Chapter Practice Exam

This exam consists of 60 questions reflecting the material covered in the chapters. The questions are representative of the types of questions you should expect to see on the Solaris exam; however, they are not intended to match exactly what is on the exam. Questions 1–33 pertain to exam CX-310-200 and questions 34–56 pertain to the CX-310-202 exam.

Some of the questions require that you choose the best possible answer. Often, you are asked to identify the best course of action to take in a given situation. The questions require that you read them carefully and thoroughly before you attempt to answer them. It is strongly recommended that you treat this practice exam as if you were taking the actual exam. Time yourself, read carefully, and answer all of the questions to the best of your ability.

The answers to all of the questions appear in the section following the exam. Check your answers against those in the answer section, and then read the explanations provided. You may also want to return to the chapters in the book to review the material associated with your incorrect answers.

Practice Exam Questions

1.

The kernel consists of which of the following?

Image

A. The shell and environment variables

Image

B. A small static core and many dynamically loadable modules

Image

C. Boot PROM and the operating system

Image

D. System milestones

2.

What are the characteristics of changing to the single user run level? Choose all that apply.

Image

A. Equivalent to run level S.

Image

B. Shutdown state.

Image

C. All users are logged out.

Image

D. File systems remain mounted.

3.

Which daemon is responsible for maintaining system services?

Image

A. init

Image

B. inetd

Image

C. startd

Image

D. svc.startd

4.

Which of the following is a service identifier used to identify a specific service within the Solaris Management Facility?

Image

A. milestone

Image

B. lrc:/etc/rc3.d/S90samba

Image

C. svc:/system/filesystem/local:default

Image

D. /var/svc/manifest/milestone/multi-user.xml

5.

Which service state indicates that a service is not configured to startup and run?

Image

A. uninitialized

Image

B. offline

Image

C. disabled

Image

D. degraded

6.

Which of the following restricts the set of operations that users are allowed to perform at the OpenBoot prompt?

Image

A. security-password

Image

B. set-security

Image

C. set-secure

Image

D. security-mode

7.

The bootstrap procedure consists of which of the following basic phases? Choose all that apply.

Image

A. Load the kernel.

Image

B. Automatically boot the system if the auto-boot? parameter is set to true.

Image

C. Hardware power-up.

Image

D. Execute power-on self-test (POST).

8.

What is the best command to find your hardware platform and current operating system release?

Image

A. init -q

Image

B. sysdef

Image

C. uname -a

Image

D. arch

9.

What information will you need during the installation process? Choose all that apply.

Image

A. IP address

Image

B. Product code

Image

C. Timezone

Image

D. Root password

10.

Which of the following conditions will prevent a patch from being installed? Choose all that apply.

Image

A. The patch being installed requires another patch that is not installed.

Image

B. The patch is incompatible with another, already installed patch.

Image

C. The patch was removed.

Image

D. The patch version is not the most up-to-date version.

11.

What does the pkgchk command do?

Image

A. Displays information about software packages installed on the system

Image

B. Stores answers in a response file so that they can be supplied automatically during an installation

Image

C. Determines the accuracy of a software package installation

Image

D. Used to determine whether the contents or attributes of a file have changed since it was installed with the package

12.

In the Solaris Management Console, what is the field that corresponds to the maximum number of days an account can go without being accessed before it is automatically locked?

Image

A. User Must Keep for:

Image

B. Max Inactive

Image

C. User Must Change Within:

Image

D. Expires if Not Used for:

13.

Respectively, what are the user initialization files for the Bourne, Korn, and C shell?

Image

A. .bshrc, .kshrc, .cshrc.

Image

B. .exrc, .profile, .login.

Image

C. .profile, .profile, .login.

Image

D. .profile works for all shells.

14.

Which of the following file systems can reside on a local physical disk? Choose all that apply.

Image

A. HSFS

Image

B. TMPFS

Image

C. UFS

Image

D. NFS

15.

Which file system block contains information about the file system?

Image

A. Boot block

Image

B. Superblock

Image

C. Inode

Image

D. Data block

16.

To view the capacity of all file systems mounted on a system, which command should you use?

Image

A. du -a

Image

B. ls

Image

C. df

Image

D. mountall

17.

Which command is a friendlier way to create a file system?

Image

A. mkfs

Image

B. newfs

Image

C. fsck

Image

D. mknod

18.

Which of the following commands cannot be used to copy file systems?

Image

A. dd

Image

B. ufsdump

Image

C. fsck

Image

D. volcopy

19.

Which command might you use to see which process is preventing a file system from being unmounted?

Image

A. ps

Image

B. mountall

Image

C. fsck

Image

D. fuser

20.

Which of the following is an easily guessed password? Choose all that apply.

Image

A. Britney

Image

B. TnK0Tb!

Image

C. Dietcoke

Image

D. ZunSp0ts

21.

What would a default umask of 023 set as default permissions on new files?

Image

A. Owner no rights; Group write only; World write and execute only

Image

B. Owner read, write, execute; Group read only; World execute only

Image

C. Owner read, write; Group read only; World read only

Image

D. Owner no rights; Group read and execute only; World read only

22.

The second field of the /etc/group file is used to store the group password. What is the effect of a group password?

Image

A. Access to each group is granted only to users in a group.

Image

B. Users who are not members of the group can access it if they know the password.

Image

C. Users who are primary members of the group are required to use the group password to gain access to the group.

Image

D. Users who are secondary members of the group are required to use the group password to gain access to the group.

23.

What would you use the prstat command to do? Choose all that apply.

Image

A. Get information on all the processes for a particular user.

Image

B. Determine disk usage.

Image

C. Determine which processes are consuming the most CPU cycles.

Image

D. Change system run levels.

24.

Which of the following signals kills a process unconditionally?

Image

A. SIGHUP

Image

B. SIGKILL

Image

C. SIGTERM

Image

D. SIGQUIT

25.

What does the at command do?

Image

A. Stands for “all terminate”; kills all nonroot processes.

Image

B. Runs a batch job once at a specific time in the future.

Image

C. Sets a repeating batch job to run at a specific time of day.

Image

D. Displays the time of last login for a user.

26.

If a nonroot user does not want to use the system default printer, how can that user select another printer to be the default? Choose all that apply.

Image

A. lpadmin

Image

B. Specify the printer in the $HOME/.printers file

Image

C. lpstat –d <printername>

Image

D. Set the LPDEST variable

Image

E. /usr/sadm/admin/bin.printmgr

27.

Which command could tell you if a print queue is down?

Image

A. lpadmin

Image

B. lpstat

Image

C. admintool

Image

D. Print Manager

28.

What does the command tar xvf /tmp/backup.tar do? Choose all that apply.

Image

A. Extracts the absolute paths of the archives in /tmp/backup.tar, creating new directories and overwriting files if necessary

Image

B. Prints a verbose listing of the files and directories in /tmp/backup.tar

Image

C. Compresses /tmp/backup.tar

Image

D. Archives the current directory and its contents to /tmp/backup.tar

29.

Which of the following statements about the dd command is false?

Image

A. It quickly converts and copies files with different data formats.

Image

B. It can be used to copy an entire file system or partition to tape.

Image

C. It can compress files quickly and efficiently.

Image

D. It can be used to read standard input from another program to write to tape.

30.

To what do the directories in /proc correspond?

Image

A. File systems

Image

B. Physical and virtual devices attached to the system

Image

C. Active process IDs

Image

D. Active UIDs

31.

In Solaris, each disk device is described by which naming conventions? Choose all that apply.

Image

A. Instance name

Image

B. Physical device name

Image

C. Virtual name

Image

D. Logical device name

32.

Which statements about Solaris Management Console are false?

Image

A. It provides single console, single login administration of multiple Solaris systems.

Image

B. It provides an easy-to-navigate GUI console.

Image

C. It has a command-line interface in addition to the GUI controls.

Image

D. It uses Role-Based Access Control.

33.

What can the SMC Toolbox Editor do? Choose all that apply.

Image

A. Suspend, resume, monitor, and control processes.

Image

B. Install software packages and patches.

Image

C. Schedule, start, and manage jobs.

Image

D. View and manage mounts, shares, and usage information.

34.

Which of the following is a hands-off method to automatically install groups of identical systems?

Image

A. JumpStart

Image

B. Custom JumpStart

Image

C. Interactive Installation

Image

D. Network Install

Image

E. Solaris Flash

35.

In the ISO/OSI network reference model, what is the Presentation layer described as?

Image

A. It manages the delivery of data via the data link layer and is used by the transport layer. The most common network layer protocol is IP.

Image

B. It determines how to use the network layer to provide a virtual, error-free, point-to-point connection so that host A can send messages to host B and they will arrive uncorrupted and in the correct order.

Image

C. It uses the transport layer to establish a connection between processes on different hosts. It handles security and creation of the session.

Image

D. It performs functions such as text compression and code or format conversion to try to smooth out differences between hosts.

36.

Which of the following usually spans more than one network?

Image

A. Switch

Image

B. Router

Image

C. NIC

Image

D. Host

37.

How many IP addresses are available to be assigned within a Class C network?

Image

A. 254

Image

B. 24

Image

C. 65,534

Image

D. None

38.

Which pseudo file system resides on a physical disk?

Image

A. procfs

Image

B. swapfs

Image

C. tmpfs

Image

D. fdfs

39.

Which command is used to create an install server for use with a custom JumpStart installation?

Image

A. check

Image

B. setup_install_server

Image

C. add_install_client

Image

D. setup_install_server -b

40.

Network File systems that are mounted read-write or that contain executable files should always be mounted with which of the following options? Choose all that apply.

Image

A. hard

Image

B. intr

Image

C. soft

Image

D. nointr

41.

When you share a file system across the network for the first time, the NFS server must be started. Which command will achieve this?

Image

A. share

Image

B. svcadm enable nfs/server

Image

C. mountall

Image

D. svcs –l nfs/server

42.

Which of the following provides a means for selective access to administrative capabilities? Choose all that apply.

Image

A. Giving a user the root password

Image

B. Use of the sudo command

Image

C. RBAC

Image

D. usermod

43.

You have created a metadevice, d30, which is a mirror of the root filesystem. Which command carries out the necessary setup to complete the operation, by editing /etc/vfstab and /etc/system?

Image

A. metadb

Image

B. metainit

Image

C. metaroot

Image

D. metaclear

44.

How would you determine the NIS server used by a given machine?

Image

A. Use ypwhich.

Image

B. Use ypcat.

Image

C. Look in the /etc/nsswitch.conf file.

Image

D. Use nisls.

45.

What file would you edit to make the local /etc/hosts file take precedence over DNS or NIS host lookups?

Image

A. /etc/inetd.conf

Image

B. /etc/resolv.conf

Image

C. /etc/defaultrouter

Image

D. /etc/nsswitch.conf

46.

Which of the following is the method of automatically installing groups of identical systems without any manual intervention?

Image

A. JumpStart

Image

B. Custom JumpStart

Image

C. Interactive Installation

Image

D. WAN Boot Install

47.

What command would you use to do a dry run installation to test a JumpStart profile?

Image

A. check

Image

B. patchadd -C

Image

C. fsck

Image

D. pfinstall

48.

Which of the following files would not be used to manually change the hostname of a Solaris system?

Image

A. /etc/inet/hosts

Image

B. /etc/defaultrouter

Image

C. /etc/nodename

Image

D. /etc/net/ticlts/hosts

49.

Which command would you use to configure the behavior of core files?

Image

A. savecore

Image

B. svcadm restart svc:/system/coreadm:default

Image

C. coreadm

Image

D. admcore

50.

Which command would you use to modify the default crash dump device?

Image

A. crashadm

Image

B. dumpadm

Image

C. /var/crash

Image

D. gcore

51.

Which of the following would assign the role adminusr to the user bill?

Image

A. rolemod adminusr –u bill

Image

B. moduser bill –R adminusr

Image

C. usermod –R adminusr bill

Image

D. modrole –u bill –r adminusr

52.

You have created a new zone called apps and need to check on its current state. Which command will display the state of this zone?

Image

A. zoneadm –z apps list -v

Image

B. zlogin apps

Image

C. zlogin –C apps

Image

D. zoneadm –z apps install

53.

Which of the following is not a RBAC database?

Image

A. /etc/security/prof_attr

Image

B. /etc/security/exec_attr

Image

C. /etc/security/user_attr

Image

D. /etc/security/auth_attr

54.

Where does the configuration file reside that handles NFS logging?

Image

A. /etc/nfslog

Image

B. /etc/nfs/nfslog.conf

Image

C. /etc/inetd.conf

Image

D. /etc/default/nfs

55.

This RAID configuration maintains duplicate sets of all data on separate disk drives.

Image

A. RAID 0

Image

B. RAID 1

Image

C. RAID 5

Image

D. RAID 53

56.

This RAID configuration is where data and parity are striped across a set of disks.

Image

A. RAID 0

Image

B. RAID 1

Image

C. RAID 5

Image

D. RAID 10

57.

This command is used to add a client to the LDAP naming service.

Image

A. add_ldap

Image

B. ldapclient

Image

C. add_client ldap

Image

D. ldapinstall

58.

You have made a modification to your syslog configuration to allow extra messages to be logged. Which command will force the syslogd daemon to re-read the configuration file and make the change active?

Image

A. svcs –l system/system-log

Image

B. svcadm disable system/system-log

Image

C. svcadm refresh system/system-log

Image

D. syslogd –HUP

59.

You have inherited a system and you are examining the custom JumpStart file to provide a hands-off installation. One of the parameters specifies archive_location and lists an NFS mount as its parameter. What would this tell you about the custom JumpStart process?

Image

A. The system being installed is being used as a file server and will share the specified file system

Image

B. The installation will be making use of a Solaris Flash Archive and the location of the Flash Archive is contained in the parameter

Image

C. The system being installed will use this location to backup its existing file system before the installation commences

Image

D. This points to the install server where the Solaris CD images can be found

60.

Your system currently has four state database replicas installed, two on each disk. What happens to a running system if one of the disk drives fails and you lose two of the state database replicas?

Image

A. The system remains running

Image

B. The system panics

Image

C. The system will not start SVM the next time it boots and must be booted into single user mode.

Image

D. The system hangs

Practice Exam Answers

1.

C. The kernel consists of a small static core and many dynamically loadable kernel modules. Many kernel modules are loaded automatically at boot time, but for efficiency, others—such as device drivers—are loaded from the disk as needed by the kernel. The shell and environmental variables are user specific and are loaded when each user logs in. The boot PROM is firmware and is considered part of the hardware. The system milestones are part of the operating system, not the kernel. For more information, see Chapter 3, “Perform System Boot and Shutdown Procedures.”

2.

A, C, D. The single-user milestone, also called run level s, is the single-user (system administrator) state. Only root is allowed to log in at the console, and any users logged in are logged out when entering this run level. All file systems previously mounted remain mounted and accessible. All services except the most basic operating system services are shut down in an orderly manner. The shutdown state is referred to as run level 0. For more information, see Chapter 3, “System Startup and Shutdown.”

3.

D. The svc.startd daemon is responsible for maintaining the system services and ensures that the system boots to the correct milestone.

4.

B, C. lrc:/etc/rc3.d/S90samba is the FRMI for a legacy service. svc:/system/filesystem/local:default is an example of service identifier within the SMF. A milestone is a special type of service made up of a defined set of other services, but does not define a specific service. /var/svc/manifest/milestone/multi-user.xml describes the dependencies for a milestone.

5.

C. Disabled indicates that the service is not configured to start up and is not running. Uninitialized is the state of a service before the configuration has been read. Offline indicates that the service is not yet running, but is configured to run. Degraded indicates the service is enabled, but is running at a limited capacity.

6.

D. security-mode restricts the set of operations that users are allowed to perform at the OpenBoot prompt. security-password sets the password, but does not set the security mode that restricts users. set-security and set-secure are not OpenBoot NVRAM variables. For more information, see Chapter 3.

7.

B, C, D. On most Ultra-based systems, the bootstrap procedure consists of some basic phases. First, the system hardware is powered on and the system firmware (PROM) executes a power-on self-test (POST). After the tests have been completed successfully, the firmware attempts to autoboot if the appropriate OpenBoot configuration variable (auto-boot?) has been set to true. Otherwise it enters interactive OpenBoot command mode. The bootstrap procedure does not include loading the kernel. For more information, see Chapter 3.

8.

C. The uname command, with the -a flag set, displays basic information currently available from the system, including hardware platform and current operating system release. The sysdef command outputs the current system definition such as hardware devices, loadable modules, and kernel parameters. The init command is used to start processes from information in the inittab file. The arch command displays the system’s application architecture. For more information, see Chapter 2, “Installing the Solaris 10 Operating Environment.”

9.

A, C, D. The Solaris Installation program prompts you for the following: hostname, IP address, Subnet mask, whether to install Ipv6, name service, whether to use Kerberos network authentication system, timezone, root password, and language. For more information, see Chapter 2.

10.

A, B. A patch might not be installed if it requires another patch that is not installed or if the patch is incompatible with another, previously installed patch. For more information, see Chapter 2.

11.

C, D. The pkgchk command checks the accuracy of a software package installation and can be used to determine whether the contents or attributes of a file have changed since it was installed with the package. Use the pkginfo command to display software package information and use pkgask to store answers for an interactive installation. For more information, see Chapter 2.

12.

D. “Expires if Not Used for:” is the correct option. Select the number of days that can elapse before the user’s password expires if the user does not log in to this account. The “User Must Keep for:” field specifies the minimum number of days a user must wait before changing a password or reusing a previous password. The “User Must Change Within:” field allows you to set the maximum number of days that can elapse before a user must change his password. Max Inactive is an invalid field and does not appear in the SMC. For more information, see Chapter 4, “User and Security Administration.”

13.

C. Bourne and Korn shells initialize with a .profile, whereas the C shell uses .login and .cshrc. For more information, see Chapter 4.

14.

A, C. The High Sierra file system (HSFS) is a read-only file system used on CD-ROMs, and the Unix file system (UFS) is the default disk-based file system used by Solaris. TMPFS resides in memory. Data in this type of file system is destroyed upon reboot. NFS is the Network File System, which is remotely mounted over the network. For more information, see Chapter 1, “Managing File Systems.”

15.

B. The superblock stores much of the information about the file system. The boot block stores information used to boot the system and does not store information about file systems. An inode stores all the information about a file except its name. A storage or data block stores the actual data for each file. For more information, see Chapter 1.

16.

C. The df command and its options can be used to see the capacity of each file system mounted on a system, the amount of space available, and the percentage of space already in use. The ls command is used to list information about files and directories. The du command summarizes disk usage, but does not provide file system capacity information. The mountall command is used to mount all file systems listed in the /etc/vfstab file. For more information, see Chapter 1.

17.

B. The newfs command automatically determines all the necessary parameters to pass to mkfs to construct new file systems. newfs was added in Solaris as a friendly front-end to the mkfs command to make the creation of new file systems easier. The fsck command is used to check and repair file systems. The mknod command is used to create special device files. For more information, see Chapter 1.

18.

C. The fsck command checks and repairs file systems. Any of the others could be used to copy one file system to another. dd is used to convert and copy files reading input, one block at a time. ufsdump is used to perform file system dumps that can be used to copy file systems from one disk slice to another. volcopy is used to make an image copy of a file system. For more information, see Chapter 1.

19.

D. The fuser command can be used to display which processes are using a particular file system. The following example uses the fuser command to find out why /cdrom is busy:

fuser –c -u /cdrom


The fsck command is used to check and repair file systems. The mountall command is used to mount all file systems listed in the /etc/vfstab file. The ps command is used to list system processes and report their status, but it does not identify which file system a process may be accessing. For more information, see Chapter 1.

20.

A, C. Although it is debatable what a “good” password might be, a proper name (Britney) is easy for a password guesser to guess. A password should contain a combination of letters, numbers, and symbols (such as space, comma, period, and so on). Varying case and mixing words can also help expand the number of possibilities that must be covered by a password-guessing program before finding the password. For more information, see Chapter 4.

21.

C. A umask of 023 makes a mask, automatically unsetting those permission bits from otherwise full permissions. Because each digit represents an octal number corresponding respectively to Owner, Group, and World, the permissions displayed by the ls command would be displayed as rw-r--r--. The first three permission bits are rw- (read, write) for Owner, followed by r-- (read only) for Group, and finally r-- (read only) for World. For more information, see Chapter 4.

22.

B. When using the newgrp command to switch your effective group ID, a password is demanded if the group has a password (second field of the /etc/group file) and the user is not listed in /etc/group as being a member of that group. For more information, see Chapter 4.

23.

A, C. The prstat command is used from the command line to monitor system processes. Like the ps command, it provides information on active processes. The difference is that you can specify whether you want information on specific processes, UIDs, CPU IDs, or processor sets. By default, prstat displays information about all processes sorted by CPU usage. For more information, see Chapter 5, “Managing System Processes.”

24.

B. The SIGKILL signal can be sent to a process with kill -9 or kill -SIGKILL. Signal 9 is called a sure, unconditional kill because it cannot be caught or ignored by a process. If the process is still around after a kill -9, it is either hung up in the Unix kernel, waiting for an event such as disk I/O to complete, or you are not the owner of the process. For more information, see Chapter 5.

25.

B. The at command is used to schedule jobs for execution at a later time. Unlike crontab, which schedules a job to happen at regular intervals, a job submitted with at executes once, at the designated time. For more information, see Chapter 5.

26.

B, D. The Print Manager allows the system administrator to set the default printer. If the user doesn’t specify a printer name or class in a valid style, the command checks the printers entry in the /etc/nsswitch.conf file for the search order. By default, the /etc/nsswitch.conf file instructs the command to search the user’s PRINTER or LPDEST environment variable for a default printer name. These variables can be set by the user. If neither environment variable for the default printer is defined, the command checks the .printers file in the user’s home directory for the default printer alias; again, this file can be set up by the user. If the command does not find a default printer alias in the .printers file, it then checks the print client’s /etc/printers.conf file for configuration information. If the printer is not found in the /etc/printers.conf file, the command checks the name service (NIS or NIS+), if any. You must be root or a member of group 14 in order to user the Print Manager or the lpadmin command to set a system default printer. For more information, see Chapter 6.

27.

B. The lpstat -p <printer> command will tell you whether a printer is active or idle, when it was enabled or disabled, and whether it is accepting print requests. The lpadmin command is used to configure the LP print service such as adding printers. Admintool and Print Manager can be used to create and remove printers, but they do not display information about printers. For more information, see Chapter 6.

28.

A, B. This command uses the flags x (extract archive), v (verbose, lists all files and directories extracted), and f (archive is in the file following this argument). If backup.tar has files that specify absolute paths (for example, /etc/shadow), the files will be extracted to disk using the absolute paths. New directories will get created and files will get overwritten, so be careful and be very sure that you trust the creator of a tar file before you extract it as root. For more information, see Chapter 7, “Perform System Backups and Restorations.”

29.

C. The dd command quickly converts and copies files with different data formats, such as differences in block size or record length. dd can be used to copy an entire file system or partition to tape, and can take input from other programs through standard input. It cannot, however, compress files as it copies because it is a byte-by-byte image copy. For more information, see Chapter 7.

30.

C. Each entry in the /proc directory is a decimal number corresponding to a process ID. Each directory in /proc has files that contain more detailed information about that process. For more information, see Chapter 5.

31.

A, B, D. In Solaris, each disk device is described in three ways, using three distinct naming conventions:

Image   Physical device name—Represents the full device pathname in the device information hierarchy.

Image   Instance name—Represents the kernel’s abbreviation name for every possible device on the system.

Image   Logical device name—Used by system administrators with most file system commands to refer to devices.

For more information, see Chapter 1.

32.

C. Although you can find command-line equivalents to SMC tools such as smuser and smgroup, no command-line interface exists for the Solaris Management Console. For more information, see Chapter 4.

33.

A, C, D. The SMC Toolbox Editor manages processes, users, file system mounts and shares, disks, and serial ports; schedules jobs; and has a log viewer. You can also use SMC to install patches, but not to install software. For more information, see Chapter 4.

34.

B, E. The custom JumpStart method of installing the operating system provides a hands-off method to install groups of similar systems automatically and identically. If you use an interactive method to install the operating system (such as JumpStart, Network Install, or an Interactive Installation), you must carry on a dialog with the installation program by answering various questions. Solaris Flash is also a hands-off installation method that enables you to replicate, or clone, a Solaris environment across many similar systems. The master system and the clone systems must have the same kernel architectures. For example, you can use a Solaris Flash archive that was created from a master system that has a sun4u architecture only to install other systems with a sun4u architecture. For more information, see Chapter 2.

35.

D. Answer A describes the Network layer, Answer B describes the Transport layer, and Answer C describes the Session layer. For more information, see Chapter 8, “The Solaris Network Environment.”

36.

B. A router is a machine that forwards packets from one network to another. In other words, the router connects networks, whereas the switch connects computers on the same network. A host can be a router, but this is not usually the case. An NIC (network interface card) is the hardware in a host that allows it to connect to a network. For more information, see Chapter 8.

37.

A. Class C network numbers use 24 bits for the network number and 8 bits for host numbers. A Class C network number occupies the first three bytes of an IP address; only the fourth byte is assigned at the discretion of the network’s owner. The first and last addresses on a network are reserved for the network number and the broadcast address. As such, a Class C network can accommodate a maximum of 254 hosts. For more information, see Chapter 8.

38.

B. The swapfs pseudo file system is either a swap partition on a disk, or a swap file residing in another file system on a disk. The procfs, tmpfs, and fdfs all reside in memory. For more information, see Chapter 9, “Virtual File Systems, Swap Space, and Core Dumps.”

39.

B. The setup_install_server command is used to create an install server for use within a custom JumpStart environment. Answer A is the command to verify the rules file and create the rules.ok file; Answer C is used to set up a client to be able to boot across the network and install using custom JumpStart; and Answer D is the command to set up a boot-only server, which would not contain the Solaris images. For more information, see Chapter 14, “Advanced Installation Procedures.”

40.

A, B. Sun recommends that file systems mounted as read-write, or containing executable files, should always be mounted with the hard option. If you use soft-mounted file systems, unexpected I/O errors can occur. For example, consider a write request. If the NFS server goes down, the pending write request simply gives up, resulting in a corrupted file on the remote file system. A read-write file system should always be mounted with the specified hard and intr options. This lets users make their own decisions about killing hung processes. For more information, see Chapter 9.

41.

B. The correct command to start the NFS server service after the initial share has been configured is svcadm enable nfs/server. Answer A is the command that is entered into /etc/dfs/dfstab to define the share, Answer C is the command to mount all file systems listed in /etc/vfstab, and Answer D is the command to list the details and dependencies of the NFS server service. For more information, see Chapter 9.

42.

B, C. Both sudo and Role-Based Access Control (RBAC) allow the system administrator to assign limited administrative capabilities to non-root users—albeit in different ways. Giving out the root password allows a user full access to all the powers of root, making for very poor security. For more information, see Chapter 11, “Controlling Access and Configuring System Messaging.”

43.

C. The metaroot command is used to carry out the necessary setup for putting a root file system under SVM control. Answer A is the command for creating and managing the state database, Answer B is the command for creating new metadevices, and Answer D is the command for clearing or removing metadevices. For more information, see Chapter 10, “Managing Storage Volumes.”

44.

A. With no arguments, the ypwhich command displays the server currently providing NIS services; that is, the server that the client is bound to. The current NIS master server is determined by running ypwhich –m, which lists all of the maps and the master server for each map. The ypcat command is used to display the contents of a NIS map. /etc/nsswitch.conf is used to determine the order in which data is obtained, and the nisls command is used in NIS+ to display the contents of an object. For more information, see Chapter 12, “Naming Services.”

45.

D. The name service switch, /etc/nsswitch.conf, controls how a client workstation or application obtains network information. In this case, you would edit the /etc/nsswitch.conf file and change the hosts line to read hosts: files dns nis. The file /etc/inetd.conf is used to configure legacy network services, /etc/resolv.conf is used by DNS to identify the DNS lookup servers, and /etc/defaultrouter is used to identify the default route address. For more information, see Chapter 12.

46.

B, D. The Custom JumpStart and WAN Boot (with a Flash Archive) methods of installing the operating system provides a way to install groups of similar systems automatically and identically. If you use the Jump Start or Interactive Install method to install the operating system, you must carry on a dialog with the installation program by answering various questions. For more information, see Chapter 14, “Advanced Installation Procedures.”

47.

D. After you create a profile, you can use the pfinstall command to test it. Testing a class file is sometimes called a dry run installation. By looking at the installation output generated by pfinstall, you can quickly determine whether a class file will do what you expect. The check command is used to verify the rules file, patchadd is used to install operating environment patches to the system, and fsck is the command to use to check the consistency of file systems. For more information, see Chapter 14.

48.

B. The file /etc/defaultrouter is not used in changing the hostname of a Solaris system. For more information, see Chapter 8.

49.

C. The coreadm command is used to configure core file behavior. The savecore command is used to save a memory dump following a reboot of the system—this is because the memory dump will normally be stored temporarily in the system swap space and would be overwritten. The command svcadm restart svc:/system/coreadm:default would restart the coreadm process and admcore is a nonexistent command. For more information, see Chapter 9.

50.

B. dumpadm is the command to use to change the default crash dump device. The crashadm command does not exist and the file /var/crash is the directory normally used for the storing of crash dumps. The gcore command is used to create core files from a running process without damaging that process. For more information, see Chapter 9.

51.

C. The usermod command with the –R flag is used to add role privileges to a user. usermod–R adminusr bill is the correct answer. The commands modrole and moduser do not exist, and the rolemod command is used to modify the specification of a role. For more information, see Chapter 11.

52.

A. The command zoneadm –z apps list –v would display the current status of the zone called apps. Answer B would be used to log in to the apps zone from the global zone, Answer C would be used to log in to the console of zone apps from the global zone, and Answer D is the command that would carry out the installation of zone apps. For more information, see Chapter 13, “Solaris Zones.”

53.

C. /etc/security/user_attr is the correct answer. The correct path for this RBAC database is /etc/user_attr. The other files are valid RBAC database names. For more information, see Chapter 11.

54.

B. /etc/nfs/nfslog.conf is the file that manages NFS logging behavior, although NFS logging is not supported in NFS Version 4. The file /etc/nfslog does not exist. /etc/inetd.conf is used to configure the inetd daemon whilst /etc/default/nfs is the file used to configure default parameters for NFS operation. For more information, see Chapter 9.

55.

B. RAID 1 maintains duplicate sets of all data on separate disk drives. Also known as mirroring. For more information, see Chapter 10, “Managing Storage Volumes.”

56.

C. RAID 5 is where both parity and data are striped across a set of disks. For more information, see Chapter 10.

57.

B. ldapclient is used to add a client to the LDAP naming service. The remaining answers are all nonexistent commands. For more information, see Chapter 12.

58.

C. The command svcadm refresh system/system-log would force the syslogd daemon to re-read its configuration file after a change to the file /etc/syslog.conf had been made. Answer A would list the details and dependencies of the system-log service, answer B would disable the system-log service, and answer D is an invalid option to the syslogd command.

59.

B. The archive_location option indicates that a Solaris Flash Archive is being used to install the system and the parameter specifies the network location of the Flash Archive to use for the installation. For more information, see Chapter 14.

60.

A, C. Because your system still has 50% of the state database replicas intact, the system will remain running. The system will only panic and must be booted into single user-mode if less than 50% of the replicas are available. The system cannot reboot into multi-user mode unless a majority (half + 1) of the total number of state database replicas are available.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset