老猪@八戒

IT博客 首页 新随笔 联系 聚合 管理
  13 Posts :: 2 Stories :: 3 Comments :: 0 Trackbacks
Test 222: pSeries Administration and Support for AIX 5L V5.3

Section 1 - Planning

   1. Determine device needs (e.g., communication adapters, disk controllers, HBAs, tape drives, CD-ROM drives, etc.)
   2. Determine the AIX OS level compatibility
   3. Determine redundancy requirements for levels of availability (e.g., multiple I/O controllers, multiple communication controllers, multiple processors, multiple power supplies, RAID-level protection, dynamic CPU deallocation, dead gateway detection)
   4. Select appropriate IBM resources for system planning
   5. Describe LPAR and dLPAR features and benefits
   6. Determine disk requirements

Section 2 - AIX Installation and Updates

   1. Install AIX from Media using CDROM or DVD or tape
   2. Describe the NIM installation process and configuration
   3. Identify why install hangs or fails
   4. Identify installation LED codes
   5. Describe the purpose of Trusted Computing Base (TCB)
   6. Describe the Alt Disk installation process and its advantages
   7. Describe the process to clone a system from a mksysb
   8. Describe the differences between migration, preservation, and new and complete overwrite installation
   9. Install software updates (e.g., PTFs)
  10. Describe the options available for adding and removing filesets (e.g., commit, apply, remove, reject)
  11. Describe the AIX installation packaging
  12. Given an operating system or application requirement, select the appropriate AIX installation method
  13. Manage filesets (eg: bffcreate and inutoc)
  14. Identify the operating system maintenance level and installed filesets
  15. Verify integrity of OS (e.g., lppchk and its flags)
  16. Describe the differences between installp and rpm

Section 3 - Boot Process

   1. Describe the boot process (cfgmgr, file system mounts, application startup, rootvg varyon, BIST, POST, boot sector load, login enablement)
   2. Describe the use of the /etc/inittab
   3. Describe LED codes (121, 223, 229, 551, 552, 553, 581, OC31, OC32)
   4. Describe how to recover from a hung boot process
   5. Describe run levels 0 through 9
   6. Describe the use of the following rc.* files (rc.net, rc.tcpip, rc.boot, rc., rc.local)
   7. Show, modify and reset bootlist

Section 4 - Configuration

   1. Describe the function of the ODM and the locations of its files
   2. Query ODM
   3. Describe the function of smit
   4. Describe the process to run a Linux application under AIX
   5. Configure the network using the following: TCP/IP, /etc/hosts, hostname, ifconfig, chdev, route, /etc/resolv.conf, etc/netsvc.conf, no, /etc/ntpd.conf
   6. Configure Ethernet adapter (speed, duplex, virtual ethernet)
   7. Use NFS to import/export file systems (e.g., /etc/exports, biod, nfsd)
   8. Configure, list and modify paging space
   9. Determine/modify existing device configuration
  10. Reconfigure system to move from 32-bit to 64-bit and vice versa
  11. Check for possible exposure in system access files (e.g., /etc/hosts.equiv, .rhosts, .netrc, .forward)

Section 5 - Storage and LVM<

   1. Describe the relationship between physical and logical volumes and volume groups
   2. Describe the relationship between logical volumes and filesystems
   3. Describe the differences between JFS vs. JFS2
   4. Manage volume groups (varyonvg, varoffvg, mkvg, importvg, exportvg, lsvg)
   5. Manage logical volumes
   6. Manage filesystems (mount, fsck, chfs, mkfs, defragfs)
   7. Describe the relationship between physical partition size and physical disk size
   8. List the attributes of volume groups, logical volumes, and filesystems that cannot be changed
   9. Migrate data from one physical volume to another

Section 6 - Monitoring and Tuning

   1. Monitor root mail for error messages
   2. Monitor file systems growth to prevent a full file system
   3. Monitor the error log for hardware and software errors
   4. Use and interpret output from vmstat and sar to determine performance problems
   5. Use /etc/tunables for customization of system parameters
   6. Given system performance problems, select the appropriate tool(s) (e.g., vmstat, iostat, topas, netstat, sar, /proc)
   7. Use and interpret output from netstat and iostat to determine performance problems
   8. Use and interpret the output of /proc commands for problem determination
   9. Configure and monitor syslog for error conditions
  10. Describe the system commands that document current system configuration
  11. Use the Resource System Controller (RSCT) to set up resource and system monitoring
  12. Describe the advantages of using Workload Manager (WLM) for system resource allocation
  13. Describe Partition LoadManager features
  14. Describe how to determine and recover from a full file system

Section 7 - Problem Determination and Resolution

   1. Given a system problem, determine which tool (e.g., errpt, diag, netstat, ifconfig, ping, filemon, traceroute) is appropriate for problem determination
   2. Monitor, interpret and manage the error log using errpt and/or errclear
   3. Identify reasons to monitor the root user's mail
   4. Identify when to use PerfPMRs
   5. Manage a support call with IBM (e.g., open, severity levels, escalation, closing)
   6. Determine how to size and configure dump devices
   7. Describe hot plug processes for replacing devices
   8. Given user problems, determine appropriate actions (e.g., usrck, grpck, file permissions, resetting failed login attempts, user limits)
   9. Given a hardware related problem, identify the probable cause
  10. Given failed disk situations, describe the procedures for replacing the bad disk
  11. Access rootvg in maintenance mode
  12. Use alog to examine boot messages to locate startup problems
  13. Troubleshoot system hangs when trying to start desktop
  14. Troubleshoot error unable to open display

Section 8 - Backup and Recovery / Disaster Recovery

   1. Describe methods of backing up and restoring the operating system (e.g., mksysb)
   2. Describe methods of managing / positioning tape backup media for backup and restore purposes
   3. Describe methods of backing up and restoring data and data structures (savevg and restvg, backup and restore, tar, cpio, pax, mkcd, gzip and gunzip)
   4. Describe methods to list / verify contents of backup media
   5. Describe methods of selectively altering / excluding data during backup and restore process
   6. Identify the elements of disaster recovery plans based on business needs
   7. Describe the differences between full, differential, and incremental backups and their effect on backup and restore windows

Section 9 - Daily Management

   1. Add / delete / alter userids and passwords
   2. Alter default user profiles and limits (i.e., command shell profiles and /etc/security)
   3. Describe methods to monitor and manage processes (e.g., ps, kill, nice, fuser, topas, svmon)
   4. Identify and correct errors in shell script examples
   5. Define AIX file and directory permissions (e.g., user, group, other) and ownership
   6. Define and/or modify file permissions and ownership (e.g., chmod, chown, chgrp)
   7. Describe differences between foreground and background processes
   8. Describe how to check and alter priority of a process
   9. Describe the differences between local and global variables and how to set, unset and show them
  10. Describe how to enable System V printing
  11. Manage the print queuing subsystem
  12. Edit a file using vi
  13. Describe methods to read / create / delete / configure email
  14. Describe use of metacharacters and wildcards within the shell
  15. Describe how to redirect stdin, stdout, and stderr
  16. Use cron to schedule tasks
  17. Control system processes using System Resource Controller (SRC)

posted on 2006-03-06 15:52 老猪@八戒 阅读(441) 评论(0)  编辑 收藏 引用 所属分类: Certify
只有注册用户登录后才能发表评论。