Chinaunix首页 | 论坛 | 博客
  • 博客访问: 5702106
  • 博文数量: 745
  • 博客积分: 10075
  • 博客等级: 上将
  • 技术积分: 7716
  • 用 户 组: 普通用户
  • 注册时间: 2005-04-29 12:09
文章分类

全部博文(745)

文章存档

2019年(1)

2016年(1)

2010年(31)

2009年(88)

2008年(129)

2007年(155)

2006年(197)

2005年(143)

分类:

2006-03-21 10:19:00

1,What is PAM(pluggable authentication module) used for?

a.       to encrypt and authenticate IP packets at the network layer

b.       to indicate which service can run in a nonsecure mode

c.       to tell each service which authentication module to use

d.       to enable the ftp service with encryption

answer: c

explanation:PAMCIFS/9000的一个功能模块,它提供了比NFS更多的功能,能够方便在不同的文件系统中进行资源共享,比如可以用windows的用户名和密码来访问unix系统  

2,Which configuration file determines the mail relay behavior of the sendmail daemon?

a. /etc/mail/relay.conf

b. /etc/mail/sendmail.conf

c. /etc/sendmail.relay

d. /etc/rc.config.d/netdeamon

answer:b

 

3,Which file contains the list of static routes to be configured at boot?

a. /etc/rc.config.d/route

b. /etc/rc.config.d/netconf

c. /etc/rc.config.d/netdeamon

d. /etc/route

answer:b

explanation:/etc/rc.config.d/netconf文件包含了很多配置信息,诸如主机名、操作系统类型、环回地址、广播地址、网关、子网掩码等等

 

4,Which file on an NFS server contains the list of currently mounted NFS file system?

a. /etc/exports

b. /etc/xtab

c. /etc/fstab

d. exportfs

answer:b

 

5.A journaled file system intent log is used to

a. store user date prior to a physical write

b. log meta data changes

c. improve buffer cache performance

d. provide an audit trial

e. track mirror transactions

answer:b

 

6.Which list includes only VXVM objects?

a. diskdg,voldg,plex,cat_vol

b. lvol,plex,subdisk,volumes

c. vmdisk,subdisk,plex,volume

d.mirror_disk,subdiisk,rootdg

answer:a

 

7.What does the command touch myfile do if myfile exixts?

a. nothing

b. gives an error

c. sets the filesize to zero

d. updates the date/time stamp

answer:d

 

8.What are the advantages of Online JFS?select three

a. fast resync

b. fast recovery

c. online resizing

d. secure file deletion

e. automatic resizing

f. dynamic inodes creation

answer:a,c,d

 

9.Which file transfer protocols are used by an ignite server? Select two

a. ftp

b. tftp

c. nfs

d. rcp

e. rsysnc

answer:b,c

 

10.Which file is used for automount configuration?

a. /etc/netconf

b. /etc/nfsconf

c. /etc/automount.conf

d. /etc/rc.config.d/nfsconf

answer:d

 

11.What are possible uses of the lanadmin command? Select three

a. enable IP multiplexing

b. resets the network interface card

c. shows IP address for network interface card

d. shows basic I/O error for the network interface card

e. shows operational status of the network interface card

answer:b,d,e

 

12.Which file contains the information sent in response to a bootp address?

a. /etc/services

b. /etc/bootp/conf

c. /etc/bootptab

d. /etc/inetd.conf

answer:c

 

13.Which file would you edit to display a message when any user logs in?

a. /var/motd

b. /etc/motd

c. $HOME/messages

d. /var/adm/messages

answer:b

 

14.What does the file /var/adm/inetd.sec do?

a. specifies extra security for anonymous ftp users

b. controls access to kernel subsystems

c. provides an extra layer of security for HP-UX system

d. stores internet security services history

answer:c

 

15.Which files can be used to enable a login without a password? Select three

a. .rhost

b. /etc/allow

c. host.allow

d. host.equiv

e. /etc/password

f. /etc/host.aliases

answer:c,d,e

 

16.What does /etc/default set? Select three

a. password policies

b. default swap space

c. default file system type

d. disk space usage limits

e. system time zone

f. some security settings in the directory

answer:b,d,f

 

17.Which file is used to automatically check and mount file systems?

a. /etc/mnttab

b. /var/adm/fstab

c. /etc/sbtab

d. /etc/fstab

answer:c

 

18.The mail advantage of using the journal file system over an NFS is:

a.automatic defragmentation

b.better performance for all applications

c.faster recovery

d.graranteed data integrity

answer:c

 

19.The suspected method for allowing local configuration changes to be made to start-up scripts is through to use of:

a.direct editing of the configuration scripts

b.configuration variables defined in /etc/system.conf

c.sourced configuration files created in the /etc/rc.config.d directory

d.interactive prompts issued to /etc/console during state changes

answer:c

 

20.Which command makes additional crontab entries?

a. cronedit

b. crontab –e

c. vi /etc/crontab

d. /usr/sbin/cron –e

answer:b

 

21.If you create a subdirectory named custom under the /etc/skel/ directory and it contains a file named config then new user accounts created via sam will:

a.contain a symbolic link to this file structure

b.have a local file .~/custom/config,which is read-only for the account owner

c.not have any access to the file custom

d.have a local file .~/custom/config, belonging to the new user

answer:d

 

22.Which command could be used to recover lost device files online?

a.reboot –d

b.iointrc

c.insgf –e

d.mk_kernel

answer:c

阅读(3105) | 评论(0) | 转发(0) |
给主人留下些什么吧!~~