




已阅读5页,还剩17页未读, 继续免费阅读
版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
HP0-002模拟题(二)1、What access method does an Ethernet bus use? A. BNC B. CSMA/CD C. token passing D. ATM 2、For HP-UX 11.0 a bootable tape image may be created using the command: A. boot_image B. make_recovery C. makeboot D. mkrs 3、What are the 4 key word in an if statement in the POSIX shell? A. If, then, do, done B. if, then, else, fi C. if, then, begin, end D. if, then, else, endif 4、Which of the follow device file names point to the disk drive defined by the following ioscan-f Output lines? Class I H/W Path - ext_bus 4 8/16/5 disk 9 8/16/5.60 A. /dev/rdsk/c5t4d9 B. /dev/rdsk/c4t6d0 C. /dev/rdsk/c5t5d0 D. /dev/rdsk/c6t9d4 5、Which of the following files can NOT be used to prevent ftp access? A /etc/ftpusers B /var/adm/inetd.sec C. /etc/inetd.conf D. /etc/ftp.conf 6、le for either/etc/hosts.equiv or .rhosts? A. - pluto B. + sally C. saturn, pluto, -bob D. saturn -bob 7、You have created a directory for the volume group named /dev/vg01. Which command would you Use to create the group file for this volume group? A. mk -group B. insf C. mksf D. mknod 8、The difference between block and character I/O is: A. character I/O goes through the buffer cache and block I/O does nor. B. B lock I/O is for large data transfers only and character I/O is for small data transfers only. C. Character I/O is only used for tty devices. D. Block I/O goes through the buffer cache and character I/O does not 9、The command used to submit a file of commands to run under the cron process is: A. cronfile B. crontab C. cron.allow D. /usr/sbin/cron 10、IP address belongs to a host on a network. On this network, a subnet mask of would allow for how many hosts per subnet? A. 1022 B. 2046 C. 4094 D. 8190 11、In HP_UX 10.X and above most system log files are located in : A. /var/adm B. /usr/adm C. /etc D. /tmp 12、Which command would you use to obtain information on established sockets? A. ifconfig B. netstat C. Ianadmin D. Netsock 13、at HP_UX 11.X new drivers: A. may only be added by re-compiling the kernel image. B. May only be added using the the sam utility. C. Are added automatically during boot time auto-configuration. D. May be registered and added to the kernel dynamically. 14、Indicate which of the following statements is False with respect to NFS. A. Local NFS file system mounts can be exported to other systems. B. Full UNIX semantics are not always supported on a remotely mounted file system. C. A client can mount any file or directory on the exported file system not just the root. D. A server can export entire file systems, directories, or a file. 15、If you create a subdirectory named custom under the /etc/ske/ directory and it contains a file named config then new user accounts created via sam will: A. contain a symbolic link to this file structure. B. Have a local file /custom/config, which is read-only for the account owner. C. Not have and access to the file custom. D. Have a local file /custom/config, belonging to the new user. 16、How do you set a value into a local variable in the POSIX shell? A. variable=value B. variable=value C. set variable value D. $variable=value 17、After setting the -async option for NFS exports, which of the following statements would be true? A. This would lead to better performance. B. This would lead to better data integrity C. This would only be used on very quiet networks D. There is no -async option for NFS exports 18、Which of the following statements is true for the root user? A. /etc/hosts.equiv is never used for root users. B. .rhosts is always checked before hosts.equiv. C. .rhosts is always checked after hosts.equiv. D. all of the Berkeley Internet services always ask for a password. 19、Extensions to the basic HP_UX security system are available through HP_UX s: A. shadow password file. B. Trusted computing base. C. POSIX security extensions. D. Passwd-plus. 20、The linkloop command is useful for showing: A. local LAN throughput. B. Loopback address operational status. C. Router activity. D. LANIC address connectivity. 21、As a non root user, is it possible to influence the priority that a command runs at? A. yes, using the pri command B. no. C. yes, using the nice command D. yes, using the priority command 22、Which command would print all of the dot files to the screen excluding .and.? A. echo.* B. echo.?* C. echo.* D. echo.!.* 23、the follow line is a segment from the file listing NFS exported file systems: /mnt/db -rw=saturn:pluto: neptune which statement describes access to the exported file system /mnt/db best? A. allow anyone from system jupiter read/write access B. allow anyone from system jupiter read only access C. allow no access to anyone from system jupiter D. allows user nobody access from system jupiter 24、consider the fragment of hosts.equiv file for host H shown below. Select the option that correctly describes the resulting security on host H A -B + C A. Deny password-free access to user A when attempting to log in from host B, allow user C password-free access all accounts (except root) on host H regardless of source host. B. Deny password-free access to user B when attempting to log in from host A, allow all users from host C password-free access to host H. C. Deny password-free access to user B when attempting to log in from host A, allow user C password-free access to C s accounts (except root) on host H regardless of source host. D. Deny password-free access to user B when attempting to log in from host A, allow user C to password-free access all accounts(except root) on host H regardless of source host. 25、you would use a transceiver when: A. your LAN card breaks and you require temporary solution. B. Your LAN card does not have proper the native connector type. C. You need tot eavesdrop on a LAN line to detect account password information. D. You need to split a LAN into two segment. 26、which of the following commnds would print the file /etc/hosts on the printer lj4? A. lp -p lj4 /etc/hosts B. lp -dlj4 /etc/hosts C. lp /etc/hosts -dlj4 D. lp /etc/hosts to lj4 27、A DNS primary nameserver is authoritative for every host. A. in its domain B. in its domain and its delegated subdomains C. in its zone excluding all of its nondelgated subdomains D. in its zone including all of its nondelgated subdomains 28、By default, in which of the following HP_UX directories is execute permission only allowed for the super-user/ A. /usr/bin B. /usr/local/bin C. /sbin D. /usr/contrib/bin 29、To set up a d evice swap on a logical volume and ensure it is active at each system start-up, which of the following items is false? A. Create a contiguous logical volume B. Have bad block relocation turned off C. Add an entry to /etc/fstab D. Mount the logical volume to the file system at /swap D 30、The main advantage of using the journal file system over an HFS is: A. automatic defragmentation B. better performance for all applications C. faster recovery D. guaranteed data integrity 31、The command to show all the physical volumes in volume group is: A. vgexport -v B. vgdiplay -v C. pvdisplay -v D. lvdisplay -v 32、The loopback address in TCP/IP networking is: A. used by gateways to return undeliverable packets B. a way in which a system can route datagrams to itself C. used when the card is switched into promiscuous mode D. a special route used for testing purposes only 33、what is the difference between local and environmental variables? A. Environmental variables bring values back to the parent process from the child process B. Only local variables can be set up by a normal user C. A local variable is only known about in the current process whereas an environmental variable is also known about in child processes D. A local variable is only known about in the users own processes whereas an environmental variable is known about by the whole system 34、In HP_UX 10.X and above, the following users can run SAM A. super users(root) only B. all users C. all users in the groups root or sys D. super users (root) and users set up in a restricted build of SAM 35、The alias shell command is used to creat: A. alternate names for files in your home directory B. personal shortcuts for frequently used command strings C. a nickname for you system D. a second user login for your account 36、To create an automated system backup strategy based on the fbackup utility, which of the following steps is not required? A. Creation of graph file(s) B. Scheduling of backup activity using cron C. Building a backup list using the find command D. Arrange for blank media to be available in device drives prior to the scheduled backup time 37、The rpcbind or portmap daemon listens for client requests directed to which well known port(s)? A. 23 B. 513 C. 111 D. 64 38、In HP_UX 11, how do you create a bootable recovery system tape including the entire root volume group? Use A. make-recovery -A B. copyutil at the ISL prompt C. dd on each logical volume in vg00 to DAT D. save-config 39、codewords are used to protect: A. software distributed via CD_ROM B. inter-process communications C. secure socket layer protocol exchanges D. locked terminals 40、What file contains the list of static routes to be configured at boot? A. /etc/rc.config.d/route B. /etc/rc.config.d/netdaemon C. /etc/rc.config.d/netconf D. /etc/route 41、a file system can be created on : A. a logical volume B. all of these items C. a whole physical disk D. a portion of a whole disk partition 42、if the shell variable filenames contained a list of file name, separated by spaces, how can you extract the second name in the list into a variable called second? A. echo $filenames I cut -f2 -d second B. second=$(echo $filename | cut -f2 -d ) C. cut-f2-d $filenames second D. second = cut -f2 -d $filename 43、The .rhosts file resides in which directory? A. /etc B. /net C. /var/adm D. $HOME 44、How does an HP_UX administrator turn the bootp daemon on at boot? Edit the : A. /etc/rc.config.d/netdaemon file and set the variable BOOTP=1 B. /etc/inetd.conf file and uncomment the bootp line C. /etc/rc.config.d/bootp file and set the variable BOOTP=1 D. /etc/rc.config.d/netconf file and set the variable BOOP=1 45、in the context of TCP/IP static routing , select the only true statement A. static routing provides redundant routing paths B. routing tables must have at least one default route defined C. routing informtion is normally placed in the file /etc/rc.config. d/netconf D. to list the routes on a HP-UX host, use the command : route -1 46、The shell pipe command | (vertical bar) allows: A. the output of several commands to be appended to the same file B. data to be rapidly transported to another user s session C. the output of a command to be connected to the input of another command D. the parallel execution of many commands 47、The software distributor tools will only run if the following daemon is running : A. swinstalld B. swdistd C. swlogd D. swgentd 48、A socket address defines: A. a destination IP address on a specific host machine B. a combination of an IP address and hostname C. a point-to-point connection between two hosts on the Internet D. the concatenation of an IP address and a port number 49、In a case statement in the POSIX shell, what would a pattern of eE*|quit represent? A. all words starting with e or E or the word quit B. all words starting with e or E and ending in * or the word quit C. equit or Equit D. None of the above 50、The fsck command is used to A. check and repair HFS file systems only B. check and repair HFS and JFS file systems C. run the intent log roll back for JFS only D. check and repair HFS an JFS at system boot time only 51、The file used by the system to automatically check and mount file systems on HP_UX 10.X and above is called A. /etc/checklist B. /etc/fstab C. /etc/sbtab D. /var/adm/fstab 52、A user account password may be changed by A. the root user and the account owner B. anyone who belongs to the group sys C. only the root user D. only the account owner once it is initially set by root 53、Which of the following describes the lowest level to which the HP_UX file system provides access level protection? A. mounted file system B. directory C. sub-directory D. file 54、How do you rename a directory called tmp to a directory called temp in the present working directory? A. in tmp temp B. rn tmp temp C. mv tmp temp D. cn tmp temp 55、Which of the following is not one of the fields in the password file? A. UID B. TERM C. HOME D. SHELL 56、The suggested method for allowing local configuration changes to be made to start-up scripts is through the use of : A. direct editing of the configuration scripts B. configuration variables defined in /etc/system.conf C. sourced configuration files created in the /etc/rc.config.d directory D. interactive prompts issued to /dev/console during state changes 57、If you wish to extract all the lines from a file that do not contain a specified pattern, what command would you use? A. sort-| filename B. grep -v pattern filename C. ext -M pattern filename D. key -n pattern filename 58、In which directory does HP_UX supply default template user startup files? A. /etc/skel B. /usr/home C. /home/template D. etc/temp 59、If you had entered alias dir=ls , what effect would typing dir have? It would: A. have of effect B. five you an error C. show is on the screen, but do nothing until you hit carriage return D. run the ls command 60、If you wanted to pull the second word out of a variable, how would you do it, assuming that the words were separated by one space? A. echo $variable |cut -f2 -d B. echo $variable | cut -c2 C. cut -f2 -d $variable D. cut -f2 -d $variable 61、If a disk containing a mounted journal file system in /dev/vg01/lvol1 has reported errors and you want to check the integrity of the whole file system, which of the following steps should you use? A. Remove all users with fuser -ku, run fsck using fsck -F vxfs /mountpoint B. Run fsck using fsck -F jfs -o full, nolog /mountpoint C. Unmount the file system, run fsck using fsck -f vxfs /dev/vg01/rlvol1 D. Unmount the file system, run fsck using fsck -F vxfs -o full, nolog /dev/vg01/rlvol1 62、NTP is a protocol which can be used to achieve: A. transfer of NFS configuration information across the network. B. Synchronization of sendmail transfers between gateway machines. C. Unix to Microsoft NT file transfers D. Synchronization of system times across all machines in a network. 63、Which of the following is NOT affected by the insf command? A. /etc/ioconfig B. the kernel resident I/O tree C. /dev/* D. /var/adm/iomap 64、What are run levels used for in HP-UX 10.X and above? They: A. define which default processes and daemons are started. B. Define which users are allowed to log in C. Define the maximum number of devices allowed to operate. D. Control the number of users allowed to login 65、One lost+found directory is required per A. file system B. HP-UX system C. HFS file system. It is not required for JFS D. Disk 66、Indicate which of the following statements is FALSE with respect to NFS. The server machine: A. does not maintain state information. B. Simply creates and returns a file handle when a client accesses a file C. Does not know which clients have file handles or indeed have files open D. Relies heavily on NIS 67、What is typically done in a .kshrc file? A. Set aliases, functions, and prompts for the shell environment. B. Show the message of the day file and news C. Set up of the date and time zone. D. Configuration of the CDE profile 68、.Kshrc is different from other startup files. .kshrc is not only run while users login but also i s run by a new shell. It used to setup alias and shell prompt. In HP-UX 10.X and above, what file is used to configure networking parameters such as hostname, IP address, and subnet mask? A. /etc/rc.config.d/netconf B. /etc/rc.config.d/ifconf C. /etc/rc.config.d/ipconf D. /etc/rc.conf
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 山东省日照市田家炳实验中学2026届九上化学期中质量检测模拟试题含解析
- 2026届安庆市英语九年级第一学期期末联考模拟试题含解析
- 离婚协议电子模板制作与法律知识普及合同
- 离职员工一次性补偿协议范本:经济补偿及福利待遇
- 旅游景区投资合作合同:旅游资源开发与投资合作协议
- 上市公司并购担保合同条款解析与风险控制策略
- 离婚协议签订法律保障:五大关键条款的解读与实施
- 水务物业公司股权转让及水资源管理合同
- 商业综合体物业运营管理费及设施维护合同
- 环保产业园土地租赁与废弃物处理合作协议
- 乡村振兴战略实施与美丽乡村建设课件
- 中频电疗法理疗(共60张PPT)精选
- 医学信息检索与利用智慧树知到答案章节测试2023年杭州医学院
- 黑底搭配大气企业宣传商业计划书商务通用PPT模板
- GB/T 17608-2006煤炭产品品种和等级划分
- 量子信息与量子计算课件
- 沪教五年级数学上册第一单元测试卷
- 地下停车库设计统一规定
- 综合实践课《绳结》教学设计
- 建筑装饰设计收费管理规定
- 电子课件-《市场营销》-A45-2298完整版教学课件全书电子讲义(最新)
评论
0/150
提交评论