1. Which two serial device files support software flow control?
A./dev/term/00m and /dev/term/00h
B./dev/term/00m and /dev/term/00s
C./dev/term/00m and /dev/term/00t
D./dev/term/00s and /dev/term/00t
Answer: d

2. Which file controls the re-use of a user ID?
A. /etc/skel/ageduid
B. /etc/default/idage
C. /etc/security/ia/ageduid
D. There is not a file that controls the re-use of a user ID. After a user is deleted it is not possible to re-use an ID.
Answer: c

3. Every UnixWare 7 system with TCP/IP has a network routing table within the kernel. Which field is NOT contained in a routing table entry?
A. Netmask
B. Broadcast Address
C. Destination IP address
D. Network interface
Answer: b

4. What is the maximum vxfs (VERITAS) filesystem size?
A. 2 terabytes
B. 1 terabyte
C. 2 gigabytes
D. 1 gigabyte
Answer: b

5. When running the fdisk (1M) command and selecting se whole disk for UNIX? which statement is true?
A. Any existing partitions are destroyed and the UNIX partition is marked active.
B. Any existing partitions are destroyed and you must manually activate the partition.
C. Any existing partitions are NOT destroyed and the UNIX partition is marked active.
D. Any existing partitions are NOT destroyed and you must manually activate the partition.
Answer: a

6. How many partitions can you define on the first hard disk during the installation of the UnixWare 7 operating system?
A. One (1)
B. Two (2) 
C. Three (3)
D. Four (4)
Answer: d  

7. How many detected hard disks can you create partitions and filesystems on during the installation of the UnixWare 7 operating system?
A. Eight (8)
B. Six (6)
C. Four (4)
D. Two (2)
Answer: d

8. Which of the following actions occur when you choose se default disk operations?during the installation of UnixWare 7?
A. A new boot sector installs, the disk is NOT scanned for bad blocks, and the disk geometry is NOT configured.
B. A new boot sector installs, the disk is scanned for bad blocks, and the disk geometry is configured.
C. A new boot sector installs, the disk is scanned for bad blocks, and the disk geometry is NOT configured.
D. A new boot sector installs, the disk is NOT scanned for bad blocks, and the disk geometry is configured.
Answer: a  

9. Which command do you use to create a set of emergency floppy diskettes?
A. diskadd (1M)
B. disksetup (1M)
C. emergency_disk (1M)
D. emergency_rec (1M)
Answer: c

10. Which command can you use to check the accuracy of installed files and compare them to the contents of the /var/sadm/install/contents file?
A. pkgadd (1M)
B. pkgchk (1M)
C. pkginfo (1M)
D. pkgtrans (1M)
Answer: b  

11. Which of the following can you NOT use the Boot Command Processor (BCP) to accomplish?
A. Display or change default boot parameters
B. Enter single-user state
C. Load another UNIX kernel
D. Start the print service
Answer: d 

12. In which file can you add or change default boot parameters?
A. /stand/bfs.blm
B. /stand/boot
C. /stand/smallfs.blm
D. /stand/stage3.blm
Answer: b  

13. Which command line creates a character special device file with a major number=19 and a minor number=1?
A. mknod /dev/devicename c 19 1 
B. mknod /dev/devicename c 1 19 
C. mkdev /dev/devicename c 19 1 
D. mkdev /dev/devicename c 1 19 
Answer: a

14. Which command can you use to display the attributes of any disk device?
A. devattr (1M)
B. displaypkg (1M)
C. diskcfg (1M)
D. dodisk (1M)
Answer: a

15. Which statement is false?
A. The vxfs filesystem supports the creation of 2 terabyte file sizes by default.
B. The vxfs filesytem supports the creation of up to 2 gigabyte file sizes by default.
C. The vxfs filesystem supports a 4 kilobyte logical block size.
D. The vxfs filesystem supports an 8 kilobyte logical block size.
Answer: a

16. Which answer describes the correct order in which diskadd (1M) invokes commands to configure additional disks?
A. fdisk (1M), mkfs (1M0, and disksetup (1M)   
B. disksetup (1M), fdisk (1M), and mkfs (1M)
C. fdisk (1M), disksetup (1M), and mkfs (1M)
D. None of the above.
Answer: c

17. If it exists, in which hard disk slice is the PDINFO (Physical Disk Information) stored?
A. The boot slice
B. The dump slice
C. The var slice
D. The volume management public slice
Answer: c

18. How many hard disk slices are created by default?
A. 16
B. 32
C. 64
D. 128
Answer: a

19. Which serial communications ports does UnixWare 7 recognize by default ?
A. COM 1 only
B. COM 2 only
C. COM1 and COM2
D. COM1, COM2, COM3, and COM4
Answer: d

20. Which three port monitors are provided on UnixWare 7 systems?
A. init (1M), liload (1M), and ttyadm (1M)
B. init (1M), liload (1M), and ttymap (1M)
C. init (1M), llistat (1M), and ttyadm (1M)
D. inetd (1Mtcp), listen (1M), and ttymon (1M)
Answer: d
  
21. Which answer is NOT a function of the  ttymon (1M) port monitor?
A. Initializes and monitors ports
B. Sets terminal modes, baud rates, and line disciplines for each port it monitors
C. Writes a login prompt on the terminal 
D. Sets the type of terminal
Answer: d

22. Which port type supports a serial mouse on COM1?
A. hardware flow control
B. modem
C. software flow control
D. terminal
Answer: c

23. Which command allows you to directly connect to a modem that is connected to COM1? 
A. cu -d /dev/term/00m 
B. cu -d /dev/term/01m 
C. cu -l /dev/term/00m 
D. cu -l /dev/term/01m 
Answer: c

24. Which device file represents a non-retentioning rewinding tape device?
A. ctape1
B. ntape1
C. rtape1
D. nrtape1
Answer: a

25. Which system process is the ancestor of all user processes?
A. ifor_pmd (1M)
B. init (1M)
C. syslogd (1M)
D. sysproc (1M)
Answer: b

26. Which command can you use to change the priority of a process that is already running?
A. ps (1)
B. sar (1M)
C. nice (1)
D. renice (1)
Answer: d

27. Which command displays the parameters within a security profile?
A. initprivs (1M)   
B. pwck (1M) 
C. relax (1M)
D. secdefs (1M)
Answer: d

28. Which answer best describes the purpose of the /etc/default/passwd file?
A. The /etc/default/passwd file controls login and password restrictions.   
B. The /etc/default/passwd file controls password aging parameters.
C. The /etc/default/passwd file determines if passwords are required to log in. 
D. The /etc/default/passwd file contains the encrypted password.
Answer: b

29. Which kernel parameter controls the maximum number of processes that a user can run at any given time?
A. MAX_PROC  
B. MAXSLICE  
C. MAXUMEM  
D. MAXUP  
Answer: d
         
30. Which command can you use to view the current, default, minimum, and maximum value of an autotuned kernel parameter?
A. idbuild (1M)
B. idmknod (1M)
C. idtune (1M)
D. stune (4dsp)
Answer: c

31. Which command would you use to view the options that were used to create an existing hard disk filesystem?
A. mkfs /dev/rdsk/c0b0t0d0s4 
B. mkfs -m /dev/rdsk/c0b0t0d0s4 
C. prtvtoc /dev/rdsk/c0b0t0d0s4 
D. prtvtoc -p /dev/rdsk/c0b0t0d0s4 
Answer: a

32. If you are receiving errors on a non-root filesystem, what should you do first?
A. Mount the filesystem and run fsck (1M).
B. Unmount the filesystem and run fsck (1M).
C. Run mkfs (1M) to recreate the filesystem.
D. Run mkfs (1M) to resize the filesystem.
Answer: b

33. When adding a user with the scoadmin (1M) Account Manager, which files are used to create the user-specific environment files for the Korn shell?
A. /etc/profile and /etc/kshrc
B. /etc/default/profile and /etc/default/kshrc
C. /usr/lib/ksh/profile and /usr/lib/ksh/kshrc
D. /usr/lib/scoadmin/account/skel/.profile and /usr/lib/scoadmin/skel/.kshrc
Answer: d

34. If a user has a umask value of 027, what will be the permissions of any new regular file created by that user?
A. -rw-r-----  
B. -rwxr-x---  
C. -----w-rw-  
D. -----w-rwx  
Answer: a

35. Which user account parameters can you NOT modify using the  scoadmin (1M) Account Manager ?
A. group membership and home directory
B. home directory and user password
C. login shell and user umask
D. user login ID and login name
Answer: d

36. What does the system do with the user home directory and it contents when a user account is deleted using the scoadmin (1M) Account Manager ?
A. The home directory and it contents are moved to the /etc/security/ia directory.
B. The home directory and it contents are automatically stored on an archive medium of your choice.
C. The home directory and it contents are left in their original location until the administrator chooses to relocate them.
D. The home directory and it contents are automatically deleted.
Answer: d

37. What is the default filesystem type used to create a filesystem in UnixWare 7?
A. AFS (Acer Fast Filesystem)
B. vxfs (Veritas Filesystem)
C. S5 (System V Filesystem)
D. UFS (Extended S5 Filesystem)
Answer: b

38. What does the following  mount (1M) command do:
 + 
    ? ? p  @
? ? €  P     ?       mount  /dev/dsk/f03ht /mnt
A. It mounts /dev/dsk/f03ht as a read-only filesystem at mount point /mnt.
B. It recursively mounts the directories on /dev/dsk/f03ht.
C. It removes /dev/dsk/f03ht from the mount point /mnt.
D. It gives the status of /dev/dsk/f03ht.
Answer: a

39. Which command clears the contents of  the /var/adm/syslog file without deleting the file itself?
A. > /var/adm/syslog 
B. < /var/adm/syslog 
C. rm /var/adm/syslog 
D. clear /var/adm/syslog 
Answer: a  

40. What does the following command line do:
 + 
    ? ? p  @
? ? €  P     ?       tar tv
A. It shows the type of archive device.
B. It shows the time when an archive was created.
C. It updates the time stamp on the default  tar (1) device.
D. It displays the table of contents of the default  tar (1) device.
Answer:  d

41. Which command line boots a UnixWare 7 kernel named unix.old from the [boot]   prompt?
A. BOOTPROG+unix.old <Enter>
B. BOOTPROG=unix.old <Enter>
C. BOOTPROG_unix.old <Enter>
D. BOOTPROG-unix.old <Enter>
Answer: b
  
42. Which statement regarding entries in the /etc/inet/hosts.deny file is TRUE ?
A. The specified service is NOT allowed to the specified hosts.
B. The specified service is allowed to the specified hosts.
C. The specified service is NOT allowed to any host.
D. None of these statements is true.
Answer: d

43. The following entry in the /etc/inet/hosts.allow file allows access from which IP addresses? in.tftpd:     100.75.50.0/255.255.255.0  
A. 100.75.10.25
B. 100.75.50.200
C. 100.75.200.25
D. They are all allowed.
Answer: b
  
44. Which program or protocol CANNOT be used to share UnixWare 7 files with a Windows client?
A. VisionFS
B. Advanced File and Print Server (AFPS)
C. Dynamic Host Configuration Protocol (DHCP)
D. Network File System (NFS)
Answer: c

45. Which mail channel protocol is used by UnixWare 7 to transmit outgoing e-mail over a TCP/IP network?
A. POP3
B. IMAP4
C. SMTP
D. SNMP
Answer: c  

46. How many octets are in an IP address?
A. 2
B. 4
C. 8
D. 32
Answer: b   

47. Which is an example of a valid Class  A  address?
A. 119.32.259.134
B. 126.80.1.96
C. 129.222.101.17
D. 192.127.212.88
Answer: b

48. Which command line displays a list of configured network adapters with numeric IP addresses instead of host names?
A. netstat -i 
B. netstat -in 
C. netstat -a 
D. netstat -an 
Answer: b

49. Which command, if run on a UnixWare 7 system with an IP address of 192.168.11.11, would send packets onto the network?
A. ping 127.0.0.1 
B. ping localhost 
C. ping 192.168.11.11 
D. None of these commands would send packets onto the network.
Answer: d

50. A Class B network has been subnetted so that it uses an 8-bit subnet address and an 8-bit host address. What netmask does it use?
A. 0.0.255.255
B. 0.0.0.255
C. 255.255.0.0
D. 255.255.255.0
Answer: d

51. Your company has a class  C  network address. You are planning to configure subnets. Each subnet will have at most  fifteen (15) hosts. What is the largest number of subnet bits you can use?
A. 3
B. 4
C. 5
D. 6
Answer: a

52. What is the effect of the following  route  command:
 + 
    ? ? p  @
? ? €  P     ?       route add 200.100.10.20 200.100.30.40
A. It adds routes to the two hosts 200.100.10.20 and 200.100.30.40.
B. It adds a route to the host 200.100.10.20 through the router 200.100.30.40.
C. It adds a route to the host 200.100.30.40 through the router 200.100.10.20.
D. It is a syntax error.
Answer: b

53. Which protocol can be used when transmitting IP traffic over dedicated serial lines?
A. The Point to Point Protocol (PPP)
B. The Serial Line Internet Protocol (SLIP)
C. Either PPP or SLIP
D. Neither PPP nor SLIP
Answer: c  

54. Which item describes WAN hardware that can be bundled into pools of similar devices for use by PPP links?
A. Link groups
B. Bundles
C. Pools
D. Device groups
Answer: a

55. Which file does the  inetd  daemon read to determine which services to start?
A. /etc/inet/inetd.conf
B. /etc/inet/rc.inet
C. /etc/inet/hosts
D. /etc/inet/config
Answer: a

56. Which command causes the inetd daemon to re-read the file after editing the /etc/inet/inetd.conf file? 
A. inted restart 
B. kill -1 PID , where PID is the process ID of the inetd process
C. telinit inetd 
D. Nothing, the changes will take effect immediately
Answer: b

57. Which statement about the Domain Name System (DNS) is TRUE ?
A. It cannot be used if the /etc/hosts file exists.
B. It was developed by SCO in response to WINS.
C. It stores all necessary information about a host on the computer, including its current status.
D. It resolves host names by supporting a hierarchical host naming scheme.
Answer: d  

58. Which statement regarding a caching-only name server is TRUE?
A. Caching-only name servers can forward requests to other caching-only name servers.
B. Caching-only name servers always forward requests to primary name servers.
C. Caching-only name servers cannot forward requests; they can only reply with answers from their cache.
D. Caching-only name servers initilize their cache by performing a zone transfer from a primary name server.
Answer: a

59. Which statement concerning UnixWare 7 anonymous FTP is FALSE ?
A. Anonymous FTP can be configured with the SCOadmin  FTP Server Manager .
B. Anonymous FTP grants limited file transfer access to unauthenticated users.
C. You can limit how many simultaneous anonymous FTP users are allowed.
D. The address of the anonymous FTP client system is  NOT  recorded on the server.
Answer: d

60. Which condition prevents FTP access to a user account?
A. The user has a non-null password.
B. The user name is listed in the /etc/inet/ftpusers file.
C. The user shell is listed in the /etc/inet/shells file.
D. The user name is listed in the /etc/inet/ftpaccess file.
Answer: b

61. Which statement regarding signals is true?
A. A signal is a synchronous event.
B. A signal is an asynchronous event.
C. A signal can never be ignored by a process.
D. A signal always causes a process to terminate.
Answer: b

62. Which number corresponds to the interrupt (SIGINT) signal?
A. 1
B. 2
C. 3
D. 9
Answer: b
  
63. Which statement proposes the most efficient pathname strategy?
A. Absolute pathnames are always more efficient than relative pathnames. 
B. Relative pathnames are always more efficient than absolute pathnames. 
C. The best pathname is the shortest one, and that can be either relative or absolute.
D. The best pathname is the longest one, and that can be either relative or absolute.
Answer: c

64. Which statement best describes the following command lines:(1)grep sco /etc/hosts | sort     (2)sort /etc/hosts | grep sco
A. Command line (1) is more efficient than command line (2).
B. Command line (2) is more efficient than command line (1).
C. Command line (1) is equally efficient as command line (2).
D. Command line (1) generates an error message, but command line (2) does not.
Answer: a
  
65. Which item is NOT a function of the command-line interpreting service of the shell?
A. Read command input lines
B. Execute commands on behalf of a user
C. Separate the arguments on a command line
D. Verify that a command has sufficient command-line arguments
Answer: d

66. Given the following command line, which statement is true?          ps -ef | grep root | wc -l 
A. All three commands are filters.
B. The ps command is a filter.
C. The grep command is a filter.
D. None of the commands are filters.
Answer: c
  
67. Which statement correctly sets the Bourne shell PATH   variable?
A. PATH=/bin:/usr/bin/:/usr/local/bin  
B. PATH = /bin:/usr/bin/:/usr/local/bin  
C. PATH /bin: /usr/bin: /usr/local/bin  
D. set PATH=/bin:/usr/bin/:/usr/local/bin  
Answer: a
  
68. What will be in datafile after the following command line executes?          date ; who > datafile
A. The output of date only
B. The output of who only
C. The output of both date and who 
D. datafile will be empty.
Answer: b
  
69. Which item shows the proper syntax of the hashpling mechanism?
A. !#/bin/sh  
B. #!/bin/sh  
C. :#/bin/sh  
D. #:/bin/sh  
Answer: b
  
70. What is the result of the following Bourne shell statement?           echo "Enter Command \c"
A. It generates a syntax error.
B. It does not generate any type of output.
C. It suppresses the newline character after the Enter Command string is displayed.
D. It appends two newline characters to the Enter Command string that is displayed.
Answer:  c
  
71. What is the purpose of the following Bourne shell statement?         MAIL=/usr/peter/mymailbox
A. Incoming mail from other users will now be written to the file /usr/peter/mymailbox.
B. Outgoing mail will be recorded in the file /usr/peter/mymailbox.
C. The shell will check the file /usr/peter/mymailbox at specified intervals and alert the user when new mail is written to the file.
D. Upon invocation, the mail command will set options that are specified in the file /usr/peter/mymailbox.
Answer:  c    
  
72. Which is a Bourne shell positional parameter?    (1)  $1     (2) $10   (3)  $IFS
A. (1) only
B. (3) only
C. (1) and (2) only
D. (1), (2), and (3)
Answer: a
  
73. What is the output of the following Bourne shell command:          echo "abc\def"
A. abcdef  
B. abc\def  
C. "abcdef"  
D. "abc\def"  
Answer: b
  
74. Which command assigns the results of the pwd command to the variable VAR  ?
A. pwd>VAR  
B. VAR='pwd'  
C. VAR="pwd"  
D. VAR=pwd? 
Answer: d
  
75. What is the outcome of the following command line?
 + 
    ? ? p  @
? ? €  P     ?      [  -f /tmp/junk  ] && rm /tmp/j*
A. The rm command will execute if the ordinary file /tmp/junk exists.
B. The rm command will execute if the ordinary file /tmp/junk does not exist.
C. Th rm command will always execute.
D. An error message is displayed.
Answer: a
  
76. Which command line is logically equivalent to the following code fragment:
          if [ -d $DIR ]     then         cd $DIR     fi
A. [ -d $DIR ] && cd $DIR  
B. [ -d $DIR ] || cd $DIR  
C. [ -d $DIR ] | cd $DIR  
D. [ -d $DIR ] ; cd $DIR  
Answer:  a  
  
77. Which command allows you to perform integer arithmetic on a variable that is storing a string of integers?
A. hd 
B. expr 
C. shift 
D. wc 
Answer: b

78. The difference between the execution of a while loop and an until loop is that:
A. an until loop is guaranteed to execute at least once, whereas a while loop is not
B. an until loop executes in a subshell, whereas a while loop does not
C. an until loop executes as long as its condition clause exits with a failure code, whereas a while loop executes as long as its condition succeeds
D. the condition of an until loop is evaluated at the bottom of the loop, whereas it is evaluated at the top for a while loop
Answer: c

79. Which statement regarding Bourne shell functions is true?
A. They must always be defined in separate files.
B. They are executed by the current shell process.
C. They must be compiled before they can be called.
D. They must be reset after each call within a script.
Answer: b

80. If a shell function is invoked with command-line arguments, how are these arguments accessed within the function?
A. They are accessed with the shell variable $^ .
B. They are accessed with positional parameters.
C. They are accessed with exported variables.
D. Arguments cannot be accessed within shell functions.
Answer: b

 

文章標籤
全站熱搜
創作者介紹
創作者 Good.info5790 的頭像
Good.info5790

金好康-好康資訊

Good.info5790 發表在 痞客邦 留言(0) 人氣(147)