HP0-091 HP-UX System Administration Practice Test Set 3

How does root allow an ordinary user to add/remove printers in SAM?


Options are :

  • establish a restricted build (Correct)
  • edit sam.allow
  • not possible
  • set the UID bit

Answer : establish a restricted build

Which service is used for resolving host names?


Options are :

  • NFS
  • NTP
  • DFS
  • DNS (Correct)

Answer : DNS

What could possibly solve a paging problem?


Options are :

  • add more internal disks
  • add more memory (Correct)
  • add more CPUs
  • increase swap space
  • add more NICs

Answer : add more memory

Which command is used to recreate the /stand/system file?


Options are :

  • sysgen
  • frecover
  • mkkernal
  • system_pre (Correct)
  • vi system

Answer : system_pre

Which level is used by fbackup to complete a full backup?


Options are :

  • 9
  • 1
  • 0 (Correct)
  • V
  • F

Answer : 0

What command installs an application, my_app, from my_depot on a depot server named mickey?


Options are :

  • swload -S mickey:/my_depot \*
  • swinstall -s mickey:/my_depot my_app (Correct)
  • swinstall -s my_depot on mickey -a my_app
  • swinstall -s my_depot @ mickey -a my_app

Answer : swinstall -s mickey:/my_depot my_app

What is the purpose of Media Access Control (MAC) addressing?


Options are :

  • identifies a specific media type for internet access
  • identifies a specific network interface port (Correct)
  • defines the control type used for internet access
  • defines the internet access type for the host

Answer : identifies a specific network interface port

Which commands can be used to create device files? Select TWO.


Options are :

  • mkdevice
  • mksf (Correct)
  • insf (Correct)
  • fsadm
  • devstart

Answer : mksf insf

Which file should you edit to allow remote access to directories or file systems?


Options are :

  • /etc/xtab
  • /etc/mnttab
  • /etc/exports (Correct)
  • /etc/fstab

Answer : /etc/exports

During a run-state change from run level 1 to run level 2 , which script would be run last?


Options are :

  • /sbin/rc2.d/S430nfs.client
  • /sbin/rc2.d/K200tps.rc
  • /sbin/rc2.d/K900nfs.server
  • /sbin/rc2.d/S620xfs (Correct)
  • /sbin/rc2.d/S500inetd

Answer : /sbin/rc2.d/S620xfs

How do you change a volume group name without unloading the data?


Options are :

  • vgexport, mkdir, mknod, vgimport (Correct)
  • vgchange
  • It is not possible.
  • vgremove, mkdir, mknod, vgcreate

Answer : vgexport, mkdir, mknod, vgimport

What does the pvcreate command create?


Options are :

  • the physical links
  • a physical volume device file
  • the lvm disk resident structures (Correct)
  • a hard partition

Answer : the lvm disk resident structures

What is the purpose of Media Access Control (MAC) addressing?


Options are :

  • defines the control type used for internet access
  • identifies a specific network interface port (Correct)
  • identifies a specific media type for internet access
  • defines the internet access type for the host

Answer : identifies a specific network interface port

Which users are included in the /etc/ftpusers file?


Options are :

  • those allowed ftp access without a password
  • those allowed ftp access
  • those not allowed ftp access (Correct)
  • those allowed anonymous ftp access

Answer : those not allowed ftp access

How do you change permission on a file so the owner can modify it, the owner's group can read it, and all other users can execute it? Select TWO.


Options are :

  • chmod file a=w,u=r,o+x
  • chmod file 754 file
  • chmod file u+rw,g+r,o+xr file (Correct)
  • chmod file 745 file (Correct)
  • chmod file u+x,g+r,o+w file

Answer : chmod file u+rw,g+r,o+xr file chmod file 745 file

In which directory does HP-UX supply default templates for the user startup files?


Options are :

  • /usr/home
  • /etc/skel (Correct)
  • /home/template
  • /etc/tmp

Answer : /etc/skel

Which statement describes differences between telnet and ssh?


Options are :

  • telnet uses secure sockets
  • ssh has encrypted data transfer (Correct)
  • ssh can login without a password
  • telnet is more secure

Answer : ssh has encrypted data transfer

What are the main structures inside a journal file system? Select FOUR.


Options are :

  • fragment
  • intent log (Correct)
  • superblock (Correct)
  • allocation units (Correct)
  • inode table (Correct)
  • mcells

Answer : intent log superblock allocation units inode table

You attempt to unmount a file system, /mydata, and get an error stating "device busy". How do you determine the cause?


Options are :

  • fuser -uc /mydata (Correct)
  • showmount -a
  • showmount /mydata
  • mount -v /mydata
  • cat /etc/mnttab

Answer : fuser -uc /mydata

A journaled file system intent log is used to __________.


Options are :

  • store user data prior to a physical write
  • provide an audit trail
  • improve buffer cache performance
  • track mirror transactions
  • log meta data changes (Correct)

Answer : log meta data changes

Which statement is true regarding a device file's major number?


Options are :

  • It points to the associated kernel driver. (Correct)
  • It is used to allocate buffer space.
  • It is determined by its hardware address.
  • It sets the kernel response timeout in tics.
  • It determines the device's interrupt priority.

Answer : It points to the associated kernel driver.

What is the best example of a good password?


Options are :

  • RobertSmith123
  • 9874539763
  • TheQuickRedFoxJumpedOverTheLazyBrownDog
  • ornY3.%dy (Correct)

Answer : ornY3.%dy

What is IP multiplexing on a UNIX host?


Options are :

  • increasing throughput on the network interface
  • binding the same IP address to multiple network interface
  • binding more than one MAC address to a single network interface
  • binding more than one IP address to a single network interface (Correct)

Answer : binding more than one IP address to a single network interface

How do you set up a device swap area and ensure it is active at each system startup?


Options are :

  • Start device swapping using the swapon command on an existing file system mount point.
  • Start device swapping using the swapon command on a logical volume; add an entry to the /etc/vfstab file.
  • Start device swapping using the swapon command on a logical volume; add an entry to the /etc/sbtab file.
  • Start device swapping using the swapon command on a logical volume; add an entry to the /etc/fstab file. (Correct)

Answer : Start device swapping using the swapon command on a logical volume; add an entry to the /etc/fstab file.

What describes the difference between block and character I/O?


Options are :

  • Block I/O is used to send data to disk and character I/O is not.
  • Character I/O is used to send data to disk and block I/O is not.
  • Block I/O goes through the buffer cache and character I/O does not. (Correct)
  • Block I/O is for large data transfers only and character I/O is for small data transferd only.
  • Character I/O goes through the buffer cache and block I/O does not.

Answer : Block I/O goes through the buffer cache and character I/O does not.

You are trying to display a Xwindow from an application running on a host and get an error indicating connection not allowed. Which command will allow display on the remote host?


Options are :

  • display -hostname
  • export $DISPLAY
  • dxm -start
  • xhosts + (Correct)

Answer : xhosts +

Which command will display the IP address to hardware address translation table?


Options are :

  • nslookup
  • lanscan
  • netstat
  • arp (Correct)
  • linkloop

Answer : arp

To display the available routes and their status, which command would you use?


Options are :

  • routestat
  • sysstat
  • route -s
  • netstat -rn (Correct)

Answer : netstat -rn

Which command obtains information on established sockets?


Options are :

  • netsock
  • netstat (Correct)
  • ifconfig
  • lanadmin

Answer : netstat

What is PAM (Pluggable Authentication Module) used for?


Options are :

  • to tell each service which authentication module to use (Correct)
  • to enable the ftp service with encryption
  • to indicate which service can run in a nonsecure mode
  • to encrypt and authenticate IP packets at the network layer

Answer : to tell each service which authentication module to use

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions