- 论坛徽章:
- 0
|
SCSA 310-012 questions (part 1)
201. You want to enable the logging of every failed login attempt. To do this you
must
change the
syslogd configuration file from its installation defaults. You have selected the
appropriate
facility. Which
severity level should you use with it?
A. lrp
B. err
C. mail
D. alert
E. notice
F. warning
Answer: D
202. Which two commands should be used to mount device /dev/dsk/c0t1d0s1 onto the
mount
point /mnt if there is an entry in the /etc/vfstab file for this particular file
system?
(Choose two)
A. mount /mnt
B. umount /mnt
C. mount /dev/dsk/c0t1d0s1 /mnt
D. mount /dev/rdsk/c0t1d0s1 /mnt
E. mount -o /mnt /dev/dsk/c0t1d0s1 /mnt
Answer: C
203. Which two commands should be used to mount the device /dev/dsk/c0t1d0s1 onto
the
mount
point /mnt if there is an entry in the /etc/vfstab file for this particular file
system?
(Choose two)
A. mount /mnt
B. unmount /mnt
C. mount /dev/dsk/c0t1d0s1 /mnt
D. mount /dev/rdsk/c0t1d0s1 /mnt
E. mount -o /mnt /dev/dsk/c0t1d0s1 /mnt
Answer: A, C
204. Exhibit:
Which type of JumpStart configuration file is shown in the exhibit?
A. rules file
B. class file
C. finish script
D. sysidcfg file
E. bootparams file
Answer: B
205. Which layer within the seven layer OSI/ISO model ensures that messages reach
the
correct
application?
A. Network layer
B. Data link layer
C. Transport layer
D. Presentation layer
Answer: C
206. Which command is used to create a file system in a slice of disk?
A. ufs
B. fsck
C. newfs
D. format
E. fstypes
Answer: C
207. When nisinit is executed on an NIS+ client, which file is copied from the
NIS+
server?
A. /var/nis"domainname"
B. /var/nis/parent.object
C. /var/nis/NIS_COLD_START
D. /var/nis/NIS_SHARED_DIRCACHE
Answer: C
208. Which statements about Sun Management Console are true? (Choose three)
A. It provides a graphical means to manager metadevices.
B. It simplifies administration by brining the tools together in one location.
C. It allows management of all the Sun Management Console servers in one location.
D. It gives the user a graphical representation of the administration components
available
and the level if user
privilege required running them.
Answer: A, B, C
209. Which line should be entered into saturns /etc/dfs/dfstab file to enable a
remote
root user on
the client system mars to have root privileges on the /var shared resource?
A. share -F nfs /var
B. share -F nfs -o ro /var
C. share -F nfs root=mars /var
D. share -F nfs -o ro=mars /var
E. share -F nfs -o root=mars /var
Answer: E
210. What needs to happen when the auto_home map is updated?
A. Nothing needs to be done.
B. You need to stop and re-start nfsd.
C. You need to run the automount command.
D. You need to stop and re-start automountd.
Answer: A
211. Which two terms can be synonymous with the term "server"? (Choose two)
A. Host
B. Printer
C. Domain
D. Network
E. Process
Answer: A, E
212. You administer a very large network of system, using the NIS+ naming service.
Your
company wants to implement a solution with equivalent scalability that will support
a more
heterogeneous
environment. Which action provided the solution?
A. Configure your network to use NIS
B. Configure your network to use FTP
C. Configure your network to use NFS
D. Configure your network to use NIS+
E. Configure your network to use DNS
F. Configure your network to use LDAP
Answer: F
213. On a workstation, which command is used to find out the exported file systems
on
NFS
server
Venus?
A. dfsmount venus
B. exportfs venus
C. share venus
D. dfshares venus
Answer: D
214. Given the line from a name service configuration file: Hosts files nis
nisplus dns
Which
statement correctly describes the behavior of the name service switch?
A. The attempt to locate a hosts IP address would begin with DNS and continue if
necessary,
to use each name
service, reading from right to left stopping only of the IP address was found or the
name
service list exhausted.
B. The attempt to locate a hosts IP address would begin with local files and
continue, if
necessary, to use each
name service, reading left to right stopping only if the IP address was found or the
name
service list exhausted.
C. The attempt to locate a hosts IP address would begin with DNS and continue, if
necessary,
to use each name
service, reading from right to left stopping if the IP address was wound, any of the
name
services were
unavailable, or the name service list exhausted.
D. The attempt to locate a hosts IP address would begin with local files and
continue, if
necessary, to use each
name service, reading left to right stopping if the IP address was found, any of the
name
services were
unavailable, or the name service list exhausted.
Answer: D
215. You want to configure the JumpStart server jsserver to support a JumpStart
client.
Which
option and parameter in the add_install_client script should be used to specify the
sysidcfg
file located in the
directory /export/install/config?
A. –c /export/install/config
CertGuaranteed. Study Hard and Pass Your Exam.
B. –p /export/install/config
C. –p jsserver:/export/install/config
D. –c /export/install/config/sysidcfg
E. –c jsserver:/export/install/config/sysidcfg
F. –p jsserver:/export/install/config/sysidcfg
Answer: C
216. Which command is executed on the NIS slave server to copy the maps from the
NIS
master
server?
A. ypxfr
B. yppull
C. yppush
D. ypserv
Answer: A
217. A single entry in a direct map? (Choose two)
A. May contain special options for all direct mount points.
B. May contain special options for only one mount point.
C. May contain an absolute pathname for a mount point.
D. May contain a relative pathname for a mount point.
Answer: B, C
218. What is an advantage of using either Solstice Disk Suite or Sun StorEdge
Volume
Management software to concatenate your devices?
A. If a disk in the volume fails, the file system is still available for use.
B. Two copies of the data are written at the same time and users can access either
copy.
C. Data can be written to the volume very quickly, resulting in a performance
improvement.
D. A volume can be grown while mounted and in use by concatenating additional slices
to
it.
Answer: D
219. You administer a growing network of systems, each using local files to
authenticate
users.
People using a variety of systems have accumulated many login names and passwords.
You
find
that it is
difficult to service users authentication problems and you are concerned about
passwords
being transferred over
the network without encryption. You need to minimize network traffic. What are two
solutions
to there
problems? (Choose two)
A. Configure your network to use NIS
B. Configure your network to use FTP
C. Configure your network to use NFS
D. Configure your network to use DNS
E. Configure your network to use NIS+
F. Configure your network to use LDAP
Answer: E, F
220. What are the types of automount maps?
A. Exported, master, slave
B. Exported, local, remote
CertGuaranteed. Study Hard and Pass Your Exam.
C. Master, direct, indirect
D. Master, indirect, auto_home
Answer: C
221. What should be added to the /etc/vfstab file to automatically mount the /var
file
system from
the NFS server saturn onto the mount point /test so it is mounted as read only with
interrupts disabled?
A. saturn:/var - /test nfs - yes -
B. saturn:/var - /test nfs - yes ro
C. saturn:/var - /test nfs - yes ro,int
D. saturn:/var - /test nfs - yes bg,soft
E. saturn:/var - /test nfs - yes ro,nointr
Answer: E
222. The action field in the syslogd configuration file may contain which types of
entry?
(Choose
two)
A. A host name prefixed with @
B. A list of user email addresses
C. The full path name to a file or device file
D. A pipe sign ( | ) followed by a command to which the message output is piped.
Answer: B, D
223. Which statement about the Sun RPC service is true?
A. RPC facilitates remote power control of a Solaris 8 system.
B. RPC allows a remote system to call a procedure by an alias.
C. RPC allows a user to run command (procedures) on a system remotely.
D. RPC allows applications (services) to be dynamically assigned port numbers.
Answer: D
224. The max number of hosts in a class A IP address is?
A. 127
B. 128
C. 254
D. 255
Answer: A
225. What is the purpose of automount maps?
A. To list all maps in use and their trigger nodes.
B. To keep a list of what resources are NFS mounted.
C. To synchronize mounting between client and server.
D. To enable the client to automatically mount NFS resources.
E. To enable the server to track what resources the client is mounting.
Answer: D
226. Which name should be given to a direct automount map when it is created?
A. It can be called anything
B. It can only be called auto.direct
CertGuaranteed. Study Hard and Pass Your Exam.
C. It can only be called auto_direct
D. It can only be called auto_master
E. It can be called anything as long as it is preceded by auto_.
Answer: A
227. Which command lists the registered RPC services?
A. ipsc
B. lsrpc
C. rpcall
D. psrinfo
E. rpcinfo
F. rpclist
Answer: E
228. Which daemon most be running on an NFS server?
A. biod
B. nfsd
C. ypbind
D. mountd
E. rpc.nisd
Answer: B, D
229. Which problem arises if the Jumpstart client and the boot server are on
different
subnets?
A. No problem with this type of setup will arise.
B. The client is unable to NFS mount the / (root) file system.
C. The boot server does not receive the client RARP request.
D. The client is unable to retrieve the location of the rules file from the boot
server.
Answer: C
230. During the first build of a new NIS map, the slave servers do not know of its
existence, so the
push process attempt fails. What can you do to recover from this problem?
A. You transfer the source files from the NIS master to the NIS slave and execute a
make
on
the NIS slave.
B. You interrupt the build process with a Control-C, and push all of the maps form
the
master server at once
using the ypinit -s command.
C. You put the build process into background processing mode, add an empty map to
the
slave
server, and
foreground the build process to continue the build.
D. You interrupt the build process with a Control-C when the push process hangs, and
execute
the ypxfr
command on the map from the slave server(s) complete the build process.
Answer: D
231. After creating an RBAC role, you find ordinary, non-privileged commands are
not
available.
What causes this problem?
A. The role is not associated with the correct profiles.
B. The access mechanism to the file is not initializing properly.
C. The roles profile is not associated with the correct commands.
D. The file identifying the privileged commands has missing entries.
CertGuaranteed. Study Hard and Pass Your Exam.
E. The files profile is not associated with the correct authorizations.
Answer: A
232. Which file within /etc acts as a template to the name service configuration
file
for
NIS+?
Answer: nsswitch.nisplus
233. Which three statements about Sun Management Console are true? (Choose three)
A. It provides a graphical means to manage metadevices.
B. It simplifies administration by brining the tools together in one location.
C. It allows management of all the Sun Management Console servers in one location.
D. It gives the user a graphical representation of the administration components
available
and the level of the
user privilege required to run them.
Answer: B, C, D
234. What is the proper way to restart the automount daemon?
A. /etc/init.d/nfs.client stop, then /etc/init.d/nfs.server start
B. /etc/init.d/nfs.serve stop, then /etc/init.d/nfs.client start
C. kill -HUP -1
D. shutdown -y g600 -i2
Answer: D
235. Which three functions can syslog perform? (Choose three)
A. Write messages to the system log.
B. Forward messages to a list of users.
C. Forward input to the root user.
D. Forward messages to the syslog daemon an another host.
E. Write IP messages to the processes that are generating errors.
F. Interrupt processes that are producing errors above a pure config thread .
Answer: A, B, D
236. Which are recommended, but not necessary to complete before a system backup?
(Choose
three)
A. Check system activity
B. Change run levels
C. Analyze bad blocks
D. Reboot
E. Fsck
Answer: A, C, D
237. Which daemon process that runs on a NIS master server and NIS slave server is
a
utility that
responds to bind request from NIS clients?
A. ypxfrd
B. ypbind
C. ypserv
D. ypupdates
Answer: C
238. What is the command to check file system consistency?
Answer: fsck
239. What do you have to do in NIS supporting a Jump Start client? (Choose three)
A. Edit hosts
B. Edit others
C. Edit bootparams
D. Update NIS maps
E. Edit class file
F. Edit rules file
Answer: A, B, D
240. Which command checks /dev/rdsk/c2t3d01 using a super block?
A. fsck -32 /dev/rdsk/c2t3d01
B. fsck -s 0 /dev/rdsk/c2t3d01
C. fsck -o b=32 /dev/rdsk/c2t3d01
D. fsck -o f -block 32 /dev/rdsk/c2t3d01
Answer: C
241. You login to a non-UNIX host from a UNIX host use?
A. rsh
B. rlogin
C. telnet
D. rcp
Answer: C
242. How can you view active shares?
A. dfshares
B. shares
C. dfmounts
D. share.mounts
Answer: A
243. Which of these commands will indirectly define a sendmail.cf variable?
A. F
B. C
C. D
D. L
Answer: D
244. Which file contains boot parameters and is updates by the add_install_client
command?
A. /etc/bootparams
B. /etc/bootconfig
C. /etc/boot/conf
D. /etc/bootparams.conf
Answer: A
???????????????????? ( there are no files such as boot* under /etc)
245. Which daemon is needed for an NFS client?
A. mountd
B. nfsd
Answer: B
246. What command should you to determine who last logged in and out of the
system?
A. last
B. users
C. access -u
D. access -p
Answer: A
247. What file specifies what processes to start at boot?
A. /etc/inittab
B. /etc/init
C. /etc/init.conf
D. /etc/boot.pr
Answer: A
248. By default the nsswitch file is configured to use?
A. DNS
B. NIS
C. TCP
D. UDP
Answer: B
249. What does the prtconf command do?
A. Prints systems information
B. Displays printer information
C. Displays printer information on other machines
Answer: A
250. What command can be used to add and additional swap file to the swap space?
A. add -s
B. swap -a
C. swp -add
D. fswap -a
Answer: B
251. How many layers exist in the TCP/IP model?
A. 3
B. 4
C. 5
D. 6
Answer: C
252. To synchronize the NIS+ master with its replicas you need to run?
A. ypmake
B. nismake
C. ypsync
D. Nothing, the system does it automatically
Answer: D
253. What is, /etc/inet/hosts associated with?
A. Ethernet address
B. Internet address
C. Rlogin
Answer: B
254. Public keys for all servers are stored in NIS_SHARED_CACHE?
A. True
B. False
Answer: A
255. A mail server holds:
A. /etc/mail/aliases
B. /etc/mail/sendmail.cf
C. /var/mail
Answer: C
256. Which of the following defines Internet services?
A. /init.d/inetsvc
B. /init.d/inetinit
C. /inet/inetd.conf
D. /etc/network start
Answer: C
257. Which TCP/IP layer handles fragment encapsulation and is responsible for
putting frames on
the physical network?
A. Physical
B. Network
C. Data link
D. Internet
E. Transport
Answer: C
??????????????????
258. On a data less client a swap device and low memory, which will improve
performance?
A. Lower memory
B. Disable tmpfs
CertGuaranteed. Study Hard and Pass Your Exam.
C. Disable swap
D. None of the above
Answer: D
259. What is NOT needed to install a server?
A. Ethernet address
B. Name
C. Internet address
D. Zone/location
Answer: A
260. Which file contains the default remote file system type?
A. /etc/dfs/fstypes
B. /etc/default/fs
Answer: A
261. Which three can function as naming service for the Solaris 8 Operating
Environment?
(Choose three)
A. NIS+
B. DNS
C. NFS
D. UFS
E. UNS
F. LDAP
Answer: A, B, F
262. When you execute nisinit client, what is copied to the client from the
server?
A. /var/nis/NIS_COLD_START
B. /var/nis/NIS_SHARED_DIRCACHE
C. /var/nis/domainname
Answer: A
263. Which file is used to configure a Solaris kernel?
A. /etc/system
B. /etc/kernel
C. /etc/vfstab
D. /etc/inet.conf
Answer: A
264. Which command creates a log called /var/home_cache.log and initiates logging
for the
/export/home file system which is being cached?
A. cachefslog /var/home_cache.log
B. cachefslog -h /var/home_cache.log
C. cachefswssize /var/home_cache.log
D. cachefslog -f /var/home_cache.log /export/home
E. cachefslog -s /var/home_cache.log /export/home
Answer: D
265. On a server, /export/swap is usually used for?
A. Additional swap space for the server
B. Additional swap space for data less clients
C. Root file system for diskless clients
D. Swap files for diskless clients
Answer: D
266. Which command should be used to manually invoke a consistency check and
perform any
necessary updates on a cacheFS file system?
A. cfsadmin -c
B. cfsadmin -d
C. cfsadmin -s
D. cachefsstat -z
E. cachefswssize -s
Answer: C
267. What is the script to create empty version of standard tables in NIS+
directory?
A. nisaddent
B. nissetup
C. nisbladm
D. nisdefault
Answer: B
268. What directory contains information about NIS+ groups?
A. groups_dir.obj
B. groups_dir
C. NIS_groups.dir
D. Groups_dir
Answer: D
269. Which terms can be synonymous with the term "server"? (Choose two)
A. Host
B. Printer
C. Domain
D. Network
E. Process
Answer: A, E
270. AdminSuite software enables you to locally or remote or remotely manage:
A. File systems.
B. Disk slices and fdisk partitions.
C. Auto client systems.
D. Import system databases files, such as aliases and hosts.
E. Software packages.
Answer: A, B, C, D
271. Which three are message severity entries used in the syslogd configuration
file? (Choose
three)
A. Lpr
B. Alert
C. Cron
D. Mark
E. Debug
F. Warning
Answer: B, E, F
272. What do the entries in the /proc directory represent?
A. They are decimal numbers corresponding to process-ID numbers.
B. They are decimal numbers corresponding to absolute sector numbers on a disk.
C. They are decimal numbers corresponding to the inode numbers of active processes.
D. They are decimal numbers corresponding to a time stamp that identifies the
process messages in the message
logs.
Answer: A
273. Which command configures the cache /export/home_cache that should be used
when caching
the /export/home file system?
A. cfsadmin -l /export/home_cache
B. cfsadmin -p /export/home_cache
C. cfsadmin -c /export/home_cache
D. cfsadmin -m /export/home_cache
E. cachefslog -c /export/home_cache
Answer: C
274. Which information is transferred by Trivial File Transfer Protocol (TFTP) as
part of the client
boot sequence during JumpStart?
A. Client host name
B. Client root (/) file system
C. Client network boot image
D. JumpStart configuration files
Answer: C
275. When configuring NIS on a system, you execute the command string: #domainname
testlab.Region.Org.COM. Which statements about this command string are true?
(Choose two)
A. The servers name is test lab, and it resides on the region.org domain.
B. Executing this command populates the /etc/defaultdomain file with the domain
name.
C. The domain name is case sensitive, and must be configured exactly as specified on
the command-line.
D. The domain name is the entire character string testlab.Region.Org.COM and no DNS
domain is specified.
Answer: C, D
276. You administer a very large network of systems, using the NIS+ naming
service. Your
company wants to implement a solution with equivalent scalability what
will support a more heterogeneous
environment. Which action provides the solution?
A. Configure your network to use NIS
B. Configure your network to use FTP
C. Configure your network to use NFS
D. Configure your network to use NIS+
E. Configure your network to use DNS
F. Configure your network to use LDAP
Answer: F
277. Which server command should be used to display all resources an NFS server is
allowing
clients to mount?
A. df. -k
B. dfshares
C. dfmounts
D. shareall
E. mountall
Answer: C
278. Prior to generating NIS maps, what is the correct method of preserving the
integrity of the
passwd and shadow files by protecting the /etc directory source
files?
A. Using the cd command to change to a new directory location.
B. From the command line, changing the DIR and PWDIR variables to a new directory
location.
C. Editing the /var/yp/Makefile to change the DIR and PWDIR variables to a new
directory location.
D. Executing the make command using the command-line arguments as follows: #make
DIR=new_DIR_directory PWDIR=new PWDIR
Answer: C
279. What determines the time frame that an auto mounted NFS resource remains
mounted?
A. A list in the /etc/mnttab file determines this.
B. The time period is built into the executable and cannot be adjusted.
C. The client determines how long the NFS resource remains mounted.
D. The server determines how long the NFS resource remains mounted.
Answer: D
280. Which network server daemons need to be established to support a client
JumpStart
installation? (Choose four)
A. nfsd
B. telnetd
C. in.tftpd
D. snmpd
E. configd
F. in.rarpd
G. in.etherd
H. rpc.bootparamd
Answer: A, D, G, H
281. Which NIS system(s) contain the original ASCll files that are used to
generate the NIS maps?
A. NIS client only.
B. NIS slave server only.
C. NIS master server only
D. NIS master server and NIS slave server
Answer: C
282. Which two JumpStart client system identification parameters cannot be
configured using a
name service, but must be configured using the sysidcfg file?
(Choose two)
A. Time zone
B. System locale
C. Client host name
D. Ipv6 configuration
E. Kerberos configuration
Answer: D, E
283. Given the following command and its output:
# ptree 2357
161 /usr/sbin/inetd -s
2357 in.telnetd
2359 -sh
2363 ksh
Which two statements are true? (Choose two)
A. A Telnet session was established by the inetd daemon.
C. There is only one Telnet session currently running in the system.
D. After logging in, the user switched from the Bourne shell to the Korn shell.
E. After logging by Telnet, the user must have been root as indicated by the Bourne
shell prompt
Answer: A, C
284. You want to configure the Jumpstart server jsserver to support a Jumpstart
client. Which
option and parameter in the add_install_client script should be used
to specify the sysidcfg file located in the
directory /export/install/config?
A. –e /export/install/config
B. –p /export/install/config
C. –p jsserver:/export/install/config
D. –c /export/install/config/sysidcfg
E. –c jsserver:/export/install/config/sysidcfg
F. –p jsserver:/export/install/config/sysidcfg
Answer: C
285. Which statements about the RBAC security mechanism are true? (Choose two)
A. The roleadd command uses the same default shell to useradd.
B. The roleadd command uses very similar syntax to the useradd command.C. The -p option, used to associate an account with a profile, way only be used with
roleadd.
D. Using usermod -R rolename username updates the user_attr file to associate a user
with a role.
Answer: B, D
286. Given the following information taken from the syslogd configuration file:
mail.debug
ifdef('LOGHOST' , /var/adm/authlog, @loghost)
What is indicated id the mail messages are logged to /var/adm/authlog?
A. The loghost entry is not in the /etc/hosts file.
B. The loghost is unreachable over the network.
C. The local (current) host has an /etc/hosts alias of loghost.
D. The loghost variable is evaluated false by the m4 macro processor.
Answer: C
287. Which server file is read to obtain the clients host name during the RARP
phase of the
JumpStart boot sequence?
A. rules
B. hosts
C. dfstab
D. ethers
E. sysidcfg
F. bootparams
Answer: B
288. AdminSuite is used to accomplish which three actions? (Choose three)
A. Change disk RPM values
B. Ignore access time updates
C. Honor disk space requirements
D. Change minfree values (for ufs)
E. Ignore inode change time updates
F. Mount a file system with large files
Answer: A, D, F
289. With regard to the JumpStart services available with the Solaris Operating
Environment,
which server must reside on the same subnet as the client?
A. The web server
B. The boot server
C. The install server
D. The configuration server
Answer: B
290. Given: #pkill -HUP inetd. What are two results of executing this command?
(Choose two)
A. It forces inetd to re-read the /etc/inetd.conf configuration file.
B. It aborts all Internet services and leaves them in a quiescent state.
C. It stops NFS services in preparation for brining down the network.
D. It starts any Internet services that are listen in the /etc/inetd.conf file.
Answer: A, D
291. What is the function of the command modify_install_server script?
A. Moves the boot image to a new directory.
B. Replaces the miniroot of a boot image with a Web Start image.
C. Copies the contents of the Solaris 8 CD 2 of 2 to a boot image.
D. Copies the contents of the Solaris languages CD to a boot image.
Answer. B
292. You are in a high availability environment and cannot perform a reboot. What
needs to
happen when the auto_master map is updated?
A. Nothing needs to be done.
B. You need to stop and re-start nfsd.
C. You need to run the automount command.
D. You need to stop and re-start automountd.
Answer: C
293. Which is the syslogd configuration file?
A. /etc/syslog.conf
B. /etc/syslogd.conf
C. /usr/lib/syslog/syslog.conf
D. /usr/include/sys/syslogd.conf
Answer: A
294. Which statement about an Ethernet address is true?
A. It is unique for every system.
B. It has an entry in the /etc/inet/hosts file.
C. It is a 32-bit address divided into four 8-bit fields.
D. It is a number assigned by the system administrator.
Answer: A
295. System A is using TCP/IP over Ethernet to contact System B on its sub
network. System A
has System B's IP address but no Ethernet address. Which protocol
is used to establish System B's Ethernet
address?
A. ARP
B. RDP
C. RPC
D. TCP
E. RARP
Answer: A
296. Which information is transferred by Trivial File Transfer Protocol (TFTP) as
part of the
client boot sequence during JumpStart?
A. Client host name.
B. Client root (/) file system.
C. Client network boot image.
D. JumpStart configuration files.
Answer: C
297. Which command identifies the local systems Ethernet address?
A. netstart
B. ifconfig
C. snoop -a
D. netstat -l
E. ifconfig -a
Answer: E
298. When configuring a domain with a Network Information Service (NIS)
client-server
relationship, what qualifies a system as an NIS client?
A. Every system on the subnet is an NIS client.
B. Every system on the domain is an NIS client.
C. Only systems that are not NIS severs are NIS clients.
D. Only systems that are not NIS master servers are NIS clients.
Answer: D
299. What must be done before you run the command to check the integrity of the
cached file
system /export/home_cache?
A. Delete the cache.
B. Check the cache statistic.
C. Obtain the cache ID number.
D. Unmount the cached file system.
E. Adjust the working set size of the cache.
F. Find all backup Super block numbers for the file system.
Answer: D
300. Which two methods can be used to stop the spray service? (Choose two)
A. execute the 'rpcinfo -d sprayd 1' command.
B. execute the '/etc/init.d/sprayd stop' command.
C. edit the /etc/inetd.conf file to comment out the line for spray. And then execute
the 'pkill -HUP inetd'
command.
D. execute the 'ps -ef|grep spray' to acquire a PID for the command execute the kill
-9 PID to kill the spray
command.
Answer: C, D
301. Which two are functions of an NFS client? (Choose two)
A. Executes the nfsd.
B. Shares resources over the network.
C. Is confugted using the /etc/dfs/dfstab file.
D. Mounts remote resources across the network.
E. Views remotely mounted resources as though they were local.
Answer: D, E
302. What type of link can span over the file system?
Answer: symbolic
303. What is the function of the command modify_install_server script?
A. Moves the boot image to a new directory.
B. Replaces the miniroot of a boot image with a Web Start image.
C. Copies the contents of the Solaris 8 CD 2 of 2 to a boot image.
D. Copies the contents of the Solaris languages CD to a boot image.
Answer: B
304. Which Jumpstart server provides information that a Jumpstart client uses to
partition disks
and crate file systems?
A. Web server
B. Boot server
C. Install server
D. Configuration server
Answer: D
305. Which layer within the seven layer OSI/ISO model ensures that messages can
reach the
correct application?
A. Network layer
B. Data link layer
C. Transport layer
D. Presentation layer
Answer: C
306. Which statements about the /var/run file system are true? (Choose three)
A. It is owned by root.
B. It is the repository for non-system temporary files.
C. It is not unmounted with the unmount -a or the unmount all command.
D. It is the repository for temporary system files that are not needed across system
reboots.
Answer: A, C, D
307. What file is responsible for configuring syslog?
A. /etc/syslog.conf
B. /etc/default/syslog.conf
C. /etc/syslog
D. /etc/syslog/syslog.conf
E. /var/adm/syslog
Answer: A
308. Which of the following servers are required on every subnet to Jumpstart
clients?
A. Boot server
B. Configuration server
C. Install server
Answer: A
309. Which command should be used to manually invoke a consistency check and
perform any
necessary updates on a cacheFS file system?
A. cfsadmin -c
B. cfsadmin -d
C. cfsadmin -s
D. cachefsstat -z
E. cachefswssize -a
Answer: C
310. What needs to happen when the auto_home map is updated?
A. Nothing needs to be done.
B. You need to stop and re-start nfsd.
C. You need to run the automount command.
D. You need to stop and re-start automountd.
Answer: A
311. Choose 3 levels available in syslog:
A. err
B. crit
C. emerg
D. auth
E. daemon
F. kern
Answer: A, B, C
312. Which command is used to create a file system on a slice of disk?
A. ufs
B. fsck
C. newfs
D. format
E. fstypes
Answer: C
313. The NIS client contains local maps with regards to NIS.
A. True
B. False
Answer: B
314. Which three message severity entries used in the syslogd configuration file?
(Choose three)
A. lpr
B. alert
C. cron
D. mark
E. debug
F. warning
Answer: B, E, F
315. Which of the following cannot be assigned to a role?
A. A profile.
B. An authorization.
C. Another role.
D. More then one profile.
Answer: C
316. Which two statements about syslogd functionality are true? (Choose two)
A. Kernel, daemons, and syslogd each write directly to the system log.
B. Kernel error messages can only be logged locally in the system log.
C. Syslogd can write messages to the console as well as to the system log.
D. The logger command communicated with syslogd, which then logs the message as per
its configuration file.
Answer: C, D
317. After adding a new hardware device, configuration can be accomplished by?
(Choose two)
A. Booting the system with the boot -r option.
B. Booting the system with the boot -sa option.
C. Creating the file configuration prior to shutting down and adding the new
hardware.
D. Editing the configuration file to add the new device and run makedev in the
device directory.
Answer: A, C
318. How do you determine what kernel mode your system is running in?
A. kern -a
B. info-xv
C. sysman -xv
D. isainof -kv
Answer: D
319. The default router file is located in the _______ directory.
A. /var
B. /opt
C. /etc/router
D. /etc
Answer: D
320. Back file systems refer to?
A. Server side processes
B. Original source of data
C. Backend processing sub-systems
D. Transport of data
Answer: B
321. What is the highest alert level in syslog?
A. alert
B. emrg
C. crit
D. sevr
Answer: B
322. Which is NOT a valid option in the command: share -F nfs -o
ro=venus,rw=mars,bg,root=venus /us
A. –F nfs
B. rw=mars
C. bg
D. root=venus
E. ro=venus
Answer: C
323. You have remove credentials with?
A. nisadm
B. nisrmcred
C. nisaddcred
D. nispopulate
Answer: C
324. The password command automatically checks for NIS+ and uses it instead of
/etc/passwd:
A. True
B. False
Answer: B
325. Which of these queues and transports mail?
A. mail
B. mailx
C. sendmail
D. uucp
Answer: C
326. ARP is used to?
A. Resolve names of machines to their IP addresses
B. Resolve IP addresses of machines to their Ethernet addresses
C. Act as a translation between the network layer and the Internet layer
D. Resolve addresses
Answer: B
327. What is the command to see which users are logged into the network?
A. Who
B. Which
C. Rusers
D. Rlogin
Answer: C
328. Which of these can be used to backup a partition?
A. Ufsdump
B. Dd
C. Cpio
D. All of the above
Answer: D
329. The advantages of the replica server in NIS+ are? (Choose two)
A. Efficiency
B. Portability
C. Reliability
D. Centralization
Answer: A, C
330. What is a class B IP address?
A. 126.6.111.222
B. 132.6.111.222
C. 102.6.111.222
D. 192.6.111.222
Answer: B
331. What does the following command do?
find /export/home -user jsmith -print
A. Print out the pathname of all files under the home directory of jsmith
B. Print out the pathname of all files under /export/home
C. Print out all pathnames of files owned by jsmith
D. Print out all the pathnames of files owned by jsmith under/export/home
Answer: D
332. What is the name of the NIS+ service daemon that runs on the NIS server?
A. rpc.ypserv
B. rpc.nisd
C. rpc.nisserv
D. rpc.nisplusd
Answer: B
333. In an NIS+ namespace, what directory names are reserved? (Choose two)
A. org_dir
B. root_dir
C. table_dir
D. groups_dir
Answer: A, D |
|