Real 9L0-606 Exam Questions

Text-only Preview





News for the examinees now, Nowexam holds a
sales promotion -Microsoft Bundles. Save your
money for Microsoft exams at Nowexam. People can
get all the required exam information for any IT
certification test. What's more, Nowexam actual
questions and answers can make sure you success
in the first attempt. If you decide to get IT certified,
Nowexam is your big helper.


The safer , easier way to help you pass any IT exams.
Exam : 9L0-606
Title
:
S
y
s tem Administration of
Mac OS
Version : DEMO
1 / 3

The safer , easier way to help you pass any IT exams.
1.Your umask is set to 026. You use touch from the command line to create a new file. What are the
permissions on the new file?
A.600
B.640
C.644
D.751
E.755
Correct:B
2.What three (3) pieces of information must be specified in the Active Directory plug-in
configuration in order for Mac OS X v10.3 to bind to Active Directory via the Active Directory
plug-in? (Choose THREE.)
A.IP address
B.Computer ID
C.Ethernet Address
D.Active Directory Tree
E.Active Directory Forest
F.Active Directory Domain
G.Active Directory Mount Point
Correct:B E F
3.Which two (2) statements about passwords for local user accounts in Mac OS X v10.3 are true?
(Choose TWO.)
A.DirectoryService is the authoritative authentication agent for crypt and shadow passwords.
B.A crypt password can be 32 bytes in length; a shadow password has no length limitation.
C.A crypt password is stored as a hash in the user account; a shadow password is stored as several
hashes in a file.
D.A crypt password is accessible by anyone using the computer; a shadow password is only accessible
by the System Administrator (root).
E.Mac OS X v10.3 creates crypt passwords by default; shadow passwords are created for a user account
when the option is specified in System Preferences.
Correct:C D
4.Which is a limitation of using lookupd -d?
A.The daemon, lookupd, is interactive.
B.The results of the lookupd -d command are from a new instance of lookupd.
C.The lookupd -d command is used to find information on DNS resolution.
D.If configured to use DSAgent, the lookupd -d command will get the same results as DirectoryService.
Correct:B
5.If a router on the Internet receives a packet destined for a private (non-routable) IP address, the
router will ________.
A.drop the packet
B.return the packet
C.broadcast the packet
D.forward the packet to the private network gateway
Correct:A
6.Identify a disadvantage of supplementing Active Directory with directory services running on
2 / 3

The safer , easier way to help you pass any IT exams.
Mac OS X Server.
A.A modification to the Active Directory schema is necessary.
B.The ability to manage individual user accounts in Mac OS X is sacrificed.
C.You can no longer manage directory services with tools provided by Apple.
D.A configured directory on Mac OS X Server must be added to the Active Directory domain.
Correct:B
7.What does the -LoginHook option do in the code sample below from /etc/ttys? console
"/System/Library/CoreServices/loginwindow.app/loginwindow
-PowerOffDisabled
YES
-LoginHook
/Users/Admin/Scripts/mailLoginInfo"
vt100
on
secure
window=/System/Library/CoreServices/WindowServer
A.Disables Shutdown and Restart buttons for non-administrators
B.Invokes the script mailLoginInfo when a user logs in to the computer
C.Sets the terminal type to vt100 for each user who logs in to the computer
D.Starts the main windowing system, WindowServer, in a secure Console window on startup
Correct:B
8.Which command will identify all files in the hierarchy rooted at the current directory that have
either the setuid or the setgid bit set?
A.find . -perm +2000
B.find . -perm +3000
C.find . -perm +4000
D.find . -perm +5000
E.find . -perm +6000
F.find . -perm +7000
Correct:E
9.Which three (3) statements about encrypted disk images are true? (Choose THREE.)
A.Encrypted disk images are read-only.
B.Encrypted disk images can be re-sized.
C.Encrypted disk images use AES 128-bit encryption.
D.The maximum size of encrypted disk images is 1 GB.
E.Mac OS X does not leave any Cleartext copies of the contents of files opened from encrypted disk
images.
F.A tcpdump of network traffic relating to mounting an encrypted disk image reveals the disk image data in
unencrypted form.
Correct:B C E
3 / 3