Free Download the Most Update 117-201 Brain Dumps

Attention please! Here is the shortcut to pass your Latest 117-201 practice exam! Get yourself well prepared for the Recent Updates Apr 18,2022 Newest 117-201 exam questions Linux Advanced Administration exam is really a hard job. But don’t worry! We We, provides the most update 117-201 dumps. With We latest 117-201 vce, you’ll pass the Recent Updates Hotest 117-201 QAs Linux Advanced Administration exam in an easy way

We Geekcert has our own expert team. They selected and published the latest 117-201 preparation materials from Official Exam-Center.

The following are the 117-201 free dumps. Go through and check the validity and accuracy of our 117-201 dumps.Questions and answers from 117-201 free dumps are 100% free and guaranteed. See our full 117-201 dumps if you want to get a further understanding of the materials.

Question 1:

What is the usable disk space of a RAID 5 array of five l8GB drives with one drive dedicated as a spare?

A. 18GB

B. 36GB

C. 54GB

D. 72GB

E. 90GB

Correct Answer: C


Question 2:

Which pseudo-file contains information on the status of software RAID devices?

A. /proc/raidstat

B. /proc/mdstatus

C. /proc/raidstatus

D. /proc/mdstat

E. /proc/raid/status

Correct Answer: D


Question 3:

Which of the following best describes the format of the /etc/fstab file?

A. mount point; device name; filesystem type; mount options; dump filesystem; fsck order

B. device name; mount point; filesystem type; mount options; dump filesystem; fsck order

C. mount point; filesystem type; device name; mount options; dump filesystem; fsck order

D. device name; mount point; mount options; filesystem type; dump filesystem; fsck order

E. device name; filesystem type; mount point; mount options; dump filesystem; fsck order

Correct Answer: B


Question 4:

What happens when the Linux kernel can\’t mount the root filesystem when booting?

A. Anerror message is shown, showing whichdevice couldn\’tbe mountedorinforming thatin itcouldn\’tbe found.

B. An error message is shown and the system reboots after a keypress.

C. An error message is shown and the system boots in maintenance mode.

D. An error message is shown and the administrator is asked to specify a valid root filesystem to continue the boot process.

E. An error message is shown, stating that the corresponding kernel module couldn\’t be loaded.

Correct Answer: A


Question 5:

What command is used to create an ISO9660 filesystem that can be properly accessed from a Windows 95/98 machine?

A. mkisofs -l -o backup.iso /home/joe

B. mkisofs -J -T -r -o backup.iso /home/joe

C. mkisofs -D -T -o backup.iso /home/joe

D. mkisofs -j -T -o backup.iso /home/joe

E. mkisofs -d -T -o backup.iso /home/joe

Correct Answer: B


Question 6:

The user\’ quotas on the server were reduced from 200MB to 100MB. Besides sending emails to all users, it was requested that a message should communicate the change every time a user access the server. Which of the following is the correct method to configure this?

A. Put the message text in the /etc/login-message file

B. Putthemessagetextinthe/etc/motdfile

C. Put the message text in the /etc/default/login file.

D. Put the message text in the /etc/passwd file, after all users entries.

E. There is no way to do this because the administrator has no permission to change the .bash_profile file for each user.

Correct Answer: B


Question 7:

It is possible to configure kernel parameters at runtime (e.g. the maximum size of the shared memory segment (shmmax)). In which TWO ways can this be changed to 2GB (2147483648 Bytes) on a running system?

A. Edit /etc/shmmax and set the parameter to 2147483648.

B. sysctl shmmax=2147483648.

C. sysctl kernel.shmmax=2147483648

D. echo 2147483648 > /proc/sys/kernel/shmmax

E. export kernel.shmmax=2147483648

Correct Answer: CD


Question 8:

A network client has an ethernet interface configured with an IP address in the subnet 192.168.0.0/24. This subnet has a router, with the IP address 192.168.0.l, that connects this subnet to the Internet. What needs to be done on the client to enable it to use the router as its default gateway?

A. Run route add default gw 192.168.0.1 ethl.

B. Run route add gw 192.168.0.1 ethl.

C. Run ifconfig eth0 defaultroute 192.168.0.1.

D. Add “defaultroute 192.168.0.l” to /etc/resolv.conf.

E. Run route add defaultgw=192.168.0.1 if=eth0.

Correct Answer: A


Question 9:

After configuring a new 2.4 series kernel, all dependencies, such as included files, need to be created. How can this be achieved?

A. make dependencies

B. make clean

C. makemrproper

D. make dep

E. maketest

Correct Answer: D


Question 10:

If the command arp -f is run, which file will be read by default?

A. /etc/hosts

B. /etc/ethers

C. /etc/arp.conf

D. /etc/networks

E. /var/cache/arp

Correct Answer: B


Question 11:

What is the difference between zImage and bzImage targets when compiling a kernel?

A. zImage is compressed using gzip, bzImage is compressed using bzip2

B. zImage is for 2.4 series kernels, bzImage is for 2.6 series kernels

C. zImage is loaded into low memory, bzImage is loaded into high memory

D. zImage is limited to 64k, bzImage is not

Correct Answer: C


Question 12:

WhichofthesewayscanbeusedtoonlyallowaccesstoaDNSserverfrom specifiednetworks/hosts?

A. Using the limit{…;};statement in the named configuration file.

B. Using the allow-query{…;};statement in the named configuration file.

C. Using the answer only{…;};statement in the named configuration file.

D. Using the answer{…;};statement in the named configuration file.

E. Using the query access{…;};statement in the named configuration file.

Correct Answer: B


Question 13:

Which tool can be used to control the runtime behavior of udev?

A. udev

B. udevctl

C. udevadm

D. udevconfig

E. udevclient

Correct Answer: C


Question 14:

What is the purpose of udevmonitor?

A. Listen to kernel events produced by a udev rule and print information to the console

B. Monitors the /dev directory for new devices

C. Monitors the udev process and prints performance statistics to the console

D. Communicates with D-Bus to setup new devices

Correct Answer: A


Question 15:

What is the term for unmounting a filesystem, which cleans up all references to the filesystem, as soon as it is not in use any longer?

A. soft

B. strong

C. forced

D. lazy

E. delayed

Correct Answer: D


Read More →

home Certification Study Guide and Preparation Materials

100% candidates have passed the Recent Updates Hotest EX0-117 pdf dumps exam by the help of Geekcert pass guaranteed Recent Updates Jan 14,2022 Newest EX0-117 practice preparation materials. The Geekcert home PDF and VCEs are the latest and cover every knowledge points of Recent Updates Hotest EX0-117 vce ITIL Foundation (syllabus 2011) certifications. You can try the Q and As for an undeniable success in Hotest EX0-117 vce exam.

Geekcert EX0-117 certification study guides. Geekcert – help candidates on all EX0-117 certification exams preparation. pass EX0-117 certification exams, get it certifications easily. Geekcert – the most professional EX0-117 certification exam practice questions and answers provider. easily pass your EX0-117 exams. just have a try!

We Geekcert has our own expert team. They selected and published the latest EX0-117 preparation materials from home Official Exam-Center: https://www.geekcert.com/EX0-117.html

The following are the EX0-117 free dumps. Go through and check the validity and accuracy of our EX0-117 dumps.If you need to check sample questions of the EX0-117 free dumps, go through the Q and As from EX0-117 dumps below.

Question 1:

Which role is responsible for carrying out the activities of a process?

A. Process owner

B. Change manager

C. Service manager

D. Process practitioner

Correct Answer: D


Question 2:

At which stage of the service lifecycle should the processes necessary to operate a new service be defined?

A. Service design: Design the processes

B. Service strategy: Develop the offerings

C. Service transition: Plan and prepare for deployment

D. Service operation: IT operations management

Correct Answer: A


Question 3:

Why are public frameworks, such as 1TIL, attractive when compared to proprietary knowledge?

A. Proprietary knowledge may be difficult to adopt, replicate or transfer since it is often undocumented

B. Public frameworks are always cheaper to adopt

C. Public frameworks are prescriptive and tell you exactly what to do

D. Proprietary knowledge has been tested in a wide range of environments

Correct Answer: A


Question 4:

Which of the following is an objective of business relationship management?

A. To identify patterns of business activity

B. To ensure high levels of customer satisfaction

C. To secure funding to manage the provision of services

D. To ensure strategic plans for IT services exist

Correct Answer: B


Question 5:

Which of the following would be used to communicate a high level description of a major change that involved significant cost and risk to the organization?

A. Change proposal

B. Change policy

C. Service request

D. Risk register

Correct Answer: A


Question 6:

Why is it important for service providers to understand patterns of business activity (PBA)?

A. PBA are based on organizational roles and responsibilities

B. IT service providers CANNOT schedule changes until they understand PBA

C. Demand for the services delivered by service providers are directly influenced by PBA

D. Understanding PBA is the only way to enable accurate service level reporting

Correct Answer: C


Question 7:

Which process is responsible for recording the current details, status, interfaces and dependencies of all services that are being run or being prepared to run in the live environment?

A. Service level management

B. Service catalogue management

C. Demand management

D. Service transition

Correct Answer: B


Question 8:

Which of the following types of service should be included in the scope of service portfolio management?

1.

Those planned to be delivered

2.

Those being delivered

3.

Those that have been withdrawn from service

A. 1 and 3 only

B. All of the above

C. 1 and 2 only

D. 2 and 3 only

Correct Answer: B


Question 9:

What do customer perceptions and business outcomes help to define?

A. The value of a service

B. Governance

C. Total cost of ownership (TCO)

D. Key performance indicators (KPIs)

Correct Answer: A


Question 10:

Which of these statements about resources and capabilities is CORRECT?

A. Resources are types of service asset and capabilities are not

B. Resources and capabilities are both types of service asset

C. Capabilities are types of service asset and resources are not

D. Neither capabilities nor resources are types of service asset

Correct Answer: B


Question 11:

What type of baseline captures the structure, contents and details of the infrastructure and represents a set of items that are related to each other?

A. Configuration baseline

B. Project baseline

C. Change baseline

D. Asset baseline

Correct Answer: A


Question 12:

Which of the following BEST describes the purpose of access management?

A. To provide a channel for users to request and receive standard services

B. Provides the rights for users to be able to use a service or group of services

C. To prevent problems and resulting Incidents from happening

D. To detect security events and make sense of them

Correct Answer: B


Question 13:

The consideration of value creation is a principle of which stage of the service lifecycle?

A. Continual service improvement

B. Service strategy

C. Service design

D. Service transition

Correct Answer: B


Question 14:

Hierarchic escalation is BEST described as?

A. Notifying more senior levels of management about an incident

B. Passing an incident to people with a greater level of technical skill

C. Using more senior specialists than necessary to resolve an Incident to maintain customer satisfaction

D. Failing to meet the incident resolution times specified in a service level agreement

Correct Answer: A


Question 15:

Which process will regularly anal0yse incident data to identify discernible trends?

A. Service level management

B. Problem management

C. C0hange management

D. Event management

Correct Answer: B


Read More →