Sie sind auf Seite 1von 25

LearnKey

Study Material for: Student


Sun Certified System Administrator for Solaris 10 Study Guide (Exam CX-310-202)

Question 1: Configuring NFS


You want to change a configuration parameter for the NFS daemon, nfsd, manually. Which file will you edit?
Correct Answer:
/etc/default/nfs
References:
EXPLANATION:
D is correct because the values of the configuration parameters of the nfsd daemon are stored in the
/etc/default/nfs file.
A, B, and C are incorrect because the values of the configuration parameters for the nfsd daemon are stored
in the /etc/default/nfs file.
REFERENCES:
See Sanghera, Paul. "See Sun Certified System Administrator for Solaris 10 Study Guide (Exams 310-200
& 310-202) ". New York, Osborne/McGraw-Hill, 2006.
Chapter 12
OBJECTIVE: 2.3

Question 2: Managing Storage Volumes


Which of the following are the valid read policies for the RAID 1 mirrors? (Choose three.)
Correct Answer:
First
Round Robin
Geometric
References:
EXPLANATION:
D, E, and F are correct because First, Round Robin, and Geometric are the valid read policies for RAID 1
mirrors.
A, B, and C are incorrect because serial, parallel, and FIFO are not the names of the valid read policies for
the RAID 1 mirrors.
REFERENCES:
See Sanghera, Paul. "See Sun Certified System Administrator for Solaris 10 Study Guide (Exams 310-200
& 310-202) ". New York, Osborne/McGraw-Hill, 2006.
Chapter 13
OBJECTIVE: 3.1

Question 3: Naming Services


The name service cache daemon, nscd, offers cache service to which of the following service databases?
(Choose three.)
Correct Answer:
hosts
pnodes
passwd
References:
EXPLANATION:
A, B, and C are correct because both ipnodes and passwd databases are supported by nscd.
D is incorrect because nscd does not offer cache service for netmasks.
REFERENCES:
See Sanghera, Paul. "See Sun Certified System Administrator for Solaris 10 Study Guide (Exams 310-200
& 310-202) ". New York, Osborne/McGraw-Hill, 2006.
Chapter 11
OBJECTIVE: 5.2

Question 4: JumpStart Configuration


Which of the following components support JumpStart installation? (Choose three.)
Correct Answer:
A profile
A rule
The check script
References:
EXPLANATION:
A, C, and E are correct. A profile defines specific software installation requirements. It specifies the
elements of installation that you would otherwise determine interactively in a manual installation, such as
the software group to install. A rule is a statement that uses a set of system attributes to identify a group of
machines and links it to a profile file. Before JumpStart could use the rules file and the profiles, you need to
perform a validation by running the check script.
B, D, and F are incorrect because there are no such components of JumpStart as install script, initializer,
and installd.
REFERENCES:
See Sanghera, Paul. "See Sun Certified System Administrator for Solaris 10 Study Guide (Exams 310-200
& 310-202) ". New York, Osborne/McGraw-Hill, 2006.
Chapter 15
OBJECTIVE: 6.4

Question 5: Managing Storage Volumes


You are going to configure the SVM on your Solaris 10 system. What is the minimum number of state
database replicas that you must create?

Correct Answer:
3
References:
EXPLANATION:
C is correct because, according to the majority consensus algorithm, you must create at least three state
database replicas.
A, B, D, and E are incorrect because the correct number is 3 and not 1, 2, 4, or 8.
REFERENCES:
See Sanghera, Paul. "See Sun Certified System Administrator for Solaris 10 Study Guide (Exams 310-200
& 310-202) ". New York, Osborne/McGraw-Hill, 2006.
Chapter 13
OBJECTIVE: 3.2

Question 6: Configuring RBAC


You have assigned a role Manager to a user dcheney. Which of the following commands will you use to
assign the Operator rights profile to dcheney?
Correct Answer:
usermod -P Operator dcheney
References:
EXPLANATION:
B is correct because to assign a rights profile to a user, you use the usermod command with the -P option.
E is correct because to assign a rights profile to a user, you can use the rolemod command with the -P
option on the role that is assigned to the user.
A is incorrect because the -R option is used with the usermod command to assign a role to a user.
C is incorrect because the -A option is used with the usermod command to assign an authorization to a
user.
D is incorrect because the name of the correct command is usermod and not profiles.
REFERENCES:
See Sanghera, Paul. "See Sun Certified System Administrator for Solaris 10 Study Guide (Exams 310-200
& 310-202) ". New York, Osborne/McGraw-Hill, 2006.
Chapter 14
OBJECTIVE: 4.1

Question 7: Configuring RBAC


Which of the following commands can be used to assign a role to a user? (Choose two.)
Correct Answer:
useradd
usermod
References:
EXPLANATION:
C and D are correct because a role can be assigned to a user by using the -R option, either at the time of
user creation with the useradd command or later with the usermod command.
A and B are incorrect because you cannot use the -R option with roleadd or rolemod, given that you are not

allowed to assign a role to a role. In other words, the -R option is not available for the roleadd or rolemod
command.
REFERENCES:
See Sanghera, Paul. "See Sun Certified System Administrator for Solaris 10 Study Guide (Exams 310-200
& 310-202) ". New York, Osborne/McGraw-Hill, 2006.
Chapter 14
OBJECTIVE: 4.2

Question 8: Naming Services


Which of the following service daemons run on all the hosts in an NIS domain? (Choose two.)
Correct Answer:
ypbind
yppasswdd
References:
EXPLANATION:
A and B are correct. The ypbind daemon binds processes on all hosts and the yppasswd daemon is the NIS
daemon to update the passwords.
C and D are incorrect because ypinit and ypmatch are commands and not daemons.
REFERENCES:
See Sanghera, Paul. "See Sun Certified System Administrator for Solaris 10 Study Guide (Exams 310-200
& 310-202) ". New York, Osborne/McGraw-Hill, 2006.
Chapter 11
OBJECTIVE: 5.4

Question 9: Managing Crash Dumps


When you reboot your Solaris 10 system, it automatically runs the savecore command to retrieve the data
from the dump device and write the saved crash dump to the appropriate files. Which of the following
commands will you issue to disable this automatic feature?
Correct Answer:
dumpadm -n
References:
EXPLANATION:
D is correct because the dumpadm command run with the -n option disables the automatic execution of the
savecore command on reboot.
A is incorrect because the -d option is used with the dumpadm command to specify the dump device.
B is incorrect because the -y option is used with the dumpadm command to enable the automatic execution
of the savecore command on reboot. This is the default.
C is incorrect because the -u option is used with the dumpadm command to update the dump configuration
based on the /etc/dumpadm.conf file.
REFERENCES:
See Sanghera, Paul. "See Sun Certified System Administrator for Solaris 10 Study Guide (Exams 310-200
& 310-202) ". New York, Osborne/McGraw-Hill, 2006.
Chapter 12

OBJECTIVE: 2.2

Question 10: Managing Storage Volumes


In Solaris 10 you can subdivide a disk slice into multiple divisions (or volumes). Which Solaris feature of
volume management allows you to do this?
Correct Answer:
Soft partitions
References:
EXPLANATION:
D is correct because the subdivisions of a single slice are called soft partitions.
A, B, and C are incorrect because these are not the features of Solaris 10 volume management.
REFERENCES:
See Sanghera, Paul. "See Sun Certified System Administrator for Solaris 10 Study Guide (Exams 310-200
& 310-202) ". New York, Osborne/McGraw-Hill, 2006.
Chapter 13
OBJECTIVE: 3.1

Question 11: Zone Administration


Which of the following tasks can be performed using the zoneadm utility? (Choose two.)
Correct Answer:
Installing a zone
Booting a zone
References:
EXPLANATION:
C and D are correct because the zones are installed and booted using the zoneadm command.
A and B are incorrect because the zonecfg command is used to check the correctness of the current zone
configuration and to obtain information about the configuration, respectively.
REFERENCES:
See Sanghera, Paul. "See Sun Certified System Administrator for Solaris 10 Study Guide (Exams 310-200
& 310-202) ". New York, Osborne/McGraw-Hill, 2006.
Chapter 15
OBJECTIVE: 6.3

Question 12: Naming Services


Consider the following entry in the /etc/nsswitch.conf file on your Solaris 10 system:
hosts: nis dns [NOTFOUND=return]
When you tried to contact a host, the NIS search returned the TRYAGAIN status code. Which of the
following will happen next?

Correct Answer:
The DNS database will be checked to resolve the host.
References:
EXPLANATION:
D is correct because the default response to the TRYAGAIN status code is continue.
A, B, and C are incorrect because they are not the default responses to the TRYAGAIN status code.
REFERENCES:
See Sanghera, Paul. "See Sun Certified System Administrator for Solaris 10 Study Guide (Exams 310-200
& 310-202) ". New York, Osborne/McGraw-Hill, 2006.
Chapter 11
OBJECTIVE: 5.1

Question 13: Naming Services


Which of the following statements about naming services are not correct? (Choose two.)
Correct Answer:
The maps updated on the NIS master server will not be automatically pushed to the slave NIS servers.
Resolver is the name of a command that is used by the client machine to resolve a domain name into an IP
address.
References:
EXPLANATION:
B and D are correct because a map created or updated on a primary server will be automatically pushed to
the secondary servers, and Resolver is not a command; rather, it's a collection of routines that help resolve
the domain name.
A and C are incorrect because these are true statements.
REFERENCES:
See Sanghera, Paul. "See Sun Certified System Administrator for Solaris 10 Study Guide (Exams 310-200
& 310-202) ". New York, Osborne/McGraw-Hill, 2006.
Chapter 11
OBJECTIVE: 5.5

Question 14: Managing Storage Volumes


What is the default number of logical volumes that SVM is configured to support on a disk set?
Correct Answer:
128
References:
EXPLANATION:
D is correct because 128 is the default number of logical volumes that SVM is configured to support per disk
set.
A is incorrect because 1 may be a good guess, but it's not the default.
B is incorrect because SVM can support up to 8192 logical volumes per disk set, but it's not the default
number.
C is incorrect because 8 is the maximum limit on the number of partitions you can create on a standard
Solaris disk, not the default number for the logical volumes.

REFERENCES:
See Sanghera, Paul. "See Sun Certified System Administrator for Solaris 10 Study Guide (Exams 310-200
& 310-202) ". New York, Osborne/McGraw-Hill, 2006.
Chapter 13
OBJECTIVE: 3.1

Question 15: Managing Zones


Which of the following are the zone states? (Choose three.)
Correct Answer:
Ready
Running
Installed
References:
EXPLANATION:
A, B, and E are correct. A zone is in the installed state when its configuration is instantiated, but the zone's
virtual platform is not yet associated to it. Software packages are installed under the root path for the zone.
A zone is in the ready state when a virtual platform has been associated with the installed zone, a unique
zone ID has been assigned, file systems have been mounted, and devices have been configured. A zone is
in the running state if one or more user processes associated with the zone's application environment are
running.
C, D, and F are incorrect because waiting, sleeping, and suspended are not valid zone states.
REFERENCES:
See Sanghera, Paul. "See Sun Certified System Administrator for Solaris 10 Study Guide (Exams 310-200
& 310-202) ". New York, Osborne/McGraw-Hill, 2006.
Chapter 15
OBJECTIVE: 6.1

Question 16: Advanced Installation Methods


Which of the following commands will you use to create a flash archive?
Correct Answer:
flar create
References:
EXPLANATION:
C is correct because flar is the main command to manage flash archives and create is a subcommand that
you use to create a flash archive from a master system.
A and B are incorrect because flash is not the correct name of the command.
D is incorrect because add is not the correct subcommand to create a flash archive.
REFERENCES:
See Sanghera, Paul. "See Sun Certified System Administrator for Solaris 10 Study Guide (Exams 310-200
& 310-202) ". New York, Osborne/McGraw-Hill, 2006.
Chapter 15
OBJECTIVE: 6.6

Question 17: Configuring System Messaging


What does the following line mean in the syslog.conf file?
*.alert *
Correct Answer:
Send all the alert messages to the individual users.
References:
EXPLANATION:
A is correct because an asterisk(*) in the second column of an entry in the syslog.conf file means that the
destinations of the messages are the individual users, not any other destination.
B, C, and D are incorrect because an asterisk (*) in the second column of an entry in the syslog.conf file
means that the destinations of the messages are the individual users, not any other destination.
REFERENCES:
See Sanghera, Paul. "See Sun Certified System Administrator for Solaris 10 Study Guide (Exams 310-200
& 310-202) ". New York, Osborne/McGraw-Hill, 2006.
Chapter 14
OBJECTIVE: 4.3

Question 18: Naming Services


Which of the following are true about the getent command in Solaris 10? (Choose two.)
Correct Answer:
The command is used to get a list of entries from the database specified as a command argument.
The command searches the database sources listed in the /etc/nsswitch.conf file to get the information.
References:
EXPLANATION:
A and B are correct because the getent command gets the information from the database specified in the
command argument and uses the name service switch file for the database sources to determine where to
look for the information.
C, D, and E are incorrect because the getent command only uses the database sources listed in the name
service switch file for the specified database.
REFERENCES:
See Sanghera, Paul. "See Sun Certified System Administrator for Solaris 10 Study Guide (Exams 310-200
& 310-202) ". New York, Osborne/McGraw-Hill, 2006.
Chapter 11
OBJECTIVE: 5.2

Question 19: Naming Services


You want to ensure that your Solaris 10 machine to be configured as an NIS master server does not include
the root user's password in its information base. Which of the following are the valid steps to ensure this
while you are configuring the machine?
Correct Answer:
Copy the /etc/passwd and /etc/shadow files to a new location and remove the root password entries from
these files at the new location.

Edit the /var/yp/Makefile to change the value of PWDIR.


References:
EXPLANATION:
B and D are correct because the master server will read the password files from the directory path specified
by PWDIR in the /var/yp/Makefile file.
A is incorrect because changing the name of the password files is going to deprive the server of the
information it needs and is also going to prevent the users from logging in.
C is incorrect because removing the root password form the /etc/passwd file is going to prevent the root user
from logging in.
REFERENCES:
See Sanghera, Paul. "See Sun Certified System Administrator for Solaris 10 Study Guide (Exams 310-200
& 310-202) ". New York, Osborne/McGraw-Hill, 2006.
Chapter 11
OBJECTIVE: 5.5

Question 20: Network Basics


Which of the following statements is true about a MAC address?
Correct Answer:
When an Ethernet card of a computer is replaced, its MAC address changes.
References:
EXPLANATION:
B is correct because the MAC address is burned into the Ethernet card, which is a NIC for an Ethernet
network.
A is incorrect because a computer can have more than one interface card and each interface card has its
own MAC address. However, remember that multiple interfaces on a SPARC system have the same MAC
address because it is derived from the NVRAM chip.
C is incorrect because an Ethernet address is a 48-bit number, not a 32-bit number. An IP address (IPv4) is
a 32-bit number.
D is incorrect because a MAC source and a destination MAC address are in the frame header and IP
addresses are in the IP datagram header.
REFERENCES:
See Sanghera, Paul. "See Sun Certified System Administrator for Solaris 10 Study Guide (Exams 310-200
& 310-202) ". New York, Osborne/McGraw-Hill, 2006.
Chapter 10
OBJECTIVE: 1.1

Question 21: Managing Storage Volumes


What is the maximum limit on the number of logical volumes that SVM can support on a disk set?
Correct Answer:
8192
References:
EXPLANATION:

B is correct because SVM can support up to 8192 logical volumes per disk set.
A is incorrect because the number of disks in the set may limit how many volumes you will practically be
able to create, but it does not determine the maximum number allowed by SVM.
C is incorrect because 8 is the maximum limit on the number of partitions you can create on a standard
Solaris disk, not the limit on the number of logical volumes.
D is incorrect because 128 is the default number of logical volumes that SVM is configured to support per
disk set.
E is incorrect because there is a limit on the number of logical volumes SVM can support, and that limit is
8192.
REFERENCES:
See Sanghera, Paul. "See Sun Certified System Administrator for Solaris 10 Study Guide (Exams 310-200
& 310-202) ". New York, Osborne/McGraw-Hill, 2006.
Chapter 13
OBJECTIVE: 3.1

Question 22: Network Basics


You find out that the network interface hme1 of your Solaris workstation is not enabled. Which of the
following commands will you use to enable it?
Correct Answer:
ifconfig hme1 up
References:
EXPLANATION:
C is correct because this command will enable the interface.
A is incorrect because there is no option enable available for the ifconfig command.
B is incorrect because the -a option is used to get information about all interfaces on the system.
D is incorrect because this command will simply display the information about the interface.
REFERENCES:
See Sanghera, Paul. "See Sun Certified System Administrator for Solaris 10 Study Guide (Exams 310-200
& 310-202) ". New York, Osborne/McGraw-Hill, 2006.
Chapter 10
OBJECTIVE: 1.1

Question 23: Network Basics


You want to capture the network traffic between hosts dharma and hema. Which of the following commands
will you use?
Correct Answer:
snoop dharma hema
References:
EXPLANATION:
C is correct because this is the correct use of the snoop command to capture all the traffic between two
hosts.
A is incorrect because it is the wrong syntax for the snoop command.
B and D are incorrect because the netstat command is used to get the packet statistics.

REFERENCES:
See Sanghera, Paul. "See Sun Certified System Administrator for Solaris 10 Study Guide (Exams 310-200
& 310-202) ". New York, Osborne/McGraw-Hill, 2006.
Chapter 10
OBJECTIVE: 1.1

Question 24: Configuring Zones


Click the Exhibit button. Which of the following statements are true after the commands in the exhibit are
executed? (Choose two.)
Correct Answer:
The info-zone will be put into the running state.
The info-zone will be assigned an ID of 2.
References:
EXPLANATION:
B and C are correct because a zone after booting is put into the running state. The zone ID 1 is already
assigned to the research-zone; therefore, the info-zone will get the zone ID of 2.
A is incorrect because when a zone is booted, it is put into the running state.
D is incorrect because the zone ID 1 is already assigned to the research-zone; therefore, the info-zone will
get the zone ID of 2.
E is incorrect because when a zone is booted it is assigned a zone ID.
REFERENCES:
See Sanghera, Paul. "See Sun Certified System Administrator for Solaris 10 Study Guide (Exams 310-200
& 310-202) ". New York, Osborne/McGraw-Hill, 2006.
Chapter 15
OBJECTIVE: 6.3

Question 25: The automount Service


What is the name of the daemon that handles the mounting and unmounting requests from the autofs
service?
Correct Answer:
automountd
References:
EXPLANATION:
C is correct because the automountd daemon on the client handles the mounting and unmounting requests
from the autofs service.
A is incorrect because there is no daemon autofsd that handles requests from autofs.
B is incorrect because the mountd daemon runs on the server. D is incorrect because autofs is the service
that makes the mount and unmount requests to the automountd daemon.
REFERENCES:
See Sanghera, Paul. "See Sun Certified System Administrator for Solaris 10 Study Guide (Exams 310-200
& 310-202) ". New York, Osborne/McGraw-Hill, 2006.
Chapter 12
OBJECTIVE: 2.5

Question 26: Managing Zones


Which of the following are the daemons used to manage the zones in Solaris 10? (Choose two.)
Correct Answer:
zsched
zoneadmd
References:
EXPLANATION:
A and D are correct because kernel creates the zsched process for the zone to put the zone into the ready
state. For each zone that is in the ready, running, or shutting-down state, there is one zone administration
daemon, zoneadmd, running to manage the zone, which includes booting and shutting down in addition to
other tasks.
B and E are incorrect because there are no such daemons as zoneconfd and zoneadmind in Solaris 10.
C is incorrect because zonecfg is a command and not a daemon.
REFERENCES:
See Sanghera, Paul. "See Sun Certified System Administrator for Solaris 10 Study Guide (Exams 310-200
& 310-202) ". New York, Osborne/McGraw-Hill, 2006.
Chapter 15
OBJECTIVE: 6.1

Question 27: Managing Storage Volumes


While your Solaris 10 system is up and running, you are mirroring the root (/) file system. Which of the
following tasks must you perform to accomplish this task? (Choose two.)
Correct Answer:
Execute the metaroot command.
Change the value for the boot-device variable of the Open Boot Prom.
References:
EXPLANATION:
A and C are correct because you need to run the metaroot command to tell the system to boot from the
mirror, and then reboot. However, you also need to change the value of the boot-device to refer to both
submirrors (sides) of the mirror.
B is incorrect because you don't need to update the kernel configuration parameters.
D is incorrect because you cannot unmount the root file system when Solaris 10 is up and running.
REFERENCES:
See Sanghera, Paul. "See Sun Certified System Administrator for Solaris 10 Study Guide (Exams 310-200
& 310-202) ". New York, Osborne/McGraw-Hill, 2006.
Chapter 13
OBJECTIVE: 3.2

Question 28: Configuring RBAC


You want to authorize all the users to use the CD writer on your Solaris 10 system. Which of the following
files should you edit to accomplish this?

Correct Answer:
/etc/security/policy.conf
References:
EXPLANATION:
A is correct because you can use the /etc/security/policy.conf file to grant default rights profiles,
authorizations, and privileges to all users.
B is incorrect because the /etc/security/auth_attr file defines (and not assigns) authorizations.
C is incorrect because the /etc/user_attr file assigns profiles to roles and roles to users.
D is incorrect because the /etc/security/exec_attr file assigns commands with security attributes to profiles.
REFERENCES:
See Sanghera, Paul. "See Sun Certified System Administrator for Solaris 10 Study Guide (Exams 310-200
& 310-202) ". New York, Osborne/McGraw-Hill, 2006.
Chapter 14
OBJECTIVE: 4.1

Question 29: Managing Storage Volumes


When a slice in RAID 1 or RAID 5 volume fails, it is automatically replaced by a spare slice that stands
ready to replace any failed slice. A collection of such spare slices is called:
Correct Answer:
Hot spare pool
References:
EXPLANATION:
A is correct because a slice that stands ready to replace a failed slice is called a hot spare, and a collection
of such slices is called a hot spare pool.
B and C are incorrect because there are no such terms as spare buffer or redundant slices in SVM.
D is incorrect because a disk set is a group of disks that holds logical volumes and is not just a collection
of hot spares.
REFERENCES:
See Sanghera, Paul. "See Sun Certified System Administrator for Solaris 10 Study Guide (Exams 310-200
& 310-202) ". New York, Osborne/McGraw-Hill, 2006.
Chapter 13
OBJECTIVE: 3.1

Question 30: Configuring RBAC


You want to assign a rights profile to all the users on your Solaris 10 system. Which of the following files
should you edit to accomplish this?
Correct Answer:
/etc/security/policy.conf
References:
EXPLANATION:
A is correct because you can use the /etc/security/policy.conf file to grant default rights profiles,
authorizations, and privileges to all users.
B is incorrect because the /etc/security/auth_attr file defines (and not assigns) authorizations.

C is incorrect because the /etc/user_attr file assigns profiles to roles and roles to users.
D is incorrect because the /etc/security/exec_attr file assigns commands with security attributes to profiles.
REFERENCES:
See Sanghera, Paul. "See Sun Certified System Administrator for Solaris 10 Study Guide (Exams 310-200
& 310-202) ". New York, Osborne/McGraw-Hill, 2006.
Chapter 14
OBJECTIVE: 4.2

Question 31: Managing Core Files


Which of the following commands will you issue to enable global core file dumps and to ensure that the core
files are always saved in the /var/corefiles directory?
Correct Answer:
coreadm -e global -g /var/corefiles
References:
EXPLANATION:
C is correct because the coreadm -e global -g /var/corefiles file enables the global core dumps and ensures
that the core files will be placed in the /var/corefiles directory.
A is incorrect because the coreadm -e log command is used to enable the generation of a syslog message
when there is an attempt to create a global core file.
B is incorrect because the coreadm -d process command is used to disable the per process core dumps.
D is incorrect because the dumpadm command is used to manage the crash dump files and not the core
files.
E is incorrect because there is no corefiles command in Solaris 10 OS.
REFERENCES:
See Sanghera, Paul. "See Sun Certified System Administrator for Solaris 10 Study Guide (Exams 310-200
& 310-202) ". New York, Osborne/McGraw-Hill, 2006.
Chapter 12
OBJECTIVE: 2.2

Question 32: Network Basics


A network service request arrives at your workstation. How will TCP or UDP determine which application will
process the request?
Correct Answer:
By looking at the port number
References:
EXPLANATION:
D is correct because an application on one computer communicates with an application on another
computer by using the port number on which the application runs.
A, B, and C are incorrect because the applications on a network do not use protocol number, version
number, or application name to address each other.
REFERENCES:
See Sanghera, Paul. "See Sun Certified System Administrator for Solaris 10 Study Guide (Exams 310-200
& 310-202) ". New York, Osborne/McGraw-Hill, 2006.

Chapter 10
OBJECTIVE: 1.2

Question 33: Managing Storage Volumes


The SVM on your Solaris 10 system is configured by placing two state database replicas on each of four
disks. The system is currently running. What is the minimum number of state database replicas that must
be available so that your system continues running?
Correct Answer:
4
References:
EXPLANATION:
C is correct because, according to the majority consensus algorithm, the system continues to run if at least
half of the state database replicas are available; otherwise the system panics.
A, B, and D are incorrect because the correct number is 4 (that is, half of 8) and not 1, 2, or 8.
REFERENCES:
See Sanghera, Paul. "See Sun Certified System Administrator for Solaris 10 Study Guide (Exams 310-200
& 310-202) ". New York, Osborne/McGraw-Hill, 2006.
Chapter 13
OBJECTIVE: 3.2

Question 34: Network Basics


Which daemon in Solaris 10 is responsible for starting RPC services?
Correct Answer:
inetd
References:
EXPLANATION:
B is correct because inetd starts services that are not started during the system boot. Note that inetd can
start any service for which it is configured, including telnet and ftp.
A, C, and D are incorrect because these daemons do not exist in Solaris 10.
REFERENCES:
See Sanghera, Paul. "See Sun Certified System Administrator for Solaris 10 Study Guide (Exams 310-200
& 310-202) ". New York, Osborne/McGraw-Hill, 2006.
Chapter 10
OBJECTIVE: 1.2

Question 35: Zone Configuration


You are going to configure a zone in Solaris 10. Which of the following are the properties that this zone
must already have? (Choose two.)

Correct Answer:
Zone name
zonepath
References:
EXPLANATION:
A and B are correct because you must have a zone name and zonepath to refer to the zone in order to
configure it.
C is incorrect because you need to add the net property only if the zone needs network connectivity. D is
incorrect because there is always the default value for the autoboot property, that is, false. E is incorrect
because there is no such zone property as zonerank.
REFERENCES:
See Sanghera, Paul. "See Sun Certified System Administrator for Solaris 10 Study Guide (Exams 310-200
& 310-202) ". New York, Osborne/McGraw-Hill, 2006.
Chapter 15
OBJECTIVE: 6.2

Question 36: Configuring RBAC


Which of the following statements is true about the RBAC model?
Correct Answer:
A user cannot assume more than one role at a time.
References:
EXPLANATION:
B is correct because you can assign more than one role to a user, but the user cannot assume more than
one role at a time.
A is incorrect because you can assign more than one role to a user, but the user cannot assume more than
one role at a time.
C is incorrect because a role may contain more than one role.
D is incorrect because you cannot assign a role to another role; you can only assign a role to a user.
REFERENCES:
See Sanghera, Paul. "See Sun Certified System Administrator for Solaris 10 Study Guide (Exams 310-200
& 310-202) ". New York, Osborne/McGraw-Hill, 2006.
Chapter 14
OBJECTIVE: 4.2

Question 37: Zone Configuration


Which of the following tasks can be performed using the zonecfg utility? (Choose two.)
Correct Answer:
Checking the correctness of the current zone configuration
Displaying information about the current configuration
References:
EXPLANATION:
A and B are correct. You can use the verify and info subcommands with the zonecfg command to check the
correctness of the current zone configuration and to obtain information about the configuration, respectively.

C and D are incorrect because the zones are installed and booted by using the zoneadm command, not the
zonecfg command.
REFERENCES:
See Sanghera, Paul. "See Sun Certified System Administrator for Solaris 10 Study Guide (Exams 310-200
& 310-202) ". New York, Osborne/McGraw-Hill, 2006.
Chapter 15
OBJECTIVE: 6.2

Question 38: The automount Service


By default, the automount service is started automatically when you boot your Solaris 10 system. Which of
the following can you use to temporarily disable this service?
Correct Answer:
svcadm disable system/filesystem/autofs
References:
EXPLANATION:
B is correct because the automount service is managed by SMF under the identifier
svc:/system/filesystem/autofs.
C is incorrect because the automount service is managed by SMF under the identifier
svc:/system/filesystem/autofs.
A and D are incorrect because the svcs command is used not to disable or enable a service but to get the
status information about the service.
REFERENCES:
See Sanghera, Paul. "See Sun Certified System Administrator for Solaris 10 Study Guide (Exams 310-200
& 310-202) ". New York, Osborne/McGraw-Hill, 2006.
Chapter 12
OBJECTIVE: 2.5

Question 39: Configuring RBAC


Which of the following commands will you use to assign the Operator rights profile to a user with user name
dcheney?
Correct Answer:
usermod -P Operator dcheney
References:
EXPLANATION:
B is correct because to assign a rights profile to a user, you use the usermod command with the -P option.
A is incorrect because the -R option is used with the usermod command to assign a role to a user.
C is incorrect because the -A option is used with the usermod command to assign an authorization to a
user.
D is incorrect because the name of the correct command is usermod and not profiles.
REFERENCES:
See Sanghera, Paul. "See Sun Certified System Administrator for Solaris 10 Study Guide (Exams 310-200
& 310-202) ". New York, Osborne/McGraw-Hill, 2006.
Chapter 14

OBJECTIVE: 4.1

Question 40: Configuring System Messaging


Which of the following is not the valid destination to which the syslogd daemon can send messages?
Correct Answer:
Through email to a user on a remote host
References:
EXPLANATION:
A is correct because the syslogd daemon cannot send the message to a remote user through email.
B, C, and D are incorrect because the syslogd daemon can route the message to a user on the same host,
syslogd on a remote host, or a file on the same host.
REFERENCES:
See Sanghera, Paul. "See Sun Certified System Administrator for Solaris 10 Study Guide (Exams 310-200
& 310-202) ". New York, Osborne/McGraw-Hill, 2006.
Chapter 14
OBJECTIVE: 4.3

Question 41: The automount Maps


Which of the following map files contain all the direct and indirect map names?
Correct Answer:
/etc/auto_master
References:
EXPLANATION:
C is correct because the /etc/auto_master map file contains the names of all the indirect and direct map file
names.
A is incorrect because the /etc/aut_direct file contains the direct maps that are named in the auto_master
file.
B is incorrect because there is no such file as auto_indirect, but it could be named in the auto_master file.
The same is true with the choices D and E.
REFERENCES:
See Sanghera, Paul. "See Sun Certified System Administrator for Solaris 10 Study Guide (Exams 310-200
& 310-202) ". New York, Osborne/McGraw-Hill, 2006.
Chapter 12
OBJECTIVE: 2.5

Question 42: Network Basics


Which command would you use to check whether a remote host is reachable?
Correct Answer:
ping

References:
EXPLANATION:
A. is correct because you use the ping command to test the reachability of another host on the same
network or on another network.
B is incorrect because the snoop command is used to view the packet headers at various layer levels
coming in or going out of an interface.
C is incorrect because the ifconfig command is used to configure the network interfaces.
D is incorrect because the netstat command is used to view the packet statistics on inbound/outbound
connections.
REFERENCES:
See Sanghera, Paul. "See Sun Certified System Administrator for Solaris 10 Study Guide (Exams 310-200
& 310-202) ". New York, Osborne/McGraw-Hill, 2006.
Chapter 10
OBJECTIVE: 1.2

Question 43: Managing Storage Volumes


Which of the following commands would you use to add a second submirror (after creating it) to the mirror
(RAID 1 volume)?
Correct Answer:
metattach
References:
EXPLANATION:
C is correct because once a one-way mirror is in place, all the subsequent submirrors should be attached to
the mirror by using the metattach command.
A is incorrect because the metainit command is used to create a submirror, not to attach it.
B and D are incorrect because there are no such commands as addmirror and attachmirror.
REFERENCES:
See Sanghera, Paul. "See Sun Certified System Administrator for Solaris 10 Study Guide (Exams 310-200
& 310-202) ". New York, Osborne/McGraw-Hill, 2006.
Chapter 13
OBJECTIVE: 3.2

Question 44: BIOS Functions


You want to disable the telnet service on your Solaris 10 system. Which command will you issue? (Choose
two.)
Correct Answer:
svcadm disable network/telnet:default
inetadm -d network/telnet:default
References:
EXPLANATION:
A and D are correct because the option (action) name to disable a service is disable in svcadm and -d in
innetadm.
B, C, E, and F are incorrect because they use the wrong option/action names.
REFERENCES:

See Sanghera, Paul. "See Sun Certified System Administrator for Solaris 10 Study Guide (Exams 310-200
& 310-202) ". New York, Osborne/McGraw-Hill, 2006.
Chapter 10
OBJECTIVE: 1.2

Question 45: Naming Services


Solaris 10 ships with which DNS product?
Correct Answer:
BIND 9.x
References:
EXPLANATION:
B is correct because Solaris 10 ships with the BIND 9.x DNS server.
C is incorrect because Solaris 10 ships with the BIND 9.x and not with the BIND 10.x.
A and D are incorrect because there is no such product as DNS.
REFERENCES:
See Sanghera, Paul. "See Sun Certified System Administrator for Solaris 10 Study Guide (Exams 310-200
& 310-202) ". New York, Osborne/McGraw-Hill, 2006.
Chapter 11
OBJECTIVE: 5.1

Question 46: Network Basics


You need to change the name of your Solaris 10 workstation. Which files will you need to edit to
accomplish this? (Choose three.)
Correct Answer:
/etc/inet/hosts
/etc/inet/ipnodes
/etc/hostname.<interface>
References:
EXPLANATION:
A, B, and E are correct because the /etc/inet/hosts file maps the host name to the IPv4 address, the
/etc/inet/ipnodes file maps the host name to the IPv4 and IPv6 addresses, and the
/etc/hostname.<interface> file contains only the host name for the machine corresponding to the interface
specified by <interface>.
C is incorrect because there is no such file as /etc/inet/ipaddresses file in Solaris 10 OS.
D is incorrect because there is no such file as /etc/nodename in Solaris 10 OS.
REFERENCES:
See Sanghera, Paul. "See Sun Certified System Administrator for Solaris 10 Study Guide (Exams 310-200
& 310-202) ". New York, Osborne/McGraw-Hill, 2006.
Chapter 10
OBJECTIVE: 1.1

Question 47: Configuring RBAC


Which of the following commands can you use to display the rights profiles assigned to the user bholi and
the security attributes associated with those profiles?
Correct Answer:
profiles -l bholi
References:
EXPLANATION:
C is correct because the profiles -l command is used to display the profiles.
A, B, and D are incorrect because role, profile, and display are not the correct names for the command used
to display profiles.
REFERENCES:
See Sanghera, Paul. "See Sun Certified System Administrator for Solaris 10 Study Guide (Exams 310-200
& 310-202) ". New York, Osborne/McGraw-Hill, 2006.
Chapter 14
OBJECTIVE: 4.2

Question 48: Network Basics


You need to change the IP address (IPv4) of your Solaris 10 workstation. Which files will you need to edit to
accomplish this? (Choose two.)
Correct Answer:
/etc/inet/hosts
/etc/inet/
References:
EXPLANATION:
A and B are correct because the /etc/inet/hosts file contains only the IPv4 addresses and the
/etc/inet/ipnodes file contains both IPv4 and IPv6 addresses.
C is incorrect because there is no such file as /etc/inet/ipaddresses in Solaris 10 OS. D is incorrect
because there is no such file as /etc/nodename in Solaris 10 OS. E is incorrect because the
/etc/hostname.<interface> file contains only the host name for the machine associated with the interface
specified by <interface>.
REFERENCES:
See Sanghera, Paul. "See Sun Certified System Administrator for Solaris 10 Study Guide (Exams 310-200
& 310-202) ". New York, Osborne/McGraw-Hill, 2006.
Chapter 10
OBJECTIVE: 1.1

Question 49: Swap Space


You have just added another slice to the existing swap space on your system. You want to make the new
addition to the swap space permanent, so that it is available even when the system is rebooted. Which of
the following files will you edit to make this happen?
Correct Answer:
/etc/vfstab

References:
EXPLANATION:
A is correct because an entry for the slice added to the swap space must be made into the file /etc/vfstab to
make this swap space available across reboots.
B is incorrect because the /etc/dfs/dfstab file is used to share the file systems.
C and D are incorrect because these files do not exist in Solaris 10 OS.
REFERENCES:
See Sanghera, Paul. "See Sun Certified System Administrator for Solaris 10 Study Guide (Exams 310-200
& 310-202) ". New York, Osborne/McGraw-Hill, 2006.
Chapter 12
OBJECTIVE: 2.1

Question 50: Configuring AutoFS Using Maps


The behavior of automounting is determined by the entries in files called maps. Which of the following are
the valid categories of maps? (Choose three.)
Correct Answer:
Master maps
Indirect maps
Direct maps
References:
EXPLANATION:
A, C, and F are correct because the configuration files that determine the behavior of the AutoFS
environment come in three categories: master maps, indirect maps, and direct maps.
B, D, and E are incorrect because slave maps, local maps, and global maps are not valid names for the
map file categories.
REFERENCES:
See Sanghera, Paul. "See Sun Certified System Administrator for Solaris 10 Study Guide (Exams 310-200
& 310-202) ". New York, Osborne/McGraw-Hill, 2006.
Chapter 12
OBJECTIVE: 2.5

Question 51: Configuring RBAC


While configuring RBAC on your Solaris 10 system, which of the following entities can you assign to a
rights profile? (Choose three.)
Correct Answer:
A rights profile
A privileged command with security attributes
An authorization
References:
EXPLANATION:
A, C, and E are correct because a rights profile, a privileged command, and an authorization can be
assigned to a rights profile.
B is incorrect because a rights profile can be assigned to a role but not vice versa.
D is incorrect because passwords can be assigned to roles and users but not to rights profiles.

REFERENCES:
See Sanghera, Paul. "See Sun Certified System Administrator for Solaris 10 Study Guide (Exams 310-200
& 310-202) ". New York, Osborne/McGraw-Hill, 2006.
Chapter 14
OBJECTIVE: 4.1

Question 52: Advanced Installation Methods


Which of the following methods automates the installation of Solaris 10?
Correct Answer:
JumpStart
References:
EXPLANATION:
B is correct because JumpStart lets you automate the installation by providing the installation information
through a set of files such as rules.ok, prfile, and sysidcfg.
A is incorrect because the Solaris installation program will prompt you for the information; by itself it does
not offer an automatic installation.
C is incorrect because a Solaris flash archive is just an image of an already installed system that can be
installed by using any of the available installation methods.
D is incorrect because PXE is used to boot an x86 machine over the network, after which any installation
method can be used to install.
REFERENCES:
See Sanghera, Paul. "See Sun Certified System Administrator for Solaris 10 Study Guide (Exams 310-200
& 310-202) ". New York, Osborne/McGraw-Hill, 2006.
Chapter 15
OBJECTIVE: 6.5, 6.6, and 6.7

Question 53: Managing NFS


Which of the following daemons is used by NFS 4.0?
Correct Answer:
nfsd
References:
EXPLANATION:
A is correct because the nfsd daemon handles the client requests for file systems.
B, C, and D are incorrect because, unlike previous versions of NFS, NFS 4.0 does not use the lockd,
mountd, nfslogd, and statd daemons.
REFERENCES:
See Sanghera, Paul. "See Sun Certified System Administrator for Solaris 10 Study Guide (Exams 310-200
& 310-202) ". New York, Osborne/McGraw-Hill, 2006.
Chapter 12
OBJECTIVE: 2.3

Question 54: Virtual Memory


Which of the following elements make virtual memory? (Choose two.)
Correct Answer:
RAM
Swap space
References:
EXPLANATION:
B and E are correct because virtual memory combines the swap space with memory (RAM).
A is incorrect because PROM is a chip used for booting the machine.
C is incorrect because CPU is the processor, not the memory.
D is incorrect because a process is a running program that can use memory.
REFERENCES:
See Sanghera, Paul. "See Sun Certified System Administrator for Solaris 10 Study Guide (Exams 310-200
& 310-202) ". New York, Osborne/McGraw-Hill, 2006.
Chapter 12
OBJECTIVE: 2.1

Question 55: Naming Services


You want to configure a Solaris 10 client to be able to use DNS in addition to other naming service database
sources. Which of the following files must exist for the client to use the DNS service? (Choose two.)
Correct Answer:
/etc/nsswitch.conf
/etc/resolv.conf
References:
EXPLANATION:
C and D are correct because the /etc/resolv.conf file needs to be configured on the client to make it a DNS
client, and the /etc/nsswitch.conf file needs to be edited to add DNS as a database source.
A and B are incorrect because the /etc/conf/dns.cfg and /etc/conf/resolv.cfg files do not exist in Solaris 10.
REFERENCES:
See Sanghera, Paul. "See Sun Certified System Administrator for Solaris 10 Study Guide (Exams 310-200
& 310-202) ". New York, Osborne/McGraw-Hill, 2006.
Chapter 11
OBJECTIVE: 2.3

Question 56: Network Basics


You are troubleshooting the interface configuration problem on your Solaris 10 system. You want to check if
the problem is related to SMF, the service configuration. Which of the following SMF services will you
examine?
Correct Answer:
svc:/network/physical:default

References:
EXPLANATION:
A is correct because svc:/network/physical:default is the SMF service used to configure the network
interfaces.
B, C, and D are incorrect because these services do not exist in Solaris 10 OS.
REFERENCES:
See Sanghera, Paul. "See Sun Certified System Administrator for Solaris 10 Study Guide (Exams 310-200
& 310-202) ". New York, Osborne/McGraw-Hill, 2006.
Chapter 10
OBJECTIVE: 1.1

Das könnte Ihnen auch gefallen