IT資格を学ぶ、killtestブログ

killtestブログは世界最も最新のITテスト問題集を提供いたします!

Lpi LPIC Level3 117-303

2010-07-08 11:47:30 | 日記
Lpi LPIC Level3 117-303

1. An administrator has just configured an OpenVPN client. Upon starting the service, the following
message is displayed:
TLS Error: TLS key negotiation failed to occur within 60 seconds
Which of the following statements is true?
A. The client was unable to establish a network connection with the server.
B. The client was able to establish a network connection with the server, however TLS key negotiation
failed, resulting in a fallback to SSL.
C. The client was able to establish a network connection with the server, however TLS and SSL security
are not enabled.
D. The client was able to establish a network connection with the server, however TLS key negotiation
took longer than 60 seconds, indicating that there may be a problem with network performance.
Answer: A

2. SELinux has just been installed on a Linux system and the administrator wants to use SELinux in
permissive mode in order to audit the various services on the system. What command will switch
SELinux into permissive mode?
A. setenforce 0
B. /etc/init.d/selinux stop
C. selinux passive
D. /etc/init.d/selinux startpassive
Answer: A

3. Which of the following export options, when specified in /etc/exports, will tell the server to use the
NFSv4 Pseudofilesystem?
A. fsid=2
B. fsid=0
C. fsid=3
D. fsid=1
Answer: B

4. Which of the following are common techniques for securing a sendmail server? (Select THREE correct
answers)
A. Maintain user accounts in an LDAP directory.
B. Enable TLS.
C. Disable VRFY.
D. Run sendmail in a chroot'd environment.
E. Disable USRLKUP.
Answer: BCD

5. What does ntop use for data collection?
A. Network packets
B. Log files
C. Frame relay
D. SNMP
Answer: A

6. An administrator has successfully configured a cryptographic volume for dmcrypt, and has added the
following line to /etc/fstab:
/dev/mapper/cryptvol /media/crypt auto defaults 0 0
Upon booting the system, the error message "mount: special device /dev/mapper/cryptvol does not exist"
is displayed. What configuration file has the administrator forgotten to edit? (Provide the full path and
filename)
Answer: /etc/crypttab

7. What command will remove the dmcrypt mapping named cryptvol? (Provide the command with any
options and parameters)
Answer: /sbin/cryptsetup remove crypt-vol cryptsetup remove crypt-vol
8. Which LUKS action, when supplied to the cryptsetup command, will initialize a LUKS partition and set
the initial key? (Provide only the action name)
Answer: luksFormat

9. An administrator has created a mapping with the following command:
cryptsetup luksOpen /dev/sda1 cryptvol
and has set three different keys. Which command below will delete the first key?
A. cryptsetup luksDelKey /dev/sda1 0
B. cryptsetup luksDelKey /dev/sda1 1
C. cryptsetup luksDelKey /dev/mapper/cryptvol 1
D. cryptsetup luksDelKey /dev/mapper/cryptvol 0
Answer: A

10. What command will list basic information about all targets available to cryptmount? (Provide the
command with any options or parameters)
Answer: cryptmount --list /usr/bin/cryptmount -l /usr/bin/cryptmount --list cryptmount -l

11. Which of the following are valid dmcrypt modes? (Choose THREE correct answers)
A. XTS
B. ESSIV
C. GMR
D. KWG
E. LRW
Answer: ABE

12. Which directive in the OpenVPN client.conf specifies the remote server and port that the client should
connect to? (Provide only the directive, without any options or parameters)
Answer: remote

13. You are certain that your kernel has been compiled with ACL support, however, when you try to set an
ACL on a file, you get the following output:
% setfacl m user:hugh:r afile.txt
setfacl: afile.txt: Operation not supported
What is the most likely reason for this problem?
A. There is an error in the command line parameters.
B. There is no user on the system named hugh.
C. The partition has not been mounted with the acl option.
D. The file afile.txt doesn't exist.
Answer: C


The Open Group Certification OG0-081

2010-07-08 10:23:43 | 日記
The Open Group The Open Group Certification OG0-081

1. 1.CA.1: All of the following elements are required in the Application Architecture Baseline Document
except ____.
A. architecture models of the candidate system(s)
B. business and organization units supported
C. precedent and successor applications
D. owner(s) or business unit(s) responsible for requirements
E. hardware and software platforms used
Answer: A

2. 1.CA.6: Which of the following would be a potential downstream use of the qualitative criteria for the
application architecture
A. managing code quality
B. generating service level agreements
C. regression testing
D. gap analysis
E. All of the above
Answer: B

3. 1.D.2: The TOGAF Technical Reference Model _____.
A. is intended as an example and should be tailored to the organization's needs
B. must be used "as is" for developing comprehensive architecture models
C. contains several industry specific frameworks
D. is intended to contain the Enterprise Continuum
E. contains only solution building blocks
Answer: A

4. 1.P.3: Which of the following statements about architecture principles is most true?
A. Architecture principles must be tailored to the requirements of a given architecture project
B. Architecture principles are intended to be enduring and seldom amended
C. Architecture principles cannot transcend the organization's business strategies and objectives
D. Executive Management can define principles as a means of enforcing compliance to its policies and
rules
E. Due to their sensitive nature, architecture principles should be kept confidential
Answer: B

5. 1.E.2: During Phase E - Opportunties and Solutions, a gap analysis can be used to compare the ____
between the as-is and the to-be architecture.
A. requirements
B. Solution Building Blocks
C. Architecture Building Blocks
D. business functions
E. standards
Answer: D

6. 1.F.1: What is the objective of Phase F?
A. To establish the IT Governance framework that will be used to direct deployment.
B. To sort the implementation projects into priority order for implementation and migration.
C. To implement change management processes that will be used to manage the implementation
projects.
D. To validate the architecture vision.
E. All of these tasks
Answer: B

7. 1.G.1: What are the key inputs to Phase G - Implementation Governance?
A. reusable solution building blocks
B. statement of architecture work
C. request for architecture work
D. all of these items
E. impact analysis
Answer: D

8. 1.H.1: As the ADM cycle is completed for a given architecture program, the architecture staff is
responsible for ____.
A. Project planning
B. Final appraisal of the implemented architecture
C. Ongoing monitoring of business and technology changes related to the architecture work
D. Implementation Governance
E. Internal marketing of the solution
Answer: C

9. 1.R.1: When can new requirements be added to the requirement management repository?
A. during each phase of the ADM
B. at the Architecture Vision phase
C. anytime during Phases A through D
D. only upon completion of a business scenario
E. when submitting the Request for Architecture Work
Answer: A

10. 2.5: Who usually initiates a Request for Architecture Work?
A. the sponsoring organization
B. the architecture organization
C. the CIO/CTO
D. the architecture governance board
E. senior management
Answer: A