单选题 A System p administrator is attempting to restore some files from a backup tape. The restore failed. The system administrator suspects the block size of the tape drive is incorrect. Which of the following commands can be used to determine the block size of the backup tape （）
单选题 Following a system boot， the display indicates that previously detected hardware is missing. Which of the following commands would identify the missing hardware（）
单选题 An administrator can create logical volumes and then add file systems to them， or create the file system directly. What is an dvantage of the two-step approach instead of the one-step approach（）
The number of bytes per inode can be specified.
Placement of the filesystem on the disk can be specified.
The jfslog can be specified on creation of the filesystem.
Either a JFS or JFS2 filesystem can be created on the logical volume.
单选题 An administrator is at a remote data center assisting a colleague who is replacing a bad fibre channel adapter. Which command can be used to manage a hot plug slot without powering off or rebooting the server（）
单选题 A System p administrator has created a customized security profile using AIX Security Expert. Which of the following commands will apply this to a system（）
aixpert -f mysec.xml
aixpert -a mysec.xml
chsec -f mysec.xml
chsec -a mysec.xml
单选题 Which of the following commands would a system administrator use to automate monitoring and notification of filling filesystems （）
单选题 A System p administrator is currently working on a problem with IBM Support. The administrator feels that their expectations are not being met on this problem. What is the IBM recommended procedure to ensure that the request is handled appropriately （）
Request to change the severity to 1.
Request to speak to the Duty Manager.
Request to escalate the problem to development.
Call IBM Support again and restart the process
单选题 Which of the following disk protection methods would be used to provide the maximum amount of data availability（）
单选题 An administrator received a call from a user whose PC crashed while using vi to edit a file. The user wants the edited file back. Where should the administrator look for the file（）
oslevel -i grep ML
Your network consists of a single Active Directory domain. The domain contains more than 300 group objects. The group objects are divided between several regional organizational units (OUs). You need to create a list of all groups that have names that begin with the word Sales. Which command should you use? （）