New Year Biggest Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

IBM S1000-007 Dumps

Page: 1 / 9
Total 92 questions

IBM AIX v7 Administrator Specialty Questions and Answers

Question 1

While a system administrator is checking the TCP/IP connectivity between two systems with the traceroute command, the administrator found Fragmentation required messages in the traceroute output.

What is the likely reason for these messages?

Options:

A.

The TCP buffers in the router gateway are exhausted. The source and target system are having TCP/IP communication problems.

B.

Same MTU sizes between the source and target systems. The source and target systems are using Jumbo Frames. The LPARs are using the same Virtual Switch (vSwitch) Network.

C.

Different MTU sizes between the source and target systems. The source system is using Jumbo Frames and the target is using the default MTU size.

D.

The TCP buffers between the source and the target systems are exhausted. The source and target systems are using virtual ethernet adapters.

Question 2

Based on the output from the lparstat command, how many logical processors are configured in the partition?

as

Options:

A.

8

B.

4

C.

64

D.

128

Question 3

A system administrator needs to open a console to an AIX virtual machine that is controlled by a Hardware Management Console (HMC). After connecting to the HMC using SSH, which command should the administrator run to open a console?

Options:

A.

mkrep

B.

oem_setup_env

C.

mlcvterm

D.

mJcvdev

Question 4

A customer added paging space and needs to activate it automatically after the next reboot. Which command should the administrator issue?

Options:

A.

chps

B.

mklv

C.

swapon

D.

mkps

Question 5

Which command should be used to perform a graceful shutdown and reboot of an AIX LPAR?

Options:

A.

bosboot

B.

shutdown

C.

halt

D.

reboot

Question 6

An administrator is tasked with installing an open source package. They are told to use the IBM AIX Toolbox for Linux Applications because the organization wants to be able to open tickets with IBM support.

What should the administrator tell the requester?

Options:

A.

IBM offers standard support for open source software that is licensed with the operating system.

B.

IBM offers extended support for open source software and they need to verify entitlement.

C.

IBM offers this open source software as-is.

D.

IBM offers extended support for open source software that is licensed with the hardware.

Question 7

Which command will show when a file was last accessed?

Options:

A.

Is -1 file

B.

fsdb file

C.

istat file

D.

who -f file

Question 8

What is a benefit of using mksysb to backup a system?

Options:

A.

The image contains a backup of all file systems.

B.

The image can be used to restore the rootvg volume group of the system.

C.

The image contains a backup of all application and user data.

D.

The image contains a backup of all volume groups and logical volumes.

Question 9

How are console log messages recorded by AIX?

Options:

A.

alog

B.

syslog

C.

rsyslog

D.

errdemon

Question 10

A system administrator includes the values RES TIMEOUT=1 and RES_RETRY=1 in the /etc/environment file. What is the effect of this change?

Options:

A.

It reduces the failover time to the secondary name server when the first name server is not reachable.

B.

It causes ssh connections to disconnect after 1 minute of no activity.

C.

It reduces the failover time to the secondary NTP Server when the first NTP Server is unavailable.

D.

It avoids NFS mounts appearing to be hung or stalled indefinitely when there are network outages.

Question 11

An administrator finds that their development server has crashed and an error code 554 is displayed. They know that this error is typically associated with a problem executing varyon rootvg and they should boot from AIX Media to be able to perform maintenance tasks. When the administrator checks the crontab of the NIM server, they find that a mksysb image is created each night.

Can the administrator use this mlcsysb to boot the server and perform the required maintenance tasks?

Options:

A.

Yes, but they may need to create a machine resource first.

B.

Yes, but they may need to create a spot first.

C.

No, because they need to use the original AIX installation media for that server.

D.

No, because mksysb is not bootable.

Question 12

What are three states a device can have when connected to an AIX system?

Options:

A.

Available

B.

Defined

C.

Stopped

D.

Blocked

E.

Running

F.

Suspended

Question 13

Which logical volume Mirror Write Consistency policy should an AIX V7.2 administrator use to achieve the data consistency between mirrors?

Options:

A.

round robin

B.

off

C.

superstrict

D.

active

Question 14

An AIX administrator installed the fileset named useful_fileset. How can they determine which files are included in the fileset?

Options:

A.

file -f useful__fileset

B.

lslpp -f useful_fileset

C.

rpm -qf useful_fileset

D.

lppchk -f useful fileset

Question 15

An administrator encountered a problem creating a mksysb backup image on a system.

To investigate the problem further, the following information was collected

as

as

Based on this information, why has the creation of the mksysb backup image failed?

Options:

A.

The system has NFS file systems mounted.

B.

There is insufficient free space in /tmp.

C.

The command mksysb will fail if there is a mix of JFS and JFS2 filesystems.

D.

The rootvg contains a raw logical volume named rawIvOO.

Question 16

What impact does an EtherChannel network device have on network flow?

Options:

A.

Each network adapter port added to the channel doubles the speed of the flow.

B.

Traffic will flow through other available adapters if one fails.

C.

All network flow is converted to jumbo frames.

D.

TCP traffic may be held up to allow UDP traffic to run faster.

Question 17

An AIX administrator would like to create an account called adm. Which is the issue with creating this account?

Options:

A.

It is a reserved word in AIX and cannot be used for accounts.

B.

It is a standard AIX account and is delivered with AIX.

C.

It is an RBAC role in AIX. Users can't be named after RBAC roles on AIX.

D.

There will be no problems. The root user can create any accounts.

Question 18

An administrator needs to know whether the development partition is sharing processor resources with the production partitions. There is a single processor pool in the system. Which command shows whether the partition is dedicated or shared?

Options:

A.

topas -m

B.

Iparstat -i

C.

Isdev -Cc processor

D.

bindprocessor -q

Question 19

To meet new security requirements, it has been decided that telnet will no longer be allowed in the development environment. The administrator of the AIX development server needs to prevent users from being able to access this server using telnet.

When checking /etc/inetd.conf, the administrator sees the following line:

telnet stream tcp6 nowait root /usr/sbin/telnetd telnetd -a

What would stop the telnet daemon from running and restarting after reboot?

Options:

A.

Run stopsrc -t telnetd.

B.

Run ps -ef | grep telnet and kill the process if it exists.

C.

Insert "#" before telnet in/etc/inetd.conf and run refresh -s inetd.

D.

Insert before telnet in /etc/inetd.conf and reboot system.

Question 20

A security auditor requires the administrator to disable direct root login to an AIX system. Where should the administrator check to see if the root login has been disabled?

Options:

A.

/etc/nologin

B.

/etc/security/passwd

C.

/etc/security/user

D.

/etc/passwd

Question 21

What is true about restarting subsystems in AIX?

Options:

A.

The srcmstr process must be halted prior to restarting a subsystem.

B.

All subsystems managed by SRC can be restarted with the refresh command.

C.

A process managed by SRC cannot be restarted without SRC.

D.

A call to restart a subsystem can be issued to a remote system.

Question 22

Which command is used to view the AIX boot log?

Options:

A.

prtboot

B.

alog

C.

bootlist

D.

errpt

Question 23

A correctly configured NIM client is registered in the NIM database stored on the NIM master. One of the attributes of each client object is the connection method that should be used by the NIM master to initiate operations on that client.

Which two connection methods are supported?

Options:

A.

ssh

B.

REST API

C.

nimsh

D.

ftp

E.

rsh

Question 24

An administrator is configuring two Ethernet adapters in a system, and needs to route AIX packets across the two networks. Which command allows the administrator to check whether AIX is enabled for TCP/IP packet routing?

Options:

A.

Isattr -rt

B.

no -a

C.

ifconfig -route

D.

ioo -netroute

Question 25

A redundant power supply on a server was replaced a couple of months ago. but the administrator continues to receive a report regarding a power supply problem. How can the administrator resolve this?

Options:

A.

Run cfgmgr -v -o fix.

B.

Run diag with option to log repair action.

C.

Run rmdev -1 powerO -d, then cfgmgr.

D.

Run errclear -C fix.

Question 26

What is a benefit of mirror pools?

Options:

A.

They enable the strict control of disks used to mirror a logical volume.

B.

They enable a clone of a volume group to be imported to a different level of AIX.

C.

They enable the volume group to be activated on two systems simultaneously.

D.

They enable the creation of a map file to specify the allocation new partitions to a file system.

Question 27

A system is experiencing name resolution issues. Non-root user processes are failing to resolve host names.

Based on the following output, what is the reason for this problem?

Options:

A.

The domain option from the /etc/resolv.conf file is invalid.

B.

The /etc/resolv.conf file has the wrong permissions.

C.

The /etc/netsvc.conf file has the wrong permissions.

D.

The local , bind option from the /etc/netsvc.conf file is invalid.

Page: 1 / 9
Total 92 questions