Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following statements are true about data aggregation?

A.

A common aggregation purpose is to get more information about particular groups based on specific variables.

B.

Data aggregation cannot be user-based.

C.

Data aggregation is any process in which information is gathered and expressed in a summary form.

D.

Online analytic processing (OLAP) is a simple type of data aggregation.

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to forward all the kernel messages to the remote host having IP address 192.168.0.1. Which of the following changes will he perform in the syslog.conf file to accomplish the task?

A.

kern.* @192.168.0.1

B.

!*.* @192.168.0.1

C.

!kern.* @192.168.0.1

D.

*.* @192.168.0.1

You work as the Network Administrator for XYZ CORP. The company has a Unix-based network. You want to print the super block and block the group information for the filesystem present on a system. Which of the following Unix commands can you use to accomplish the task?

A.

e2fsck

B.

dump

C.

dumpe2fs

D.

e2label

The SALES folder has a file named XFILE.DOC that contains critical information about your company. This folder resides on an NTFS volume. The company's Senior Sales Manager asks you to provide security for that file. You make a backup of that file and keep it in a locked cupboard, and then you deny access on the file for the Sales group. John, a member of the Sales group, accidentally deletes that file. You have verified that John is not a member of any other group. Although you restore the file from backup, you are confused how John was able to delete the file despite having no access to that file. What is the most likely cause?

A.

The Sales group has the Full Control permission on the SALES folder.

B.

The Deny Access permission does not restrict the deletion of files.

C.

John is a member of another group having the Full Control permission on that file.

D.

The Deny Access permission does not work on files.

Which of the following statements about a session are true? (Choose two)

A.

The creation time can be obtained using the getSessionCreationTime() method of the HttpSession.

B.

The getAttribute() method of the HttpSession interface returns a String.

C.

The time for the setMaxInactiveInterval() method of the HttpSession interface is specified in seconds.

D.

The isNew() method is used to identify if the session is new.

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. You want to run two programs, foo and bar. You also want to ensure that bar is executed if and only if foo has executed successfully. Which of the following command sequences will John use to accomplish the task?

A.

foo; bar;

B.

foo || bar;

C.

foo | bar;

D.

foo && bar;

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He is configuring the Apache Web server settings. He does not want the commands being used in the settings to be stored in the history. Which of the following commands can he use to disable history?

A.

history !!

B.

set +o history

C.

history !N

D.

set -o history

Which of the following statements about a screened host is true?

A.

It facilitates a more efficient use of the Internet connection bandwidth and hides the real IP addresses of computers located behind the proxy.

B.

It is a small network that lies in between the Internet and a private network.

C.

It provides added security by using Internet access to deny or permit certain traffic from the Bastion Host.

D.

It provides a physical connection between computers within a network.

You have to move the whole directory /foo to /bar. Which of the following commands will you use to accomplish the task?

A.

mv /bar /foo

B.

mv -R /foo /bar

C.

mv /foo /bar

D.

mv -r /bar /foo

You work as the Network Administrator for XYZ CORP. The company has a Unix-based network. You want to run a command that forces all the unwritten blocks in the buffer cache to be written to the disk. Which of the following Unix commands can you use to accomplish the task?

A.

swapon

B.

tune2fs

C.

swapoff

D.

sync