Professional Documents
Culture Documents
HP0-092 1-0
HP0-092 1-0
Version 1.0
QUESTION NO: 1
When setting a system as an FTP server why would you disable tftp?
Answer: D
QUESTION NO: 2
What describes access to the exported file system in this excerpt from the file listing NFS exported file
systems? /mnt/db -rw=saturn:pluto:neptune
Answer: A
QUESTION NO: 3
Click the Exhibit button. How many times will the script print out the value of the variable $VAR1?
A. 0
B. 1
C. infinite
D. 10
Answer: C
QUESTION NO: 4
After fixing the problems on Unix server, usersys02, you still want the performance to be better. Which
items should you check before you issue the following command? Select TWO. # mknod /dev/async c
101 0x1
Answer: B,D
QUESTION NO: 5
Answer: C
QUESTION NO: 6
From your workstation, you can login as root using telnet. How do you fix this security gap?
Answer: A
QUESTION NO: 7
When creating passwords, where would entry force all be placed if it is to be system generated?
A. /etc/profile
B. /tcb/files/system/password
C. /tcb/files/auth/system/default
D. /etc/default/password
Answer: C
QUESTION NO: 8
D. It does NOT know which clients have file handles or files open.
Answer: C,D
QUESTION NO: 9
On which port does the telnet daemon listen for client requests?
A. 23
B. 115
C. 111
D. 69
Answer: A
QUESTION NO: 10
Which delivery agents are supported for use with HP-UX sendmail?
A. OpenMail
B. biff
C. Eudora
D. SMTP
E. Exchange
Answer: A,D
QUESTION NO: 11
Which command allows the administration and testing of LAN interface cards?
A. ifconfig
B. lanadmin
C. netconf
D. lanscan
Answer: B
Using the drag and drop interface, match the file system components with their function.
Answer: <m x1="16" x2="127" y1="108" y2="131" ss="0" a="0"></m><m x1="15" x2="125" y1="167"
y2="188" ss="0" a="1"></m><m x1="16" x2="127" y1="223" y2="246" ss="0" a="2"></m><m x1="17"
x2="125" y1="280" y2="301" ss="0" a="3"></m><m x1="17" x2="128" y1="337" y2="356" ss="0"
a="4"></m><m x1="17" x2="128" y1="385" y2="409" ss="0" a="5"></m><m x1="18" x2="128" y1="442"
y2="466" ss="0" a="6"></m><m x1="162" x2="266" y1="111" y2="132" ss="1" a="0"></m><m x1="160"
x2="262" y1="164" y2="186" ss="1" a="1"></m><m x1="160" x2="262" y1="219" y2="240" ss="1"
a="2"></m><m x1="159" x2="263" y1="274" y2="295" ss="1" a="3"></m><m x1="162" x2="263"
y1="327" y2="352" ss="1" a="4"></m><m x1="161" x2="262" y1="382" y2="405" ss="1" a="5"></m><m
x1="160" x2="263" y1="437" y2="461" ss="1" a="6"></m><c start="3" stop="0"></c><c start="5"
stop="1"></c><c start="4" stop="2"></c><c start="6" stop="3"></c><c start="0" stop="4"></c><c
start="1" stop="5"></c><c start="2" stop="6"></c>
QUESTION NO: 13
A. uustat -all
B. netdump -ip
C. netstat -s
D. landiag -tcp
Answer: C
QUESTION NO: 14
The values for the login_name, login_directory, and login_shell variables are configured in which file?
A. $HOME/.profile
B. /etc/default
C. /etc/passwd
D. /etc/profile
Answer: C
QUESTION NO: 15
When will the following command run if placed in a crontab? 0 0 1,15 * * /sbin/myprog
A. at midnight on the 1st and 15th of each month
Answer: A
QUESTION NO: 16
Which values are set by default in a trusted system database? Select THREE.
A. terminal control
B. device assignment
C. group access
E. system wide
Answer: A,B,E
QUESTION NO: 17
In order to use it, in which directory must the library for a pluggable authentication module be located?
A. /usr/lib/security
B. /usr/contrib/lib
C. /usr/lib
D. /usr/local/lib
Answer: A
QUESTION NO: 18
Given an IPv4 class A network, which subnet mask would divide the current address space into over
2000 networks with over 8000 hosts per network?
A. 255.255.252.0
B. 255.255.128.0
C. 255.255.224.0
D. 255.255.248.0
Answer: C
QUESTION NO: 19
Which command lists all the system hardware belonging to the class disk device?
A. ioscan -t scsi
B. buscan -t scsi
C. buscan -C disk
D. ioscan -C disk
Answer: D
QUESTION NO: 20
A. sysv_status
B. shmemstat
C. mstat
D. ipcs
Answer: D
QUESTION NO: 21
Where are group privileges set so they will be retained following a reboot?
A. /etc/privgroup
B. /etc/rc.config.d/privgroup
C. /etc/privgroup.conf
D. /etc/PRIVGROUP
Answer: A
QUESTION NO: 22
In a POSIX shell, which command allows you to use <esc><k> for command line recall?
A. set -o editon
B. set -o emacs
C. set -o vi
D. set -o edit
Answer: C
QUESTION NO: 23
Answer: A
QUESTION NO: 24
What are the benefits of Secure Shell? Select TWO.
C. integrity of communications
Answer: C,D
QUESTION NO: 25
Answer: A
QUESTION NO: 26
Answer: A
Order the steps to recover a failed disk in a volume group. Options can be used multiple times or not at
all.
Answer: <m x1="17" x2="262" y1="65" y2="89" ss="0" a="0"></m><m x1="15" x2="262" y1="104"
y2="130" ss="0" a="1"></m><m x1="17" x2="265" y1="143" y2="173" ss="0" a="2"></m><m x1="15"
x2="263" y1="184" y2="211" ss="0" a="3"></m><m x1="15" x2="263" y1="224" y2="252" ss="0"
a="4"></m><m x1="16" x2="263" y1="264" y2="291" ss="0" a="5"></m><m x1="15" x2="263" y1="305"
y2="328" ss="0" a="6"></m><m x1="15" x2="263" y1="342" y2="372" ss="0" a="7"></m><m x1="17"
x2="264" y1="384" y2="410" ss="0" a="8"></m><m x1="287" x2="535" y1="64" y2="91" ss="1"
a="0"></m><m x1="287" x2="537" y1="127" y2="157" ss="1" a="1"></m><m x1="287" x2="535"
y1="193" y2="219" ss="1" a="2"></m><m x1="287" x2="534" y1="255" y2="282" ss="1" a="3"></m><m
x1="288" x2="534" y1="320" y2="348" ss="1" a="4"></m><m x1="285" x2="535" y1="385" y2="412"
ss="1" a="5"></m><c start="0" stop="0"></c><c start="1" stop="2"></c><c start="5" stop="4"></c><c
start="6" stop="3"></c><c start="4" stop="1"></c><c start="2" stop="5"></c>
QUESTION NO: 28
B. swverify
C. swconfig
D. swjob
E. swcheck
Answer: A
QUESTION NO: 29
B. anonymous ftp
C. telnet
Answer: B
QUESTION NO: 30
After fixing the initial problems on UNIX server, usersys02, all applications are now much slower. You
look at the vmstat output and see free memory and paging are low. What is likely to be the problem?
A. paging bottleneck because the program did not use mlock or plock
Answer: C
QUESTION NO: 31
A. password aging
C. volume manager
E. syslog size
F. time zone
Answer: B,D,F
QUESTION NO: 32
When a cell is added to or deleted from the configuration of a node partition, what must be done so the
partition will recognize the change?
A. from the MP: CM>PARHUP and select the partition from the list
E. from the BCH main menu on the node partition's console: execute
bo pri reconfig
Answer: D
QUESTION NO: 33
A. $#
B. $?
C. $error
D. $!
Answer: B
QUESTION NO: 34
What is the output of this command? tar cf - dir | remsh zulo tar xf -
A. copies a tar file from a remote host and creates a directory called dir
C. copies a directory called dir and its contents to remote host zulo
D. writes a directory to a tape and labels it zulo
Answer: C
QUESTION NO: 35
If the default nice value is 20 and your UID is 5, when a new process is started in the background using
the '&' symbol, what is its nice value?
A. 0
B. 15
C. 25
D. 20
Answer: D
QUESTION NO: 36
A. An Ignite-UX server can install multiple releases of HP-UX as long as the correct bundles are installed
on the server.
C. The Ignite-UX server must be running the same version of the operating system as the target system.
D. An Ignite-UX server can install only systems that have the same architecture as the client.
Answer: A
QUESTION NO: 37
Answer: D
QUESTION NO: 38
On a network with a host IP address of 15.77.100.3 and a subnet mask of 255.255.252.0, how many
hosts would be allowed per subnet?
A. 2046
B. 4094
C. 8190
D. 1022
Answer: D
QUESTION NO: 39
Your security auditor has told you that only services that send encrypted data across the network can be
used. Which network service complies with your auditor's request?
A. telnet
B. NFS
C. rlogin
D. SSH
E. X-Windows
F. FTP
Answer: D
QUESTION NO: 40
Answer: A,C,F
QUESTION NO: 41
How do you allow other hosts on the network to use software located in the SD-UX depot?
A. Nothing is required.
Answer: D
Click the Task button. Using drag and drop, order the steps required to DECREASE the size of a vxfs file
system using the HP OnlineJFS product.
Answer: <m x1="9" x2="216" y1="76" y2="108" ss="0" a="0"></m><m x1="10" x2="216" y1="121"
y2="149" ss="0" a="1"></m><m x1="11" x2="216" y1="160" y2="187" ss="0" a="2"></m><m x1="9"
x2="216" y1="202" y2="229" ss="0" a="3"></m><m x1="250" x2="456" y1="77" y2="107" ss="1"
a="0"></m><m x1="252" x2="457" y1="128" y2="157" ss="1" a="1"></m><c start="0" stop="1"></c><c
start="1" stop="0"></c>
QUESTION NO: 43
Which system services are provided by the PAM API? Select FOUR.
A. account management
B. session management
E. user authentication
F. password management
Answer: A,B,E,F
QUESTION NO: 44
Which commands create a file with paths to all files named bob and displays the files on the screen as
they are identified? Select TWO.
Answer: B,C
QUESTION NO: 45
You have been managing a UNIX Server, system02, for two years and all patches and OS updates are
current. Why did the network security group send you a message to add the following line to your ARP
configuration file? system03 00:30:6e:5c:3f:f8
C. The network security group wants to stop spoofing of UNIX Server system03.
D. The network security group added UNIX Server system03 for address resolution.
Answer: C
QUESTION NO: 46
Which commands are used to start the Apache Web Server? Select TWO.
A. /etc/rc.config.d/apacheconf start
B. /opt/apache/bin/apache start
C. /sbin/init.d/apache start
D. /sbin/apache start
E. /opt/apache/bin/apachectl start
Answer: C,E
Order the steps to manually generate a kernel given your current working directory is /stand/build. Two
steps are already in order.
Answer: <m x1="12" x2="347" y1="65" y2="95" ss="0" a="0"></m><m x1="12" x2="349" y1="129"
y2="161" ss="0" a="1"></m><m x1="11" x2="346" y1="192" y2="225" ss="0" a="2"></m><m x1="12"
x2="348" y1="257" y2="288" ss="0" a="3"></m><m x1="14" x2="348" y1="320" y2="352" ss="0"
a="4"></m><m x1="372" x2="707" y1="66" y2="96" ss="1" a="0"></m><m x1="371" x2="705" y1="108"
y2="139" ss="1" a="1"></m><m x1="371" x2="706" y1="151" y2="182" ss="1" a="2"></m><m x1="371"
x2="708" y1="195" y2="227" ss="1" a="3"></m><m x1="370" x2="708" y1="323" y2="355" ss="1"
a="4"></m><c start="1" stop="3"></c><c start="2" stop="1"></c><c start="0" stop="2"></c><c
start="4" stop="0"></c><c start="3" stop="4"></c>
QUESTION NO: 48
The rp8420 is experiencing a high CPU load factor because of the many applications that are running
there. Whereas, there is unused CPU capacity on the rx8620, in part due to the superior CPU
performance of the Itanium CPU. What is the best solution for this problem?
A. NFS mount some of the PA-RISC applications and execute them on the Itanium machine.
B. Run the PA-RISC binary unmodified on the Itanium server -- using the Aries translator capability,
which is incorporated into HP-UX on Itanium.
C. Recompile some of the customer's applications from the PA-RISC environment, so that they can
execute natively on the Itanium platform, with
increased performance.
D. Move some of the application binaries from the busy machine to the less busy machine to improve
load balancing.
Answer: C
QUESTION NO: 49
An HP server has 8 cells with 4 hard partitions running 4 separate HP-UX 11i operating systems. How do
you move a cell from one hard partition to another?
Answer: C
QUESTION NO: 50
Which command sequence will copy and register a software depot that exists on the SD-UX server called
depotserver?
Answer: D
QUESTION NO: 51
What are features of the HP9000 server hardware high availability? Select THREE.
D. anti-static cabinet
Answer: C,E,F
QUESTION NO: 52
Answer: B,C,F
QUESTION NO: 53
Answer: B
QUESTION NO: 54
Which command is used to provide access to DHCP related options for the bootpd daemon?
A. bootpdtools
B. dhcptools
C. dhcpdconf
D. bootpdconf
Answer: B
QUESTION NO: 55
Assuming two machines are on the same subnet, which file must be configured on an Ignite-UX server to
allow a PA-RISC client to perform a network boot?
A. pa_bootptab
B. dhcptab
C. instl_boottab
D. bootptab
Answer: C
Using drag and drop, order the steps to create a volume group named vg_app on disk c2t3d0 with
physical extent size of 8 MB and 8192 physical extents. Some panels will not be used.
Answer: <m x1="8" x2="424" y1="53" y2="82" ss="0" a="0"></m><m x1="6" x2="423" y1="109"
y2="133" ss="0" a="1"></m><m x1="8" x2="423" y1="158" y2="187" ss="0" a="2"></m><m x1="7"
x2="423" y1="208" y2="238" ss="0" a="3"></m><m x1="8" x2="422" y1="260" y2="291" ss="0"
a="4"></m><m x1="8" x2="424" y1="312" y2="342" ss="0" a="5"></m><m x1="438" x2="854" y1="56"
y2="86" ss="1" a="0"></m><m x1="438" x2="854" y1="109" y2="138" ss="1" a="1"></m><m x1="438"
x2="853" y1="160" y2="192" ss="1" a="2"></m><m x1="438" x2="854" y1="212" y2="243" ss="1"
a="3"></m><c start="5" stop="0"></c><c start="1" stop="1"></c><c start="4" stop="3"></c><c
start="2" stop="2"></c>
QUESTION NO: 57
How do you boot the HP-UX kernel on the nPar after the vPars are defined and have been booted?
from the ISL: ISL> hpux /stand/vmunix; from the virtual console: CM>REBOOT -v ALL -N <nPar#>
B. from each vPar kernel except one: shutdown -h now
D. once vPars are configured, the kernel CANNOT be booted into the nPar without reinstalling HP-UX
from an Ignite server
from the BCH on the nPar console: bo pri to interact with the ISL
Answer: E
QUESTION NO: 58
Setting the nproc tunable parameter too low could result in which message?
Answer: A
QUESTION NO: 59
When booting a node partition, how do you observe the progress of the cell's power-on self-testing
from the MP?
Answer: B
QUESTION NO: 60
A. SMTP
B. tftp
C. NFS
D. telnet
E. NTP
Answer: B,C
QUESTION NO: 61
On a Superdome, to boot HP-UX into all autobootable virtual partitions configured in the vPars database
on the primary boot device of the nPar, you would _______.
A. from the BCH main menu: bo pri and interact with the ISL,
C. from the BCH main menu: bo pri and interact with the ISL
D. from the BCH main menu: bo pri and interact with the ISL;
Answer: A
QUESTION NO: 62
What are the major areas of internal functionality of the HP-UX operating system? Select THREE.
B. file system
D. user shell
Answer: A,B,E
QUESTION NO: 63
B. causes file named '1' to get its input from file named '2'
C. causes file named '2' be written to file named '1' in the background
Answer: D
QUESTION NO: 64
Which VxVM daemons need to be running for the volume manager to be operating correctly?
Answer: D
QUESTION NO: 65
Which command lists the parameters that are dynamically tunable on HP-UX?
A. sysdef
B. display -parm
C. kmtune
D. kernel -d
Answer: C
QUESTION NO: 66
Answer: C
Order the steps required to INCREASE the size of an hfs file system. Some steps will not be used.
Answer: <m x1="15" x2="225" y1="56" y2="89" ss="0" a="0"></m><m x1="17" x2="223" y1="107"
y2="137" ss="0" a="1"></m><m x1="17" x2="224" y1="155" y2="187" ss="0" a="2"></m><m x1="17"
x2="223" y1="205" y2="234" ss="0" a="3"></m><m x1="16" x2="226" y1="254" y2="284" ss="0"
a="4"></m><m x1="17" x2="222" y1="302" y2="334" ss="0" a="5"></m><m x1="19" x2="223" y1="351"
y2="383" ss="0" a="6"></m><m x1="18" x2="224" y1="400" y2="430" ss="0" a="7"></m><m x1="272"
x2="482" y1="90" y2="120" ss="1" a="0"></m><m x1="274" x2="480" y1="164" y2="193" ss="1"
a="1"></m><m x1="274" x2="482" y1="236" y2="266" ss="1" a="2"></m><m x1="271" x2="481"
y1="308" y2="340" ss="1" a="3"></m><c start="5" stop="0"></c><c start="0" stop="1"></c><c start="6"
stop="2"></c><c start="7" stop="3"></c>
QUESTION NO: 68
Answer: B,C,F
Place login scripts in correct execution order and identify which scripts will NOT execute during login.
Answer: <m x1="9" x2="144" y1="44" y2="68" ss="0" a="0"></m><m x1="8" x2="144" y1="86"
y2="111" ss="0" a="1"></m><m x1="10" x2="143" y1="129" y2="152" ss="0" a="2"></m><m x1="10"
x2="145" y1="170" y2="194" ss="0" a="3"></m><m x1="9" x2="145" y1="212" y2="234" ss="0"
a="4"></m><m x1="257" x2="393" y1="53" y2="76" ss="1" a="0"></m><m x1="256" x2="393" y1="95"
y2="117" ss="1" a="1"></m><m x1="257" x2="392" y1="138" y2="160" ss="1" a="2"></m><m x1="256"
x2="391" y1="258" y2="282" ss="1" a="3"></m><m x1="257" x2="391" y1="298" y2="322" ss="1"
a="4"></m><c start="1" stop="4"></c><c start="4" stop="3"></c><c start="2" stop="2"></c><c
start="0" stop="1"></c><c start="3" stop="0"></c>
QUESTION NO: 70
A. 200
B. 022
C. 644
D. 440
Answer: B
QUESTION NO: 71
Answer: C
QUESTION NO: 72
A. ARPA tuning
B. network tuning
C. bind configuration
D. NIC configuration
Answer: B
QUESTION NO: 73
Click the Exhibit button. What is the output of executing this script?
A. Last
B. First
C. Third
D. Second
Answer: C
QUESTION NO: 74
A. from the MP prompt, execute CM>DEACTIVATE and select the partition from the list
B. from the HP-UX command line, execute shutdown -R -H now
D. from the MP prompt, execute CM>RR and select the partition from the list
Answer: B,C,D
QUESTION NO: 75
Which run states are valid for a process under HP-UX? Select THREE.
A. waiting
B. pending
C. ready to run
D. signaling
E. zombie
F. sleeping
Answer: C,E,F
QUESTION NO: 76
After making a change to the BIND configuration file, what must be done to commit the change?
A. sig_named restart
B. named start
C. inetd -c
D. net restart
Answer: A
QUESTION NO: 77
A. bring down the kernel in the vPar, but not reboot until all other vPars are brought down and the nPar
rebooted.
B. reboot the kernel into the vPar, affecting all configuration changes to the vPar since it was last
booted.
D. reboot the kernel into the vPar immediately, including necessary reconfiguration of the nPar, without
disturbing other running vPars made from
Answer: A
QUESTION NO: 78
A. auto_parms.conf
B. dhcpdconf
C. netconf
D. dhcpconf
Answer: C
QUESTION NO: 79
Which command should be used to determine the most recent user login to the server?
A. last
B. ps -user all
C. whoison
D. who
Answer: A
QUESTION NO: 80
A. ps -arf|grep -v root
B. ps -ef|grep -v root
C. ps -ef|grep root
D. ps -arf|grep root
Answer: B
QUESTION NO: 81
A. /etc/opt/samba/samba.conf
B. /etc/opt/samba/smb.conf
C. /etc/opt/samba/cifs.conf
D. /etc/opt/samba/swat.conf
Answer: B
QUESTION NO: 82
You have been managing a UNIX Server, system02, running HP-UX Trusted System for two years and all
patches and OS updates are current. You are preparing to do your monthly maintenance and want to
ensure no new logins occur. You also want to make sure that no one can login during the maintenance
period. Which actions do you need to take? Select TWO.
QUESTION NO: 83
A. sar
B. who -ur
D. runstat
Answer: B
Using the drag and drop interface, match the bus speeds with the correct SCSI Solution. The bus speed
panels can be used multiple times. Some bus speed panels will not be used.
Answer: <m x1="7" x2="206" y1="50" y2="73" ss="0" a="0"></m><m x1="9" x2="207" y1="91"
y2="114" ss="0" a="1"></m><m x1="7" x2="208" y1="133" y2="155" ss="0" a="2"></m><m x1="8"
x2="206" y1="175" y2="196" ss="0" a="3"></m><m x1="7" x2="207" y1="214" y2="239" ss="0"
a="4"></m><m x1="9" x2="207" y1="255" y2="278" ss="0" a="5"></m><m x1="8" x2="206" y1="296"
y2="321" ss="0" a="6"></m><m x1="258" x2="454" y1="50" y2="72" ss="1" a="0"></m><m x1="256"
x2="456" y1="93" y2="118" ss="1" a="1"></m><m x1="254" x2="456" y1="136" y2="159" ss="1"
a="2"></m><m x1="256" x2="455" y1="180" y2="202" ss="1" a="3"></m><c start="1" stop="0"></c><c
start="5" stop="1"></c><c start="4" stop="2"></c><c start="3" stop="3"></c>
QUESTION NO: 85
A. disk
B. TLB
C. CPU
D. memory
E. network
Answer: D
QUESTION NO: 86
Answer: A,E
QUESTION NO: 87
A. sense switches
B. signals
C. semaphores
D. shared memory
E. threads
F. message queues
Answer: C,D,F
QUESTION NO: 88
After configuring an Ignite-UX boot helper to use the correct Ignite-UX server, which file will contain the
changes that identify the Ignite-UX server?
A. WINSTALL
B. INSTALLFS
C. instl_boottab
D. bootptab
Answer: B
QUESTION NO: 89
Which command displays the name and node partition number of the local nPar?
Answer: B
QUESTION NO: 90
Click the Exhibit button. What happens in the script if the user clicks the key sequence <Ctrl><c> while
the script is running?
Answer: A
QUESTION NO: 91
B. OpenSSH3
C. SSH-3
D. SSH-2
Answer: D
Build the command line to create the volume group control file. Panels can be used multiple times or
not used.
Answer: <m x1="58" x2="202" y1="128" y2="159" ss="0" a="0"></m><m x1="251" x2="394" y1="131"
y2="158" ss="0" a="1"></m><m x1="436" x2="578" y1="130" y2="158" ss="0" a="2"></m><m x1="59"
x2="201" y1="171" y2="198" ss="0" a="3"></m><m x1="251" x2="396" y1="172" y2="198" ss="0"
a="4"></m><m x1="434" x2="578" y1="171" y2="199" ss="0" a="5"></m><m x1="58" x2="202"
y1="211" y2="237" ss="0" a="6"></m><m x1="249" x2="394" y1="211" y2="238" ss="0" a="7"></m><m
x1="436" x2="579" y1="212" y2="237" ss="0" a="8"></m><m x1="27" x2="169" y1="33" y2="61" ss="1"
a="0"></m><m x1="172" x2="312" y1="34" y2="62" ss="1" a="1"></m><m x1="316" x2="457" y1="33"
y2="62" ss="1" a="2"></m><m x1="459" x2="602" y1="34" y2="61" ss="1" a="3"></m><m x1="604"
x2="746" y1="34" y2="62" ss="1" a="4"></m><c start="3" stop="2"></c><c start="5" stop="0"></c><c
start="7" stop="3"></c><c start="6" stop="4"></c><c start="1" stop="1"></c>
QUESTION NO: 93
Which statements are true when using make_net_recovery to recover a system? Select TWO.
C. This command can be initiated from either the server or the client .
D. The directory where the archive is stored must be NFS exported for recovery of the client system.
E. In order to use the recovery image, the server must be on the same subnet as the client.
Answer: C,D
QUESTION NO: 94
Which statements describe hard partitions in HP mid-range or high end servers? Select THREE.
A. Separate hard partitions can communicate directly through the backplane by means of a special
network called worm holes.
Answer: C,E,F
QUESTION NO: 95
You have been asked to evaluate the possibility of implementing shadow passwords on your system.
Which statements accurately describe the features and advantages of the HP-UX shadow password
mechanism? Select TWO.
B. The /etc/shadow file makes it possible to lock an account after multiple failed login attempts.
C. The /etc/shadow file uses a more robust password encryption mechanism than /etc/passwd.
D. In order to implement shadow passwords, one must first transition to single-user mode.
Answer: A,B
QUESTION NO: 96
A. make_config
B. make_bundles
C. create_config
D. make_depots
Answer: A
QUESTION NO: 97
Which command shuts down the system after 7 minutes and then reboots?
A. reboot -R -H -t 7
B. reboot -R -H -t 420
C. shutdown -r 420
D. shutdown -r 7
Answer: C
QUESTION NO: 98
How do you monitor an HP-UX server with a suspected paging issue? Select THREE.
A. use iostat
B. use vmstat
Answer: A,B,C
QUESTION NO: 99
Which command sequence searches the text document, hardware, for lines containing the word,
hammer, and displays the text one page at a time?
Answer: A
Management purchases an Integrity Superdome to replace two rp8420 servers. There is available CPU
capacity and management decides to bring additional applications for execution on the Integrity
Superdome. Given this scenario, which statement could be true?
A. Some of the applications are Windows-based, that run alongside your HP-UX applications in a
different hard partition of the Superdome.
B. The Superdome may be on the verge of an I/O bottleneck, as the Superdome has fewer I/O slots per
cell than the rp8420.
C. Some of the applications are Windows-based, that run alongside your HP-UX applications in a
different soft partition of the Superdome.
D. Some of the applications are Linux-based, and Linux applications are not qualified to run on the
Superdome.
Answer: A
Using drag and drop, order the steps to manually extend a VxVM filesystem called myvol to 4GB? Panels
can be used multiple times.
Answer: <m x1="10" x2="294" y1="47" y2="76" ss="0" a="0"></m><m x1="11" x2="294" y1="95"
y2="125" ss="0" a="1"></m><m x1="9" x2="293" y1="145" y2="174" ss="0" a="2"></m><m x1="9"
x2="292" y1="196" y2="226" ss="0" a="3"></m><m x1="343" x2="627" y1="44" y2="76" ss="1"
a="0"></m><m x1="343" x2="627" y1="93" y2="123" ss="1" a="1"></m><m x1="344" x2="626"
y1="139" y2="169" ss="1" a="2"></m><m x1="343" x2="626" y1="183" y2="216" ss="1" a="3"></m><m
x1="344" x2="627" y1="229" y2="263" ss="1" a="4"></m><c start="0" stop="0"></c><c start="2"
stop="1"></c><c start="3" stop="2"></c><c start="2" stop="3"></c><c start="1" stop="4"></c>
Which command allows a process to continue after you are logged out of a remote server?
Answer: D
If you notice that multiple disks on the same controller exhibit symptoms of disk bottlenecks, what is the
best solution?
Answer: B
QUESTION NO: 104
Which command could be used to identify all of the world writable files and directories on an HP-UX
system?
Answer: D
Answer: B,E
QUESTION NO: 106
You have been managing the UNIX Server, usersys02, for 2 years and all patches and OS updates are
current. During your daily operations you notice that there are multiple logins for user, manager04,
using the who command. You know that the manager is not running that many sessions. In addition to
discussing best security practices with the manager, what other actions can you take?
Answer: B
Which command lists all groups your current user id belongs to?
A. id
B. who -id
C. whoami
D. w
Answer: A
A. <Ctrl><z>
B. <Ctrl><s>
C. <Ctrl><a>
D. <Ctrl><c>
Answer: A
What is the lowest run level where network services are normally started?
A. 1
B. 4
C. 6
D. 2
Answer: D
What access is allowed when a file has the permission setting of -r-xr-x--x ?
Answer: B
A new gateway machine, IP address 145.1.22.100, allows access to a business partner with a network
number of 15. Which command enables communication with the machines on the business partner's
network?
Answer: A
Which sequence of commands checks the integrity of the file system when syslog indicates there are file
system errors on /dev/vg01/lvol09?
Answer: C
What is the difference between hot swappable hardware and hot pluggable hardware?
A. Hot swappable hardware applies to disk drives and hot pluggable hardware applies to servers.
B. Hot pluggable hardware requires system administrator intervention and hot swappable hardware
does not require system administrator
intervention.
C. The terms, hot swappable hardware and hot pluggable hardware, mean the same thing.
D. Hot swappable hardware requires configuration and hot pluggable hardware does not require system
administrator intervention.
Answer: B
After defining a new vPar, what will allow you to install the new vPar boot disk using Ignite?
B. from an HP-UX instance on another vPar running on the same nPar: execute vparboot -p vParName \
-I <IgniteServer>,/opt/ignite/bin/winstall
E. bring down all vPar kernels, and from the nPar BCH main menu: vparboot <vParName> <bootdevice>
Answer: B
Which command talks directly to the sendmail daemon and other SMTP servers to verify connectivity?
B. telnet host 25
C. telnet host 80
D. telnet host 23
Answer: B
A. all node partitions, then they are modified from HP-UX 11i
Answer: E
Which command lists the status of the NTP servers and clients?
A. ntpq
B. ntpstat
C. ntpinfo
D. ntpdate
Answer: A
F. programmable I/O
G. no single point of failure
Answer: A,B,D
Which statements describe SCSI interfaces on the core I/O of a non cell-based server? Select TWO.
Answer: A,C
A. /sbin/init.d/nfs.client
B. /sbin/init.d/nfs.server
C. /sbin/init.d/nfs.core
D. /sbin/init.d/net
Answer: C
QUESTION NO: 121
Which command uses NTP to keep the local system clock in sync with other nodes on the network?
A. /usr/sbin/ntpsync
B. /usr/sbin/ntpdate
C. /usr/sbin/ntpd.conf
D. /usr/sbin/ntpscan
Answer: B
Consider the fragment of the hosts.equiv file for host, Server1, shown below. Select the option that
correctly describes the resulting security on host Server1. Alan -Beth +Carlos
A. deny password-free access to user Alan when user Alan attempts to log in from host Beth; allow user
Carlos password-free access to all
B. deny password-free access to user Beth when user Beth attempts to log in from host Alan; grant user
Carlos password-free access to all
accounts (except root) on host Server1 from any host on the network
C. deny password-free access to user Beth when user Beth attempts to log in from host Alan; allow user
Carlos password-free access to Carlos'
account (except root) on host Server1 from any host on the network
D. deny password-free access to user Beth when attempting to log into host Alan; allow all users from
host Carlos password-free access to host
Server1
Answer: C
A. /pam
B. /ulb
C. /tcb
D. /ctwo
Answer: C
A. C
B. FORTRAN
C. BASH
D. JAVA
E. POSIX
Answer: A
A. from the MP: CM>VPARMOD,select the vPar name from the list, then select Add Memory and type
16G
B. from the HP-UX command line: execute vparstatus to determine the vPar is down, then execute
vparmodify -p <vParName> -a
mem::16348
D. from the HP-UX command line: execute vparstatus to determine the vPar is up, then execute
vparmodify -p vParName -a mem::16348
E. from the HP-UX command line: execute vparremove -p <vParName> and recreate the vPar with the
desired amount of memory
Answer: B
A. /sbin/init.d/ypinit start
B. /sbin/init.d/nis.server start
Answer: C
Which command enables a device swap on a lvol that previously had a file system?
A. swapon -al
B. swapon -f
C. swapon lvol
D. swapon -a
Answer: B
Which statements describe the characteristics of the HP PCI I/O implementation? Select TWO.
E. Core I/O card provides basic connectivity of SCSI boot disks, management port, and general purpose
network connections.
Answer: C,E
What is the difference between tunnel mode and transport mode when using IPSec?
Answer: D
Answer: B,D
QUESTION NO: 131
A. /etc/opt/samba/samba.conf
B. /etc/opt/samba/cifs.conf
C. /etc/opt/samba/smb.conf
D. /etc/opt/samba/swat.conf
Answer: C
E. searches the internet for updates to all applications listed in the /etc/update file
Answer: B,D
Answer: B
Answer: A
Which techniques can be used to reduce hardware single points of failure? Select TWO.
A. use a dual port network card instead of two single port cards
B. use two single port cards rather than a dual port card
Answer: B,C
C. three or more threads in the run queue per processor (on average)
Answer: C,E
A. chmod
B. chroot
C. modpath
D. newroot
Answer: B
A. ONC
B. DNS
C. NIS
D. NTP
Answer: D
A. from the MP: CM>VPARDELETE and select the name of the vPar from the list
C. execute vparstatus, then verify the vPar is down using vparremove -p <vParName>
D. bring down all the vPar kernels made from the same nPar and reboot the kernel into the nPar
Answer: C
You have been managing the UNIX Server, usersys02, for six months and all patches and OS updates are
current. After adding a new database application to the system, you get reports from the end users that
periodically the system performance is so bad that it is not responding. You check into the situation and
see that only the users of the new application are affected by this problem. The other applications being
served are running as before. What should you check to stop this activity and also make sure it doesn't
happen again?
Answer: E
What are valid statements when changing system run levels? Select TWO.
B. Run level 5 is the default run level for newly installed servers.
Answer: C,D
Using drag and drop, order the commands to set up a mirrored boot disk.
Answer: <m x1="18" x2="169" y1="49" y2="81" ss="0" a="0"></m><m x1="17" x2="169" y1="97"
y2="129" ss="0" a="1"></m><m x1="17" x2="170" y1="145" y2="180" ss="0" a="2"></m><m x1="19"
x2="169" y1="196" y2="225" ss="0" a="3"></m><m x1="19" x2="170" y1="247" y2="276" ss="0"
a="4"></m><m x1="17" x2="169" y1="293" y2="325" ss="0" a="5"></m><m x1="17" x2="170" y1="344"
y2="373" ss="0" a="6"></m><m x1="17" x2="168" y1="393" y2="422" ss="0" a="7"></m><m x1="227"
x2="378" y1="50" y2="80" ss="1" a="0"></m><m x1="225" x2="378" y1="98" y2="131" ss="1"
a="1"></m><m x1="226" x2="378" y1="147" y2="179" ss="1" a="2"></m><m x1="227" x2="376"
y1="197" y2="228" ss="1" a="3"></m><c start="3" stop="0"></c><c start="7" stop="1"></c><c start="1"
stop="2"></c><c start="5" stop="3"></c>
Using drag and drop, match each device directory with the files it includes.
Answer: <m x1="8" x2="120" y1="56" y2="79" ss="0" a="0"></m><m x1="8" x2="119" y1="116"
y2="138" ss="0" a="1"></m><m x1="9" x2="119" y1="177" y2="201" ss="0" a="2"></m><m x1="10"
x2="121" y1="236" y2="258" ss="0" a="3"></m><m x1="9" x2="119" y1="297" y2="317" ss="0"
a="4"></m><m x1="163" x2="254" y1="55" y2="79" ss="1" a="0"></m><m x1="161" x2="258" y1="116"
y2="139" ss="1" a="1"></m><m x1="160" x2="256" y1="177" y2="200" ss="1" a="2"></m><m x1="161"
x2="255" y1="236" y2="259" ss="1" a="3"></m><m x1="159" x2="256" y1="295" y2="319" ss="1"
a="4"></m><c start="3" stop="0"></c><c start="2" stop="1"></c><c start="4" stop="2"></c><c
start="0" stop="3"></c><c start="1" stop="4"></c>
How do you restore to the previous patch level when a non-committed defective patch is removed?
A. Uninstall the patched software, reinstall the software, reinstall the patches up to the previous level.
C. Remove all patches and reinstall the patches up to the previous level.
Answer: D
You are monitoring a server that runs a large database. While examining the syslog.log file, you observe
that the message "file table overflow" is appearing about every 30 minutes or so. What course of action
should be taken?
B. The kernel parameter, nfile, is not set high enough and should be increased.
C. Ask users to exit their applications and log back on after 30 minutes.
The name service switch configuration file contains the following line: hosts: files
[NOTFOUND=return] dns Which statement is true regarding hostname resolution assuming all
hostnames are in DNS?
B. The hostname will be resolved by DNS only when the hostname is NOT found in the /etc/hosts file.
D. The hostname will be resolved by DNS only when the hostname is in the /etc/hosts file.
Answer: C
Which commands report the speed and duplex settings of a network interface card? Select TWO.
A. ioscan
B. lanadmin
C. landiag
D. ifconfig
E. netstat
Answer: B,C
Which command is automatically run at system boot to create special device files for new hardware if
the kernel contains the correct drivers?
A. insf
B. mksf
C. lssf
D. mknod
Answer: A