Oke sekarang kita sudah masuk ke tahap selanjutnya yaitu jawaban Cisco Exam 9-16. Pasti teman-teman sudah pada nunggu-nunggu neh kapan datangnya?. Pada jawaban kali ini ada beberapa exam yang nilai nya belum terlalu sempurna harap di maklumi ya?karena saya juga hanya seorang manusia hehehe. tanpa basa-basi kita langsung menuju ke TKP.
Chapter 9
CORRECT - See section 9.3
A file begins with #!/bin/csh. This means:
Running the script will invoke /bin/csh to interpret the rest of the file
CORRECT - See section 9.4
Which are appropriate editors for writing shell scripts?
nano
vi
CORRECT - See section 9.4
Most of nanos commands take the form of:
Control and another character
CORRECT - See section 9.5.3
Which of the following are correct about for and while loops?
for loops operate over a fixed list of items
while loops have a test each cycle to determine if it should run again
CORRECT - See section 9.5.1
Given the following part of a script:
if [ -f $1 ]; then
echo I am here
fi
What is the meaning of $1?
It is the first argument passed to the script
CORRECT - See section 9.5.1
What is the correct way to assign the word "Hello" to a variable?
A=Hello
CORRECT - See section 9.5.1
What is the correct way to save the current directory to a variable?
A=`pwd`
CORRECT - See section 9.5.1
Which shell command accepts input from the users keyboard?
read
CORRECT - See section 9.5.1
What information is held inside $? ?
The previous commands exit code
CORRECT - See section 9.5.1
How would you finish your script with an exit code of 42?
exit 42
Chapter 10
CORRECT - See section 10.3
Which of the following are valid CPU types for Intel-based platforms?
32 bit
64 bit
CORRECT - See section 10.3
Which of the following commands will display CPU information?
arch
lscpu
cat /proc/cpuinfo
CORRECT - See section 10.3
A CPU flag...
...defines the features that the CPU supports
CORRECT - See section 10.4
Which command displays information from SMBIOS?
dmidecode
CORRECT - See section 10.4.2
Choose all of the following statements that are true in regard to virtual RAM:
Virtual RAM is used when available physical RAM is low.
Virtual RAM is also called swap space
Virtual RAM is stored on a hard drive
CORRECT - See section 10.4.3
Which of the following are common busing systems?
USB
PCI
CORRECT - See section 10.6
A division of a hard drive may be referred to as a _______ . (Choose 2)
partition
slice
CORRECT - See section 10.6
Which of the following are valid partitioning types?
MBR
GPT
CORRECT - See section 10.6
The fdisk command is a tool used for working with the MBR partitioned disks.
True
CORRECT - See section 10.6
Which of the following is the valid device file name for the first IDE hard drive on the system?
/dev/hda
Chapter 11
CORRECT - See section 11.3.2
What does the acronym RPM mean?
RPM Package Management
CORRECT - See section 11.3.1
Which of the following are package management commands for distributions with software distributed in files ending in ".deb"?
dpkg
aptitude
apt-get
WRONG - See section 11.3.2
Which of the following are package management commands for distributions with software distributed in files ending in ".rpm"?
yumex
CORRECT - See section 11.4
The Process ID (PID) of the init process is
1
CORRECT - See section 11.7
The following system load averages are displayed by the top command:
1 minute
5 minute
15 minute
CORRECT - See section 11.8
The free command outputs statistics about:
Memory usage
CORRECT - See section 11.9
What directory typically contains log files?
/var/log
CORRECT - See section 11.9
All log files contain only text data.
False
CORRECT - See section 11.4
To make changes permanent for kernel parameter files found under /proc/sys, the following file can have entries added to it:
/etc/sysctl.conf
CORRECT - See section 11.3.2.4
To get a list of all packages installed on a system using RPM Package Management you can execute:
rpm -qa
Chapter 12
CORRECT - See section 12.3
Which of the following would be considered a host?
A printer attached to the network via an IP address
CORRECT - See section 12.3
A service is...
...a feature provided by one computer to another
CORRECT - See section 12.4
Only servers have hostnames.
False
CORRECT - See section 12.4
Which of the following protocols defines how network communication functions?
TCP/IP
CORRECT - See section 12.5
Which of the following are valid IPv4 addresses?
192.105.10.10
10.33.55.77
CORRECT - See section 12.7.1
The name of the primary wired network devices is ether0.
False
CORRECT - See section 12.7.1
Which of the following commands will display your machine's IP address?
ifconfig
CORRECT - See section 12.7.2
Which of the following commands will display the routing table?
route
netstat -r
CORRECT - See section 12.7.6
Which of the following commands will allow you to log into a remote machine?
ssh
CORRECT - See section 12.7.6
Which of the following commands will allow you to log into the machine server1 with the account name nick?
ssh nick@server1
Chapter 13
CORRECT - See section 13.3
Which files contain user account information?
/etc/passwd
/etc/shadow
CORRECT - See section 13.3.2
Which user can view the /etc/shadow file?
The root user
CORRECT - See section 13.1
Each user is a member of their own private group, of which they are the only member.
True
CORRECT - See section 13.8
Which command will display the users that are currently logged in to the system?
who
CORRECT - See section 13.7.1
The sudo command allows regular users to...
...run certain commands as the root user.
CORRECT - See section 13.6
Which of the following commands will allow you to switch to the user "branch"?
su branch
su -l branch
su - branch
WRONG - See section 13.3.4
Which of the following commands will display the group(s) a user belongs to?
group
CORRECT - See section 13.3.4
Which of the following commands will display the groups that the user "bob" belongs to?
id bob
CORRECT - See section 13.7.1
Sudo privileges can be used to specify which user can use the sudo command to execute commands as other users.
True
CORRECT - See section 13.7.1
In distributions that do not allow the root user to login directly or via the su command, the installation process automatically configures one user account to be able to use the sudo command to execute commands as if they were executed by the root user.
True
Chapter 14
CORRECT - See section 14.13
If a user is deleted, the files and directories that the user owned...
...will show a UID as the owner, but not user name
WRONG - See section 14.8.1
On a system that does not use UPG, the useradd command will also create a user group. For example, user "bob", group "bob".
True
CORRECT - See section 14.12.1
The usermod command can be used to do all of the following except...
...change the user's MAX and MIN password settings
CORRECT - See section 14.12.1
Which option for the usermod command can be used to specify a user's group ID (either primary or secondary)?
-g
-G
CORRECT - See section 14.4
The groupmod command can be used to change a group name.
True
CORRECT - See section 14.4
The groupmod command can be used to change a group GID.
True
CORRECT - See section 14.12
Which command can be used to determine a user's most recent log in?
last
CORRECT - See section 14.7
Which of the following files contains encrypted user password information?
/etc/shadow
CORRECT - See section 14.8.2
Which of the following files contains user IDs?
/etc/passwd
CORRECT - See section 14.12.1
Which of the following commands, run as root, will prevent the user "bob" from logging in?
usermod -L bob
Chapter 15
CORRECT - See section 15.7.2
Only one set (user, group, other) of permission can be changed at once using the symbolic method.
False
CORRECT - See section 15.7
The user "sysadmin" will be able to read the "file" because they own it.
----r--r-- 1 sysadmin group 38270 Sep 2 18:49 file
False
CORRECT - See section 15.7.3
Octal notation uses the following values for the permissions granted:
r = 4, w = 2, x = 1
WRONG - See section 15.7
A user cannot delete a file if they do not own it.
True
CORRECT - See section 15.7
The "execute" permission on a file allows you to:
Run the file as a script
CORRECT - See section 15.5
The chgrp command can be used on a file by:
The file owner and root
CORRECT - See section 15.6
The chown command can be used to change the user owner on a file by:
Only root
CORRECT - See section 15.6
The chmod command can be used on a file by:
The file owner and root
CORRECT - See section 15.6
Which option for the chown command can be used to change the owner of a directory and all the files and directories below it?
-R
CORRECT - See section 15.9
The "execute" permission is never set on files by default.
True
Chapter 16
CORRECT - See section 16.9
The /var directory has files that change over time.
True
CORRECT - See section 16.7
The "sticky bit" permission...
prevents others from removing files they don't own from a common directory
CORRECT - See section 16.7
Which of the following commands will set the "sticky bit" on /shared ?
chmod 1777 /shared
CORRECT - See section 16.3
Which of the following commands will set setuid for /usr/bin/program?
chmod 4755 /usr/bin/program
CORRECT - See section 16.4
The setgid permission...
allows a command to be run as the group owner of the file.
allows files created in a directory to be owned by the group that owns the directory
CORRECT - See section 16.6
Which of the following commands will set setgid on /shared ?
chmod 2777 /shared
WRONG - See section 16.8.3
Deleting a source file will break an associated hard link.
True
CORRECT - See section 16.8.3
Deleting a source file will break an associated symbolic link.
True
CORRECT - See section 16.8.3
A source file and a symbolic link must be part of the same file system.
False
WRONG - See section 16.8.1
Which of the following commands would create a hard link, "link" to "file"?
ln link file
Oke sekian jawaban Cisco Exam 9-16 semoga jawaban ini bisa membantu teman-teman semua, dan tak lupa terimaksih banyak karena sudah berkunjung ke blog saya dan sudah membaca artikel saya. Semoga bermanfaat.