-
When determining a customer’s security requirements using the security site survey from the steps for success methodology, which three of theses should be included in the customer’s security policy and procedures?()
A . Third-party due diligence policy review
B . Remote Access Policy
C . Encryption Policy
D . Application change control policy
E . Security Personnel policy
-
Which of the following procedures should be performed to run diagnostics in single-user mode? ()
A . Run standalone diagnostics from the cd.
B . Run standalone diagnostics from the AIX tape.
C . Run maintenance mode diagnostics from the hard drive.
D . Run maintenance mode diagnostics from the diskette.&e
-
A user reports a corrupted boot logical volume. In order to recreate the contents of the boot logical volume which of the following procedures should the user be advised to perform?()
A . Reboot the system in normal mode.
B . Use the bosboot command to rebuild the boot image.
C . Restore the boot logical volume from a mksysb image.
D . Reboot the system into maintenance mode and run fsck on the boot logical volume.
-
A customer needs to remove an unnecessary, but active paging space called paging00 on an AIX 5L system. Which of the following procedures should be used to properly remove the paging space with the least amount of disruption?()
A . Remove the paging space with the rmps command.
B . Disable the paging space with the chps command, swapoff /dev/paging00, and remove the paging00 logical volume with the rmps command.
C . Reboot the system and disable the paging space with the rmps command.
D . Disable the paging space with the chps command, swapoff /dev/paging00, reboot the system, remove the paging00 logical volume with the rmps command.&e
-
A graphics card has been added to the system. After rebooting, the system hangs during the login process with a blue screen indicating "CDE please wait". Which of the following procedures should be performed next?()
A . Reinstall the CDE software
B . Check the name resolution
C . Uncomment the last line in .dtprofile
D . Boot in maintenance mode and perform fsck on file system
-
When planning to access the on-line documentation from a remote client, which of the following procedures should be performed on the server?()
A . Install and configure the HTTPServer.
B . Add the name(s) of the client(s) to the httplite.conf file.
C . Add the names of any clients expecting to access the documentation to the /etc/hosts file.
D . No action is required.
-
During reboot, the system hangs with an LED 0554 message that means, "The boot device could not be opened or a read failed." Which of the following recovery procedures should be taken ()
A . Boot in maintenance mode and use fsck to check hd5.
B . Boot in maintenance mode, access the rootvg and check the /etc/inittab for corruption.
C . Boot in maintenance mode, access the rootvg and rebuild the boot image using the bosboot command.
D . Boot in maintenance mode, and reset the root password.
-
CDE is working. However, the customized PATH environment has not been implemented. Which of the following procedures should be performed to activate the implementation?()
A . Update the .kshrc file
B . Edit $HOME/.dtprofile, and uncomment the DTSOURCEPROFILE=true
C . Copy /etc/.profile to $HOME/.dtprofile and edit the file as needed
D . Double click on the System Administration icon and select CDE profile
-
Which procedure should be followed when individuals are rescued in cold climates and suffer from hypothermia?()
A . Give them brandy
B . Keep them in motion
C . Immerse them in a warm bath (105°F,40°C)
D . Cover them with an electric blanket set for maximum temperature
-
A graphics card has just been added but is not available. The xinit command is run, however an error occurs. Which of the following procedures should be performed to fix the error?()
A . Run the xstart command.
B . Install the Windows software.
C . Change the console to /dev/lft.
D . Copy the xdefaults file to the home directory.
-
Telneting from any machine on the network is taking 75 seconds. Which of the following procedures should be checked to correct the error?()
A . Check /etc/hosts.
B . Check /etc/resolv.conf.
C . Check for packet errors.
D . Check to see if the master server is up.
-
Which of the following procedures should be carried out to permit the use of a crosshead engine with an inoperable after-cooler?()
A . Bypass the after-cooler to operate at speed
B . Run at reduced speed until the cooler can be repaired or renewed
C . Switch to diesel fuel and run at full speed
D . Nothing need to be done due to the low heating value of heavy fuel
-
Which of the following procedure should be performed prior to delivery and generally involves running a suite of operations so as to verify that the solution is applicable for production?()
A . Security Check
B . Acceptance Testing
C . Project Close Out
D . Systems Integratio
-
Procedures for the implementation of corrective action should be established by().
A . The Administration
B . The Government
C . The Company
D . The Organizatio
-
After updating the system, the system administrator runs the lppchk-v command. During this process, the bos.rte.libc is in a broken state. Which of the following procedures should be performed to fix this problem?()
A . Reinstall the system
B . Use installp -r to reject the broken fileset
C . Use installp -acgFXd to reinstall the fileset at the same level
D . Use install -u to remove this broken fileset and reinstall it agai
-
In a three-disk volume group, a disk was physically removed from the system without performing any software procedures to properly remove the disk. Which of the following commands should be performed to recover from this error?()
A . extendvg
B . cfgmgr
C . reducevg
D . varyoffvg
-
While applying a service update on a system using SMIT, the system administrates SMIT Command Status screen shows "Command: failed". Which of the following procedures should be performed to investigate the failure?()
A . Exit the SMIT session and re-apply the update.
B . Select the SMIT option to Clean UP After an Interrupted Installation.
C . Examine the installation summary report to determine the cause of the failure.
D . Examine the console log to view the error messages generated by the failure.
-
After crating a mksysb, what is the most important procedure that should be followed?()
A . List the files and verify it is bootable
B . Make sure it is labeled and store it in a safe place.
C . Make sure it is write-protected and labeled.
D . Look at the output of the mksysb command to verify it completed successfully.
-
During reboot the system hangs with LED 0581 that indicates "Configuring TCP/IP." Which recovery procedures should be taken?()
A . Boot in maintenance mode, and verify the Ethernet adapter configuration.
B . Boot in maintenance mode, access the rootvg and check the /etc/inittab for corruption.
C . Boot in maintenance mode, access the rootvg and rebuild the boot image using the bosboot command.
D . Boot in maintenance mode after verifying the network connection, access the rootvg and check the /etc/rc.net file.
-
Prior to starting most medium-speed propulsion diesel engines, which of the procedures listed should be observed?()
A . The expansion tank should be topped off
B . The thermostatic water regulating valves should be manually opened
C . The fuel filters should be changed
D . The engine should be turned over slowly with the indicator cocks ope
-
When a user tries to log into the system, the following error occurs: "3004-004. You must "exec" login from the lowest login Shell". Which of the following procedures should be performed next to determine the cause of the problem?()
A . Reboot the system.
B . Increase the number of ptys.
C . Increase number of licenses.
D . Run df -k to check for full filesystems.
-
An SSA disk that is part of the mirrored volume group needs to be replaced. Which of the following procedures should be performed before the disk is physically able to be replaced?()
A . reducevg, rmdev, syncvg
B . rmlvcopy, exportvg, rmdev
C . rmlvcopy, reducevg, rmdev
D . No action is required since SSA is a Hot Swap device and is mirrored
-
Given a new implementation, which of the following procedures should be used to determine a default gateway’s IP address?()
A . The address will always end in 255.
B . The address will always be the first interface’s IP address
C . The address will always be the network with a 1 as the final octet.
D . It is important to consult with the network administrator prior to making assumptions regarding the default gateway’s IP addre
-
Which procedure should be used to configure the system to prevent all users from using the ‘at’ command?()
A . Create a /var/adm/cron/at.allow file with no entries
B . Create a /var/adm/cron/at.deny file with '*' as the only entry
C . Create a /var/adm/at/at.deny file with 'ALL' as the only entry
D . Create a /var/adm/at/at.allow file with 'NONE' as the only entry