| 1. | The kernel consists of which of the following? 
 
  | The shell and environment variables 
  |   
  | A small static core and many dynamically loadable modules 
  |   
  | Boot PROM and the operating system 
  |   
  |  |  
  
 | 
| 2. | What are the characteristics of changing to the single user run level? Choose all that apply. 
 
  | Equivalent to run level S. 
  |   
  |  |   
  | All users are logged out. 
  |   
  | File systems remain mounted. 
  |  
  
 | 
| 3. | Which daemon is responsible for maintaining system services? 
 
 | 
| 4. | Which of the following is a service identifier used to identify a specific service within the Solaris Management Facility? 
 
  |  |   
  |  |   
  | svc:/system/filesystem/local:default 
  |   
  | /var/svc/manifest/milestone/multi-user.xml 
  |  
  
 | 
| 5. | Which service state indicates that a service is not configured to startup and run? 
 
 | 
| 6. | Which of the following restricts the set of operations that users are allowed to perform at the OpenBoot prompt? 
 
 | 
| 7. | The bootstrap procedure consists of which of the following basic phases? Choose all that apply. 
 
  |  |   
  | Automatically boot the system if the auto-boot? parameter is set to true. 
  |   
  |  |   
  | Execute power-on self-test (POST). 
  |  
  
 | 
| 8. | What is the best command to find your hardware platform and current operating system release? 
 
 | 
| 9. | What information will you need during the installation process? Choose all that apply. 
 
 | 
| 10. | Which of the following conditions will prevent a patch from being installed? Choose all that apply. 
 
  | The patch being installed requires another patch that is not installed. 
  |   
  | The patch is incompatible with another, already installed patch. 
  |   
  |  |   
  | The patch version is not the most up-to-date version. 
  |  
  
 | 
| 11. | What does the pkgchk command do? 
 
  | Displays information about software packages installed on the system 
  |   
  | Stores answers in a response file so that they can be supplied automatically during an installation 
  |   
  | Determines the accuracy of a software package installation 
  |   
  | Used to determine whether the contents or attributes of a file have changed since it was installed with the package 
  |  
  
 | 
| 12. | In the Solaris Management Console, what is the field that corresponds to the maximum number of days an account can go without being accessed before it is automatically locked? 
 
 | 
| 13. | Respectively, what are the user initialization files for the Bourne, Korn, and C shell? 
 
  |  |   
  |  |   
  | .profile, .profile, .login. 
  |   
  | .profile works for all shells. 
  |  
  
 | 
| 14. | Which of the following file systems can reside on a local physical disk? Choose all that apply. 
 
 | 
| 15. | Which file system block contains information about the file system? 
 
 | 
| 16. | To view the capacity of all file systems mounted on a system, which command should you use? 
 
 | 
| 17. | Which command is a friendlier way to create a file system? 
 
 | 
| 18. | Which of the following commands cannot be used to copy file systems? 
 
 | 
| 19. | Which command might you use to see which process is preventing a file system from being unmounted? 
 
 | 
| 20. | Which of the following is an easily guessed password? Choose all that apply. 
 
 | 
| 21. | What would a default umask of 023 set as default permissions on new files? 
 
  | Owner no rights; Group write only; World write and execute only 
  |   
  | Owner read, write, execute; Group read only; World execute only 
  |   
  | Owner read, write; Group read only; World read only 
  |   
  | Owner no rights; Group read and execute only; World read only 
  |  
  
 | 
| 22. | The second field of the /etc/group file is used to store the group password. What is the effect of a group password? 
 
  | Access to each group is granted only to users in a group. 
  |   
  | Users who are not members of the group can access it if they know the password. 
  |   
  | Users who are primary members of the group are required to use the group password to gain access to the group. 
  |   
  | Users who are secondary members of the group are required to use the group password to gain access to the group. 
  |  
  
 | 
| 23. | What would you use the prstat command to do? Choose all that apply. 
 
  | Get information on all the processes for a particular user. 
  |   
  |  |   
  | Determine which processes are consuming the most CPU cycles. 
  |   
  | Change system run levels. 
  |  
  
 | 
| 24. | Which of the following signals kills a process unconditionally? 
 
 | 
| 25. | What does the at command do? 
 
  | Stands for "all terminate"; kills all nonroot processes. 
  |   
  | Runs a batch job once at a specific time in the future. 
  |   
  | Sets a repeating batch job to run at a specific time of day. 
  |   
  | Displays the time of last login for a user. 
  |  
  
 | 
| 26. | If a nonroot user does not want to use the system default printer, how can that user select another printer to be the default? Choose all that apply. 
 
  |  |   
  | Specify the printer in the $HOME/.printers file 
  |   
  |  |   
  |  |   
  | /usr/sadm/admin/bin.printmgr 
  |  
  
 | 
| 27. | Which command(s) could tell you if a print queue is down? Choose all that apply. 
 
 | 
| 28. | What does the command tar xvf /tmp/backup.tar do? Choose all that apply. 
 
  | Extracts the absolute paths of the archives in /tmp/backup.tar, creating new directories and overwriting files if necessary 
  |   
  | Prints a verbose listing of the files and directories in /tmp/backup.tar 
  |   
  | Compresses /tmp/backup.tar 
  |   
  | Archives the current directory and its contents to /tmp/backup.tar 
  |  
  
 | 
| 29. | Which of the following statements about the dd command is false? 
 
  | It quickly converts and copies files with different data formats. 
  |   
  | It can be used to copy an entire file system or partition to tape. 
  |   
  | It can compress files quickly and efficiently. 
  |   
  | It can be used to read standard input from another program to write to tape. 
  |  
  
 | 
| 30. | To what do the directories in /proc correspond? 
 
  |  |   
  | Physical and virtual devices attached to the system 
  |   
  |  |   
  |  |  
  
 | 
| 31. | In Solaris, each disk device is described by which naming conventions? Choose all that apply. 
 
 | 
| 32. | Which statements about Solaris Management Console are false? 
 
  | It provides single console, single login administration of multiple Solaris systems. 
  |   
  | It provides an easy-to-navigate GUI console. 
  |   
  | It has a command-line interface in addition to the GUI controls. 
  |   
  | It uses Role-Based Access Control. 
  |  
  
 | 
| 33. | What can the SMC Toolbox Editor do? Choose all that apply. 
 
  | Suspend, resume, monitor, and control processes. 
  |   
  | Install software packages and patches. 
  |   
  | Schedule, start, and manage jobs. 
  |   
  | View and manage mounts, shares, and usage information. 
  |  
  
 | 
| 34. | Which of the following is a hands-off method to automatically install groups of identical systems? 
 
 | 
| 35. | In the ISO/OSI network reference model, what is the Presentation layer described as? 
 
  | It manages the delivery of data via the data link layer and is used by the transport layer. The most common network layer protocol is IP. 
  |   
  | It determines how to use the network layer to provide a virtual, error-free, point-to-point connection so that host A can send messages to host B and they will arrive uncorrupted and in the correct order. 
  |   
  | It uses the transport layer to establish a connection between processes on different hosts. It handles security and creation of the session. 
  |   
  | It performs functions such as text compression and code or format conversion to try to smooth out differences between hosts. 
  |  
  
 | 
| 36. | Which of the following usually spans more than one network? 
 
 | 
| 37. | How many IP addresses are available to be assigned within a Class C network? 
 
 | 
| 38. | Which pseudo file system resides on a physical disk? 
 
 | 
| 39. | Which command is used to create an install server for use with a custom JumpStart installation? 
 
 | 
| 40. | Network File systems that are mounted read-write or that contain executable files should always be mounted with which of the following options? Choose all that apply. 
 
 | 
| 41. | When you share a file system across the network for the first time, the NFS server must be started. Which command will achieve this? 
 
 | 
| 42. | Which of the following provides a means for selective access to administrative capabilities? Choose all that apply. 
 
  | Giving a user the root password 
  |   
  |  |   
  |  |   
  |  |  
  
 | 
| 43. | You have created a metadevice, d30, which is a mirror of the root filesystem. Which command carries out the necessary setup to complete the operation, by editing /etc/vfstab and /etc/system? 
 
 | 
| 44. | How would you determine the NIS server used by a given machine? 
 
  |  |   
  |  |   
  | Look in the /etc/nsswitch.conf file. 
  |   
  |  |  
  
 | 
| 45. | What file would you edit to make the local /etc/hosts file take precedence over DNS or NIS host lookups? 
 
 | 
| 46. | Which of the following is the method of automatically installing groups of identical systems without any manual intervention? 
 
 | 
| 47. | What command would you use to do a dry run installation to test a JumpStart profile? 
 
 | 
| 48. | Which of the following files would not be used to manually change the hostname of a Solaris system? 
 
 | 
| 49. | Which command would you use to configure the behavior of core files? 
 
  |  |   
  | svcadm restart svc:/system/coreadm:default 
  |   
  |  |   
  |  |  
  
 | 
| 50. | Which command would you use to modify the default crash dump device? 
 
 | 
| 51. | Which of the following would assign the role adminusr to the user bill? 
 
  |  |   
  |  |   
  |  |   
  | modrole u bill r adminusr 
  |  
  
 | 
| 52. | You have created a new zone called apps and need to check on its current state. Which command will display the state of this zone? 
 
 | 
| 53. | Which of the following is not a RBAC database? 
 
 | 
| 54. | Where does the configuration file reside that handles NFS logging? 
 
 | 
| 55. | This RAID configuration maintains duplicate sets of all data on separate disk drives. 
 
 | 
| 56. | This RAID configuration is where data and parity are striped across a set of disks. 
 
 | 
| 57. | This command is used to add a client to the LDAP naming service. 
 
 | 
| 58. | You have made a modification to your syslog configuration to allow extra messages to be logged. Which command will force the syslogd daemon to re-read the configuration file and make the change active? 
 
  |  |   
  | svcadm disable system/system-log 
  |   
  | svcadm refresh system/system-log 
  |   
  |  |  
  
 | 
| 59. | You have inherited a system and you are examining the custom JumpStart file to provide a hands-off installation. One of the parameters specifies archive_location and lists an NFS mount as its parameter. What would this tell you about the custom JumpStart process? 
 
  | The system being installed is being used as a file server and will share the specified file system 
  |   
  | The installation will be making use of a Solaris Flash Archive and the location of the Flash Archive is contained in the parameter 
  |   
  | The system being installed will use this location to backup its existing file system before the installation commences 
  |   
  | This points to the install server where the Solaris CD images can be found 
  |  
  
 | 
| 60. | Your system currently has four state database replicas installed, two on each disk. What happens to a running system if one of the disk drives fails and you lose two of the state database replicas? 
 
  | The system remains running 
  |   
  |  |   
  | The system will not start SVM the next time it boots and must be booted into single user mode. 
  |   
  |  |  
  
 |