分类:
2006-03-21 10:19:00
1,What is PAM(pluggable authentication module) used for?
a. to encrypt and authenticate IP packets at the network layer
b. to
c. to tell each service which authentication module to use
d. to enable the ftp service with encryption
answer: c
explanation:PAM是CIFS/9000的一个功能模块,它提供了比NFS更多的功能,能够方便在不同的文件系统中进行资源共享,比如可以用windows的用户名和密码来访问unix系统
2,Which configuration file determines the mail relay behavior of the sendmail daemon?
a. /etc/mail/relay.conf
b. /etc/mail/sendmail.conf
c. /etc/sendmail.relay
d. /etc/rc.config.d/netdeamon
answer:b
3,Which file contains the list of static routes to be configured at boot?
a. /etc/rc.config.d/route
b. /etc/rc.config.d/netconf
c. /etc/rc.config.d/netdeamon
d. /etc/route
answer:b
explanation:/etc/rc.config.d/netconf文件包含了很多配置信息,诸如主机名、操作系统类型、环回地址、广播地址、网关、子网掩码等等
4,Which file on an NFS server contains the list of currently mounted NFS file system?
a. /etc/exports
b. /etc/xtab
c. /etc/fstab
d. exportfs
answer:b
5.A journaled file system intent log is used to
a. store user date prior to a physical write
b. log meta data changes
c. improve buffer cache performance
d. provide an audit trial
e. track mirror transactions
answer:b
6.Which list includes only VXVM objects?
a. diskdg,voldg,plex,cat_vol
b. lvol,plex,subdisk,volumes
c. vmdisk,subdisk,plex,volume
d.mirror_disk,subdiisk,rootdg
answer:a
7.What does the command touch myfile do if myfile exixts?
a. nothing
b. gives an error
c. sets the filesize to zero
d. updates the date/time stamp
answer:d
8.What are the advantages of Online JFS?select three
a. fast resync
b. fast recovery
c. online resizing
d. secure file
e. automatic resizing
f. dynamic inodes creation
answer:a,c,d
9.Which file transfer protocols are used by an ignite server? Select two
a. ftp
b. tftp
c. nfs
d. rcp
e. rsysnc
answer:b,c
10.Which file is used for automount configuration?
a. /etc/netconf
b. /etc/nfsconf
c. /etc/automount.conf
d. /etc/rc.config.d/nfsconf
answer:d
11.What are possible uses of the lanadmin command? Select three
a. enable IP multiplexing
b. resets the network interface card
c. shows IP address for network interface card
d. shows basic I/O error for the network interface card
e. shows operational status of the network interface card
answer:b,d,e
12.Which file contains the information sent in response to a bootp address?
a. /etc/services
b. /etc/bootp/conf
c. /etc/bootptab
d. /etc/inetd.conf
answer:c
13.Which file would you edit to display a message when any user logs in?
a. /var/motd
b. /etc/motd
c. $HOME/messages
d. /var/adm/messages
answer:b
14.What does the file /var/adm/inetd.sec do?
a. specifies extra security for anonymous ftp users
b. controls access to kernel subsystems
c. provides an extra layer of security for HP-UX system
d. stores internet security services history
answer:c
15.Which files can be used to enable a login without a password? Select three
a. .rhost
b. /etc/allow
c. host.allow
d. host.equiv
e. /etc/password
f. /etc/host.aliases
answer:c,d,e
16.What does /etc/default set? Select three
a. password policies
b. default swap space
c. default file system type
d. disk space
e. system time zone
f. some security settings in the directory
answer:b,d,f
17.Which file is used to automatically check and mount file systems?
a. /etc/mnttab
b. /var/adm/fstab
c. /etc/sbtab
d. /etc/fstab
answer:c
18.The mail advantage of using the journal file system over an NFS is:
a.automatic defragmentation
b.better performance for all applications
c.faster recovery
d.graranteed data integrity
answer:c
19.The suspected method for allowing local configuration changes to be made to start-up scripts is through to use of:
a.direct editing of the configuration scripts
b.configuration variables defined in /etc/system.conf
c.sourced configuration files created in the /etc/rc.config.d directory
d.interactive prompts issued to /etc/console during state changes
answer:c
20.Which command makes additional crontab entries?
a. cronedit
b. crontab –e
c. vi /etc/crontab
d. /usr/sbin/cron –e
answer:b
21.If you create a subdirectory named custom under the /etc/skel/ directory and it contains a file named config then new user accounts created via sam will:
a.contain a symbolic link to this file structure
b.have a local file .~/custom/config,which is read-only for the account owner
c.not have any access to the file custom
d.have a local file .~/custom/config, belonging to the new user
answer:d
22.Which command could be used to recover lost device files online?
a.reboot –d
b.iointrc
c.insgf –e
d.mk_kernel
answer:c