Part Two: HP-UX System Administration

   

Chapter 12: The System Administration Manager

1:

List three advantages of using SAM.

A:

Centralized management in a network.

Specific rights can be assigned to different users.

Comprehensive administration tools which are uniform across all HP-9000 systems.

Graphical User Interface.

2:

What are the major parts of the SAM window?

A:

Menu bar

Functional areas

3:

Explain why SAM can't be used for system troubleshooting.

A:

System troubleshooting is a complex task and has no defined rules to carry out this task. That is why SAM can't be used for this purpose.

Chapter 13: Installing HP-UX

1:

The 64-bit HP-UX version can be installed on all HP-9000 servers and workstations (Yes/No).

A:

No. The 64-bit version can be installed only on supported platforms.

2:

Which media can be used for HP-UX installation?

A:

Tape

CD-ROM

Network depot

3:

How would you configure a 4-GByte disk for a fresh HP-UX installation?

A:

A typical assignment of disk space may be like the following.

/ 100
/stand 100
Swap 512
/home 200
/opt 800
/tmp 700
/usr 800
/var 800
4:

What restrictions apply to the hostname for HP-UX?

A:

It must start with a letter.

The maximum length is 64 characters .

It can contain only letters , numbers , dash, and underscore characters.

5:

What is the basic information you need for initial configuration of HP-UX?

A:

Hostname

IP address

Time zone

6:

What is the use of PDC?

A:

Processor Dependent code is used for many purposes. Among these are:

  • Selecting the primary and alternate boot paths.

  • Booting from a specific device.

  • Booting in single-user mode.

Chapter 14: System Startup and Shutdown

1:

Why is understanding the startup and shutdown processes important for system administration?

A:

It helps in troubleshooting the startup problems. This is also necessary to boot the system in single-user mode for maintenance purposes.

2:

Where does PDC store its configuration information? What potential problem may arise if this information is stored on the disk?

A:

It is stored in flash memory. The information may be lost in case of a damaged disk if it is stored on the disk.

3:

List the steps performed by PDC during the startup process.

A:

Processor Dependent Code (PDC) executes and performs a self-test and detects any peripherals attached to the system.

PDC initializes the console to display messages.

It looks for the primary boot path for booting the system.

PDC loads and executes the Initial System Loader (ISL) from the boot path and executes it.

4:

What are runlevels and what is their utility?

A:

A runlevel is a system state. Runlevels are used to start system services in different stages during the boot process.

5:

List three tasks performed by the init process.

A:

Read the initdefault parameter from the /etc/inittab file.

Initialize the kernel data structures using /sbin/ioinitrc .

Runs /sbin/bcheckrc .

Runs /sbin/rc and bring the system in default runlevel.

6:

What are sequencer directories?

A:

These directories are named /sbin/rcn.d where n is a runlevel. Each of these directories contains links to startup and shutdown scripts in the /sbin/init.d directory which are used to start and stop system services in a defined sequence.

Chapter 15: Software and Patch Management

1:

What tasks are carried out using SD-UX?

A:

Installing software

Removing software

Listing installed software

Verifying installed software

Copying and packaging software

Configuring software

2:

What is a software depot? What is the difference between the swinstall and swcopy commands?

A:

A software depot is a place where SD-UX filesets , packages, or products are stored. It may be a directory, a CD-ROM, or a tape cartridge. The swcopy command is used to manipulate a software depot, while swinstall is used to install software from a software depot to an HP-UX system.

3:

A depot is a superset of products (True/False).

A:

True

4:

What is included in the output of the swlist command if you use it without any arguments or options?

A:

All software bundles and products that are not part of any bundle are listed.

5:

Software is installed in separate directories under the /opt directory. Is it possible to remove software by deleting the directory used for a particular software? Why?

A:

This is not a proper way of deleting software as a record of all installed software is kept by SD-UX. This record is checked for dependency verification during the installation and removal of software. The proper way of removing software is to use the swremove command. Additionally, some software files may not be present under /opt .

6:

Describe the purposes of patches.

A:

Patches are used for one of the following purposes.

  • To add new functionality to the HP-UX operating system or its products.

  • To add support for new hardware.

  • To fix bugs in the operating system and applications.

Chapter 16: Reconfiguring the HP-UX Kernel

1:

List at least three situations in which you would need to rebuild the HP-UX kernel.

A:

Modify system parameters.

Add new hardware drivers.

Add new subsystems.

2:

Why is it important to keep your old kernel?

A:

In case the new kernel fails to boot, you can use the old kernel to recover from this situation.

3:

How can you find existing kernel configurable parameters?

A:

Use the sysdef command.

4:

What is the name of the newly created kernel?

A:

[click here]

 vmunix_test 
5:

Why is it necessary to reboot the system after building the kernel? Is it possible to load a new kernel on a running system?

A:

You must reboot the system to reload the new kernel. It is not possible to load a new kernel without rebooting.

Chapter 17: Peripheral Devices

1:

What is the difference between major and minor device numbers?

A:

The major device number shows the device driver used for a device. The minor device number shows the physical location of a device in a system.

2:

Write two commands to list device files.

A:

The ll command

The lssf command

3:

Describe the autoconfiguration process.

A:

During the boot process the kernel probes all devices attached to the system

Chapter 18: HP-UX File Systems and Logical Volume Manager

1:

What are the differences between the whole-disk and LVM approaches?

A:

Only one file system exists on a disk in the whole-disk approach. This file system can't be modified later on. In the LVM approach you can create multiple file systems that can be modified at a later stage.

2:

Explain how physical volumes, volume groups, and logical volumes are arranged in LVM.

A:

A physical volume represents a disk. A volume group consists of one or more physical volumes. The combined data storage capacity of all physical volumes is the capacity of the volume group. Logical volumes are created inside a volume group and can span over multiple physical volumes.

3:

What are physical and logical extents?

A:

A physical extent is the minimum space that can be allocated to a logical volume. A logical extent is a pointer to a physical extent in kernel memory.

4:

What steps must be completed before creating logical volumes when creating a new volume group?

A:

Create physical volumes.

Create a volume group consisting of the new physical volumes.

Create logical volumes.

5:

What are the differences between the HFS and the JFS file systems?

A:

HFS is the legacy HP-UX file system based upon blocks. JFS is an extent-based file system with fast recovery mechanisms. HFS is being replaced by JFS on HP-UX. JFS can be managed without unmounting and can create inodes dynamically on demand.

6:

How are hard and soft links different from each other?

A:

Hard links can be created within a file system while soft links can be created across different file systems.

7:

What is a mount point?

A:

It is a directory where a file system is mounted.

8:

Can you extend a file system without extending a volume group?

A:

If unallocated space is available on the volume group, the file system can be extended without extending the volume group.

9:

For what purpose is the lost+found directory used?

A:

It is used in the file system repair process to store damaged files.

Chapter 19: User and Group Management

1:

Can you create a new user with the help of an editor (without using any specific commands for this purpose or SAM)? How?

A:

Yes, you can do so by creating a user entry in the /etc/passwd file using an editor.

2:

What are a user's inactivity and expiration periods?

A:

The inactivity period is the time during which a user does not use his or her account. The expiration period is the time limit after which the user account becomes disabled.

3:

Explain the syntax of the /etc/passwd file.

A:

It contains seven fields:

  • Login name

  • Password

  • User ID

  • Group ID

  • ID string, which is an optional field, the user's full name, telephone number, or other information may be stored here.

  • Home directory

  • Shell assigned to the user.

Chapter 20: Dealing with HP-UX Processes

1:

What information do you get from the ps command?

A:

By using different command line switches, it shows information about the kernel process table.

2:

Why does a process go into a sleeping state?

A:

A process goes into sleeping state when a needed resource is not available.

3:

What are signals and how can they be sent to a process?

A:

Signals are software interrupts. The kill command can be used to send a signal to a process.

4:

For what purpose is the nohup command used?

A:

A process is attached to a controlling terminal. When you log out from the terminal, the process dies. If the nohup command is used on the comand line while starting the process, the process does not die when you log out.

5:

How can you execute both the pwd and date commands when a DEBUG signal is received?

A:

You can use the trap pwd;date DEBUG command for this purpose.

6:

A sle eping process can go to a running state directly. (True/False)

A:

False

Chapter 21: Printing on HP-UX

1:

Depending on how a printer is physically connected, what are the different types of printers in an HP-UX system?

A:

Local printer

Remote printer

Network printer

2:

What are print priorities and how are these used to allow only selective requests to be serviced by a printer (using a fence priority)?

A:

A fense priority is used to allowed only those jobs to be printed that have a priority greater than a certain value. The lpfense command is used to set these priorities.

3:

What is the role of the interface program in the printing system?

A:

Interface programs are used to format data for a particular type of printer.

4:

A printer is not printing anything sent to it. What steps will you follow to troubleshoot this problem?

A:

Check the physical connection.

For network printers use the ping command to verify network connection.

Verify that lpsched is running.

5:

A network printer is physically connected to a system on the network. (True/False)

A:

False

Chapter 22: Memory and Swap Space Management

1:

What are the different types of swap?

A:

Device swap

Filesystem swap

Primary swap

Secondary swap

2:

How is the swapper process used to handle thrashing?

A:

If a system starts thrashing, the swapper process detects the situation and temporarily swaps out some of the processes. It deactivates these processes and puts these on hold until a particular amount of memory becomes free.

3:

What is the advantage of file system swap over device swap?

A:

File system swap space can be configured dynamically.

4:

How do swap priorities affect system performance?

A:

You can assign a high priority for a swap space on a fast disk, thus increasing system performance.

Chapter 23: System Backup and Recovery

1:

What is difference between a full backup and an incremental backup?

A:

A full backup is used to backup all files. Incremental backup is used to backup only those files that have been modified since the last backup.

2:

What is the advantage of tar over fbackup ?

A:

The fbackup command can be used only on HP-UX. The tar command is a standard UNIX command and can be used to transfer files from one type of UNIX to another.

3:

What is the role of the graph file in a backup?

A:

It stores a list of directories and files that are included in a backup. It plays an important role in an incremental backup.

4:

Why do you use an Ignite-UX recovery tape? Isn't it sufficient to make a full backup of a system?

A:

An Ignite-UX tape helps to recover a damaged boot disk. A full backup can be restored only after a system is running. If the boot disk is damaged, the Ignite-UX recovery tape brings the system back to the running state.

Chapter 24: Automating Jobs

1:

What is the difference between jobs submitted using the crontab and those using the at commands?

A:

The jobs submitted using crontab are executed repeatedly. The jobs submitted using the at command are executed once.

2:

Write a crontab file entry that executes the ll command every minute.

A:

[Return to question 2.]

 * * * * * ll 
3:

Schedule a daily backup at 2 a.m. using a graph file that creates a backup of the /home directory.

A:

Create a file /home/root/gfile with a single line in it. This line should be /home . Now add this line to crontab .

 0 2 * * * fbackup -g /home/root/gfile -u -f /dev/rmt/0m 

   
Top


HP Certified
HP Certified: HP-UX System Administration
ISBN: 0130183741
EAN: 2147483647
Year: 2000
Pages: 390
Authors: Rafeeq Rehman

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net