Latest C9010-022 practice exam Guide

we provide Validated IBM C9010-022 exam answers which are the best for clearing C9010-022 test, and to get certified by IBM IBM AIX Administration V1. The C9010-022 Questions & Answers covers all the knowledge points of the real C9010-022 exam. Crack your IBM C9010-022 Exam with latest dumps, guaranteed!


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for IBM C9010-022 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW C9010-022 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/C9010-022-exam-dumps.html

Q111. - (Topic 1) 

Which command will display the time and date of the last boot? 

A. who-b 

B. last-b 

C. boot-b 

D. time-x 

Answer:


Q112. - (Topic 4) 

An administrator receives the following error message when attempting to extend a volume group with an additional disk: 

0516-1162 extendvg : the Physical Partition size of 256 requires thecreation of 1026 partitions for hdisk2. The limitation for volume group rootvg is 1024 physical partitions per physical volume. Use the chvg command with the -t option to attempt to change the maximum PhysicalPartitions per Physical volume for this volume group. 

While the use of the -t option may allow the administrator to successfully extend the volume group, what other effect will using this option have? 

A. The boot logical volume would be recreated. 

B. The volume group would need to be varied off to apply the change. 

C. Mirroring would be removed from all logical volumes within the volume group 

D. The number of physical volumes allowed in the volume group will be reduced 

Answer:

197. - (Topic 4) 

An administrator needs to update both VIO Servers in a dual VIO Server environment 

Prior to updating the first VIO Server, what action should be taken on the vSCSI client partitions to ensure they have access to the disk hosted from the secondVIO Server? 

A. Verily that the path to the disk is active using ispath. 

B. The map of the VIO Server environment must be verified with ismap. 

C. The secondary path must be manually redesignated as the primary using chpath. 

D. A snapshot of the disk on thefirst VIO Server must be compared with the second using viosbr. 

Answer:


Q113. - (Topic 4) 

Which of the following is a requirement for EtherChannel using HEA ports? 

A. Dedicated HEA portsare supported as primary adapters when they are configured at different speeds within a single EtherChannel. 

B. HEA logical ports can only be used as a backup adapter when the physical ports are configured as primary adapters in an EtherChannel. 

C. When using HEA logical ports as primary adapters in an EtherChannel, the underlying physical ports must be in an EtherChannel at the switch level. 

D. The 'Internet Address to Ping' attribute must be enabled for logical HEA ports when the EtherChannel only includes primary adapters running at full duplex. 

Answer:


Q114. - (Topic 4) 

Given the following output, what is the most likely cause for the error shown? 

A. ent0 is part of an EtherChannel. 

B. ent0 is not connected to a switch. 

C. Thenetwork that ent0 accesses is unavailable. 

D. The SEA providing network connectivity for ent0 is unavailable. 

Answer:


Q115. - (Topic 3) 

What is the supported process to correct filesystem corruption which prevents a normal boot? 

A. Boot the system into a maintenance shell Access the volume group and start a shell before mounting the file systems Run fsck on the rootvg filesystems Exit shell Sync and reboot 

B. Boot the system into a maintenance shell Access the volume group and start a shell Run fsck on the rooWg filesystems Exit shell Sync and reboot 

C. Boot the system into a restricted shell Access thevolume group and start a shell before mounting the file systems Run fsck on the rootvg filesystems Exit shell Sync and reboot 

D. Boot the system into a restricted shell Access the volume group and start a shell Run fsck on the rootvg filesystems Exit shell Sync and reboot 

Answer:


Q116. - (Topic 4) 

When migrating an LPAR utilizing Live Partition Mobility (LPM), which statement is correct? 

A. The source and destination systems must be managed by different HMC devices. 

B. The destination system must have the same virtual adapter slots free on its VIO Server as the source system. 

C. Physical disk attributes for backing devices must have the same reservation policy set on both source and target VIO Servers. 

D. LPARs with dedicated I/O adapters can be migrated using LPM, provided the same dedicated I/O adapters are available on the destination system. 

Answer:


Q117. - (Topic 3) 

Which command will show the status of Geographically Mirrored Volume Groups? 

A. gmvgstat 

B. geovgstat 

C. Isglvm 

D. listgm 

Answer:

135. - (Topic 3) 

Which startup script will mount all filesystems in /etc/filesystems for which the mount parameter is set to 'true'? 

A. /etc/rc 

B. /etc/red 

C. /sbin/rc.start 

D. /etc/rc.bootc 

Answer:


Q118. - (Topic 4) 

What is the minimum version of AIX that is supported as a Versioned WPAR on an AIX 7.1 system? 

A. AIX 5.3 TL12 SP4 

B. AIX 5.2 TL10 SP8 

C. AIX 6.1 TL3 SP2 

D. AIX 5.1 ML8 

Answer:


Q119. - (Topic 3) 

Automated scripts on an AIX system require secure non-root access to another AIX instance. Secure Shell (SSH) was the method chosen and installed on both systems. How can an administrator use SSH to create secure automated jobs without storing passwords in the automated scripts? 

A. issue ssh-keygen -t dsa on the source as non-root user append source id_dsa.pub contents to target /etc/ssh/sshd_config file restart sshd daemon 

B. issue ssh-keygen -t dsa on the source as root append source id_dsa.pub contents to /etc/ssh/ssh_config file on the target restart sshd daemon 

C. issue ssh-keygen -t dsa on the source as non-root user append source id_dsa.pub contents to the authorized_keys file on the target restartsshd daemon 

D. issue ssh-keygen -t dsa on the source as non-root user append source id_dsa.pub contents to the authorized_keys file on the target 

Answer:


Q120. - (Topic 4) 

What are the three basic elements of RBAC in AIX? 

A. Groups, Keys and Access 

B. Keys, Privileges and Groups 

C. Users, Groups and KeyStore 

D. Roles, Privileges and Authorizations 

Answer: