IBM(000-223) 题目列表
单选题A System p administrator needs to set the default password length for all users to six characters.  Which of the following files needs to be edited to accomplish this ()A/etc/security/limitsB/etc/security/mkuser.sysC/etc/security/privD/etc/security/user

单选题A System p administrator needs to upgrade a system from AIX 5.2 to AIX 5.3.  Which of the following installation methods would minimize downtime()AMigration installationBPartition MobilityCalt_disk_installDupdate_all smit fastpath and reboot during the next scheduled outage

单选题An administrator has a two-disk volume group (testvg) with one logical volume (testlv) which has just  been mirrored across both disk drives.  Which of the following commands can be used to turn off quorum()Achvg -Qn testvgBchlv -Qn testvgCvaryoffvg testvg; varyonvg -Qn testvgDvaryoffvg testvg; exportvg testvg; importvg -Qn testvg; varyonvg testvg

单选题Because of performance problems, capacity needs to be added to a paging space named  paging01 on hdisk1. The physical partition size of hdisk1 is 4MB.  Which command will increase the size of paging01 by 100MB()Achlv -a paging01 25Bchps -s 25 paging01Cmkps -a 25 paging01Dextendlv -a paging01 25

单选题everal people in an finance customer IT department are asking for fileset updates that the  system administrator received from IBM earlier that day on CD-ROM. The system administrator created an install directory on their machine and made it available to everyone.  Which of the following commands will allow the system administrator to copy the images from an IBM update CD-ROM to the install directory()Asmit bffcreate from the target directoryBtar -xvf /dev/cd0 from the target directoryCrestore -xvqf /dev/cd0 from the target directoryDmount the cdrom on /cdrom and run cp /cdrom/* . from the target directory

单选题A System p administrator plans to install a new system with AIX 5.3 TL5 using a NIM server.  Which of the following provide post install diagnostics()ASPOTBlpp_sourceCmksysbDinstall CD

单选题A  user  wants  to  be  permanently  added  to  the  dba  group.  Which  of  the  following  commands  or processes can be used to accomplish this()AchgrpBchuserCedit /etc/userDedit /etc/security/group

单选题A System p adminstrator must recover user information from a system that will not successfully boot. Which of the following install methods will accomplish this ()APreservationBMigrationCNew and complete overwriteDRepair

单选题When using a mksysb and base media to clone a system, which of the following will cause the installation to fail()Amksysb made on a single processor machine but is being installed on a multiple processor machine, no editing of the image.data fileBmksysb made on machine with mirrored rootvg and new machine only has one disk in rootvg, no editing of the image.data fileCmksysb made on a machine with 32GB of RAM but being installed on a machine with only 8GB of RAMDmksysb made on a machine with virtual Ethernet adapter but being installed on a machine which only has a physical Ethernet adapter

单选题A System p administrator has just installed a new technology level, but "oslevel -r" does not show the expected technology level.  Which of the following commands would determine which filesets are downlevel()AlppchkBinstfixCoslevelDinstallp

单选题A System p administrator wants to NFS mount a filesystem from server "alpha" to server "bravo".  Which of the following commands should be issued from "bravo" to determine which filesystems are being exported by server "alpha"()Alsexport alphaBshowmount -e alphaCexportfs -l alphaDmount -e nfs alpha

单选题Given the following output what course of action should be undertaken for a long term solution()AImplement regular monitoring to avoid full filesystemsBDouble the size of /usrCReduce the size of /home to balance the filesystemsDAdd another disk allow for growth.

单选题The company auditors require a System p administrator to archive detailed information from each of their systems.  Which of the following commands will accomplish this task()Asnap -aBsnap -iCprtconfDlsconf

单选题An administrator needs to be able to list the number and size of backup sets on a tape. Which of the  following procedures accomplish this()AUse the tcopy /dev/rmtO.l until an end-of-tape error notification is received.BUse the cpio -idmv  /dev/rmtO.l until an end-of-tape error notification is received.CUse the tar -tvf /dev/rmtO.l repeatedly until an end-of-tape error notification is received.DUse the dd if=/dev/rmt0.1 bs=128k count=EOT until an end-of-tape error notification is received.

单选题Given  the  following  output,  recommend  corrective  action  that  should  be  undertaken  to  increase   protection() # Isvg -I rootvg rootvg:  LV NAME TYPE LPs PPs PVs LV STATE MOUNT POINT  hd5 boot 1 2 2 closed/syncd N/A  hd6 paging 16 32 2 open/syncd N/A  hd8 jfslog 1 2 2 open/syncd N/A  hd4 jfs 2 4 2 open/syncd /  hd2 jfs 53 106 2 open/syncd /usr  hd9var jfs 16 32 2 open/syncd /var  hd3 jfs 4 8 2 open/syncd /tmp  hdl jfs 1 2 2 open/syncd /home  hdlOopt jfs 2 4 2 open/syncd /opt  loglvOO jfs2log 1 1 1 open/syncd N/A  fslvOO jfs2 ’ 2 4 2 open/syncd /datafsAadd a copy of the log for/datafsBopen hd5Cmirrorvg rootvgDsplit /usr as it is too big