+ All Categories
Home > Documents > 200112222619 New Hp Unix

200112222619 New Hp Unix

Date post: 04-Jun-2018
Category:
Upload: satish-madhana
View: 218 times
Download: 0 times
Share this document with a friend

of 27

Transcript
  • 8/13/2019 200112222619 New Hp Unix

    1/27

    HP-UX%&& HP-UX%&R'( I

    1.Which command is not a filter?A.grepB.moreC.lsD.cutNRB~=5Ct~j

    j=N%&8 filtersdHfiltersN

    Vn2B=dBcjHdf

    NyBl(B~HCBd.grep-

    ;xmore-xcut-BHlsntdH

    2.Which password can not be used for HP-UX user password?A.32eaheB.44872k9C.intosn3D.win.net/ 6Dx

    2 2Dx

    3 /DH

    3.You login HP-UX on a character terminal. After you type your user name ,you find that the last character you typed is incorrect. How can you delete theincorrect character?

    A.use "Backspace" key.B.use "Shift"+"3" key.C.use "Shift"+"2" key.D.use left arrow key,then use "Delete" key .N%&Bd~=BackspaceR Delete5fxt=# \

    CD=@ \H Backspace

    fH

    4.Which is the best way you empty a log file?A.remove the file and create a new one with the same filename.

    B.move the file to a temp directory and create a new one with the samefilename.C.> filenameD.open the file using vi,delete all contents and save the file.ST AR Bf2B45R=%&9t

    BHST D=t2V!"#=nt$%B^H

    5.Your sent a print job to a network printer named lj_1 .But lj_1 does not work.You find that the cable connect between UNIX server and lj_1 is interrupted.You move the job from lj_1 to another network printer lj_2 . After you resolvethe cable problem, you sent a test print job to printer lj_1, but lj_1 still does

    not work.How can you do?A. use command "lpshut" and "lpsched".

  • 8/13/2019 200112222619 New Hp Unix

    2/27

    B. use command "enable lj_1".C. use command "stpprnmv -s lj_1 -d lj_2".D. turn off the power of lj_1 and then turn on.&' lj_/(j lj_2V=%&)*# disable lj_/=+5],

    spoolerB-.He/=%&5 stpprnmvH

    6.Which is the best way to edit "/etc/passwd" file?A. vi -safe /etc/passwdB. vi /etc/passwdC. cp /etc/passwd /tmp/passwd then vi /etc/passwdD. vipwvipwcd)/etc/passwdj/etc/passwd.tmp+N/etc/passwd~0

    1H23+4=56 passwd27H89: vipwV=

    C;H28Bt?WB=@AV2)(

  • 8/13/2019 200112222619 New Hp Unix

    3/27

    stty aW#8Btd4Br~uH

    10.By default, a command sends its output and error messages to the:A. top and bottom of the screen.B. file descriptor 1 and 2 respectively.

    C. screen and the syslog file.D. bit bucket unless specified by the user.All HPUX/UNIX processes by default open paths to three files. File descriptor0 points to std-in(usually the users keyboard),file descriptor 1 points to std-out(usually the users terminal/pseudo-terminal screen),and file descriptor 2points to std-error(the same as std-out).

    11.Which of the following is NOT a legal Posix shell loop construct?A. do until doneB. while do doneC. until do doneD. for do donePosix shellvwxByz{.

    /whilex.N|}`^8:BIJKC~@x

    2untilx.C~@=Yj|}8:x

    3forx.BCBH

    12.A file may have more than one name. This is accomplished using which ofthe following commands?A. dupB. ln

    C. aliasD. forkln---Z2HZBtlD2PBUCHkl

    3CD2=5N};BQK5D2B}QV=G

    5H

    lnB2K.ln file new_file

    ln file [file ] dest_dir

    13.How would you move a file called datafile, from your current directory tothe /var directory ?

    A. mv datafile /varB. mv /var datafileC. mv datafile -d/varD. mv datafile ../varmvB.mv /2QB/QB2=QB

    8QV=QBH

    14.For each device file in the "/dev" subdirectory, the "major number"identifies the:A. priority order for accessing the device.B. device driver that should be used when the device is accessed.C. class of device, for example, "disk device", "tape device","tty device", etc.D. device file to be used for communication.

  • 8/13/2019 200112222619 New Hp Unix

    4/27

    >D25CD=N LLB~~H-#

    VabjBH

  • 8/13/2019 200112222619 New Hp Unix

    5/27

    19.At HP-UX 11 it is recommended that you install patches usingA. swinstall with the superseded_by optionB. shar against the .depot fileC. swlist with the -I option

    D. swinstall with either the patch_match_target option or theautoselect_patches option

    20.Which of the following statements is TRUE?A. The pvdisplay command will not give valid information unless you haveadded the disk to a volume group using vgcreate or vgextend.B. The default physical extent size is 8KB.C. You must have a minimum of 2 disks in the root volume group.D. In HP-UX 11.0, the maximum file size is 4GB.

    21.To find what commands you have scheduled under cron use

    A. atB. cron. allowC. crontab -lD. Is -lV'\]B8 crontabH5yD=}~-l83B

    V'x-e83BV'x-r83BV'H

    V'B2H

    22.The major steps required to set up a new user areA. an entry in /etc/password, an entry in /etc/group, a home directory

    B. an entry in /etc/passwd, an entry in /etc/hosts, a home directory with loginscriptsC. an entry in /etc/password, an entry in /etc/hosts, a home directory withlogin scriptsD. an entry in /etc/passwd, an entry in /etc/group, a home directory with loginscripts

    23.When you boot your system from the install tape you can:A. install your systemB. run a recovery shellC. cancel and reboot

    D. all of these

    24.Which are the free tools you can use to monitor your system performance?A. sarB. topC. iostatD. all of thesesar u > CPUBJ=sar d >BrJH

    top--->qs%&BJH

    iostat--->%&B I/OJH

    25.Is it possible to create a device file for a DAT drive forcing a specific

  • 8/13/2019 200112222619 New Hp Unix

    6/27

    density rather than the default BEST option?A. yes - use SAMB. yes - use mksf specifying the -b option for a specific densityC. yes - use mknod specifying the major and minor numbersD. yes - use any of the options shown

    26.The /etc directory is usedA. for operating system configuration dataB. for application configuration dataC. for operating system and application configuration data and executablesD. for operating system and application configuration data

    27.In the device file cXtYdZ the X, Y and Z represent respectivelyA. the instance of the device, the logical unit within the device and Z is alwayszeroB. the instance of the controller, the target of the device and the logical unit

    within the deviceC. the target of the device, the instance of the controller and the logical unitwithin the deviceD. the logical unit number, the target of the device and the section number/ZX.;DRZCDXH

    2SCSIQST.tcdPBG:] DIP:]BH

    3SCSILUN.dFBH

    28.The difference between the "lpmove" and the "lpalt" commands for printerqueue management is that:

    A. alt will only move one (1) job and lpmove can move an entire queue.B. lpmove can be used by anybody and lpalt can only be used by the superuser (root).C. lpalt is no longer used in HP-UX 11.00 but lpmove is used in 10.X andabove.D. lpmove can be used to move a priority of a print job to a higher level whilelpalt can only be used to move a job to another printer queue.

    29.The main structures inside an HFS areA. superblock, allocation unit, inode, block and fragment .B. superblock, cylinder group, inode, extent and block

    C. superblock, allocation unit, inode, extent and blockD. superblock, cylinder group, inode, block and fragment ./HFSBDk.2%&BR2%&~45} HFSx

    Bx

    2HFSB_.HFS2%&BKUCDlD_x2

    %&5lB_=O2%&B_x

    3HFSB IG.>DQR5CD IG=IG-#2B

    045c0R}Nx

    4HFS.*#C8 8KBx

    5HFS~.>D HFSU~xB~BO8D0//20

    //4 //8H

  • 8/13/2019 200112222619 New Hp Unix

    7/27

    30.An LVM physical volume isA. a disk section with the LVM structures installedB. a RAID deviceC. a raw deviceD. an entire disk with the LVM structures installed

    31.What is the order of code execution which brings your system up to theloading of the kernel?A. ISL, PDC, hpux, /stand/vmunixB. PDC, ISL. HPUX, /stand/vmunixC. PDC, ISL, hp-ux. /stand/vmunixD. ISL, HPUX. /stand/vmunix, PDCPDCxISLCDxHP-UXH

    32.A device swap area isA. a dedicated partition of disk space used by memory manager and a filesystemB. a dedicated partition of disk space used by memory manager exclusivelyC. a dedicated partition of disk space on the boot disk used by memorymanager exclusivelyD. a logical volume on the boot disk set up at install time

    33.The command used for scheduling repeated background jobs is :A. cronB. atC. batch

    D. jobs

    34.The last entry in the /etc/passwd line for a user definesA. a shellB. the home directoryC. the password ageingD. an executable application program or shell

    35.The /etc/logingroup file is used to :A. define which group a user logs intoB. control access to files and directiories with a different group from that

    which the user is currently identified withC. is no longer usedD. define which group new files and directories belong to

    36.The ____________ command will show currently mounted file systems,the total size of each file system, the amount of space used from each filesystem, and the amount of space available in each file system.A. mountB. bdfC. duD. ll

    37.The file that contains the default file system type for file system creation is:

  • 8/13/2019 200112222619 New Hp Unix

    8/27

    A. /etc/fstabB. /etc/filesystemC. /etc/default/fsD. /var/adm/sbtab

    38.You need to add a disk to an existing volume group. The SCSI address forthe disk is 5 and the disk is attached to card instance 0 with a LUN of 0. Whatcommand must you execute before you add the disk to the volume group?A. pvcreate /dev/vg00/lvol5B. pvcreate /dev/dsk/c0t5d0C. pvcreate /dev/vg00/c0t5d0D. pvcreate /dev/rdsk/c0t5d0

    39.The command to set up a logical volume called lvswap in the volumegroup /dev/vg01 with a size of 20 MB isA. lvcreate -n lvswap -l 20 /dev/vg01

    B. lvcreate -name lvswap -L 20 /dev/vg01C. lvcreate -n lvswap -L 20 /dev/vg01D. lvcreate -l 20 /dev/vg01 -n lvswap

    40.SAM can be used to set up the followingA. all of theseB. user accounts and groupsC. disks and file systemsD. kernel configuration and network services

    41.Which of the following archive utilities only runs on HP-UX?A. fbackupB. tarC. cpioD. pax

    42.What is the simplest way to create and manage a list of the system andapplication log files which grow for ever and need to be trimmed on a regularbasisA. use SAM's list for system log files, add your application log files to it anduse the log file trimming feature available in SAM

    B. create your own list of system log files from /var/adm, add your applicationlog files to it, then write a shell script to trim themC. reboot the system on a regular basis as then all log files get rolled overand the old ones deletedD. all system log files automatically roll themselves over and delete the oldestcopy when they hit a defined size limit

    43.What are the major points you shonld consider when selecting deviceswap areas?A. device swap areas should be on different physical volumes and should bethe same size

    B. device swap areas should be in different logical volumes on the same diskand should be the same size

  • 8/13/2019 200112222619 New Hp Unix

    9/27

    C. device swap areas should be in different logical volumes and in the top2GB of the diskD. device swap areas should be on different physical volumes, but all in vg00

    44.Pipes allow:

    A. data to be transferred from one system to another.B. file contents to be combined into a single stream.C. the output of one command to be used as input for another command.D. the same data to be sent to multiple commands at the same time.

    45.What does the command tr -s " " do ?A. squeeze out multiple spaces from stdinB. replace all s with " "C. change single spaces into double spaces from stdinD. translate spaces into s

    46.Which script will be excuted after a user has input correct user name andpassword?A. /.profileB. /etc/.profileC. $HOME/.profileD. /etc/profile=>/etc/profile%&'()B%&B1=n

    t.profilex=>R$HOME/.profile>D3;B1S

    1=EV8.profilex$B01S%&1

    $HOME/.kshrc H

    47.If yon wish a command to run in background how do yon set it off ?A. bg commandB. nohup commandC. command bgD. command &

    48.What will happen when the second field filled with * in the file/etc/passwd?A. User can login without any password

    B. User can login with password *C. The user is disableD. The user must change his password when he first loginpasswd2jD~3BH~8V3YZj%

    &x~8m*nV=3)MHe/=%&'()nfYZ

    3B=fF3H

    8 passwd=3NKV.passwd

    f username H

    49.Suppose the current directory is /dev/vg01,which command is the best

    one to display the logical volume myfs?A. lvdisplay v ./myfs

  • 8/13/2019 200112222619 New Hp Unix

    10/27

    B. lvdisplay k /dev/vg01/myfsC. lvdisplay v /dev/vg01/myfsD. lvdisplay v k ./myfslvdisplayR pvdisplaynf2B\=2ST Atn?W

    BHt vgdisplay=2vgdisplay v vg00vgdisplay

    v ./vg00 7fj?H

    50.How would you get a list of the printers associated with your system andwhat file are waiting to be printed?A. Ipstat -tB. printerC. IpshowD. Ipadmin

    51.Which can not be used as hostname in HP-UX system?

    A. aix.comB. openviewhostC. hp_uxD. hp-ux/$t 8Dx

    2~nf5yzGKG/x

    3f0RKGUH

    52.How do you set up a symbolic link between two files?A. In -s link-file original-fileB. In original-file link-file

    C. In original-file link-file -sD. In -s original-file link-file

    53.In a "case" statement what is used to distinguish where the set ofcommands for one pattern ends, and the next set for the next pattern begin ?A. ;B. esacC. )D. ;;

    54.What is the purpase of a "continue" command ?A. to proceed with a shell script after a pause commandB. to continue processing an infinite loop from the current pointC. to go back to the start of a loop structureD. to proceed wi th a shell script after a sleep command

    55.What would be returned by the command "echo $(date)" ?A. the current date and time would be shownB. $(date)C. the word "date"D. an error

    56.Under the Korn and Posix shells, how do you pull back your previous

  • 8/13/2019 200112222619 New Hp Unix

    11/27

    commands ?A. Escape kB. Escape pC. Escape hD. Escape Escape

    57.Which command is used to pull out all lines of a file which contain aspecified pattern ?A. prB. trC. wcD. grep

    58.What commands define the scope of a "for" loop ?A. "do" and "done"B. "begin" and "end"

    C. "do"and "end"D. "begin" and "endfor"

    59.System-supplied printer interface files and system configured interfacefiles live respectively in :A. /var/spool/lp and /etc/lp/interfaceB. /usr/spool/lp/model and /etc/printerC. /usr/lib/lp/model and /var/spool/lpD. /usr/lib/lp/model and /etc/lp/interface

    60.The units used for defining increase in size of a logical volume with thelvextend -L command, and a journal file system with the fsadm -b arerespectivelyA. MB and file system blocksB. KB and KBC. MB and MBD. Extents and KB

    61.You want to create a new 200MB logical volume from the volume groupvg00, using the default physical extent size. Instead of taking the defaultlogical volume name, you want to name your logical volume "newlv". What

    command would you use?A. lvcreate -l 200 -n newlv /dev/vg00B. lvcreate -L 200 /dev/vg00/newlvC. lvcreate -l 200 -n /dev/vg00/newlvD. lvcreate -L 200 -n newlv /dev/vg00

    62.The check_recovery command is used toA. ensure your make_recovery tape was written correctlyB. validate support mediaC. check your LVM configuration under /etc/lvmconf is validD. ensure your make_recovery tape is current

    63.You are currently in the /stand/build directory building a new static kernel

  • 8/13/2019 200112222619 New Hp Unix

    12/27

    for an HP-UX 11.00 system. You have completed all the tasks to build thekernel. Which tasks, in which order, must be performed to make the newkernel the running kernel and also preserve the old kernel?1. shutdown -ry 02. mv /stand/system /stand/system.prev; mv system /stand/system

    3. kmupdate4. mv /stand/vmunix /stand/vmunix.prev; mv vmunix_test /stand/vmunixA. step 3, step 1B. step 2, step 3, step 1C. step 3, step 4, step 1D. step 4, step 1

    64.What command would you use to check the physical extent size that willbe used when you create logical volumes from the volume group "vgmyvol"?A. vgdisplay /dev/vgmyvolB. pvdisplay /dev/vgmyvol

    C. lvdisplay /dev/vgmyvolD. vgshow /dev/vgmyvol

    65.A bundle is a collection of:A. filesets.B. CD-ROMs.C. depots.D. tape packages.

    66.If the driver for a device is bound into the kernel the ioscan "S/W State"showsA. claimedB. scanC. inD. unclaimed

    67.To find out what software is installed on your system, you should useA. swverifyB. the screen shown at start up on the consoleC. swlistD. /etc/filesets

    68.A possible example of an fbackup command to do a full backup andrecord it in the dates file isA. fbackup -f /dev/rmt/c1t0d0BEST -0u -g /var/adm/fbackupfiles/graphB. fbackup -f /dev/rmt/c1t0d0BEST -g /var/adm/fbackupfiles/graphC. fbackup -9u -g /var/adm/fbackupfiles/graphD. fbackup -f /dev/rmt/c1t0d0BEST -0u /

    69.At HP-UX 10.20 and above, what are the maximum file system and filesizes?A. 4GB, 128GB

    B. 128GB, 4GB

  • 8/13/2019 200112222619 New Hp Unix

    13/27

    C. 128GB, 128GBD. 4GB, 4GB

    70.Your manager makes a request for you to create a script that will start adaemon at system boot. In what directory would you put this script and the

    corresponding configuration file for the script?A. /sbin/init.d , /etc/rc.config.dB. /sbin/rc , /etc/netconfigC. /sbin/startups, /etc/inittabD. /usr/sbin, /etc/rc.config.d

    71.The command to mount a journal file system held in the logical volume/dev/vg02/lvo14 onto the mount point directory /applic would beA. mount -F jfs /dev/vg02/rlvo14 /applicB. mount -F vxfs /applic /dey/vg02/lvol4C. mount -F vxfs /dev/vg02/lvo14 /applic

    D. mount -F vxfs /applic /dev/vg02/rlvo4

    72.To get to command mode ( CM> ) on a server you enter:A. ^M on the system consoleB. ^B on any terminal when logged in as rootC. ^B on the system console when logged in as rootD. ^B on the system console

    73.The commands needed to set up a volume group are:A. mkdir,pvdisplay,vgcreateB. mkdir,mknod,vgcreateC. mknod, vgdisplay, vgcreateD. mkdir, vgcreate,vgdisplay

    74.Which of the following statements is TRUE for HP-UX 10.20 and above?A. "/stand can be either hfs or vxfs if you have On-Line JFS.B. "/stand" must be vxfs but "/" can be vxfs or hfs.C. "/stand and "/" must be hfsD. "/stand" must be hfs but "/" can be vxfs.

    75.You execute the "id" command that shows you the current UID and GID.

    What file does this information come from?A. /etc/groupB. /etc/idC. /etc/passwdD. /etc/profile

    76.Which of the following statements is FALSE?A. If cron.allow and cron.deny have entries cron.deny is ignored.B. If there is no cron.allow and a cron.deny exists with no entries everyonecan use cron.C. If cron.allow is empty only the superuser(root) can use cron.

    D. There must be a cron.deny or cron.allow file present on the system inorder to use cron.

  • 8/13/2019 200112222619 New Hp Unix

    14/27

    77.To recover the LVM structures at the top of a physical volume, you woulduse the following commandA. vgcfgbackupB. pvcreate

    C. vgscanD. vgcfgrestore

    78.The Software Distributor can be used to :A. all of theseB. install softwareC. list installed softwareD. copy software depots

    79.How would you get a list of the absolute path names of all files in yourhome directory, which end in ".c". The list is to be held in a file called outfile.

    A. find $HOME -name "*.c" > outfileB. find . -name *.c > outfileC. find $HOME -name "*.c" 2> outfileD. find $home -name *.c > outfile

    80.The tar command is used for:A. printing the contents of a file.B. reformatting a file.C. making archive tapes.D. merging a file.The tape archive command is an extension of the very early UNIX commandar, the file archive builder command. The command was optimized for usewith streaming tape devices.

    81.What does the command "tar cvf /dev/rmt/c0t3d0 /home" do ?A. backs up all files and directories under /homeB. backs up all files in the /home directoryC. puts all files from the tape into the home directoryD. lists all files an the tape that come from the home directary

    82.Which variables hold the string of all command line arguments and thenumber of them ?A. $# and $* respectivelyB. $* and $0 respectivelvC. $* and $# respectivelyD. $0 and $# respectively

    83.What does "test -d abcd' mean ?A. does the variable abcd hold a valueB. is the file abcd executable

    C. is the file abcd a directoryD. nothing - the syntax is wrong

  • 8/13/2019 200112222619 New Hp Unix

    15/27

    84.What is the "esac" command used for ?A. to signify the end of a "case" statementB. to signify the end of a "while" statementC. nothing, it doesn' t exist

    D. to signify the end of a "branch" statement

    85.The following output is from the "ll" command:

    drwx------ 2 you other 96 Mar 2 19:51 data

    From this information "data" is a:A. deleted file waiting for trash collection.B. file, currently in use by two users.C. private directory.D. public directory.

    86.How do you set a value into $? when returning from a shell script ? .A. $?=valueB. set $? 255C. $? Can not be setD. use the exit command

    87.What does "let x=x+5" mean?A. the variable x will hold the string "x+5"B. the variable x will hold the ASCll code number for x plus 5C. the variable x will hold its original value plus 5D. the variable x will hold the value 5

    88.Job control refers to the shell's ability to:A. handle multiple tasks at one time.B. adjust the priority of running jobs.C. move a job from the foreground to the background and vice-versa.D. repeat the same action over and over.Most modern shells (Boune,Korn,Posix) allow the user to start more than oneprocess from a session. While std-out from all the sessions processes mayshare the output file descriptor it is common for only one process to be

    actively connected to the std-in file descriptor, that process is said to be aforeground process while the rest are said to be running in background.The shells use job control commands to allow the user to change theirprocess states.

    89.How are traps removed ?A. trap signal-nameB. trap -rC. unset signal-nameD. trap ' ' int kill term

    90.The default shell used in HP-UX 10.20 and above is the:A. Korn Shell.

  • 8/13/2019 200112222619 New Hp Unix

    16/27

    B. C shell.C. Bourne Shell.D. Posix Shell.Currently the Posix shell is the default shell for HPUX(and is required for theroot user account).It is invoked from the executable file image /bin/sh (or

    /sbin/sh for root user account).

    91.What is the varlable required to be set to force the .kshrc file to run ?A. KSHB. SHELLC. PATHD. ENV

    92.How do you display the contents of the 10th command line argument?A. echo $10B. echo ${10}

    C. echo $(10)D. echo {$10}

    93.How do you suspend a foreground job and then put it into background ?A. use Control C and then fg %jobnumberB. use Control Z and then bg %jobnumberC. use stty -a and then fg %jobnumberD. use control Z and then fg %jobnumber

    94.What does a file type of "I"( the letter I ) mean ?A. the file is a symbolic linkB. the file is a hard linked fileC. the file is a long fileD. the file is a licensed file

    95.HP-UX 11 is an implementation of which UNIX operating system ?A. AT&T; System VB. IEEE/posixC. BSD 4. 1D. ISO

    96.Assuming that the variable abc is not defined. what is returned by thecommand echo '$abc' ?A. blankB. abcC. an error messageD. $abc

    97.If you wanted to append the contents of file f1 to the end of file f2 howwould you do it using input/output redlrection ?A. cat f1 >> f2B. cat f1 > f2

    C. cat f1 cat f2D. cat f1 f2>f2

  • 8/13/2019 200112222619 New Hp Unix

    17/27

    98.How do you see the contents of a variable?A. echo variableB. echo $variableC. Is $variable

    D. set $variable

    99.When logging in through CDE, one of the files used to control theenvironment isA. $HOME/.dtprofileB. $HOME/.cdeprofileC. $HOME/profileD. /etc/profile

    100.What command combination would you use if you wanted a sorted listingof all processes belonging to users, whose names started with"user", and you

    wanted the list a page at a time?A. ps -ef | grep user | moreB. ps -ef | grep user | sort | moreC. ps -ef | sort | moreD. ps -ef | grep | sort | more

    101.Which of the following statements is TRUE?A. Mounting a file system on a directory will erase all files in that directory.B. When creating a file system of type "hfs", an entry will be placed in/var/adm/sbtab.C. The "unmount" command will unmount a file system from a mount point.D. The /etc/fstab file is no longer used in HP-UX 11.0.

    102.What is the sync command used for and who can use itA. The sync command closes down the system quickly. It can only be used byroot.B. The sync command forces a flush of the buffer cache contents to disk. Itcan be used by any userC. The sync command forces a flush of the buffer cache contents to disk. Itcan only be used by root.D. The sync command updates file system super blocks on disk. It can be

    used by any user

    103.At HP_UX 11, the name of the file used to hold the kernel isA. /hp-uxB. /stand/vmunixC. /stand/systemD. /stand/build/vmunix

    104.You do not want the cron daemon to start at system boot. What actionshould you take?A. Run the "unset cron" command.

    B. Change the value of the CRON variable in /sbin/init.d/cron from 1 to 0.C. Change the value of the CRON variable in /etc/rc.config.d/cron from 1 to 0.

  • 8/13/2019 200112222619 New Hp Unix

    18/27

    D. Remove the /usr/sbin/cron executable.

    105.The following: VAR=$(date) is an example of:A. variable substitutionB. command substitution

    C. tilde substitutionD. alias substitutionCommand substitution allows the output generated by one command to beused as an argument to another command. In the above example the shellwould first run the date command and assign its generated output to thevariable VAR. ( An older format of the same action would be VAR=date)

    106.The end of an if branch is indicated by the keyword:A. endB. finC. endif

    D. fiIn the Posix shell the if command syntax is closed with a matching fikeyword(simply if in reverse).

    107.The command grep is an adaptation of common options used with thecommand.A. viB. sedC. edD. editThis command name came from the command line options use with the earlyed text editor. Once a file has been opened by ed the command line: g/{re}/pwould print all lines in the opened file containing the {re} pattern to std-out.

    108.The nice command allows a user to:A. send friendly E-mail messages to a group of users.B. asks the system to be nice to the users processes and give thempreference.C. broadcast a greeting to all users as they logon.D. suggest to the operating system that the process may be run at a weakerpriority.

    Unlike other operating systems HPUX/UNIX does not allow a normal user todirectly set a process priority(unless special real-time priority calls areenabled and allowed). The nice command allows a user to suggest the kernelthat a particular process may be nice to competing processes and be run ata weaker priority (the root user may negatively nice a process and ask thekernel to give it a stronger priority). The kernel takes this as a suggestion andsets a process priority according to various utilization factors and othermysterious influences.

  • 8/13/2019 200112222619 New Hp Unix

    19/27

    HP-UX%&R'( II

    1.A direct map contains:A. one or more indirect maps.B. one or more complex maps.C. any number of related mount points.D. any number of unrelated mount points.

    2.What command would you use to discover the sequence of gatewaysthrough which an IP packet travels to reach its destination?A. tracerouteB. pingC. netstatD. ifconfig

    3.A bridge can perform translations up to an including which OSI layerA. layer 1B. layer 2C. laver 3D. laver 4

    4.What, in your opinion, is the most important NFS consideration of thoseshown below?A. keep the system time synchronised with all other NFS nodesB. the server is running enough nfsd processesC. the client is running enough biod processes

    D. all user and group ID' s are consistent across all NFS nodes

    5.The portmap daemon listens for client requests directed to which wellknown port (s) ?A. 23B. all standard ARPA/Berkeley service port numbersC. 111D. none of these, the internet daemon forwards all relevant client requests

    6.The maximum transmission rate of standard Ethernet isA. 1 Mbytes/s

    B. 100 Mbits/sC. 100 Mbytes/sD. 10 Mbits/s

    7.The HP-UX linkloop command can be used to:A. test layer 2 connectivityB. test the operational state of the loopback interfaceC. ensure that a network interface cards IP address and MAC address areproperly boundD. enable IP multiplexing

    8.Which of the following daemons only runs on a NIS master server?A. ypserv

  • 8/13/2019 200112222619 New Hp Unix

    20/27

    B. ypinitC. rpc.yppasswdD. ypxfrd

    9.Switches can perform translations up to and including the ____________ of

    the OSI model.A. data link layerB. physical layerC. transport layerD. network layer

    10.Subnetting is a technique used to:A. provide multiple physical LAN segments while retaining a single networknumberB. use the network part of an IP address to provide discreet sub networksC. retain a single physical segment but allow multiple network numbers

    D. use the host part of an IP address to provide discrete sub networks

    11.Which protocol maps IP addresses of remote nodes to their correspondingMAC addresses?A. IPB. ARPC. TCPD. ICMPAddress Resolution Protocol data is kept in kernel memory(in the arp cache)and provides the Internet-to-Ethernet address translations needed by thenetworking delivery agents.

    12.The anonymous user (nobody) is pre-configured on HP -UX to have userID:A. -2B. -1C. 1D. 2

    13.What is the maximum transmission unit (MTU) size for IEEE 802.3?A. 64 brtes

    B. 1024 bytesC. 1500 bytesD. 6024 bytes

    14.The ______________________ file is used by the system at boot time toconfigure an IP address onto a LAN interface card.A. /etc/rc.config.d/namesvrsB. /etc/rc.config.d/ipconfigC. /etc/rc.config.d/ifconfigD. /etc/rc.config.d/netconf

    15.When using HPNP JetAdmin to add a network printer to the local spooleryou must specify:

  • 8/13/2019 200112222619 New Hp Unix

    21/27

    A. the printer name / IP nameB. the printer typeC. the LP destination queue nameD. perform all three of the above actions

    16.In relation to network spooling which of the following statements is false?A. the rlpdaemon must be available on the print serverB. bootpd and tftpd are required on the BOOTP serverC. HPNP JetAdmin utility software is bundled with HP-UXD. the BOOTP server and network printer must not have a gateway betweenthem

    17.What command would you use to determine which NFS clients have anNFS server's file systems currently mounted?A. showmount -aB. ypwhich

    C. showmount -eD. bdf /mount

    18.An HP ENVIZEX X Station would not have :A. RAMB. a SCSI interfaceC. an audio interfaceD. a hard disk

    19.Which of the following cannot be used to resolve host names to IPaddresses?A. /etc/hosts fileB. BINDC. NFSD. NIS+

    20.The directory location of start-up/shutdown scripts on an HP-UX 10.X or11.0 host is:A. /etc/rc.config.dB. /sbin/init.dC. /usr/sbin

    D. /startup

    21.Which type of access method does Ethernet and IEEE 802.3 use?A. Fiber Distributed Data Interface (FDDI)B. Demand Priority Protocol (100VG-AnyLAN)C. Carrier-Sense, Multiple-Access with Collision Detection (CSMA/CD)D. Dynamic Host Configuration Protocol (DHCP)This protocol was developed for the bus topology, since both protocols usethe same access method they can easily co-exist on the same networkinfrastructure!

    22.Each IP address contains two parts:A. the network portion and the host portion.

  • 8/13/2019 200112222619 New Hp Unix

    22/27

    B. the host portion and the socket portion.C. the network portion and the MAC address.D. the MAC address and the socket portion.

    23.DNS zone transfers happen:

    A. each time the primary DNS server resolves a new nameB. every hourC. every dayD. at intervals configurable by the DNS administrator

    24.The Open System Interconnection (OSI) model:A. has nine distinct protocol layers.B. establishes a set of rules for data transmission.C. was originally developed by the IEEE.D. is used to map out the cabling in a distributed architecture.

    25.You notice a fellow administrator running the command 'ypinit -s FIDO' onhost PATCH what would this command be used to achieve?A. register FIDO as a NIS master serverB. register FIDO as a NIS slave serverC. copy database files from NIS master PATCH to NIS slave FIDOD. copy database files from NIS master FIDO to NIS slave PATCH

    26.Automounter can be used to :A. perform automatic load balancing among alternate NFS serversB. automatically umount unused NFS mountsC. automatically remount required NFS mountsD. all of the aboveThe automount daemon automatically and transparently mounts NFS filesystems as needed. It monitors attempts to access directories or files that areassociated with an automount map. If a remote mount has not been usedfor a configurable amount of time the automount daemon will umount it.

    27.The four types of automount maps are:A. master, direct, complex, and simple.B. master, indirect, direct, and special.C. auto, direct, indirect, and master.

    D. auto, global, local, and master.

    28.Which of the following is NOT an NIS command?A. ypinitB. ypmatchC. yphostD. ypmakeThe bogus command name in this list is yphost. To see which server youare currently bound to you would use ypwhich and to change your binding youcould try ypset.

  • 8/13/2019 200112222619 New Hp Unix

    23/27

    29.Which statement is not in a format suitable for either rhosts. equivor .rhosts?A. -plutoB. +sallyC. saturn, pluto, -bob

    D. saturn bob

    30.Subnetting is a technique used to:A. use the host part of an IP address to provide discrete sub-networks.B. use the network part of an IP address to provide discrete sub-networks.C. perform IP multiplexing.D. perform IP forwarding on an HP-UX host.

    31.The lanscan command can be used to display:A. the device file(s) for any LAN cards on a system.B. the IP address on a system.

    C. all protocols a system is using.D. all MAC addresses on a system.

    32.Using NFS, a server ___________ and a client __________ file systemsand/or directories.A. exports; importsB. mounts; importsC. exports; mountsD. writes; receivesThe correct terminology for NFS file sharing is: the server exports afile|filesystem and a client mounts the exported item to their local file system.

    33.Which file is NOT used for DNS (BIND) configuration?A. named.bootB. db.cacheC. in-addr.arpaD. db.127.0.0

    34.Local networks or LANs are:A. restricted to connecting systems in the same building.B. rarely used by UNIX systems.

    C. only supported between equipment from the same vendor.D. a standard in the modern computing enterprise.

    35.What do you understand by the term "in-addr.arpa"?A. the configuration file for ARPA servicesB. a special DNS name spaceC. a trace file showing arp protocol access timesD. a component of the name resolver library software

    36.One of the items shown below is not a DNS record type, which one?A. PTR

    B. SOAC. MX

  • 8/13/2019 200112222619 New Hp Unix

    24/27

    D. FS

    37.Which of the following is not a TCP/IP protocol?A. ARPAB. ICMP

    C. SMTPD. DHCP

    38.The default netmask for a class B network is:A. 127.0.0.1B. 255.0.0.0C. 0.255.255.255D. 255.255.0.0

    39.Which of the following would not normally be associated with X Stationoperation?

    A. TFTPB. XDCMPC. NFSD. RPC

    40.Determine which of the following NFS file sharing recommendations wouldnot be good advice.A. Use interruptable mountsB. Mount as many config directories as possible, /etc and /var for exampleC. Use soft mounts rather than hardD. Mount as many application directiories as possible, /opt for example

    41.Which of the following is not a valid software distributor command?A. swpackageB. swaclC. swconfigD. swdelete

    42.Which of the following commands propagates a new master map to aslave server? Execute:A. ypxfr on a slave

    B. ypxfr on a masterC. yppush on a slaveD. ypcopy on a master

    43.The default subnet mask for class C networks is:A. 255. 0. 0. 0B. 255.255. 0. 0C. 255. 255. 255. 0D. none of the above since you cannot subnet a class C networkThe default netmask for class-A network is 255.0.0.0,for class-B network it is255.255.0.0,and for class-C networks it is 255.255.255.0.

    44.The default depot path for software distributor is:

  • 8/13/2019 200112222619 New Hp Unix

    25/27

    A. /var/spool/swB. /sw/defswC. /var/swD. /tmp/sw

    45.Which of the following is not an NFS server daemon?A. biodB. portmapC. mountdD. nfsd

    46.The ________________ command can be used to view the routing tableon a system.A. routeB. netrouteC. netstat

    D. nfsstatSpecifically, the netstat command with the r option will provide a outputlisting all current route definitions in the kernel based routing table.

    47.The file /var/adm/inetd.sec is used to:A. provide an extra layer of security for HP-UX systems.B. specify extra security for anonymous FTP users.C. control access to the internet daemons database.D. enable/disable internet daemon services such as ftp and telnet.The internetworking daemon,inetd,listens on the network and interceptsrequest for network services for which it has been configured. The/var/adm/inetd.sec file on HPUX systems adds an extra level of control as towho can access these services based on the requestors IP-identity.

    48.Which of the following commands would you use to propagate a newmaster map to a slave?A. ypxfr on a slaveB. ypxfr on a masterC. yppush on a slaveD. yppull on a master

    49.The _____________________ file allows the network administrator tospecify the query order of name services to resolve hostname information.A. /etc/nsswitch.confB. /etc/resolv.confC. /etc/servicesD. /etc/hosts.equiv

    50.My host name is "einstein" and I want to display my IP address. Assumingthat everything is configured properly on my system, to display my IP address,I could type the following:A. hosttoip einstein

    B. ifconfig einstein

  • 8/13/2019 200112222619 New Hp Unix

    26/27

    C. nslookup einsteinD. lanscan einstein

    51.Well known port number 23 is used universally for which service?A. ftp

    B. rloginC. telnetD. fingerB.

    2/=ftp,23=telnet,25=smtp,79=finger, //0=pop3,///=sunrpc,5/3=rlogin,5/4

    =shell,5/5=printer.

    52.Three mechanisms available for converting hostnames to theircorresponding IP addresses are:A. NFS, UDP, and DNS

    B. TCP, NIS, and telnetC. DNS, NIS, and /etc/hostsD. NIS, NFS, and ICMP.Bas./etc/hosts -> NIS -> DNS

    53.The /etc/hosts.equiv and the ~/.rhosts files work with:A. ftpB. tcpC. rcpD. rsh

    54.What do you understand by the term OSPF?A. a new OSI layer three protocol to be used for Fibre Optic Lan'sB. the plastic used on fireproof backbone cablingC. a dynamic routing protocolD. a packet filtering tool used on many operating systems

    55.The command used to see the routing table isA. netstat -rnB. lanscanC. ioscanD. inetd c

    56.Which of the following can NOT be determined from the netstat command?A. state of IP-ForwardingB. network interface statusC. active socket connectionsD. route table entriesThe netstat command provides a wealth of networking information andstatistics but basic configuration flags such as IP-Forwarding con not beviewed with it. Try the ndd command instead.

    57.Which of the following commands will reconfigure the DNS nameserverdaemon (named)?A. /sbin/init.d/named reconfig

  • 8/13/2019 200112222619 New Hp Unix

    27/27

    B. sig_named startC. dns qD named restartIf the name daemon is currently running on a system and you change thecontents of its configuration file (usually /etc/named.boot) the sig_named

    restart command will instruct it to halt, re-read boot file and restart.

    58.The maximum cable length of each 10BastT segment is:A. 10 metersB. 20 metersC. 100 metersD. 500 metersThe stated length for 10 Mega-bit twisted pair cabling is 100 meters.

    59.Which of the following commands would allow you to determine theMAC(Ethernet) address of the local systems NICs.

    A. swlistB. ioscanC. lanscanD. ifconfigLanscan provides the station address of all Network Interface Cards on thelocal system.

    60.The default packet size used by ping transmissions is:A. 32 bytesB. 64 bytesC. 32 bitsD. 64 bitsThe default value is 64 (on HPUX systems at least).

    61.When configuring a secondary DNS name server, which of the followingsteps in NOT required to be performed on the host?A. Modify the /etc/rc.config.d/namesvrs file.B. Run the hosts_to_named commandC. Copy the boot.sec,boot.sec.save & db.127.0.0 files from the primary DNSserver host.D. Configure the /etc/resolv.conf file.

    The hosts_to_named script only needs to be run when configuring a primaryDNS server.

    62.In DNS,how many server address may be configured through the/etc/resolv.conf file?A.2B.4C.5D.3In /etc/resolv.conf the keywork nameserver is used to define the IP-addressof a name server. Up to MAXNS (currently 3) name servers can be listed, one

    per keyword.


Recommended