免费注册 查看新帖 |

Chinaunix

  平台 论坛 博客 文库
12
最近访问板块 发新帖
楼主: liandsh
打印 上一主题 下一主题

[故障求助] 能不能那为高手经常出些AIX题目让我们初学者看看! [复制链接]

论坛徽章:
0
11 [报告]
发表于 2008-07-18 10:54 |只看该作者
000-232
Actualtests.com - The Power of Knowing
QUESTION 1:
A system administrator was asked to log information on possible security breaches
on a server. Which file should additional entries be added to capture this
information?
A. /var/adm/sulog
B. /etc/syslog.conf
C. /etc/security/sysck.cfg
D. ./etc/security/login.cfg
Answer: B
Explanation:
Answer B is correct because it provides configuration information for the syslogd
daemon (Logs system messages)
Ref: http://publib16.boulder.ibm.com/ ... les/syslog.conf.htm
Incorrect Answers:
A: The /var/adm/sulog file records the following information: date, time, system name,
and login name. The /var/adm/sulog file also records whether or not the login attempt
was successful: a + (plus sign) indicates a successful login, and a - (minus sign) indicates
an unsuccessful login.
C: This file contains file definitions for the trusted computing base.
Ref:
http://publibn.boulder.ibm.com/d ... files/sysck.cfg.htm
D: This file contains configuration information for login and user authentication.
Ref:
http://publib.boulder.ibm.com/in ... files/login.cfg.htm
QUESTION 2:
After adding a new Ethernet card to a system and rebooting, the system
administrator notices the card was not configured. How con the system
administrator determine if there were errors during the configuration process for
the card?
A. Examine the booting with the command: alog-o-f/var/adm.ras/booting
B. Display the device attributes and errors with the command:isdev-C-l ent0
C. Examine the AIX errlog for configuration method errors with the command: errpt-a-C
ent0
D. Examine the ODM for configuration errors with the command: odmget
-q'"method_errors"ent0
Answer: A
000-232
Actualtests.com - The Power of Knowing
QUESTION 3:
Where do the BOS ODM files reside?
A. /etc/odm
B. /usr/ipp/odm
C. /var/bosinfo
D. /etc/objrepos
Answer: D
Explanation:
Answer D is correct because the ODM routines use ODMDIR to determine which objects
to operate on. The default is /etc/objrepos - this is where the device objects reside, which
are required for hardware configuration
ODMDIR=/etc/objrepos
Ref: http://www.redbooks.ibm.com/redbooks/pdfs/sg246199.pdf page 71
Incorrect Answers:
A: Invalid file name
B: Invalid file name
C: Invalid file name
QUESTION 4:
A system administrator wants to give full read/write/excute access to the owner and
group of the /stuff directory and all subdirectories and files, but only allow
read/execut for others. What command would the administrator use?
A. chmod -R 775 /stuff
B. chmod -h 002 /stuff
C. chmod -R 577 /stuff
D. chmod ug+rwx,o+rx /stuff
Answer: A
Explanation:
The chmod command also permits you to use octal notation for the mode. The numeric
mode is the sum of one or more of the following values:
4000 Sets user ID on execution.
2000 Sets group ID on execution.
1000 Sets the link permission to directories or sets the save-text attribute for files.
0400 Permits read by owner.
0200 Permits write by owner.
0100 Permits execute or search by owner.
0040 Permits read by group.
0020 Permits write by group.
000-232
Actualtests.com - The Power of Knowing
0010 Permits execute or search by group.
0004 Permits read by others.
0002 Permits write by others.
0001 Permits execute or search by others.
You must specify the mode symbolically or use an explicit 4-character octal with a
leading zero (for example, 0755) when removing the set-group-ID-on-execution
permission from directories.
The flag -R descends only directories recursively
Incorrect Answers:
B: The flag -h suppresses a mode change for the file or directory pointed to by the
encountered symbolic link. It does not descend directories recursively. Nor does the 002
set the appropriate permissions.
C: 577 does not set the appropriate permissions.
D: Set the permissions correctly but does not descend the directories recursively.

论坛徽章:
0
12 [报告]
发表于 2008-07-18 10:55 |只看该作者
QUESTION 5:
What system startup file would an administrator edit for starting up miscellaneous
third party applications?
A. /etc/rc. Net
B. /etc/rc. Boot
C. /etc/rc. Local
D. /etc/rc. Tcpip
Answer: C
Explanation:
Incorrect Answers:
A: rc.net File Format for TCP/IP
Purpose
Defines host configuration for network interfaces, host name, default gateway, and static
routes
B: Not a valid AIX file.
D: rc.tcpip File for TCP/IP
Purpose
Initializes daemons at each system restart
QUESTION 6:
A system administrator has been asked to lock a specific login account. Which of the
following commands is used to accomplish this?
A. pwdck
B. usrck
C. chuser
000-232
Actualtests.com - The Power of Knowing
D. rmuser
Answer: C
Explanation:
chuser Command
Purpose
Changes user attributes.
Syntax
chuser [ -R load_module ] Attribute=Value ... Name
i.e. chuser account_locked=true Name
Ref:
http://publibn.boulder.ibm.com/d ... aixcmds1/chuser.htm
Incorrect Answers:
A: pwdck Command
Purpose
Verifies the correctness of local authentication information
Ref:
http://publib.boulder.ibm.com/in ... /aixcmds4/pwdck.htm
B: usrck Command
Purpose
Verifies the correctness of a user definition.
Syntax
usrck { -n | -p | -t | -y } { ALL | User ... }
Description
The usrck command verifies the correctness of the user definitions in the user database
files, by checking the definitions for ALL the users or for the users specified by the User
parameter. If more than one user is specified, there must be a space between the names.
You must select a flag to indicate whether the system should try to fix erroneous
attributes.
The command first checks the entries in the /etc/passwd file. If you indicate that the
system should fix errors, duplicate user names are reported and removed. Duplicate IDs
are reported only, because there is no system fix. If an entry has fewer than six
colon-separated fields, the entry is reported, but not fixed. The usrck command next
checks specific user attributes in other files.
The usrck command verifies that each user name listed in the /etc/passwd file has a
stanza in the /etc/security/user, /etc/security/limits and /etc/security/passwd files. The
usrck command also verifies that each group name listed in the /etc/group file has a
stanza in the /etc/security/group file. The usrck command using the -y flag creates
stanzas in the security files for the missing user and group names.
Ref:
http://publib.boulder.ibm.com/in ... /aixcmds5/usrck.htm
D: rmuser Command
Purpose
Removes a user account.
000-232
Actualtests.com - The Power of Knowing
Ref:
http://publib.boulder.ibm.com/in ... aixcmds4/rmuser.htm
QUESTION 7:
Based on the output, witch of the following is insufficient?
A. CPU
B. Disk
C. Memory
D. Network
Answer: A
QUESTION 8:
A system administrator would like to modify the system default user characteristics
so that each new user will now be assigned (by default) the csh shell rather than the
ksh shell. Which of the following actions should be performed?
A. Run the command chlogin -shell "csh"
B. Run the command mkuser -default "SHELL=csh"
C. Edit /etc/passwd and change all "ksh" entries to "csh"
D. Modify the contents of /usr/lib/security/mkuser.default file
Answer: D

论坛徽章:
0
13 [报告]
发表于 2008-07-18 10:56 |只看该作者
QUESTION 9:
A system administrator decides to review the system error log after installing new
hardware. Which of the following is the correct command to use?
A. errpt
B. syslog
C. prtdiag
D. errlogger
Answer: A
Explanation:
errpt Command
Purpose
Generates a report of logged errors
Ref:
http://publib.boulder.ibm.com/in ... /aixcmds2/errpt.htm
Incorrect Answers:
000-232
Actualtests.com - The Power of Knowing
B: syslog is not a command. It is a daemon.
Ref:
http://publib.boulder.ibm.com/in ... _put.19/gtpc1/gtpc1
m
C: Not a valid AIX command
D: errlogger Command
Purpose
Logs an operator message
Ref:
http://publib.boulder.ibm.com/in ... xcmds2/errlogger.ht
m
QUESTION 10:
Which of the following commands will find all the rc files in /etc and display them?
A. is -l /etc/r?
B. is -l /etc/rc.d/*
C. is -l /etc/rc? l grep -v d
D. is -l /etc/rc* l grep -v d
Answer: C
QUESTION 11:
Which command will display the current Maintenance level of a server?
A. lslpp -l_
B. oslevel
C. oslevel -m
D. oslevel -I l grep
Answer: B
Explanation:
Ref:
http://publib.boulder.ibm.com/in ... ixcmds4/oslevel.htm
Incorrect Answers:
A: lslpp Command
Purpose
Lists installed software products not maintenance levels
C: oslevel -m is not a valid flag
D: -I is not a valid flag
QUESTION 12:
000-232
Actualtests.com - The Power of Knowing
A pseries server is being used as a file server and all data is stored on a non-root
volume group and resides on mounted filesystems. Which of the following
commands provides the quickest way to backup all of the data and filesystem
definitions?
A. tar
B. cpio
C. savefs
D. savevg
Answer: D
Explanation:
savevg Command
Purpose
Finds and backs up all files belonging to a specified volume group
Ref:
http://publib.boulder.ibm.com/in ... aixcmds5/savevg.htm
Incorrect Answers:
A: tar would work but the question states that it wants the quickest way. tar had
limitations
Ref:
http://publib.boulder.ibm.com/in ... ds/aixcmds5/tar.htm
B: cpio would work but savevg is the best choice
Ref:
http://publib.boulder.ibm.com/in ... s/aixcmds1/cpio.htm
C: savefs is not a valid aix command

论坛徽章:
0
14 [报告]
发表于 2008-07-18 10:58 |只看该作者
QUESTION 13:
A system administrator is unable to unmount a file system. Which is the
appropriate command to determine who or what is accessing the file system?
A. who / filesystem
B. lsfs /filesystem
C. fuser /filesystem
D. unmount -f /filesystem
Answer: C
Explanation:
fuser Command
Purpose
Identifies processes using a file or file structure
Ref:
http://publib.boulder.ibm.com/in ... /aixcmds1/fuser.htm
000-232
Actualtests.com - The Power of Knowing
Incorrect Answers:
A: who Command
Purpose
Identifies the users currently logged in not who or what is accessing the filesystem
Ref:
http://publib.boulder.ibm.com/in ... ds/aixcmds6/who.htm
B: lsfs Command
Purpose
Displays the characteristics of file systems
Ref:
http://publib.boulder.ibm.com/in ... s/aixcmds3/lsfs.htm
D: umount or unmount Command
Purpose
Unmounts a previously mounted file system, directory, or file
The question states that you need to find out who or what is accessing the filesystem.
Ref:
http://publib.boulder.ibm.com/in ... aixcmds5/umount.htm
QUESTION 14:
Which cron entry will run /usr/local/bin/myscript at 0500 every Saturday?
A. 0 5**6/usr/local/bin/myscript
B. 0 5 6**/usr/local/bin/myscript
C. 6** 5 0 /usr/local/bin/myscript
D. 5 0 Sat ** /usr/local/bin/myscript
Answer: A
Explanation:
File Format:
The crontab File Entry Format
A crontab file contains entries for each cron job. Entries are separated by newline
characters. Each crontab file entry contains six fields separated by spaces or tabs in the
following form:
minute hour day_of_month month weekday command
These fields accept the following values:
minute 0 through 59
hour 0 through 23
day_of_month 1 through 31
month 1 through 12
weekday 0 through 6 for Sunday through Saturday
command a shell command
You must specify a value for each field. Except for the command field, these fields can
contain the following:
A number in the specified range. To run a command in May, specify 5 in the month field.
000-232
Actualtests.com - The Power of Knowing
Two numbers separated by a dash to indicate an inclusive range. To run a cron job on
Tuesday through Friday, place 2-5 in the weekday field.
A list of numbers separated by commas. To run a command on the first and last day of
January, you would specify 1,31 in the day_of_month field.
An * (asterisk), meaning all allowed values. To run a job every hour, specify an asterisk
in the hour field.
Note: Any character preceded by a backslash (including the %) causes that character to
be treated literally. The specification of days may be made by two fields (day of the
month and day of the week). If you specify both as a list of elements, both are adhered to.
For example, the following entry:
0 0 1,15 * 1 command
would run command on the first and fifteenth days of each month, as well as every
Monday. To specify days by only one field, the other field should contain an * .
Ref:
http://publib.boulder.ibm.com/in ... ixcmds1/crontab.htm
Incorrect Answers:
B: This would run the script everyday in the month of June at 5 am
C: This would run the script 6 minutes after each hour in May each Sunday
D: This would not run the script. The syntax is incorrect
Ref for all incorrect answers:
http://publib.boulder.ibm.com/in ... ixcmds1/crontab.htm
QUESTION 15:
A mirrored root disk need to be replaced. Which of the following commands will
clear the boot record on the failing disk?
A. chpv -c
B. rmlv hd5
C. bosboot -ad
D. rmdev -dl hd5
Answer: A
QUESTION 16:
A system administrator' daily monitoring has revealed a failing disk drive. The
drive that is failing, hdisk0, is a lvm mirrored drive. What is the first step that
should be taken in order to physically replace this drive?
A. Remove the physical volume from the system.
B. Remove the physical volume from the volume group.
C. Remove the physical partition from the volume group.
D. Remove the logical volume copies from the failing drive.
Answer: D
000-232
Actualtests.com - The Power of Knowing
QUESTION 17:
Which daemon converts Remote Procedure Call (RPC) program numbers into
Internet port numbers?
A. inetd
B. rexecd
C. routed
D. portmap
Answer: D
QUESTION 18:
Which of the following commands can be used to identify all PCI hot plug slots on a
server and their characteristics?
A. lsattr -l pci
B. lscfg -Cc pci
C. lsconn -p pci -a
D. lsslot -c pci -a
Answer: D
QUESTION 19:
Which of the following commands should an AIX system administrator invoke to
check if the required device-dependent software is missing?
A. dbx
B. cfgmgr
C. telinit q
D. lsdev -Cc adapter
Answer: B
QUESTION 20:
Which of the following actions will enable 64-bit applications on a system with a
32-bit kernel?
A. change the kernel to 64bit, reboot, and then use the following command:
chdev -l sys0 -a applications=64_bit
B. Re-install the OS with 64-bit kernel enabled
C. Re-install all applications with 64-bit kernel enabled
000-232
Actualtests.com - The Power of Knowing
D. Use smit to enable the 64-bit applications
Answer:
您需要登录后才可以回帖 登录 | 注册

本版积分规则 发表回复

  

北京盛拓优讯信息技术有限公司. 版权所有 京ICP备16024965号-6 北京市公安局海淀分局网监中心备案编号:11010802020122 niuxiaotong@pcpop.com 17352615567
未成年举报专区
中国互联网协会会员  联系我们:huangweiwei@itpub.net
感谢所有关心和支持过ChinaUnix的朋友们 转载本站内容请注明原作者名及出处

清除 Cookies - ChinaUnix - Archiver - WAP - TOP