You are on page 1of 11

Exam Title

: SUN 310-013 : Sun Certified System Administrator For Solaris 8,Upgrade

Version : R6.1

www.Prepking.com

Prepking - King of Computer Certification Important Information, Please Read Carefully


Other Prepking products A) Offline Testing engine Use the offline Testing engine product to practice the questions in an exam environment. B) Study Guide (not available for all exams) Build a foundation of knowledge which will be useful also after passing the exam. Latest Version We are constantly reviewing our products. New material is added and old material is updated. Free updates are available for 90 days after the purchase. You should check your member zone at Prepking and update 3-4 days before the scheduled exam date. Here is the procedure to get the latest version: 1.Go towww.Prepking.com 2.Click on Member zone/Log in (right side) 3. Then click My Account 4.The latest versions of all purchased products are downloadable from here. Just click the links. For most updates,it is enough just to print the new questions at the end of the new version, not the whole document. Feedback If you spot a possible improvement then please let us know. We always interested in improving product quality. Feedback should be send to feedback@Prepking.com. You should include the following: Exam number, version, page number, question number, and your login ID. Our experts will answer your mail promptly. Copyright Each PDF file contains a unique serial number associated with your particular name and contact information for security purposes. So if we find out that a particular PDF file is being distributed by you, Prepking reserves the right to take legal action against you according to the International Copyright Laws. Explanations This product does not include explanations at the moment. If you are interested in providing explanations for this exam, please contact feedback@Prepking.com.

www.Prepking.com

1. Which three name services use hierarchical name space? (Choose three.) A. NIS B. NFS C. DNS D. UNS E. NIS+ F. LDAP Answer: CEF 2. You administer a growing network of systems, using the NIS naming service, with numerous slave servers. As the number of users and systems grows, performance is going down, updates are overloading the network, and the volume of data held on each server is becoming too large, causing difficulties in making backups quickly. You need to increase network security. What are two solutions to this problem? (Choose two.) A. configure your network to use NIS B. configure your network to use FTP C. configure your network to use NFS D. configure your network to use NIS+ E. configure your network to use DNS F. configure your network to use LDAP Answer: DF 3. You have a network with 115 Solaris systems using no naming service. There are no security concerns. Many users have accounts on several different systems. You want your users to be able to login on any system and have them use just one password. You also want to keep the network administration as simple as possible. Which action allows you to meet these requirements? A. configure your network to use NIS B. configure your network to use NFS C. configure your network to use NIS+ D. configure your network to use DNS E. configure your network to use LDAP Answer: A 4. Which two statements about the RBAC security mechanism are true? (Choose two.) A. The roleadd command uses the same default shell to useradd. B. The roleadd command uses very similar syntax to the useradd command. C. The -P option, used to associate an account with a profile, may only be used with roleadd. D. Using usermod -R rolename username updates the user_attr file to associate a user with a role.

www.Prepking.com

Answer: BD 5. Which shell is the default when adding an account using roleadd? A. /usr/bin/ksh B. /usr/bin/sh C. /usr/bin/pfsh D. /usr/bin/pfjsh E. /usr/bin/prsh F. /usr/bin/prksh Answer: C 6. You have created an RBAC role which is allowed to perform privileged tasks. You want to allow certain existing users to access the role. Which three actions should you take to ensure that users can access the role? (Choose three.) A. You give the users the password to the role. B. You give the users a profile type shell at login. C. You connect the user to the role through the usermod command. D. You inform the users that they can access the role through use of the su command. E. You inform the users that they can access the role through use of a direct login, Telnet, or rlogin. F. You give the users execute permissions to the privileged commands associated with the role through use of the ACL mechanism. Answer: ACD 7. In the execution attributes database, what is NOT a valid value for the attr (which is the last field)? A. euid B. uid C. egid D. suid Answer: D 8. Which command lists the registered RPC services? A. ipcs B. lsrpc C. rpccall D. psrinfo E. rpcinfo F. rpclist Answer: E 9. Which statement about an Ethernet address is true?

www.Prepking.com

A. It is unique for every system. B. It has an entry in the /etc/inet/hosts file. C. It is a 32-bit address divided into four 8-bit fields. D. It is a number assigned by the system administrator. Answer: A 10. Which layer of the seven layer OSI/ISO model resolves packet delivery decisions based on the Ethernet address? A. session layer B. network layer C. physical layer D. data link layer Answer: D 11. Which command identifies the local system's Ethernet address? A. netstat B. ifconfig C. snoop -a D. netstat -i E. ifconfig -a Answer: E 12. Given: # pkill -HUP inetd What are two results of executing this command? (Choose two.) A. It forces inetd to re-read the /etc/inetd.conf configuration file. B. It aborts all Internet services and leaves them in a quiescent state. C. It stops NFS services in preparation for bringing down the network. D. It starts any Internet services that are listed in the /etc/inetd.conf file. Answer: AD 13. Which layers of the seven layer OSI/ISO model are combined to form the application layer of the TCP/IP model? A. application, transport, and Internet B. application, transport, and session C. application, presentation, and Internet D. application, presentation, and session Answer: D 14. System A is using TCP/IP over Ethernet to contact System B on its subnetwork. System A has System

www.Prepking.com

B's IP address but no Ethernet address. Which protocol is used to establish System B's Ethernet address? A. ARP B. RDP C. RPC D. TCP E. RARP Answer: A 15. Which command should be used to manually invoke a consistency check and perform any necessary updates on a cacheFS file system? A. cfsadmin -c B. cfsadmin -d C. cfsadmin -s D. cachefsstat -z E. cachefswssize -s Answer: C 16. Which command creates a log called /var/home_cache.log and initiates logging for the /export/home file system which is being cached? A. cachefslog /var/home_cache.log B. cachefslog -h /var/home_cache.log C. cachefswssize /var/home_cache.log D. cachefslog -f /var/home_cache.log /export/home E. cachefslog -s /var/home_cache.log /export/home Answer: D 17. What must be done before you run the command to check the integrity of the cached file system /export/home_cache? A. delete the cache B. check the cache statistics C. obtain the cache ID number D. unmount the cached file system E. adjust the working set size of the cache F. find all backup superblock numbers for the file system Answer: D 18. Which three series of commands should be used to completely dismantle the cached file system /export/home_cache created to cache the /export/home file system using a cacheID of homecacheid?

www.Prepking.com

(Choose three.) A. newfs /export/home B. mount /export/home C. umount /export/home D. rm /export/home_cache E. swap -a /export/home_cache F. cfsadmin -d homecacheid /export/home Answer: CDF 19. Which command configures the cache /export/home_cache that should be used when caching the /export/home file system? A. cfsadmin -l /export/home_cache B. cfsadmin -p /export/home_cache C. cfsadmin -c /export/home_cache D. cfsadmin -m /export/home_cache E. cachefslog -c /export/home_cache Answer: C 20. You are in a directory containing only text files. You want to use grep to search all these files for lines which contain "A" at the start of a line. Which command should you use? A. grep A* B. grep '^A' * C. grep * '^A' D. grep '$A' * E. grep * '$A' Answer: B 21. Which command displays an Access Control List for a file? A. lsacl B. getacl C. aclget D. faclget E. getfacl Answer: E 22. Which server is used to control the client activity on Enterprise Agents and is itself a client to other servers? A. mail server B. print server

www.Prepking.com

C. workgroup server D. name service server Answer: C 23. When configuring a domain with a Network Information Service (NIS) client-server relationship, what qualifies a system as an NIS client ? A. Every system on the subnet is an NIS client. B. Every system in the domain is an NIS client. C. Only systems that are not NIS servers are NIS clients. D. Only systems that are not NIS master servers are NIS clients. Answer: B 24. You have searched for and found a string in the file. Which vi command should be used to find the next occurrence of the same string? A. ! B. f C. G D. n E. s Answer: D 25. Which vi command, while in command mode, deletes all text from the current cursor position to the end of the current line? A. D B. R C. $ D. d1 E. dd F. yy Answer: A 26. What does Sun Management Console do? (Choose two.) A. It provides a means of connecting to a remote system at the ok prompt. B. It provides a GUI through which local and remote systems can be administered. C. It provides a means of managing remote systems without having to do a remote login. D. It provides a common terminal window to type commands which subsequently run on a number of Solaris 8 systems at the same time. Answer: BC 27. Which three statements about Sun Management Console are true? (Choose three.)

www.Prepking.com

A. It provides a graphical means to manage metadevices. B. It simplifies administration by bringing the tools together in one location. C. It allows management of all the Sun Management Console servers in one location. D. It gives the user a graphical representation of the administration components available and the level of user privilege required to run them. Answer: BCD 28. Which four pieces of JumpStart client information can be configured by using the sysidcfg file? (Choose four.) A. locale B. name service C. root password D. client host name E. patch information F. file system layout G. software configuration cluster Answer: ABCD 29. Which ftp subcommand should you use to transfer all the files in the /etc directory containing the character string host within their respective file names? A. rcp /etc/host* B. get /etc/host* C. copy /etc/host* D. mget /etc/host* Answer: D 30. Which command should be used to open a session on a remote system named web_server? A. telnet web_server B. login -r web_server C. rlogin -h web_server D. rsh -login web_server Answer: A 31. You have login accounts on hostA and hostB. You want to execute the rcp command to copy a file from hostA to hostB. What do you need to do to become a trusted user on hostA? A. add your login name to the /etc/hosts.equiv file on hostB B. create hosts.equiv files in your home directories and put a + in the file on hostB C. ask the system administrator to add you to the /etc/.rhosts file on the host hostB D. create a .rhosts file in your home directory on hostA and put the hostname hostB in the file

www.Prepking.com

Answer: D 32. Which ftp subcommand, if entered prior to transferring multiple files with the mget or mput subcommands, alleviates the need to answer interactive confirmations for each file? A. mset B. noask C. prompt D. stream Answer: C 33. When configuring a domain with a Network Information Service (NIS) client-server relationship, what qualifies a system as an NIS client? A. Every system on the subnet is an NIS client. B. Every system in the domain is an NIS client. C. Only systems that are not NIS servers are NIS clients. D. Only systems that are not NIS master servers are NIS clients. Answer: B 34. Which server is used to control the client activity on Enterprise Agents and is itself a client to other servers? A. mail server B. print server C. workgroup server D. name service server Answer: C 35. Which three statements about Sun Management Console are true? (Choose three.) A. It provides a graphical means to manage metadevices. B. It simplifies administration by bringing the tools together in one location. C. It allows management of all the Sun Management Console servers in one location. D. It gives the user a graphical representation of the administration components available and the level of user privilege required to run them. Answer: BCD 36. You want to use a GUI that will stop and start a specialist application. What could be customized to do this? A. AdminSuite B. Metatool C. Sun Management Console D. Sun Remote Application Tool

www.Prepking.com

100% Pass Guaranteed or Full Refund Word to Word Real Exam Questions from Real Test Buy full version of exam from this link below http://www.prepking.com/310-013.htm

You might also like