CISCO ITE2:key answer Part Five

Posted 00.23 by Agista Saraswati in Label:
A group of tape drives can be made fault-tolerant by using RAIT (the tape version of RAID). What is this technology called?
tape array

Which procedure assigns a local drive letter to a remote shared directory?
drive mapping

Command Prompt
c:\>net use j: \\mystuff\cdlist
The command in the graphic has been entered. What will be the result?
The system connects to the cdlist share on the mystuff server.

What is the correct syntax for the Linux mount command?
mount servername:/directory/subdirectory /localdirectory

You would like to map the N drive to the TEAM1 subdirectory in the GROUPS directory. The directories reside in the volume DATA1 on the server CMF1. Which command sets up this mapping on a NetWare network?
map N:= CMF1\DATA1:GROUPS\TEAM1

Which Linux command is used to create partitions on a hard disk?
fdisk

Which Linux command is used to create filesystems on a partition?
mkfs

What is the function of the /etc/crontab file in Linux?
to schedule system jobs

!! 12:31am up 197 days, 16:06, 2 users, load average: 0.00, 0.00, 0.00
51 processess: 50 sleeping,1 running, 0 zombie, 0 stopped
Cpu states: 0.1% user, 0.1% system, 0.0% nice, 99.6% idle (itd)
Based on the output in the graphic, which Linux utility is running?
top


What is a Core Dump?
a file containing data from a program crash

Which Linux command can be used to terminate a process?
kill

Which disk management tool acts as a storage ceiling to limit the amount of data each user can store on the network?
disk quotas

Which item boosts system performance by allocating space on the hard drive and treating it as an extension of memory?
virtual memory

Which of the following is the result of poor memory management and lack of available RAM?
program crashes

In Windows 2000, where would a user look to find information about system resources?
Performance tool

Linux administrators have several CLI commands available to display information on system resources. What is the output associated with using the du command?
a display of disk usage for a directory

Which output does the df command produce when executed from the Linux CLI?
detailed information about the file system

What are three key concepts when analyzing and optimizing network performance?
bottlenecks, baselines, and best practices

When should a baseline reading of network performance be made?
when the network is running normally

Why would you see a download speed of around 6.25-KBps when downloading a file from the Internet using a 50-Kbps connection?
One unit of measure refers to bits, the other refers to bytes.

What is the function of a protocol analyzer?
capturing packets transmitted between two or more network devices

There are several advantages of using SNMP over CMIP as a network management tool for small to medium sized businesses. Which of the following is an advantage?
Overhead for SNMP is considerably less than what is required for CMIP.

What is the centralized location for managing SNMP?
management station

What is the function of the MIB?
organize the information gathered about a network

What is X Windows?
It is a GUI interface used by Linux.

In Linux, which command is used to switch from the X Windows GUI to the CLI?
Ctrl+Alt+F1

What does the # symbol indicate at the Linux prompt?
root access

In Linux, which command allows users to learn more about any command?
man

In Linux, what is the function of the cd .. command?
changes to the directory above the current directory

Which Linux shell uses the % symbol as the default prompt?
C Shell

Hello
This is a great chapter for learning about vi
~
~
:i

You are working in the vi editor and see the screen in the graphic. What will happen when you press Enter?
Vi will be set to edit mode.

What are Pico and vi?
text editors

Which command character allows users to enter the vi edit mode?
i

Which command does the root user issue to create new user accounts?
useradd

On a Linux system, which configuration files contain user account information?(Select two.)
/etc/passwd
/etc/shadow

[root@csd root0# rm -r / home/userl


The administrator is logged in as the root user. What will happen when the command displayed in the graphic is executed?
All files and directories from the root level down will be deleted.

In Linux, when is the root account typically created?
during NOS installation

Which file must be edited by the Linux administrator to manually disable a user's password?
/etc/shadow


0 comment(s) to... “CISCO ITE2:key answer Part Five”

0 komentar:

Posting Komentar