What are three states a device can have when connected to an AIX system?
Answer(s): A,B,C
Devices that are connected to the system can be in one of four states. Devices that are connected to the system can be in one of the following states:Item DescriptionUndefined The device is unknown to the system.Defined Specific information about the device is recorded in the customized database, but it is unavailable to the system. Available A defined device is coupled to the operating system, or the defined device is configured. Stopped The device is unavailable but remains known by its device driver. If a tty device and a printer alternately use the same tty connector, both a tty device and a printer are defined on the same parent and port in the device configuration database. Only one of these devices can be configured at a time. When the tty connector is configured, the printer specific setup information is retained until it is configured again. The device is not removed; it is in the defined state. Maintaining a device in defined state retains customized information for a device that is not currently in use, either before it is first made available or while it is temporarily removed from the system.If a device driver exists for a device, the device can be made available through the device driver.
https://www.ibm.com/docs/en/aix/7.2?topic=nodes-device-states
What command is used to monitor SAN I/O performance/throughput?
Answer(s): A
The command used to monitor SAN I/O performance/throughput is iostat -DIRT 60 10. The iostat command is used to monitor I/O performance and throughput on a SAN device. The DIRT (Disk I/O Response Time) flag can be used to display the response time for each I/O request. The last two arguments, 60 and 10, are the interval (in seconds) and the number of iterations respectively. This command will monitor I/O performance/throughput every 60 seconds for 10 iterations.
An IT security department would like to limit root user access to only members of the group called system. Which command will accomplish this?
Answer(s): D
The "chadmin" command can be used to modify the attributes of a user account, including the groups that the user belongs to. The syntax for limiting root user access to members of the group called "system" would be:sql chadmin group=system rootThis command will add the root user to the "system" group and remove it from any other groups. Members of the "system" group will be the only ones able to access the root account.
Which statement is true regarding the snap command?
Answer(s): B
"The command to limit root user access to only members of the group called system is chadmin group=system root. This command will set the primary group of the root user to the system group, thereby limiting root user access to only members of that group. This command can be used to set any user's primary group, not just root." The source of this information is the IBM AIX v7 Administrator Specialty Study Guide.
Post your Comments and Discuss IBM S1000-007 exam with other Community members: