0% found this document useful (0 votes)
17 views48 pages

Online 2 SCRBD

The document contains a series of questions and answers related to Oracle Solaris 11, covering topics such as authentication services, file permissions, ZFS storage pools, backup procedures, and system commands. Each question is followed by the correct answer, providing insights into system administration tasks and configurations. The content is structured in a quiz format, aimed at testing knowledge of Solaris 11 functionalities.

Uploaded by

Mithilesh Tati
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views48 pages

Online 2 SCRBD

The document contains a series of questions and answers related to Oracle Solaris 11, covering topics such as authentication services, file permissions, ZFS storage pools, backup procedures, and system commands. Each question is followed by the correct answer, providing insights into system administration tasks and configurations. The content is structured in a quiz format, aimed at testing knowledge of Solaris 11 functionalities.

Uploaded by

Mithilesh Tati
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 48

QUESTION NO: 83

Select two correct statements about the authentication services available in Oracle Solaris 11.

A.

Pluggable Authentication Modules (PAM) is used to control the operation of services suchconsole logins
and ftp.

B.

The Secure Shell can be configured to allow logins across a network to remote servers
withouttransmitting passwords across the network.

C.

Secure Remote Procedure Calls (Secure RPC) provides a mechanism to encrypt data on anyIP Socket
connection.

D.

Pluggable Authentication Modules (PAM) is used to implement the Secure Shell in OracleSolaris 11.

E.

Simple Authentication and Security Layer (SASL) provides a mechanism to authenticate and encrypt
access to local file system data.

Answer: A,EExplanation:

A: Pluggable Authentication Modules (PAM) are an integral part of theauthentication mechanism for
the Solaris. PAM provides system administrators with the ability andflexibility to choose any
authentication service available on a system to perform end-userauthentication.By using PAM,
applications can perform authentication regardless of what authentication methodis defined by the
system administrator for the given client.PAM enables system administrators to deploy the appropriate
authentication mechanism for eachservice throughout the network. System administrators can also
select one ormultipleauthentication technologies without modifying applications or utilities. PAM
insulatesapplication developers from evolutionary improvements to authentication technologies, while
at thesame time allowing deployed applications to use those improvements.PAM employs run-time
pluggable modules to provide authentication for system entry services.E: The Simple Authentication and
Security Layer (SASL) is a method foradding authentication support to connection-based
protocols.Simple Authentication and Security Layer (SASL) is a framework for authentication and
datasecurity in Internet protocols. It decouples authentication mechanisms from application protocols,in
theory allowing any authentication mechanism supported by SASL to be used in any applicationprotocol
that uses SASL. Authentication mechanisms can also support proxy authorization, afacility allowing one
user to assume the identity of another. They can also provide a data securitylayer offering data integrity
and data confidentiality services. DIGEST-MD5 provides an example ofmechanisms which can provide a
data-security layer. Application protocols that support SASLtypically also support Transport Layer
Security (TLS) to complement the services offered by SASL.Reference: softpanorama.org, Solaris PAM
QUESTION NO: 84

User brian changes the permissions for db_data this command:chmod 4755 db_dataWhat is true?

A.

db_data now has permissions rwsr-xr-x and can be deleted only by user brian.

B.

db_data now has permissions rwsr-xr-x and, if executed, will inn with the permissions of userbrian.

C.

db_data now has permissions rwxr-sr-x and can be deleted only by members of the groupowning it.

D.

The permissions for db_data cannot be determined, because the permissions prior to thechange have
not been specified.

E.

db_data must be an ordinary file, because special permissions cannot be set on a directory.

Answer: C

QUESTION NO: 85

Which three of the components would degrade performance if used in a ZFS storage pool, and are not
recommended configurations?

A.

a file on a UFS file system

B.

a Veritas Volume Manager (VxVM) volume

C.

a LUN in a hardware RAID array

D.

a disk slice from an SMI labeled disk

E.

a Solaris Volume Manager (SVM) volume

F.

an EDI disk
Answer: A,B,E

QUESTION NO: 86

View the Exhibit and review the file system information displayed from a remote server

You are configuring a new server. This new server has the following storage pool configured

This new server also has the following file systems configured:When you are finished building this new
server, the pool1/data dataset must be an exact duplicateof note server. What is the correct procedure
to create the pool1/data dataset on this new server?

A.

zfs create -o mountpoint=/data -o refquota=1g pool1/data


B.

zfs set mountpoint=none pool1zfs create pool1/data

C.

zfs set mountpoint=none pool1zfs create -o mountpoint=/data -o quota=1g pool1/data

D.

zfs create quota=1g pool1/data

E.

zfs create mountpoint=/data pool1/data

F.

zfs set quota=1g pool1/data

Answer: E

QUESTION NO: 87

You have installed an update to the gzip package and need to "undo" .ho update and return thepackage
to its "as-delivered" condition. Which command would you use?

A.

pkg undo

B.

pkgrevert

C.

pkg fix

D.

pkg uninstall

Answer: B

UESTION NO: 88

To confirm the IP address and netmask have been correctly configured on the network interfaceswhich
command should you use?
A.

ipdilm show-if

B.

ipadm show-nic

C.

ipadm show-addr

D.

ipadm show-ifconfig

E.

ipadm show-addripadm show-mask

Answer: C

QUESTION NO: 89

You are the administrator of a system that a large number of developers work on. Thesedevelopers
crash the system, and their applications, on a regular basis.What command would you use to configure
where the core files are saved?

A.

savecore

B.

dumpadm

C.

svcadm

D.

proc

E.

coreadm

Answer: E
QUESTION NO: 90

Which option displays the result of running the zfs list command?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Answer: B
QUESTION NO: 91

Which network protocol provides connectionless, packet-oriented communication


betweenapplications?

A.

TCP

B.

UDP

C.

IP

D.

ICMP

E.

NFS

F.

IPSec

Answer: B

QUESTION NO: 92

A datalink can best be described as______.

A.

a driver for a Network Interface Card

B.

the software connecting the Internet Layer and the Physical Layer

C.

a device that provides Classless Inter-Domain Routing

D.

a logical object used for IP Multipathing

E.

a device instance
Answer: E

QUESTION NO: 93

View the exhibit to inspect the file system configuration on your server.Exhibit: *Missing*Your
department's backup policy is to perform a full backup to a remote system disk on Saturday. OnSunday
through Friday, you are to perform an incremental backup to the same remote system disk.

Each incremental backup will contain only data that has been modified since the previousSaturday
backup.

The server file systems must remain available at all times and can never be taken offline,

The backup must not only provide for the recovery of the most recent version of a file, but mustalso
allow recovery of previous versions of a file created since Saturday's full backup.Following your company
policy, which option describes a valid procedure for backing up the /datafile system to a remote disk
named /remote/backup?

A.

On Saturday:zfs create snapshot pool1/data@sat.zfs send pool1/data@sat > /remote/backup/fullOn


each weekday:Remove the previous daily snapshot.zfs snapshot pool1/data@dailyzfs send -i
pool1/data@sat pool1/data@daily > /remote/backup/full

B.

On Saturday:zfs create snapshot pool1/data@sat.zfs send pool1/data@sat | zfs recv


remote/backup/'date '+%m%d%Y' 'On each weekday:Remove the previous daily snapshot.zfs create
pool1/data@dailyzfs send -i pool1/data@sat pool1/data@daily | zfs recv remote/backupd%y' '

C.

On Saturday:zfs snapshot pool1/data@satzfs send pool1/data@sat > /remote/backup/fullOn each


weekday:Remove the previous daily snapshot.zfs snapshot pool1/data@dailyzfs send -i pool1/data@sat
pool1/data@daily > /remote/backup/daily

D.

On Saturday:zfs create snapshot pool1/data@satzfs send pool1/data@sat | zfs recv remote/backupOn


each weekday:Remove the previous daily snapshot.zfs create -i pool1/data@sat pool1/data@dailyzfs
send pool1/data@daily | zfs recv remote/backup

E.
On Saturday:zfs snapshot pool1/data@satzfs pool1/data@sat > /remote/backup/fullOn each
weekday:Remove the previous daily snapshot.zfs snapshot pool1/data@dailyzfs send -i pool1/data@sat
pool1/data@daily > /remote/backup/full

Answer: C

QUESTION NO: 94

A user account must be a member of a primary group, and may also be a member of one or
moresecondary groups. What is the maximum total number of groups that one user can
concurrentlybelong to?

A.

15

B.

16

C.

17

D.

63

E.

64

F.

65

G.

The number of groups one user can concurrently belong to is unlimited in Solaris 11.

Answer: B

QUESTION NO: 95

Identify three differences between the shutdown and init commands.

A.

init shuts a system down faster than the shutdown command.


B.

Only shutdown broadcasts a final shutdown warning to all fogged in users.

C.

init does not terminate all services normally. The shutdown command performs a t shutdown ofall
services.

D.

The shutdown command can only bring the system to the single-user milestone. The commandmust be
used to shut the system down to run level 0.

E.

The shutdown sends a shutdown message to any systems that are mounting resource-tern thatis being
shut down.

F.

The shutdown command will shut the system down and turn off power; init will only shut systemdown.

Answer: A,B,E

QUESTION NO: 96

View the exhibit.

The configuration information in the exhibit is displayed on your system immediately after installing

the OS. Choose the option that describes the selection made during the Installation of the OS toobtain
this configuration.

A.

The automatic network configuration option was chosen during the installation of the OS.

B.

The manual network configuration option was chosen during the installation of the OS.

C.
The network was not configured during the installation of the OS.

D.

The DHCP network configuration option was chosen during the Installation of the OS.

Answer: A

QUESTION NO: 97

Which command would you use to determine which package group is installed on your system?

A.

pkg list group/system/\*

B.

pkg info

C.

uname -a

D.

cat /var/sadm/system/admin/CLUSTEP

Answer: B

QUESTION NO: 98

Oracle Solaris 11 kernel encounters a fatal error, and it results in a system panic. What type of filedoes
this generate?

A.

a.out

B.

objdump

C.

core dump

D.
tapedump

E.

crash dump

Answer: C

QUESTION NO: 99

The following information is displayed for the svc:/network/ssh service:

Which describes the minimum set of commands to be executed to bring the svc: /network/ssh:default
service back online?

A.

svcadm refresh svc:/network/ssh:default

B.

svcadm restart svc:/network/ssh:default

C.

svcadm enable svc:/system/cryptosvc

D.
svcadm enable svc:/system/cryptosvcsvcadm enable svc:/network/ipfilter:defaultsvcadm
enablesvc:/network/ssh:default

E.

svcadm enable svc:/system/cryptosvcsvcadm enable svc:/network/ipfilter:defaultsvcadm


refreshsvc:/network/ssh:default

F.

svcadm restart svc:/system/cryptosvcsvcadm restart svc:/network/ipfilter:defaultsvcadm


restartsvc:/network/ssh:default

G.

svcadm enable svc:/system/ssh:default

Answer: D

QUESTION NO: 100

You are the administrator for a group of shell script developers. They use vi, and have asked youto make
their scripts automatically executable when they save their files.How can this be accomplished?

A.

Enter set -o vi on the command line, or include it in each user's startup script.

B.

Enter umask -s on the command line, or include it in each user's startup script.

C.

Enter umask 000 on the command line, or include it in each user's startup script.

D.

Enter umask 777 on the command line, or include it in each user's startup script.

E.

It is not possible to automatically set the execute bit on with the umask setting, or vi option.

F.

Enter umask 766 the command line, or include it in the global startup script for the default shell.

Answer: C

QUESTION NO: 101


You have connected a new printer at a fixed IP address.It appears to work correctly most of the time,
but at other times does not respondYou suspect that the assigned address may not be unique within the
network.What command will be useful to confirm this?

A.

arp

B.

netstat

C.

ipadm show-if

D.

dladm show-addr

E.

ipadm show-addr

Answer: E

QUESTION NO: 102

Your server has a ZFS storage pool that is configured as follows:

The server has two spate 140-GB disk drives: c3t5d0 c3t6d0Which command would add redundancy to
the pool1 storage pool?

A.

zpool attach pool1 c3t5d0 c3t6d0

B.

zpool attach pool1 c3t3d0 c3c5d0; zpoo1 attach pool1 c3t4d0 c3t6d0
C.

zpool mirror pool1 c3t5d0 c3t6d0

D.

zpool add pool1 mirror c3t5d0 c3t6d0

E.

zpool add raidz pool1 c3t5d0 c3t6d0

Answer: A

QUESTION NO: 103

A user on the system has started a process, but it needs to be terminated.

The process ID was determined as follows:pgrep userprograml5317The user attempted to terminate the
program as follows:pkill 15317This command runs without an error message, and the process continues
to run.What is the issue?

A.

You need to run the pkill command with the process name.

B.

You need to switch to super user to kill the process.

C.

You need to run the ps command to get more information.

D.

You need to run the prstat command to get more information.

Answer: B

QUESTION NO: 104

You are logged in to a Solaris 11 system as user jack. You issue the following sequence ofcommands:
Identify two correct statements.

A.

You have the effective privilege of the account root.

B.

Your GID is 10.

C.

Your home directory is /root.

D.

You are running the shell specified for the account root.

E.

Your UID is 1.

Answer: A,B

QUESTION NO: 105

.Which two are user definable OpenBoot parameters that can be set in the OpenBoot PROM?

A.

IP address for the system console

B.

host ID

C.

system date and time

D.

default boot device

E.

verbose hardware diagnostics

F.

powering off the hardware

Answer: D,E
QUESTION NO: 106

Which two capabilities are provided by the OpenBoot PROM?

A.

a command to safely shut down the system

B.

hardware testing and initialization

C.

booting from a disk or network

D.

starting the GRUB loader

Answer: B,C

QUESTION NO: 107

On which is the open boot prom available?

A.

x86 only

B.

x86 64-Bit only

C.

SPARC only

D.

both x86 and x86 64-Bit

E.

x86, x86 64-Bit and SPARC

Answer: C
QUESTION NO: 108

Review the storage pool information:

Which statement describes the status of this storage pool?

A.

It is a RAIDZ storage pool and can withstand a single disk failure; data will be striped at:
diskcomponents.

B.

It is a double-parity RAIDZ storage pool and can withstand two disk failures; data will be stripedacross
four disk components.

C.

It is an improperly configured RAIDZ storage pool; data will be striped across four diskcomponents, but
only three drives are protected with redundancy.

D.

It is an improperly configured RAIDZ storage pool; data will be striped across three diskcomponents, but
only three drives are protected with redundancy.

Answer: D

QUESTION NO: 109

Which two statements describe the COMSTAR framework available in Oracle Solaris 11?

A.

It converts an Oracle Solaris 11 host into a SCSI target device that can be accessed over astorage
network by Linux, Mac OS, or Windows client systems.

B.
iSCSI targets cannot be configured as dump devices.

C.

It provides support for iSCSI devices that use SLP.

D.

It is used to connect to Fibre Channel or iSCSI Storage Area Network (SAN) environments.

E.

It provides an upgrade and update path to convert your iSCSI LUNs from Solaris 10 systems.

Answer: A,B

QUESTION NO: 110

Review the non-global zone configuration displayed below:

The global zone has 1024 MB of physical memory. You need to limit the non-global zone so that ituses
no more than 500 MB of the global zone's physical memory. Which option would youchoose?
A.

Option A

B.

OptionB

C.

Option C

D.

Option D

E.

Option E

Answer: C
QUESTION NO: 111

You are troubleshooting interface net3 and you enter the following sequence of commands:Your next
command should be:

A.

ipadm up-addr net3/v4

B.

ipadm enable-if -T net3

C.

<ipadm create-vnic -a 192.168.1.25/24 net3/v4

D.

ipadm create-ip -T static -a 192.168.1.25/24 -n net3

E.

ipadm create-addr -T static -a 192.168.1.25/24 net3

Answer: E

QUESTION NO: 112

The storage pool configuration on your server is:You back up the /pool1/data file system, creating a
snapshot and copying that snapshot to tape(/dev/rmt/0). You perform a full backup on Sunday night
and Incremental backups on Mondaythrough Saturday night at 11:00 pm. Each incremental backup will
copy only the data that hasbeen modified since the Sunday backup was started.On Thursday, at 10:00
am, you had a disk failure. You replaced the disk drive (c4t0d0). Youcreated pool (pool1) on that
disk.Which option would you select to restore the data in the /pool1/data file system?
A.

zfs create pool1/dataLoad the Monday tape and enter:zfs recv pool1/data < /dev/rmt/0Load
theWednesday tape and enter:zfs recv -F pool1/data < /dev/rmt/0

B.

Load the Sunday tape and restore the Sunday snapshot:zfs recv pooll/data < /dev/rmt/0zfsrollback
pool1/data@monLoad the Wednesday tape and restore the Wednesday snapshot:zfsrecv -i pooll/data <
/dev/rmt/0zfs rollback pool1/data@wed

C.

zfs create pooll/dataLoad the Wednesday tape and enter:zfs recv -F pool1/data < /dev/rmt/0

D.

Load the Sunday tape and enter:zfs recv pool1/data < /dev/rmt/0Load the Wednesday tape andenter:*
commands missing*

Answer: D

Question

In Oracle Solaris 11, where is the Oracle default repository located?

A.

/var/spool/pkg

B.

http://localhost/solaris

C.

http://pkg.oracle.com/solaris/release

D.

http://www.oracle.com/Solaris/download

E.

/cdrom/cdrom0
Answer:C

QUESTION NO: 114

Which two are implemented using the Internet Control Message Protocol (ICMP)?

A.

ping

B.

DHCP

C.

HTTP

D.

telnet

E.

syslog

F.

Traceroute

QUESTION NO: 115

Review the information taken from your server:Which option describes the command used to create
these snapshots of the root file system?

A.

zfs snapshot -r rpool@BEI


B.

beadm create -n BE1

C.

zfs snapshot -r BE1 rpool

D.

zfs snapshot rpool BEI

E.

zfs snapshot rpool@BEl rpool/ROOT@BEl rpool/ROOT/solaris@BEl


\rpool/ROOT/dump@BEIrpocl/ROOT/export@BEl \rpool/ROOT/export/home@BEl
rpaol/ROOT/swap@BEI:

Answer: A

QUESTION NO: 116

XJ notice that the /var/.dm/messages file has become very large. Typically, this is managed by acrontab
entry. Which entry should be in the root's crontab file?

A.

10 3 * * * /usr/adm/messages

B.

10 3 * * * /usr/sbin/logadm

C.

10 3 * * * /usr/sbin/syslogrotate

D.

10 3 * * * /usi/sbin/logrotate

E.

10 3 * * * /usr/sbin/messages

Answer: B

QUESTION NO: 117

user1 is attempting to run the following command:cp bigfile verybigThe system displays the following
errer:cp: cannot create verybig: Disc quota exceededYour initial troubleshooting shows that the df -h
command indicates the account is at 100%capacity. What command would you use to determine how
much disk space the user has available?

A.

zfs get quota rpool/export/home/user1

B.

zfs userused@user1

C.

zfs quota=1M /rpool/export/home/user1

D.

df -h | grep user1

Answer: AExplanation:

ZFS quotas can be set and displayed by using the zfs set and zfs get commands. Inthe following
example, a quota of 10 Gbytes is set on tank/home/bonwick.# zfs set quota=10G tank/home/bonwick#
zfs get quota tank/home/bonwickNAME PROPERTY VALUE SOURCEtank/home/bonwick quota 10.0G
localReference: ZFS Quotas and Reservations

QUESTION NO: 118

Select the packet type that identifies members of the group and sends information to all thenetwork
interfaces in that group.

A.

Unicast

B.

Multicast

C.

Broadcast

D.

Bayesian

E.

Quality of Service Priority

Answer: B
IPv6 defines three address types:unicastIdentifies an interface of an individual node.multicastIdentifies
a group of interfaces, usually on different nodes. Packets that are sent to the multicastaddress go to all
members of the multicast group."Pass Any Exam. Any Time." - www.TwPass.com98

QUESTION NO: 119

The current ZFS configuration on your server is:pool1 124K 3.91G 32K /pool1pool1/data 31K 3.91G 31K
/dataYou need to create a new file system named /data2. /data2 will be a copy of the /data file
system.You need to conserve disk space on this server whenever possible.Which option should you
choose to create /data2, which will be a read writeable copy of the /datafile system, while minimizing
the amount of total disk space used in pool1?

A.

zfs set mountpoint=/data2 compression=on pool1/data2

B.

zfs snapshot pool1/data@nowzfs set mountpoint=/data2,comptession=on pool1/data@now

C.

zfs create snapshot pool1/data@nowzfs send pool1/data@now | zfs recv pool1/data2

D.

zfs create snapshot pool1/data@nowzfs clone -o mountpoint=/data2 pool1/data@nowpool1/data2

E.

zfs snapshot pool1/data@nowzfs clone -o mountpoint=/data2 -ocompression=onpool1/data@now


pool1/data2

F.

zfs snapshot pool1/data@nowzfs clone -o mountpoint=/data2 pool1/data@now pool1/data2

Answer: E

QUESTION NO: 120

You wish to troubleshoot some issues that you are having on the system. You want to monitor
the/var/adm/messages file in real time. Which command would you use to do this?

A.

head

B.

tail
C.

cat

D.

file

E.

test

Answer: BExplanation:

Tail

Which two options describe how to override the default boot behavior of an Oracle Solaris 11SPARC
system to boot the system to the single-user milestone?

A.

from the ok prompt, issue this command:boot -m milestone=single-user

B.

From the ok prompt, issue this command:boot -m milestone/single-user

C.

From the ok prompt, issue this command:boot -milestone=single-user

D.

From the ok prompt. issue this command:boot -s

E.

From from the ok prompt, issue this command:boot -m milestone=s

Answer: A,D

Which two options describe how to override the default boot behavior of an Oracle Solaris 11SPARC
system to boot the system to the single-user milestone?

A.

from the ok prompt, issue this command:boot -m milestone=single-user

B.
From the ok prompt, issue this command:boot -m milestone/single-user

C.

From the ok prompt, issue this command:boot -milestone=single-user

D.

From the ok prompt. issue this command:boot -s

E.

From from the ok prompt, issue this command:boot -m milestone=s

Answer: A,D

QUESTION NO: 122

In a default standalone installation of Oracle Solaris 11, what is the default minimum length incharacters
of a user password, and where is the minimum password length defined?

A.

Default minimum length is 8, and is defined in /etc/default/password.

B.

Default minimum length is 6, and is defined in /etc/default/password.

C.

Default minimum length is 8, and is defined in /etc/shadow.

D.

Defaultminimum length is 6, and is defined in /etc/shadow.

E.

Default minimum length is 8, and is defined in /usr/sadm/defadduser.

F.

Default minimum length is 6, and is defined in /usr/sadm/defadduser.

Answer: B

QUESTION NO: 123

Which four can the SMF notification framework be configured to monitor and report?
A.

all service transition states

B.

service dependencies that have stopped or faulted

C.

service configuration modifications

D.

legacy services that have not started

E.

services that have been disabled

F.

service fault management events

G.

processes that have been killed

Answer: A,E,F,G

QUESTION NO: 124

You have been asked to do an orderly shutdown on a process with a PID of 1234, with the killcommand.
Which command is best?

A.

kill -2 1234

B.

kill -15 1234

C.

kill -9 1234

D.

kill -11234

Answer: B
QUESTION NO: 125

user1, while in his home directory, is attempting to run the following command in his homedirectory: cp
bigfile verybigThe system displays the following error:cp: cannot create verybig: Disc quota exceeded

Your initial troubleshooting shows that the df -h command indicates he is at 100% capacity.
Whatcommand would you use to increase the disk space available to the user?

A.

zfs get quota rpool/export/home/user1

B.

zfs userused@user1

C.

zfs quota=none /rpool/export/home/user1

D.

df -h | grep user1

E.

zfs set quota=none /rpool/export/home/user1

Answer: E

QUESTION NO: 126

You need to install the gzip software package on your system. Which command would you use tofind
the software package in the configured repository?

A.

pkg search gzip

B.

pkg info gzip

C.

pkg contents gzip

D.

pkginfo gzip

E.

yumlist gzip
Answer: A

QUESTION NO: 127

What is the result of executing the following command?svcs -d svc:/network/ssh:default

A.

disables the svc:/network/ssh:default service

B.

displays the services that svc: /network/ssh:default is dependent on

C.

displays the services that are dependent on the svc: /network/ssh:default service

D.

deletes the svc: /network/ssh:default service

Answer: B

QUESTION NO: 128

Which two accurately describe the Solaris IPS repository?

A.

It contains a collection of operating system patches.

B.

Itcontains a collection of software packages.

C.

All packages within an IPS package repository reside in a catalog.

D.

It is an ISO image of the Solaris installation media.

E.

The packages in a catalog are associated with a specific publisher.

Answer: B,E
QUESTION NO: 129

Which operation will fail if the DNS configuration is incorrect?

A.

domainname

B.

ping localhost.

C.

ping 192.168.1.1

D.

ping 23.45.82.174

E.

ping www.oracle.com.

F.

cat /etc/resolv.conf

Answer: E

QUESTION NO: 130

You have a process called bigscript, and you need to know the PID number for this process.Which
command will provide that information?

A.

pkill bigscript

B.

ps bigscript

C.

pgrep bigscript

D.

prstatbigscript

Answer: C
QUESTION NO: 131

Server A, Server B, and Server C are connected to the same network switch and are on the sariEach
server has a single network interface, net0.You received a tech support call that Server B has lost
network connectivity. Your troubleshootinghas discovered:Server A can ping Server C, but not Server
B.Server B can ping localhost, but not Server A or C.Server C can ping Server A, but not Server B.On
Server F3, you enter the following command:dladm show-phys | grep net0

Response:net0/v4 Ethernet down 0 unknown el00glWhat is the next logical troubleshooting action?

A.

Run arp -a on all servers.

B.

Confirm that the router is working.

C.

Confirm that the power light of the network switch is on.

D.

Confirm that the physical network connections are intact.

E.

On Server A and C, run tranceroute -n server.

F.

On Server B, run tranceroute -n servera and tranceroute -n serverc.

Answer: D

QUESTION NO: 132

View the Exhibit. After Installing the OS, you need to verify the network interface information. Which
command wasused to display the network interface information in the exhibit?

A.

ifconfiq -a
B.

ipadm show-addr

C.

svcs -1 network/physical

D.

netstat -a

Answer: B

QUESTION NO: 133

You suspect a problem with the oponldap package and want to make sure that the files have notbe
modified or otherwise tampered with. Which command would validate all of the files containedin the
openldap package and report any problems?

A.

pkgchk openldap

B.

pkginfo openldap

C.

pkg contents openldap

D.

pkg verify openldap

E.

pkg set-property signature-policy verify

Answer: A

QUESTION NO: 134

You wish to edit your crontab file that is located in /var/spool/cron/crontab. What command mustyou
enter to edit this file?

A.

crontab -e

B.
crontab -e /var/spool/cron/crontab

C.

crontab -r

D.

crontab -e /etc/default/cron

Answer: A

QUESTION NO: 135

What is the output of the following command, if executed using the default shell for the rootaccount of
a standard Live CD Install of Oracle Solaris 11?echo '$SHELL'

A.

/usr/bin/bash

B.

/usr/bin/ksh

C.

$SHELL

D.

the PID for the current shell

Answer: C

QUESTION NO: 136

User jack logs in to host solar in and issues the following command: jack@solaris:-$ ls .ssh

id_dsa id_dsa.pub id_rsa id_rsa.pub known_hosts authorized_keysWhich two are true?

A.

The id_rsa file contains the private key for rhosts-based host authentication.

B.

The id_dsa.pub file contains the Digital Signature Algorithm public key for the user jack.
C.

The id_rsa.pub file contains the Rivest Shamir Adelman public key for the host solaris.

D.

The authorized_keys file contains the private keys of remote users authorized to access jack'saccount
on solaris.

E.

The known_hosts file contains the verified public keys of remote hosts known to be trusted.

Answer: A,E

QUESTION NO: 137

You have completed configuring a zone named dbzone on your Solaris 11 server. Theconfiguration is as
following:

The global zone displays the following network information:


The zone has never been booted. Which three options correctly describe this zone?

A.

It is a sparse root zone.

B.

It isa whole root zone.

C.

It is an immutable zone.

D.

It isa native zone.

E.

The zone shares the network interface with the host.

F.

The zone uses a virtual network interface.

G.

The hostid isthe same as the global zone.

H.

The IP address of the zoneis 10.0.2.18

Answer: C,E,G

QUESTION NO: 138

You have been asked to terminate a process that appears to be hung and will not terminate. Theprocess
table is shown below:root 15163 15156 0 12:51:15 pts/3 0:00 hungscript

What command will terminate the process?

A.

kill -9 15163

B.

kill -115163

C.

kill -15 15163


D.

kill -2 15163

Answer: A

QUESTION NO: 139

The global zone has 8 CPUS. YOU suspect that one of your non global /ones, dbzone, isconsuming all of
the CPU resources. Which command would you use to view the CPU utilizationfor all of the zones to
confirm this?

A.

Run from the global zone:prstat -Z

B.

Run from each zonezlogin <zonename> mpstat

C.

Run from the global zone:zonestar -r summary

D.

Run from the global zone:rctladm -1

E.

Run from the global zone:prctl -i

Answer: A

QUESTION NO: 140

You are executing this command in the default shell:sleep 5000 &The system displays a number. This
value is______.

A.

the priority of the /usr/bin/sleep process

B.

the process ID of the /usr/bin/sleep process

C.

the process ID of the shell spawned to execute /usr/bin/sleep

D.
the process group ID that includes the /usr/bin/sleep process

E.

theamount of memory allocated to the /usr/bin/sleep process

F.

thecurrent number of instances of the /usr/bin/sleep process

Answer: C

QUESTION NO: 141

You are installing the Solaris 11 Operation System by using the Text Installer. A panel promptsyou to
create a root password and a user account. Which four describe your options forcompleting this panel of
the Installation?

A.

Creating a user account is optional.

B.

The root password must be set and cannot be blank.

C.

The root password can be left blank.

D.

If you provide a username, that user is assigned the root role.

E.

Ifyou provide a username, that user is given root privileges.

F.

If you provide a username, root is an account rather than a role and is set to expireimmediately.

G.

If you do not provide a username, root is an account rather than a role and is set to expireimmediately.

Answer: A,B,D,G

QUESTION NO: 142

Which option would you choose to display the kernel revision level for your operating system?
A.

cat. /etc/release

B.

uname -a

C.

pkg info kernel

D.

banner (issued from the OpenBoot Prom)

E.

cat /etc/motd

Answer: A

QUESTION NO: 143

After installing the OS, the following network configuration information is displayed from thesystem:

Which option describes the state of this server?

A.

The automatic network configuration option was chosen during the installation of the OS.

B.

The manual network configuration option was chosen during the installation of the OS.

C.

The network was not configured during the installation of the OS.

D.

The network interface isconfigured with a static IP address.

Answer: C
QUESTION NO: 144

The /etc/hosts file can be best described as______.

A.

a local database of host names for rlogin, rsh, and rep

B.

the configuration file for the host name of the system

C.

a local database of information for the uname command

D.

the configuration file for the Domain Name Service (DNS)

E.

a local database of host names and their associated IP addresses

Answer: E

QUESTION NO: 145

Review the boot environment information displayed on your system:

Which two options accurately describe the newBE boot environment?

A.

It cannot be destroyed.

B.

Itcannot be activated.

C.

It cannotbe renamed.

D.

You can create a snapshot of it.


E.

It isactivated but unbootable.

F.

It has been deleted and will be removed at the next reboot.

Answer: B,C

QUESTION NO: 146

You are attempting to troubleshoot an event that should have made an entry into the messageslog. This
event happened about two weeks ago. Which file should you look at first?

A.

/var/adm/messages

B.

/var/adm/messages.0

C.

/var/adm/messagas.1

D.

/var/adm/messages.2

E.

/var/adm/messages.3

Answer: A

QUESTION NO: 147

Review the boot environments displayed on your system:Which option describes the solaris-1 BE?

A.
It is active on the next reboot.

B.

Itis active now.

C.

It is inactive.

D.

It is unbootable.

E.

It is active now and on reboot.

F.

It has been removed and will no longer be available after the next reboot.

Answer: E

QUESTION NO: 148

On localSYS, your SPARC based server, you back up the root file system with recursivesnapshots of the
root pool. The snapshots are stored on a remote NTS file system.This information describes the remote
system where the snapshots are stored:Remote system name: backupSYSFile system whore the
snapshots are stored: /backups/localSYSMounted file system on localSYS: /rpool/snapsMost recent
backup name: rpool-1202Disk c0t0d0 has failed in your root pool and has been replaced. The disk has
already been part<and labeled and now you need to restore the root file system. Which procedure
would you followto restore the ZFS root file system on localSYS?

A.

boot cdrom -smount -f nfs backup_server:/rpool/snaps /rmtzpool create rpool c0t0d0s0cat


/mnt/rpool.1202 | zfs receive -Fdu rpool zpoolset bootfs=rpool/ROOT/solaris rpool Recreateswap and
dump devices. Reinstall the bootblockon c0t0d0.

B.

boot cdrom -smount -f nfs backup_server:/rpool/snaps /mntzpool create rpool c0t0d0s0zfs create -o
mountpoint=/ rpool/ROOTcat /mnt/rpool.1011 | zfs receive -Fdu rpool zpoolset
bootfs=rpool/ROOT/solaris rpool

Recreate swap and dump devices.Reinstall the bootblock on c0t0d0.

C.

boot cdrom -smount -F nfs backup_server:/rpool/snaps /mntcat /mnt/rpool.1011 | zfs receive -Fdu
rpoolzpool set bootfs=rpool/ROOT/solaris rpool c0t0d0s0Reinstall the bootblock on c0t0d0s0
D.

boot cdrom -smount -f nfs backup_server:/rpool/snaps /rmtzpool create rpool c0t0d0s0zfs receive -Fdu
/mnt/rpool.1011zpool set bootfs=rpool/ROOT/solaris rpoolReinstall the bootblock on c0t0d0.

Answer: A

QUESTION NO: 149

You have edited /etc/profile to include the lines:dennis_says=helloexport dennie_saysYou have also
edited /etc/skel/local.profile to include the line

dennis_says=worldYou now create a new user account brian, and specify use of the bash shell. When
brian logs inand entersecho $dennis_saysWhat will he see, and why?

A.

world, because the local.profile entry will be executed last

B.

hello, because the global /etc/profile entry overrides the local.profile entry

C.

hello, because the local.profile entry is not automatically sourced on login

D.

hello, because the value specified in local.profile was not exported

E.

nothing, because the variable was not exported in local.profile

Answer: A

QUESTION NO: 150

You want to install the openldap software package to a now boot environment for testing
beforeintroducing the now software package to the production environment. What option describes
thecorrect procedure to:1) create a new BE named nowBE2) install the software to that new BE only

A.

pkg install --newBE openldap

B.

pkg install --be-nama newBE openldap


C.

beadm create newBEbeadm mount newBE /mntpkg -R /mnt update openldap

D.

beadm create newBEbeadm activate newBEpkg install openldap

Answer: D

QUESTION NO: 151

You arc Installing the Oracle Solaris 11 Operating System by using the Text Installer. Which threeoptions
describe the features associated with the Text Installer?

A.

It can be used to install only SPARC systems.

B.

It installs gnome as the default user environment on a system capable of displaying aenvironment.

C.

You can choose whether root is a role or user account.

D.

You can configure the network manually.

E.

You can do both automatic and manual configuration of the network.

F.

You can select how to configure the remaining network interfaces.

Answer: C,D,E

QUESTION NO: 152

The interface net3 should be operating, but is not.Command:ipadm show-addr | grep


net3Response:net3/v4 static down 192.168.0.200/24Which command should you enter next?

A.

ipadm create-ip
B.

ipadm enable-if

C.

ipadm show-if

D.

ipadm up-addr

Answer: B.

QUESTION NO: 153

When issuing the zonestat 2 1h is command, the following information is displayed:

Which two options accurately describe the statistics contained in the output?

A.

dbzone is using 0.21% of the total CPU resource available in the zone's processor set.

B.

dbzone is using 0.21% of the global zone's total CPU.

C.

dbzone is using 5.48% of the total physical memory that has been allocated to the zone.

D.

dbzone is using 2.37% of the global zone's total virtual memory.

E.

The network is being utilized 100% with no physical bandwidth remaining.

Answer: A,C

QUESTION NO: 154


The advantage of core tiles is that they allow you an opportunity to examine the cause ofproblems, so
that they can be resolved.However, core files must be managed because they_____.

A.

take up large amounts of disk space

B.

make numerous entries into the /var/adm/wtmpx file

C.

steal resources from the processor, slowing down system performance

D.

fill up swap space; this will begin to slow the system due to swaps

E.

fill up swap space; this will begin to slow the system due to paging

Answer: A

QUESTION NO: 155

The lineset noexec_user_stack= lshould be added to the /etc/system file to prevent an executable stack
while executing userprograms. What is the purpose of this?

A.

help prevent core dumps on program errors

B.

help programs to execute more quickly by keeping to their own memory space

C.

log any messages into the stack log

D.

help make buffer-overflow attacks more difficult

Answer: D
QUESTION NO: 156

User jack makes use of the bash shell; his home directory is/export/home/jack.What is the correct
setting of umask, and where should it be set, to allow jack to create a shellscript using the vi editor, that
is executable by default?

A.

It is not possible to make a script executable without using the chmod command.

B.

umask value of 0002 set in /etc/profile

C.

umask value of 0002 set in /export/home/jack/.bashrc

D.

umask value of 0722 set in /etc/profile

E.

umask value of 0722 set In /export/home/jack/.bashrc

Answer: B

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy