Online 2 SCRBD
Online 2 SCRBD
Select two correct statements about the authentication services available in Oracle Solaris 11.
A.
Pluggable Authentication Modules (PAM) is used to control the operation of services suchconsole logins
and ftp.
B.
The Secure Shell can be configured to allow logins across a network to remote servers
withouttransmitting passwords across the network.
C.
Secure Remote Procedure Calls (Secure RPC) provides a mechanism to encrypt data on anyIP Socket
connection.
D.
Pluggable Authentication Modules (PAM) is used to implement the Secure Shell in OracleSolaris 11.
E.
Simple Authentication and Security Layer (SASL) provides a mechanism to authenticate and encrypt
access to local file system data.
Answer: A,EExplanation:
A: Pluggable Authentication Modules (PAM) are an integral part of theauthentication mechanism for
the Solaris. PAM provides system administrators with the ability andflexibility to choose any
authentication service available on a system to perform end-userauthentication.By using PAM,
applications can perform authentication regardless of what authentication methodis defined by the
system administrator for the given client.PAM enables system administrators to deploy the appropriate
authentication mechanism for eachservice throughout the network. System administrators can also
select one ormultipleauthentication technologies without modifying applications or utilities. PAM
insulatesapplication developers from evolutionary improvements to authentication technologies, while
at thesame time allowing deployed applications to use those improvements.PAM employs run-time
pluggable modules to provide authentication for system entry services.E: The Simple Authentication and
Security Layer (SASL) is a method foradding authentication support to connection-based
protocols.Simple Authentication and Security Layer (SASL) is a framework for authentication and
datasecurity in Internet protocols. It decouples authentication mechanisms from application protocols,in
theory allowing any authentication mechanism supported by SASL to be used in any applicationprotocol
that uses SASL. Authentication mechanisms can also support proxy authorization, afacility allowing one
user to assume the identity of another. They can also provide a data securitylayer offering data integrity
and data confidentiality services. DIGEST-MD5 provides an example ofmechanisms which can provide a
data-security layer. Application protocols that support SASLtypically also support Transport Layer
Security (TLS) to complement the services offered by SASL.Reference: softpanorama.org, Solaris PAM
QUESTION NO: 84
User brian changes the permissions for db_data this command:chmod 4755 db_dataWhat is true?
A.
db_data now has permissions rwsr-xr-x and can be deleted only by user brian.
B.
db_data now has permissions rwsr-xr-x and, if executed, will inn with the permissions of userbrian.
C.
db_data now has permissions rwxr-sr-x and can be deleted only by members of the groupowning it.
D.
The permissions for db_data cannot be determined, because the permissions prior to thechange have
not been specified.
E.
db_data must be an ordinary file, because special permissions cannot be set on a directory.
Answer: C
QUESTION NO: 85
Which three of the components would degrade performance if used in a ZFS storage pool, and are not
recommended configurations?
A.
B.
C.
D.
E.
F.
an EDI disk
Answer: A,B,E
QUESTION NO: 86
View the Exhibit and review the file system information displayed from a remote server
You are configuring a new server. This new server has the following storage pool configured
This new server also has the following file systems configured:When you are finished building this new
server, the pool1/data dataset must be an exact duplicateof note server. What is the correct procedure
to create the pool1/data dataset on this new server?
A.
C.
D.
E.
F.
Answer: E
QUESTION NO: 87
You have installed an update to the gzip package and need to "undo" .ho update and return thepackage
to its "as-delivered" condition. Which command would you use?
A.
pkg undo
B.
pkgrevert
C.
pkg fix
D.
pkg uninstall
Answer: B
UESTION NO: 88
To confirm the IP address and netmask have been correctly configured on the network interfaceswhich
command should you use?
A.
ipdilm show-if
B.
ipadm show-nic
C.
ipadm show-addr
D.
ipadm show-ifconfig
E.
Answer: C
QUESTION NO: 89
You are the administrator of a system that a large number of developers work on. Thesedevelopers
crash the system, and their applications, on a regular basis.What command would you use to configure
where the core files are saved?
A.
savecore
B.
dumpadm
C.
svcadm
D.
proc
E.
coreadm
Answer: E
QUESTION NO: 90
Which option displays the result of running the zfs list command?
A.
Option A
B.
Option B
C.
Option C
D.
Option D
Answer: B
QUESTION NO: 91
A.
TCP
B.
UDP
C.
IP
D.
ICMP
E.
NFS
F.
IPSec
Answer: B
QUESTION NO: 92
A.
B.
the software connecting the Internet Layer and the Physical Layer
C.
D.
E.
a device instance
Answer: E
QUESTION NO: 93
View the exhibit to inspect the file system configuration on your server.Exhibit: *Missing*Your
department's backup policy is to perform a full backup to a remote system disk on Saturday. OnSunday
through Friday, you are to perform an incremental backup to the same remote system disk.
Each incremental backup will contain only data that has been modified since the previousSaturday
backup.
The server file systems must remain available at all times and can never be taken offline,
The backup must not only provide for the recovery of the most recent version of a file, but mustalso
allow recovery of previous versions of a file created since Saturday's full backup.Following your company
policy, which option describes a valid procedure for backing up the /datafile system to a remote disk
named /remote/backup?
A.
B.
C.
D.
E.
On Saturday:zfs snapshot pool1/data@satzfs pool1/data@sat > /remote/backup/fullOn each
weekday:Remove the previous daily snapshot.zfs snapshot pool1/data@dailyzfs send -i pool1/data@sat
pool1/data@daily > /remote/backup/full
Answer: C
QUESTION NO: 94
A user account must be a member of a primary group, and may also be a member of one or
moresecondary groups. What is the maximum total number of groups that one user can
concurrentlybelong to?
A.
15
B.
16
C.
17
D.
63
E.
64
F.
65
G.
The number of groups one user can concurrently belong to is unlimited in Solaris 11.
Answer: B
QUESTION NO: 95
A.
C.
init does not terminate all services normally. The shutdown command performs a t shutdown ofall
services.
D.
The shutdown command can only bring the system to the single-user milestone. The commandmust be
used to shut the system down to run level 0.
E.
The shutdown sends a shutdown message to any systems that are mounting resource-tern thatis being
shut down.
F.
The shutdown command will shut the system down and turn off power; init will only shut systemdown.
Answer: A,B,E
QUESTION NO: 96
The configuration information in the exhibit is displayed on your system immediately after installing
the OS. Choose the option that describes the selection made during the Installation of the OS toobtain
this configuration.
A.
The automatic network configuration option was chosen during the installation of the OS.
B.
The manual network configuration option was chosen during the installation of the OS.
C.
The network was not configured during the installation of the OS.
D.
The DHCP network configuration option was chosen during the Installation of the OS.
Answer: A
QUESTION NO: 97
Which command would you use to determine which package group is installed on your system?
A.
B.
pkg info
C.
uname -a
D.
cat /var/sadm/system/admin/CLUSTEP
Answer: B
QUESTION NO: 98
Oracle Solaris 11 kernel encounters a fatal error, and it results in a system panic. What type of filedoes
this generate?
A.
a.out
B.
objdump
C.
core dump
D.
tapedump
E.
crash dump
Answer: C
QUESTION NO: 99
Which describes the minimum set of commands to be executed to bring the svc: /network/ssh:default
service back online?
A.
B.
C.
D.
svcadm enable svc:/system/cryptosvcsvcadm enable svc:/network/ipfilter:defaultsvcadm
enablesvc:/network/ssh:default
E.
F.
G.
Answer: D
You are the administrator for a group of shell script developers. They use vi, and have asked youto make
their scripts automatically executable when they save their files.How can this be accomplished?
A.
Enter set -o vi on the command line, or include it in each user's startup script.
B.
Enter umask -s on the command line, or include it in each user's startup script.
C.
Enter umask 000 on the command line, or include it in each user's startup script.
D.
Enter umask 777 on the command line, or include it in each user's startup script.
E.
It is not possible to automatically set the execute bit on with the umask setting, or vi option.
F.
Enter umask 766 the command line, or include it in the global startup script for the default shell.
Answer: C
A.
arp
B.
netstat
C.
ipadm show-if
D.
dladm show-addr
E.
ipadm show-addr
Answer: E
The server has two spate 140-GB disk drives: c3t5d0 c3t6d0Which command would add redundancy to
the pool1 storage pool?
A.
B.
zpool attach pool1 c3t3d0 c3c5d0; zpoo1 attach pool1 c3t4d0 c3t6d0
C.
D.
E.
Answer: A
The process ID was determined as follows:pgrep userprograml5317The user attempted to terminate the
program as follows:pkill 15317This command runs without an error message, and the process continues
to run.What is the issue?
A.
You need to run the pkill command with the process name.
B.
C.
D.
Answer: B
You are logged in to a Solaris 11 system as user jack. You issue the following sequence ofcommands:
Identify two correct statements.
A.
B.
C.
D.
You are running the shell specified for the account root.
E.
Your UID is 1.
Answer: A,B
.Which two are user definable OpenBoot parameters that can be set in the OpenBoot PROM?
A.
B.
host ID
C.
D.
E.
F.
Answer: D,E
QUESTION NO: 106
A.
B.
C.
D.
Answer: B,C
A.
x86 only
B.
C.
SPARC only
D.
E.
Answer: C
QUESTION NO: 108
A.
It is a RAIDZ storage pool and can withstand a single disk failure; data will be striped at:
diskcomponents.
B.
It is a double-parity RAIDZ storage pool and can withstand two disk failures; data will be stripedacross
four disk components.
C.
It is an improperly configured RAIDZ storage pool; data will be striped across four diskcomponents, but
only three drives are protected with redundancy.
D.
It is an improperly configured RAIDZ storage pool; data will be striped across three diskcomponents, but
only three drives are protected with redundancy.
Answer: D
Which two statements describe the COMSTAR framework available in Oracle Solaris 11?
A.
It converts an Oracle Solaris 11 host into a SCSI target device that can be accessed over astorage
network by Linux, Mac OS, or Windows client systems.
B.
iSCSI targets cannot be configured as dump devices.
C.
D.
It is used to connect to Fibre Channel or iSCSI Storage Area Network (SAN) environments.
E.
It provides an upgrade and update path to convert your iSCSI LUNs from Solaris 10 systems.
Answer: A,B
The global zone has 1024 MB of physical memory. You need to limit the non-global zone so that ituses
no more than 500 MB of the global zone's physical memory. Which option would youchoose?
A.
Option A
B.
OptionB
C.
Option C
D.
Option D
E.
Option E
Answer: C
QUESTION NO: 111
You are troubleshooting interface net3 and you enter the following sequence of commands:Your next
command should be:
A.
B.
C.
D.
E.
Answer: E
The storage pool configuration on your server is:You back up the /pool1/data file system, creating a
snapshot and copying that snapshot to tape(/dev/rmt/0). You perform a full backup on Sunday night
and Incremental backups on Mondaythrough Saturday night at 11:00 pm. Each incremental backup will
copy only the data that hasbeen modified since the Sunday backup was started.On Thursday, at 10:00
am, you had a disk failure. You replaced the disk drive (c4t0d0). Youcreated pool (pool1) on that
disk.Which option would you select to restore the data in the /pool1/data file system?
A.
zfs create pool1/dataLoad the Monday tape and enter:zfs recv pool1/data < /dev/rmt/0Load
theWednesday tape and enter:zfs recv -F pool1/data < /dev/rmt/0
B.
Load the Sunday tape and restore the Sunday snapshot:zfs recv pooll/data < /dev/rmt/0zfsrollback
pool1/data@monLoad the Wednesday tape and restore the Wednesday snapshot:zfsrecv -i pooll/data <
/dev/rmt/0zfs rollback pool1/data@wed
C.
zfs create pooll/dataLoad the Wednesday tape and enter:zfs recv -F pool1/data < /dev/rmt/0
D.
Load the Sunday tape and enter:zfs recv pool1/data < /dev/rmt/0Load the Wednesday tape andenter:*
commands missing*
Answer: D
Question
A.
/var/spool/pkg
B.
http://localhost/solaris
C.
http://pkg.oracle.com/solaris/release
D.
http://www.oracle.com/Solaris/download
E.
/cdrom/cdrom0
Answer:C
Which two are implemented using the Internet Control Message Protocol (ICMP)?
A.
ping
B.
DHCP
C.
HTTP
D.
telnet
E.
syslog
F.
Traceroute
Review the information taken from your server:Which option describes the command used to create
these snapshots of the root file system?
A.
C.
D.
E.
Answer: A
XJ notice that the /var/.dm/messages file has become very large. Typically, this is managed by acrontab
entry. Which entry should be in the root's crontab file?
A.
10 3 * * * /usr/adm/messages
B.
10 3 * * * /usr/sbin/logadm
C.
10 3 * * * /usr/sbin/syslogrotate
D.
10 3 * * * /usi/sbin/logrotate
E.
10 3 * * * /usr/sbin/messages
Answer: B
user1 is attempting to run the following command:cp bigfile verybigThe system displays the following
errer:cp: cannot create verybig: Disc quota exceededYour initial troubleshooting shows that the df -h
command indicates the account is at 100%capacity. What command would you use to determine how
much disk space the user has available?
A.
B.
zfs userused@user1
C.
D.
df -h | grep user1
Answer: AExplanation:
ZFS quotas can be set and displayed by using the zfs set and zfs get commands. Inthe following
example, a quota of 10 Gbytes is set on tank/home/bonwick.# zfs set quota=10G tank/home/bonwick#
zfs get quota tank/home/bonwickNAME PROPERTY VALUE SOURCEtank/home/bonwick quota 10.0G
localReference: ZFS Quotas and Reservations
Select the packet type that identifies members of the group and sends information to all thenetwork
interfaces in that group.
A.
Unicast
B.
Multicast
C.
Broadcast
D.
Bayesian
E.
Answer: B
IPv6 defines three address types:unicastIdentifies an interface of an individual node.multicastIdentifies
a group of interfaces, usually on different nodes. Packets that are sent to the multicastaddress go to all
members of the multicast group."Pass Any Exam. Any Time." - www.TwPass.com98
The current ZFS configuration on your server is:pool1 124K 3.91G 32K /pool1pool1/data 31K 3.91G 31K
/dataYou need to create a new file system named /data2. /data2 will be a copy of the /data file
system.You need to conserve disk space on this server whenever possible.Which option should you
choose to create /data2, which will be a read writeable copy of the /datafile system, while minimizing
the amount of total disk space used in pool1?
A.
B.
C.
D.
E.
F.
Answer: E
You wish to troubleshoot some issues that you are having on the system. You want to monitor
the/var/adm/messages file in real time. Which command would you use to do this?
A.
head
B.
tail
C.
cat
D.
file
E.
test
Answer: BExplanation:
Tail
Which two options describe how to override the default boot behavior of an Oracle Solaris 11SPARC
system to boot the system to the single-user milestone?
A.
B.
C.
D.
E.
Answer: A,D
Which two options describe how to override the default boot behavior of an Oracle Solaris 11SPARC
system to boot the system to the single-user milestone?
A.
B.
From the ok prompt, issue this command:boot -m milestone/single-user
C.
D.
E.
Answer: A,D
In a default standalone installation of Oracle Solaris 11, what is the default minimum length incharacters
of a user password, and where is the minimum password length defined?
A.
B.
C.
D.
E.
F.
Answer: B
Which four can the SMF notification framework be configured to monitor and report?
A.
B.
C.
D.
E.
F.
G.
Answer: A,E,F,G
You have been asked to do an orderly shutdown on a process with a PID of 1234, with the killcommand.
Which command is best?
A.
kill -2 1234
B.
C.
kill -9 1234
D.
kill -11234
Answer: B
QUESTION NO: 125
user1, while in his home directory, is attempting to run the following command in his homedirectory: cp
bigfile verybigThe system displays the following error:cp: cannot create verybig: Disc quota exceeded
Your initial troubleshooting shows that the df -h command indicates he is at 100% capacity.
Whatcommand would you use to increase the disk space available to the user?
A.
B.
zfs userused@user1
C.
D.
df -h | grep user1
E.
Answer: E
You need to install the gzip software package on your system. Which command would you use tofind
the software package in the configured repository?
A.
B.
C.
D.
pkginfo gzip
E.
yumlist gzip
Answer: A
A.
B.
C.
displays the services that are dependent on the svc: /network/ssh:default service
D.
Answer: B
A.
B.
C.
D.
E.
Answer: B,E
QUESTION NO: 129
A.
domainname
B.
ping localhost.
C.
ping 192.168.1.1
D.
ping 23.45.82.174
E.
ping www.oracle.com.
F.
cat /etc/resolv.conf
Answer: E
You have a process called bigscript, and you need to know the PID number for this process.Which
command will provide that information?
A.
pkill bigscript
B.
ps bigscript
C.
pgrep bigscript
D.
prstatbigscript
Answer: C
QUESTION NO: 131
Server A, Server B, and Server C are connected to the same network switch and are on the sariEach
server has a single network interface, net0.You received a tech support call that Server B has lost
network connectivity. Your troubleshootinghas discovered:Server A can ping Server C, but not Server
B.Server B can ping localhost, but not Server A or C.Server C can ping Server A, but not Server B.On
Server F3, you enter the following command:dladm show-phys | grep net0
Response:net0/v4 Ethernet down 0 unknown el00glWhat is the next logical troubleshooting action?
A.
B.
C.
D.
E.
F.
Answer: D
View the Exhibit. After Installing the OS, you need to verify the network interface information. Which
command wasused to display the network interface information in the exhibit?
A.
ifconfiq -a
B.
ipadm show-addr
C.
svcs -1 network/physical
D.
netstat -a
Answer: B
You suspect a problem with the oponldap package and want to make sure that the files have notbe
modified or otherwise tampered with. Which command would validate all of the files containedin the
openldap package and report any problems?
A.
pkgchk openldap
B.
pkginfo openldap
C.
D.
E.
Answer: A
You wish to edit your crontab file that is located in /var/spool/cron/crontab. What command mustyou
enter to edit this file?
A.
crontab -e
B.
crontab -e /var/spool/cron/crontab
C.
crontab -r
D.
crontab -e /etc/default/cron
Answer: A
What is the output of the following command, if executed using the default shell for the rootaccount of
a standard Live CD Install of Oracle Solaris 11?echo '$SHELL'
A.
/usr/bin/bash
B.
/usr/bin/ksh
C.
$SHELL
D.
Answer: C
User jack logs in to host solar in and issues the following command: jack@solaris:-$ ls .ssh
A.
The id_rsa file contains the private key for rhosts-based host authentication.
B.
The id_dsa.pub file contains the Digital Signature Algorithm public key for the user jack.
C.
The id_rsa.pub file contains the Rivest Shamir Adelman public key for the host solaris.
D.
The authorized_keys file contains the private keys of remote users authorized to access jack'saccount
on solaris.
E.
The known_hosts file contains the verified public keys of remote hosts known to be trusted.
Answer: A,E
You have completed configuring a zone named dbzone on your Solaris 11 server. Theconfiguration is as
following:
A.
B.
C.
It is an immutable zone.
D.
E.
F.
G.
H.
Answer: C,E,G
You have been asked to terminate a process that appears to be hung and will not terminate. Theprocess
table is shown below:root 15163 15156 0 12:51:15 pts/3 0:00 hungscript
A.
kill -9 15163
B.
kill -115163
C.
kill -2 15163
Answer: A
The global zone has 8 CPUS. YOU suspect that one of your non global /ones, dbzone, isconsuming all of
the CPU resources. Which command would you use to view the CPU utilizationfor all of the zones to
confirm this?
A.
B.
C.
D.
E.
Answer: A
You are executing this command in the default shell:sleep 5000 &The system displays a number. This
value is______.
A.
B.
C.
D.
the process group ID that includes the /usr/bin/sleep process
E.
F.
Answer: C
You are installing the Solaris 11 Operation System by using the Text Installer. A panel promptsyou to
create a root password and a user account. Which four describe your options forcompleting this panel of
the Installation?
A.
B.
C.
D.
E.
F.
If you provide a username, root is an account rather than a role and is set to expireimmediately.
G.
If you do not provide a username, root is an account rather than a role and is set to expireimmediately.
Answer: A,B,D,G
Which option would you choose to display the kernel revision level for your operating system?
A.
cat. /etc/release
B.
uname -a
C.
D.
E.
cat /etc/motd
Answer: A
After installing the OS, the following network configuration information is displayed from thesystem:
A.
The automatic network configuration option was chosen during the installation of the OS.
B.
The manual network configuration option was chosen during the installation of the OS.
C.
The network was not configured during the installation of the OS.
D.
Answer: C
QUESTION NO: 144
A.
B.
C.
D.
E.
Answer: E
A.
It cannot be destroyed.
B.
Itcannot be activated.
C.
It cannotbe renamed.
D.
F.
Answer: B,C
You are attempting to troubleshoot an event that should have made an entry into the messageslog. This
event happened about two weeks ago. Which file should you look at first?
A.
/var/adm/messages
B.
/var/adm/messages.0
C.
/var/adm/messagas.1
D.
/var/adm/messages.2
E.
/var/adm/messages.3
Answer: A
Review the boot environments displayed on your system:Which option describes the solaris-1 BE?
A.
It is active on the next reboot.
B.
C.
It is inactive.
D.
It is unbootable.
E.
F.
It has been removed and will no longer be available after the next reboot.
Answer: E
On localSYS, your SPARC based server, you back up the root file system with recursivesnapshots of the
root pool. The snapshots are stored on a remote NTS file system.This information describes the remote
system where the snapshots are stored:Remote system name: backupSYSFile system whore the
snapshots are stored: /backups/localSYSMounted file system on localSYS: /rpool/snapsMost recent
backup name: rpool-1202Disk c0t0d0 has failed in your root pool and has been replaced. The disk has
already been part<and labeled and now you need to restore the root file system. Which procedure
would you followto restore the ZFS root file system on localSYS?
A.
B.
boot cdrom -smount -f nfs backup_server:/rpool/snaps /mntzpool create rpool c0t0d0s0zfs create -o
mountpoint=/ rpool/ROOTcat /mnt/rpool.1011 | zfs receive -Fdu rpool zpoolset
bootfs=rpool/ROOT/solaris rpool
C.
boot cdrom -smount -F nfs backup_server:/rpool/snaps /mntcat /mnt/rpool.1011 | zfs receive -Fdu
rpoolzpool set bootfs=rpool/ROOT/solaris rpool c0t0d0s0Reinstall the bootblock on c0t0d0s0
D.
boot cdrom -smount -f nfs backup_server:/rpool/snaps /rmtzpool create rpool c0t0d0s0zfs receive -Fdu
/mnt/rpool.1011zpool set bootfs=rpool/ROOT/solaris rpoolReinstall the bootblock on c0t0d0.
Answer: A
You have edited /etc/profile to include the lines:dennis_says=helloexport dennie_saysYou have also
edited /etc/skel/local.profile to include the line
dennis_says=worldYou now create a new user account brian, and specify use of the bash shell. When
brian logs inand entersecho $dennis_saysWhat will he see, and why?
A.
B.
hello, because the global /etc/profile entry overrides the local.profile entry
C.
D.
E.
Answer: A
You want to install the openldap software package to a now boot environment for testing
beforeintroducing the now software package to the production environment. What option describes
thecorrect procedure to:1) create a new BE named nowBE2) install the software to that new BE only
A.
B.
D.
Answer: D
You arc Installing the Oracle Solaris 11 Operating System by using the Text Installer. Which threeoptions
describe the features associated with the Text Installer?
A.
B.
It installs gnome as the default user environment on a system capable of displaying aenvironment.
C.
D.
E.
F.
Answer: C,D,E
A.
ipadm create-ip
B.
ipadm enable-if
C.
ipadm show-if
D.
ipadm up-addr
Answer: B.
Which two options accurately describe the statistics contained in the output?
A.
dbzone is using 0.21% of the total CPU resource available in the zone's processor set.
B.
C.
dbzone is using 5.48% of the total physical memory that has been allocated to the zone.
D.
E.
Answer: A,C
A.
B.
C.
D.
fill up swap space; this will begin to slow the system due to swaps
E.
fill up swap space; this will begin to slow the system due to paging
Answer: A
The lineset noexec_user_stack= lshould be added to the /etc/system file to prevent an executable stack
while executing userprograms. What is the purpose of this?
A.
B.
help programs to execute more quickly by keeping to their own memory space
C.
D.
Answer: D
QUESTION NO: 156
User jack makes use of the bash shell; his home directory is/export/home/jack.What is the correct
setting of umask, and where should it be set, to allow jack to create a shellscript using the vi editor, that
is executable by default?
A.
It is not possible to make a script executable without using the chmod command.
B.
C.
D.
E.
Answer: B