2014 Latest CompTIA LX0-102 Exam Demo Free Download!

When attempting to send a file to another user securely with GPG, which of the following actions must be done?

A.    Encrypt the file using your public key.
B.    Encrypt the file using their public key.
C.    Encrypt the file using your private key.
D.    Encrypt the file using their private key.
E.    Sign the file with your public key.

Answer: B

In xorg.conf, which of the following sections is concerned with fonts?

A.    The Fonts section
B.    The Files section
C.    The xfsCodes section
D.    The Graphics section
E.    The modeline section

Answer: B

Which of the following outputs will the below command sequence produce? echo ‘1 2 3 4 5 6’ | while read a b c; do echo result: $c $b $a; done

A.    result: 3 4 5 6 2 1
B.    result: 1 2 3 4 5 6
C.    result: 6 5 4
D.    result: 6 5 4 3 2 1
E.    result: 3 2 1

Answer: A

X is running okay but an administrator is concerned that the correct color depth set is not configured. Which of the following commands will show the administrator the running color depth while in X?

A.    xcd
B.    xcdepth
C.    xwininfo
D.    xcolordepth
E.    cat /etc/X11

Answer: C

Which of the following words is used to restrict the records that are returned from a SELECT query based on supplied criteria for the values in the records?

B.    FROM
D.    IF

Answer: C

Which of the following outputs will the command seq 10 produce?

A.    A continuous stream of numbers increasing in increments of 10 until stopped.
B.    The numbers 1 through 10 with one number per line.
C.    The numbers 0 though 9 with one number per line.
D.    The number 10 to standard output.

Answer: B

Which of the following is the purpose of the Sticky Keys feature in X?

A.    To assist users who have difficulty holding down multiple keys at once
B.    To prevent repeated input of a single character if the key is held down
C.    To ignore brief keystrokes according to a specified time limit
D.    To repeat the input of a single character

Answer: A

Which of the following commands can be used to activate a specific network interface?

A.    ipup
B.    net
C.    ifup
D.    netup

Answer: C

An administrator is looking into a new script that they have just received from a senior administrator. In the very first line the administrator notices a #! followed by a path to a binary.
Linux will:

A.    ignore the script.
B.    use that binary to interpret the script.
C.    use that binary to compile the script.
D.    be replaced by that binary.

Answer: B

Which of the following commands should be used to print a listing of emails in the system’s mail queue?

A.    sendmail -l
B.    lpq
C.    mailq
D.    mlq

Answer: C

Each entry in a crontab must end with which of the following characters?

A.    tab
B.    space
C.    backslash
D.    newline

Answer: D

A department decided to change the Gnome Display Manager’s greeting. Which of the following configuration files should an administrator edit?

A.    /etc/gnome/greeting
B.    /opt/gnome/share/greeting
C.    /etc/X11/gmd.conf
D.    /etc/X11/gdm/Init/Default

Answer: D

Which of the following are commonly used Mail Transfer Agent (MTA) applications? (Select THREE).

A.    postfix
B.    procmail
C.    sendmail
D.    exim
E.    smtpd

Answer: ACD

On a dual boot system, every time the system is booted back into Linux the time has been set backward by two hours. Which of the following commands will correct the problem so it will not occur again?

A.    ntpdate pool.ntp.org
B.    date -d ‘two hours’
C.    hwclock –hctosys –localtime
D.    time hwclock

Answer: C

Which of the following files, when using Sendmail or a similar MTA system, will allow a user to redirect all their mail to another address and is configurable by the user themselves?

A.    /etc/alias
B.    /etc/mail/forwarders
C.    ~/.alias
D.    ~/.forward

Answer: D
Passing your CompTIA LX0-102 Exam by using the latest LX0-102 Exam Demo Full Version: http://www.braindump2go.com/lx0-102.html

2014 Latest CompTIA SG0-001 Exam Demo Free Download!

An administrator is attempting to recover corrupted data from a four disk RAID group. However, the administrator does not know which RAID level was used. When investigating the volumes, the administrator notes that there is a duplicate of all data on two of the disks. Which of the following RAID levels was in use?

A.    RAID 0
B.    RAID 5
C.    RAID 6
D.    RAID 10

Answer: D

Given an array with sixteen 300GB drives, a storage administrator needs to know how much raw usable space can be made available while still maintaining a highly available RAID configuration with two hot spares. Which of the following is the MAXIMUM capacity that can be allocated and at which RAID level?

A.    2.1TB, RAID 1
B.    3.6TB, RAID 6
C.    3.9TB, RAID 5
D.    4.8TB, RAID 0

Answer: C

When gathering simple baseline statistics for a storage array, a storage administrator should gather which of the following? (Select TWO).

A.    Read/Write errors
B.    Number of switches connected
C.    Reads/Writes performed
D.    Read/Write throughput
E.    Port loss of signal counts

Answer: CD

A server has dual power supplies, dual mirrored hard drives, multi-pathed multiple NICs, and a dual port HBA for access into a SAN. Which of the following components is a single point of failure?

A.    Power supplies
B.    HBA
C.    NICs
D.    System hard drives

Answer: B

A new storage array is being cabled into a rack. The array has dual controllers, each disk tray has dual power supplies, and there are two in-rack PDUs (C and D). Which of the following is the BEST method for hooking up power?

A.    Connect controller A’s PSUs to PDU C, controller B’s PSUs to D, alternate drive trays between PDUs C and D.
B.    Connect all drive tray PSUs to C and all controller PDUs to D.
C.    Connect both controller’s PSUs to C and all drive tray PSUs to D.
D.    Split all PSU connections between C and D equally.

Answer: D

An administrator needs to assign LUN IDs for two new LUNs from the same storage array. The
first LUN is being presented as LUN 0 to multiple hosts. The second LUN is being dedicated to a single server which is also included in the group of hosts LUN 0 is presented to. Which of the following is the LOWEST LUN ID that can be assigned to the second LUN?

A.    0
B.    1
C.    2
D.    16

Answer: B

In a direct current only datacenter, which of the following is the MOST important rack installation concern?

A.    Sufficient power capacity
B.    Adequate division of circuits
C.    Adequate humidity control
D.    Grounding of all components

Answer: D

Which of the following are the MOST important properties to remember when replacing a faulty SFP? (Select TWO).

A.    SFP TX power
B.    Distance rating
C.    Port speed
D.    SFP RX power
E.    Driver version

Answer: BC

Which of the following is the MOST important item a storage administrator should check FIRST for a successful fabric merge?

A.    Faulty SFPs in the switch
B.    Number of aliases in the zoning database
C.    Domain IDs
D.    Total number of ports in the combined fabric

Answer: C

Which of the following protocols transmits a password in clear text on the network during the login process?

A.    SFTP
B.    SSH
C.    Telnet

Answer: C

A switch with 8Gb ports has been connected with five hosts running at 4Gb speed and two at 2Gb speed. If the switch is communicating through an ISL with another 8Gb switch where the storage array is connected, which of the following will be the oversubscription ratio of this configuration?

A.    1:1
B.    2:1
C.    3:1
D.    5:1

Answer: C

An administrator is tasked to programmatically create twenty 64GB LUNs and one 1GB LUN to be assigned to a four node cluster. Which of the following tools should be used to satisfy the request?

A.    CLI
B.    SMI-S
C.    GUI
D.    SNMP

Answer: A

A senior administrator configuring a firewall would like to know the IP address of a frequently accessed website to verify that site was not accidentally blocked in the content filter by the junior administrator’s recently-added range of blocked IP addresses. Which of the following tools would be used to find the IP address of the website?

A.    ipconfig/ifconfig
B.    nslookup
C.    netstat
D.    tracert/traceroute

Answer: B

A user reports lack of network connectivity on a laptop. No hardware changes have recently occurred on the laptop. Which of the following should the technician check FIRST?

A.    Port
B.    Cable
C.    Firewall
D.    NIC configuration

Answer: B

A small business would like to install their new storage equipment in a closet off of their pool deck. Which of the following environmental concerns should a technician consider FIRST?

A.    Fire suppression
B.    Humidity control
C.    Sufficient power
D.    Rack loading

Answer: B

Which of the following RAID levels provides the BEST guarantee that data will be retained in the event of drive failure without requiring a rebuild?

A.    RAID 0
B.    RAID 1
C.    RAID 3
D.    RAID 5

Answer: B
Passing your CompTIA SG0-001 Exam by using the latest CompTIA SG0-001 Exam Demo Full Version: http://www.braindump2go.com/sg0-001.html

Official 2014 Latest CompTIA SY0-401 Demo Free Download!

Which of the following protocols operates at the HIGHEST level of the OSI model?

A.    ICMP
B.    IPSec
C.    SCP
D.    TCP

Answer: C

Which of the following should an administrator implement to research current attack methodologies?

A.    Design reviews
B.    Honeypot
C.    Vulnerability scanner
D.    Code reviews

Answer: B

Drag and Drop Question
Task: Determine the types of attacks below by selecting an option from the dropdown list.

Which of the following can be implemented in hardware or software to protect a web server from cross-site scripting attacks?

A.    Intrusion Detection System
B.    Flood Guard Protection
C.    Web Application Firewall
D.    URL Content Filter

Answer: C

Which of the following means of wireless authentication is easily vulnerable to spoofing?

A.    MAC Filtering
B.    WPA – LEAP
C.    WPA – PEAP
D.    Enabled SSID

Answer: A

Lab Sim – Configure the Firewall
Task: Configure the firewall (fill out the table) to allow these four rules:
– Only allow the Accounting computer to have HTTPS access to the Administrative server.
– Only allow the HR computer to be able to communicate with the Server 2 System over SCP.
– Allow the IT computer to have access to both the Administrative Server 1 and Administrative Server 2
Use the following answer for this simulation task. Below table has all the answers required for this question.

Jane, a security administrator, needs to implement a secure wireless authentication method that uses a remote RADIUS server for authentication.
Which of the following is an authentication method Jane should use?

A.    WPA2-PSK
C.    CCMP
D.    LEAP

Answer: D

Computer evidence at a crime scene is documented with a tag stating who had possession of the evidence at a given time.
Which of the following does this illustrate?

A.    System image capture
B.    Record time offset
C.    Order of volatility
D.    Chain of custody

Answer: D

A network administrator is configuring access control for the sales department which has high employee turnover. Which of the following is BEST suited when assigning user rights to individuals in the sales department?

A.    Time of day restrictions
B.    Group based privileges
C.    User assigned privileges
D.    Domain admin restrictions

Answer: B

Which of the following is being tested when a company’s payroll server is powered off for eight hours?

A.    Succession plan
B.    Business impact document
C.    Continuity of operations plan
D.    Risk assessment plan

Answer: C

A security analyst, Ann, is reviewing an IRC channel and notices that a malicious exploit has been created for a frequently used application. She notifies the software vendor and asks them for remediation steps, but is alarmed to find that no patches are available to mitigate this vulnerability.
Which of the following BEST describes this exploit?

A.    Malicious insider threat
B.    Zero-day
C.    Client-side attack
D.    Malicious add-on

Answer: B

A security administrator has concerns about new types of media which allow for the mass distribution of personal comments to a select group of people. To mitigate the risks involved with this media, employees should receive training on which of the following?

A.    Peer to Peer
B.    Mobile devices
C.    Social networking
D.    Personally owned devices

Answer: C

A network administrator is responsible for securing applications against external attacks. Every month, the underlying operating system is updated. There is no process in place for other software updates.
Which of the following processes could MOST effectively mitigate these risks?

A.    Application hardening
B.    Application change management
C.    Application patch management
D.    Application firewall review

Answer: C

If you want to pass the CompTIA SY0-401 Exam sucessfully, recommend to read latest CompTIA SY0-401 Demo full version.

1 20 21 22