The following study strategies will help you prepare for the exam:
As you read this chapter, you should practice the step-by-step examples on a Solaris 10 system. You should practice the steps until you are able to perform them from memory.
You should make sure you understand each of the attributes associated with a user account, such as the user ID (UID), primary group, default shell, and so on.
You should practice using the command-line tools for adding, modifying, and removing user accounts, and you should pay attention to details. These commands will appear on the Sun exam, so you need to make sure you understand them thoroughly. You should continue practicing these commands until you can perform them from memory. You should modify the account attributes, such as the default shell, group, and UID value. You should modify variables in the initialization files for each user to see the results.
You should pay special attention to the section "Controlling File Access." You need to understand everything discussed in that section because the exam tests heavily on those topics. You should know the commands described and understand permission values that are set on a file or directory.
You should memorize all the configuration files described in this chapter. You won't need to understand how they are structuredjust understand what they are used for and how they can be used to monitor and control security on a system.
Various commands and files are described in the section "Auditing Users." You need to understand the commands and log files that are described in that section. Also, as you read through the "Controlling Network Security" section, you should pay special attention to the concept of trusted hosts and restrictions on superuser access and understand how to restrict these services
You should study the terms at the end of the chapter. These terms might appear in questions on the exam, so you need to understand what they mean.