HP0-002模拟题(一).doc_第1页
HP0-002模拟题(一).doc_第2页
HP0-002模拟题(一).doc_第3页
HP0-002模拟题(一).doc_第4页
HP0-002模拟题(一).doc_第5页
已阅读5页,还剩12页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

HP0-002模拟题(一)1、If you wanted to mail the contents of a file to a user, how would you do it? A mail userfilename B mail user=filename C mail userfilename user 2、Which command allows the system administrator to create a simple local bulletin board to be seen by all users logging into their system? A whatsup B tin C news D readme 3、At the ftp prompt, what command will copy your local file to a remote host? A push B cpio C put D get 4、The break command in the POSIX shell is used to break out of a A shell script B function C loop structure D sleep routine 5、What file names would be generated by abcdefg? A abcdefg B abcfg abdfg abefg C abfg abcfg abdfg abefg D abcfg abdfg abefg abcdfg abcefg abdefg 6、If you want to pull the second word out of a variable, how would you do it, assuming that the words were separated by one space? A echo $variable | cut -f2 -d B echo $variable | cut -c2 C cut -f2 -d log-file B trim log-file C rm log-file; touch log-file D cat log-file log-file 10、What is the difference between local and environmental variables? A. Environmental variables bring values back to the parent process from the child process B. Only local variables can be set up by a normal user C. A local variable is only known about in the current process whereas an environmental variable is also known about in child processes D. A local variable is only known about in the users own processes whereas an environmental variable is known about by the whole system 11、How do you prompt a shell script user for input and then retrieve it? Echo a message and then use A the read command to retrieve the results B the get command to retrieve the results C $* to see the results D $1,$2 to see the results 12、To print a document on HPUX, the user would enter the _ command. A lp B lpr C print D spool 13、Quoting is used to A remove the meaning of special characters B ensure capital letters print C establish command substitution D print in bold type face 14、How do you turn a local variable into an environmental variable in the posix shell? A export variable B set variable C env variable D echo variable 15、If you enteredcat myfile yourfile what would be the result on your screen? A. the contents of myfile B. the word my file C. an error D. nothing 16、How do you see the local and environmental variables you have set up? A. env B. echo C. Is D. set 17、The nice command allows a user to: A. send friendly E-mail messages to a group of users. B. asks the system to be nice to the users processes and give them preference. C. broadcast a greeting to all users as they logon. D. suggest to the operating system that the process may be run at a weaker priority. #Unlike other operating systems HPUX/UNIX does not allow a normal user to directly set a process priority (unless special real-time priority calls are enabled and allowed). The nice command allows a user to suggest to the kernel that a particular process may be nice to competing processes and be run at a weaker priority (the root user may negatively nice a process and ask the kernel to give it a stronger priority). The kernel takes this as a suggestion and sets a process priority according to various utilization factors and other mysterious influences. 18、What command combination would you use if you wanted a sorted listing ofall processes belonging to users, whose names started withuser, and you wanted the list a page at a time? A. ps -ef | grep user | more B. ps -ef | grep user | sort | more C. ps -ef | sort | more D. ps -ef | grep | sort | more 19、If a user forgets their password, how can root find out what it was? A. Look in /etc/passwd. B. Nobody can find out what a password was once it has been encrypted. C. Look in /.secure/passwd. D. Use the passwd command. #UNIX/HPUX operating systems are not distributed with a decryption routine only an encryption routine! The root user may replace a forgotten password with a new one but there is no prescribed method to crack the encryption. 20、The alias shell command is used to create: A. alternate names for files in your home directory B. personal shortcuts for frequently used command strings C. a nickname for you system D. a second user login for your account 21、To shutdown command, with no options, takes you to run level A s|S B 1 C 2 D 0 22、Extensions to the basic HPUX security system are available through HPUX s A shadow password file B trusted computing base C POSIX security extensions D password-plus 23、Which of the following is NOT affected by the insf command? A /etc/ioconfig B the kernel resident I/O tree C /dev/* D /var/adm/iomap 24、In HPUX 10.x and above most system log files are located in A /var/adm B /usr/adm C /etc D /tmp 25、During HPUX initialization, which utility is responsible for scheduling the startup scripts for the various run states? A /sbin/rc B /etc/start C /sbin/ioinitrc D /sbin/bcheckrc 26、The which command is used to determine A the current version and realease of an executable B pseudo terminal your session is running from C the absolute path which an executable will be run D which compiler options were used to create the program. #Use which to determine which version of a command will be used. Note the version is determined by the order of directories in your $PATH. (See 5.4) 27、The main function of the hpux utility is to A load the kernel into memory B list the standard directory C execute ISL D rebuild the kernel 28、By default, in which directory is execute permission only allowed for the root user? A /usr/bin B /usr/local/bin C /sbin D /usr/contrib/bin 29、Which command can be used to recover lost device files online? A reboot -d B ioinitrc C insf -e D mk_kernel 30、Utilizing the local root file system, the administrator must _ to bring an ailing system up to a Singer-User mode. A get to the boot-ROM Boot Admin-INFOrmation B get to the ISL-HP-UX command C hold the TOC button down while powering up the computer D enter boot singeruser at the initial boot prompt 31、The command to list full details of a device file is: A listf B lsdev C lssf D ls 32、The recommend method of halting HPUX from multi-user mode is A init 6 B halt 0 C shutdown -h D reboot -h 33、PA-RISC defines A a computer architecture and design guideline B a UNIX only hardware set C extensions to the RISC instruction set D a programmable alarm utility #See 6.1. PA-RISC is built upon RISC principles, a design approach . 34、For HPUX11.0, a bootable tape image can be created using the command: A boot_image B make_recovery C makeboot D mkrs 35、At HPUX 11.x, new drivers A may only be added by re-compiling the kernel image B may only be added using the sam utility C are added automatically during boot time auto-configuration D may be registered and added to the kernel dynamically 36、In HPUX11, how do you create a bootable recovery system tape including the entire root volume group ? Use: A make_recovery -A B COPYUTIL at the ISL prompt C dd on each logical volume in vg00 to DAT D save_config 37、Which of the following device file names point to the disk drive defined by the following ioscan output? Class I H/W Path = ext_bus 4 8/16/5 disk 9 8/16/5.6.0 A /dev/rdsk/c5t4d9 B /dev/rdsk/c4t6d0 C /dev/rdsk/c5t5d0 D /dev/rdsk/c6t9d4 #Card instance is 4 and SCSI target address is 6. 38、To create a automated system backup based on the fbackup utility, which of the following steps is NOT required? A creation of graph file(s). B scheduling of backup activity using cron C building a backup list using find command D Arrange for blank media to be available in device drives prior to the scheduled backup time 39、Transition Links refer to A the number of file names on the current system that point to the same data B a POSIX standard method for creating links across remotely mounted file systems C symbolic links created for commonly accessed pre-HPUX 10.x file and directory paths D symbolic links that are created with a limited TTL(time-to-live) 40、A file system swap area is A space reserved and allocated within a mounted file system for use by the kernel memory manager B space reserved as a temporary data storage area used while synchronizing mirrored disk volumes C a logical volume on the boot disk set up at install time D an area borrowed from the configured swap space to hold file system overflow data until a fsck can be performed to clean up the full file system 41、The vgcfgbackup command provides a method for A making a bootable image of a volume group B saving a volume group configuration to a static file C backing up all the user data on a volume group D synchronizing the mirrors in a volume group 42、To set up a device swap on a logical volume and ensure it is active at each system startup, which of the following is FALSE? A create the contiguous logical volume B have bad block relocation turned off C add an entry to /etc/fstab D mount the volume to the file system at /swap 43、The following command line: fbackup -f /dev/rmt/0mn -e /tmp -e /dev -i/ would backup all _ to a local tape? A local and imported files B local files except for the /tmp and /dev directories C local files and imported files except for the /tmp and /dev directories D local files 44、The fsck command is used to: A. check and repair HFS file systems only B. check and repair HFS and JFS file systems C. run the intent log roll back for JFS only D. check and repair HFS and JFS at system boot time only 45、The fbackup utility makes use of a graphfile to : A. record statistical information on backup performance B. target those files potentially requiring backup C. optimise on-line backups to minimise impact on active users D. store IP addresses of other network machines in the backup group #how to tell fbackup what is the backup objects? Two methods: one is with -I option, another is via graph file in which all the backup objects are included. 46、The -B option on the pvcreate is used for A. setting up spare or mirrored boot disks B. setting up spare boot disks C. defining bad blocks D. allow the use of disks over 9Gb 47、An example of a valid mknod commands to create the group file would be A. mknod group 64 c 0x0i0000 B. mknod group b 64 0x010000 C. mknod group c 64 0x01000 D. mknod group c 64 0x010000 #First of all, group file is a device file of volume group, its characteristics is character. LVM device drivers major number is 64, VG s minor number always looks like 0xnn0000. 48、What are the major points you should consider when selecting file system swap areas? A. assign only one file system swap area per physical volume, file system swap should be placed on lightly used file systems with lots of free space B. file system swap should be set up on the root file systen first, file system swap should be placed on lightly used file systems with lots of free space C. a file system must be unmounted before file system swap is set up, file system swap should be placed on lightly used file systems withlots of free space D. all file system swap areas should be in the same volume group, vg00, file system swap should be placed on the root file system 49、A UID of zero indicates: A. a super user. B. a deactivated user. C. an invalid user. D. a restricted user. 50、The last entry in the /etc/passwd line for a user defines A. a shell B. the home directory C. the password ageing D. an executable application program or shell 51、Which command can you use to obtain information on established sockets? A ifconfig B netstat C lanadmin D netsock 52、Which file on a NFS server stores the currently mounted NFS file syetem? A /etc/mnttab B /etc/fstab C /etc/rmtab D /etc/nfstab 53、NTP is a protocol which can be used to achieve A transfer of NFS configuration information across the network. B synchronization of sendmail transfers between gateway machines. C UNIX to MS NT file transfers D synchronization of system times across all machines in a network. 54、Which of the following is true for the root user? A /etc/hosts.equiv is nerver used for root users B .rhosts is always checked before hosts.equiv C .rhosts is always checked after hosts.equiv D All of the Berkeley internet services always ask for a password. #Remember /etc/hosts.equiv is nerver used for root users 55、You have configured a local printer on your system. To deny remote printer access to a particular host which configuration file would you edit? A /etc/rlp.conf B /etc/services C /var/adm/inetd.sec D /.rhosts 56、Port numbers are listed in which file? A /etc/serviceport B /etc/hosts C /etc/services D /etc/inetd.conf 57、Which step would be required when configuring a DNS client? A modify /etc/rc.config.d/namesvrs B modify /etc/dns.conf C modify /etc/resolv.conf D modify user/system equivalency files 58、Which file is read when a network administrator runs the exportfs -a command on an NFS server? A /etc/xtab B /etc/rc.config.d/nfsconf C /etc/exports D /etc/fstab 59、Which file contains the list of static routes to be configured at boot? A /etc/rc.config.d/route B /etc/rc.config.d/netdaemon C /etc/rc.config.d/netconf D /etc/route 60、Identify the current run level for NFS components on a standard HPUX system A run level 2 for core and client, 3 for server B run level 2 for core, client and server C run level 3 for core and client, 2 for server D run level 3 for core, client and server 61、After setting the -async option for NFS exports, which of the following is true? A This would lead to better performance. B This would lead to better data integrity. C This would only be used on very quiet networks D There is no -async option for NFS exports. #This is an advanced topic. You can refer to man exportfs. 62、One host on the local network has an IP of with a netmask of . What network and broadcast address pair characterize this network? A network: broadcast: 55 B network: broadcast: 55 C network: broadcast: 55 D network: broadcast: 55 #There are 2 subnets: and IP AND netmask=network address Host bit are all 1s=broadcast address 63、Which of the following commands will NOT execute without either a hosts.equiv or .rhosts file properly configured? A rlogin B remsh C ruptime D rwho 64、Which script initially starts portmap/rpcbind at boot? A /sbin/init.d/nfs.client B /sbin/init.d/nfs.core C /sbin/init.d/nfs.server D /sbin/init.d/net 65、In the context of TCP/IP static routing, select the only true statement: A Static routing provides redundant routing paths B Routing tables must have one default route defined C Routing information is normally placed in the file /etc/rc.config.d/netconf D To list the routes on a HPUX host, use the command: route -l 66、Indicate which of the following statement is FALSE with respect to NFS A Local NFS file system mounts can be exported to other systems. B Full Unix semantics are not always supported on a remotely mounted file system C A client can mount any file or directory on the exported file system not just the root. D A server can export entire file systems, directories, or a file 67、On HPUX which of the following commands would NOT allow the user to execute commands on another system via the network? A remsh B rsh C telnet D rlogin 68、IP belongs to a host on a network. On this network, a subnet mask of would allow for how many hosts per subnet? A 1022 B 2046 C 4094 D 8190 69、The following line is a segment from the file listing exported file systems on host H: /xly/fs -rw=saturn:pluto:neptune,root=pluto The use of root=pluto is to provide which type of access to exported file system /xly/fs? It allows: A anyone from pluto read/write access. B only user pluto to access the exported file system as root C the root user on pluto to re-export the mounted file system to other NFS nodes D the root user on pluto read/write access #-root in /etc/exports makes root users on NFS client gain super access to mounted NFS file systems. 70、In what situation would you normally see the error Stale file handle on a : A NFS client when a file the client has been accessing has had its mount point removed by the NFS server B NFS server when too many clients attempt to access a file simultaneously C NFS client when an attempt is made to remount an already mounted mount point D NFS server when a file has been accidentally removed while one or more

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论