Aix Interview Question and Answers - Download as Word Doc .doc /.docx), PDF File .pdf), Text File .txt) or read online. Aix Interview Question and Answers. AIX Interview Preparation Basic AIX Questions Answer: boot the server with BOS Cd and go to maintenance mode, access the rootvg. AIX interview questions and answers for freshers and experienced - List of AIX questions with answers that might be asked during an interview - Brief about AIX, .
|Language:||English, Spanish, Dutch|
|Genre:||Science & Research|
|ePub File Size:||19.47 MB|
|PDF File Size:||15.17 MB|
|Distribution:||Free* [*Regsitration Required]|
Most frequently asked top Basic And Advanced IBM AIX interview questions and answers pdf with detailed explanation for competitive examination and entrance . + Ibm Aix Interview Questions and Answers, Question1: How do I know if my volume group is normal, big, or scalable? Question2: How do I create a volume. List of top 50 most frequently asked aix interview questions and answers pdf download free.
You need a HMC if you plan to: What commands should be used? Remove group Using rmgroup command we can remove a group. To create lv of jfs2 of lp size 2. Remove all allocated logical volumes if not mirrored or LV copies if mirrored. What is available state and defined state for the device? Sticky Bits.
A process is a program or command that is actually running on the computer. We use commands to tell the operating system what task you want it to perform. When commands are entered, they are deciphered by a command interpreter also known as a shell , and that task is processed. The operating system can run many different processes at the same time. You can control input by specifying the location from which to gather data. For example, you can specify to read input entered on the keyboard standard input or to read input from a file.
You can control output by specifying where to display or store data. For example, you can specify to write output data to the screen standard output or to write it to a file. It is also possible to combine commands so that the output from one command becomes the input for another command. In this filesystem, the user can create, delete, read, write, and modify the access times of files and directories. The owner or access mode of files and directories cannot be changed.
Each of these server types allows a directory to be exported as a share. SMBFS installation: SMBFS mounting: Stored passwords: Submitted By: D Provide additional SAN cabling. Makes the disk available for use B. Make sure a spare adapter slot is available. What will cause this issue? Which tuning parameters need to be adjusted?
Where can the administrator find out more about this error? The volume group must be created as a Scalable Volume Group. Correct the definition of nameserver1. Remove the domain line. The volume group must be concurrent capable.
D The volume group has at least two LVM mirror pools defined. Memory B. Network C. The files in the directory are larger than 2GB. D The tape was not formatted. The AIX Version 7. The block size was not specified. You trying to add one more pv. Also Read: What are the possible reasons?
Here cfgmgr will run for device configuration. System boot phase 1. This is default run level. Post power on self-test In this post it will do basic hardware checking B.
Base Device Configuration 3. Then kernel will execute. Kernel will execute. Then boot image is moved to memory. Then it will check the boot image E. Then it will start the system by default run level 2. Kernel start the init process.
Then it will check the BLV hd5 in boot device. The paging space hd6 will get start. Run level 2: It contains all of the terminal process and daemons that are run in the multi user environment. Ros kernel init phase 2. Command Q. Display information for SMIT menus. ODM generally used for Maintain the System information. This case that device is moved to defined state. If you want to check the variable entry using command env The above command is used to display the variable details ODM has two kinds of Databases 1.
U should not edit anything in this file. System resource information. Error log 1. PdDv Object class Object: Nim 5. But we cannot see any ODM information in file format.
Available device status will be 1 2. Communications configuration information 5. CuDv Object class Objects: What is available state and defined state for the device? ODM has two states 1. Suppose that installed device is removed from server or hdd has failed. Hardware vital product data information 2.
Software information 3. TCPIP 6. Defined device status will be 0 Suppose we are installing one HDD in server. Pre-defined PdDv 2. Customized CuDv 1. Vital product data for installation and update procedures 4. That device is currently accessible this is available state. Device configuration information 2.
Smit menu 4. New and Complete Overwrite. OR Difference between migration installation and preservation installation? You should not add.
We can see this available and defined device status using odmget command odmget CuDv It will display the customized device status ODM Commands: For object: For object class: New and Complete Overwrite: This is New installation. This info is valid for AIX 4.
AIX 5. Then add the disk to the datavg like: Operating system Updated from lower level to higher level i. Aix 5. Start maintenance mode for recovery B. Desktop options. Start installation with default settings B. Boot image. In this migration Installation. In this installation we can preserve additional directories also. Boot list. Preservation 1. OR How will you change the boot sequence? OR How will you install the boot image?
The following steps will guide you trough the mirroring of an AIX rootvg. Migration 3. Start installation with default settings This is normal installation C. Start maintenance mode for recovery This is used for recover the existing OS problems.
File systems problems. Storage space from physical volumes is divided into physical partitions PPs. Each logical partition has at least one corresponding physical partition. Logical Partition LP: Logical volumes consist of one or more logical partitions LPs.
To remove mirroring. We can create VG by using mkvg commands mkvg —s 32 —y datavg hdisk4 The above command is creating datavg using pv hdisk4 and pp size is 32MB Q. You can have up to three copies of the data located on different physical partitions Q. A more back to the basics option is to create the mirroring by yourself by creating copies of each separate logical volume.
A logical partition and a physical partition always have the same size. After that Quorum will be disabled for the volumegroup. You can add the -S flag to the command which causes the synchronizing of the disks to happen in the background. First you connect hard disk and run the cfgmgr command it will detect the hdd.
How will you check the file systems size? The size of the physical partitions is identical on all disks belonging to the same VG. File system should be unmounted to change lv name. Select VG 2. Notice dumplv. We can also check to make sure there are copies. Do that by performing. Now we can mirror.
If it is. We want to change this to boot to the new drive. Once at command prompt. If hdisk1 is the failing disk. To check VGSA is used for monitoring and maintained data copy synchronization.
For standard volume groups. Such as number of the logical partitions or disk allocation policy. It also includes the information about the properties and status of all Physical and logical volumes that are part of the volume group.
Hd6 paging Q.
For Big volume groups.. The VGSA indicates if a partition contains accurate or stale information. Cpu bound 2. Within 2 seconds. CPU bound Using Topas command we can check the server performance monitor. Top 8 process 2. Along with the page in statistic. Memory bound Using vmstat command we can monitor the memory bound vmstat 2 3 After this command execution.
Memory bound 3. The count is incremented for page ins from page space and file space.
Some error message will appear fork exist failed 3. Network bound 4. Network bound Using topas command we can monitor the network bound. How will the check the performance of the disk? The count is incremented for page outs to page space and for page outs to file space. Along with the page out statistic. List paging space Using lsps command we can view the paging space details lsps —a It will display the paging space details Q. Create paging space 3. How will you list the current paging space configuration and paging usage?
Deactivate paging space 6. In this paging space we can do following things 1. If real memory is getting free. Change paging space 4. Activate paging space 5. This paging space is assigned from HDD space. How will you create the additional paging space? List paging space 2. Change paging space Q. Remove paging space Q. Create Paging space Using mkps command we can create the paging space mkps —s 10 rootvg hdisk2 s. Generally paging name will be paging Paging space is configured for additional system performance i.
How will you increase paging space size? Using chps command we can increase. Group Id? The SUID permission makes a script to run as the user who is the owner of the script. User Id. SUID set. Sticky Bits. If the root user wants to give permissions for some scripts to run by different users.
The paging space is active stage. If a1 is the owner of the script and b2 tries to run the same script. So if any user on the system starts that script. Consider you have a directory " test ". This gives permissions for all the users to read. If the sticky bit is set for a directory. Before removing the paging space. SGID set. If d4 tries to remove Chmod it to This permission set also can make a similar impact.
If sticky bit was not set for the test directory. But now it not possible. You can also set SGID for directories. Create a directory "test". So both b2 and a1 will have access to the file 1. Now any user can create files under the test directory. He can edit. Set password for users 1. Create user Using mkuser command we can create a new user. Consider you have given permission for a directory. List user 3. Now lets make this more intresting and complicated.
Here the script runs under the groups ownership. Change user 4. Create user 2. Remove user 5. Add sticky bit to it. Any files created by any users under this directory will come as follows.
Operation not permitted Q. In this user management we can do following commands 1. List user Using lsuser command we can list the user properties. Change user Using chuser command we can change user properties. Remove user Using rmuser command we can remove the user.
Otherwise any user can change the user password. This not recommended security.
Suppose we want to change the user group to system. Suppose you are changing password from user login. Then you have to set the password for lingam user using command passwd passwd lingam Enter new password: Remove group Using rmgroup command we can remove a group.
Enter the new password: Suppose you are forgotten root password that time what you will do. Like this we can change the password for users. Remove group 1. List group 3. Create group 2. Change group 4. Create group Using mkgroup command we can create the group.
User administration related files The following files are referenced while doing user administration: In this backup command we can specify the day 0 sun — 6 sat.
OR Explain the backup and restore Process? In this chapter we can do following things using backup and restore commands 1.
Shell ora10gr2:!: Restore Using tar and restore command we can restore the data in server. Using tar command we can take normal backup. Backup Using backup and tar command to we can take full backup and incremental backup. While taking rootvg backup we can exclude unwanted file systems in backup process. While you are taking rootvg backup you need to take only few things how will you take?
You can customize this file before issuing the mksysb command or use a procedure to customize this file after the image backup is done. Third block has dummy toc file.
Like this we can restore the data in AIX 3. It is created by the bosboot command. Second block has following things. FS The image. Suppose you not required following file systems in mksysb backup. While creating the rootvg backup. Using tar command we can restore data to server. While taking restvg backup we can exclude unwanted file systems in backup process. Restore rootvg backup Using restore command we can restore the rootvg backup Boot server with bos base operating system Cd. Erase the tape Using tctl command we can rewind.
Like this we can restore the rootvg backup 5. Backup the non rootvg backup Using savevg command we can backup the non rootvg backup Suppose your server has 3 volume groups lsvg Rootvg Datavg Oraclevg Now you want to take datavg backup. The dummy table of contents TOC is used so that the mksysb tape contains the same number of images as a BOS install tape.
Fourth block has data.
Susi Linux. In a directory. AIX 4. And you check the oslevel -s. Now do the following steps. All files will be with. Finally you press F3 to get back and change preview only option no. Represent current directory It will create a. You will get the output It showed ok now you can move to update the TL.
Or use: This is simply done by pointing the location that is referenced by the system to these kernels. During boot AIX system runs the kernel in the following locations: These 15 solved AIX questions will help you prepare for technical interviews and online selection tests during campus placement for freshers and job interviews for professionals. After reading these tricky AIX questions , you can easily attempt the objective type and multiple choice type questions on AIX. Give the brief about AIX.
Explain the login process to the AIX system. List the advantages of Bourne Again Shell or bash.
Bash can run most sh scripts without modification. What is an interactive shell? An interactive shell generally reads from, and writes to, a user's terminal: Bash interactive behavior is started when the bash command is called upon without non-option arguments, except when the option is a string to read from or when the shell is invoked to read from standard input, which allows for positional parameters to be set. Explain the AIX file system. Write the logging in and Out commands in AIX.