0% found this document useful (0 votes)
133 views11 pages

S1000-007 Sam

The document contains questions and answers related to administering IBM AIX systems. It covers topics like using SMIT, checking hardware configurations, managing disks, logical volumes, file systems, networking, security, and performance monitoring.

Uploaded by

jeet panda
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
133 views11 pages

S1000-007 Sam

The document contains questions and answers related to administering IBM AIX systems. It covers topics like using SMIT, checking hardware configurations, managing disks, logical volumes, file systems, networking, security, and performance monitoring.

Uploaded by

jeet panda
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

Exam S1000-007 IBM AIX v7 Administrator

Specialty

1. An administrator is learning to use SMIT. The administrator wants


to bypass the main menu and go directly into a submenu. How can
the administrator display the SMIT fast path for the submenu?

A. Click on the SMIT fastpath menu on the HMC.


B. Check the SMIT main page for a list of fast path entries.
C. Go to the submenu and select the [F8] key to show the fast path.
D. Go to the submenu and select the [F10] key to go to the shell to check
the shell history.

2. Which AIX command produced the output below?

ent0 adapter UTMP0.02F.00009EF-P1-C2-T1


ent1 adapter UTMP0.02F.00009EF-P1-C2-T2
vsa0 adapter U9111.520.10009EF-V7-C0
vscsi0 adapter U9111.520.10009EF-V7-C11
vscsi1 adapter U9111.520.10009EF-V7-C21

A. lsslot -C device
B. lsdev -C -F "name class physloc"
C. diag -C -F "name class location"
D. prtconf -P -F "name type physloc"

3. Which two commands can the AIX administrator run to make the
newly connected hard disk ready for use?

A. cfgdev
B. cfgmgr
C. mkcfg
D. mkdev
E. mkpv
4. Which is a true statement regarding a disk in the Defined state?

A. The disk is operational and ready for use.


B. To make this disk available, it should be included in the volume group
first.
C. Information about this disk is recorded in the customized database, but
it is not ready to use.
D. This disk type is supported, but there is no information about the disk in
the customized database.

5. Which command should an AIX administrator use to determine the


ent0 MAC address?

A. lsdev -l ent0
B. lscfg -vl ent0
C. lsslot |grep ent0
D. lsattr -El /dev/ent0

6. Which command collects and stores on disk all of the system


configuration?

A. snap -a
B. lsconfig -dc
C. prtconf -m
D. lparstat -ac

7. A client needs to display the number of virtual processors and


entitled capacity on the partition, which command will provide this
information?

A. prtconf -p
B. lparstat -i
C. smtctl -m limit
D. lsdev -Cc processor

8. What is the System Resource Controller (SRC)?

A. A master kernel subsystem to replace other kernel subsystems.


B. A standardized set of tools to monitor common critical alerts.
C. An optional software package to replace the old AIX init process.
D. A common interface to support starting, stopping, and sending
requests to a subsystem.

9. Which installation option should the administrator use to provide


the ability to quickly uninstall the fileset update?

A. installp Apply option


B. installp Preview option
C. installp Clean Up option
D. only possible for interim fixes

10. When registering an AIX system as a client of a NIM master using


the niminit command, the option -a connect=value specifies the
communication method that should be used by the NIM master to
initiate operations on the client.

Which two values are supported for the connect attribute?

A. nimsh
B. ssh
C. ksh
D. rest
E. shell

11. What is true about logical volumes with copies set to be strict?

A. Parts of each mirror copy could reside on the same disk.


B. Physical partitions in each copy must be mapped in numerical order.
C. Logical volume strictness can be applied to each logical partition
separately.
D. Every partition in a mirror copy must reside on a different set of disks
from every other mirror copy.

12. A mirrored datavg volume group consisting of two disks varied


off, after one of the disks failed. The system displays a message
about a missing or unavailable disk. Because of this the administrator
is not able to vary on datavg.
Which command allows the administrator to recover access to the
volume group?

A. synclvodm
B. chvg -mq
C. recovervg
D. varyonvg -f

13. Based on the following output, which command should an AIX


administrator run to move only the data1lv to hdisk2?

# lsvg -p datavg
datavg:
PV_NAME PV STATE TOTAL PPs FREE PPs
FREE DISTRIBUTION
hdisk1 active 799 559
00..80..159..160..160
hdisk2 active 799 799
160..160..159..160..160
# lsvg -l datavg
datavg:
LV NAME TYPE LPs PPs PVs LV
STATE MOUNT POINT
data1lv jfs2 80 80 1
open/syncd /data1
data2lv jfs2 160 160 1
open/syncd /data2

A. migratelv -l data1lv hdisk1 hdisk2


B. migratepv -l data1lv hdisk1 hdisk2
C. migratevg -l data1lv hdisk1 hdisk2
D. replacepv -l data1lv hdisk1 hdisk2

14. Which statement is valid about logical volumes in AIX V7.2?

A. A single logical volume may be located on more than one physical


volume.
B. A single logical volume may be located on more than one volume
group.
C. A single logical volume may consist of logical partitions with different
sizes.
D. A single logical volume may consist of physical partitions with different
sizes.

15. A JFS2 file system uses a log device that was accidentally deleted.
How can the files in the file system be accessed?

A. Mount the file system read-only.


B. Recreate the log device in memory.
C. Add an in-line log to the file system.
D. Refresh the file system superblock.

16. A SAN administrator cloned a LUN device (hdisk) connected to an


AIX system. In order to avoid misleading configurations in ODM, what
is the correct action to be performed on the cloned hdisk?

A. Remove the PVID from the ODM.


B. Clear the PVID on the physical volume.
C. Change the UUID on the underlying hdisk.
D. Remove the hdisk definition and rerun cfgmgr.

17. A user tries to login to an AIX server and receives the error
message:

Based on the output above, what is the most probable cause of the
problem?

A. The target AIX server is down.


B. The user does not exist on the target AIX server.
C. SSH service is not started on the target AIX server.
D. The user does not have the rights to remote login to the target AIX
server.

18. An AIX user has an unstable network connection. Suddenly, the


SSH session to AIX is unresponsive.
What is the fastest way to close the unresponsive SSH connection?

A. Press Ctrl-a then d.


B. Press ~ followed by .
C. Open another session and issue the kill command.
D. Wait till the session unfreezes and logout from the server.

19. A security audit needs to confirm that there are no duplicate UIDs
on an AIX system. The system has only local user accounts.

Where should the audit look for duplicate UIDs on the system?

A. /etc/passwd
B. /etc/security/passwd
C. /etc/security/user
D. /etc/shadow

20. A previous AIX administrator applied an AIX security expert profile


to the system. Unfortunately, the applied profile was not documented.
Which command would display the applied profile?

A. aixpert -t
B. secpert -c
C. getconf SECPROFILE
D. lsattr -El sec0 -a profile

21. A security auditor needs to determine which accounts used the su


command to change to the root user. By default, which log file will
provide the required information?

A. /var/adm/sulog
B. /var/adm/wtmp
C. /var/adm/security
D. /var/log/messages

22. A security department requires users to change their AIX


password every 28 days. Which user attribute must be changed to
achieve the goal?
A. maxage
B. maxdays
C. maxexpired
D. pwdwarntime

23. A user tries to write to a file, but receives the following error
message:

Based on the output above, what is the most probable cause of the
error?

A. The file system has no free space.


B. The file is owned by another user.
C. The user has no write permissions to the file.
D. The file already exists and cannot be overwritten.

24. A user would like to change their password and uses the passwd
command.

Based on the output above, what happens when the user runs the
command passwd?

A. It does not start because it is not owned by the user.


B. It starts with root permissions to change root's password.
C. It starts with user permissions to change user's password.
D. It starts with root permissions to change user's password.

25. A system administrator needs to change the default name


resolution order, to first search the /etc/hosts file and then the DNS
servers. Which option should be present in which file?

A. hosts = file, bind in the /etc/hosts file


B. hosts = local, bind in the /etc/netsvc.conf file
C. options = local, bind in the /etc/resolv.conf file
D. NSORDER = local, bind in the /etc/nslookup.conf file

26. An NFS server has exported the /tmp directory to the world with
read-only permissions. The administrator is trying to mount the NFS
on the client system. However, the mount operation returns the
following error:

# mount nfs_server:/tmp /share


mount: giving up on:
nfs_server:/tmp
vmount: No such file or directory

What must the administrator do to mount the NFS?

A. Refresh the NFS services before mounting the NFS.


B. Export the directory with read-write access permissions.
C. Create the /share directory with mkdir before mounting the NFS.
D. Install the bos.net.nfs.client fileset before mounting the NFS.

27. Which AIX command is useful for monitoring broad aspects of


real-time workload processing?

A. vmo -L
B. iostat 5
C. lparstat -i
D. vmstat -IWwt 1

28. Which statement best applies to physical CPUs?

A. Physical CPUs can only support logical CPUs when its virtual CPU is
folded down.
B. Physical CPUs convert to virtual CPUs whenever logical CPUs have no
workload to execute.
C. Virtual CPUs are the SMT manifestation of logical CPUs whenever
physical CPUs are offline.
D. Multiple virtual CPUs can be time-sliced across multiple physical CPUs
to process workloads.

29. A customer needs to add an additional paging space to their


system. Which command should the administrator issue?

A. chps
B. crps
C. mkps
D. swapon

30. An administrator needs to see how much paging space is being


used on their AIX system. Which command would provide this
information?

A. lsps
B. chps
C. lslv
D. swapon

31. What will cause a user to login and find that they are in / or
/home/guest for their home directory?

A. The /tmp file system is full.


B. The utmp/wtmp files cannot be written to.
C. The user's home directory/file system is full.
D. The user's home directory is not accessible.

32. The network team informs that AIX team that they are seeing
errors on a switch port. They do not believe it is a cable or switch
problem. How can the administrator check whether there is a
problem with the network adapter hardware?

A. Run ethtest against the adapter.


B. Run diag against the adapter.
C. Run errclear against the adapter.
D. Run rmdev / cfgmgr to reconfigure the adapter.
Answer Key:
1. C
2. B
3. BD
4. C
5. B
6. A
7. B
8. D
9. A
10. AE
11. A
12. D
13. B
14. A
15. A
16. B
17. C
18. B
19. A
20. A
21. A
22. A
23. C
24. D
25. B
26. C
27. D
28. D
29. C
30. A
31. D
32. B

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy