Monday, 5 May 2014

117-202 Certification Test

LPI
117-202
LPI Level 2 Exam 202, Advanced Level Linux Certification, Part 2 of 2

Question: 1

Given this excerpt from an Apache configuration file, which of the numbered lines has INCORRECT syntax? 1: <VirtualHost *:80> 2: ServerAdmin admin9@server.example.org 3: DocumentRoot /home/http/admin 4: ServerName admin.server.example.org 5: DirectoryIndex index.php default.php 6: ErrorLog logs/admin.server.example.org-error_log 7: CustomLog logs/admin.server.example.org-access_log common 8: </VirtualHost> 

A. 1
B. 1 and 4
C. 1, 4 and 7
D. 1 and 5
E. None. The configuration is valid 

Answer: E    

Question: 2

Select the TWO correct statements about the following excerpt from httpd.conf: <Directory /var/web/dir1> <Files private.html> Order allow, deny Deny from all </Files> </Directory> 

A. The configuration will deny access to /var/web/dir1/private.html, /var/web/dirl/subdir2/private.html, /var/web/dirl/subdir3/private.html and any other instance of private.html found under the /var/web/dir1/directory.
B. The configuration will deny access to /var/web/dir1/private.html, but it will allow access to /var/web/dirl/subdir2/private.htm1, for example.
C. The configuration will allow access to any file named private.html under /var/web/dir1, but it will deny access to any other files
D. The configuration will allow access just to the file named private.html under /var/web/dir1
E. The configuration will allow access to /var/web/private.html, if it exists 

Answer: A, E    

Question: 3

Considering the following excerpt from the httpd.conf file, select the correct answer below: <Location> AllowOverride AuthConfig Indexes </Location> 

A. The Indexes directive in the excerpt allows the use of other index-related directives such as DirectoryIndex
B. Both directives AuthConfig and Indexes found in the server's .htaccess file will be overridden by the same directives found in the httpd.conf file
C. The AuthConfig used in the excerpt allows the use of other authentication-related directives such as AuthType
D. The excerpt is incorrect, as the AllowOverride cannot be used with Indexes, since the latter cannot be overridden E. The excerpt is incorrect, because AllowOverride cannot be used inside a Location section 

Answer: E    

Question: 4

Which of the following lines in the Apache configuration file would allow only clients with a valid certificate to access the website? 

A. SSLCA conf/ca.crt
B. AuthType ssl
C. IfModule libexec/ssl.c
D. SSLRequire
E. SSLVerifyClient require 

Answer: E    

Question: 5

Which TWO of the following options are valid, in the /etc/exports file? 

A. rw
B. ro
C. rootsquash
D. norootsquash
E. uid 

Answer: A, B    

Question: 6

Which of the following is needed, to synchronize the Unix password with the SMB password, when the encrypted SMB password in the smbpasswd file is changed? 

A. Nothing, because this is not possible.
B. Run netvamp regularly, to convert the passwords.
C. Rin winbind --sync, to synchronize the passwords.
D. Add unix password sync = yes to smb.conf.
E. Add smb unix password = sync to smb.conf. 

Answer: D    

Question: 7

The new file server is a member of the Windows domain "foo". Which TWO of the following configuration sections will allow members of the domain group "all" to read, write and execute files in "/srv/smb/data"? 

A. [data] comment = data share path = /srv/smb/data write list = @foo+all force group = @foo+all create mask = 0550 directory mask = 0770
B. [data] comment = data share path = /srv/smb/data write list = @foo+all force group = @foo+all create mask = 0770 directory mask = 0770
C. [data] path = /srv/smb/data write list = @foo+all force group = @foo+all create mask = 0770 directory mask = 0770
D. [data] comment = data share path = /srv/smb/data write list = @foo+all force group = @foo+all directory mask = 0770
E. [data] comment = data share path = /srv/smb/data write list = @foo+all force group = all create mask = 0550 directory mask = 0770 

Answer: B, C    

Question: 8

Which command can be used to list all exported file systems from a remote NFS server: 

A. exportfs
B. nfsstat
C. rpcinfo
D. showmount
E. importfs 

Answer: D    

Question: 9

During which stage of the boot process would this message be seen? Ide0: BM-DMA at 0xff00-0xff07, BIOS settings: hda:DMA, hdb:DMA 

A. Boot loader start and hand off to kernel
B. Kernel loading
C. Hardware initialization and setup
D. Daemon initialization and setup 

Answer: C    

Question: 10

Where should the LILO code reside, on a system with only one installation of Linux and no other operating systems? 

A. In the master boot record
B. In the boot sector
C. In the /boot directory
D. At the start of the kernel 

Answer: A    

Question: 11
During which stage of the boot process would this message be seen? ide_setup:hdc=ide-scsi 

A. Boot loader start and hand off to kernel
B. Kernel loading
C. Hardware initialization and setup
D. Daemon initialization and setup 

Answer: B    

Question: 12

What happens when the Linux kernel can't mount the root filesystem when booting? 

A. An error message is shown, showing which device couldn't be mounted or informing that init couldn't be found.
B. An error message is shown and the system reboots after a keypress.
C. An error message is shown and the system boots in maintenance mode.
D. An error message is shown and the administrator is asked to specify a valid root filesystem to continue the boot process.
E. An error message is shown, stating that the corresponding kernel module couldn't be loaded. 

Answer: A    

Question: 13

Messages from programs are not appearing in the user's native language. What environment variable must be set for this to happen? 

A. LANG
B. I18N
C. MESSAGES
D. MSGS
E. LC_MSGS

Answer: A    

Question: 14

When bash is invoked as an interactive login shell, which of the following sentences is true? 

A. It first reads and executes commands in /etc/profile and then does same for ~/.bash_profile and ~/.bashrc 
B. It first reads and executes commands in /etc/bashrc and then does same for /etc/profile
C. It reads and executes commands in ~/.bashrc only if /etc/profile or another initialization script calls it. D. It ignores /etc/profile and only reads and executes commands in ~/.bashrc
E. It first reads and executes commands in /etc/profile and then does same for ~/.bash_profile, ~/.bash_login and ~/.profile 

Answer: C    

Question: 15

Why is the root file system mounted read-only during boot and remounted with write permission later on? 

A. Because if problems with the root file system are detected during the boot, fsck can be run, without risk of damage.
B. Because this way crackers cannot collect information about root with boot sniffers
C. To avoid writing to the disk, unless the root password is known.
D. To avoid other operating systems overwriting the Linux root partition
E. Because the disk has its own write protection that cannot change by the operating system. 

Answer: A    




98-379 EXAM PDF

Microsoft
Software Testing Fundamentals
98-379

Question: 1

Match each status to its test step. To answer, drag the appropriate status from the column on the left to its test step on the right. Each status may be used once, more than once, or not at all. Each correct match is worth one point.

Answer: 

Question: 2

This question requires that you evaluate the underlined text to determine if it is correct. Bug tracking is the process of assigning severity and priority to a reported bug. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct. 

A. No change is needed
B. Logging
C. Resolution
D. Triage 

Answer: D    

Question: 3

You are asked to train an intern to create bug reports by using Team Foundation Server (TFS). You review the following bug report your intern created:
 When this bug occurs, the user cannot continue using the application. Use the drop-down menus to complete each statement. Each correct selection is worth one point.



Answer: 

Question: 4

You use Microsoft Test Manager to test a solution. Which two statements about using test cases in Microsoft Test Manager are correct? (Choose two.) 

A. You can share steps between different test cases.
B. You need to add all fields to a test case when you create the test case.
C. You must define test cases by using Microsoft Test Manager.
D. You can add attachments and hyperlinks to test cases. 

Answer: A, D    

Explanation:  Reference: 
http://msdn.microsoft.com/en-us/library/vstudio/dd380712(v=vs.110).aspx

Question: 5

When you log a bug, which two items should you include in the bug report to reproduce the bug? (Choose two.) 

A. The actions leading up to the bug
B. The author of the code
C. A description of the actual results
D. The severity of bug 

Answer: A, B    

Question: 6

You run a load test in Microsoft Test Manager. You monitor performance counters by using the Load Test Analyzer. The following graphic displays representative data:
 Use the drop-down lists to complete each statement. Each correct selection is worth one point.


Answer: 

Question: 7

This question requires that you evaluate the underlined text to determine if it is correct. Severitydescribes how much a defect affects an application. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct. 

A. No change is needed
B. Effect level
C. Scope
D. Priority 

Answer: A    

Question: 8

You need to show the rolling average of the number of bugs that the testing team has opened, resolved, and closed.   Which report should you show? 

A. Bug trend
B. Build quality indicators
C. Bug status
D. Burn rate 

Answer: A    

Question: 9

This question requires that you evaluate the underlined text to determine if it is correct. Bug convergence is the point at which the number of bugs resolved exceeds the number of bugs found. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct. 

A. No change is needed
B. Baseline
C. Burndown
D. Code coverage 

Answer: A    

Question: 10

How many test plans are created in projects that use an agile methodology? 

A. One master test plan and one test plan for each sprint
B. One test plan for each sprint
C. One master test plan
D. Multiple test plans for each sprint 

Answer: A    

Question: 11

As part of a development team in a test-driven development environment, you are given the requirements for a new software system. What should you do first? 

A. Implement the system in the code.
B. Write a user story for the system.
C. Run all existing test cases to validate they succeed.
D. Write a test case for the new system. 

Answer: D    

Question: 12

This question requires that you evaluate the underlined text to determine if it is correct. In a use case diagram, the association between an actor and a use case can show a generalization at each end. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct. 

A. No change is needed
B. Alternative
C. Multiplicity
D. Subsystem boundary 

Answer: C    

Question: 13

This question requires that you evaluate the underlined text to determine if it is correct. Fault tolerance is a redundancy technique that completely hides errors within a set of redundant modules. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct. 

A. No change is needed
B. Fault masking
C. Exception handling
D. Regression testing 

Answer: B    

Question: 14

A system has the following requirement: Patients should be sent to the Emergency Room if their respiratory rate is >= 20 and their age is >= 65. How many test cases should you write to test all combinations of conditions? 

A. 0
B. 2
C. 4
D. 9 

Answer: D    

Question: 15

You create work items to test the features of an application. Match each work item type to its description. To answer, drag the appropriate work item type from the column on the left to its description on the right. Each work item type may be used once, more than once, or not at all. Each correct match is worth one point.


Answer: