in a large
878 Wintel enterprise network? Windows 2003 Enterprise
TIS Base
879 Wintel A 10BaseT network must be terminated with (?)-ohm terminators. None of the above
TIS Base
880 Wintel WDM is an acronym for Win32 Driver Model
TIS Base
881 Wintel Which IRQ has a standard function as the math coprocessor? 13
TIS Base
882 Wintel Which IRQ has a standard function as COM1? 4
TIS Base
883 Wintel Which of the following network devices translates between data formats? Gateway
TIS Base
884 Wintel Another name for 10Base2? Thinnet
TIS Base
885 Wintel Files in an EFS partition are- Encrypted
TIS Base
886 Wintel To uninstall Windows XP(?) None of the above
TIS Base
887 Wintel Windows clustering provides with of the following benefits? ansAll of the above
TIS Base In an OEM directory structure, the equivalent to the root drive on which
888 Wintel Windows XP will be installed is called- \$winnt$
TIS Base
889 Wintel What network evolved from the Defense Department's ARPANET? Internet
You are a help desk technician for your company. An employee named Marc is
attempting to open a Microsoft Word document Phonelist.doc by using
Internet Explorer. However, when he types http://Server1/Files/Phonelist.doc
TIS Base into the address bar in Internet Explorer, he receives the following error Instruct Marc to type file:\\server1\File\Phonelist.doc into the address
890 Wintel message: "404: Page not found.” You verify that Phonelist.doc exists in a bar in Internet Explorer
shared folder named Files on Server1. You need to ensure that Marc can
access Phonelist.doc by using Internet Explorer. What should you do?
Which of the following correctly identifies the files that load the kernel, the
TIS Base hardware abstraction layer (HAL), and the registry information during
891 Wintel startup on Windows XP 64-bit and Windows XP Professional machines? Windows XP 64-bit: ia64ldr.efi; Windows XP Pro: ntoskrnl.exe
You are the desktop support technician for Margie's travel. Every day, a user
named Andrea successfully faxes travel itineraries from her Windows XP
Professional computer. Andrea's computer is configured to use an external fax
device. The fax device is configured to receive faxes. However, Fax monitor
TIS Base does not Answer: any incoming calls. You need to configure Andrea's Configure the fax device to automatically Answer: incoming fax calls
892 Wintel computer to receive faxes.What should you do? after the first ring
You want to issue a command on your Windows XP Professional machine to
monitor a remote XP Pro workstation and run the execute.bat file in your
C:\bin directory whenever an event with event ID 4133 occurs with an error in
the remote machine's System event log. The remote XP system's name is
ridiculous, and it's a member of the same domain as your XP system. Your
TIS Base account has Domain Administrator access. Which of the following commands eventtriggers /create /s ridcully /tr "execute" /eid 4133 /l system /t
893 Wintel should you run? error /tk c:\bin\execute.bat
TIS Base
894 Wintel Which of the following features are available with IIS included with XP ? HTTP keep alives
You are a help desk technician for your company. Helene is a user in the sales
department who works from home. She reports a problem on her Windows XP
Professional computer. You instruct Helene to send you a Remote Assistance
invitation, and then disconnects from the ISP. You receive the invitation on
your Windows XP Professional computer and instruct Helene to reconnect to
her ISP. After you accept the invitation, you cannot connect to Helene's Instruct Helene to send a new Remote Assistance invitation and
TIS Base computer. You need to establish a Remote Assistance connection with Helene's remain connected to her ISP. From your computer, accept the new
895 Wintel computer. What should you do? invitation
You install a SCSI adapter and a SCSI tape drive on your Windows XP
Professional computer. You start the computer and Windows XP Professional
detects and installs drivers for the new SCSI devices. Later the same day, you
restart your computer. During the startup process, the computer stops loading
Windows XP Professional. You then restart the computer and it stops again.
TIS Base You want to enable your Windows XP Professional computer to start Start the computer by using the Recovery Console. Disable the SCSI
896 Wintel successfully. What should you do? adapter device driver by using the disable command
You need to install Windows XP Professional on 30 new computers. You also
need to deploy a Windows XP Professional service pack during the installation.
First, you create a network distribution folder named InstallFiles. You copy
TIS Base the i386 folder from the Windows XP Professional CD to the InstallFiles folder. From an existing client computer, run the Update -s:InstallFiles
897 Wintel What should you do? command from the service pack to the InstallFiles folder
You are the administrator of a Windows 2003 network. You replace the
uniprocessor computers in the graphics department with 25 new MPS-
compliant computers. Each computer has two 550- MHz processors.You install
the software that users need to perform their work. The software includes
Win32-, Win16-, and DOS-based applications. Users report that when they use
a Win 16-based application, they do not notice an improvement in
performance compared to using the uniprocessor computers. You want the
TIS Base users in the graphics department to be able to see a noticeable improvement in Replace the Win16-based applications with available Win32-based
898 Wintel performance. What should you do? applications
Your computer has Windows XP Professional installed. Your office has a
power outage while you are running the Windows XP disk defragmenter.
TIS Base When you restart your computer, you receive the following error message:
899 Wintel "Bad or missing operating system". What should you do? Start the computer by using the Windows XP Professional CD-ROM
You want to write a script that encrypts each user's My Documents folder
TIS Base using EFS. It has to be scheduled only run once. What tool must you use in the
901 Wintel script? Cipher
You are the desktop administrator for your company. All users have Windows
XP Professional or Windows 7 Client computers. Users in the accounting
department run an application that requires several hours to process financial
and accounting datUsers in the accounting department report that when they
run this application, the performance of other business applications becomes
significantly slower.You need to allow the accounting application to run with
TIS Base the least amount of performance impact on the other business applications.
902 Wintel How should you configure the users applications? Configure all accounting application to have Below Normal priority
You are a help desk technician for your Litware,InLitware, Inmaintains a
secure intranet web site at intranet litwareinc.com. All employees use Windows
XP Professional computers. A user named Katherine reports that she cannot
access the secure web site by using internet explorer. When she types
http://intranet.litware.com into the internet explorer address bar, an error
message reports that the digital certificate is not from a trusted source. You
confirm that the intranet web server is using a digital certificate issued by your
company's Enterprise Certificate Authority. The Enterprise Certificate
Authority is locate on a server named certificates.litwareinc.com You need to On Katherines computer, open Internet Explorers list of certificates.
TIS Base ensure that Katherine can access the secure intranet web site without receiving Import a copy of the certificate used by the intranet.litwareinc.com
903 Wintel an error message. What should you do? server into Katherines Trusted Publishers certificates store
TIS Base
904 Wintel Which of the following is Class C IP address? 204.67.118.54
You are the network administrator for Test.com. The Test network
contains seven application servers. Each application server runs a database
application named TestApp.
Requirements for TestApp state that when you add a new user, you must add
the user to the server that has the most available disk space.
TIS Base You need to ensure that you meet the requirements when you add new users to Use System Monitor to generate a histogram view of the LogicalDisk
905 Wintel TestApp. What should you do? object on all seven servers
You are the network administrator for Wipro.com. The sales department
stores data on a server that runs Windows Server 2003. The backup schedule
for the server includes a normal backup on Sundays and incremental backups
on every other day of the week. The sales department data includes a report
that is created by an automated process. The report is included in the standard
backup schedule for the server. The automated process runs on Wednesdays
and Sundays. The process overwrites the previous version of the report. You
need to be able to restore the report if the
standard backup is unavailable. You need to create an additional backup for
TIS Base the report. The backup for the report
906 Wintel cannot interfere with other backup jobs. What should you do? Perform a copy backup on Wednesday night and on Sunday night.
TIS Base
907 Wintel What is the binary network ID of the loopback IP address 1111111
TIS Base
908 Wintel What protocol is used between E-Mail servers SMTP
TIS Base
909 Wintel Which of the following is Class C IP address? 204.67.118.54
TIS Base
910 Wintel Disk Striping with Parity corresponds to which RAID level? RAID 5
TIS Base
911 Wintel A Router operates in which layer of the OSI model? The Network Layer
TIS Base
912 Wintel Windows clustering provides which of the following benefits? All of the above
TIS Base Which reason explains why user sessions may NOT launch seamlessly in a An administrator may have applied a policy using the ICAClient.ADM
913 Wintel Citrix XenApp environment template
Users are attempting to connect to a Presentation Server farm using Program
Neighborhood Agent.
However, they are unable to connect. An administrator suspects policies might
be causing the issue.
Through which type of connection should the administrator connect to first
TIS Base verify whether the issue is caused by a
914 Wintel Windows Group Policy setting or a Citrix Policy setting? Remote Desktop
An administrator is in the process of submitting a request for additional
budget for the upcoming year and wants to
understand the current resource constraints of the Presentation Server
TIS Base environment better.
915 Wintel Which report will provide the administrator with this information? CPU Utilization Management
TIS Base What can you do if a program is not responding to any commands andappears
916 Wintel to be locked up? Open Task Manager, select the appropriate task, and click End Task.
TIS Base Which authentication method sends a challenge to the client that is encrypted
920 Wintel and then sent back to the server? CHAP
Introduction what is the core of the operating system and talks directly with the
921 to unix hardware kernel
Introduction
922 to unix which of the following is a filesystem supported in UNIX? all of the above
Introduction
923 to unix which of the following is a type of file in Unix all of the above
Introduction
924 to unix which is not a file in Unix none of the above
Access to
files and If you execute chmod 770 to a file that you own, the file permission will
925 directories be -rwxrwx---
Access to
files and
926 directories which is not a valid filename in Unix none of the above
Access to
files and which command searches the user's entire searchpath as defined in
927 directories the PATH which
Access to
files and
928 directories what is the most probable output for ls c* all files and directories beginning with c
Access to
files and
929 directories which is one of the property of hard link? cannot span across filesystems
Access to
files and
930 directories which command creates soft link ln -s
Access to
files and
931 directories what is the possible output for "echo test1" command? displays "test1" on the screen
Access to
files and
932 directories chose the odd man out from the four entries cat
Access to
files and
933 directories which of the following statement is true all of the above
935 Editors The key to switch from Command to Insert mode is? I or i or a
936 Editors The keys used to move the cursor let, right, up and down in VI editor is? h, l, k and j
939 Print services The profile file for a csh shell is .cshrc
940 Print services The command to removes a print job from the queue lprm or cancel jobid
943 Handling IO Which of the following commands show your current shell? echo $0
944 Handling IO Odd man out for grep Variables
In grep Utility, the following option can be used to print only lines that entirely
946 Handling IO match pattern x
947 Handling IO Regular expressions in the grep family All the above
Disk
948 Management Which directory you will create for your program files and scripts. bin
Disk
949 Management Which command will display information about all mounted file systems df
Disk
950 Management What does UID and GID signify? User ID and Group ID
Disk
951 Management How to compress a file 'my_file' using gzip command? gzip myfile
Disk
952 Management How do you search for a string 'computer' inside a directory? grep computer *
Disk Which command will add the suffix .gz to the filename and remove the original
953 Management file when you compress a file gzip
Disk
954 Management cat par.3 par.4 par.5 >> report What is the output of above command Writes the contents of the all 3 files into a file called report
Disk
955 Management What is the syntax for zip command? zip file_name.zip file_name
Disk
956 Management What is the command to limit filesizes in Bash or Korn shell ulimit
Disk
957 Management Type the full command you could use to decompress the file "foo.gz" gzip -d foo.gz
Process
958 Management Which of the command sends a kill signal to PID. kill 0
Process The process is dead but have not been removed from the
959 Management What is a zombie state? process table.
Process
960 Management How can you find dead processes? ps -ef | grep zombie
Process
961 Management Command executes commands at a given time. at
Process
962 Management What is command list at jobs ? at -l
Process
964 Management Choose one valid SIGHUP command. kill -HUP <processID>
Process Which of the option with uptime command will list the version
965 Management information ? uptime -V
Process
966 Management What are various IDs associated with a process? PID,PPID,UID,EUID
968 Networking how to make the ethernet interface disable ifconfig eth0 down
969 Networking which protocol is used to transfer the files ans ) ftp
970 Networking what is the command to be sounded after each file transfer is completed. bell
971 Networking A system administration tool and shortly know has interface configuration ? ifconfig
You are covering for another system administrator and one of the users asks
972 Unix utilities you to restore a file for him. You locate the correct tarfile by tar tvf tarfile
Account
973 Management What is the command to delete an user account userdel -r login
Account
974 Management What is the command to create user oracle with default login group dba useradd -g dba oracle
TIS Base
975 ITIL Which one of the following is not a process in "Service Transition"? D)Service Level Management
TIS Base
976 ITIL Which is the correct sequence of events in the selection of a technology tool? D)Requirements, Selection Criteria, Evaluate Product, Select Product
TIS Base
977 ITIL Which of these best describes the purpose of Capacity Management? D)To provide cost-effective IT capacity to meet agreed service levels
TIS Base
978 ITIL Which one of the following is not a process in Continual Service Improvement? D)Service Desk
TIS Base D)Technical support staff are less likely to be interrupted to deal with
979 ITIL Which of these is a DIRECT benefit of having a Service Desk? user’s calls
TIS Base
980 ITIL At what point does an Incident turn into a Problem? D)Never
TIS Base D)To ensure that service availability matches or exceeds the agreed
981 ITIL The main objective of Availability Management is? needs of the business
TIS Base
982 ITIL Incident Management has a value to the business by? D)Contributing to the reduction of impact
TIS Base Which of the following is NOT an activity that IT Operations Management is
983 ITIL responsible for? D)Maintenance of a stable technical infrastructure.
TIS Base D)During the design stage, for each new service, major change to a
984 ITIL When should a Service Design Package be produced? service or removal of a service.
TIS Base Learning and improvement is the primary concern of which of the following
985 ITIL elements of the Service Lifecycle? D)Continual Service Improvement
TIS Base
986 ITIL Application Management is NOT responsible for? D)Developing operational functionality required by the business
TIS Base
989 ITIL A Service Catalogue should contain which of the following? D)Details of all operational services
TIS Base D)A process for defining what is to be measured, gathering the data,
990 ITIL The 7 Step Improvement Process can most accurately be described as? processing the data and using it to take corrective action
The spell check module of a word-processing software package contains a
number of errors. The Development department has corrected these errors in
TIS Base a new version. Which process is responsible for ensuring this updated version
991 ITIL is tested? D)Release Management
TIS Base
992 ITIL Which of the following is the process rather than a department? D)Availability Management
TIS Base Of which ITIL process are Reliability, Serviceability and Maintainability
993 ITIL components? D)Availability Management
TIS Base
994 ITIL Which of the following statements is true about the term Event? D)All of above
TIS Base
995 ITIL Which of the following statements is true about Access Management? D)All of above
996 Which Protocol is used to send data through Ethernet for Backup NDMP
997 Choose the three SCSI Addressing components Initiator, Target, LUN ID
998 The FC-HBA card in a SAN Fabric is identified or addressed using WWN
999 Size of the Content Address When the CAS Stores a Data Object 128 bit
1000 Which RAID would be best suitable for Video Streaming Applications RAID 3
1002 Which RAID level provides the best performance for random write? RAID 10
1003 Which Protocol is used to send data through Ethernet for Backup NDMP
1004 Size of the Content Address When the CAS Stores a Data Object 128 bit
1005 What is implemented in storage arrays to prevent unauthorized access Lun Masking
1006 What is the fundamental unit of block storage that is provided in a SAN? Logical unit
Name the two types of storage connectivity which are associated with block
1007 level data SAN
1013 Which Protocol is used to send data through Ethernet for Backup NDMP
1014 Choose the three SCSI Addressing components Initiator, Target, LUN ID
1015 Which three backup types are considered automatic backups? (Choose three.) Differential Incremental
1016 What are two advantages of multiplexing? (Choose two.) increased drive utilization
1019 How is an advanced file type device better than a regular file type device? Supports multiple simultaneous recoveries
1021 What describes the Fibre Channel storage protocol (FCP)? SCSI over FC
Which data state represents the relationship between the Primary and
1022 Secondary arrays Synchronizing
1024 Which statement applies to NAS friendly applications? Applications support global access to storage
1029 Which statement about NDMP backup is correct? NFS and CIFS permissions on the same file system are preserved
1030 Which type of RAID rotates parity among the group members? RAID-5
What is the standard layer that resides between managed objects and
1037 management software? SMI-S
A disk is divided into three LUNs. One LUN is presented to a host. How does
1040 the LUN appear to the host? As a single disk
1041 Why would you implement an iSCSI solution? Leverages existing IP network infrastructure
A pointer based replica has been create Source devices are being used for
production operations. When is data copied from the source to the save
1043 location? First write to a location on the source
Which topology increases connectivity within the SAN while conserving overall
1044 port utilization? Core Edge
1045 Which remote replication solution has the highest bandwidth requirements? Host based asynchronous LVM Mirroring
1046 What represents the layering of protocols in a Fibre Channel SAN? SCSI over FC
1048 How are nodes typically connected to a two tier Core Edge fabric? Host on Edge, storage on Core
1050 What is a primary concern when using Internal DAS? Single points of failure
1051 What is a primary concern when using Internal DAS? Single points of failure
1052 Which task is an example of monitoring the utilization of a data center object? Viewing a list of filesystems that are nearly full
A pointer based replica has been created and is being used for decision
1053 support. When is data copied from the source to the save location? First write to a location on the target
Which Data Center infrastructure component does the Array receive
1054 read/write commands from? Server
1056 Which remote replication solution has the lowest bandwidth requirement? Log shipping over IP networks
1057 What do you monitor as part of a SAN health check? Port status change
1058 What best defines NAS? Specialized server for file level data access
If site A is 1000 miles (1600 km) away from site B, which method is NOT
1059 suitable for remotely replicating data from A to B? Synchronous
What is a benefit of tracking changes to the source and target devices after a
1061 point in time replica is created? Speeds up the re-synchronization of the source and target
What is the size of the unique Content Address when the CAS stores a data
1062 object? 128 bit
You want to ensure that your storage solution can grow with your business.
1063 Which requirement of storage systems applies to this goal? Scalability
When is data copied from the source to the save location in pointer based
1064 replica technology? First write to a location on the source
You must create a chargeback system for cost recovery in the IT department.
1066 Which activity supports this goal? Reporting
When assigning CLARiiON storage space to a host, what is the order of Create the RAID groups, bind the LUNs, and assign the LUNs to the
1071 operations? host
1072 What does a serial ATA cable attach to a host? DAS disk
1073 When considering a NAS deployment, what is a challenge? Only file level access support
1075 What is a characteristic of an integrated NAS system? Offers multiple connectivity options with the back-end
1076 Which SAN topology offers the greatest degree of scalability? Switched Fabric
What are the two [2] primary reasons why businesses collect and store data
1078 over long periods of time? Regulations and compliance
1079 What were two [2] problems with decentralized, client-server based storage? Speed of access to data
Which key requirement of storage systems refers to the ability of the storage
1082 solution to grow with the business? Scalability
1083 Which type of RAID rotates parity among the group members? RAID-5
Which data state represents the relationship between the Primary and
1086 Secondary arrays? Synchronizing.
1087 What describes the Fibre Channel storage protocol (FCP)? SCSI over FC
What is the minimal iSCSI security level needed to protect against man-in-the-
1093 middle insertion, modification or deletion? digest for header and data integrity
1094 Which two RAID type use parity for data protection? RAID 5
1096 what are the NAS file services protocols? NFS & CIFS