|
Question 1.
If the shell variable filenames contained a list of filenames, separated by spaces, how can you extract the second name in the list into a variable called second?
A. echo $ file names | cut -f2 -d " ">second
B. second =$ -d" " $filename>second
C. cut -f2 -d" " $filenames>second
D. second ='cut -f2 -d " " $filenames'
Answer: A
Question 2.
You add a new gateway to your network that allows to a business partner's network.
Whose network number is 15. The new gateway machine has an IP address of 145.1.22.100.
What command do you need to run on client machines on your network in order to communicate with machine on your business partner's network?
A. route add net 145.1.22.100 15.0.0.0 1
B. route add net 15.0.0.0 145.1.22.100 1
C. route add net 145.1.0.0 15.0.0.0. 1
D. route add net 15.0.0.0 145.1.22.100 0
Answer: B
Question 3.
Which of the following command lines would NOT return your original login directory?
A. cd
B. cd..
C. cd~
D. cd $HOME
Answer: A, B
Question 4.
At the ftp>prompt, what command will copy files from your local machine to a remote machine?
A. oush
B. cpto
C. put
D. get
Answer: C
Question 5.
In "let" statements what action does "l" represent?
A. escape the meaning of next character
B. division
C. percentage
D. remainder
Answer: B
Question 6.
Where do you configure the HP-UX auto mounter daemon to start at boot?
A. /etc/rc.config.d/nfsconf
B. /etc/automount.conf
C. /etc/am.conf
D. /etc/rc.config.d/netconf
Answer: A
Question 7.
If you wish to access nodes beyond your local network. Your machine must have access to:
A. A./etc/hosts
B. B.DNS
C. bridge
D. a router
Answer: D
Question 8.
Which command is used to recreate the / stand/system file?
A. system_prep
B. mkkernal
C. vi system
D. frecover
E. sysgen
Answer: A
Question 9.
How do you turn a local variable into an environmental variable in the POSIX shell?
A. set variable
B. env variable
C. echo variable
D. export variable
Answer: D
Question 10.
What is the accepted method for allowing local configuration changes to be made to start-up scripts?
A. direct editing of the configuration scripts
B. configure variables defined in /etc/system.conf
C. edit files in /etc/rc.config.d
D. prompt/dev/console during state changes
Answer: C
Question 11.
Which statement is true regarding a device file's major number?
A. It is determined by its hardware address.
B. It points to the associated kernel driver.
C. It is used to allocate buffer space.
D. It determines the device's interrupt priority.
E. It sets the kernel response timeout in tics.
Answer: B
Question 12.
How do you go to single-user mode on a booted system?
A. init 0
B. reboot
C. shutdown
D. shutdown -r
Answer: C
Question 13.
Who can change a user account password? Select two
A. the root user
B. members of the administrator group
C. the account owner
D. all members of the account owners group
Answer: A, C
Question 14.
Which commands are used to list device file details? Select two
A. lssf
B. lsdev
C. ioscan -fn
D. ll -d
E. lsf -a
Answer: A, C
Question 15.
What does /etc/default set? Select three
A. password policies
B. default swap space
C. default file system type
D. disk space usage limits
E. system time zone
F. some security settings in the directory
Answer: B, D, F
Question 16.
By default, where does the cpio command send its output?
A. /tmp
B. stdout
C. cpio.out
D. $HOME
Answer: B
Question 17.
Which commands should be used to monitor disk I/O statistics? Select TWO.
A. netstat
B. iostat
C. ioscat
D. sar
E. top
F. linkloop
Answer: B, D
Question 18.
How do you set up a device swap area and ensure it is active at each system startup?
A. Start device swapping using the swapon command on an existing file system mount point.
B. Start device swapping using the swapon command on a logical volume, add an entry to the /
etc/fstab file.
C. Start device swapping using the swapon command on a logical volume, add an entry to
the/etc/sbtab file.
D. Start device swapping using the swapon command on a logical volume, add an entry to the
/etc/vfstab file.
Answer: B
Question 19.
Which statement describes differences between telnet and ssh?
A. ssh can login without a password
B. ssh has encrypted data transfer
C. telnet is more secure
D. telnet uses secure sockets
Answer: B
Question 20.
The .rhosts file resides in which directory?
A. /etc
B. /home
C. /netconf
D. $HOME
E. $NETCONF
Answer: D
Question 21.
What is the best example of a good password?
A. RobertSmith123
B. The Quick Red Fox Jumped Over The Lazy Brown Dog
C. 9874539763
D. ornY3.%dy
Answer: D
Question 22.
What is PAM (Pluggable Authentication Module)used for?
A. to encrypt and authenticate IP packets at the network layer
B. to indicate which service can run in a non secure mode
C. to tell each service which authentication module to use
D. to enable the ftp service with encryption
Answer: C
Question 23.
Which users are included in the /etc/ftpusers file?
A. those allowed ftp access
B. those not allowed ftp access
C. those allowed ftp access without a password
D. those allowed anonymous ftp access
Answer: B
Question 24.
You are trying to display a X window from an application running on a host and get an error indicating connection not allowed.
Which command will allow display on the remote host?
A. xhosts +
B. dxm -start
C. export $DISPLAY
D. display -hostname
Answer: A
Question 25.
How do you change permission on a file so the owner can modify it, the owner's group can read it, and all other users can execute it? Select TWO.
A. chmod file u+rw,g+r, o+xr file
B. chomd file 754 file
C. chmod file u+x, g+r, o+w file
D. chmod file 745 file
E. chmod file a=w, u-r, o+x
Answer: A, D
Question 26.
Which command prints the sessions of the specified users and ttys with the most recent first, indicating when the session began, the duration of the session, and the tty on which the session took place?
A. sty -w
B. last
C. who
D. cat utmp
Answer: B
Question 27.
Which Ignite command is used to make a recovery tape of all files in vgoo?
A. make_net_recovery -x inc=/dev/vgoo -d/dev/rmt/omn
B. make_tape_recovery -x inc=allvgs -d /dev/rmt/omn
C. make_tape_recovery -x inc_entire=/dev/vgoo -a /dev/emt/omn
D. make_recovery -x inc=/dev/vgoo -a /dev/rmt/omn
Answer: C
Question 28.
Information about the currently installed software for the local system is stored in which location?
A. /var/adm/sw/filesets
B. /var/adm/sw/products
C. /var/adm/sw/depot
D. /var/adm/sw/swinstall.log
Answer: B
Question 29.
What command installs an application, ny_app, from my_depot on a depot server named mickey?
A. swinstall -s my_depot on mickey -a my_app
B. swinstall -s mickey:/my_depot my_app
C. swload -s mickey:/my_depot \*
D. swinstall -s my_depot @mickey -a my_app
Answer: B
Question 30.
What is the sequence used to boot an Ignite recovery tape?
A. Stop the boot process, search, bo<tape hardware path>
B. Stop the boot process, bo pri, bo <tape hardware path>
C. Stop the boot process, bp prl, isl> hpux-tape
D. Stop the boot process, search, bo<tape mount point>
Answer: A
Question 31.
Which command displays information about software products?
A. swconfig
B. swverify
C. swlist
D. swinstall
E. swagent
Answer: C
Question 32.
What is the smallest object that you can install with swinstall?
A. product
B. sub-product
C. file
D. file set
Answer: D
Question 36.
Which file systems are mounted in single user mode by default?
A. NFS file systems
B. All local file systems
C. Root file system
D. Root and stand file systems
Answer: D
Question 37.
Which service is used for resolving host names?
A. DFS
B. NTP
C. DNS
D. NFS
Answer: C
Question 38.
What is the purpose of Media Access Control (MAC) addressing?
A. defines the internet access type for the host
B. identifies a specific network interface port
C. identifies a specific media type for internet access
D. defines the control type used for internet access
Answer: B
Question 39.
In which situation would you normally see the error "Stale File Handle"?
A. when a file has been locked by another client
B. when too many clients attempt to access a file simultaneously
C. when an NFS client can no longer access the mounted file system
D. when a client attempts to mount an already mounted BFS file system
Answer: C
Question 40.
Which configuration file determines the mail relay behavior of the send mail daemon?
A. /etc/mail/relay.conf
B. /etc/mail/sendmail.cf
C. /etc/sendmail.relay
D. /etc/re.config.d/netdaemon
Answer: B
Question 41.
What is IP multiplexing on a UNIX host?
A. binding more than one MAC address to a single network interface
B. increasing throughput on the network interface
C. binding more than one IP address to a single network interface
D. binding the same IP address to multiple network interface
Answer: C
Question 42.
What service provided by DHCP?
A. Daylight Hours Control Programming for servers
B. IP address management for network managers
C. IP address class designation for web servers
D. A HP-UX unique solution to server IP addressing
Answer: B
Question 43.
Which file contains the list of static routes to be configured at boot?
A. /etc/re.config.d/route
B. /etc/re.config.d/netconf
C. /etc/rc.config.d/netdaemon
D. /etc/route
Answer: B
Question 44.
Which file on an NFS server contains the list of currently mounted NFS file systems?
A. /etc/exports
B. /etc/xtab
C. /etc/fstab
D. /etc/exportfs
Answer: B
Question 45.
Which file should you edit to allow remote access to directories or file systems?
A. /etc/mnttab
B. /etc/exports
C. /etc/xtab
D. /etc/fstab
Answer: B
Question 46.
Which command obtains information on established sockets?
A. ifconfig
B. netstat
C. lanadmin
D. netsock
Answer: C
Question 47.
Port numbers are configured in which HP-UX file?
A. /etc/serviceports
B. /etc/hosts
C. /etc/services
D. /etc/inetd.conf
E. /etc/re.config.d/services
Answer: C
Question 48.
To display the available routes and their status, which command would you use?
A. route -s
B. routestat
C. netstat -rn
D. systat
Answer: C
Question 49.
What are standard ARPA services? Select THREE
A. ftp
B. tcp
C. rcp
D. udp
E. telnet
F. rlogin
G. bootp
Answer: C, F, G
Question 50.
The default size of a physical extent in LVM is_________
A. twice the size of a logical extent
B. the same size as the resident file system's disk block
C. 1/1024 of the total volume size
D. 1MB
E. 2MB
F. 4MB
Answer: F
Question 51.
A journaled file system intent log is used to____________
A. store user data prior to a physical write
B. log meta data changes
C. improve buffer cache performance
D. provide an audit trial
E. track mirror transactions
Answer: B
Question 52.
Which I/O bus structures are found in new (circa 2004) HP servers? Select TWO
A. ISA
B. PCI
C. HSC
D. PCI-X
E. HP-PB
Answer: C, D
Question 53.
Which list includes only VXVM objects?
A. diskdg,voldg, plex, cat_vol
B. lvol, plex, subdisk, volumes
C. vmdisk, subdisk, plex,volume
D. mirror_disk, subdisk,rootdg
Answer: A
Question 54.
What do physical volume links (pv links) provide?
A. access to a spare disk
B. automatic load balancing
C. an alternate path to a disk
D. improved RAID performance
Answer: C
Question 55.
What are the main structures inside a journal file system? Select FOUR.
A. mcells
B. intent log
C. fragment
D. inode table
E. superblock
F. cylinder group
G. allocation units
Answer: B, D, E, G
Question 56.
What is the compatible SCSI interface for a DVD-ROM attached to an RX series system?
A. Single Ended
B. Low Voltage Differential
C. Hogh Voltage Differential
D. High Voltage Single Ended
Answer: B
Question 57.
Which directory contains the HP-UX kernel?
A. /stand
B. /etc
C. /var
D. /kernel
Answer: A
Question 58.
What is the default number of workspaces for CDE?
A. 2
B. 4
C. 8
D. 16
Answer: B
Question 59.
What does a hard link between two files do?
A. allows 2 users to own the same file
B. ensures that 2 files get deleted together
C. allows data to span 2 files
D. allows multiple file names to reference the same data on disk
Answer: D
Question 60.
What is the result when a user enters the telnet command without arguments?
A. An error is returned
B. The system connects to its Domain Name Server.
C. It enters command mode.
D. The system connects to its loop back address.
Answer: C
Question 61.
Which command is used for viewing file space usage?
A. bdf
B. diskinfo
C. freedisk
D. lvdisplay
Answer: A
Question 62.
What is the correct syntax to mail the contents of a text file to a user?
A. mail user <<text file name
B. mail user>text file name
C. mail user<text file name
D. mail>text file name user
Answer: C
Question 63.
What is the functionality of cron?
A. to set carriage return on
B. to update the system clock using NTP
C. to order processes chronologically
D. to schedule execution of processes
Answer: D
Question 64.
What are the wildcard characters that represent a single character and an unlimited number of characters?
A. .and 1
B. .and*
C. ?and*
D. 1and*
E. ?and.
Answer: C
Question 65.
Which command displays the model of your system?
A. uname -r
B. modelstr
C. hostnam
D. model
Answer: D
Question 66.
Which command lists hardware devices?
A. lssf
B. dmsg
C. iomap
D. ioscan
Answer: D
Question 67.
Which filenames are matched by ab[cde]fg?
A. abfg.abcdefg
B. abcfg, abdfg, abefg
C. abcfg, abdfg, abdefg, abfg
D. abcfg, abdfg, abefg, abcdfg, abcefg, abdefg
Answer: B
Question 68.
Which command removes all files in a directory without removing the directory?
A. RM DIRECTORY
B. RM-R DIRECTORY
C. RM -A DIRECTORY
D. RM -R DIRECTORY/*
Answer: D
Question 69.
Which commands can you use to send a software termination signal to the xclock process with an id of 21484? Select THREE
A. kill -21484
B. kill -15 21484
C. kill -SIGTERM 21484
D. kill -s xclock 21484
E. kill -s SIGTERM 21484
Answer: B, C, E
Explanation:
You can use "kill pid", "kill -SIGNAL pid" or "kill -s SIGNAL pid"
Not A: This one is just wrong. "kill -pid" will just cause and error message.
Question 70.
Which environmental variable allows you to override the default directories searched for man pages?
A. PATH
B. MANPATH
C. MANPAGE
D. SEARCHPATH
Answer: B
Question 71.
What does the command touch My file do if My file exixts?
A. nothing
B. gives an error
C. sets the file size to zero
D. updates the date/time stamp
Answer: D
Question 72.
How do you find a pattern "pat" in vi?
A. *pat
B. %pat
C. /pat
D. @pat
Answer: C
Question 73.
What does a user id of zero indicate?
A. a root user
B. an invalid user
C. an anonymous user
D. a deactivated user
Answer: A
Question 74.
The which command is used to determine the _________
A. current version and release of an executable
B. absolute path for an executable
C. compiler options used to create an executable
D. pseudo terminal your session is currently logged on
Answer: B
Question 75.
What does find / -name data file return?
A. the relative path names of all files called data file in your current directory
B. the number of files called data file in your current directory
C. the path names of all files called data file
D. the relative path of files called data file from your current directory down
Answer: C
Question 76.
What are the advantages of Online JFS? Select Three
A. fast resync
B. fast recovery
C. online resizing
D. secure file deletion
E. automatic resizing
F. dynamic in odes creation
Answer: A, C, D
Question 77.
Which Statements are true for a LVM logical volume/ select two
A. It is a file system
B. It is not a file system
C. It may contain a file system
D. A logical volume contains one or more volume groups
E. A logical volume contains one or more plexes
Answer: B, C
Question 78.
When is the information in the VGRA loaded into kernel memory?
A. as a result running mount
B. during volume group activation
C. as a result of running vgscan
D. during vgcfg restore
E. as a result of running vgsnync
Answer: B
Question 79.
Which file transfer protocols are used by an ignite server? Select two
A. ftp
B. tftp
C. nfs
D. rcp
E. rsysnc
Answer: B, C
Question 80.
Which type of installation requires a reboot?
A. kernel patch
B. secure shell
C. command patch
D. dynamically loaded module
Answer: A
Question 81.
Which command lists the registered software depots on the local HP-UX server?
A. swlist -1 depot
B. swconfig -L depot
C. swinstall -1 depot
D. swlist - list bundle
Answer: A
Question 82.
On a PA-RISC system, what is the file system type for/stand?
A. LIF
B. UFS
C. HFS
D. CIFS
E. VxFS
Answer: C
Question 83.
Which methods can be used to install HP-UX from an lgnite server. Select two
A. start an sw install session, then enter the Ignite server IP address
B. boot from application CD and select "Install from Ignite server" and enter the Ignite server IP
address
C. boot from installation media and select "install from Ignite server" and enter the Ignite server IP
address
D. interrupt the boot process and select "Boot from Ignite server "then enter the Ignite server IP
address
E. interrupt the boot process and boot from LAN, then enter the Ignite server IP address
Answer: C, E
Question 84.
How can you tell if a reboot will be required during a patch installation?
A. A patch never requires a reboot.
B. A patch always requires a reboot.
C. The system will always reboot automatically, if necessary
D. Check the patch read me file to determine reboot requirements.
Answer: D
Question 85.
After setting the -async option for NFS exports, which statement would be true?
A. leads to better performance
B. leads to increased data integrity
C. would only be used on very quiet networks
D. would only be used for read-only mounts
Answer: A
Question 86.
Which actions are performed by the set_parms command? Select three
A. set the system date and time
B. configure the system to use DHCP
C. configure the system DNS settings
D. set the root password
E. configures network time protocol (NTP)
Answer: B, C, D
Question 87.
Which file on an NFS server contains a list of clients that currently have the servers NFS system mounted?
A. /etc/exports
B. /etc/nfstab
C. /etc/mnttab
D. /etc/rmtab
E. /etc/fstab
Answer: D
Question 88.
Which file is used for auto mount configuration?
A. /etc/netconf
B. /etc/nfsconf
C. /etc/automount.conf
D. /etc/re.config.d/nfsconf
Answer: D
Question 89.
Which system level service provides access to remote file systems?
A. networks services
B. remote procedure services
C. file transfer protocol (FTP)
D. auto mount
Answer: D
Question 90.
What are possible uses of the lan admin command? Select three
A. enables IP multiplexing
B. resets the network interface card
C. shows IP address for network interface card
D. shows basic I/O error for the network interface card
E. shows operational status of the network interface card
Answer: B, D, E
Question 91.
Which configuration file is used to determine the synchronization sources and operating modes of NTP?
A. /etc/rc.config.d/netdaemons
B. /etc/ntp/conf
C. /etc/rc.config.d/ntpconf
D. /etc/xntpd
Answer: B
Question 92.
Which command is used to display internet to Ethernet address translation tables identifying remote machines?
A. ifconfig
B. arp
C. Ianscan
D. Traceroute
Answer: B
Question 93.
The correct command to add a route to network 156.65 via router 200.1.1.1 would be :-
A. router add 200.1.1.1 net 156.65.0.0.0 0
B. router add net 156.65.0.0 200.1.1.1 0
C. router add 200.1.1.1 net 156. 65.0.0 1
D. router add net 156.65.0.0 200.1.1.1 1
Answer: D
Question 94.
Which file contains the information sent in response to a bootp address?
A. /etc/services
B. /etc/bootp/conf
C. /etc/bootptab
D. /etc/inetd.conf
Answer: C
Question 95.
After modifying the behavior of the internet Daemon (inetd), what should be done to initiate the changes?
A. Reboot the system.
B. Edit the /etc/inetd.conf file.
C. Run the inetd command with the –c option.
D. Use the kill -r /etc/inetd command.
Answer: C
Question 96.
Which command will display the logical to physical address for network interface cards?
A. netstat
B. lanscan
C. arp
D. nslookup
E. linkloop
Answer: C
Question 97.
How do you accomplish interoperability and file sharing between Windows and UNIX systems?
A. CIFS/9000
B. NIS
C. NFSv2.1
D. WINUFS
Answer: A
Question 98.
Which net mask is invalid for an Ipv4 Class B address? Select all that apply.
A. 255.255.255.0
B. 255.255.128.0
C. 255.255.160.0
D. 255.255.192.0
E. 255.255.254.0
Answer: E
Question 99.
Which file contains configuration data for a DNS client?
A. /etc/bind.conf
B. /etc/rc.config.d/dns/conf
C. /etc/resolv.conf
D. /etc.rc.config.d/namesvrs
Answer: D
Explanation:
Not C: This file is used to administer NIS name severs NOT DNS.
/etc/resolv.conf is used on HP-UX for configuring DNS name servers on clients.
Question 100.
What is a network socket?
A. a data buffer used during network exchanges
B. a virtual connection between two NICs
C. an encrypted network communication path
D. the connector for a twisted-pair network cable
Answer: B
Question 101.
What does the link loop command test?
A. loopback address connectivity between network cards
B. Maximum Transmission Unit (MTU) size
C. Router activity
D. MAC address connectivity between network cards
Answer: D
Question 102.
Where do system log files reside?
A. /etc
B. /tmp
C. /usr/adm
D. /var/adm
Answer: D
Question 103.
How do you change from your current directory to your home directory? Select two
A. cd
B. cd/
C. cd..
D. cdhome
E. cd $HOME
F. cd $ORIG
Answer: A, E
Explanation:
A: The cd command with no arguments defaults to the users home directory.
Not F: There is no standard variable "$ORIG
Question 104.
Which symbol is used to append error messages to a file in the POSIX shell?
A. 2>
B. >>2
C. 2<<
D. 2>>
Answer: D
Question 105.
Which statements are true regarding threads and processes? Select two
A. A thread is a component of a process.
B. A process is a component of a thread.
C. Threads and processes have nothing to do with each other.
D. A process is a representation of an entire running program.
E. A thread forces the entire process to run on a single set of resources.
Answer: A, D
Question 106.
Where does the output from background jobs go by default?
A. to stdout
B. to/dev/null
C. to $HOME/out
D. to the system console
Answer: A
Question 107.
What is the result of the command ps?
A. Print the current screen to the default printer.
B. Display the status of system processes.
C. Pauses the system.
D. Displays a status of the default print queue.
Answer: B
Question 108.
What is the default shell to use on an HP-UX 11 system?
A. C shell - /usr/bin/csh
B. Posix shell - /usr/bin/sh
C. Korn shell - /usr/bin/ksh
D. Bourne shell - /usr/bin/bsh
Answer: B
Question 109.
How do you determine the IP address of your system?
A. ipconfig
B. ifconfig
C. cat /etc/network
D. lanscan
Answer: B
Question 110.
What do the vi commands :wq! And zz do?
A. undoes any changes and stays in vi
B. cancels any changes made and quits from vi
C. writes any changes back to disk and exits from vi
D. writes any changes back to disk and continues in vi
Answer: C
Question 111.
What command is used to change password aging?
A. user ed
B. user mod
C. user add
D. user age
Answer: B
Question 112.
Which file would you edit to display a message when any user logs in?
A. /var/motd
B. /etc/motd
C. $HOME/messages
D. /var/adm/messages
Answer: B
Question 113.
What does the following command do?
Cp -r dir2 dir3
A. copies and removes the files from dir2 to dir3
B. renames the directory from dir2 to dir3
C. copies all the files and subdirectories from dir2 to dir3
D. copies all files and subdirectories from dir3 to dir2
Answer: C
Question 114.
Which commands can be used to gracefully end your current HP-UX session? Select two
A. exit
B. quit
C. end
D. logout
E. <ctrl>d
Answer: A, E
Question 115.
BIND is a Berkeley implementation of ________.
A. etc/hosts
B. NIS+Master Server
C. Domain Name Server
D. Nettime Daemon
Answer: C
Question 116.
Which command displays information about the system, hostname, and os?
A. system
B. model
C. hostname
D. uname
Answer: D
Question 117.
What does the term available memory refer to?
A. the amount of memory on the free list
B. memory available for shared memory allocation
C. the amount of memory available after the kernel has been loaded
D. the total amount of memory that passes self-test prior to loading of the kernel.
Answer: C
Question 118.
What is the command used for?
A. reformatting a file
B. making archive files
C. tagging and removing files
D. printing the contents of a file
Answer: B
Question 119.
Which command set the permissions on a file to be rwxr - xr-x? select two
A. chmodd 557 file
B. chmod 575 file
C. chmod 755 file
D. chmod u=rx,g=rwx,0=rx
E. chmod u=rwx, g=rx, o=rx file
F. chmod u=rx,g=rx,o=rwx file
Answer: C, E
Question 120.
What are the /etc/hosts.equiv and ~/.rhosts files referenced by?
A. ftp
B. tcp
C. rcp
D. rsh
Answer: C
Question 121.
Which file permissions are indicated by the value of 721? Select two
A. read, write and execute for owner
B. read, write and execute for group
C. execute only for owner
D. execute only for group
E. write only for other
F. write and execute for other
G. write only for group
Answer: A, F
Explanation:
Note: Some doubts regarding F
7=rwx=read,write,execute in this case for the owner
2=wx=write,execute for group
1=x=execute only for other
Question 122.
Which security tools are commonly used on HP-UX systems? Select two
A. DNS
B. NIS+
C. DHCP
D. Host IDS
E. Secure Shell (ssh)
Answer: D, E
Question 123.
How do you force users to change passwords on a regular basis?
A. USE PASSWORD AGING
B. USE PASSWORD ENCRYPTION
C. ASSIGN A PASSWORD ALIAS
D. ENABLE PASSWORD C2
Answer: A
Question 124.
The anonymous user (nobody) is pre-configured on HP-UX to have which user ID?
A. -65534
B. -2
C. 0
D. 2
E. 65534
Answer: B
Question 125.
What does the file /var/adm/inetd.sec do?
A. specifies extra security for anonymous ftp users
B. controls access to kernel subsystems
C. provides an extra layer of security for HP-UX systems
D. stores internet security services history
Answer: C
Question 126.
What characteristics are required for a non-root password? Select two
A. Upper and lower case letters
B. At least to alphabetical and one numeric or special character
C. More than eight character
D. At least two digits
E. 6-8 characters
Answer: B, E
Question 127.
Which files can be used to enable a login without a password? Select three
A. .rhost
B. /stc/allow
C. host.allow
D. host.equiv
E. /etc/password
F. /etc/host.aliases
Answer: C, D, E
Question 128.
Where are system startup and run-state changes controlled by scripts located?
A. /etc/rc2.d
B. /sbin/config.d
C. /sbin/init.d
D. /etc/rc.confg.d
Answer: C
Question 129.
What does a special file major number indicate?
A. the card instance number
B. LVM physical address
C. The device drive in the kernel
D. Raw device file
Answer: C
Question 130.
Comparing device block I/O and character I/O, which statements are true? Select three
A. Block I/O passes through the buffer cache.
B. Character I/O is also known as raw I/O
C. Character I/O passes through the buffer cache.
D. Serial devices always use character I/O
E. Parallel ports always use block I/O
F. All devices have both character and block drives.
Answer: A, B, D
Explanation:
Block devices are buffered, character devices are not, and serial devices are character devices.
Question 131.
Which users can run SAM on HP-UX?
A. root users
B. all users
C. all users in the groups root or sys
D. root and users authorized for restricted SAM
Answer: D
|
Question 1. Which of the following routers supports version 2.41 router code? A. 5231 B. 5232 C. 5640 D. 5680 Answer: B Question 2. Which of the following is NOT a standard port available on the Router 5012? A. ISDN B. Console C. Serial WAN D. 10/100 Ethernet Answer: A Question 3. True or False: The Flexible Interface Cards (FICs) in the Router 6040 can be hot swapped. A. True B. False Answer: A Question 4. True or False: The RPU can be hot swapped. A. True B. False Answer: B Question 5. What kind of modules does the Router 5232 use? A. SICs only B. MIMs only C. SICs and MIMs D. SICs and FICs Answer: B Explanation: Question 6. Which of the following modules is a daughter card that fits onto the RPU2? A. ATM B. Enhanced Serial C. Encryption Card D. Memory Expansion Answer: C Question 7. How many FIC slots does a Router 6040 have? A. 2 B. 4 C. 6 D. 8 Answer: B Question 8. Which of the following features is available on both the RPU and the RPU2? A. SFP Interface Slot B. CF Memory Card slot C. Gigabit Ethernet Interfaces D. Power and Fan LED indicators Answer: D Question 9. What does it indicate if the LEDs on the Power Supply of the Router 6000 are as follows? ALM (red) - OFF RUN (green) ON AC OK (red) - ON A. Power is OFF or has failed B. A Runtime error has occurred C. Power is ON and voltage is normal D. Power is ON but operating voltage is not within acceptable range Answer: C Question 10. True or False, The Router 6080 Fans have two rotational speeds. A. True B. False Answer: A Question 11. True or False: The RPU2 can support a daughter card. A. True B. False Answer: A
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.