1. | The kernel consists of which of the following?
| The shell and environment variables
| | A small static core and many dynamically loadable modules
| | Boot PROM and the operating system
| | |
|
2. | What are the characteristics of changing to the single user run level? Choose all that apply.
| Equivalent to run level S.
| | | | All users are logged out.
| | File systems remain mounted.
|
|
3. | Which daemon is responsible for maintaining system services?
|
4. | Which of the following is a service identifier used to identify a specific service within the Solaris Management Facility?
| | | | | svc:/system/filesystem/local:default
| | /var/svc/manifest/milestone/multi-user.xml
|
|
5. | Which service state indicates that a service is not configured to startup and run?
|
6. | Which of the following restricts the set of operations that users are allowed to perform at the OpenBoot prompt?
|
7. | The bootstrap procedure consists of which of the following basic phases? Choose all that apply.
| | | Automatically boot the system if the auto-boot? parameter is set to true.
| | | | Execute power-on self-test (POST).
|
|
8. | What is the best command to find your hardware platform and current operating system release?
|
9. | What information will you need during the installation process? Choose all that apply.
|
10. | Which of the following conditions will prevent a patch from being installed? Choose all that apply.
| The patch being installed requires another patch that is not installed.
| | The patch is incompatible with another, already installed patch.
| | | | The patch version is not the most up-to-date version.
|
|
11. | What does the pkgchk command do?
| Displays information about software packages installed on the system
| | Stores answers in a response file so that they can be supplied automatically during an installation
| | Determines the accuracy of a software package installation
| | Used to determine whether the contents or attributes of a file have changed since it was installed with the package
|
|
12. | In the Solaris Management Console, what is the field that corresponds to the maximum number of days an account can go without being accessed before it is automatically locked?
|
13. | Respectively, what are the user initialization files for the Bourne, Korn, and C shell?
| | | | | .profile, .profile, .login.
| | .profile works for all shells.
|
|
14. | Which of the following file systems can reside on a local physical disk? Choose all that apply.
|
15. | Which file system block contains information about the file system?
|
16. | To view the capacity of all file systems mounted on a system, which command should you use?
|
17. | Which command is a friendlier way to create a file system?
|
18. | Which of the following commands cannot be used to copy file systems?
|
19. | Which command might you use to see which process is preventing a file system from being unmounted?
|
20. | Which of the following is an easily guessed password? Choose all that apply.
|
21. | What would a default umask of 023 set as default permissions on new files?
| Owner no rights; Group write only; World write and execute only
| | Owner read, write, execute; Group read only; World execute only
| | Owner read, write; Group read only; World read only
| | Owner no rights; Group read and execute only; World read only
|
|
22. | The second field of the /etc/group file is used to store the group password. What is the effect of a group password?
| Access to each group is granted only to users in a group.
| | Users who are not members of the group can access it if they know the password.
| | Users who are primary members of the group are required to use the group password to gain access to the group.
| | Users who are secondary members of the group are required to use the group password to gain access to the group.
|
|
23. | What would you use the prstat command to do? Choose all that apply.
| Get information on all the processes for a particular user.
| | | | Determine which processes are consuming the most CPU cycles.
| | Change system run levels.
|
|
24. | Which of the following signals kills a process unconditionally?
|
25. | What does the at command do?
| Stands for "all terminate"; kills all nonroot processes.
| | Runs a batch job once at a specific time in the future.
| | Sets a repeating batch job to run at a specific time of day.
| | Displays the time of last login for a user.
|
|
26. | If a nonroot user does not want to use the system default printer, how can that user select another printer to be the default? Choose all that apply.
| | | Specify the printer in the $HOME/.printers file
| | | | | | /usr/sadm/admin/bin.printmgr
|
|
27. | Which command(s) could tell you if a print queue is down? Choose all that apply.
|
28. | What does the command tar xvf /tmp/backup.tar do? Choose all that apply.
| Extracts the absolute paths of the archives in /tmp/backup.tar, creating new directories and overwriting files if necessary
| | Prints a verbose listing of the files and directories in /tmp/backup.tar
| | Compresses /tmp/backup.tar
| | Archives the current directory and its contents to /tmp/backup.tar
|
|
29. | Which of the following statements about the dd command is false?
| It quickly converts and copies files with different data formats.
| | It can be used to copy an entire file system or partition to tape.
| | It can compress files quickly and efficiently.
| | It can be used to read standard input from another program to write to tape.
|
|
30. | To what do the directories in /proc correspond?
| | | Physical and virtual devices attached to the system
| | | | |
|
31. | In Solaris, each disk device is described by which naming conventions? Choose all that apply.
|
32. | Which statements about Solaris Management Console are false?
| It provides single console, single login administration of multiple Solaris systems.
| | It provides an easy-to-navigate GUI console.
| | It has a command-line interface in addition to the GUI controls.
| | It uses Role-Based Access Control.
|
|
33. | What can the SMC Toolbox Editor do? Choose all that apply.
| Suspend, resume, monitor, and control processes.
| | Install software packages and patches.
| | Schedule, start, and manage jobs.
| | View and manage mounts, shares, and usage information.
|
|
34. | Which of the following is a hands-off method to automatically install groups of identical systems?
|
35. | In the ISO/OSI network reference model, what is the Presentation layer described as?
| It manages the delivery of data via the data link layer and is used by the transport layer. The most common network layer protocol is IP.
| | It determines how to use the network layer to provide a virtual, error-free, point-to-point connection so that host A can send messages to host B and they will arrive uncorrupted and in the correct order.
| | It uses the transport layer to establish a connection between processes on different hosts. It handles security and creation of the session.
| | It performs functions such as text compression and code or format conversion to try to smooth out differences between hosts.
|
|
36. | Which of the following usually spans more than one network?
|
37. | How many IP addresses are available to be assigned within a Class C network?
|
38. | Which pseudo file system resides on a physical disk?
|
39. | Which command is used to create an install server for use with a custom JumpStart installation?
|
40. | Network File systems that are mounted read-write or that contain executable files should always be mounted with which of the following options? Choose all that apply.
|
41. | When you share a file system across the network for the first time, the NFS server must be started. Which command will achieve this?
|
42. | Which of the following provides a means for selective access to administrative capabilities? Choose all that apply.
| Giving a user the root password
| | | | | | |
|
43. | You have created a metadevice, d30, which is a mirror of the root filesystem. Which command carries out the necessary setup to complete the operation, by editing /etc/vfstab and /etc/system?
|
44. | How would you determine the NIS server used by a given machine?
| | | | | Look in the /etc/nsswitch.conf file.
| | |
|
45. | What file would you edit to make the local /etc/hosts file take precedence over DNS or NIS host lookups?
|
46. | Which of the following is the method of automatically installing groups of identical systems without any manual intervention?
|
47. | What command would you use to do a dry run installation to test a JumpStart profile?
|
48. | Which of the following files would not be used to manually change the hostname of a Solaris system?
|
49. | Which command would you use to configure the behavior of core files?
| | | svcadm restart svc:/system/coreadm:default
| | | | |
|
50. | Which command would you use to modify the default crash dump device?
|
51. | Which of the following would assign the role adminusr to the user bill?
| | | | | | | modrole u bill r adminusr
|
|
52. | You have created a new zone called apps and need to check on its current state. Which command will display the state of this zone?
|
53. | Which of the following is not a RBAC database?
|
54. | Where does the configuration file reside that handles NFS logging?
|
55. | This RAID configuration maintains duplicate sets of all data on separate disk drives.
|
56. | This RAID configuration is where data and parity are striped across a set of disks.
|
57. | This command is used to add a client to the LDAP naming service.
|
58. | You have made a modification to your syslog configuration to allow extra messages to be logged. Which command will force the syslogd daemon to re-read the configuration file and make the change active?
| | | svcadm disable system/system-log
| | svcadm refresh system/system-log
| | |
|
59. | You have inherited a system and you are examining the custom JumpStart file to provide a hands-off installation. One of the parameters specifies archive_location and lists an NFS mount as its parameter. What would this tell you about the custom JumpStart process?
| The system being installed is being used as a file server and will share the specified file system
| | The installation will be making use of a Solaris Flash Archive and the location of the Flash Archive is contained in the parameter
| | The system being installed will use this location to backup its existing file system before the installation commences
| | This points to the install server where the Solaris CD images can be found
|
|
60. | Your system currently has four state database replicas installed, two on each disk. What happens to a running system if one of the disk drives fails and you lose two of the state database replicas?
| The system remains running
| | | | The system will not start SVM the next time it boots and must be booted into single user mode.
| | |
|