Appendix D. Sample HP-UX Certification Exam

   

This is a sample test paper for the HP-UX certification examination. The correct answers are written in boldface. In the actual test the number of questions may vary.

1:

On a UNIX system, the primary interaction of a user is with:

  1. Kernel

  2. Shell

  3. device drivers

  4. file system

2:

The rsh command on HP-UX can be used to:

  1. execute a remote command

  2. log in and initiate a shell on a remote system

  3. This is a restricted shell on HP-UX.

  4. grant read-only access to a system

3:

Which shell does not have history feature?

  1. Bourne shell

  2. Korn Shell

  3. C Shell

  4. POSIX shell

4:

The root user has user ID:

  1. 1

  2. 100

  3. The root user may have any user ID.

5:

What is the default history file in the HP-UX POSIX shell?

  1. history

  2. $HOME/.history

  3. $HOME/.sh_history

  4. /etc/history

6:

The alias command in the POSIX shell is used to:

  1. create a command alias

  2. create a mail alias

  3. create shell alias

  4. create a file system alias

7:

You want to add a directory to the PATH variable for all users of the POSIX shell. Which file will you modify?

  1. /etc/profile

  2. $HOME/.profile of the root user

  3. /home/root/profile

  4. /etc/default

8:

You use a command " cat > myfile ". What will be the result of this command?

  1. Nothing happens and you will get the command prompt back.

  2. The file named myfile is overwritten and you get the command prompt back.

  3. The command waits for user input which is appended to the file named myfile .

  4. The command waits for user input which is written to the file named myfile . The original contents of the file are deleted.

9:

When you use the ll command, the first character of each line in the output of the command shows the type of the file. The next nine characters show file access permissions for HP-UX users. What is the order of these access permissions?

  1. others, group , owner

  2. owner, group, others

  3. owner, others, group

  4. group, owner, others

10:

Which command do you use to list hidden files?

  1. ls -h

  2. ls -l

  3. ls -a

  4. ls

11:

You are in the /var/tmp directory and want to copy file myfile from the /tmp directory to the current directory. Which command cannot be used for this purpose?

  1. cp /tmp/myfile .

  2. cp /tmp/myfile /var/tmp

  3. cp ../../tmp/myfile /var/tmp

  4. cp /tmp/myfile ..

12:

Which command will you use to count the number of lines in a text file?

  1. wc

  2. ls

  3. lines

  4. cat

13:

Which command displays the value of the HOME variable?

  1. echo $HOME

  2. echo HOME

  3. echo '$HOME'

  4. echo `$HOME`

14:

Pipes are used to:

  1. redirect standard input

  2. redirect standard output

  3. redirect either standard input or standard output but not both simultaneously

  4. send output of one command to the input of another command.

15:

Which mode is not used in vi editor?

  1. command mode

  2. insert mode

  3. preserve mode

  4. last line mode

16:

You want to search all lines in a file myfile that start with the word " boota ". Which of the following commands will you use?

  1. grep $boota myfile

  2. grep ^boota myfile

  3. grep boota^ myfile

  4. grep boota$ myfile

17:

Which variable in a shell program is used to determine the total number of command line arguments?

  1. $?

  2. $#

  3. $*

  4. ${10}

18:

Which of the following is not a shell program control structure?

  1. while-do-done

  2. until-do-done

  3. repeat-do-done

  4. if-then-fi

19:

Which statement is not true?

  1. SAM can be used in both text and graphic modes.

  2. SAM can be used to grant restricted access to users.

  3. SAM can be used for troubleshooting.

  4. SAM can be used for routine system administration tasks .

20:

The set_parms command is used to:

  1. set the hostname.

  2. set the time zone.

  3. set the IP address.

  4. all of the above

21:

What is the secondary system loader?

  1. the hpux utility

  2. the init process

  3. PDC

  4. the /stand/system

22:

HP-UX Software Distributor commands are used for:

  1. installing and removing software

  2. distributing software packages

  3. verifying installed software

  4. all of the above

23:

A software bundle contains:

  1. software depots

  2. filesets that may belong to different products

  3. filesets that may belong to only one product

  4. filesets that belong to subproducts of only one product

24:

What is a file descriptor?

  1. It is a number used to reference an open file.

  2. It represents the inode number of a file.

  3. It corresponds to a process table entry for a process created by a file.

  4. It is the number of a directory entry for the file in a filesystem.

25:

Which of the following is not a label in the swinstall.log file?

  1. ERROR

  2. WARNING

  3. CRITICAL

  4. NOTE

26:

Which command is used to build a new HP-UX kernel?

  1. mk_kernel

  2. make

  3. build_kernel

  4. make_vmunix

27:

Three disks are attached to an SCSI adapter with device numbers 6, 1, and 15. Which of these has the highest priority?

  1. 6

  2. 1

  3. 15

  4. All disks have the same priority.

28:

Which statement is not true?

  1. A major device number represents a kernel driver used for a device.

  2. All devices of the same type have the same major number.

  3. All devices of the same type have the same minor device number.

  4. A minor device number is a six digit hexadecimal number.

29:

What is the major device number for LVM device files?

  1. 64

  2. 32

  3. 128

  4. 1

30:

What is the default physical extent size used in LVM?

  1. 4 Mbytes

  2. 4 Kbytes

  3. 16 Mbytes

  4. 16 Kbytes

31:

Which step is required before adding a new disk to a volume group?

  1. create a physical volume

  2. extend the logical volume

  3. create a filesystem

  4. extend the filesystem.

32:

What is the name for the default volume group?

  1. default

  2. vg00

  3. vgdefault

  4. There is no particular name for the default group. Any group can be configured as the default volume group.

33:

Which information is not displayed when the pvdisplay command is used without any command-line options?

  1. name of the volume group to which the physical volume is related

  2. total number of physical extents

  3. name of the filesystem created on the disk

  4. allocated physical extents

34:

What is the default number of the logical volumes in a volume group?

  1. 15

  2. 16

  3. 255

  4. 1024

35:

A filesystem metadata area contains:

  1. superblock

  2. inodes

  3. directory area

  4. all of the above

36:

Which statement is true ?

  1. HFS keeps a record of all transactions in the intent log.

  2. JFS keeps a record of all transactions in the intent log.

  3. Both JFS and HFS keep a record of all transactions in the intent log.

  4. The JFS filesystem size cannot be modified.

37:

Which command can be used to display the filesystem usage on HP-UX?

  1. df

  2. bdf

  3. rbdf

  4. all of the above

38:

Which is not a standard state of any HP-UX process.

  1. running

  2. sleeping

  3. zombie

  4. printing

39:

Which command is used to cancel a print job?

  1. cancel

  2. stop

  3. rm

  4. disable

40:

Data backed up by the fbackup command is restored by:

  1. the frecover command

  2. the frestore command

  3. the tar command

  4. It can be restored by any of the above commands.

41:

The cron daemon is responsible for jobs submitted by:

  1. the crontab utility only

  2. the at utility only

  3. the batch utility only

  4. jobs submitted by the at , batch , and crontab utilities

42:

Fast Ethernet operates at which speed?

  1. 10 Mbits per second

  2. 100 Mbits per second

  3. 155 Mbits per second

  4. One gigabyte per second

43:

The presentation layer in the OSI reference model is responsible for:

  1. data format conversion

  2. establishing a network connection

  3. Routing

  4. Flow control

44:

Which statement is not true?

  1. A token ring network is physically connected star topology.

  2. A token ring network is physically connected ring topology.

  3. An Ethernet network may be connected in star topology.

  4. An Ethernet network may be connected in ring topology.

45:

BNC connectors are used with:

  1. coaxial cable

  2. category 3 coaxial cable

  3. category 5 coaxial cable

  4. fiber optic cable

46:

Which of the following devices operates in layer 3 of the OSI model?

  1. repeater

  2. router

  3. hub

  4. bridge

47:

In which type of network is the MAC address used?

  1. Ethernet

  2. Token Ring

  3. FDDI

  4. all of the above

48:

The application layer in TCP/IP protocol is equivalent to which three OSI layers ?

  1. transport, network, presentation

  2. presentation, application, transport

  3. application, presentation, session

  4. session, application, transport

49:

What is the default subnet mask for the IP address 172.23.15.99?

  1. 255.255.255.0

  2. 255.0.0.0

  3. 255.255.0.0

  4. 172.23.255.255

50:

What is the loopback address for a host?

  1. the first address on the network

  2. any address ending with 0

  3. 0.0.0.0

  4. 127.0.0.1

51:

Which protocol is used to map an IP address to a MAC address?

  1. ARP

  2. RARP

  3. ICMP

  4. TFTP

52:

Which file on HP-UX contains a list of standard port numbers for different applications?

  1. /etc/ hosts

  2. /etc/ports

  3. /etc/services

  4. /etc/protocols

53:

The netstat command can be used to:

  1. list the IP addresses assigned to network adapters

  2. configure routes

  3. number the incoming and outgoing data packets

  4. all of the above

54:

The standard telnet port address is:

  1. 21

  2. 23

  3. 25

  4. 80

55:

The /var/adm/inetd.sec file is used for:

  1. an added layer of security to the inetd daemon.

  2. a secondary file for the inetd daemon which is used if the primary file is not present

  3. a backup file for /etc/inetd.conf

  4. a secondary log file for the inetd daemon

56:

Which of the following is not a hostname resolution service?

  1. DNS

  2. NIS

  3. the /etc/hosts database file

  4. the /etc/resolv.conf file

57:

Which configuration file is used by the DNS daemon named at startup?

  1. /etc/named.conf

  2. /etc/named.boot

  3. /etc/resolv.conf

  4. /etc/nsswitch.conf

58:

The default location for NIS maps is under which directory?

  1. /var/yp

  2. /etc

  3. /etc/nis

  4. /var/nis

59:

Which command is used to configure the master NIS server?

  1. ypinit

  2. ypmake

  3. ypserv

  4. ypset

60:

What is not true about NFS?

  1. A system can act as NFS client and server at the same time.

  2. A system can export a single file, a directory, or a filesystem.

  3. A system can export a filesystem mounted from another NFS server.

  4. If a directory is exported, all of the directory tree under this directory is automatically exported.

61:

Which of the following daemon is not an NFS daemon?

  1. rpc. mountd

  2. biod

  3. rpc.lockd

  4. named

62:

Which command is used to export filesystems manually?

  1. exports

  2. exportfs

  3. showmount

  4. nfsstat

63:

Which of the following is not an NFS Automounter map?

  1. direct

  2. indirect

  3. master

  4. slave

64:

What is the name of the NTP server daemon?

  1. ntpd

  2. xntpd

  3. rpc.ntpd

  4. rpc.xntpd


   
Top


HP Certified
HP Certified: HP-UX System Administration
ISBN: 0130183741
EAN: 2147483647
Year: 2000
Pages: 390
Authors: Rafeeq Rehman

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net