您好,欢迎来到年旅网。
搜索
您的当前位置:首页HP0-002模拟题(一)

HP0-002模拟题(一)

来源:年旅网
HP0-002模拟题(一)

1、If you wanted to mail the contents of a file to a user, how would you do it? A mail user<D mail >filename user

2、Which command allows the system administrator to create a simple local bulletin board to be seen by all users logging into their system? A whatsup B tin C news D readme

3、At the ftp> prompt, what command will copy your local file to a remote host? A push B cpio C put D get

4、The break command in the POSIX shell is used to break out of a A shell script B function C loop structure D sleep routine

5、What file names would be generated by \"ab[cde]fg\"? A abcdefg B abcfg abdfg abefg

C abfg abcfg abdfg abefg

D abcfg abdfg abefg abcdfg abcefg abdefg

6、If you want to pull the second word out of a variable, how would you do it, assuming that the words were separated by one space? A echo $variable | cut -f2 -d\" \" B echo $variable | cut -c2 C cut -f2 -d\" \"<$variable D cut -f2 -d\"\" $variable

7、Which command would print the file /etc/hosts on the printer lj4? A lp -p lj4 /etc/hosts B lp -dlj4 /etc/hosts C lp /etc/hosts -dlj4 D lp /etc/hosts to lj4

8、Access control lists(ACL) allow

A file access to be controlled according to time-of-day restrictions

B extended file modes in addition to those available through basic UNIX file permissions C the listing of all resources for which a user is currently granted access

D the system administrator to control who has permission to use the chown and chmod commands

9、To trim the length of an active log-file use: A >log-file B trim log-file

C rm log-file; touch log-file D cat log-file >log-file

10、What is the difference between local and environmental variables?

A. Environmental variables bring values back to the parent process from the child process B. Only local variables can be set up by a normal user

C. A local variable is only known about in the current process whereas an environmental variable is also known about in child processes

D. A local variable is only known about in the users own processes whereas an environmental variable is known about by the whole system

11、How do you prompt a shell script user for input and then retrieve it? Echo a message and then use A the read command to retrieve the results B the get command to retrieve the results C $* to see the results D $1,$2 to see the results

12、To print a document on HPUX, the user would enter the ____ command. A lp B lpr C print D spool

13、Quoting is used to

A remove the meaning of special characters B ensure capital letters print

C establish command substitution D print in bold type face

14、How do you turn a local variable into an environmental variable in the posix shell? A export variable B set variable

C env variable

D echo variable

15、If you entered\"cat myfile > yourfile\" what would be the result on your screen? A. the contents of myfile B. the word \"my file\" C. an error D. nothing

16、How do you see the local and environmental variables you have set up? A. env B. echo C. Is D. set

17、The nice command allows a user to:

A. send \"friendly\" E-mail messages to a group of users.

B. asks the system to be \"nice\" to the users processes and give them preference. C. broadcast a greeting to all users as they logon.

D. suggest to the operating system that the process may be run at a weaker priority.

#Unlike other operating systems HPUX/UNIX does not allow a normal user to directly set a process priority (unless special real-time priority calls are enabled and allowed). The nice command allows a user to suggest to the kernel that a particular process may be \"nice\" to competing processes and be run at a weaker priority (the root user may negatively \"nice\" a process and ask the kernel to give it a stronger priority). The kernel takes this as a suggestion and sets a process priority according to various utilization factors and other mysterious influences.

18、What command combination would you use if you wanted a sorted listing ofall processes belonging to users, whose names started with\"user\A. ps -ef | grep user | more

B. ps -ef | grep user | sort | more C. ps -ef | sort | more

D. ps -ef | grep | sort | more

19、If a user forgets their password, how can root find out what it was? A. Look in /etc/passwd.

B. Nobody can find out what a password was once it has been encrypted. C. Look in /.secure/passwd. D. Use the passwd command.

#UNIX/HPUX operating systems are not distributed with a decryption routine only an encryption routine! The \"root\" user may replace a forgotten password with a new one but there is no prescribed method to \"crack\" the encryption.

20、The alias shell command is used to create:

A. alternate names for files in your home directory

B. personal shortcuts for frequently used command strings C. a nickname for you system

D. a second user login for your account

21、To shutdown command, with no options, takes you to run level A s|S B 1 C 2 D 0

22、Extensions to the basic HPUX security system are available through HPUX s A shadow password file

B trusted computing base C POSIX security extensions D password-plus

23、Which of the following is NOT affected by the insf command? A /etc/ioconfig

B the kernel resident I/O tree C /dev/* D /var/adm/iomap

24、In HPUX 10.x and above most system log files are located in A /var/adm B /usr/adm C /etc D /tmp

25、During HPUX initialization, which utility is responsible for scheduling the startup scripts for the various run states? A /sbin/rc B /etc/start C /sbin/ioinitrc

D /sbin/bcheckrc

26、The which command is used to determine

A the current version and realease of an executable B pseudo terminal your session is running from

C the absolute path which an executable will be run

D which compiler options were used to create the program.

#Use which to determine which version of a command will be used. Note the version is determined by the order of directories in your $PATH. (See 5.4)

27、The main function of the hpux utility is to A load the kernel into memory B list the standard directory C execute ISL

D rebuild the kernel

28、By default, in which directory is execute permission only allowed for the root user? A /usr/bin B /usr/local/bin C /sbin D /usr/contrib/bin

29、Which command can be used to recover lost device files online? A reboot -d B ioinitrc C insf -e D mk_kernel

30、Utilizing the local root file system, the administrator must ______ to bring an ailing system up to a \"Singer-User\" mode.

A get to the boot-ROM Boot Admin->INFOrmation B get to the ISL->HP-UX command

C hold the TOC button down while powering up the computer D enter boot singeruser at the initial boot prompt

31、The command to list full details of a device file is: A listf B lsdev C lssf D ls

32、The recommend method of halting HPUX from multi-user mode is A init 6 B halt 0 C shutdown -h D reboot -h

33、PA-RISC defines

A a computer architecture and design guideline B a UNIX only hardware set

C extensions to the RISC instruction set D a programmable alarm utility

#See 6.1. PA-RISC is built upon RISC principles, a design approach ...

34、For HPUX11.0, a bootable tape image can be created using the command: A boot_image

B make_recovery C makeboot D mkrs

35、At HPUX 11.x, new drivers

A may only be added by re-compiling the kernel image B may only be added using the sam utility

C are added automatically during boot time auto-configuration D may be registered and added to the kernel dynamically

36、In HPUX11, how do you create a bootable recovery system tape including the entire root volume group ? Use: A make_recovery -A B COPYUTIL at the ISL prompt

C dd on each logical volume in vg00 to DAT D save_config

37、Which of the following device file names point to the disk drive defined by the following ioscan output? Class I H/W Path ================== ext_bus 4 8/16/5

disk 9 8/16/5.6.0 A /dev/rdsk/c5t4d9 B /dev/rdsk/c4t6d0 C /dev/rdsk/c5t5d0

D /dev/rdsk/c6t9d4

#Card instance is 4 and SCSI target address is 6.

38、To create a automated system backup based on the fbackup utility, which of the following steps is NOT required?

A creation of graph file(s).

B scheduling of backup activity using cron

C building a backup list using find command

D Arrange for blank media to be available in device drives prior to the scheduled backup time

39、\"Transition Links\" refer to

A the number of file names on the current system that point to the same data B a POSIX standard method for creating links across remotely mounted file systems C symbolic links created for commonly accessed pre-HPUX 10.x file and directory paths D symbolic links that are created with a limited TTL(time-to-live)

40、A file system swap area is

A space reserved and allocated within a mounted file system for use by the kernel memory manager B space reserved as a temporary data storage area used while synchronizing mirrored disk volumes C a logical volume on the boot disk set up at install time

D an area borrowed from the configured swap space to hold file system

overflow data until a fsck can be performed to clean up the full file system

41、The vgcfgbackup command provides a method for A making a bootable image of a volume group

B saving a volume group configuration to a static file C backing up all the user data on a volume group D synchronizing the mirrors in a volume group

42、To set up a device swap on a logical volume and ensure it is active at each

system startup, which of the following is FALSE? A create the contiguous logical volume B have bad block relocation turned off C add an entry to /etc/fstab

D mount the volume to the file system at /swap

43、The following command line: fbackup -f /dev/rmt/0mn -e /tmp -e /dev -i/ would backup all ____ to

a local tape? A local and imported files

B local files except for the /tmp and /dev directories

C local files and imported files except for the /tmp and /dev directories D local files

44、The fsck command is used to: A. check and repair HFS file systems only

B. check and repair HFS and JFS file systems C. run the intent log roll back for JFS only

D. check and repair HFS and JFS at system boot time only

45、The fbackup utility makes use of a graphfile to :

A. record statistical information on backup performance B. target those files potentially requiring backup

C. optimise on-line backups to minimise impact on active users D. store IP addresses of other network machines in the backup group

#how to tell fbackup what is the backup objects? Two methods: one is with -I option, another is via graph file in which all the backup objects are included.

46、The -B option on the pvcreate is used for A. setting up spare or mirrored boot disks B. setting up spare boot disks C. defining bad blocks D. allow the use of disks over 9Gb

47、An example of a valid \"mknod\" commands to create the group file would be A. mknod group c 0x0i0000 B. mknod group b 0x010000 C. mknod group c 0x01000

D. mknod group c 0x010000

#First of all, group file is a device file of volume group, its characteristics is character. LVM device drivers major number is , VG s minor number always looks like 0xnn0000.

48、What are the major points you should consider when selecting file system swap areas?

A. assign only one file system swap area per physical volume, file system swap should be placed on

lightly used file systems with lots of free space

B. file system swap should be set up on the root file systen first, file system swap should be placed on

lightly used file systems with lots of free space

C. a file system must be unmounted before file system swap is set up, file system swap should be placed on lightly used file systems withlots of free space

D. all file system swap areas should be in the same volume group, vg00, file system swap should be placed on the root file system

49、A UID of zero indicates: A. a super user. B. a deactivated user. C. an invalid user.

D. a restricted user.

50、The last entry in the /etc/passwd line for a user defines A. a shell B. the home directory

C. the password ageing

D. an executable application program or shell

51、Which command can you use to obtain information on established sockets? A ifconfig B netstat C lanadmin D netsock

52、Which file on a NFS server stores the currently mounted NFS file syetem? A /etc/mnttab B /etc/fstab C /etc/rmtab

D /etc/nfstab

53、NTP is a protocol which can be used to achieve A transfer of NFS configuration information across the network.

B synchronization of sendmail transfers between gateway machines.

C UNIX to MS NT file transfers

D synchronization of system times across all machines in a network.

、Which of the following is true for the root user? A /etc/hosts.equiv is nerver used for root users B .rhosts is always checked before hosts.equiv C .rhosts is always checked after hosts.equiv

D All of the Berkeley internet services always ask for a password. #Remember /etc/hosts.equiv is nerver used for root users

55、You have configured a local printer on your system. To deny remote printer access to a particular

host which configuration file would you edit? A /etc/rlp.conf

B /etc/services C /var/adm/inetd.sec D /.rhosts

56、Port numbers are listed in which file? A /etc/serviceport B /etc/hosts C /etc/services D /etc/inetd.conf

57、Which step would be required when configuring a DNS client? A modify /etc/rc.config.d/namesvrs B modify /etc/dns.conf C modify /etc/resolv.conf

D modify user/system equivalency files

58、Which file is read when a network administrator runs the \"exportfs -a\" command on an NFS server? A /etc/xtab

B /etc/rc.config.d/nfsconf

C /etc/exports D /etc/fstab

59、Which file contains the list of static routes to be configured at boot? A /etc/rc.config.d/route B /etc/rc.config.d/netdaemon C /etc/rc.config.d/netconf D /etc/route

60、Identify the current run level for NFS components on a standard HPUX system A run level 2 for core and client, 3 for server B run level 2 for core, client and server

C run level 3 for core and client, 2 for server D run level 3 for core, client and server

61、After setting the -async option for NFS exports, which of the following is true? A This would lead to better performance. B This would lead to better data integrity.

C This would only be used on very quiet networks D There is no -async option for NFS exports.

#This is an advanced topic. You can refer to \"man exportfs\".

62、One host on the local network has an IP of 17.10.132.3 with a netmask of 255.255.128.0. What

network and broadcast address pair characterize this network? A network: 17.10.0.0 broadcast: 17.10.255.255

B network: 17.10.128.0 broadcast: 17.10.128.255 C network: 17.10.0.0 broadcast: 17.10.127.255

D network: 17.10.128.0 broadcast: 17.10.255.255 #There are 2 subnets: 17.10.0.0 and 17.10.128.0 IP AND netmask=network address Host bit are all 1s=broadcast address

63、Which of the following commands will NOT execute without either a hosts.equiv or .rhosts file

properly configured? A rlogin B remsh C ruptime D rwho

、Which script initially starts portmap/rpcbind at boot? A /sbin/init.d/nfs.client B /sbin/init.d/nfs.core C /sbin/init.d/nfs.server D /sbin/init.d/net

65、In the context of TCP/IP static routing, select the only true statement: A Static routing provides redundant routing paths B Routing tables must have one default route defined

C Routing information is normally placed in the file /etc/rc.config.d/netconf D To list the routes on a HPUX host, use the command: route -l

66、Indicate which of the following statement is FALSE with respect to NFS A Local NFS file system mounts can be exported to other systems.

B Full Unix semantics are not always supported on a remotely mounted file system C A client can mount any file or directory on the exported file system not just the root. D A server can export entire file systems, directories, or a file

67、On HPUX which of the following commands would NOT allow the user to execute commands on

another system via the network? A remsh B rsh C telnet D rlogin

68、IP 15.77.100.3 belongs to a host on a network. On this network, a subnet mask of 255.255.252.0

would allow for how many hosts per subnet? A 1022 B 2046 C 4094 D 8190

69、The following line is a segment from the file listing exported file systems on host H: /xly/fs

-rw=saturn:pluto:neptune,root=pluto

The use of root=pluto is to provide which type of access to exported file system /xly/fs? It allows: A anyone from pluto read/write access.

B only user pluto to access the exported file system as root

C the root user on pluto to re-export the mounted file system to other NFS nodes D the root user on pluto read/write access

#-root in /etc/exports makes root users on NFS client gain super access to mounted NFS file systems.

70、In what situation would you normally see the error \"Stale file handle\" on a :

A NFS client when a file the client has been accessing has had its mount point removed by the NFS server

B NFS server when too many clients attempt to access a file simultaneously C NFS client when an attempt is made to remount an already mounted mount point

D NFS server when a file has been accidentally removed while one or more clients are accessing. If an NFS-mounted directory is unexported by exportfs, any access by the client to the directory causes an NFS stale file handle error. However, if exportfs is used to remove a client from the access list of an exported directory, an NFS stale file handle error does not result from any access by the client to the directory.

71、To access nodes beyond your local network, you must have access to A /etc/hosts B DNS C a bridge D a router

72、The linkloop command is useful for showing: A. local LAN throughput

B. loopback address operational status C. router activity

D. LANIC address connectivity

73、How does an HP-UX administrator turn the bootp daemon on at boot?Edit the: A./etc/rc.config.d/netdaemon file and set the variable BOOTP=1 B./ etc/inted.conf file and uncomment the bootp line

C./etc/rc.config.d/bootp file and set the variable BOOTP=1

D./etc/rc.config.d/netconf file and set the variable BOOTP=1

74、The ______________________ file is used by the system at boot time to configure an IP address

onto a LAN interface card. A. /etc/rc.config.d/namesvrs B. /etc/rc.config.d/ipconfig C. /etc/rc.config.d/ifconfig

D. /etc/rc.config.d/netconf

#HP-UX uses the /etc/rc.config.d/netconf to configure the LAN interface card with the ifconfig command at system boot.

75、Which of the following is an access method? A. RJ-45 B. CSMA/CD C. token ring

D. token bus

#CSMA/CD stands for carrier sense, multiple access with collision detection.

This method can be defined as wait, send, and listen. CSMA/CD is the IEEE 802.3 and Ethernet access method.

Token passing can be implemented in a ring and a bus topology

76、A bridge can perform translations up to an including which OSI layer A. layer 1 B. layer 2 C. laver 3

D. laver 4

#Bridges are used to connect two LAN segments at the OSI data link layer. Bridges can only determine the link level address of the source and destination stations involved in the data transfer; it cannot deal with IP addresses.

77、Which of the following is not a standard ARPA service ? A. telnet B. rlogin C. ftp

78、Which of the following files turns the inetd daemon off at boot? A. No file can prevent the inetd daemon from being started at boot. B. /etc/rc.config.d/netdaemon C. /etc/rc.config.d/netconf D. /etc/rc.config.d/inetd

79、The default packet size used by ping transmissions is: A. 32 bytes. B. bytes. C. 32 bits. D. bits.

80、what do you understand by the term \"in-addr.arpa\"? A. the configuration file for ARPA services B. a special DNS name space

C. a trace file showing arp protocol access times

D. a component of the name resolver library software

#\"in-addr.arpa\" is also a name space to resolve ip to hostname.

因篇幅问题不能全部显示,请点此查看更多更全内容

Copyright © 2019- oldu.cn 版权所有 浙ICP备2024123271号-1

违法及侵权请联系:TEL:199 1889 7713 E-MAIL:2724546146@qq.com

本站由北京市万商天勤律师事务所王兴未律师提供法律服务