-
An administrator has added hdisk2 to rootvg and would like to create a boot logical volume on the disk so it can be used as the primary boot partition on the next reboot. Which command should the administrator use?()
A . bosboot -ad hdisk2
B . mkblv -y bootlv hdisk2
C . crlv -t bootlv -d hdisk2
D . bootlist -om normal hdisk2
-
An administrator has recently added a VLAN to the VIO server and wants to update the documentation. Which command displays the current VIO server VLAN configuration?()
A . lsmap -all
B . lsmap -net
C . lsmap -ent
D . lsmap -vla
-
An administrator has recently added a VLAN to the VIO server and wants to update the documentation. Which command displays the current VIO server VLAN configuration?()
A . lsmap -all
B . lsmap -net
C . lsmap -ent
D . lsmap -vla
-
After properly configuring multiple VLANs, an administrator has decided to secure its VLAN network. Which three steps are required to secure this environment? (Choose three.)()
A . If a port is connected to a foreign device make sure to disable CDP, DTP, RPR, PAgP, UDLP, and any other unnecessary protocols, and enable UplinkFast/BPDU guard on it.
B . Enable root guard feature to prevent a directly or indirectly connected STP-capable device from affecting the location of the root bridge.
C . Configure VTP domains appropriately or turn off VTP altogether to limit or prevent possible undesirable protocol interaction with regards to the network-wide VLAN configuration.
D . Set the native VLAN ID to match the port VLAN ID of any 802.1q trunk to prevent spoofing.
E . Disable all unused ports and place them in an unused VLAN to avoid unauthorized access.
-
An administrator has a requirement to mirror the operating system on a VIO server. Which of the following IOS commands will achieve this?()
A . mirrorvg
B . iosmirror
C . mirrorios
D . mkiosmirror
-
An administrator needs to configure a server (192.168.22.22) as a temporary solution for an NTP master that has stopped working. What is the process for configuring the NTP master?()
A . Edit the /etc/ntp.conf file changing the server line to 'server 127.127.1.0' and add the line 'fudge 127.127.1.0 stratum 0', and then refresh the daemon.
B . Edit the /etc/ntp.conf file changing the server line to 'server 127.127.1.0' and add the line 'master 127.127.1.0 stratum 0', and then refresh the daemon.
C . Edit the /etc/ntp.conf file changing the server line to 'server 192.168.22.22' and add the line 'fudge 192.168.22.22 stratum 0', and then refresh the daemon.
D . Edit the /etc/ntp.conf file changing the server line to 'server 192.168.22.22' and add the line 'master 192.168.22.22 stratum 0', and then refresh the daemon.
-
A user has written a script that is not running correctly and asks an administrator for help. Without adding anything to the script, how can the administrator determine the cause of the problem?()
A . Run the script with an ’sh -x’ in front.
B . Run the script with a ’ksh -v’ in front.
C . Type debug into the command line before running the script.
D . Type ’set -x’ into the command line before running the script.
-
A system administrator has added a new port entry in /etc/services for a new application to be tested. Which of the following commands should be used to activate this port?()
A . telinit -q
B . refresh -s inetd
C . startsrc -g services
D . refresh -s portma
-
An AIX system administrator has setup disk quotas. Where can the reports be found on the system?()
A . /var/adm/acct/sum
B . /var/adm/ras
C . /usr/sbin/acct
D . /var/adm/wtm
-
An administrator needs to configure a server (192.168.22.22) as a temporary solution for an NTP master that has stopped working. What is the process for configuring the NTP master?()
A . Edit the /etc/ntp.conf file changing the server line to ’server 127.127.1.0’ and add the line ’fudge 127.127.1.0 stratum 0’, and then refresh the daemon.
B . Edit the /etc/ntp.conf file changing the server line to ’server 127.127.1.0’ and add the line ’master 127.127.1.0 stratum 0’, and then refresh the daemon.
C . Edit the /etc/ntp.conf file changing the server line to ’server 192.168.22.22’ and add the line ’fudge 192.168.22.22 stratum 0’, and then refresh the daemon.
D . Edit the /etc/ntp.conf file changing the server line to ’server 192.168.22.22’ and add the line ’master 192.168.22.22 stratum 0’, and then refresh the daemon.
-
A user has written a script that is not running correctly and asks an administrator for help. Without adding anything to the script, how can the administrator determine the cause of the problem?()
A . Run the script with an 'sh -x' in front.
B . Run the script with a 'ksh -v' in front.
C . Type debug into the command line before running the script.
D . Type 'set -x' into the command line before running the script.
-
An administrator has an existing HMC and POWER6 570 connected to a network switch. The administrator is planning to install two POWER6 570s with a dedicated HMC. Which infrastructure is required for the new HMC?()
A . An additional switch for the new HMC
B . Asynchronous adapters on the new HMC
C . The two 570 servers are directly connected to the new HMC
D . One 570 is directly connected to the new HMC and the other is directly connected to the existing HMC
-
Which command must be run after an administrator has made changes to /etc/services to activate the changes?()
A . /etc/rc.tcpip
B . refresh -s inetd
C . startsrc -s inetd
D . startsrc -g tcpi
-
You have an Exchange Server 2010 organization.You need to identify whether an administrator has made a configuration change in the Exchange organization.What should you run?()
A . Get-EventLogLevel
B . Get-ExchangeServer
C . Exchange Best Practices Analyzer
D . Microsoft Baseline Security Analyzer (MBSA)
-
An administrator was asked to log information on possible security breaches on a server. To which file should additional entries be added to capture this information()
A . /var/adm/sulog
B . /etc/syslog.conf
C . /etc/security/sysck.cfg
D . /etc/security/syslog.conf
-
The network administrator has enabled BPDU guard on the LAN. Why is an effective way to prevent an unauthorized rogue switch from altering the spanning-tree topology of this network? ()
A . BPDU guard can be used to prevent invalid BPDUs from propagating throughout the network.
B . BPDU guard can guarantee proper selection of the root bridge.
C . BPDU guard can be utilized to prevent the switch from transmitteing BPDUs and incorrectly altering the root bridge election.
D . BPDU guard can be utilized along with PortFast to shut down ports when a switch is connected to the port.
E . None of the other alternatives apply
-
An etwork administrator has enabled OSPF across an NBMA network and has issued the command ip ospf network nonbroadcast. Given those facts, which two statements are true?()
A . Interfaces will automatically detect and build adjacencies with neighbor routers
B . DR and BDR elections will not occur
C . DR and BDR elections will occur
D . The neighbor command is required to build adjacencies
E . All routers must be configured in a fully meshed topology with all other router
-
An administrator has an existing HMC and POWER6 570 connected to a network switch. The administrator is planning to install two POWER6 570s with a dedicated HMC. Which infrastructure is required for the new HMC?()
A . An additional switch for the new HMc
B . Asynchronous adapters on the new HMc
C . The two 570 servers are directly connected to the new HMc
D . One 570 is directly connected to the new HMC and the other is directly connected to the existing HMc
-
An administrator determines that performance has degraded for a WebSphere Commerce database. Which of the following steps should be performed to correct this problem?()
A . Cleanup obsolete data
B . Clear the WebSphere Commerce cache
C . Enable WebSphere Commerce Accelerator
D . Reindex the database tables
E . Run Performance Monitor to monitor SQL statement
-
Your company has an Active Directory Domain Servic es (AD DS) domain. All servers run Wind
Your company has an Active Directory Domain Servic es (AD DS) domain. All servers run Windows Server 2008 R2. All client computers run Windows 7. Your environment includes Microsoft Application Virtualization (App - V), Microsoft Enterprise Desktop Virtualization (MED - V), and Remote Desktop Services.You hav e three applications that are in one package and require authorization to run.You need to deploy the applications for offline use.What should you do?()
A.Configure a MED - V revertible workspace policy.
B.Configure the Remote Desktop Connection Broker (RD Co nnection Broker). Create a Group Policy object (GPO) to configure the Configure server authentication for client setting.
C.Use Microsoft Application Virtualization for Desktops. On each client computer, set the client cache configuration settings to Use f ree disk space threshold and configure the ApplicationSourceRoot registry key.
D.Use Microsoft Application Virtualization for Desktops. On each client computer, configure the AutoLoad Triggers, AutoLoadTarget andRequireAuthorizationIfCached registry paramet ers. Then launch any one of the applications while logged in with the computer user is credentials.
-
Your company has an Active Directory Domain Services (AD DS) domain. You virtualize applic
Your company has an Active Directory Domain Services (AD DS) domain. You virtualize applications by using Microsoft Application Virtualization (App-V).You are creating an application virtualization package.Which should you use?()
A.Microsoft Application Virtualization Sequencer
B.Microsoft Application Virtualization Desktop Client
C.Microsoft System Center Application Virtualization Streaming Server
D.Microsoft System Center Application Virtualization Management Server
-
Your company has an Active Directory Domain S ervices (AD DS) domain. All client computers
Your company has an Active Directory Domain S ervices (AD DS) domain. All client computers run Windows 7. You have a Remote Desktop Session Host (RD Session Host) server.You have the following requirements:H Local devices from remote desktop clients must be redirected to the RD Session Host server .H USB devices from remote desktop clients must not be redirected to the RD Session Host server .What should you do?()
A.Disable drive redirection on the remote desktop clients.
B.Disable drive redirection on the RD Session Host server.
C.Enable the Prevent installation of removable devices Group Policy setting on the remote desktop clients.
D.Enable the Prevent installation of removable devices Group Policy setting on the RD Session Host server.
-
Your company has an Active Directory Domain Services (AD DS) domain. You inst all the Remo
Your company has an Active Directory Domain Services (AD DS) domain. You inst all the Remote Desktop Session Host (RD Session Host) role service on a server that runs Windows Server 2008 R2. All client computers run Windows 7.You need to ensure that the current Libraries from users computers are avail able when they logon to the RD Session Host server.What should you do?()
A.Redirect each user ’s Docu ment s f ol der t o a net work shar e
B.Redirect each user ’s Li nks f ol der t o t he RD Sessi on Host server
C.Use a startup script to copy .library - ms files from the client computers to the RD S ession Host server.
D.Use Group Policy Preferences to copy .library - ms files from the client computers to the RD Session Host server.
-
Your organization has an Active Directory Domain Services (AD DS) domain. You use Microsof
Your organization has an Active Directory Domain Services (AD DS) domain. You use Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 to manage your Hyper-V hosts. Your environment includes Windows Server Update Services (WSUS). You create a new Windows 7 virtual machine (VM) image and run the sysprep /oobe /generalize /shutdown command. You store the image in the VMM library. You need to apply operating system updates to the image without affecting licensing or activation status of the image.What should you do? ()
A.Use the Sysprep Tool to service the image.
B.Use VMM to deploy the image, and then apply the operating system updates.
C.Use the Windows Optional Component Setup (OCSetup.exe) tool with an online image.
D.Use the Deployment Image Servicing and Management (DISM) tool to service an offline image.