Sie sind auf Seite 1von 97

BELOW ARE A COLLECTION OF ALL THE DUMPS FOR EXAM 310-202 THAT I HAVE COLLECTED FROM THE WEB

AND DOCUMENTED HERE. I HAVE CORRECTED THE QUESTIONS AND ANSWERS WHEREEVER REQUIRED. Q - 1. Given the output from dumpadm on a system with the node name, rabbit: # dumpadm Dump content: kernel pages Dump device: /dev/dsk/c2t3d0s0 (dedicated) Savecore directory: /var/crash/wm13w6 Savecore enabled: no Which three commands have been executed to accomplish this configuration? (Choose three.) A. dumpadm -n B. dumpadm -c none C. dumpadm -s wm13w6 D. dumpadm -d c2t3d0s0 E. dumpadm -d /dev/dsk/c2t3d0s0 F. dumpadm -s /var/crash/wm13w6 Ans: AEF Q - 2. During boot up, your x86-based laptop that is running the Solaris 10 OS displays the message: NFS server arizona not responding, still trying Which two are valid troubleshooting procedures for this problem? (Choose two.) A. Restart the NFS client-side daemons. B. Verify that your laptop is connected to the correct network. C. Verify that the NFS client entry in /etc/inetd.conf is correct, then get inetd to reread the /etc/inetd.conf D. Verify that the server arizona is up and that its network interface is up. E. Verify that the nfsd daemon is running on your laptop. Ans: BD Q - 3. What are two beneficial features of soft partitions? (Choose two.) A. They allow a single large volume to be subdivided into more than eight segments. B. They improve throughput by scattering access across multiple physical volumes. C. They allow multiple physical volumes to be combined into a single logical volume. D. They allow the file system to grow as the underlying volume size increases without moving or destroying the data already stored on it. E. They allow a file system to grow beyond the limits of the underlying physical volume. F. They provide a more reliable method for storing data and improving availability. Ans: AD Q - 4. The following ZFS file system is available on your system: NAME USED AVAIL REFER MOUNTPOINT files 82K 72.8G 24.5K /data

You want to temporarily unmount the /data file system. Which set of commands will unmount the /data file system so that it is not available to users and then mount the system when you are ready to make it available again? A. umount /data - to unmount the file system; mount /data to mount the file system. B. zfs umount /data - to unmount the file system; zfs mount /data to mount the file system. C. zfs unmount /data - to unmount the file system; zfs mount /data to mount the file system. D. zfs unmount /data - to unmount the file system; zfs mount -a to mount the file system. Ans: D Q - 5. Commands can be listed in multiple profiles with different attributes. Additionally, the system takes the default profiles into account. Which description matches the algorithm the Solaris system uses to determine the attributes of an executable? A. The system searches the profiles in order, starting with the default profiles from /etc/security/policy.conf, the profiles in user_attr(4), followed by All, if NOT already specified. B. The system searches the profiles in order, starting with the profiles in user_attr(4), then the default profiles from /etc/security/policy.conf, followed by All, if NOT already specified. C. The order of the profiles listed is irrelevant. The system applies the best match, ignoring possible earlier wild card matches, preferring profiles from user_attr(4). D. The order of the profiles listed is irrelevant. The system applies the best match, ignoring possible earlier wild card matches. E. The order of the profiles listed is irrelevant. The system applies the best match, ignoring possible earlier wild card matches, preferring the default profile from /etc/security/policy.conf. Ans: B Q - 6. The system administrator found the following message in the /var/adm/messages file: Jan 26 14:44:29 host genunix: [ID 936769 kern.notice] pm0 is /pseudo/pm@0 Was the message created by the logger command? A. No, it was logged by the kernel. B. Yes, with: logger -t genunix -p kern.notice "pm0 is /pseudo/pm@0" C. Yes, with: logger -t genunix -p kern.notice "[ID 936769 kern.notice] pm0 is /pseudo/pm@0" D. Yes, with: logger "genunix: [ID 936769 kern.notice] pm0 is /pseudo/pm@0". Ans: A Q - 7. When the Name Service Cache Daemon (nscd) is running, and the hosts cache is enabled, what is the result of manually modifying the /etc/inet/hosts file? A. The nscd is restarted automatically. B. The hosts cache is immediately updated to reflect the change. C. The nscd exits and the message error code 1 is sent to syslogd. D. The hosts cache is invalidated upon the next call to the nscd daemon. Ans: D Q - 8. Which answers describe characteristics of the non-global zone? (Choose two)

A. A unique zone ID for each individual zone, starting at ID 0. B. A non-global zone has its own unique kernel. C. Unaware of other non-global zones except the global zone. D. Shares the Solaris kernel with the global zone. E. The non-global zone can contain software that is not installed from or shared with the global zone. Ans: DE Q - 9. At boot up, this service calls the startup scripts which are used to configure each network interface with an IP address and other required network information. Which service is it? A. svc:/network/service:default B. svc:/network/physical:default C. svc:/network/ifconfig:default D. svc:/network/inetd:default Ans: B Q - 10. Youve just configured the network interface on systemA and the following information is displayed pertaining to systemA's network interface: lo0: flags=2001000849<UP,LOOPBACK,RUNNING,MULTICAST,IPv4,VIRTUAL> mtu 8232 index 1 inet 127.0.0.1 netmask ff000000 rtls0: flags=1004842<BROADCAST,RUNNING,MULTICAST,DHCP,IPv4> mtu 1500 index 2 inet 192.168.1.31 netmask ffffff00 broadcast 192.168.1.255 ether 0:10:dc:a3:7e:4b Youve been instructed to change the name of this system to systemB. Which four files need to be modified to change the name of this system from systemA to systemB? (Choose four) A. /etc/nodename B. /etc/hostname.rtls0 C. /etc/hostname D. /etc/inet/hosts E. /etc/domainname F. /etc/inet/ipnodes G. /etc/inetd.conf Ans: ABDE Q - 11. You need to change the hostname and IP address of a server. Without manually editing all of the required files, which command can be run to restore a systems configuration to an unconfigured state, ready to be reconfigured again? A. /usr/sbin/sys-unconfig B. /usr/sbin/unconfig C. /sbin/ipconfig D. /usr/sbin/set_parms initial Ans: A Q - 12. Only local system files are used during the boot process to configure the system for local Ethernet LAN connectivity. Immediately after reboot the ifconfig -a command displays:

lo0: flags=1000849<UP,LOOPBACK,RUNNING,MULTICAST,IPv4> mtu 8232 index 1 inet 127.0.0.1 netmask ff000000 Which local network configuration file is missing? A. /etc/ethers B. /etc/netmasks C. /etc/networks D. /etc/inet/hosts E. /etc/hostname.interface Ans: E Q - 13. You run the command: ping host1 After a short time, you receive the response: no answer from host1 Which is a cause of this message? A. Your local network interface is configured as down. B. The interface on host1 has been configured as down. C. Your IP address is not in the /etc/hosts file on host1 D. Your local system is unable to resolve the IP address for host1. Ans: B Q - 14. Which two entries are valid for the contents of the /etc/hostname.ce0 file? (Choose two.) A. corprouter1 B. 192.168.10.1 C. ce0 192.168.10.1 D. ifconfig ce0 inet 192.168.10.1 Ans: AB Q - 15. A host named client12 is having difficulty communicating with a heavily used server named server14. The server14 server has the ce0, ce1, ce4, and qfe4 interfaces active. The client12, admin6, and appserv5 hosts are all on a private network and access the ce4 interface on server14 exclusively and cannot access other network interfaces on server14. The appserv5 and admin6 hosts are currently generating heavy traffic to server14 due to a running batch process. Which two commands can you run on server14 to look at the network traffic generated between only client12 and server14 to assist in troubleshooting the communication issue? (Choose two.) A. snoop !admin6 B. snoop -d client12 C. snoop -d ce server14 D. snoop -d ce4 client12 E. snoop -d ce4 client12 server14 F. snoop -i ce4 server14 client12 Ans: DE Q - 16. An administrator needs to assign the 192.168.3.7 IP address to the hme1 interface. The hme1 interface is currently unused. Which two commands are needed to enable hme1 and assign it the address without rebooting the system, as well as to make the configuration persist across reboots? (Choose two). A. ifconfig hme1 plumb 192.168.3.7 up

B. echo "192.168.3.7" > /etc/hostname.hme1 C. echo "ifconfig hme1 plumb 192.168.3.7 up">> /etc/hostname.hme1 D. ifconfig plumb hme1 inet 192.168.3.7 netmask 255.255.255.0 up Ans: AB Q - 17. Given: dhcp-100 -> dhcp-105 FTP R port=32990 220 dhcp-100 ... dhcp-105 -> dhcp-100 FTP C port=32990 dhcp-105 -> dhcp-100 FTP C port=32990 USER root\r\n dhcp-100 -> dhcp-105 FTP R port=32990 dhcp-100 -> dhcp-105 FTP R port=32990 331 Password require dhcp-105 -> dhcp-100 FTP C port=32990 dhcp-105 -> dhcp-100 FTP C port=32990 PASS root\r\n dhcp-100 -> dhcp-105 FTP R port=32990 dhcp-100 -> dhcp-105 FTP R port=32990 530 Login incorrect. dhcp-105 -> dhcp-100 FTP C port=32990 SYST\r\n Which two statements are true? ( Choose two.) A. The password for root on dhcp-105 is root. B. A user on dhcp-105 is trying to connect using ftp to dhcp-100 C. A user on dhcp-100 cannot log in to dhcp-105 D. A user on dhcp-100 successfully logged in to dhcp-105 E. A user on dhcp-105 is trying to log in to dhcp-100 with root id. Answer: BE Q - 18. You are logged on as root and issue the command: #snoop -a Which two statements about the output results from this command are true? (Choose two.) A. Network traffic is displayed. B. Only the MAC addresses are displayed. C. All outgoing packets have the snoop flag appended.. D. Listen to packets on /dev/audio E. All Network traffic is sent to the default log file. Ans: AD Q - 19. You are logged in as the root user and issue the command: # snoop -q -o filename What two statements about the output results of this command are true? (Choose two.) A. Network traffic is displayed B. Network traffic is sent to filename C. The snoop command will quit after a default amount of time. D. Packet count is NOT displayed.

E. The contents of the filename is in ASCII text. Ans: BD Q - 20. You are logged on as the root user and issue the command: # snoop -v -i filename What two statements about the effect of the output of this command are true? (Choose two.) A. snoop displays packets from filename instead of the network B. snoop displays one line for each packet. C. snoop displays multiple lines for each packet. D. snoop verifies each packet. E. snoop is launched in interactive mode. Answer: AC Q - 21. You have just configured the network interface on systemA . The following information is displayed pertaining to the network interface on systemA: lo0: flags=2001000849<UP,LOOPBACK,RUNNING,MULTICAST,IPv4,VIRTUAL> mtu 8232 index 1 inet 127.0.0.1 netmask ff000000 rtls0: flags=1004842<BROADCAST,RUNNING,MULTICAST,DHCP,IPv4> mtu 1500 index 2 inet 192.168.1.31 netmask ffffff00 broadcast 192.168.1.255 ether 0:10:dc:a3:7e:4b From systemB, you test the network connectivity by sending ICMP ECHO_REQUEST packets to systemA. The following message is displayed: no answer from systemA What is most likely the problem? A. The interface is not plumbed. B. The interface is not configured. C. The interface does not have valid routes configured. D. The interface is not marked as UP Ans: D Q - 22. Given: # rpcinfo -p |grep rusersd 100002 2 tcp 32776 rusersd 100002 3 tcp 32776 rusersd 100002 2 udp 32786 rusersd 100002 3 udp 32786 rusersd Which three are true? (Choose three.) A. rusersd always uses port 100002 B. rusersd is registered with rpcbind C. rusersd uses TCP and UDP protocols. D. rusersd is currently using ports 32776 and 32786 E. The process identifiers (pids) of rusersd are 32776 and 32786. Ans: BCD Q - 23.

The client-server model describes the communication process between two computers or programs. Which two statements describe a client in the client server model? (Choose two.) A. A client machine provides no services. B. A client process is a standalone process. C. A client machine can provide services to other client applications. D. The client is a host or process that uses services from another host or program. E. A client process runs continuously, awaiting requests from other programs. Ans: CD Q - 24. A junior administrator is having difficulty getting a service installed and configured on a Solaris 10 OS and has asked for assistance. The service must be started automatically from inetd. The installation script has placed entries appropriate to the service in /etc/inetd.conf and they are formatted correctly. The service does NOT start on demand and the administrator has issued several pkill -HUP inetd commands. This same service installs and works fine on a Solaris 9 OS. Assuming that there are no problems with the binaries associated with the service, what command must be run to configure and enable this service on the Solaris 10 OS? A. reboot B. inetadm -l C. inetconv -e -f D. inetadm -e /etc/inetd.conf Ans: C Q - 25. Which three statements are true about well-known ports? (Choose three.) A. They must be agreed upon by all users. B. They are listed in /etc/inet/services. C. They are published by the Central Authority. D. They change assignments between reboots. E. The assignments are generated on demand by the Central Authority. Ans: ABC Q - 26. To save time configuring some custom network facilities, a junior administrator in your company attempts to copy some entries from the /etc/inetd.conf file on a Solaris 8 OS server in to the /etc/inetd.conf on a Solaris 10 OS server. The junior administrator is unable to determine why services do not start. Which two commands can you run on the Solaris 10 OS server to start the services? (Choose two.) A. inetconv -f B. inetcfg -i /etc/inetd.conf C. inetcfg -o /etc/inetd.conf D. inetconv -f -i /etc/inetd.conf E. inetconv -forceimport -o /etc/inetd.conf Answer: AD Q - 27.

Youve tried connecting to your server using telnet, however, you cannot get a login prompt. From the system console, you display the following information about the telnet service: fmri svc:/network/telnet:default name Telnet server enabled false state disabled next_state none state_time Mon Aug 13 00:24:45 2007 restarter svc:/network/inetd:default contract_id Which answer describes what you can do to get the telnet service working again? A. Enable telnetd in the /etc/inetd.conf file. B. inetadm enable svc:/network/telnet:default C. inetadm -a svc:/network/inetd:default D. inetadm -e telnet Ans: D Q - 28. Which three commands can the system administrator use in the global zone to cause a running local zone to reboot? (Choose three.) A. reboot -z <zone> B. zlogin <zone> reboot C. zoneadm -z <zone> boot D. zoneadm -z <zone> reboot E. halt -z <zone>; boot -z <zone> F. zoneadm -z <zone> halt; zoneadm -z <zone> boot Ans: BDF Q - 29. The following information is displayed describing the status of the production zone that is installed on your server: D NAME STATE PATH 0 global running /- production installed /export/production Which command was used to generate this output? A. zonecfg list B. zonecfg -z all info C. zoneadm list D. zonecfg info Ans: C Q - 30. Youve added a new disk drive to the server and created a file system on the disk named /zones. You now want to move your zones over to the new file system. Which command will you use to move the production zone to the new file system? A. Use the ufsdump command to copy the information in the old file system and ufsrestore to move the data to the new file system.

B. Use zoneadm -z production move /zones C. zonecfg -z production move /zones D. zoneadm move production /zones E. zonecfg -z production zonecfg:work-zone> move zonecfg:work-zone> commit zonecfg:work-zone> exit Ans: B Q - 31. Youve replaced a server and now you need to move the production zone from the old server to the new server. The zone is currently installed in the /zones/production directory and will be moved to the same directory on the new system. The following describes the process of migrating the production zone from systemA to system. Which steps are unnecessary to complete this process? (Choose two) A. systemA# zoneadm -z production halt B. systemA # zoneadm -z production detach C. Use a backup utility to backup the /zones/production directory and then extract the backup to the new directory. D. zoneadm -z work-zone uninstall E. systemB# zonecfg -z production F. systemB# zoneadm -z work-zone attach G. zonecfg -z work-zone delete Ans: DG Q - 32. You no longer require the development zone and want to delete it from the system. Which commands are necessary to permanently remove the development zone from the system? (Choose three) A. zoneadm -z development halt B. zoneadm -z development delete C. zoneadm -z development uninstall D. zoneadm -z development detach E. zonecfg -z development delete Ans: ACE Q - 33. The following information is displayed describing the status of the production zone that is installed on your server: ID NAME STATE PATH 0 global running / - production installed /export/production Which answer defines the current state of the production zone? A. The zone configuration is complete and committed to stable storage. B. The zone configuration is instantiated on the system.

C. The kernel creates the zsched process, network interfaces are plumbed, file systems are mounted, and devices are configured. A unique zone ID is assigned by the system. At this stage, no processes associated with the zone have been started. D. The user processes associated with the zone application environment are running. Ans: B Q - 34. A system administrator needs to halt a zone. Which two commands properly shut down a zone? (Choose two.) A. zhalt zonename B. zoneadm halt zonename C. zlogin zonename init 5 D. zconsole zonename init 0 E. zlogin zonename shutdown -y -i5 Ans: CE Q - 35. After creating a zone using the following: zonecfg -z newzone zonecfg:newzone> create zonecfg:newzone> set zonepath=/export/zone/newzone zonecfg:newzone> add net zonecfg:newzone:net> set address=192.168.0.2 zonecfg:newzone:net> set physical=bge0 zonecfg:newzone:net> end Which command should you run next? A. zoneadm -z newzone boot B. zoneadm -z newzone ready C. zonecfg -z newzone check D. zoneadm -z newzone install Ans: D Q - 36. For a local zone in the installed state, which statement is true? A. Local zone file systems are mounted. B. The local zone has an associated virtual platform. C. Network interfaces for the local zone are plumbed. D. Packages are installed under the local zone root path. E. The local zone has a unique ID assigned by the system. Ans: D Q 37. When your Solaris system is booted, a startup script initializes the rpcbind service. Which script is it? A. /lib/svc/method/net-physical B. /etc/rcS.d/S30network C. svc:/network/rpc/bind:default D. /lib/svc/method/rpc-bind Ans: D

Q - 38. Which command is used to return information about registered RPC services on a specified <host>? A. inetadm <host> B. View the /etc/services file on <host> C. svcs -p <host> D. rpcinfo -p <host> Ans: D Q - 39. DotClown company , which sells circus supplies, has an order-processing server that has only 512 megabytes of physical RAM and no disk-based swap space. Because of a sudden increase in orders and corporate growth, 512 megabytes of disk swap space was added to the system: # swap -l swapfile dev swaplo blocks free /dev/dsk/c0t0d0s1 # swap s total: 148136k bytes allocated + 22344k reserved = 170480k used, 744232k avail What is the total virtual memory configured on the system? A. 512 megabytes B. 1024 megabytes C. 1049312 blocks D. 170480k + 744232k = 914712k Ans: B Q - 40. The production server needs additional swap space due to lack of physical memory. The system has only one disk and is partitioned as follows: Part Tag Flag Cylinders Size Blocks 0 root wm 1041 - 38491 18.00GB (37451/0/0) 37750608 1 swap wu 0 - 1040 512.37MB (1041/0/0) 1049328 2 backup wm 0 - 39532 19.00GB (39533/0/0) 39849264 3 unassigned wm 0 0 (0/0/0) 0 4 unassigned wm 0 0 (0/0/0) 0 5 unassigned wm 0 0 (0/0/0) 0 6 unassigned wm 0 0 (0/0/0) 0 7 unassigned wm 0 0 (0/0/0) 0 There is one swap slice configured and active: # swap -l swapfile dev swaplo blocks free /dev/dsk/c0t0d0s1 136,1 16 1049312 0 The root file system is a flat file system: # df -k / Filesystem kbytes used avail capacity Mounted on /dev/dsk/c0t0d0s0 18575269 9549546 9025723 53% / Which two methods can be used to temporarily add swap space? (Choose two.) A. add slice 2 as swap: # swap -a /dev/dsk/c0t0d0s2 B. create a 512 megabyte swap file on the root disk: # mkfile 512m /swapfile

# swap -a /swapfile C. remove the existing swap and read it using swap compression: # swap -d /dev/dsk/c0t0d0s3 # swap -a -c /dev/dsk/c0t0d0s3 D. repartition the disk so that slice 3 contains the unused cylinders 38492 through 39532, and then add slice 3 as swap: # swap -a /dev/dsk/c0t0d0s3 E. use NFS to mount a file system from the development server, and then create and use a swap file on the remote system: # mkdir /data # mount -F nfs tokyo:/export/data /data # mkfile /data/swapfile # swap -a /data/swapfile Answer: BD Q - 41. Swap space in Solaris 10 OS is managed by the swapfs file system. Which two statements accurately describe swapfs? (Choose two.) A. The swap file system consists only of swap slices and swap files. B. The swap file system might consist of physical RAM, swap slices, and swap files. C. The swap slices and swap files managed by swapfs need to be twice as large as physical RAM on the system. D. The swapfs provides virtual swap space addresses, thus decreasing the need for physical swap on systems with large, available memory. E. The swapfs provides real physical swap space addresses in response to swap space reservation requests. Ans: BD Q - 42. What is the minimum size requirement for swap space on a Solaris 10 OS for the system to boot properly? A. zero B. twice the amount of physical RAM C. equal to the amount of physical RAM D. one half the amount of physical RAM Ans: A Q - 43. Which two statements describe paging and swapping on a Solaris 10 OS? (Choose two.) A. Adding additional swap will cause more paging ccur and should be avoided. B. Both paging and swapping allow for a system to run multiple processes whose total memory requirement exceeds physical RAM. C. Swapping occurs frequently on a system with sufficient physical memory for processes running. D. Swapping involves moving all modified data memory pages associated with a process to swap space. E. Paging involves moving all modified data memory pages associated with a process to swap space. Ans: BD Q - 44.

When displaying the current swap space configuration on your system, the following information is presented: swapfile dev swaplo blocks free /dev/dsk/c0d0s1102,1 8 total: 103072k bytes allocated + 22240k reserved = 125312k used, 779060k available Given the above information, which of the following answers apply to your systems current swap space configuration? A. Your system is currently using 103072k bytes of swap space on the disk. B. Your system is currently using 125312k bytes of swap space on the disk. C. 22240k is currently not allocated, but claimed by memory mappings. D. 103072k is currently NOT allocated, but claimed by memory mappings Ans: C Q - 45. Due to increased demands that have been placed on your server, the swap space on this server is running low. You are going to add a swap file in the /data file system as a temporary solution to add 500 Mbytes of additional swap space. Select the answer that describes which steps you need to perform? A. # mkfile 500m /data swapfile # /usr/sbin/swap -a /data/swapfile Make the following entry in the /etc/vfstab file: /data/swapfile - - swap - no B. # swap -a 500m /data swapfile Make the following entry in the /etc/vfstab file: /data/swapfile - swap - no #/ usr/sbin/swapon C. #/usr/sbin/swap -a 500m /data/swapfile Make the following entry in the /etc/vfstab file: /data/swapfile - - swap - no Reboot the server D. # mkfile 500m /data swapfile # /usr/sbin/swapon Make the following entry in the /etc/vfstab file: /data/swapfile - - swap - no Answer: A Q - 46. Given the following output from a dumpadm command: # dumpadm Dump content: kernel pages Dump device: /dev/dsk/c0t0d0s1 (swap) Savecore directory: /var/crash/wm13w1 Savecore enabled: yes Which statement is correct? A. The dump device is also a swap device. B. Crash dumps are written to the /var/crash/wm13w1 file. C. The system dumps the whole content of memory to the dump device. D. The savecore command will run as the system shuts down following a panic. Ans: A Q - 47. Given this output from dumpadm: # dumpadm Dump content: kernel pages

Dump device: /dev/dsk/c0t0d0s1 (swap) Savecore directory: /var/crash/rabbit Savecore enabled: yes and these directory contents: # ls -al /var/crash/rabbit total 4 Which three files will exist in the directory after rebooting following a panic? (Choose three.) A. unix.0 B. unix.X C. bounds D. vmcore.0 E. bounds.X F. vmcore.X Ans: ACD Q - 48. Your server has been crashing intermittently for unknown reasons. Youve been told to start saving the information from the crash in the /var/crash directory (c0t1d0s4) so that a technician can analyze the problem. Your crash dump configuration file has the following entries: Dump content: all pages Dump device: /dev/dsk/c0d0s1 (swap) Savecore directory: /var/crash/ Savecore enabled: no After the most recent crash, you went into the /var/crash directory to look for the dump file and the directory was empty. What would you need to do to get the system to store the system crash dumps in the /var/crash directory? A. coreadm -p /dev/dsk/c0d0s4 B. coreadm -y C. dumpadm -s /dev/dsk/c0d0s4 D. dumpadm -y Ans: A Q - 49. When displaying the current crash dump configuration on your server, the following information is presented: Dump content: all pages Dump device: /dev/dsk/c0d0s7 Savecore directory: /var/crash/unknown Savecore enabled: no Given the above information, which of the following answers describe your systems current configuration? A. The dump content is set to all of the kernel memory pages only. B. The dump device is set to partition c0d0s7 and the next time the server crashes, the dump content will be sent to c0d0s7. C. The savecore command will run automatically on reboot . D. The savecore command will NOT run automatically on reboot. Ans: D Q - 50.

Since installing an operating system patch, your server keeps crashing for unknown reasons. Youve been told to start saving the information from the crash in the /crash filesystem (c1t1d0s7) so that a technician can analyze the problem. Which answer displays the configuration file information required to save all crash dumps in the /crash directory? A. savecore directory: /crash B. dump device: /crash C. dump device: /dev/dsk/c1t1d0s7 D. savecore directory: /dev/dsk/c1t1d0s7 Ans: A Q - 51. You have determined that it is unnecessary to save all core files generated by your system. You would only like to save core files generated by applications that are executed from the /usr/bin directory. Which command configures the system to produce core files in the global repository only if the executables were run from the /usr/bin directory? A. mkdir -p /var/core/usr/bin; coreadm -G all -g \ /var/core/%d/%f.%p.%n B. mkdir -p /var/core/usr/bin; coreadm -G /usr/bin \ -g /var/core/%d/%f.%p.%n C. mkdir -p /var/core/usr/bin; coreadm -G /usr/bin \ -g /var/core/usr/bin/%f.%p.%n D. mkdir -p /var/core/usr/bin; coreadm -g \ /var/core/usr/bin/%f.%p.%n Ans: A Q - 52. The security team has requested that NFS logging be enabled. They have supplied you with the configuration parameters that they want. In w hich file do you need to place the configuration parameters? A. /etc/default/lognfs B. /etc/default/nfslogd C. /etc/default/nfs/nfslogd D. /etc/default/nfs_log Ans: B Q - 53. systemA has a file system that is being shared as follows: /data/dbase rw "" systemB mounts that file system as follows: /data on systemA:/data/dbase remote/read/write/setuid/devices/xattr/dev=4c00002 On systemB, whenever root tries to create or copy a file to the /data directory, root receives the following error: cannot create Which answer describes a solution to this problem? A. On systemA, give root write privileges to the /data/dbase directory. B. On systemA, share /data/dbase as follows: share -F nfs -o root=systemB /data/dbase C. On systemA, share /data/dbase as follows: share -F nfs -o rw=systemB /data/dbase D. On systemB, mount the remote file system as follows: mount -F nfs -o rw systemA:/data/dbase /data Ans: B Q - 54. systemA mounts a NFS file system located on systemB as follows: /data on systemB:/data/dbase remote/read/write/setuid/devices/xattr/dev=4c00003

systemB mounts an NFS file system located on systemA as follows: /data on systemA:/data/dbase remote/read/write/setuid/devices/xattr/dev=4c00003 After a power outage, both systems tried booting at the same time and would not boot up to a login prompt. Upon further investigation, both systems were stopping at the point where the NFS mount was trying to be established. Which answer provides a solution to correct this problem? A. On systemA, mount the NFS file system as follows: mount -o bg systemB:/data/dbase /data and on systemB, mount the NFS file system as follows: mount -o bg systemA:/data/dbase /data B. On systemA, mount the NFS file system as follows: mount -o nointr systemB:/data/dbase /data and on systemB, mount the NFS file system as follows: mount -o nointr systemA:/data/dbase /data C. On systemA, mount the NFS file system as follows: mount -o soft systemB:/data/dbase /data and on systemB, mount the NFS file system as follows: mount -o soft systemA:/data/dbase /data D. On systemA, mount the NFS file system as follows: mount -F nfs -o nologging systemB:/data/dbase /data and on systemB, mount the NFS file system as follows: mount -F nfs -o nologging systemA:/data/dbase /data Ans: A Q - 55. systemA has a file system that is being shared as follows:/data/dbase systemB mounts that file system so that users on systemB can use /data as a working directory for adding, changing, and removing files in the /data/dbase file system located on systemA. Which answers describe the correct method of mounting the remote file system? A. mount -F nfs -o hard,nointr,bg systemA:/data/dbase /data B. mount -F nfs -o soft,intr,bg systemA:/data/dbase /data C. mount -F nfs -o hard,intr systemA:/data/dbase /data D. mount -F nfs -o soft,intr,bg,largefiles,logging,rw \ systemA:/data/dbase /data Ans: A Q - 56. You have edited the /etc/dfs/dfstab file and added two new lines on a system that is already functioning as an NFS server. Which command causes these two new resources to be made available? A. share B. mount -a C. mountall D. shareall E. showmount -a Ans: D

Q - 57. Exhibit: /etc/dfs/dfstab file # Place share(1M) commands here for automatic execution # on entering init state 3. ##Issue the command /etc/init.d/nfs.server start to run the NFS # daemon processes and the share commands, after adding the very # first entry to this file. ##share [-F fstype] [ -o options] [-d <text>] <pathname> [resource] # .e.g, # share -F nfs -o rw=engineering -d home dirs /export/home2 share -F nfs /usr/share/man share -F nfs -o ro /export/share share -F nfs /var/tmp Which command will makes the /export/share resource unavailable for clients to mount, without affecting any other shared resources? A. unshareall B. share /export/share C. umount /export/share D. unshare /export/share E. unshare -F nfs /export Ans: D Q - 58. You are working on a system connected to the network. You are attempting to access a currently mounted NFS directory. Your system displays the message: nfs mount: host1: : NFS: Service not responding nfs mount: retrying: /usr/share/man What can you do to solve this problem? A. Ensure that nfsd is running on the NFS server. B. Ensure that mountd is running on the NFS server. C. Send a HUP signal to the inetd process on the NFS server. D. Send a HUP signal to the rpcbind process on the NFS server. Ans: A Q - 59. While you attempt to NFS mount the /export/home directory from host potato onto mount point /data on host tomato, the following error appears: # mount /data nfs mount: potatoe: : RPC: Unknown host The /etc/hosts file on tomato contains the following: # Internet host table # 127.0.0.1 localhost 10.7.8.11 tomato 10.7.8.12 potato 10.7.8.13 lettuce The /etc/vfstab on tomato contains the following (unrelated lines are omitted):

# device device mount FS fsck mount mount # to mount to fsck point type pass at boot options #potatoe:/export/home - /data nfs - yes soft,bg What three actions can be taken to mount the file system successfully? (Choose three.) A. type the command: # mount potato:/export/home B. create an entry in /etc/aliases: potato potatoe C. comment out the entry in /etc/vfstab, and then execute # mountall D. change potatoe to potato in /etc/vfstab, and then execute # mount /data E. type the command: # mount -F nfs -o soft,bg potato:/export/home /data F. change potato to potatoe in the /etc/hosts file, and then execute # mount /data Ans: DEF Q - 60. When you try to NFS mount a directory from the NFS server pepper to the NFS client paprika, the following error occurs: # mount -F nfs pepper:/export/home /data NFS server pepper not responding, still trying Which is the correct troubleshooting step for this error? A. On the NFS client paprika, run the command: # dfshares paprika B. On the NFS client paprika, run the command: # ps -ef |grep nfsd C. On the NFS client paprika, run the command: # ps ef |grep mountd D. On the NFS server pepper, run the command: # dfmounts E. On the NFS client paprika, ping the NFS server: # ping pepper Ans: E Q - 61. A machine running Solaris 10 OS displays the following message during boot: mount: mount-point /opt/local does not exist The system stops in single-user mode while waiting for the root password. Which two are valid troubleshooting procedures for this problem? (Choose two.) A. restart the NFS client using # svcadm restart svc:/network/nfs/client B. boot the machine into single user mode, run fsck on the root file system, and then reboot C. boot the machine into single-user mode, comment the line from the /etc/vfstab file, and reboot D. boot the machine into single-user mode, then check that /opt/local exists and that the /etc/vfstab entry is spelled correctly E. verify that the NFS server software is running on the server, and that the directory specified in the client's /etc/vfstab file is properly exported using # showmount -e Ans: CD Q - 62. Which four are types of AutoFS maps? (Choose four.) A. Direct B. Slave C. Binary D. Master E. Special F. Indirect G. Sparse H. Cannonical Ans: ADEF

Q - 63. Under which two conditions will the automounter automatically mount resources listed in an AutoFS direct map? (Choose two.) A. only if the mount point has first been created B. only if the resources are to be mounted read-only C. only if an entry for the direct map has been added to the master map D. only if the reference used in the direct map uses relative path names E. only if the reference used in the direct map uses absolute path names Ans: CE Q - 64. You are creating a new direct map to allow a new application that has been installed on an application server to become available. Which two commands activate the new map? (Choose two.) A. /usr/sbin/mountall B. /usr/sbin/automount C. /usr/bin/pkill -HUP inetd D. /usr/sadm/bin/smreg add -d /etc/auto_master E. /usr/sbin/svcadm restart svc:/system/fileystem/autofs Ans: BE Q - 65. The system administrator has placed several entries in the direct map of a Solaris 10 OS machine that is configured to use local files. Which three features are direct map entries? (Choose three.) A. Direct maps can always be browsed. B. Direct maps specify relative paths only. C. Direct maps specify the absolute path of the mount point. D. A /- entry in the master map defines a mount point for direct maps. E. A master map that is a local file can only have one direct map entry. F. The directory specified in the map entry can be mounted from a comma-separated list of servers. Ans: CDF Q - 66. A system is configured to use automounted home directories and has the following /etc/auto_master file: # Master map for automounter #/net -hosts -nosuid,nobrowse /home auto_home -nobrowse The system also has the following /etc/auto_home file: # Home directory map for automounter # larry stooge1:/export/home/larry curly stooge2:/export/home/curly moe stooge3:/export/home/moe How should the home directory for curly be specified in the password database? A. /curly B. /home/curly C. /net/stooge2/curly D. /export/home/curly E. /net/stooge2/export/home/curly

Ans: B Q - 67. In which three data sources can the automountd daemon look for maps? (Choose three.) A. NIS B. files C. CIFS D. LDAP E. HTTP F. swapfs Ans: ABD Q - 68. Users dbadmin, webadmin, and user6 all have their home directories located on server1 in the /export/home directory. Given the following three files on a system named client6: /etc/passwd: dbadmin:x:100:10:Database Admin:/home/dbadmin:/bin/csh webadmin:x:101:10:Web Admin:/home/webadmin:/bin/ksh user6:x:101:10:User number 6:/home/user6:/bin/csh /etc/auto_master: #Master map for automounter /net -hosts -nosuid,nobrowse /home auto_home -nobrowse /etc/auto_home: #Home automounter map * server1:/export/home/& Only user6 is currently logged in to client6. dbadmin and webadmin have no processes running and have never logged in to client6. There have been no attempts to access the home directories of dbadmin and webadmin. Which two statements are correct? (Choose two.) A. Running ls /home outputs user6. B. The dbadmin and webadmin users will NOT be able to log in to client6 because their home directories do not exist. C. A new user named user7 that is added to /etc/passwd on client6 and has a home directory on server1 as /export/home/user7 will be able to log in without restarting the automounter on client6. D. Running the mount command on client6 command will show the home directories of webadmin, dbadmin, and user6 listed as being mounted. Ans: AC Q - 69. In Solaris 10, this tool provides an automated and proactive approach to patch management. It provides a graphical user interface as well as a command line interface. Which tool is it?

A. smpatch B. Patchtool C. Update manager D. Patch manager Ans: C Q - 70. Which Solaris 10 tools provide a user interface which enables the system administrator to analyze a system for available updates and install only those updates that youve selected? (Choose two) A. /usr/sbin/patchmgr B. /usr/bin/updatemanager C. /usr/sbin/smpatch D. /usr/sbin/patchadd Ans: BC Q - 71. Which Solaris 10 GUI tools can be used to display a list of all currently installed Sun Solaris 10 patches. Including the patch ID, a synopsis of the patch release date, the download size, and any special handling requirements? A. /usr/sbin/smpatch B. /usr/bin/updatemanager C. /usr/sbin/patchadd D. /usr/sbin/patchmgr Ans: B Q - 72. Which Solaris tools allow a system administrator to remotely manage Solaris 10 OS updates for a number of remote systems from a centralized server location? (Choose two) A. /usr/sbin/smpatch B. /usr/bin/updatemanager C. / usr/sbin/patchadd D. /usr/sbin/patchmgr Ans: AB Q - 73. Solaris 10 provides a tool to connect, over the internet, to a server at Sun Microsystems and analyze your system for security updates. Before you can fully utilize this tool, you must first register your Solaris 10 OS with Sun Microsystems. Which of the following commands will you use to register your software? A. smpatch B. sconadm C. updatemanager D. patchpro Ans: B Q - 74.

Your companys security policy does not allow you to connect your servers directly to the internet. You would like to utilize some of the functionality in Solaris 10 to analyze your systems for available OS updates, and also download and install those updates from Sun Microsystems. Which answer describes how to utilize this functionality to analyze your systems for available OS updates, and also download and install those updates without connecting your server directly to the internet? A. Get the patches on DVD and use Solaris 10 patch manager tools to analyze your server against the updates on the DVD. B. Connect your server via sftp only when you need to analyze your server for updates. C. Use the update manager proxy software and re-direct the client to look for updates on the proxy server. D. You will not be able to use the update utility to automatically search for updates at Sun Microsystems because the utility requires connecting to a Sun server over the internet. Ans: C Q - 75. Which two statements accurately describe hot spare usage and features? (Choose two.) A. A hot spare can hold data NOT in immediate use. B. A hot spare can improve the robustness of a RAID-0 volume. C. A hot spare is a slice that is functional and available, but NOT in use. D. A hot spare is on reserve to substitute for a failed slice in a submirror or RAID-5 volume. E. A hot spare is a volume that is functional and available, but NOT in use. Ans: CD Q - 76. Which three statements accurately describe Solaris Volume Manager software state databases? (Choose three.) A. Solaris Volume Manager software state databases can be added at any time. B. The Solaris Volume Manager software state databases should all be located on a disk on the primary controller. C. A system never panics due to Solaris Volume Manager software corruption if at least one Solaris Volume Manager software state database is available. D. The state database tracks the location of all known state database replicas. E. The Solaris Volume Manager software state database contains configuration information for all volumes and hot spares. Ans: ADE Q - 77. Which three statements accurately describe soft partitions? (Choose three.) A. Soft partitions are an alternative to Solaris Volume Manager software volumes for organizing disk storage. B. An unlimited number of soft partitions can be created from a volume. C. A soft partition can be grown to use any available space on a volume. D. A soft partition can be included in a volume and directly accessed by an application simultaneously. E. Soft partitions can be extended without moving or destroying data on other soft partitions. F. Soft partitions provide a mechanism for dividing large storage spaces into smaller, more manageable sizes. Ans: CEF

Q - 78. You have just finished mirroring the boot drive on your x86-based Solaris system. Your primary boot disk is c1d0p0 and your alternate boot disk is c2d0p0. Which procedure must you perform to make the secondary submirror bootable? A. /sbin/installgrub /boot/grub/stage1 \/boot/grub/stage2 /dev/rdsk/c2d0p0 B. fdisk -b /usr/lib/fs/ufs/mboot -n /dev/rdsk/c2d0p0 C. installboot /boot/grub/stage1 \ /boot/grub/stage2 /dev/rdsk/c2d0p0 D. installboot /usr/platform/`uname -i`/lib/fs/ufs/bootblk /dev/rdsk/ c2d0s0 Answer: A Q - 79. You have an x86-based system with mirrored boot drives (c1d0p0 and c2d0p0). To enable the system to boot off of the disk (c2d0p0) which holds the secondary submirror when the primary boot disk (c1d0p0 ) fails, you need to configure the system to see c2d0p0 as the alternate boot device. Which answer describes the procedure used to configure the alternate boot device? A. Edit the /boot/grub/menu.lst file and add the following information:root (hd1,0,a) kernel /boot/multiboot module /boot/x86.miniroot-safe B. Edit the bootenv.rc file and enter a value for the altbootpath parameter as follows: altbootpath=c2d0p0 . C. Use the kernel command to edit the boot entries in the GRUB main menu as follows: root (hd1,0,a) kernel /boot/multiboot module /boot/x86.miniroot-safe D. Press the space bar when the GRUB menu is visible during the boot process to edit the list of commands, and enter the command to boot from the alternate disk drive. Ans: A Q - 80. Your x86-based Solaris server will not boot from the primary boot drive. Because the boot drive has been mirrored, you need to change the server so that the system boots from the alternate boot disk. Which answer describes the procedure to change the default boot disk? A. Change the bootpath parameter in the bootenv.rc file so that it points to the correct boot drive. B. Change the bootpath parameter in the boot archive file so that it points to the correct boot drive. C. Use the eeprom ommand to change the bootpath parameter so that it points to the correct boot drive. D. Use the bootadm command to change the bootpath parameter so that it points to the correct boot drive. Ans: A Q - 81. In which situation will Solaris Volume Manager software volumes continue to function normally in the event of the corruption of one copy of its state database? A. Solaris Volume Manager software volumes will function normally if the master copy of the state database is NOT corrupted. B. Solaris Volume Manager software volumes will function normally if the copy of the state database on the boot disk is available. C. Solaris Volume Manager software volumes will function normally if NOT more than a single copy of the state database is corrupted.

D. Solaris Volume Manager software volumes will function normally if more than half of the copies of the state database are available. Ans: D Q - 82. You run an IT department and are responsible for purchasing hardware within a given budget. You are aware that 70 gigabytes of data housed in a series of traditional disk slices is becoming critical to the business. You decide to mirror the data, but have concerns about write performance. You can purchase the disk space to mirror the data. What configuration enhancement will achieve the best write performance? A. arranging for the mirror to consist of just two disks B. using RAID 5 to hold the data in each half of the mirror C. striping the data across the disks in each half of the mirror D. concatenating the data across the disks in each half of the mirror Ans: C Q - 83. You run an IT department and are responsible for purchasing hardware within a given budget. Certain data that you have housed in a series of traditional disk slices are critical and must not be lost to a disk failure. The amount of data is large (720 gigabytes ) and is read and written to frequently. There is also a need to improve the performance for both read and write operations. You have plenty of money in the budget. Which two statements describe a course of action that addresses the needs of the business within your constraints? (Choose two.) A. to secure the data using RAID 0 B. to secure the data using RAID 1 C. to secure the data using RAID 5 D. to secure the data using RAID 0+1 E. to secure the data using RAID 1+0 Ans: DE Q - 84. Given: # metadb flags first blk block count a u 16 8192 /dev/dsk/c1t1d0s0 Which statement correctly describes this output? A. The state database replica is 4 megabytes in size. B. The first volume is 8192 blocks in size. C. This site has followed the Sun guidelines for replicas. D. The slice c1t1d0s0 has 8192 disk blocks of free space. Ans: A Q - 85. Under the Solaris Volume Manager software, which RAID configuration is valid for the volume containing the / (root) file system? A. RAID 0, consisting of drives c0t0d0 and c0t1d0 B. RAID 1, consisting of drives c0t0d0 and c0t1d0 C. RAID 5, consisting of drives c0t0d0, c0t1d0, and c0t2d0 D. RAID 0+1, consisting of drives c0t0d0, c0t1d0, c1t0d0, and c1d1d0

Answer: B Q - 86. A user requires three file systems of the same size. The user requires the file systems to be able to remain online after a single disk failure. The user is NOT concerned about read or write performance. The user has provided a disk array with 10 drives in it. The user requires the maximum amount of usable space from this array. Which configuration satisfies all of the user's requirements? A. three RAID-5 volumes of three drives each with one drive being used as a hot spare B. three RAID-0 volumes of three drives each with one drive being used as a hot spare C. three soft partitions created on a single RAID-1 volume consisting of all 10 drives D. three soft partitions created on a single RAID-5 volume consisting of all 10 drives Answer: D Q - 87. Given: # metadb -s clones -i flags first blk block count a m luo 16 8192 /dev/dsk/c4t1d0s7 r - replica does not have device relocation information o - replica active prior to last mddb configuration change u - replica is up to date l - locator for this replica was read successfully c - replica's location was in /etc/lvm/mddb.cf p - replica's location was patched in kernel m - replica is master, this is replica selected as input W - replica has device write errors a - replica is active, commits are occurring to this replica M - replica had problem with master blocks D - replica had problem with data blocks F - replica had format problems S - replica is too small to hold current data base R - replica had device read errors # metastat -ac clones/d30 p 5.0GB c4t1d0s0 clones/d20 p 5.0GB c4t1d0s0 clones/d10 p 5.0GB c4t1d0s0 Which two represent the features of Solaris Volume Manager software configured on this system? (Choose two.) A. soft partitions B. striped volumes C. logical volumes D. mirrored volumes Answer: AC Q - 88.

You are configuring a new system. You would like the system to be able to boot unattended, even if its boot disk fails . You decide to mirror the root file systems using Solaris Volume Manager software . Assume one (1) metastate database replica per drive. What is the minimum number of drives that you need to place metastate database replicas on to accomplish this? A. 1 B. 2 C. 3 D. 4 Ans: C Q - 89. Your system has three disk drives allocated for data storage. You are using Solaris Volume Manager to create your file system on these drives. The application will be write-intensive. Which configuration will provide the best performance? A. RAID 5 B. RAID 1 C. RAID 0 Striped Structure D. RAID 0+1 Ans: C Q - 90. Your system has three disk drives allocated for data storage. You are using Solaris Volume Manager to create your file system on these drives. The application will be read-intensive. Which configuration will provide the best data protection in the event of a failure? A. RAID 5 B. RAID 1 C. RAID 0 D. RAID 1+0 Ans: A Q - 91. If your system uses a large number of mirrors, make sure that you have an adequate number of state databases. If you create too few state database replicas, performance could be negatively impacted. What is the recommended number of state database replicas for mirrored volumes? A. At least two state database replicas per RAID-1 volume. B. At least three state database replicas per RAID-1 volume. C. One state database replicas per RAID-1 volume. D. At least five state database replicas per RAID-1 volume. Ans: A Q - 92. What is true about the metastate database and its replicas? A. They cannot be deleted. B. A majority (half + one) are required for boot. C. They are created with the metainit command. D. They contain a binary form of the /etc/lvm/md.conf file.

E. They are created with the metadatabase command. Ans: B Q - 93. The root (/) file system exists on d10, which is a mirror that contains submirrors d11 and d12. Which two are true if submirror d12 is taken offline? (Choose two.) A. The d10 mirror is in read-only mode. B. The d12 submirror is in read-only mode. C. The other submirror, d11, can also be taken offline if needed. D. Data redundancy is still provided due to the remaining d11 submirror. E. Any writes to the mirror are tracked in a dirty region log, so that d12 can be resynchronized when it is brought back online. Ans: BE Q - 94. You are the system administrator and your monitoring software sends you an email indicating that one submirror of a two-way Solaris Volume Manager software mirror has gone offline because of a hardware error. The sub-mirror that was taken offline was 2.3 gigabytes in size. To maintain data redundancy , you created a hot spare pool in the following order and with the following slice sizes: - 1.0 gigabytes - 2.2 gigabytes - 9.8 gigabytes - 3.2 gigabytes - 6.5 gigabytes Which hot spare component will the Solaris Volume Manager software use to recreate the sub-mirror? A. 1.0 gigabytes B. 2.2 gigabytes C. 3.2 gigabytes D. 6.5 gigabytes E. 9.8 gigabytes Ans: E Q - 95. Given: # metadb; metastat -c flags first blk block count a u 16 8192 /dev/dsk/c1t0d0s3 a u 16 8192 /dev/dsk/c1t1d0s6 a u 8208 8192 /dev/dsk/c1t1d0s6 a u 16 8192 /dev/dsk/c1t2d0s6 a u 8208 8192 /dev/dsk/c1t2d0s6 a u 16 8192 /dev/dsk/c1t3d0s6 a u 8208 8192 /dev/dsk/c1t3d0s6 d100: Mirror Submirror 0: d10 State: Okay Submirror 1: d11 State: Resyncing

Submirror 2: d12 State: Resyncing Resync in progress: 1 % done Pass: 1 Read option: roundrobin (default) Write option: parallel (default) Size: 54330534 blocks (25 GB) d10: Submirror of d100 State: Okay Size: 54330534 blocks (25 GB) Stripe 0: Device Start Block Dbase State Reloc Hot Spare c1t1d0s6 17334 Yes Okay Yes d11: Submirror of d100 State: Resyncing Size: 54330534 blocks (25 GB) Stripe 0: Device Start Block Dbase State Reloc Hot Spare c1t2d0s6 17334 Yes Okay Yes d12: Submirror of d100 State: Resyncing Size: 54330534 blocks (25 GB) Stripe 0: Device Start Block Dbase State Reloc Hot Spare c1t3d0s6 17334 Yes Okay Yes Device Relocation Information: Device Reloc Device ID c1t3d0 Yes id1,sd@THITACHI_DK32EJ-36NC_____434H9227 c1t2d0 Yes id1,sd@THITACHI_DK32EJ-36NC_____434H4187 c1t1d0 Yes id1,sd@THITACHI_DK32EJ-36NC_____434J1501 Which three statements are true about this configuration? (Choose three.) A. The d10 metadevice is currently out of date. B. The d11 metadevice is currently out of date. C. The d12 metadevice is currently out of date. D. The d100 metadevice is configured as a three-way RAID-1 mirror volume. E. The d100 metadevice is configured as a three-way RAID-0 striped volume. F. The d100 metadevice is configured as a seven-way RAID-1 mirror volume. G. The d100 metadevice is configured as a seven-way RAID-0 striped volume. Ans: BCD Q - 96. A junior system administrator is setting up Solaris Volume Manager software on a new system for the first time. The administrator continually gets an error when attempting to create the metastate database replicas. The administrator has emailed you this command and its output: # metadb -a /dev/dsk/c0t2d0s0 netadb: newsunbox: there are no existing databases Which command do you tell the system administrator to run? A. metadb -a /dev/rdsk/c0t2d0s0 B. metainit -f /dev/dsk/c0t2d0s0

C. metadb -n -a /dev/dsk/c0t2d0s0 D. metadb -a -f /dev/dsk/c0t2d0s0 E. metainit db 1 /dev/dsk/c0t2d0s0 Ans: D Q - 97. When creating a slice for your database replicas, how much space should be allocated to the slice? A. 4 Mbytes in size for each replica that it will store. B. 8 Mbytes in size for each replica that it will store. C. 8 Kbytes in size for each replica that it will store. D. 4 Kbytes in size for each replica that it will store. Ans: A Q - 98. You want to implement ZFS on your server, but before attempting to use the ZFS software, you must first verify that your server meets the minimum requirements. Which answers describe the hardware and software requirements that your server must meet before ZFS can be implemented? (Choose three) A. The minimum disk size is 128 Mbytes. B. A storage pool requires a minimum of 64 Mbytes. C. 1GB of RAM is recommended. D. The minimum disk size is 1GB. E. A storage pool requires a minimum of 128 Mbytes. Ans: ABC Q - 99. You have a spare disk on your x86-based Solaris system, c1t0d0, and you would like to create a ZFS file system on it. Given the following requirements: ZFS storage pool named data. ZFS file system named data (located in the data pool). Mount the /data file system so that it is mounted and ready for use after each system boot. Which command(s) would you use to setup the ZFS file system? A. zpool create data c1t0d0 B. zpool create data c1t0d0; zfs create data/data C. zpool create data c1t0; zfs create data/data; newfs /dev/rdsk/data/data; make entry in the /etc/vfstab file D. zpool create data data c1t0d0; make an entry in the /etc/vfstab file Ans: A Q - 100. Youve created several ZFS file systems as listed: NAME USED AVAIL REFER MOUNTPOINT data 197K 1.95G 29.5K /data data/data 24.5K 1.95G 24.5K /data/data data/foo 24.5K 1.95G 24.5K /data/foo data/oracle 24.5K 1.95G 24.5K /data/oracle data/temporary 24.5K 1.95G 24.5K /data/temporary The /data/temporary file system is no longer needed. Which command would you use to remove this ZFS file system?

A. umount /data/temporary; zfs destroy temporary B. zpool destroy data/temporary C. zfs destroy data/temporary D. umount /data/temporary; newfs /data/temporary Ans: C Q - 101. When creating a ZFS file system, which of the following scenarios are not recommended? A. Drives should not be partitioned with both UFS and ZFS file systems. B. A disk that is used as a swap or dump device should not be used for a ZFS file system. C. Constructing ZFs file system on top of LUNs that are created from hardware RAID arrays. D. Constructing ZFS file systems on top of software based volume managers such as SVM meta devices. Ans: D Q - 102. The following command has been issued: mirror c1t1d0 c2t1d0 mirror c4t0d0 c5t0d0 Which answer describes the type of device that has been created by issuing this command? A. A ZFS two-way mirrored device. B. Two ZFS, three-way mirrored devices C. A ZFS mirrored pool. D. A ZFS pool with two, two-way mirrors. Ans: D Q - 103. The following command is issued on your Solaris system: zpool create datapool mirror c1t1d0 c2t1d0 mirror c3t1d0 c4t1d0 Which answer describes the type of device that has just been created? (Choose two) A. A mirrored ZFS storage pool B. A ZFS storage pool C. RAID-Z storage pool D. Mirrored ZFS file system Ans: AD Q - 104. You have setup the following ZFS file systems: NAME USED AVAIL REFER MOUNTPOINT datapool 197K 72.8G 29.5K /datapool datapool/data 24.5K 72.8G 24.5K /datapool/data datapool/web 24.5K 72.8G 24.5K /datapool/web You want to limit the amount of disk space that the /data/pool/web file system can consume. Which command would set the limit for the /data/pool/web file system so that it would consume no more than 2GB of disk space? A. zfs set quota=2G datapool/web B. set zfs quota 2G datapool/web C. quota datapool/web 2G D. zfs set quota -2G datapool/web

Ans: A Q - 105. You want to backup an active ZFS file system named dbase. When listing the information on the file system, the following information is displayed: NAME USED AVAIL REFER MOUNTPOINT data/dbase 24.5K 72.8G 24.5K /data/dbase Rather than unmount the file system and make it unavailable during the backup, you want to create a point in time snapshot of the file system and backup that snapshot. Which command is used to create a point in time snapshot of the dbase file system? A. zfs clone data/dbase data/sdbase/dbase_snapshot B. zfs snapshot files/data data_snapshot C. fssnap -F ufs -o bs=/var/tmp /data/dbase /dev/fssnap/0 D. zfs snapshot data/dbase@ dbase_snapshot Ans: D Q - 106. You want to create a copy of an active ZFS file system named dbase. When listing the information on the file system, the following information is displayed: NAME USED AVAIL REFER MOUNTPOINT files/dbase 24.5K 72.8G 24.5K /data/dbase data/dbase@bckup_dbase 0 - 24.5K Rather than unmount the file system, back it up and transfer the data to a second file system, you want to create a point in time snapshot of the current dbase file system and copy that snapshot. Based on the information displayed above, which answer describes the steps necessary to complete this process? A. zfs clone data/dbase@bckup_dbase data/clone_dbase B. zfs snapshot data/dbase@ bckup_dbase zfs clone data/dbase@bckup_dbase data/clone_dbase C. fssnap -F ufs -o bs=/var/tmp /data/dbase /dev/fssnap/0 mount -r ro /dev/fssnap/0 /data/clone_dbase zfs clone /data/dbase data/clone_dbase D. zfs clone data/dbase data/clone_dbase Ans: A Q - 107. The adminuser already has the following authorizations: solaris.admin.usermgr.pswd, solaris.system.shutdown, solaris.admin.fsmgr.write To add the ability to purge log files, you need to add solaris.admin.logsvc.purge to the list of authorizations for adminuser. Which command would you use to perform this task? A. rolemod -A solaris.admin.logsvc.purge,solaris.admin.usermgr.pswd, solaris.system.shutdown,solaris.admin.fsmgr.write adminuser B. rolemod -A solaris.admin.fsmgr.write adminuser C. usermod -A solaris.admin.fsmgr.write adminuser D. rolemod -P solaris.admin.logsvc.purge,solaris.admin.usermgr.pswd, solaris.system.shutdown,solaris.admin.fsmgr.write adminuser

Ans: A Q - 108. You have just added new authorizations to the adminuser role. Which of the following procedures is used to verify that the new authorizations have been successfully added to the role? A. As root, type: auths adminusr B. View the /etc/user_attr file. C. Log into the role and type: roles D. As root, type: roles adminusr Ans: A Q - 109. Given the following command: usermod -R role2 user1 Which two statements are true? (Choose 2) A. The user1 user account gets assigned role2. B. If role2 is a plain user account, the account becomes a role. C. The user1 user account loses all previous roles. D. If the user1 user account is a role, the account becomes a plain user. E. The role2 account gets the same type of account as user1. Ans: AC Q - 110. The /etc/user_attr file on your system contains the following entry: operator::::type=role;auths=solaris.system.shutdown,solaris.admin.patchmgr;profiles=Log Management Which two are correct statements about this entry? (Choose two.) A. The account operator is assigned one right. B. The account operator is assigned two rights. C. The account operator is a regular user account. D. The account operator is assigned two authorizations. E. The account operator is assigned the default system role. Ans: AD Q - 111. Given the entry from the /etc/user_attr file: user10::::profiles=User Security,Maintenance and Repair;roles=MediaAdmin;type=normal Which statement is correct? A. The user10 account is a role account. B. The MediaAdmin role is defined in the /etc/security/auth_attr file. C. The User Security,Maintenance and Repair profile is defined in the /etc/security/prof_attr file. D. The User Security and Maintenance and Repair profiles are defined in the /etc/security/prof_attr file. Ans: D Q - 112. Which two commands assign the user1 user the handyman role? (Choose two.) A. rolemod -U user1 handyman B. usermod -R handyman user1

C. usermod -K roles=handyman user1 D. rolemod -K users=user1 handyman Ans: BC Q - 113 Given: usermod -P Profile user1 Which two are true? (Choose two.) A. The user1 user loses all other profiles. B. The user1 user gets assigned the profile Profile C. The user1 user loses all authorizations in the user_attr file. D. The user1 user gets all authorizations from Profile added in the user_attr file. Ans: AB Q - 114. The system administrator wants to create a login that can only execute a limited number of commands using RBAC. Which three steps must be taken? (Choose three.) A. Define the user's login as a role. B. Give the user a profile shell. C. Give all the commands the proper uid attribute in prof_attr D. Create a profile that allows just executing the selected commands and assigns it to the user. E. Change the default profile in /etc/security/policy.conf to one which does not allow execution of any commands. Ans: BDE Q - 115. Your system is newly built and has a default set up. What is the default shell when adding an account using roleadd? A. /usr/bin/sh B. /usr/bin/pfsh C. /usr/bin/pfjsh D. /usr/bin/ksh E. /usr/bin/prsh F. /usr/bin/prksh Ans: B Q - 116. The security administrator wants to assign user bob to a netsec role so that the user can run the ifconfig(1M) and snoop(1M) commands with a rights profile named NSM. Which entries are contained in the /etc/security/exec_attr file after the required RBAC configuration has been implemented? A. NSM:bob:cmd:::/sbin/ifconfig:uid=0 NSM:bob:cmd:::/usr/sbin/snoop:uid=0 B. NSM:root:cmd:::/sbin/ifconfig:uid=0 NSM:root:cmd:::/usr/sbin/snoop:uid=0 C. NSM:suser:cmd:::/sbin/ifconfig:uid=0 NSM:suser:cmd:::/usr/sbin/snoop:uid=0 D. NSM:netsec:cmd:::/sbin/ifconfig:uid=0

NSM:netsec:cmd:::/usr/sbin/snoop:uid=0 Ans: C Q - 117. The security administrator wants to assign user bob to a netsec role so that the user can run the ifconfig(1M) and snoop(1M) commands with a rights profile named NSM. Which entries will be contained in the /etc/security/exec_attr file after the required RBAC configuration has been implemented when using privileges rather than uid 0? A. NSM:suser:cmd:::/sbin/ifconfig:privs=sys_net_config NSM:suser:cmd:::/usr/sbin/snoop:privs=net_rawaccess B. NSM:bob:cmd:::/sbin/ifconfig:privs=sys_net_config NSM:bob:cmd:::/usr/sbin/snoop:privs=net_rawaccess C. NSM:netsec:cmd:::/sbin/ifconfig:privs=sys_net_config NSM:netsec:cmd:::/usr/sbin/snoop:privs=net_rawaccess D. NSM:solaris:cmd:::/sbin/ifconfig:privs=sys_net_config NSM:solaris:cmd:::/usr/sbin/snoop:privs=net_rawaccess Ans: D Q - 118. The system administrator assigned a profile entry with sufficient rights to execute the snoop(1m) command. The user comes back and complains that it does NOT work. The system administrator wants the command to work automatically for the user. Which two can be causes after verifying that the RBAC database entries are correct? (Choose two.) A. The user needs to be assigned a profile shell. B. The user should prefix the command line with pfexec C. The user needs to log out and log in again to run with the new shell. D. The user needs to execute the su root command before the user can execute any of the profile commands. Ans: AC Q - 119. Which RBAC command helps you find the attributes commands that would be executed for a particular user? A. auths B. profiles C. auths -l D. pfexec -v E. profiles -l Ans: E Q - 120. Given the command and output: # profiles -l testrole Audit Control: /etc/init.d/audit euid=0, egid=3 /etc/security/bsmconv uid=0

/etc/security/bsmunconv uid=0 /usr/sbin/audit euid=0 /usr/sbin/auditconfig euid=0 /usr/sbin/auditd uid=0 All: * And given the fact that testrole executes commands with a profile shell. With what effective UID and real UID will the /usr/sbin/auditd program be started? A. effective UID 0 and real UID 0 B. effective and real UID of testrole C. effective UID of testrole and real UID 0 D. effective UID 0 and real UID of testrole Ans: A Q - 121. Which two commands list the profiles assigned to user fred? (Choose two.) A. profiles fred B. profiles -l fred C. profiles -list fred D. grep -w fred /etc/security/prof_attr E. grep -w fred /etc/securfity/policy.conf Ans: AB Q - 122. You have been tasked with setting up a new helpd esk technician. The help desk technician will be responsible for administering all user privilege aspects. Because the technician is new to the company, the technician will be granted the ability to answer user requests for forgotten passwords. The technician needs to be allowed to set and change user passwords. The new technician must also be able to read the configuration files related to other users, but must have the technician's supervisor make any changes that are required. The help desk technician will use the login name of helpdesk4. The userid of helpdesk4 has already been created as an unprivileged user. Which two commands add the authority to the helpdesk4 user to change user passwords, but only allow read-only access to user and role configuration files? (Choose two.) A. usermod -A solaris.* helpdesk4 B. usermod -A solaris.admin.usermgr.read helpdesk4 C. usermod -A solaris.admin.usermgr.pswd helpdesk4 D. roleadd -A solaris.admin.usermgr.pswd helpdesk4 E. roleadd -A solaris.admin.usermgr.read helpdesk4 F. usermod -A solaris.admin.usermgr.grant helpdesk4 Ans: BC Q - 123. You have been tasked with configuring a remote server. Your help desk technicians need the ability to do printer administration. Because of sensitive data on this system, you cannot grant the help desk technicians full root access. Which two commands create a role of helpdesk and assign the Printer Administration profile to it, and then add a help desk technician with a userid of roger to that role? (Choose two.) A. useradd roger -A helpdesk

B. roleadd -m -d /export/home/helpdesk -P "Printer Administration" helpdesk C. useradd -A helpdesk -m -d /export/home/helpdesk -P "Printer Administration" roger D. usermod -R helpdesk roger E. roleadd -A helpdesk -U roger Ans: BD Q - 124. The system administrator needs to create a new role named adminuser and assign the following authorizations to the adminuser role: solaris.admin.logsvc.purge solaris.admin.usermgr.pswd solaris.system.shutdown solaris.admin.fsmgr.write adminuser Which command would the system administrator issue to create the adminuser role? A. roleadd -m -d /export/home/adminusr -c admin assistant -A solaris.admin.logsvc.purge,solaris.admin.usermgr.pswd,solaris.system.shutdown,solaris.admin.fsmgr.wri te adminuser B. useradd -d /export/home/adminusr -c admin assistant -P solaris.admin.logsvc.purge,solaris.admin.usermgr.pswd,solaris.system.shutdown,solaris.admin.fsmgr.wri te adminuser C. roleadd -d /export/home/adminusr -c admin assistant -P solaris.admin.logsvc.purge,solaris.admin.usermgr.pswd,solaris.system.shutdown,solaris.admin.fsmgr.wri te adminuser D. useradd -m -d /export/home/adminusr -c admin assistant -A solaris.admin.logsvc.purge,solaris.admin.usermgr.pswd,solaris.system.shutdown,solaris.admin.fsmgr.wri te Ans: A Q - 125. Which file would the following entries be found in? solaris.admin.diskmgr.:::Disk Manager::help=AuthDiskmgrHeader.html solaris.admin.diskmgr.read:::View Disks::help=AuthDiskmgrRead.html solaris.admin.diskmgr.write:::Manage Disks::help=AuthDiskmgrWrite.html solaris.admin.fsmgr.:::Mounts and Shares::help=AuthFsmgrHeader.html solaris.admin.fsmgr.read:::View Mounts and Shares::help=AuthFsmgrRead.html A. /etc/user_attr B. /etc/security/auth_attr C. /etc/security/prof_attr D. /etc/security/exec_attr Ans: B Q - 126. Which two commands list all the authorizations assigned to the user john? (Choose two) A. auths john B. roles john C. profile john

D. more /etc/user_attr Ans: AD Q - 127. You want to set up a centralized server for syslog messages while also limiting the type of messages sent to that server as follows: - All security related syslog events should be forwarded to the bigbrother server. - All of the auth messages should be forwarded to the bigbrother server. - All messages above the notice level should be forwarded to the bigbrother server. - Do not forward any user messages. Which line needs to be added to the syslog configuration file to make this change effective? A. auth.*;* .notice;user.crit @bigbrother B. auth.debug;*.notice;user.none @bigbrother C. auth.debug;*.warning;user.none @bigbrother D. *.emerg;*.alert;*.crit;*.warning;auth.* @bigbrother Ans: C Q - 128. You have just made the following modification to the syslog configuration file: *.alert;kern.err;daemon.err operator What is the next step to implement this change? A. Save the file, syslog will pick up the changes made to the configuration file. B. svcadm refresh system-log C. svcadm restart svc:/system/syslogd:default D. svcadm stop svc:/system/syslogd:default svcadm start svc:/system/syslogd:default Ans: B Q - 129. Given the /etc/syslog.conf file output: #ident "@(#)syslog.conf 1.5 98/12/14 SMI" /* SunOS 5.0 */ ## Copyright (c) 1991-1998 by Sun Microsystems, Inc. # All rights reserved. ## syslog configuration file. ## This file is processed by m4 so be careful to quote (`') names # that match m4 reserved words. Also, within ifdef's, arguments # containing commas must be quoted. # *.err;kern.notice;auth.notice /dev/sysmsg *.err;kern.debug;daemon.notice;mail.crit /var/adm/messages *.alert;kern.err;daemon.err operator *.alert root *.emerg * # if a non-loghost machine chooses to have authentication messages

# sent to the loghost machine, un-comment out the following line: #auth.notice ifdef(`LOGHOST', /var/log/authlog, @loghost) mail.debug ifdef(`LOGHOST', /var/log/syslog, @loghost) # non-loghost machines will use the following lines to cause "user" # log messages to be logged locally. #i fdef(`LOGHOST', ,user.err /dev/sysmsg user.err /var/adm/messages user.alert `root, operator' user.emerg *) If loghost is defined to be a remote system, which two statements are true? (Choose two.) A. The mail.info messages are ignored. B. The user.err messages are sent to loghost. C. The mail.debug messages are logged to the /var/log/syslog file. D. The mail.crit messages are logged in the /var/adm/messages file and are sent to loghost. E. The mail.emerg messages are logged to the /var/adm/messages file, and all logged in users are notified. Ans: DE Q - 130. You have created a shell script to transfer files to a remote system. At the end of the script, you want to send a message to the syslog messaging facility stating that the file transfer is complete. Which entry would send the "Transfer Complete" message to the syslog messaging facility? A. echo "Transfer Complete" syslogd B. logger "Transfer Complete" C. log "Transfer Complete" D. syslog -l "Transfer Complete" Ans: B Q - 131. On a system using only local files for host name resolution the syslogd daemon configuration file contains : mail.debug ifdef('LOGHOST' , /var/adm/authlog, @loghost) What is indicated if the mail-related log messages are written to the /var/adm/authlog file? A. The loghost is unreachable over the network. B. The loghost entry is not in the /etc/inet/hosts file. C. The system has an /etc/inet/hosts alias of loghost. D. The LOGHOST variable is evaluated as false by the m4 macro processor. Ans: C Q - 132. Given the line taken from the syslogd daemon configuration file: mail.debug /var/adm/messages What is the result of implementing this entry? A. The mail.debug messages are logged locally in the /var/adm/messages file, regardless of any loghost alias. B. The mail.debug messages are not logged at all because the /var/adm/messages file is for kernel messages only.

C. The mail.debug messages are logged remotely if a remote host is configured in the /etc/inet/hosts file. D. Assuming a remote loghost is configured, the mail.debug messages are logged locally and remotely. Ans: A Q - 133. Your syslog configuration file contains the line: mail.debug ifdef(`LOGHOST', /var/log/syslog, @loghost) Which three are correct statements about this entry? (Choose three .) A. The ifdef statement is interpreted by the m4 processor. B. If the loghost alias is NOT set to the local host, messages are emailed to the root user at the host loghost C. If the loghost alias is set to be the local host, messages are sent to the /var/log/syslog file. D. If the loghost alias is set to be the local host, messages are sent to the user loghost on the local system. E. If the loghost alias is NOT set to the local host, messages are sent to the host defined as the loghost. Ans: ACE Q - 134. Given this line in the /etc/syslog.conf file: ? *.debug @loghost Which messages are forwarded to loghost? A. all messages B. all messages of severity debug C. all messages NOT matched by other lines D. all messages of severity debug NOT matched by other lines Ans: A Q - 135. On a Solaris 10 OS, you want to enable a syslog message for all incoming inetd requests. Which command do you need to execute? A. inetadm -M tcp_trace=true B. inetadm -M tcp_wrappers=true C. edit /etc/inetd.conf and add a tcp wrapper to each enabled service D. edit /etc/init.d/inetsvc and add the -t option to the inetd invocation Ans: A Q - 136. A Solaris 10 OS is configured to log to the /var/adm/messages file using syslog. Which two statements are correct? (Choose two.) A. The logadm utility automatically rotates the /var/adm/messages file. B. The /var/adm/messages file is a DBF formatted binary file. The SMC Log Viewer GUI is the only way to monitor the /var/adm/messages file in realtime. C. To monitor the /var/adm/messages file in real time, use the tail -f /var/adm/messages command. D. The /var/adm/messages file only contains the severity of the message. The facility of the message has to be interpreted using the process name and ID contained in the message. E. The syslog utility automatically trims the /var/adm/messages file, deleting messages that are more than twentyfour hours old.

Ans: AC Q - 137. Several systems are using system blue as a log host. Given the following syslog messages in the /var/adm/messages file on system blue: Jan 27 10:53:09 mailserver root: [ID 702911 mail.crit] The mail server is down Jan 27 10:54:38 webserver utmp_update[27026]: [ID 845426 user.error] Wrong number of arguments Jan 27 10:55:54 fileserver ufs: [ID 845546 kern.notice] NOTICE: alloc: /data: file system full Which is true? A. The /data file system on system blue is full. B. NONE of these messages originated from system blue. C. The mailserver daemon on system blue generated the first message. D. The user corresponding to UID 845426 generated the error "Wrong number of arguments." E. The root user on system blue used the logger command to generate the first message. Ans: B Q - 138. Which two statements are true about the /etc/syslog.conffile? (Choose two.) A. Only one action is allowed per line. B. Wildcard characters (*) are NOT allowed. C. The loghost variable must be defined in this file. D. Only one selector, facility.level, is allowed per line. E. The file must contain only tabs as white space characters. Ans: AE Q - 139. The company StoragCorp works on development of storage host bus adapters. Because StoragCorp is a small company, all of the company's disk arrays log messages to a central log host named scribe through the local5 facility. Some of these disk arrays are used for production work by human resources and some are used by the development teams to test their new host bus adapters. The previous administrator put the following line in the /etc/syslog.conf file on scribe to log messages from the arrays:Local5.warning /var/adm/messages Recently, the development team has run into a difficult problem and turned on the full debug output from a disk array. They have requested that scribe log all of that information. Logging all of the debug messages will create a large amount of messages that could cause an administrator to overlook real problems with the production disk arrays or to overlook scribe system problems. You have decided to change the syslog.conf file to stop using /var/adm/messages for the local5 facility messages. Instead you want to log warning and above levels for the local5 facility to /var/adm/arrays.messages and log debug and above level messages for the local5 facility to /var/adm/arrays.debug. Which two statements in /etc/syslog.conf will accomplish this? (Choose two.) A. *.debug /var/adm/messages B. local5.debug /var/adm/arrays.debug C. local5.warning /var/adm/arrays.debug D. local5.warning /var/adm/arrays.messages E. !local5.debug /var/adm/arrays.messages Ans: BD Q - 140.

You have just updated the /etc/syslog.conf file to modify message facility settings. Which two options cause the syslogd daemon to reread /etc/syslog.conf to enable the settings without requiring a reboot to the system? (Choose two.) A. init 6 B. pkill -HUP syslog.conf C. syslogd refresh /etc/syslog.conf D. svcadm refresh svc:/system/system-log:default E. svcadm stop svc:/system/system-log:default ; svcadm start svc:/system/system-log:default Ans: DE Q - 141. How many data sources can be specified in the Name Service Switch file for each of the data types? (Choose two.) A. only one B. a minimum of two C. a minimum of one D. a maximum of four E. a maximum depending on the data type F. a maximum depending on the system type Ans: CE Q - 142. Given this line from the name service configuration file:hosts:nis [NOTFOUND=return] files Which two statements correctly describe the behavior of the name service switch? (Choose two.) A. If NIS were available, but a host IP address was NOT in the NIS tables, the attempt to locate the host's address would be continued by searching for it in the local file (/etc/inet/hosts). B. If NIS were unavailable, the attempt to locate the host's address would be continued within the local file (/etc/inet/hosts). C. If NIS were unavailable, the attempt to locate a host's IP address would be abandoned. D. If NIS were available, but a host IP address was NOT in the NIS map, the attempt to locate the host's address would be abandoned. Ans: BD Q - 143. Given the line from a name service configuration file: hosts: files nis nisplus dns Which statement correctly describes the behavior of the name service switch? A. The attempt to locate a host's IP address would begin with DNS and would continue, if necessary, to use each name service, reading right to left, and stopping only if the IP address was found or if the name service list was completed. B. The attempt to locate a host's IP address would begin with local files and would continue, if necessary, to use each name service, reading left to right, and stopping only if the IP address was found or if the name service list was completed. C. The attempt to locate a host's IP address would begin with DNS and would continue, if necessary, to use each name service, reading right to left, and stopping if the IP address was found, any of the name services were unavailable, or if the name service list was completed.

D. The attempt to locate a host's IP address would begin with local files and would continue, if necessary, to use each name service, reading left to right, and stopping if the IP address was found, if any of the name services were unavailable, or if the name service list was completed. Ans: B Q - 144. Given the line from a name service configuration file: ethers:nis [UNAVAIL=return] files Which two statements correctly describe the behavior of the name service switch? (Choose two.) A. If the NIS server does NOT respond, the search for the ethers entry will end without looking in the local file. B. If NIS does respond, but does NOT find the appropriate entry in its ethers map, the search will end without looking in the local file. C. If NIS does respond, but does NOT find the appropriate entry in its ethers map, the search will continue by looking for it in the local file. D. If the NIS server does NOT respond, the search for the ethers entry will continue by looking for it in the local file. Ans: AC Q - 145. Which three describe the purpose of the name service switch file? (Choose three.) A. It determines which file systems will be used for operating system configuration data. B. If multiple networks are connected to the system, this file determines which one will be used to locate other resources on the network. C. It contains information necessary for locating user authorizations and profiles. D. It determines which data sources will be used to resolve the names of other nodes on the network. E. It contains the names of all the users who can use this system over the network. F. It contains information used to determine how names and passwords for users will be resolved at login. Ans: CDF Q - 146. Which three are true about the getent command? (Choose three.) A. It is only configured when using LDAP. B. It is only available to the super-user (root). C. It provides a generic user interface for NIS, LDAP, and DNS. D. It provides caching services to a host for NIS, LDAP, and DNS. E. It can be used to resolve both IPv6 and IPv4 host names and addresses. F. It consults the naming services in the order listed in the /etc/nsswitch.conf file. Ans: CEF Q - 147. Given invocation of the command: # svcadm restart system/name-service-cache Which three occur? (Choose three.) A. It reboots the host. B. It restarts the nscd daemon.

C. It cannot be run on a live host. D. It restarts the ypbind daemon. E. It causes /etc/nscd.conf to be reread. F. It clears out the local host's cache of the name services. Ans: BEF Q - 148. Which three statements accurately describe the /etc/nsswitch.conf file? (Choose three.) A. The /etc/nsswitch.conf file includes a list of databases that are sources of information about IP addresses, users, and groups. B. The /etc/nsswitch.conf file can specify a number of data sources, such as NIS, NIS+, LDAP, DNS, or local files. C. The /etc/nsswitch.conf file must be created manually as part of the installation process. D. Each data item in the /etc/nsswitch.conf file must have at least one data source, but cannot have more than three data sources. E. The /etc/nsswitch.conf file is only necessary if multiple data sources are being used to track IP addresses, users, and groups. F. The lookup order for each item is specified in the /etc/nsswitch.conf file. Ans:ABF Q - 149. At your company, the NIS hosts map is pushed (updated) once every night. # # Copyright (c) 1994-2001 by Sun Microsystems, Inc. # #ident "@(#)nscd.conf 1.6 01/01/26 SMI" # debug-level 0 positive-time-to-live passwd 600 negative-time-to-live passwd 5 suggested-size passwd 211 keep-hot-count passwd 20 old-data-ok passwd no check-files passwd yes positive-time-to-live hosts 3600 negative-time-to-live hosts 5 suggested-size hosts 211 keep-hot-count hosts 20 old-data-ok hosts no check-files hosts yes Based on this information, which change to the /etc/nscd.conf file will increase performance of the Name Service Cache Daemon (nscd)? A. increase the debug-level B. decrease the keep-hot-count for the hosts cache C. increase positive-time-to-live for the hosts cache D. decrease negative-time-to-live for the hosts cache E. decrease positive-time-to-live for the hosts cache Ans: C

Q - 150. The Name Service databases notify the ncsd daemon to update its cache as needed. When the cache becomes out of date, which command can you use to force the ncsd daemon to update its cache? A. svcadm restart system/name-service-cache:default B. pkill -HUP ncsd C. scvadm disable system/ncsd:default svcadm enable system/ncsd:default D. ncsd -flush Ans: A Q - 151. You are trying to isolate a DNS lookup problem. You suspect it is a bad entry in the Name Service switch file, so you are going to try a test query of the Name Service. Which command will directly reference the Name Service switch file and verify that the return actions are properly placed? A. nslookup B. getent C. ypcat D. ldaplist Ans: B Q - 152. You receive a HelpDesk ticket from a user that is unable to access the host server6.bigcorp.com from their workstation. The user's workstation is named client4.bigcorp.com. The user has issued a ping command and sends you the output: % ping server6.bigcorp.com ping: unknown host server6.bigcorp.com Big Corp has recently transitioned from using DNS. Big Corp now uses LDAP exclusively and has decomissioned all of their internal DNS servers. With the exception of the primary LDAP server, no client has access to a DNS server. The client4.bigcorp.com was reconfigured to be an LDAP client, as were all other hosts in the department. A check of the contents of the /etc/inet/hosts file on client4.bigcorp.com reveals that it does NOT contain an entry for server6.bigcorp.com. You discover that a ll of the other systems in the department can access server6.bigcorp.com , even though they do NOT contain an /etc/inet/hosts entry for server6.bigcorp.com You run the nslookup command on client4.bigcorp.com and get this: # nslookup server6.bigcorp.com; connection timed out; no servers could be reached When running ldapsearch from client4.bigcorp.com, it returns the correct IP address for server6.big.corp.com. Which file onclient4.bigcorp.comis misconfigured and must be modified to correct the user's issue ? A. the /etc/ipnodes file B. the /etc/ldap.conf file C. the /etc/resolv.conf file D. the /etc/nsswitch.conf file Ans: D Q - 153. You are configuring a DNS client on your organization's network. You need to configure the name service switch to tell the client to use DNS. Which two are databases in the name service switch for which the dns keyword is valid? (Choose two.)

A. hosts B. ipnodes C. services D. netmasks E. networks Ans: AB Q - 154. To configure a system as a DNS client during system installation, which three items will be requested? (Choose three.) A. domain name for this client B. IP address of the primary DNS server C. node name for the primary DNS server D. user name to use for node name queries E. domains in which to search for node names F. password to access the primary DNS server Ans: ABE Q - 155. Which describes the procedure to unconfigure an LDAP client? A. Run the following command: ldapclient -v uninit B. Run the following command then reboot: dapclient -v mod C. Restore the previous /etc/nsswitch.conf file and reboot. D. Remove any LDAP client files from the /var/ldap directory and kill the ldap_cachemgr process. Ans: A Q - 156. A user is having LDAP client problems. The profile with which the client was configured was updated over night. From the error messages it would appear that the daemon on the client responsible for updating the profile might NOT have started. Which daemon on the client is responsible for updating the profile? A. ldap_client B. ldap_update C. ldap_profile D. ldap_cachemgr Ans: D Q - 157. An LDAP client is NOT returning the expected information, but it is authenticating with the server. It could be that the configuration file might be corrupt. Which file contains this configuration information? A. /var/ldap/ldap_auth_file B. /var/ldap/ldap_client_file C. /var/ldap/ldap_config_file D. /var/ldap/ldap_profile_file Ans: B Q - 158.

While installing the OS, you select DNS as a name service. As you continue the installation, what information is required to complete the DNS client installation? (Choose two) A. The domain name must be set for this client. B. The node name for the primary DNS server must be set on this client. C. The IP address of the primary DNS server must be set on this client. D. The user name used for node name queries must be set on this client. E. The list of domains in which to search for node names must be set on this client. Ans: AC Q - 159. While installing the Solaris operating environment, you select LDAP as a name service. As you continue the installation, which information is required to complete the LDAP client installation? (Choose two) A. The domain name must be set for this client. B. The LDAP profile name must be set for this client. C. The IP address for the profile server must be set on this client. D. The hostname for the profile server must be set on this client. Ans: AB Q - 160. After installing the OS, you have realized that you did not configure the name service properly and selected files when you should have selected ldap. Which answer describes how to re-configure this system as an ldap client? A. Restart the suninstall installation program. B. Configure the /var/ldap/ldap_client_file and the /etc/defaultdomain files for ldap. C. Run the ldapclient command. D. Move the /etc/nsswitch.ldap file to /etc/nsswitch.conf. Configure the /var/ldap/ldap_client_file and the /etc/defaultdomain file. Ans: C Q - 161. Which two commands will display the current LDAP clients local configuration? (Choose two) A. ldapclient list B. ldaplist C. cat /var/ldap/ldap_client_file D. ldapclient -l E. ldapcheck Ans: AC Q - 162. Which two statements about the relationship between NIS master servers and NIS slave servers are true? (Choose two.) A. Load balancing capabilities within NIS can be achieved by configuring at least one slave server on each subnet. B. Clients cannot bind across subnets, therefore you must provide a slave server on each subnet bound to a master server . C. Only one master server can be configured, but it can support multiple slave servers and clients. D. There can be an unlimited number of slave servers and clients on a subnet, but there must be a master server on each subnet .

Ans: AC Q - 163. Which three are processes and daemons started by the /usr/lib/netsvc/yp/ypstart script on an NIS master server? (Choose three.) A. ypcat B. ypbind C. ypinit D. ypserv E. ypxfrd F. yprefont Ans: BDE Q - 164. Which two processes and daemons are executed by the /usr/lib/netsvc/yp/ypstart script on an NIS slave server? (Choose two.) A. ypbind B. ypinit C. ypserv D.ypxfrd Ans: AC Q - 165. You have configured a NIS domain within your organization. The NIS domain includes: One master server Three slave servers 30 client systems Which two daemons will run only on the master server? (Choose two.) A. ypnscd B. ypserv C. rpc.yppasswdd D. ypxfr_1perday E. rpc.ypupdated Ans: CE Q - 166. The NIS passwd map contains the following entry: larry:uysvPo3nanyeo:101:10:Larry Doe:/home/larry:/bin/ksh Which three commands will return this entry ? (Choose three. ) A. ypcat passwd | grep larry B. ypmatch -k 101 passwd.byuid C. ypmatch -k 101 passwd.byname D. ypmatch -k larry passwd.byname E. ypmatch -k Larry passwd.bycomment Ans: ABD Q - 167.

You are extending the NIS support in your network to include a new NIS map to support automount direct maps. As part of this process, you modify the NIS Makefile to include the line: auto.direct: auto.direct.time What does this line signify? A. The auto.direct dependency is satisfied when the auto.direct.time dependency is satisfied. B. The auto.direct NIS map is indexed using the time at which resources are mounted by a client. C. Client use of the auto.direct NIS map is recorded in the /var/yp/auto.direct.time log file. D. If the auto.direct file does NOT exist, it should be created using the auto.direct.time file as a template. Ans: A Q - 168. You are extending the NIS support in your network to include a new NIS map to support automount direct maps. As part of this process, you modify the NIS Makefile to include the line:touch auto.direct.time; What is the purpose of this line? A. The line updates the timestamp on the /var/yp/auto.direct.time file so that the system has a record of when the map was last built. B. The line is used to create the auto.direct.time source file for the NIS map in situations where the source file does not already exist. C. The line updates the timestamp in the index file for the NIS map so that the data file and the index file are correctly synchronized. D. The line creates the /etc/auto.direct.time file, which causes a message to be sent to the syslogd daemon indicating that the NIS map has been changed. Ans: A Q - 169. After six months of successful NIS operation, you modify the NIS Makefile on the NIS master server to build a map that did NOT exist before. The modified Makefile is configured to build a new auto.direct automount map and then distribute the new map to the slave servers. After you complete the edits on the Makefile, you run the make command, which requires that you enter Ctrl-C to return to the shell prompt: # /usr/ccs/bin/make updated netid pushed netid updated auto.direct *** auto.direct.time removed. Assume that there are no syntax errors in the modified Makefile. Which statement accounts for the screen output? A. The Makefile was correct, but the administrator did NOT create the /etc/auto_direct file. B. The new auto.direct map was NOT distributed to the slave servers. C. The auto.direct.time file is a log file that holds possible errors, and no errors were generated. D. The auto.direct.time file is a temporary file used to hold the contents of the /etc/auto_direct file while the corresponding NIS map is being built, and this file is removed after the map is successfully built. Ans: B Q - 170.

You are extending the NIS support in your network to include a new NIS map to support automount direct maps. As part of this process, you modify the NIS Makefile to include the line:auto.direct.time: $(DIR)/auto_direct What does this line signify? A. The auto.direct.time file can be found in the $(DIR)/auto_direct directory. B. The auto.direct.time file is created by copying the $(DIR)/auto_direct file. C. For the auto.direct.time dependency to succeed, the $(DIR)/auto_direct file must exist. D. Any reference to the file auto.direct.time should use the contents of the $(DIR)/auto_direct file. Ans: C Q - 171. A junior administrator is attempting to configure a server as a NIS client to the abc.com NIS domain and is running into difficulty. Upon boot, the system displays this error message: SunOS Release 5.10 Version Generic 64-bit Copyright 1983-2005 Sun Microsystems, Inc. All rights reserved. Use is subject to license terms. Hostname: prefontaine SUNW,eri0 : 100 Mbps full duplex link up Jan 25 15:09:16 svc.startd[7]: svc:/network/nis/client:default: Method "/lib/svc /method/yp" failed with exit status 96. [network/nis/client:default misconfigured (see 'svcs -x' for details) ]prefontaine console login: The administrator provided some additional information: # svcs x svc:/network/nis/client:default (NIS (YP) client) State: maintenance since Tue 25 Jan 2005 03:09:16 PM CST Reason: Start method exited with $SMF_EXIT_ERR_CONFIG. See: http://sun.com/msg/SMF-8000-KS See: ypstart(1M) See: /var/svc/log/network-nis-client:default.log Impact: This service is not running. # tail /var/svc/log/network-nis-client:default.log [ Jan 25 10:53:42 Disabled. ] [ Jan 25 10:53:42 Rereading configuration. ] [ Jan 25 15:09:15 Executing start method ("/lib/svc/method/yp") ] /lib/svc/method/yp: domainname not set [ Jan 25 15:09:16 Method "start" exited with status 96 ] Which three commands are required to fix this error permanently ? (Choose three.) A. ypinit -s abc.com B. domainname abc.com C. echo abc.com > /etc/ypdomain D. echo abc.com > /etc/defaultdomain E. svcadm clear svc:/network/nis/client:default F. svcadm disable svc:/network/nis/client:default Ans: BDE Q - 172. Which three commands are valid ways to start the NIS server? (Choose three.) A. svcadm enable nis B. svcadm enable nis/server

C. /usr/lib/netsvc/yp/ypserv D. /usr/lib/netsvc/yp/ypstart E. svcadm enable svc:/network/nis/server Ans: BDE Q - 173. When you create a non-broadcast NIS client, which four tasks do you need to accomplish manually? (Choose four.) A. ypinit -c B. svcadm enable nis/client C. svcadm enable nis/server D. svcadm enable rpc/keyserv E. mkdir /var/yp/`domainname` F. setting the domain name of the system G. adding the host name and address information of the NIS servers to /etc/inet/hosts Ans: ABFG Q - 174. A NIS map update fails to propagate to slave servers on the network. Which three commands can be executed to update the slave servers? (Choose three.) A. On only one of the slave servers, execute cd /var/yp; /usr/ccs/bin/make B. On every slave server, execute /usr/lib/netsvc/yp/ypxfr <mapname> C. On only one of the slave servers, execute /usr/lib/netsvc/yp/ypxfr <mapname> D. On the master server, execute /usr/lib/netsvc/yp/ypxfr <mapname> E. On every slave server, execute ypinit -s <master> F. On the master server, execute cd /var/yp; /usr/ccs/bin/make. Ans: BEF Q - 175. On a system with a number of zones installed, all zones are NIS clients of the global zone. A second NIS domain is required. Which statement is true? A. Non-global zones can only be DNS clients. B. This is NOT possible. Only one NIS server can run on a system and all zones need to be NIS clients of the same domain. C. The administrator can create a new zone with a second NIS server. Each zone is free to pick its own domain name. D. Zones can be in different NIS domains, but you can run only one NIS server on one system. Ans: C Q - 176. One of the primary benefits of zones is the ability to share common executables and data from the global zone with local zones. What model is this? A. Thin Zone Model B. Slim Zone Model C. Whole Root Model D. Skinny Zone Model E. Sparse Root Model F. Light Weight Root Model

Ans: E Q - 177. A system administrator creates a zone without a network interface. Which two statements are true? (Choose two.) A.The zone cannot be booted. B. The zone can be accessed through zlogin C. The zone needs to be reconfigured if a network interface is added. D. The zone needs to be reinstalled when a network interface is added. E. The zone can be accessed through the loopback network from the global zone. Ans: BC Q - 178. Which two sequences of zonecfg commands add a read-write file system to a local zone ? (Choose two.) A. add inherit-pkg-dir set dir=/export add options rw end B. add fs set dir=/export set special=/export set type=lofs add options rw end C. add fs set dir=/export set special=/dev/dsk/c0t0d0s7 set raw=/dev/rdsk/c0t0d0s7 set type=ufs add options rw end D. add device set match=/dev/*dsk/c0t0d0s7 end Ans: BC Q - 179. Which sequence of zonecfg commands shares a directory read-write between a local zone and the global zone? A. add inherit-pkg-dir set dir=/export add options rw end B. add fs set dir=/export set special=/export set type=lofs add options rw

end C. add fs set dir=/export set special=/dev/dsk/c0t0d0s7 set raw=/dev/rdsk/c0t0d0s7 set type=ufs add options rw end D. add device set match=/dev/*dsk/c0t0d0s7 end Ans: B Q - 180. You have three applications from three different vendors, but only one system to run them on. Each application will require different OS patches to be installed. The problem you will encounter, if you load all of these applications on the same server, is that the vendor will not support the application if it runs on anything but the recommended environment. Which answer provides a solution? A. Run each application in a separate non-global zone. Patch each zone separately. B. Run each application in a zone. Install one application in the global-zone and patch it with the most current patch versions allowed. Do not patch the non-global zones. C. Run each application in a separate non-global zone. Patch the non-global zones with the most current patch versions. D. Zones will not work in this scenario - use domains. Ans: A Q - 181. Which of the following answers describe features found in Solaris Zones? (Choose two) A. Zones can be rebooted independently of one another - other zones are unaffected by the reboot. B. An administrator logged into the global zone cannot view the activity of applications in other zoneseach zone is completely from the others. C.Zones can share the same network interface yet each zone has its own dedicated IP address. D. Solaris packages are always installed in the global zone and then distributed to each non-global zone to allow all application to be patched from a central location. Ans: AC Q - 182. A Solaris zone can be configured with a sparse root zone. Which answer describes characteristics of the sparse root zone? A. Uses a read-only loopback file system from the global zone. B. A minimum installation of the root file system. Much like the root file system available when booting from DVD. C. All Solaris packages get copied to the non-global zones file system. D. All of the root file system is shared with the global zone, no files are copied into the zones private file system. Answer: A

Q - 183. The administrator of the dbzone zone has requested a dedicated file system on which to install a database. The administrator requests that this be mounted as /database within the zone. The host system has a metadevice d120 that has been allocated for dedicated use for this purpose. The dbzone zone is currently NOT booted. # zonecfg -z dbzone zonecfg:dbzone> add fs zonecfg:dbzone:fs> Which four commands are necessary to complete the administrator's request? (Choose four.) A. set type=ufs B. set special=rw C. set dir=/database D. set raw=/dev/md/rdsk/d120 E. set special=/dev/md/dsk/d120 F. add inherit-pkg-dir dir=/database G. set zonedir=/export/dbzone/database Ans: ACDE Q - 184. Once a zone has been installed, which three resource types can be added without requiring the zone to be reinstalled? (Choose three.) A. fs B. net C. device D. zonepath E. zone name F. inherit-pkg-dir Ans: ABC Q - 185. Given the following output: # zoneadm list -cv ID NAME STATUS PATH 0 global running / - heston-z1 incomplete /export/zones/heston-z1 - heston-z2 incomplete /export/zones/heston-z2 Which two are true? (Choose two.) A. Two zones are booting. B. Two zones are currently in use. C. Only one zone is currently in use. D. There are three zones configured on this system. E. There is only one zone configured on this system. Ans: CD Q - 186.

You are setting up local zones on your system. Once they are set up, you want to check that the daemons that are required by the zones are working. Which two daemon will be started when the zone is booted ? (Choose two.) A. zsched B. zonemon C. zoneadmd D. zonesched Ans: AC Q - 187. Exhibit: # uname -a SunOS heston-z1 5.10 Generic sun4u sparc SUNW,Sun-Fire-V440 # zoneadm list -cv ID NAME STATUS PATH 3 heston-z1 running / # ps -e PID TTY TIME CMD 15960 ? 0:00 lockd 16177 ? 0:00 smcboot 15839 ? 0:00 zsched 16006 ? 0:03 nscd 15954 ? 0:00 statd 18490 pts/2 0:00 ksh 18554 pts/2 0:00 ps 15868 ? 0:09 svc.conf 18517 pts/2 0:00 sh 16081 ? 0:00 syslogd 17798 console 0:00 ttymon 15947 ? 0:00 rpcbind 15996 ? 0:00 cron 15866 ? 0:05 svc.star 15919 ? 0:00 kcfd 16271 ? 0:00 snmpXdmi 18521 pts/2 0:00 ksh 15956 ? 0:00 keyserv 15864 ? 0:00 init 15957 ? 0:00 ypbind 16007 ? 0:00 sac 16066 ? 0:01 automoun 16008 ? 0:00 ttymon 15968 ? 0:02 inetd 15966 ? 0:00 utmpd 16178 ? 0:00 smcboot 16089 ? 0:02 sendmail 16175 ? 0:00 htt 16083 ? 0:00 sshd

16091 ? 0:00 sendmail 16168 ? 0:00 smcboot 18487 ? 0:00 in.telne 16181 ? 0:00 htt_serv 16197 ? 0:00 dtlogin 16285 ? 0:01 snmpd 16270 ? 0:00 dmispd 16262 ? 0:00 snmpdx 17660 ? 0:00 nfs4cbd 17666 ? 0:01 nfsmapid # Which three statements are true? (Choose three.) A. The node name is heston B. The host name is heston. C. The host name is heston-z1 D. The node name is heston-z1 E. The heston-z1 is a local zone. F. The heston-z1 is the global zone. Ans: CDE Q - 188. Given the zone configuration: zonepath: /export/zones/tancredo-z1 autoboot: true pool:inherit-pkg-dir: dir: /lib inherit-pkg-dir: dir: /platform inherit-pkg-dir: dir: /sbin inherit-pkg-dir: dir: /usr net: address: 192.29.97.113/24 physical: e1000g0 Which three statements are true about the zone's file systems? (Choose three.) A. The /usr is private to the local zone. B. The /var is private to the local zone. C. The /tmp is private to the local zone. D. The /usr is shared with the global zone. E. The /var is shared with the global zone. F. The /tmp is shared with the global zone. Ans: BCD Q - 189. Given the following output from the zonecfg command for the production zone: zonepath: /export/production autoboot: true pool:

inherit-pkg-dir: dir:/lib inherit-pkg-dir: dir:/platform inherit-pkg-dir: dir:/sbin inherit-pkg-dir: dir:/usr inherit-pkg-dir: dir:/opt/sfw net: address: 192.168.228.109 physical: e1000g0 Which three statements are true about the production zone? (Choose three) A. The production zone is a Whole Root zone. B. The zone automatically boots when the global zone is booted. C. The /opt/sfw directory on the production zone is read-only. D. The production zone has an IP address of 192.168.228.109 E. The production zone has full read-write privileges to its /usr file system. F. By default, an unprivileged user on the global zone has access to the production zones / (root) file system from the global zone. Ans: BCD Q - 190. Review the excerpt from a sample zone configuration session: 1 zonecfg:work-zone> add inherit-pkg-dir 2 zonecfg:work-zone:inherit-pkg-dir> set dir=/usr/sfw 3 zonecfg:work-zone:inherit-pkg-dir> end Which answer describes the task being performed on line 3? A. /usr/sfw is to be loop-back mounted from the global zone. B. /usr/sfw is to be copied from the global zone. C. /usr/sfw is to be linked to the global zone. D. The /usr/sfw directory will be inherited from the previous non-global zone. Ans: A Q - 191. Review the excerpt from a sample zone configuration session: 1 zonecfg:work-zone> add fs 2 zonecfg:work-zone:fs> set dir=/mnt 3 zonecfg:work-zone:fs> set special=/dev/dsk/c0t0d0s7 4 zonecfg:work-zone:fs> set raw=/dev/rdsk/c0t0d0s7 5 zonecfg:work-zone:fs> set type=ufs 6 zonecfg:work-zone:fs> add options [logging] 7 zonecfg:work-zone:fs> end Which answer describes the task that is being performed? (Choose two) A. Setup the mount point and options for the file system /mnt B. Setup /dev/dsk/c0t0d0s7 as a loop-back file system from the global zone.

C. Specify that /dev/rdsk/c0t0d0s7 is a raw special file. The zoneadmd daemon automatically runs the fsck command in non-interactive check only mode on this device before it mounts the file system. D. Setup /dev/dsk/c0t0d0s7 as a disk device for the non-global zone. Ans: AC Q 192.

Answer:

Q 193.

Answer:

Q 194.

Answer:

Q 195.

Answer:

Q 196.

Answer:

Q 197.

Answer:

Q 198.

Answer:

Q 199.

Answer:

Q 200.

Answer:

%p per process_id %u per user_id

Q 201.

Answer:

Q 202.

Answer:

Q 203.

Answer:

Q 204.

Answer:

Q 205.

Answer:

Q 206.

Answer:

Q 207.

Answer: Mirror volume name d10, Root file system d11, second mirror d12

Q 208.

Answer:

Q 209.

Answer:

Q 210.

Answer:

Q 211.

Answer:

Q 212.

Answer:

Q 213.

Answer:

Q - 214.

Answer:

Q 215.

Answer:

Q 216.

Answer:

Q 217.

Q 218.

Answer:

Q 219.

Q 220.

Answer:

Q 221.

Answer:

Q 222.

Q 223.

Answer:

Q 224.

Q 225.

Answer:

Q 226.

Answer:

Q 227.

Answer:

Host name of install server Host name of root server Path to installation image on install server Path to the client's root directory on the root server IP address of JumpStart install server IP address of root server

SinstNM SrootNM SinstPTH SrootPTH SinstIP4 SrootIP4

Q 228.

Answer:

Das könnte Ihnen auch gefallen