免费注册 查看新帖 |

Chinaunix

  平台 论坛 博客 文库
最近访问板块 发新帖
查看: 1969 | 回复: 4
打印 上一主题 下一主题

SCSA 310-012 questions (part 1) [复制链接]

论坛徽章:
0
跳转到指定楼层
1 [收藏(0)] [报告]
发表于 2004-12-06 02:42 |只看该作者 |倒序浏览
I have done Solaris8 System Administraor exam2 (310-012) 6 month ago.  The following exam quetions I have used contains many real or similar ones for real test. This may give some help for some one who is going to take the exam. What I have to say is there are a few exam answers may NOT correct. You have to and must able to find out those wrong answers before go to the real one.

-------



Title : Solaris 8 System Administration II (part 1)



1.  Given the following information taken from the syslogd configuration file:
mail.debug
ifdef{'LOGHOST' ,/var/adm/authlog, @loghost}
What is indicated of the mail messages are logged to /var/adm/authlog?

A. The loghost entry is not in the /etc/hosts file.
B. The loghost in unreachable over the network.
C. The local (current) host has an /etc/hosts alias of loghost.
D. The loghost variable is evaluated false by the m4 macro processor.

Answer: C


2.  Which of the following will use RARP?

A. Data less client and jumpstart client
B. Diskless client and jumpstart client
C. Diskless client and data less client
D. Standalone machine

Answer: B


3.  Which is the syslogd configuration file?

A. /etc/syslog.conf
B. /etc/syslogd.conf
C. /usr/lib/syslog/syslog.conf
D. /usr/include/sys/syslogd.conf

Answer: A


4.   Which logical pathname should be used to identify a virtual volume (d0) under
Solstice
Disk
Suite control?

A. /dev/md/dsk/d0
B. /dev/sds/dsk/d0
C. /dev/lvm/dsk/d0
D. /dev/md/dsk/c1t1d0s1

Answer: A


5.   Which two are valid direct map entries that trigger the mounting of an NFS file
system
by the
automounter? (Choose two)

A. /docs/ /export/share/docs
B. /patch mars:/export/path
C. guest mars:/export/home/guest
D. /services /export/share/services
E. student mars:/export/home/student
F. /export/games saturn:/export/share/games

Answer: C, D


6.   Which of the following is the DNS daemon?

A. kerb.d
B. dns.d
C. in.named
D. in.dnsd

Answer: C


7.   What are two characteristics of the Solstice Disk Suite software? (Choose two)

A. It manages disk space by using sub disks.
B. It divides the physical disk into public and private areas.
C. It is able to assemble large volumes from multiple physical disks.
D. It uses standard disk slices that have been created using the format utility.

Answer: A, D


8.   If the automounter is used, which client file no longer needs to be updated to
allow
the
automatic mounting of NFS resources upon reboot of the client?

A. /etc/vfstab
B. /etc/default/fs
C. /etc/dfs/dfstab
D. /etc/dfs/fstypes
E. /etc/dfs/sharetab

Answer: A


10.   What do the entries in the /proc directory represent?

A. They are decimal numbers corresponding to process-ID numbers.
B. They are decimal numbers corresponding absolute sector numbers on a disk.
C. They are decimal numbers corresponding to the inode number of activate processes.
D. They are decimal numbers corresponding to a time stamp that identified the
process
messages on the
message logs.

Answer: A


11.   At what layer does the client/server model function?

A. Application
B. Transport
C. Internet
D. Network

Answer: A


12.   Which command lists the registered RPC services?

A. ipcs
B. lsrpc
C. rpcall
D. psrinfo
E. rpcinfo
F. rpclist

Answer: E


13.   Which server file is read to obtain the clients host name during the RARP
phase of
the
JumpStart boot sequence?

A. rules
B. hosts
C. dfstab
D. ethers
E. sysidcfg
F. bootparams

Answer: D


14.   Which statement about an Ethernet address is true?

A. It is unique for every system.
B. It had an entry in the /etc/inet/hosts file.
C. It is a 32-bit address divided into four 8-bit fields.
D. It is a number assigned by the system administrator.

Answer: A


15.   When placing a machine on a subnet, which of these is optional?

A. Create a new hostname.xxx for the new interface
B. Create new entries in /etc/inet/hosts
C. Modifying /etc/inet/netmasks
D. Rebooting the machine

Answer: A


16.   Which two methods can be used to stop the spray service? (Choose two)

A. Execute the 'rpcinfo 'd sprayd 1' command.
B. Execute the '/etc/init.d/sprayd stop' command.
C. Edit the /etc/inetd.conf file to comment out the line for spray, and then execute
the
'pkill -HUP inetd'
command.
D. Execute 'ps -ef|grep spray' to acquire a PID for the command and execute kill -9
PID to
kill the spray
command.

Answer: D, C


17.   Which three can function as naming services for the Solaris 8 Operating
Environment?
(Choose three)

A. NIS+
B. DNS
C. NFS
D. UFS
E. UNS
F. LDAP

Answer: A, B, F


18.   Which protocol maps Ethernet addresses to know IP addresses?

A. ARP
B. DNS
C. TCP
D. UDP

Answer: A


19.   You want to automatically mount an NFS resource. The NFS resource is mounted
so that
if the
server is unavailable, and the client reboots, the boot process will complete
successfully. Which two can be
added to the client's /etc/vfstab file to achieve
this?
(Choose two)

A. fg
B. ro
C. bg
D. intr
E. soft
F. hard

Answer: A, C


20.   Which of these will let you test your uucp settings?

A. uustat
B. uucheck
C. untry
D. uuxqt

Answer: B


21.   With regard to the JumpStart services available with the Solaris Operating
Environment, which
server provided information that a JumpStart client uses to
partition
disks and create file systems, and to add or
remove Solaris packages?

A. The web server
B. The boot server
C. The install server
D. The configuration server

Answer: D


22.   During the first build of a new NIS map, the slave servers do not know of its
existence, so the
push process attempt fails. What can you do to recover from this
problem?

A. You transfer the source files from the NIS master to the NIS slave and execute a
make
on the NIS slave.
B. You interrupt the build process with a Control-c, and push all of the maps from
the
master server at once
using the ypinit -s command.
C. You put the build process into background processing mode, add an empty map to
the
slave server and
foreground the build process to continue the build.
D. You interrupt the build process with a Control-c when the push process hangs, and
execute the ypxfr
command on the map from the slave server(s) to complete the build
process.

Answer: D


23.   Which name should be given to a direct automount map when it is created?

A. It can be called anything
B. It can only be called auto.direct
C. It can only be called auto_direct
D. It can only be called auto_master
E. It can be called anything as long as it is preceded by auto_

Answer: A


24.   An NFS client is a system that _____.

A. Contains the file resources to be shared with other systems on the network.
B. Provides access to local file systems for access by other systems on the same
subnet.
C. Has access to files or applications on any host in the network with a single user
identification and password.
D. Mounts the file resources that are shared over the network and presents the file
resources as if they were
local.

Answer: D


25.   What is a server that contains jumpstart information called?

A. Jumpstart server
B. Data less client
C. Diskless client
D. Installation server

Answer: D


26.  What tasks must be done on the NIS master to add support for a new JumpStart
client?
(Choose three)

A. Re-make NIS maps with the updated client information.
B. Edit the hosts file, add the new client name and IP address.
C. Edit the ethers file, add the new client name and Ethernet address.
D. Edit the bootparams file, add the client name and architecture type.
E. Edit the rules file, add the client name and software configuration cluster
information.
F. Edit the class file, add the clients name and location of configuration and
installation servers.

Answer: A, B, F


27.   You want to enable the logging of every failed login attempt. To do this you
must
change the
syslogd configuration file from its installation defaults. Which facility
should you change?

A. auth
B. kern
C. user
D. notice
E. emerg
F. daemon

Answer: A


28.   Which command is used to install the information from the Solaris 8 software 2
of 2
CD-ROM
to an existing JumpStart image?

A. add_install_client
B. add_install_server
C. setup_install_server
D. add_to_install_server
E. modify_install_server

Answer: D


29.   Which two must you complete when configuring an NIS slave server? (Choose two)

A. You execute the domainname command to set the local NIS domain.
B. You edit the /etc/hosts file to include the NIS master server and NIS slave
servers.
C. You edit the slave server copies of the /etc/ethers file to identify MAC
addresses of
the NIS clients.
D. You execute the ypbind command on the slave server to pull the NIS maps from the
master
server to the
slave server.

Answer: B, D


30.   You have written a start script to launch application XXX when the system
starts.
You decide
to add a command to the script. If the application does now launch, it
logs a
message with syslogd with the
appropriate severity. Which command accomplished this?

A. logger XXX failed to start
B. syslog -s 7 XXX failed to start
C. log -f user -s err XXX failed to start
D. logger -F user s err XXX failed to start
E. echo XXX failed to start, severity=7>;>;/var/adm/messages

Answer: C


31.   What path names represent block devices? (Choose three)
A. /dev/md/dsk/d0
B. /dev/md/rdsk/d0
C. /dev/dsk/c0t1d0s5
D. /dev/rdsk/ c0t1d0s5
E. /dev/vx/dsk/apps/logvol
F. /dev/vx/rdsk/apps/logvol

Answer: A, C, E


32.   Where is the variable CONSOLE used?

A. /etc/login
B. ~/.login
C. /etc/default/passwd
D. /etc/default/login

Answer: D


33.   In the execution attributes database, what is NOT a valid value fir the attr?
(Which
is the last
field)

A. euid
B. uid
C. egid
D. suid

Answer: D


34.   What does Sun Management Console do? (Choose two)

A. It provides a means of connecting to a remote system at the ok prompt.
B. It provides a GUI through which local and remote systems can be administered.
C. It provides a means of managing remote systems without having to do a remote
login.D. It provides a common terminal window to type commands, which subsequently run on
a
number of
Solaris 8 systems at the same time.

Answer: B, C


35.   What does key login -r do?

A. Creates .root key.
B. Lets you login remotely.
C. Removes the key.
D. Refreshes the keys in the key server.

Answer: A


36.   Which command creates a log called /var/home_cache.log and initiates logging
for the
/export/home file system which is being cached?

A. cachefslog /var/home_cache.log
B. cachefslog -h /var/home_cache.log
C. cachefswssize /var/home_cache.log
D. cachefslog -f /var/home_cache.log /export home
E. cachefslog -s /var/home_cache.log /export/home

Answer: D


37.   Which file within /etc acts as a template to the name service configuration
file for
NIS?

A. nsswitch.nis
B. nsswitch.nis+

Answer: A


38.   A principal with invalid credentials will? (Choose three)

A. Not be able to login.
B. Will use the world category.
C. Will use the nobody category.
D. Will be denied access to all the NIS+ tables.

Answer: A, C, D


39.   There is no entry for /var/tmp in the dfstab file. Without editing the
/etc/dfs/dfstab file, which
command should be used to add the /var/tmp resource to
the
list of existing shared resources?

A. shareall /var/tmp
B. share -F /var/tmp
C. mountall -d /var/tmp
D. share -F nfs /var/tmp
E. export -F nfs /var/tmp

Answer: D


40.   Which two statements about the m4 macro processor are true? (Choose two)

A. The ifdef statement makes it possible to log messages remotely.
B. Use if the ifdef statement makes remote logging of messages impossible.
C. Lines containing the ifdef statement are passed directly to syslogd for
processing.
D. The m4 processor passes any line with syntax it does not recognize directly to
syslogd.
E. Lines which do not contain recognized m4 syntax are ignored by the m4 processor
and
consequently no not
reach syslogd.F. The m4 processor processes lines containing the ifdef statement, passing only the
result to syslogd.


Answer: D, F



41.   What kind of information does nis_cachemgr cache?

A. Data
B. Tables
C. Directories
D. Columns

Answer: C


42.  Given:
lo0:flags= 100849<UP, LOOPBACK, RUNNING, MULTICAST, Ipv4>; mtu 8232 index1 inet
127.0.0.1
netmask ff000000
le0:flags=100863<UP, BROADCAST, NOTRAILERS, RUNNING, MULTICAST, Ipv4>; mtu 1500 index
2 inet 192.200.200.9 netmask ffffff00 broadcast 192.200.200.255
ether 8:0:20:8a:74:e0
What is the MAC address?

A.  8:0:20:8a:74:e0
B.  ffffff00

Answer: A


43.  What is the function of the network layer in the seven layer OSI/ISO model?

A. It manages data addressing and delivery between networks.
B. It manages the delivery of data across the physical network.
C. It manages user-accessed application programs and network services.
D. It manages the presentation of the data to be independent of the architecture.

Answer: B


44.   From where can you make changes to NIS+ tables?

A. Any client in the entire domain.
B. Any client in the subdomain at the same level or above.
C. Any client in the subdomain.
D. Any client in the directory.

Answer: A


45.   What line should be entered into saturn's /etc/dfs/dfstab file to enable a
remote
root user on the
client system mars to have root privileges on the /var shared
resource?

A. share -F nfs /var
B. share -F nfs -o ro /var
C. share -F nfs root=mars /var
D. share -F nfs -0 ro=mars /var
E. share -F nfs -o root=mars /var

Answer: E


46.   You have written a start script to launch application XXX when the system
starts.
You decide
to add a command to the script. If the application does not launch, it
logs a
message with syslogd with the
appropriate severity. Which command accomplishes this?

A. Logger XXX failed to start
B. Syslog -s 7 XXX failed to start
C. Logger -p user.err XXX failed to start
D. Log -f user -s err XXX failed to start
E. Logger -F user -s err XXX failed to start
F. Echo XXX failed to start, severity=7>;>;/var/adm/messages

Answer: C


47.   The auto_home autofs is an example of which type of map?

A. xfn
B. direct
C. master
D. generic
E. indirect

Answer: E


48.   Which contains the name of the domain used at boot time?

A. /etc/domainname
B. /etc/defaultdomain
C. NIS_PATH
D. NIS_DEFAULTS

Answer: B


49.   Which three name services provide, or can be customized to provide, locale
information as per
/etc/locale? (Choose three)

A. NIS
B. NIS+
C. UNS
D. DNS
E. UDP
F. LDAP

Answer: A, B, F


50.   Which statement about the Sun RPC service is true?

A. RPC facilitates remote power control of a Solaris 8 system.
B. RPC allows a remote system to call a procedure by an alias.
C. RPC allows a user to run commands (procedures) on a system remotely.
D. RPC allows applications (services) to be dynamically assigned port numbers.

Answer: D


51.   Which two JumpStart client system identification parameters cannot be
configured
using a
name service, but must be configured using the sysidcfg file? (Choose two)

A. Time zone
B. System locale
C. Client host name
D. IPV6 configuration
E. Kerberos configuration

Answer. D, E


52.   Which of the following sets the default NIS+ group?

A. NIS_PATH
B. NIS_GROUP
C. NIS_DEFAULTS
D. /var/nis/groups

Answer: C


53.   Which service is provided by a naming service?

A. Labeling tape volumes for backup.
B. Reporting filename to inode relationship.
C. Uniquely naming file system mount points.
D. Uniquely naming network shared resources.
E. Providing a shared repository for administrative data.

Answer: B


54.   Which command is used to manually pull individual NIS maps from the NIS
master?

A. ypxfr
B. ypcat
C. ypserv
D. yppush

Answer: A


55.   In the execution attributes database, what is NOT a valid value for the attr
(which
is the last
field)?

A. euid
B. uid
C. egid
D. suid

Answer: D


56.   How do you change the NIS+ time to live field?

A. nischttl
B. admintool
C. nisadm
D. nischmod
E. nis.ttl

Answer: A


57.   What must be done before you run the command to check the integrity of the
cached
file
system /export/home_cache?

A. Delete the cache.
B. Check the cache statistics.
C. Obtain the cache ID number.D. Unmount the cached file system.
E. Adjust the working set size if the cache.
F. Find all backup Super block numbers for the file system.

Answer: D


58.   Which command configures the cache /export/home_cache that should be used when
caching
the /export/home file system?

A. cfsadmin -l /export/home_cache
B. cfsadmin -p /export/home_cache
C. cfsadmin -c /export/home_cache
D. cfsadmin -m /export/home_cache
E. cachefslog -c /export/home_cache

Answer: C


59.   Which logical pathname should be used to identify a virtual volume (d0) under
Solstice Disk
suite control?

A. /dev/md/dsk/d0
B. /dev/sds/dsk/d0
C. /dev/lvm/dsk/d0
D. /dev/dsk/c1t1d0s1
E. /dev/md/dsk/c1t1d0s1

Answer: A


60.   How many layers are in the OSI model?

A. 5
B. 6
C. 7
D. 10

Answer: C


61.   Which command should be used to manually mount the remote file system
/export/home
from
the server mars and implement a cache file system?

A. cfsadmin -c mars:/export/home /export/home_cache
B. mount mars:/export/home -o /export/home_cache -backfstype cacheid=cacheidhome
C. mount -F cachefs cachedir=/export/home_cache mars:/export/home backfstype -o
/export/home
D. mars:export/home /export/home backfstype=nfs \o
cachedir=/export/home_cache_dir_cacheid=cachehomeid
E. mount -F cachefs -o
backfstype-nfs,cachedir=/export/home_cache,cacheid=cachehomeid
mars:/export/home/export/home

Answer: E


62.   What are two characteristics of Solstice Disksuite software? (Choose two)

A. It manages disk space by using sub disks.
B. It divides the physical disk into public and private areas.
C. It is able to assemble large volumes from multiple physical disks.
D. It uses standard disk slices that have been created using the format utility.

Answer: C, D


63.   Which command mounts the device /dev/dsk/c1t0d0s0 on the mount point /mnt so
it
prevents
the creation of files larger than 2GB?

A. mount /dev/dsk/c1t0d0s0 /mnt
B. mount nolargefiles 7dev/dsk/c1t0d0s0 /mnt
C. mount /dev/dsk/c1t0d0s0 -nolargefiles /mnt
D. mount -o nolargefiles /dev/dsk/c1t0d0s0 /mnt

Answer: D


64.   What will the following command do?# pkill -HUP inetd

A. Kill the inetd.d daemon.
B. Send a Hangup signal to inetd and cause it to reread its inetd.conf file.
C. Kill the inetd daemon and send an init 5 signal.
D. Send a signal 2 to the inetd daemon.

Answer: B


65.   Rpcbind does what?

A. Binds the network protocols to a network card.
B. Interprets incoming request and sends to the appropriate server processes.
C. Binds the network communication to the operating system.
D. Allows the communication between server and clients.

Answer: B


66.   Which command is used to check the integrity of a file system?
A. fsck
B. fsck-a

Answer: A


67.   After creating and adding additional swap space, what is the correct method of
ensuring the
swap space is available following subsequent reboots?

A. Add it as a line to /etc/vfstab
B. Make a startup script and add it to /etc/init.d using the swap -a command
C. This cannot be done, you must adjust the size of the swap partition
D. Add a line to the /etc/dfstab file

Answer: A


68.   The command #pkill -HUP inetd will do what? (Choose two)

A. Delete the file inetd.
B. Kill the process inetd.
C. Re-read inetd.conf.
D. Restart Internet services.
E. Stop all Internet services.

Answer: C, D


69.   What is the name given to contiguous sector groups that are used to manage
disk
space under
the Sun StorEdge Volume Manager application?

A. Subdisks
B. Logical areas
C. Metadevices
D. Striped areas

Answer: A


70.   What are the two fields of the syslog?
A. Field 1 and field 2.
B. Selector and action.
C. Action and resolution.
D. Affect and cause.

Answer: B


71.   What command updates entries in the syslog?

A. sys.update
B. logger
C. logsys
D. update -s

Answer: B


72.   Which three are characteristics of the procfs file system type? (Choose three)

A. It maintains a repository of file descriptors for open files.
B. File ownership is determined by the user ID of the specified process.
C. It contains a decimal number directory entry corresponding to a process ID.
D. Each process ID named directory has files that contain more detailed information
about
that process.

Answer: B, C, D


73.   What is the default shell assigned to a user when you add a role to him?

A. /usr/bin/pfsh
B. /usr/bin/pfksh
C. /usr/bin/pfcsh
D. /usr/bin/sh
E. /usr/bin/ksh
F. /usr/bin/csh

Answer: A


74.   What command can be used to make an empty file to be added to the current swap
space?

A. mkfile
B. file -a
C. tmpfile -a
D. mkfs -a

Answer: A


75.   What is the function of the OSI network layer?

A. Application services
B. Converts IP addresses to MAC addressesC. Routing
D. Provides reliable transport for the TCP protocol

Answer: C


76.   Which daemon process, that runs on NIS master servers and NIS slave servers,
is a
utility that
responds to bind request from NIS clients?

A. ypxfrd
B. ypbind
C. ypserv
D. ypupdated

Answer: C


77.   What command displays the amount of space in the cache file system?

A. cache -l
B. cache -data
C. cachefswssize
D. cache -sz

Answer: C


78.   Which of the following describes the format of the RBAC Users Attributes
Database
file?

A. name:qualifier:res1:res2:attributes
B. name:res1:res2:description:attributes
C. name:res1:res2:short description:long description: attributes
D. name:policy:type:res1:res2:ID:attributes

Answer: A


79.   Front file systems refer to?

A. Cached local file systems.
B. Front end client file systems.
C. Front side client processing.
D. Back end processing.

Answer: A


80.   Which process or daemon is executed by the /usr/lib/netsvc/yp/ypstart script
on all
NIS client?

A. ypxfrd
B. ypbind
C. ypserv
D. rpc.yppasswdd

Answer: B
??????????????????


81.   Which of the following commands is used to setup an install server?

A. setup_install_server
B. setup_install_server -b
C. install_server_setup
D. server_setup -i

Answer: A


82.   What file contains send mail configurations?

A. /etc/sendmail.conf
B. /etc/sendmail.cfg
C. /usr/lib/sendmail.cf
D. /usr/lib/sendmail.config

Answer: C


83.   During the JumpStart client boot sequence, the /etc/inet/hosts file on the
server is
consulted to
obtain what client information?

A. IP address
B. Ethernet address
C. Rules information
D. Class information
E. Bootparams information

Answer: A


84.   The _______ file controls how network information is obtained.

A. network.cnfig
B. nsswitch.conf
C. netfs.config
D. nfsshare.conf

Answer: B


85.   What utility is used to build NIS maps?

A. make
B. mkmap
C. NISmap
D. Nismake

Answer: A


86.   Which type of JumpStart server must be available on every subnet that has
JumpStart
clients?

A. NFS server
B. Boot server
C. Install server
D. Application server
E. Configuration server

Answer: B


87.   Cfsadmin can be used to delete a cached file system.

A. True
B. False

Answer: A


88.   You can edit the _______ file to make added swap space permanent:

A. /tmp/swp.fs
B. /etc/vfstab
C. /etc/tmp.swap
D. /etc/inetd.conf

Answer: B


89.   Which files need to be configured on the server to allow the JumpStart client
operation?
(Choose four)

A. hosts
B. vfstab
C. dfstab
D. ethers
E. mnttab
F. bootparams

Answer: A, C, D, F


90.   Where is the syslog configuration file located?

A. /usr/syslog/bin/syslog.conf
B. /etc/syslog/syslog/conf
C. /etc/syslog.cong
D. /etc/syslog.conf

Answer: D


91.  The Solaris Management console does what?

A. Allows for the creation of users.
B. Allows for the creation of shares.
C. Allows for the ability to change and view attributes of systems on the network.
D. Allows for the remote backup of client machines.

Answer: C


92.   When configuring a domain with a Network Information Service (NIS)
client-server
relationship, what qualifies a system as an NIS client?

A. Every system on the subnet is an NIS client.
B. Every system in the domain is an NIS client.
C. Only systems that are not NIS servers are NIS clients.
D. Only systems that are not NIS master servers are NIS clients.

Answer: D


93.   Where is the partition table saved on the disk?

A. Super block
B. Cylinder group block
C. Disk label
D. Cylinder group

Answer: C


94.   The NIS+ security level is specified by?

A. Settings in rpcB. NIS+ tables
C. An option when launching rpc.nisd
D. /etc/nis.conf

Answer: C


95.   You have created an RBAC role which is allowed to perform privileged tasks.
You want
to
allow certain existing users to access the role. Which three actions should you
take to
ensure that users can
access the role? (Choose three)

A. You give the users the password to the role.
B. You give the users a profile type shell at login.
C. You connect the user to the role through the usermod command.
D. You inform the users that they can access the role through use of the su command.
E. You inform the users that they can access the role through use of a direct login,
Telnet, or rlogin.
F. You give the users execute permissions to the privileged commands associated with
the
tole through use of
the ACL mechanism.

Answer: A, C, D


96.   You system is behaving strange, where can you look for errors?

A. /etc/log.sys
B. /var/system.log
C. /var/adm/messages
D. /etc/sys/messages

Answer: B


97.   If the following entry is listed in nsswitch.conf, what will happen?
Hosts: nisplus [NOTFOUND=return] files

A. /etc/hosts will never be consulted.
B. Will search in NIS+, if unavailable then will search in /etc/hosts.
C. If found in both NIS+ and in /etc/hosts, NOTFOUND will be returned.
D. If not found in both NIS+ and /etc/hosts, NOTFOUND will be returned.

Answer: A


98.   After creating an RBAC role, you find ordinary, non-privileged commands are
not
available.
What causes this problem?

A. The role is not associated with the correct profiles.
B. The access mechanism to the role is not initializing properly.
C. The role's profile is not associated with the correct commands.
D. The files identifying the privileged commands has missing entries.
E. The role's profile is not associated with the correct authorizations.

Answer: A


99.   Which of the following is encrypted?

A. Public
B. Private
C. Local
D. Remote

Answer: B


100.   Which NIS system(s) contains the original ASCII files that are used to
generate the
NIS
maps?

A. NIS client only.
B. NIS slave server only.
C. NIS master server only.
D. NIS master server and NIS slave server.

Answer: C

论坛徽章:
0
2 [报告]
发表于 2004-12-06 09:59 |只看该作者

SCSA 310-012 questions (part 1)

可是我考9啊!

论坛徽章:
0
3 [报告]
发表于 2004-12-06 11:20 |只看该作者

SCSA 310-012 questions (part 1)

Solaris 8 and 9 are not big different. If you totaly understand solaris8's question, it still will help you for your Solaris 9 admin examination.

论坛徽章:
0
4 [报告]
发表于 2004-12-06 11:49 |只看该作者

SCSA 310-012 questions (part 1)

顶啊!8、9真的没有什么大区别的呀?

论坛徽章:
0
5 [报告]
发表于 2004-12-08 01:41 |只看该作者

SCSA 310-012 questions (part 1)

201.   You want to enable the logging of every failed login attempt. To do this you
must
change the
syslogd configuration file from its installation defaults. You have selected the
appropriate
facility. Which
severity level should you use with it?

A. lrp
B. err
C. mail
D. alert
E. notice
F. warning

Answer: D


202.   Which two commands should be used to mount device /dev/dsk/c0t1d0s1 onto the
mount
point /mnt if there is an entry in the /etc/vfstab file for this particular file
system?
(Choose two)

A. mount /mnt
B. umount /mnt
C. mount /dev/dsk/c0t1d0s1 /mnt
D. mount /dev/rdsk/c0t1d0s1 /mnt
E. mount -o /mnt /dev/dsk/c0t1d0s1 /mnt

Answer: C


203.   Which two commands should be used to mount the device /dev/dsk/c0t1d0s1 onto
the
mount
point /mnt if there is an entry in the /etc/vfstab file for this particular file
system?
(Choose two)

A. mount /mnt
B. unmount /mnt
C. mount /dev/dsk/c0t1d0s1 /mnt
D. mount /dev/rdsk/c0t1d0s1 /mnt
E. mount -o /mnt /dev/dsk/c0t1d0s1 /mnt

Answer: A, C


204.   Exhibit:
Which type of JumpStart configuration file is shown in the exhibit?

A. rules file
B. class file
C. finish script
D. sysidcfg file
E. bootparams file

Answer: B


205.   Which layer within the seven layer OSI/ISO model ensures that messages reach
the
correct
application?

A. Network layer
B. Data link layer
C. Transport layer
D. Presentation layer

Answer: C


206.   Which command is used to create a file system in a slice of disk?

A. ufs
B. fsck
C. newfs
D. format
E. fstypes

Answer: C


207.   When nisinit is executed on an NIS+ client, which file is copied from the
NIS+
server?

A. /var/nis"domainname"
B. /var/nis/parent.object
C. /var/nis/NIS_COLD_START
D. /var/nis/NIS_SHARED_DIRCACHE

Answer: C


208.   Which statements about Sun Management Console are true? (Choose three)

A. It provides a graphical means to manager metadevices.
B. It simplifies administration by brining the tools together in one location.
C. It allows management of all the Sun Management Console servers in one location.
D. It gives the user a graphical representation of the administration components
available
and the level if user
privilege required running them.

Answer: A, B, C


209.   Which line should be entered into saturns /etc/dfs/dfstab file to enable a
remote
root user on
the client system mars to have root privileges on the /var shared resource?

A. share -F nfs /var
B. share -F nfs -o ro /var
C. share -F nfs root=mars /var
D. share -F nfs -o ro=mars /var
E. share -F nfs -o root=mars /var

Answer: E


210.   What needs to happen when the auto_home map is updated?

A. Nothing needs to be done.
B. You need to stop and re-start nfsd.
C. You need to run the automount command.
D. You need to stop and re-start automountd.

Answer: A


211.   Which two terms can be synonymous with the term "server"? (Choose two)

A. Host
B. Printer
C. Domain
D. Network
E. Process

Answer: A, E


212.   You administer a very large network of system, using the NIS+ naming service.
Your
company wants to implement a solution with equivalent scalability that will support
a more
heterogeneous
environment. Which action provided the solution?

A. Configure your network to use NIS
B. Configure your network to use FTP
C. Configure your network to use NFS
D. Configure your network to use NIS+
E. Configure your network to use DNS
F. Configure your network to use LDAP

Answer: F


213.   On a workstation, which command is used to find out the exported file systems
on
NFS
server
Venus?

A. dfsmount venus
B. exportfs venus
C. share venus
D. dfshares venus

Answer: D


214.   Given the line from a name service configuration file: Hosts files nis
nisplus dns
Which
statement correctly describes the behavior of the name service switch?

A. The attempt to locate a hosts IP address would begin with DNS and continue if
necessary,
to use each name
service, reading from right to left stopping only of the IP address was found or the
name
service list exhausted.
B. The attempt to locate a hosts IP address would begin with local files and
continue, if
necessary, to use each
name service, reading left to right stopping only if the IP address was found or the
name
service list exhausted.
C. The attempt to locate a hosts IP address would begin with DNS and continue, if
necessary,
to use each name
service, reading from right to left stopping if the IP address was wound, any of the
name
services were
unavailable, or the name service list exhausted.
D. The attempt to locate a hosts IP address would begin with local files and
continue, if
necessary, to use each
name service, reading left to right stopping if the IP address was found, any of the
name
services were
unavailable, or the name service list exhausted.

Answer: D


215.   You want to configure the JumpStart server jsserver to support a JumpStart
client.
Which
option and parameter in the add_install_client script should be used to specify the
sysidcfg
file located in the
directory /export/install/config?

A. –c /export/install/config
CertGuaranteed. Study Hard and Pass Your Exam.
B. –p /export/install/config
C. –p jsserver:/export/install/config
D. –c /export/install/config/sysidcfg
E. –c jsserver:/export/install/config/sysidcfg
F. –p jsserver:/export/install/config/sysidcfg

Answer: C


216.   Which command is executed on the NIS slave server to copy the maps from the
NIS
master
server?

A. ypxfr
B. yppull
C. yppush
D. ypserv

Answer: A


217.   A single entry in a direct map? (Choose two)

A. May contain special options for all direct mount points.
B. May contain special options for only one mount point.
C. May contain an absolute pathname for a mount point.
D. May contain a relative pathname for a mount point.

Answer: B, C


218.   What is an advantage of using either Solstice Disk Suite or Sun StorEdge
Volume
Management software to concatenate your devices?

A. If a disk in the volume fails, the file system is still available for use.
B. Two copies of the data are written at the same time and users can access either
copy.
C. Data can be written to the volume very quickly, resulting in a performance
improvement.
D. A volume can be grown while mounted and in use by concatenating additional slices
to
it.

Answer: D


219.   You administer a growing network of systems, each using local files to
authenticate
users.
People using a variety of systems have accumulated many login names and passwords.
You
find
that it is
difficult to service users authentication problems and you are concerned about
passwords
being transferred over
the network without encryption. You need to minimize network traffic. What are two
solutions
to there
problems? (Choose two)

A. Configure your network to use NIS
B. Configure your network to use FTP
C. Configure your network to use NFS
D. Configure your network to use DNS
E. Configure your network to use NIS+
F. Configure your network to use LDAP

Answer: E, F


220.   What are the types of automount maps?

A. Exported, master, slave
B. Exported, local, remote
CertGuaranteed. Study Hard and Pass Your Exam.
C. Master, direct, indirect
D. Master, indirect, auto_home

Answer: C


221.   What should be added to the /etc/vfstab file to automatically mount the /var
file
system from
the NFS server saturn onto the mount point /test so it is mounted as read only with
interrupts disabled?

A. saturn:/var - /test nfs - yes -
B. saturn:/var - /test nfs - yes ro
C. saturn:/var - /test nfs - yes ro,int
D. saturn:/var - /test nfs - yes bg,soft
E. saturn:/var - /test nfs - yes ro,nointr

Answer: E


222.   The action field in the syslogd configuration file may contain which types of
entry?
(Choose
two)

A. A host name prefixed with @
B. A list of user email addresses
C. The full path name to a file or device file
D. A pipe sign ( | ) followed by a command to which the message output is piped.

Answer: B, D


223.  Which statement about the Sun RPC service is true?

A. RPC facilitates remote power control of a Solaris 8 system.
B. RPC allows a remote system to call a procedure by an alias.
C. RPC allows a user to run command (procedures) on a system remotely.
D. RPC allows applications (services) to be dynamically assigned port numbers.
Answer: D


224.   The max number of hosts in a class A IP address is?

A. 127
B. 128
C. 254
D. 255

Answer: A


225.   What is the purpose of automount maps?

A. To list all maps in use and their trigger nodes.
B. To keep a list of what resources are NFS mounted.
C. To synchronize mounting between client and server.
D. To enable the client to automatically mount NFS resources.
E. To enable the server to track what resources the client is mounting.

Answer: D


226.   Which name should be given to a direct automount map when it is created?

A. It can be called anything
B. It can only be called auto.direct
CertGuaranteed. Study Hard and Pass Your Exam.
C. It can only be called auto_direct
D. It can only be called auto_master
E. It can be called anything as long as it is preceded by auto_.

Answer: A


227.   Which command lists the registered RPC services?

A. ipsc
B. lsrpc
C. rpcall
D. psrinfo
E. rpcinfo
F. rpclist

Answer: E


228.   Which daemon most be running on an NFS server?

A. biod
B. nfsd
C. ypbind
D. mountd
E. rpc.nisd

Answer: B, D


229.   Which problem arises if the Jumpstart client and the boot server are on
different
subnets?

A. No problem with this type of setup will arise.
B. The client is unable to NFS mount the / (root) file system.
C. The boot server does not receive the client RARP request.
D. The client is unable to retrieve the location of the rules file from the boot
server.

Answer: C


230.   During the first build of a new NIS map, the slave servers do not know of its
existence, so the
push process attempt fails. What can you do to recover from this problem?

A. You transfer the source files from the NIS master to the NIS slave and execute a
make
on
the NIS slave.
B. You interrupt the build process with a Control-C, and push all of the maps form
the
master server at once
using the ypinit -s command.
C. You put the build process into background processing mode, add an empty map to
the
slave
server, and
foreground the build process to continue the build.
D. You interrupt the build process with a Control-C when the push process hangs, and
execute
the ypxfr
command on the map from the slave server(s) complete the build process.

Answer: D


231.   After creating an RBAC role, you find ordinary, non-privileged commands are
not
available.
What causes this problem?

A. The role is not associated with the correct profiles.
B. The access mechanism to the file is not initializing properly.
C. The roles profile is not associated with the correct commands.
D. The file identifying the privileged commands has missing entries.
CertGuaranteed. Study Hard and Pass Your Exam.
E. The files profile is not associated with the correct authorizations.

Answer: A


232.   Which file within /etc acts as a template to the name service configuration
file
for
NIS+?

Answer: nsswitch.nisplus


233.   Which three statements about Sun Management Console are true? (Choose three)

A. It provides a graphical means to manage metadevices.
B. It simplifies administration by brining the tools together in one location.
C. It allows management of all the Sun Management Console servers in one location.
D. It gives the user a graphical representation of the administration components
available
and the level of the
user privilege required to run them.

Answer: B, C, D


234.   What is the proper way to restart the automount daemon?

A. /etc/init.d/nfs.client stop, then /etc/init.d/nfs.server start
B. /etc/init.d/nfs.serve stop, then /etc/init.d/nfs.client start
C. kill -HUP -1
D. shutdown -y g600 -i2

Answer: D


235.   Which three functions can syslog perform? (Choose three)

A. Write messages to the system log.
B. Forward messages to a list of users.
C. Forward input to the root user.
D. Forward messages to the syslog daemon an another host.
E. Write IP messages to the processes that are generating errors.
F. Interrupt processes that are producing errors above a pure config thread .

Answer: A, B, D


236.   Which are recommended, but not necessary to complete before a system backup?
(Choose
three)

A. Check system activity
B. Change run levels
C. Analyze bad blocks
D. Reboot
E. Fsck

Answer: A, C, D


237.   Which daemon process that runs on a NIS master server and NIS slave server is
a
utility that
responds to bind request from NIS clients?

A. ypxfrd
B. ypbind
C. ypserv
D. ypupdates

Answer: C


238.   What is the command to check file system consistency?

Answer: fsck


239.   What do you have to do in NIS supporting a Jump Start client? (Choose three)

A. Edit hosts
B. Edit others
C. Edit bootparams
D. Update NIS maps
E. Edit class file
F. Edit rules file

Answer: A, B, D



240.   Which command checks /dev/rdsk/c2t3d01 using a super block?

A. fsck -32 /dev/rdsk/c2t3d01
B. fsck -s 0 /dev/rdsk/c2t3d01
C. fsck -o b=32 /dev/rdsk/c2t3d01
D. fsck -o f -block 32 /dev/rdsk/c2t3d01

Answer: C


241.   You login to a non-UNIX host from a UNIX host use?

A. rsh
B. rlogin
C. telnet
D. rcp

Answer: C


242.   How can you view active shares?

A. dfshares
B. shares
C. dfmounts
D. share.mounts

Answer: A


243.  Which of these commands will indirectly define a sendmail.cf variable?

A. F
B. C
C. D
D. L

Answer: D


244.   Which file contains boot parameters and is updates by the add_install_client
command?

A. /etc/bootparams
B. /etc/bootconfig
C. /etc/boot/conf
D. /etc/bootparams.conf

Answer: A
???????????????????? ( there are no files such as boot* under /etc)


245.   Which daemon is needed for an NFS client?

A. mountd
B. nfsd

Answer: B


246.   What command should you to determine who last logged in and out of the
system?

A. last
B. users
C. access -u
D. access -p

Answer: A


247.   What file specifies what processes to start at boot?

A. /etc/inittab
B. /etc/init
C. /etc/init.conf
D. /etc/boot.pr

Answer: A


248.   By default the nsswitch file is configured to use?

A. DNS
B. NIS
C. TCP
D. UDP

Answer: B


249.   What does the prtconf command do?

A. Prints systems information
B. Displays printer information
C. Displays printer information on other machines

Answer: A


250.   What command can be used to add and additional swap file to the swap space?
A. add -s
B. swap -a
C. swp -add
D. fswap -a

Answer: B


251.   How many layers exist in the TCP/IP model?

A. 3
B. 4
C. 5
D. 6

Answer: C


252.   To synchronize the NIS+ master with its replicas you need to run?

A. ypmake
B. nismake
C. ypsync
D. Nothing, the system does it automatically

Answer: D


253.   What is, /etc/inet/hosts associated with?

A. Ethernet address
B. Internet address
C. Rlogin

Answer: B


254.   Public keys for all servers are stored in NIS_SHARED_CACHE?

A. True
B. False

Answer: A


255.   A mail server holds:

A. /etc/mail/aliases
B. /etc/mail/sendmail.cf
C. /var/mail

Answer: C


256.   Which of the following defines Internet services?

A. /init.d/inetsvc
B. /init.d/inetinit
C. /inet/inetd.conf
D. /etc/network start

Answer: C


257.   Which TCP/IP layer handles fragment encapsulation and is responsible for
putting frames on
the physical network?

A. Physical
B. Network
C. Data link
D. Internet
E. Transport

Answer: C
??????????????????


258.   On a data less client a swap device and low memory, which will improve
performance?

A. Lower memory
B. Disable tmpfs
CertGuaranteed. Study Hard and Pass Your Exam.
C. Disable swap
D. None of the above

Answer: D


259.   What is NOT needed to install a server?

A. Ethernet address
B. Name
C. Internet address
D. Zone/location

Answer: A


260.   Which file contains the default remote file system type?

A. /etc/dfs/fstypes
B. /etc/default/fs

Answer: A


261.   Which three can function as naming service for the Solaris 8 Operating
Environment?
(Choose three)

A. NIS+
B. DNS
C. NFS
D. UFS
E. UNS
F. LDAP

Answer: A, B, F


262.   When you execute nisinit client, what is copied to the client from the
server?

A. /var/nis/NIS_COLD_START
B. /var/nis/NIS_SHARED_DIRCACHE
C. /var/nis/domainname

Answer: A


263.   Which file is used to configure a Solaris kernel?

A. /etc/system
B. /etc/kernel
C. /etc/vfstab
D. /etc/inet.conf

Answer: A


264.   Which command creates a log called /var/home_cache.log and initiates logging
for the
/export/home file system which is being cached?

A. cachefslog /var/home_cache.log
B. cachefslog -h /var/home_cache.log
C. cachefswssize /var/home_cache.log
D. cachefslog -f /var/home_cache.log /export/home
E. cachefslog -s /var/home_cache.log /export/home

Answer: D


265.   On a server, /export/swap is usually used for?

A. Additional swap space for the server
B. Additional swap space for data less clients
C. Root file system for diskless clients
D. Swap files for diskless clients

Answer: D


266.  Which command should be used to manually invoke a consistency check and
perform any
necessary updates on a cacheFS file system?

A. cfsadmin -c
B. cfsadmin -d
C. cfsadmin -s
D. cachefsstat -z
E. cachefswssize -s

Answer: C


267.   What is the script to create empty version of standard tables in NIS+
directory?

A. nisaddent
B. nissetup
C. nisbladm
D. nisdefault

Answer: B


268.   What directory contains information about NIS+ groups?

A. groups_dir.obj
B. groups_dir
C. NIS_groups.dir
D. Groups_dir

Answer: D


269.  Which terms can be synonymous with the term "server"? (Choose two)

A. Host
B. Printer
C. Domain
D. Network
E. Process

Answer: A, E


270.   AdminSuite software enables you to locally or remote or remotely manage:

A. File systems.
B. Disk slices and fdisk partitions.
C. Auto client systems.
D. Import system databases files, such as aliases and hosts.
E. Software packages.

Answer: A, B, C, D



271.   Which three are message severity entries used in the syslogd configuration
file? (Choose
three)

A. Lpr
B. Alert
C. Cron
D. Mark
E. Debug
F. Warning

Answer: B, E, F


272.   What do the entries in the /proc directory represent?

A. They are decimal numbers corresponding to process-ID numbers.
B. They are decimal numbers corresponding to absolute sector numbers on a disk.
C. They are decimal numbers corresponding to the inode numbers of active processes.
D. They are decimal numbers corresponding to a time stamp that identifies the
process messages in the message
logs.

Answer: A


273.   Which command configures the cache /export/home_cache that should be used
when caching
the /export/home file system?

A. cfsadmin -l /export/home_cache
B. cfsadmin -p /export/home_cache
C. cfsadmin -c /export/home_cache
D. cfsadmin -m /export/home_cache
E. cachefslog -c /export/home_cache

Answer: C


274.   Which information is transferred by Trivial File Transfer Protocol (TFTP) as
part of the client
boot sequence during JumpStart?

A. Client host name
B. Client root (/) file system
C. Client network boot image
D. JumpStart configuration files

Answer: C


275.   When configuring NIS on a system, you execute the command string: #domainname
testlab.Region.Org.COM.  Which statements about this command string are true?
(Choose two)

A. The servers name is test lab, and it resides on the region.org domain.
B. Executing this command populates the /etc/defaultdomain file with the domain
name.
C. The domain name is case sensitive, and must be configured exactly as specified on
the command-line.
D. The domain name is the entire character string testlab.Region.Org.COM and no DNS
domain is specified.

Answer: C, D


276.   You administer a very large network of systems, using the NIS+ naming
service. Your
company wants to implement a solution with equivalent scalability what
will support a more heterogeneous
environment. Which action provides the solution?

A. Configure your network to use NIS
B. Configure your network to use FTP
C. Configure your network to use NFS
D. Configure your network to use NIS+
E. Configure your network to use DNS
F. Configure your network to use LDAP

Answer: F


277.   Which server command should be used to display all resources an NFS server is
allowing
clients to mount?

A. df. -k
B. dfshares
C. dfmounts
D. shareall
E. mountall

Answer: C


278.   Prior to generating NIS maps, what is the correct method of preserving the
integrity of the
passwd and shadow files by protecting the /etc directory source
files?

A. Using the cd command to change to a new directory location.
B. From the command line, changing the DIR and PWDIR variables to a new directory
location.
C. Editing the /var/yp/Makefile to change the DIR and PWDIR variables to a new
directory location.
D. Executing the make command using the command-line arguments as follows: #make
DIR=new_DIR_directory PWDIR=new PWDIR

Answer: C


279.   What determines the time frame that an auto mounted NFS resource remains
mounted?

A. A list in the /etc/mnttab file determines this.
B. The time period is built into the executable and cannot be adjusted.
C. The client determines how long the NFS resource remains mounted.
D. The server determines how long the NFS resource remains mounted.

Answer: D


280.   Which network server daemons need to be established to support a client
JumpStart
installation? (Choose four)

A. nfsd
B. telnetd
C. in.tftpd
D. snmpd
E. configd
F. in.rarpd
G. in.etherd
H. rpc.bootparamd

Answer: A, D, G, H


281.   Which NIS system(s) contain the original ASCll files that are used to
generate the NIS maps?

A. NIS client only.
B. NIS slave server only.
C. NIS master server only
D. NIS master server and NIS slave server

Answer: C


282.   Which two JumpStart client system identification parameters cannot be
configured using a
name service, but must be configured using the sysidcfg file?
(Choose two)

A. Time zone
B. System locale
C. Client host name
D. Ipv6 configuration
E. Kerberos configuration

Answer: D, E


283.   Given the following command and its output:

# ptree 2357
161 /usr/sbin/inetd -s
2357 in.telnetd
2359 -sh
2363 ksh

Which two statements are true? (Choose two)

A. A Telnet session was established by the inetd daemon.
C. There is only one Telnet session currently running in the system.
D. After logging in, the user switched from the Bourne shell to the Korn shell.
E. After logging by Telnet, the user must have been root as indicated by the Bourne
shell prompt

Answer: A, C



284.   You want to configure the Jumpstart server jsserver to support a Jumpstart
client. Which
option and parameter in the add_install_client script should be used
to specify the sysidcfg file located in the
directory /export/install/config?

A. –e /export/install/config
B. –p /export/install/config
C. –p jsserver:/export/install/config
D. –c /export/install/config/sysidcfg
E. –c jsserver:/export/install/config/sysidcfg
F. –p jsserver:/export/install/config/sysidcfg

Answer: C


285.   Which statements about the RBAC security mechanism are true? (Choose two)

A. The roleadd command uses the same default shell to useradd.
B. The roleadd command uses very similar syntax to the useradd command.C. The -p option, used to associate an account with a profile, way only be used with
roleadd.
D. Using usermod -R rolename username updates the user_attr file to associate a user
with a role.

Answer: B, D


286.  Given the following information taken from the syslogd configuration file:
mail.debug
ifdef('LOGHOST' , /var/adm/authlog, @loghost)
What is indicated id the mail messages are logged to /var/adm/authlog?

A. The loghost entry is not in the /etc/hosts file.
B. The loghost is unreachable over the network.
C. The local (current) host has an /etc/hosts alias of loghost.
D. The loghost variable is evaluated false by the m4 macro processor.

Answer: C


287.   Which server file is read to obtain the clients host name during the RARP
phase of the
JumpStart boot sequence?

A. rules
B. hosts
C. dfstab
D. ethers
E. sysidcfg
F. bootparams

Answer: B


288.   AdminSuite is used to accomplish which three actions? (Choose three)

A. Change disk RPM values
B. Ignore access time updates
C. Honor disk space requirements
D. Change minfree values (for ufs)
E. Ignore inode change time updates
F. Mount a file system with large files

Answer: A, D, F


289.   With regard to the JumpStart services available with the Solaris Operating
Environment,
which server must reside on the same subnet as the client?

A. The web server
B. The boot server
C. The install server
D. The configuration server

Answer: B


290.   Given: #pkill -HUP inetd.  What are two results of executing this command?
(Choose two)

A. It forces inetd to re-read the /etc/inetd.conf configuration file.
B. It aborts all Internet services and leaves them in a quiescent state.
C. It stops NFS services in preparation for brining down the network.
D. It starts any Internet services that are listen in the /etc/inetd.conf file.

Answer: A, D


291.   What is the function of the command modify_install_server script?

A. Moves the boot image to a new directory.
B. Replaces the miniroot of a boot image with a Web Start image.
C. Copies the contents of the Solaris 8 CD 2 of 2 to a boot image.
D. Copies the contents of the Solaris languages CD to a boot image.

Answer. B


292.   You are in a high availability environment and cannot perform a reboot. What
needs to
happen when the auto_master map is updated?

A. Nothing needs to be done.
B. You need to stop and re-start nfsd.
C. You need to run the automount command.
D. You need to stop and re-start automountd.

Answer: C


293.  Which is the syslogd configuration file?

A. /etc/syslog.conf
B. /etc/syslogd.conf
C. /usr/lib/syslog/syslog.conf
D. /usr/include/sys/syslogd.conf

Answer: A


294.   Which statement about an Ethernet address is true?
A. It is unique for every system.
B. It has an entry in the /etc/inet/hosts file.
C. It is a 32-bit address divided into four 8-bit fields.
D. It is a number assigned by the system administrator.

Answer: A


295.   System A is using TCP/IP over Ethernet to contact System B on its sub
network. System A
has System B's IP address but no Ethernet address. Which protocol
is used to establish System B's Ethernet
address?

A. ARP
B. RDP
C. RPC
D. TCP
E. RARP

Answer: A


296.   Which information is transferred by Trivial File Transfer Protocol (TFTP) as
part of the
client boot sequence during JumpStart?

A. Client host name.
B. Client root (/) file system.
C. Client network boot image.
D. JumpStart configuration files.

Answer: C


297.   Which command identifies the local systems Ethernet address?

A. netstart
B. ifconfig
C. snoop -a
D. netstat -l
E. ifconfig -a

Answer: E


298.   When configuring a domain with a Network Information Service (NIS)
client-server
relationship, what qualifies a system as an NIS client?

A. Every system on the subnet is an NIS client.
B. Every system on the domain is an NIS client.
C. Only systems that are not NIS severs are NIS clients.
D. Only systems that are not NIS master servers are NIS clients.

Answer: D


299.   What must be done before you run the command to check the integrity of the
cached file
system /export/home_cache?

A. Delete the cache.
B. Check the cache statistic.
C. Obtain the cache ID number.
D. Unmount the cached file system.
E. Adjust the working set size of the cache.
F. Find all backup Super block numbers for the file system.

Answer: D


300.   Which two methods can be used to stop the spray service? (Choose two)

A. execute the 'rpcinfo -d sprayd 1' command.
B. execute the '/etc/init.d/sprayd stop' command.
C. edit the /etc/inetd.conf file to comment out the line for spray. And then execute
the 'pkill -HUP inetd'
command.
D. execute the 'ps -ef|grep spray' to acquire a PID for the command execute the kill
-9 PID to kill the spray
command.

Answer: C, D


301.   Which two are functions of an NFS client? (Choose two)

A. Executes the nfsd.
B. Shares resources over the network.
C. Is confugted using the /etc/dfs/dfstab file.
D. Mounts remote resources across the network.
E. Views remotely mounted resources as though they were local.

Answer: D, E



302.   What type of link can span over the file system?

Answer: symbolic


303.   What is the function of the command modify_install_server script?

A. Moves the boot image to a new directory.
B. Replaces the miniroot of a boot image with a Web Start image.
C. Copies the contents of the Solaris 8 CD 2 of 2 to a boot image.
D. Copies the contents of the Solaris languages CD to a boot image.

Answer: B


304.   Which Jumpstart server provides information that a Jumpstart client uses to
partition disks
and crate file systems?

A. Web server
B. Boot server
C. Install server
D. Configuration server

Answer: D


305.   Which layer within the seven layer OSI/ISO model ensures that messages can
reach the
correct application?

A. Network layer
B. Data link layer
C. Transport layer
D. Presentation layer

Answer: C


306.   Which statements about the /var/run file system are true? (Choose three)

A. It is owned by root.
B. It is the repository for non-system temporary files.
C. It is not unmounted with the unmount -a or the unmount all command.
D. It is the repository for temporary system files that are not needed across system
reboots.

Answer: A, C, D


307.   What file is responsible for configuring syslog?

A. /etc/syslog.conf
B. /etc/default/syslog.conf
C. /etc/syslog
D. /etc/syslog/syslog.conf
E. /var/adm/syslog

Answer: A


308.   Which of the following servers are required on every subnet to Jumpstart
clients?

A. Boot server
B. Configuration server
C. Install server

Answer: A


309.   Which command should be used to manually invoke a consistency check and
perform any
necessary updates on a cacheFS file system?

A. cfsadmin -c
B. cfsadmin -d
C. cfsadmin -s
D. cachefsstat -z
E. cachefswssize -a

Answer: C


310.   What needs to happen when the auto_home map is updated?

A. Nothing needs to be done.
B. You need to stop and re-start nfsd.
C. You need to run the automount command.
D. You need to stop and re-start automountd.

Answer: A


311.   Choose 3 levels available in syslog:

A. err
B. crit
C. emerg
D. auth
E. daemon
F. kern

Answer: A, B, C


312.   Which command is used to create a file system on a slice of disk?

A. ufs
B. fsck
C. newfs
D. format
E. fstypes

Answer: C


313.   The NIS client contains local maps with regards to NIS.

A. True
B. False

Answer: B


314.   Which three message severity entries used in the syslogd configuration file?
(Choose three)

A. lpr
B. alert
C. cron
D. mark
E. debug
F. warning

Answer: B, E, F


315.   Which of the following cannot be assigned to a role?

A. A profile.
B. An authorization.
C. Another role.
D. More then one profile.

Answer: C


316.   Which two statements about syslogd functionality are true? (Choose two)

A. Kernel, daemons, and syslogd each write directly to the system log.
B. Kernel error messages can only be logged locally in the system log.
C. Syslogd can write messages to the console as well as to the system log.
D. The logger command communicated with syslogd, which then logs the message as per
its configuration file.

Answer: C, D


317.   After adding a new hardware device, configuration can be accomplished by?
(Choose two)

A. Booting the system with the boot -r option.
B. Booting the system with the boot -sa option.
C. Creating the file configuration prior to shutting down and adding the new
hardware.
D. Editing the configuration file to add the new device and run makedev in the
device directory.

Answer: A, C


318.   How do you determine what kernel mode your system is running in?

A. kern -a
B. info-xv
C. sysman -xv
D. isainof -kv

Answer: D


319.   The default router file is located in the _______ directory.

A. /var
B. /opt
C. /etc/router
D. /etc

Answer: D


320.   Back file systems refer to?

A. Server side processes
B. Original source of data
C. Backend processing sub-systems
D. Transport of data

Answer: B


321.   What is the highest alert level in syslog?

A. alert
B. emrg
C. crit
D. sevr

Answer: B


322.   Which is NOT a valid option in the command: share -F nfs -o
ro=venus,rw=mars,bg,root=venus /us

A. –F nfs
B. rw=mars
C. bg
D. root=venus
E. ro=venus

Answer: C


323.   You have remove credentials with?

A. nisadm
B. nisrmcred
C. nisaddcred
D. nispopulate

Answer: C


324.   The password command automatically checks for NIS+ and uses it instead of
/etc/passwd:

A. True
B. False

Answer: B


325.   Which of these queues and transports mail?

A. mail
B. mailx
C. sendmail
D. uucp

Answer: C


326.   ARP is used to?

A. Resolve names of machines to their IP addresses
B. Resolve IP addresses of machines to their Ethernet addresses
C. Act as a translation between the network layer and the Internet layer
D. Resolve addresses

Answer: B


327.   What is the command to see which users are logged into the network?

A. Who
B. Which
C. Rusers
D. Rlogin

Answer: C


328.   Which of these can be used to backup a partition?

A. Ufsdump
B. Dd
C. Cpio
D. All of the above

Answer: D


329.   The advantages of the replica server in NIS+ are? (Choose two)

A. Efficiency
B. Portability
C. Reliability
D. Centralization

Answer: A, C


330.   What is a class B IP address?

A. 126.6.111.222
B. 132.6.111.222
C. 102.6.111.222
D. 192.6.111.222

Answer: B



331.   What does the following command do?

find /export/home -user jsmith -print

A. Print out the pathname of all files under the home directory of jsmith
B. Print out the pathname of all files under /export/home
C. Print out all pathnames of files owned by jsmith
D. Print out all the pathnames of files owned by jsmith under/export/home

Answer: D


332.   What is the name of the NIS+ service daemon that runs on the NIS server?

A. rpc.ypserv
B. rpc.nisd
C. rpc.nisserv
D. rpc.nisplusd

Answer: B


333.   In an NIS+ namespace, what directory names are reserved? (Choose two)

A. org_dir
B. root_dir
C. table_dir
D. groups_dir

Answer: A, D
您需要登录后才可以回帖 登录 | 注册

本版积分规则 发表回复

  

北京盛拓优讯信息技术有限公司. 版权所有 京ICP备16024965号-6 北京市公安局海淀分局网监中心备案编号:11010802020122 niuxiaotong@pcpop.com 17352615567
未成年举报专区
中国互联网协会会员  联系我们:huangweiwei@itpub.net
感谢所有关心和支持过ChinaUnix的朋友们 转载本站内容请注明原作者名及出处

清除 Cookies - ChinaUnix - Archiver - WAP - TOP