Professional Documents
Culture Documents
Ace 145q
Ace 145q
145q
Number: 1z0-821
Passing Score: 800
Time Limit: 120 min
https://www.gratisexam.com/
1z0-821
https://www.gratisexam.com/
Exam A
QUESTION 1
When upgrading an existing system from Solaris 11 Express to Oracle Solaris 11, what happens to the datalink names?
A. They follow the default naming convention for the newly installed version.
B. They maintain their names.
C. They are called eth#.
D. They are called el00g#.
E. They are left unnamed, to avoid conflicts, and need to be renamed after the installation process is complete.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Network configuration in Oracle Solaris 11 includes
* Generic datalink name assignment – Generic names are automatically assigned to datalinks using the net0, net1, netN naming convention, depending on the total
number of network devices that are on the system
Note: There is no upgrade path from Oracle Solaris 10 to Oracle Solaris 11. You must perform a fresh installation.
QUESTION 2
You have installed software updates to a new boot environment (BE) and have activated that the booting to the new BE, you notice system errors. You want to boot
to the last known good configuration.
Which option would you use on a SPARC system to boot to the currentBE boot environment?
https://www.gratisexam.com/
A. boot –L currentBE
B. boot –Z rpool/ROOT/currentBE
C. boot –a Enter the currentBE dataset name when prompted.
https://www.gratisexam.com/
D. boot rpool/ROOT/currentBE
E. boot –m currentBE
F. beadm activate currentBE
Correct Answer: F
Section: (none)
Explanation
Explanation/Reference:
Explanation:
You can change an inactive boot environment into an active boot environment. Only one boot environment can be active at a time. The newly activated boot
environment becomes the default environment upon reboot.
beadm activate beName activates a boot environment by setting the bootable pool property, bootfs, to the value of the ROOT dataset of the boot environment that
is being activated.
beadm activate sets the newly activated boot environment as the default in the menu.lst file.
2. Reboot.
The newly activated boot environment is now the default on the x86 GRUB menu or SPARC boot menu.
QUESTION 3
Oracle Solaris 11 limits access to the system with usernames and passwords.
The usernames are held in ___________, and the passwords are held in ___________.
Select the correct pair.
A. /etc/security/policy.conf /etc/passwd
B. /etc/passwd /etc/shadow
C. /etc/security /etc/passwd
D. /etc/shadow /etc/passwd
Correct Answer: B
https://www.gratisexam.com/
Section: (none)
Explanation
Explanation/Reference:
Explanation:
The /etc/passwd file contains basic user attributes. This is an ASCII file that contains an entry for each user. Each entry defines the basic attributes applied to a
user.
/etc/shadow file stores actual password in encrypted format for user's account with additional properties related to user password i.e. it stores secure user account
information. All fields are separated by a colon (:) symbol. It contains one entry per line for each user listed in /etc/passwd file.
QUESTION 4
_________ serves as the interface between the SMF repository and the user to ensure that a consistent, picture of the repository is presented to the user.
A. repository.db
B. service manifest
C. svc.startd
D. svc.configd
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
SVC.CONFIGD is the repository daemon responsible for maintaining /etc/svc/repository.db. The repository.db must come clean during this integrity check otherwise
it is a "no go" for usual boot sequence to run level 3. The repository may get corrupted due to various hardware issues, software bugs, disk write failures, etc.
Note: When svc.configd(1M), the Solaris Repository Daemon, is started, it does an integrity check of the smf(5) repository, stored in /etc/svc/repository.db. This
integrity check can fail due to a disk failure, the database file being corrupted either due to a hardware bug, a software bug, or an accidental overwrite. If the
integrity check fails, svc.configd will write a message to the console.
QUESTION 5
You want to display the IP address assignments of the network interfaces. Which command should you use?
A. ipadm show-if
B. ipadm show-addr
C. ipadm show-prop
D. ipadm show-addrprop
https://www.gratisexam.com/
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
'ipadm show-addr' displays all the configured addresses on the system.
Example:
# ipadm show-addr
ADDROBJ TYPE STATE ADDR
lo0/v4 static ok 127.0.0.1/8
lo0/v6 static ok ::1/128
QUESTION 6
The following image properties are displayed on your system:
Which two options describe the boot environment policy property that is currently set for this image?
A. All package operations are performed in a new BE set as active on the next boot.
B. Do not create a new BE. The install, update, uninstall, or revert operation is not performed if a new BE is required.
C. If a BE is created, do not set it as the active BE on the next boot
https://www.gratisexam.com/
D. A reboot is required for all package operations
E. A reboot is not required after a package operation.
F. For package operations that require a reboot, this policy creates a new BE set as active on the next boot.
Correct Answer: DF
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Image properties described below.
* be-policy
Specifies when a boot environment is created during packaging operations. The following values are allowed:
/ default
Apply the default BE creation policy: create-backup.
/ always-new (D, F)
Require a reboot for all package operations (D) by performing them in a new BE set as active on the next boot (F). A backup BE is not created unless explicitly
requested.
This policy is the safest, but is more strict than most sites need since no packages can be added without a reboot.
QUESTION 7
dbzone is currently running on your server.
Which two methods would you use to safely and cleanly shut down dbzone and all of its applications?
Correct Answer: DE
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://www.gratisexam.com/
D: zoneadm halt command halts the specified zones. halt bypasses running the shutdown scripts inside the zone. It also removes run time resources of the zone.
E: Use: zlogin zone shutdown
to cleanly shutdown the zone by running the shutdown scripts.
QUESTION 8
View the Exhibit to see the information taken from the installation log file.
Based on the information presented in the Exhibit, which two options describe the state of the system when the server is booted for the first time after the
installation is complete?
https://www.gratisexam.com/
C. You cannot log in from the console as root. You must first log in as a user and then su to root account.
D. The root user can log in from the console login.
E. You will be prompted to configure the network interface after the initial login.
Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 9
In order to display the IP addresses of network interfaces, what command would you use?
A. dladm
B. ipconfig
C. sves
D. ipadm
E. ipaddr
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
'ipadm show-addr' displays all the configured addresses on the system.
Example:
# ipadm show-addr
ADDROBJ TYPE STATE ADDR
lo0/v4 static ok 127.0.0.1/8
lo0/v6 static ok ::1/128
QUESTION 10
The su command by default makes an entry into the log file for every su command attempt. The following is a single line from the file:
https://www.gratisexam.com/
https://www.gratisexam.com/
A. unsuccessful attempt
B. successful attempt
C. The attempt was from a pseudo terminal, and not the console.
D. The attempt was from a user that is in the adm group, same as root.
E. Time zone is not set.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
The sulog file, /var/adm/sulog, is a log containing all attempts (whether successful or not) of the su command. An entry is added to the sulog file every time the su
command is executed. The fields in sulog are: date, time, successful (+) or unsuccessful (-), port, user executing the su command, and user being switched to. In
the preceding example, all su attempts were successful, except for the attempt on 2/23 at 20:51, when user pete unsuccessfully attempted to su to user root.
Look for entries where an unauthorized user has used the command inappropriately. The following entry shows a successful (indicated by +) su from user userid to
root.
QUESTION 11
A user brian is configured to use the bash shell. His home directory is /export/home/brian, and contains a .profile and a .bashrc file.
In the -profile, there are these lines:
genius =ritchie
export genius
https://www.gratisexam.com/
genius=thompson
export genius
When brian logs in and asks for the value of genius, what will he find, and why?
A. genius will be ritchie, because that was the value exported in .profile.
B. genius will be kernighan, because .bashrc executes after .profile.
C. genius will be ritchie because variable settings in .profile take precedence over variable settings in .bashrc.
D. genius will be ritchie because .profile executes after .bashrc.
E. genius will be thompson because /etc/profile system settings always override local settings.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 12
Consider the following commands:
What is displayed when this sequence of commands is executed using the bash shell?
A. Hello, world
B. cat: cannot open file1: No such file or directory Hello, world
C. cat: cannot open file1: No such file or directory
D. bash: syntax error near unexpected token '| |'
E. bash: syntax error broker pipe
Correct Answer: B
Section: (none)
Explanation
https://www.gratisexam.com/
Explanation/Reference:
QUESTION 13
You need to know the IP address configured on interface net3, and that the interface is up. Which command confirms these?
A. ipadm show-if
B. ipadm up-addr
C. ipadm show-addr
D. ipadm enable-if
E. ipadm refresh-addr
F. ipadm show-addrprop
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Show address information, either for the given addrobj or all the address objects configured on the specified interface, including the address objects that are only in
the persistent configuration.
Example:
# ipadm show-addr
ADDROBJ TYPE STATE ADDR
lo0/v4 static ok 127.0.0.1/8
lo0/v6 static ok ::1/128
QUESTION 14
You start to execute a program by using the following command:
~/bigscript &
You then determine that the process is not behaving as expected, and decide that you need to terminate the process.
Based on the information shown below, what is the process number you should terminate?
https://www.gratisexam.com/
A. 15163
B. 15156
C. 15166
D. 15165
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
From the output exhibit we can deduce that the shell has id 15156.
It has spawned three subprocesses:
grep: id 15166
ps –aef 15165
The remaining 15163 must be the subshell (see note below).
This is the id of the process which should be terminated.
QUESTION 15
You have installed the SMF notification framework to monitor services. Which command is used to set up the notifications for a particular service?
A. svccfg
B. svcadm
C. setnotify
D. smtp-notify
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
https://www.gratisexam.com/
Explanation:
How to Set Up Email Notification of SMF Transition Events
This procedure causes the system to generate an email notification each time one of the services or a selected service has a change in state. You can choose to
use either SMTP or SNMP. Normally, you would only select SNMP if you already have SNMP configured for some other reason.
By default, SNMP traps are sent on maintenance transitions. If you use SNMP for monitoring, you can configure additional traps for other state transitions.
1. Become an administrator or assume a role that includes the Service Management rights profile.'
2. Set notification parameters.
Example 1:
The following command creates a notification that sends email when transactions go into the maintenance state.
# /usr/sbin/svccfg setnotify -g maintenance mailto:sysadmins@example.com
Example 2:
The following command creates a notification that sends email when the switch service goes into the online state.
Note: The svccfg command manipulates data in the service configuration repository. svccfg can be invoked interactively, with an individual subcommand, or by
specifying a command file that contains a series of subcommands.
Changes made to an existing service in the repository typically do not take effect for that service until the next time the service instance is refreshed.
QUESTION 16
User jack logs in to host Solaris and executes the following command sequence:
A. User jack can edit testfile because he has read and write permissions at the group level.
B. User jack can use cat to output the contents of testfile because he has read permission as the file owner.
C. User jill can change the permissions of testfile because she has write permission for the file at the group level.
D. User jill can edit testfile because she has read and write permission at the group level.
E. User jack can change permissions for testfile because he is the owner of the file.
https://www.gratisexam.com/
F. User jack can change permissions for testfile because he has execute permission for the file.
Explanation/Reference:
QUESTION 17
The OpenBoot firmware controls the operation of the system before the operating system is loaded.
Explanation/Reference:
Explanation:
OpenBoot firmware is executed immediately after you turn on your system. The primary tasks of OpenBoot firmware are to:
* Test and initialize the system hardware (D)
* Determine the hardware configuration (D)
*Boot the operating system from either a mass storage device or from a network
*Provide interactive debugging facilities for testing hardware and software
https://www.gratisexam.com/
Note: If auto-boot? is true, the system will boot from either the default boot device or from the diagnostic boot device depending on whether OpenBoot is in
diagnostic mode. (C)
QUESTION 18
Which two options are accurate regarding the non-global zone console?
Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A: How to Log In to the Zone Console Use the zlogin command with the -C option and the name of the zone, for example, my-zone.
global# zlogin -C my-zone
C: To disconnect from a non-global zone, use one of the following methods.
* To exit the zone non-virtual console:
zonename# exit
* To disconnect from a zone virtual console, use the tilde (~) character and a period:
zonename# ~.
QUESTION 19
The default publisher on your system is:
You want to update the Oracle Solaris 11 environment on your system, but you are not able to connect this system to the Internet to access the default Oracle
repository. A repository has been created on your local network and is named http://server1.example.com.
Which command would you choose to connect your system to the local repository?
https://www.gratisexam.com/
D. pkg set-publisher to set the origin for the publisher
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Solaris 11 Express makes it pretty easy to set up a local copy of the repository.
A common reason folks need access to a local repository is because their system is not connected to the Internet.
Tthe pkg set-publisher command can be used to for example add a publisher or to enable or disable a publisher.
Use the -d option to disable a publisher. The preferred publisher cannot be disabled. A disabled publisher is not used in package operations such as list and install.
You can modify the properties of a disabled publishers.
Use the -e option to enable a publisher.
# pkg set-publisher -d example2.com
QUESTION 20
Your server has a ZFS storage pool that is configured as follows:
https://www.gratisexam.com/
The following partition scheme is used for every disk drive in pool1:
Correct Answer: AE
Section: (none)
https://www.gratisexam.com/
Explanation
Explanation/Reference:
QUESTION 21
You enter dladm show-phys, which provides the following output:
https://www.gratisexam.com/
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
According to the exhibit the interface already exists.
The command ipadm create-ip net3 is supposed to create a new interface net3.
QUESTION 22
https://www.gratisexam.com/
Choose three options that describe the features associated with a Live Media installation.
A. does not allow the root user to log in to the system directly from the console (or any terminal)
B. provides a "hands free" installation
C. installs the desktop based packages
D. can be used to install only x86 platforms
E. installs the server-based set of packages only
F. allows both automatic and manual configuration of the network
G. installs both the server-based and desktop-based package
Explanation/Reference:
Explanation:
The graphical installer is officially known as the "Live Media." This means that Oracle Solaris can be booted into RAM, causing zero impact on your existing
operating system. After it is loaded, you are free to experiment with Oracle Solaris to determine whether it is something you would like to install to your system.
You can download Oracle Solaris 11 Live Media for x86, which is an approximately 800 MB image file, and use a DVD burner to create the disk, or you can use the
ISO image directly in a virtual machine or through the Oracle Integrated Lights Out Manager (ILOM) Remote Console.
The Live Media is not intended for long-term use. For example, any changes that you make to the system are lost when the system is shut down. Therefore, the
next logical step is to install Oracle Solaris on the system, which the Live Media makes easy by placing an Install Oracle Solaris icon right on the desktop. But
before we head down that road, let's step back a bit and consider the installation options.
Note: The Live Media provides administrators with an opportunity to explore the Oracle Solaris 11 environment without installing it on a system. The system boots
off the media directly allowing administrators to start the installer should they choose to install it to a system.
QUESTION 23
In a fresh installation of Oracle Solaris 11, default datalinks are named with a genetic naming convention, and they increment as you add interfaces. What is the
default name?
A. eth#
B. net#
C. el000g#
D. lo#
E. nic#
https://www.gratisexam.com/
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
When you install this Oracle Solaris release on a system for the first time, Oracle Solaris automatically provides generic link names for all the system's physical
network devices. This name assignment uses the net# naming convention, where the # is the instance number. This instance number increments for each device,
for example, net0, net1, net2, and so on.
Note:
Network configuration in Oracle Solaris 11 includes
* Generic datalink name assignment – Generic names are automatically assigned to datalinks using the net0, net1, netN naming convention, depending on the total
number of network devices that are on the system
QUESTION 24
You are planning group names for a new system. You decide to use a numbering convention that includes the year and month the project began, to form the group
number and name for work associated with that project.
So, for example, a project targeted to begin in January, 2013 would have the number (name):
201301(Pr20l301)
Correct Answer: CD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
C: The Group ID (GID) field contains the group's numerical ID. GIDs can be assigned whole numbers between 100 and 60000.
D: Group names contain only lowercase characters and numbers.
QUESTION 25
The following line is from /etc/shadow in a default Solaris 11 Installation:
https://www.gratisexam.com/
jack: $5$9JFrt54$7JdwmO.F11Zt/ jFeeOhDmnw93LG7Gwd3Nd/cwCcNWFFg:0:15:30:3:::
Correct Answer: BE
Section: (none)
Explanation
Explanation/Reference:
Explanation:
From the content of the /etc/shadow file we get:
* username: jack
* encrypted password: $5$9JFrt54$7JdwmO.F11Zt/ jFeeOhDmnw93LG7Gwd3Nd/cwCcNWFFg
* Last password change (lastchanged): Days since Jan 1, 1970 that password was last changed: 0
* Minimum: The minimum number of days required between password changes i.e. the number of days left before the user is allowed to change his/her password:
15
Maximum: The maximum number of days the password is valid (after that user is forced to change his/her password): 30 Warn : The number of days before
password is to expire that user is warned that his/her password must be changed: 3
* Inactive : The number of days after password expires that account is disabled
* Expire : days since Jan 1, 1970 that account is disabled i.e. an absolute date specifying when the login may no longer be used
QUESTION 26
You are asked to determine user jack’s default login directory. Which command would provide you with useful information?
Correct Answer: A
Section: (none)
Explanation
https://www.gratisexam.com/
Explanation/Reference:
Explanation:
The /etc/passwd contains one entry per line for each user (or user account) of the system. All fields are separated by a colon (:) symbol. Total seven fields as
follows.
1. Username: It is used when user logs in. It should be between 1 and 32 characters in length.
2. Password: An x character indicates that encrypted password is stored in /etc/shadow file.
3. User ID (UID): Each user must be assigned a user ID (UID). UID 0 (zero) is reserved for root and UIDs 1-99 are reserved for other predefined accounts. Further
UID 100-999 are reserved by system for administrative and system accounts/groups.
4. Group ID (GID): The primary group ID (stored in /etc/group file)
5. User ID Info: The comment field. It allow you to add extra information about the users such as user's full name, phone number etc. This field use by finger
command.
6. Home directory: The absolute path to the directory the user will be in when they log in. If this directory does not exists then users directory becomes /
7. Command/shell: The absolute path of a command or shell (/bin/bash). Typically, this is a shell. Please note that it does not have to be a shell.
QUESTION 27
You need to install the solaris-desktop group package. Which command would you use to list the set of packages included in that software group?
A. pkg search
B. pkg info
C. pkginfo
D. pkg contents
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Use the pkg search command to search for packages whose data matches the specified pattern.
Like the pkg contents command, the pkg search command examines the contents of packages. While the pkg contents command returns the contents, the pkg
search command returns the names of packages that match the query.
QUESTION 28
Your system is assigned an IP address object 192.168.0.222/24. However, the net mask — expressed as four octets — is required. Which is the correct netmask?
A. 255.0.0.0
B. 255.255.0.0
C. 255.255.255.0
D. 255.255.255.24
https://www.gratisexam.com/
E. 255.255.255.255
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A 24-bit network mask is expressed as 255.255.255.0.
QUESTION 29
View the following information for a software package:
Which command would you use to display this information for a software package that is not currently installed on your system?
Correct Answer: B
Section: (none)
Explanation
https://www.gratisexam.com/
Explanation/Reference:
Explanation:
By default, the pkg info command only lists information about installed packages on the system; however, we can use a similar command to look up information
about uninstalled packages, as shown in here:
Example:
Listing Information About an Uninstalled Package
# pkg info -r php-52
Name: web/php-52
Summary: PHP Server 5.2
Description: PHP Server 5.2
Category: Development/PHP
State: Not Installed
Publisher: solaris
Version: 5.2.17
Build Release: 5.11
Branch: 0.175.0.0.0.1.530
Packaging Date: Wed Oct 12 14:01:41 2011
Size: 44.47 MB
FMRI: pkg://solaris/web/php-52@5.2.17, 5.11-0.175.0.0.0.1.530:20111012T140141Z
Note: pkg info command displays information about packages in a human-readable form.
Multiple FMRI patterns may be specified; with no patterns, display information on all installed packages in the image.
With -l, use the data available from locally installed packages.
This is the default.
With -r, retrieve the data from the repositories of the image's configured publishers. Note that you must specify one or more package patterns in this case.
QUESTION 30
user1 has a disk quota of 0.5 MB. The user attempts to run the following command on a file called .bigfile that is 495 KB in size:
cp bigfile /tmp
A. Yes. Quotas do not include any of the system files such as /tmp /swap.
B. Yes. The quota is set at the directory level, not the user level.
C. No. The command will fail because it will cause him to exceed his user quota.
D. No. A user cannot place files into the /tmp directory.
https://www.gratisexam.com/
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
UFS quotas enable system administrators to control the size of file systems. Quotas limit the amount of disk space and the number of inodes, which roughly
corresponds to the number of files, that individual users can acquire. For this reason, quotas are especially useful on the file systems where user home directories
reside. As a rule, the public and /tmp file systems usually do not benefit significantly by establishing quotas.
QUESTION 31
Review the storage pool information:
A. Shut the system down, replace disk c3t3d0, and boot the system. When the system is booted, execute the zpool clear pool1 command.
B. Shut the system down, replace disk c3t3d0, and boot the system. When the system is booted execute the zpool online pool1 command.
C. Shut the system down, replace disk c3t3d0, and boot the system. When the system is booted, execute the zpool replace pool1 c3t3d0 command.
D. Shut the system down, replace disk c3t3d0, and boot the system. When the system is booted, execute the zpool replace pool1 c3t3d0 c3t3d0 command.
Correct Answer: C
Section: (none)
https://www.gratisexam.com/
Explanation
Explanation/Reference:
Explanation:
You might need to replace a disk in the root pool for the following reasons:
The root pool is too small and you want to replace it with a larger disk
The root pool disk is failing. In a non-redundant pool, if the disk is failing so that the system won't boot, you'll need to boot from an alternate media, such as a CD or
the network, before you replace the root pool disk.
In a mirrored root pool configuration, you might be able to attempt a disk replacement without having to boot from alternate media. You can replace a failed disk by
using the zpool replace command.
Some hardware requires that you offline and unconfigure a disk before attempting the zpool replace operation to replace a failed disk.
For example:
# zpool offline rpool c1t0d0s0
# cfgadm -c unconfigure c1::dsk/c1t0d0
<Physically remove failed disk c1t0d0>
<Physically insert replacement disk c1t0d0>
# cfgadm -c configure c1::dsk/c1t0d0
# zpool replace rpool c1t0d0s0
# zpool online rpool c1t0d0s0
# zpool status rpool
<Let disk resilver before installing the boot blocks>
SPARC# installboot -F zfs /usr/platform/`uname -i`/lib/fs/zfs/bootblk /dev/rdsk/c1t0d0s0
x86# installgrub /boot/grub/stage1 /boot/grub/stage2 /dev/rdsk/c1t9d0s0
QUESTION 32
You are currently working in both your home directory and the system directory /tmp. You are switch back and forth with full path names. Which pair of cd
commands will provide you with a shortcut to switch between these two locations?
A. cd ~ and cd –
B. cd and cd.
C. cd ~ and cd
D. cd * and cd . .
Correct Answer: A
Section: (none)
Explanation
https://www.gratisexam.com/
Explanation/Reference:
Explanation:
In the Bourne Again, C, Korn, TC, and Z shells, the tilde (~) is used as a shortcut for specifying your home directory.
cd –
It's the command-line equivalent of the back button (takes you to the previous directory you were in).
Note:
To make certain that you are in your home directory, type the cd (change directory) command. This command moves you to your home (default) directory.
QUESTION 33
A user jack, using a bash shell, requests a directory listing as follows:
Explanation/Reference:
Explanation:
A: dir followed by a single letter.
C: dir followed by any characters ending with a.
D: dir followed by any characters, then character b, then one single character.
only dirabc matches
QUESTION 34
Which two are true about accounts, groups, and roles in the Solaris user database?
https://www.gratisexam.com/
A. All Solaris user accounts must have a unique UID number.
B. A Solaris account name may be any alphanumeric string, and can have a maximum length of 8 characters.
C. Account UID numbers 0-09 are system-reserved.
D. The GID for an account determines the default group ownership of new files created by that account.
E. The groups that an account is a member of are determined by the entries in the /etc/group file.
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A: Solaris uses a UID (User ID) to identify each user account. The UID is a unique number assigned to each user. It is usually assigned by the operating system
when the account is created.
B: In Solaris the account name can include any alphanumeric string (and . _ -). The maximum length is 8 characters.
QUESTION 35
Consider the following commands:
What is displayed when this sequence of commands is executed using the bash shell?
A. Hello, world
B. cat: cannot open file1
C. cat: cannot open file1Hello, world
D. cat: cannot open file1 Hello, World
E. bash: syntax error near unexpected token '&&'
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://www.gratisexam.com/
First line (rm file1) deletes/removes file1.
Second line captures the text into file2.
The first part of line 3 (cat file1) fails as the file1 does not exist.
The && (AND) operator will ensure that the third line fails. The result of line 3 will be the result of first part of line 3 (cat file1).
Note #1: A list is a sequence of one or more pipelines separated by one of the operators ‘;’, ‘&’, ‘&&’, or ‘||’, and optionally terminated by one of ‘;’, ‘&’, or a newline.
Of these list operators, ‘&&’ and ‘||’ have equal precedence, followed by ‘;’ and ‘&’, which have equal precedence.
AND and OR lists are sequences of one or more pipelines separated by the control operators ‘&&’ and ‘||’, respectively. AND and OR lists are executed with left
associativity.
command1 || command2
command2 is executed if, and only if, command1 returns a non-zero exit status.
The return status of AND and OR lists is the exit status of the last command executed in the list.
Note #2 (on exit status): Zero means command executed successfully, if exit status returns non-zero value then your command failed to execute.
QUESTION 36
To confirm the IP addresses and netmasks have been correctly configured on the network interfaces, which command(s) should you use?
A. ipadm show-if
B. ipadm show-nic
C. ipadm show-addr
D. ipadm show-addr
ipadm show-mask
E. ipadm show-ip
ipadm show-mask
F. ipadm show-config
Correct Answer: C
https://www.gratisexam.com/
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Show address information, either for the given addrobj or all the address objects configured on the specified interface, including the address objects that are only in
the persistent configuration.
Example:
# ipadm show-addr
ADDROBJ TYPE STATE ADDR
lo0/v4 static ok 127.0.0.1/8
lo0/v6 static ok ::1/128
QUESTION 37
Subnets are created by using________.
A. subnet
B. netmask
C. unicast
D. broadcast
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
The process of subnetting involves the separation of the network and subnet portion of an address from the host identifier. This is performed by a bitwise AND
operation between the IP address and the (sub)network prefix. The result yields the network address or prefix, and the remainder is the host identifier.
The routing prefix of an address is written in a form identical to that of the address itself. This is called the network mask, or netmask, of the address. For example,
a specification of the most-significant 18 bits of an IPv4 address, 11111111.11111111.11000000.00000000, is written as 255.255.192.0.
QUESTION 38
Which three options accurately describe Oracle Solaris 11 zones?
https://www.gratisexam.com/
D. can execute z£s and zpool commands (from a non-global zone)
E. are virtualized operating system environments, each with its own dedicated OS and kernel
F. are virtualized operating system environments, created with a single instance of the OS shared kernel
Explanation/Reference:
Explanation:
A: Zones can use Oracle Solaris 11 products and features such as the following:
Oracle Solaris ZFS encryption
Network virtualization and QoS
CIFS and NFS
C: Non-global zones cannot modify the system clock by default, but each zone can have a separate time zone setting.
F (not E): The Oracle Solaris Zones partitioning technology is used to virtualize operating system services and provide an isolated and secure environment for
running applications. A zone is a virtualized operating system environment created within a single instance of the Oracle Solaris operating system.
QUESTION 39
View the Exhibit and review the disk configuration.
https://www.gratisexam.com/
The following command is executed on the disk:
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
https://www.gratisexam.com/
QUESTION 40
You log in to the system as user1, then switch user to root by using the su - command. After entering the correct password, yon enter the following commands:
whoami;who am i;id
https://www.gratisexam.com/
A. Option A
B. Option B
C. Option C
D. Option D
Correct Answer: B
https://www.gratisexam.com/
Section: (none)
Explanation
Explanation/Reference:
Explanation:
* The whoami utility displays your effective user ID as a name.
Here this would be root.
* who am i
The command who shows who is logged on.
Here this would be:
user1 console Dec 30 20:20
* The id utility displays the user and group names and numeric IDs, of the calling process, to the standard output. If the real and effective IDs are different, both are
displayed, otherwise only the real ID is displayed.
Here this would be:
uid=0(root) gid=0(root)
Note:
Each UNIX proces has 3 UIDs associated to it. Superuser privilege is UID=0.
Real UID
--------
This is the UID of the user/process that created THIS process. It can be changed only if the running process has EUID=0.
Effective UID
-------------
This UID is used to evaluate privileges of the process to perform a particular action. EUID can be change either to RUID, or SUID if EUID!=0. If EUID=0, it can be
changed to anything.
Saved UID
---------
If the binary image file, that was launched has a Set-UID bit on, SUID will be the UID of the owner of the file. Otherwise, SUID will be the RUID.
QUESTION 41
Your server has a ZFS storage pool that is configured as follows:
https://www.gratisexam.com/
The server has two spare 146-GB disk drives: c3t5d0 c3t6d0
You need to add more space to the pool1 storage pool. Which command would add more mirrored storage to the pool1 storage pool?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 42
You attempted to reboot a system via the init command, however the system did not perform boot sequence into the Oracle Solaris Operating Environment. You are
presented with a prompt from the OpenBoot PROM. Which command would you enter, to boot the system from the default device?
Correct Answer: B
Section: (none)
Explanation
https://www.gratisexam.com/
Explanation/Reference:
Explanation:
Boot
With this form, boot loads and executes the program specified by the default boot arguments from the default boot device
QUESTION 43
You have a ZFS file system named /dbase/oral and you want to guarantee that 10 GB of storage space is available to that dataset for all data, snapshots, and
clones.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A ZFS reservation is an allocation of disk space from the pool that is guaranteed to be available to a dataset. As such, you cannot reserve disk space for a dataset
if that space is not currently available in the pool. The total amount of all outstanding, unconsumed reservations cannot exceed the amount of unused disk space in
the pool. ZFS reservations can be set and displayed by using the zfs set and zfs get commands. For example:
QUESTION 44
View the Exhibit.
https://www.gratisexam.com/
Which is true regarding the disk drive?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Installing a ZFS Root Pool
The installer searches for a disk based on a recommended size of approximately 13 GB.
QUESTION 45
User jack logs in to host solaris and then attempts to log in to host oracle using ssh. He receives the following error message:
The authenticity of host oracle (192.168.1.22) can't be established. RSA key fingerprint is 3B:23:a5:6d:ad:a5:76:83:9c:c3:c4:55:a5:18:98:a6
Are you sure you want to continue connecting (yes/no)?
A. The public host key supplied by solaria is not known to the host oracle.
https://www.gratisexam.com/
B. The error would not occur if the RSA key fingerprint shown in the error message was added to the /etc/ssh/known_hosts file on solaris.
C. The private host key supplied by oracle is not known to solaris.
D. If jack answers yes, the RSA public key for the host oracle will be added to the known_hosts file for the user jack.
E. The public host key supplied by oracle is not known to the host solaris.
Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
The fingerprints are used to guard against man in the middle attacks. Since ssh logins usually work over the internet (an insecure connection), someone could
hijack your connection. When you try to log into yourmachine.com, he could get "in the middle" and return your challenge as if he was yourmachine.com. That way,
he could get hold of your login password.
To make this attack harder, ssh stores the fingerprint of the server's public key on the first connection attempt. You will see a prompt like:
When you enter yes, ssh will add the fingerprint to your known_hosts file. you will see
Code:
Warning: Permanently added 'eisen, 137.43.366.64' (RSA) to the list of known hosts.
The next time you login, ssh will check whether the host key has changed. A changing host key usually indicates a man in the middle attack, and ssh refuses to
connect.
QUESTION 46
To help with your troubleshooting, you need to determine the version of the OBP. Which two commands will provide you with this information?
A. printenv
B. banner
C. .version
D. set-env
E. show-devs
F. value version
https://www.gratisexam.com/
Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
Explanation:
B: banner
Displays power-on banner.
The PROM displays the system banner. The following example shows a SPARCstation 2 banner. The banner for your SPARC system may be different.
Note: OBP-OpenBootProm is a firmware which is placed on the sun machine's prom chip.
It is a os independent user interface to deal with the sun machine's hardware components.
The user interface provides one or more commands to display system information.
QUESTION 47
You need to connect two nonglobal zones using a private virtual network.
Identify the network resources required in the global zone to accomplish this.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 48
You have installed an update to the gzip package and need to "undo" .ho update and return the package to its "as-delivered" condition. Which command would you
use?
https://www.gratisexam.com/
A. pkg undo
B. pkg revert
C. pkg fix
D. pkg uninstall
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Use the pkg revert command to restore files to their as-delivered condition.
QUESTION 49
To confirm the IP address and netmask have been correctly configured on the network interfaces which command should you use?
A. ipdilm show-if
B. ipadm show-nic
C. ipadm show-addr
D. ipadm show-ifconfig
E. ipadm show-addripadm show-mask
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Show address information, either for the given addrobj or all the address objects configured on the specified interface, including the address objects that are only in
the persistent configuration.
Example:
# ipadm show-addr
ADDROBJ TYPE STATE ADDR
lo0/v4 static ok 127.0.0.1/8
lo0/v6 static ok ::1/128
https://www.gratisexam.com/
QUESTION 50
You are the administrator of a system that a large number of developers work on. These developers crash the system, and their applications, on a regular basis.
What command would you use to configure where the core files are saved?
A. savecore
B. dumpadm
C. svcadm
D. proc
E. coreadm
Correct Answer: E
Section: (none)
Explanation
Explanation/Reference:
Explanation:
The coreadm command is used to specify the name and location of core files produced by abnormally-terminating processes.
QUESTION 51
Which option displays the result of running the zfs list command?
https://www.gratisexam.com/
A. Option A
B. Option B
C. Option C
D. Option D
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
The zfs list command provides an extensible mechanism for viewing and querying dataset information.
You can list basic dataset information by using the zfs list command with no options. This command displays the names of all datasets on the system and the
values of their used, available, referenced, and mountpoint properties. For more information about these properties, see Introducing ZFS Properties.
For example:
https://www.gratisexam.com/
# zfs list
NAME USED AVAIL REFER MOUNTPOINT
pool 476K 16.5G 21K /pool
pool/clone 18K 16.5G 18K /pool/clone
pool/home 296K 16.5G 19K /pool/home
pool/home/marks 277K 16.5G 277K /pool/home/marks
pool/home/marks@snap 0 - 277K -
pool/test 18K 16.5G 18K /test
QUESTION 52
Which network protocol provides connectionless, packet-oriented communication between applications?
A. TCP
B. UDP
C. IP
D. ICMP
E. NFS
F. IPSec
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
The User Datagram Protocol (UDP) is one of the core members of the Internet Protocol Suite, the set of network protocols used for the Internet. With UDP,
computer applications can send messages, in this case referred to as datagrams, to other hosts on an Internet Protocol (IP) network without requiring prior
communications to set up special transmission channels or data paths.
Compared to TCP, UDP is a simpler message-based connectionless protocol.
QUESTION 53
A datalink can best be described as______.
Correct Answer: D
https://www.gratisexam.com/
Section: (none)
Explanation
Explanation/Reference:
Explanation:
The command dladm is used to configure data-link interfaces in Sun Solaris. A configured data-link is represented in the system as interface that can be used for
TCP/IP. Each data-link relies on either a single network device or an link aggregation device to send & recieve packets.
Network interfaces provide the connection between the system and the network. These interfaces are configured over data links, which in turn correspond to
instances of hardware devices in the system.
In the current model of the network stack, interfaces and links on the software layer build on the devices in the hardware layer. More specifically, a hardware device
instance in the hardware layer has a corresponding link on the data-link layer and a configured interface on the interface layer. This one-to-one relationship among
the network device, its data link, and the IP interface is illustrated in the figure that follows.
https://www.gratisexam.com/
QUESTION 54
View the exhibit to inspect the file system configuration on your server.
https://www.gratisexam.com/
View the Exhibit to inspect the file system configuration on your server.
Your department's backup policy is to perform a full backup to a remote system disk on Saturday.
On Sunday through Friday, you are to perform a differential backup to the same remote system disk:
The server file systems must remain available at all times and can never be taken offline.
The backup must not only provide for the recovery of the most recent version of a file, but must also allow recovery of previous versions of a file created since
Saturday's full backup.
Following your company policy, which option describes a valid procedure for backing up the /data file system to a remote disk named /remote/backup?
https://www.gratisexam.com/
A. Option A
B. Option B
C. Option C
D. Option D
Correct Answer: C
Section: (none)
https://www.gratisexam.com/
Explanation
Explanation/Reference:
QUESTION 55
A user account must be a member of a primary group, and may also be a member of one or more secondary groups. What is the maximum total number of groups
that one user can concurrently belong to?
A. 15
B. 16
C. 17
D. 63
E. 64
F. 65
G. The number of groups one user can concurrently belong to is unlimited in Solaris 11.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Each user belongs to a group that is referred to as the user’s primary group. The GID number, located in the user’s account entry within the /etc/passwd file,
specifies the user’s primary group.
Each user can also belong to up to 15 additional groups, known as secondary groups. In the /etc/group file, you can add users to group entries, thus establishing
the user’s secondary group affiliations.
Note (4 PSARC/2009/542):
his project proposes changing the maximum value for NGROUPS_MAX from 32 to 1024 by changing the definition of NGROUPS_UMAX from 32 to 1024.
The use for a larger number of groups is described in CR 4088757, particular in the case of Samba servers and ADS clients; the Samba servers map every SID to
a Unix group. Users with more than 32 groups SIDs are common. We've seen reports varying from
"64 is enough", "128 is absolutely enough" and "we've users with more 190 group SIDS).
https://www.gratisexam.com/
Tru64 / OSF/1 32
IBM AIX 5.2 64
IBM AIX 5.3 ... 6.1 128
OpenBSD, NetBSD, FreeBSD, Darwin (Mac OS X) 16
Sun Solaris 7, 8, 9, 10 16 (can vary from 0-32)
HP-UX 20
IRIX 16 (can vary from 0-32)
Plan 9 from Bell Labs 32
Minix 3 0 (Minix-vmd: 16)
QNX 6.4 8
QUESTION 56
Identify three differences between the shutdown and init commands.
Explanation/Reference:
QUESTION 57
View the exhibit.
https://www.gratisexam.com/
The configuration information in the exhibit is displayed on your system immediately after installing the OS.
Choose the option that describes the selection made during the Installation of the OS to obtain this configuration.
A. The automatic network configuration option was chosen during the installation of the OS.
B. The manual network configuration option was chosen during the installation of the OS.
C. The network was not configured during the installation of the OS.
D. The DHCP network configuration option was chosen during the Installation of the OS.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
There are two ways to configure the network configuration: automatic or manual.
In the exhibit we see that DHCP has been used used. This indicates an automatic network configuration.
QUESTION 58
Which command would you use to determine which package group is installed on your system?
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
The pkg info command provides detailed information about a particular IPS package.
Note: The pkginfo command does the same for any SVR4 packages you may have installed on the same system.
https://www.gratisexam.com/
Description: P7zip is a unix port of the 7-Zip utility. It has support for numerous compression algorithms, including LZMA and LZMA2, as well as for various archive
and compression file formats, including 7z, xz, bzip2, gzip, tar, zip (read-write) and cab, cpio, deb, lzh, rar, and rpm (read-only).
Category: System/Core
State: Installed
Publisher: solaris
Version: 9.20.1
Build Release: 5.11
Branch: 0.175.0.0.0.2.537
Packaging Date: Wed Oct 19 09:13:22 2011
Size: 6.73 MB
FMRI: pkg://solaris/compress/p7zip@9.20.1, 5.11-0.175.0.0.0.2.537:20111019T091322Z
QUESTION 59
Oracle Solaris 11 kernel encounters a fatal error, and it results in a system panic.
A. a.out
B. objdump
C. core dump
D. tape dump
E. crash dump
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A kernel panic is a type of error that occurs when the core (kernel) of an operating system receives an instruction in an unexpected format or when it fails to handle
properly. A kernel panic can also follow when the operating system can’t recover from a different type of error. A kernel panic can be caused by damaged or
incompatible software or, more rarely, damaged or incompatible hardware.
When a server kernel panics it abruptly halts all normal system operations. Usually, a kernel process named panic() outputs an error message to the console and
stores debugging information in nonvolitile memory to be written to a crash log file upon restarting the computer. Saving the memory contents of the core and
associated debugging information is called a “core dump.”
QUESTION 60
The following information is displayed for the svc:/network/ssh service:
https://www.gratisexam.com/
Which describes the minimum set of commands to be executed to bring the svc: /network/ssh: default service back online?
https://www.gratisexam.com/
A. Option A
B. Option B
C. Option C
D. Option D
E. Option E
F. Option F
G. Option G
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 61
You are the administrator for a group of shell script developers. They use vi, and have asked you to make their scripts automatically executable when they save
their files.
How can this be accomplished?
https://www.gratisexam.com/
A. Enter set –o vi on the command line, or include it in each user's startup script.
B. Enter umask –s on the command line, or include it in each user's startup script.
C. Enter umask 000 on the command line, or include it in each user's startup script.
D. Enter umask 777 on the command line, or include it in each user's startup script.
E. It is not possible to automatically set the execute bit on with the umask setting, or vi option.
F. Enter umask 766 the command line, or include it in the global startup script for the default shell.
Correct Answer: E
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Unlike DOS, which uses the file extension to determine if a file is executable or not, UNIX relies on file permissions.
The value assigned by umask is subtracted from the default.
User's file creation mask. umask sets an environment variable which automatically sets file permissions on newly created files. i.e. it will set the shell process's file
creation mask to mode.
QUESTION 62
You have connected a new printer at a fixed IP address.
It appears to work correctly most of the time, but at other times does not respond.
You suspect that the assigned address may not be unique within the network.
What command will be useful to confirm this?
A. arp
B. netstat
C. ipadm show-if
D. dladm show-addr
E. ipadm show-addr
Correct Answer: E
Section: (none)
Explanation
Explanation/Reference:
https://www.gratisexam.com/
Explanation:
'ipadm show-addr' displays all the configured addresses on the system.
Example:
# ipadm show-addr
ADDROBJ TYPE STATE ADDR
lo0/v4 static ok 127.0.0.1/8
lo0/v6 static ok ::1/128
QUESTION 63
Your server has a ZFS storage pool that is configured as follows:
The server has two spate 140-GB disk drives: c3t5d0 c3t6d0
https://www.gratisexam.com/
Correct Answer: A
https://www.gratisexam.com/
Section: (none)
Explanation
Explanation/Reference:
Explanation:
You can convert a non-redundant storage pool into a redundant storage pool by using the zpool attach command.
Attaches new_device to an existing zpool device. The existing device cannot be part of a raidz configuration. If device is not currently part of a mirrored
configuration, device automatically transforms into a two-way mirror of device and new_device. If device is part of a two-way mirror, attaching new_device creates a
three-way mirror, and so on. In either case, new_device begins to resilver immediately.
QUESTION 64
The storage pool configuration on your server is:
You back up the /pool1/data file system, creating a snapshot and copying that snapshot to tape (/dev/rmt/0). You perform a full backup on Sunday night and
Incremental backups on Monday through Saturday night at 11:00 pm. Each incremental backup will copy only the data that has been modified since the Sunday
backup was started.
On Thursday, at 10:00 am, you had a disk failure. You replaced the disk drive (c4t0d0). You created pool (pool1) on that disk.
Which option would you select to restore the data in the /pool1/data file system?
A. zfs create pool1/dataLoad the Monday tape and enter:zfs recv pool1/data < /dev/rmt/0Load the Wednesday tape and enter:zfs recv –F pool1/data < /dev/rmt/0
B. Load the Sunday tape and restore the Sunday snapshot:zfs recv pooll/data < /dev/rmt/0zfs rollback pool1/data@monLoad the Wednesday tape and restore the
Wednesday snapshot:zfs recv –i pooll/data < /dev/rmt/0zfs rollback pool1/data@wed
C. zfs create pooll/dataLoad the Wednesday tape and enter:zfs recv -F pool1/data < /dev/rmt/0
D. Load the Sunday tape and enter:zfs recv pool1/data < /dev/rmt/0Load the Wednesday tape and enter:* commands missing*
Correct Answer: D
Section: (none)
Explanation
https://www.gratisexam.com/
Explanation/Reference:
Explanation:
First the full backup must be restored. This would be the Sunday backup.
Then the last incremental backup must be restored. This would be the Wednesday backup.
Before restoring the Wednesday incremental file system snapshot, the most recent snapshot must first be rolled back.
QUESTION 65
In Oracle Solaris 11, where is the Oracle default repository located?
A. /var/spool/pkg
B. http://localhost/solaris
C. http://pkg.oracle.com/solaris/release
D. http://www.oracle.com/Solaris/download
E. /cdrom/cdrom0
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
REPOSITORY DESCRIPTION
* http://pkg.oracle.com/solaris/release
The default repository for new Oracle Solaris 11 users. This repository receives updates for each new release of Oracle Solaris. Significant bug fixes, security
updates, and new software may be provided at any time for users to install at Oracle's discretion.
*https://pkg.oracle.com/solaris/support
Provides bug fixes and updates. Accessible with a current support contract from Oracle.
* https://pkg.oracle.com/solaris/dev Provides the latest development updates. Accessible to users enrolled in the Oracle Solaris 11 Platinum Customer Program and
approved Oracle Partners.
QUESTION 66
Which two are implemented using the Internet Control Message Protocol (ICMP)?
A. ping
B. DHCP
C. HTTP
https://www.gratisexam.com/
D. telnet
E. syslog
F. traceroute
Correct Answer: AF
Section: (none)
Explanation
Explanation/Reference:
Explanation:
The Internet Control Message Protocol (ICMP) is one of the core protocols of the Internet Protocol Suite.
ICMP differs from transport protocols such as TCP and UDP in that it is not typically used to exchange data between systems, nor is it regularly employed by end-
user network applications (with the exception of some diagnostic tools like ping and traceroute).
QUESTION 67
Review the information taken from your server:
Which option describes the command used to create these snapshots of the root file system?
A. Option A
https://www.gratisexam.com/
B. Option B
C. Option C
D. Option D
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
zfs snapshot [-r] [-o property=value] ... filesystem@snapname|volume@snapname
Creates a snapshot with the given name. All previous modifications by successful system calls to the file system are part of the snapshot. See the “Snapshots”
section for details.
-r
Recursively create snapshots of all descendent datasets. Snapshots are taken atomically, so that all recursive snapshots correspond to the same moment in time.
QUESTION 68
You notice that the /var/.dm/messages file has become very large. Typically, this is managed by a crontab entry. Which entry should be in the root's crontab file?
A. 10 3 * * * /usr/adm/messages
B. 10 3 * * * /usr/sbin/logadm
C. 10 3 * * * /usr/sbin/syslogrotate
D. 10 3 * * * /usi/sbin/logrotate
E. 10 3 * * * /usr/sbin/messages
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
This example shows how to display the default root crontab file.
$ suPassword:
# crontab -l
#ident "@(#)root 1.19 98/07/06 SMI" /* SVr4.0 1.1.3.1 */
#
# The root crontab should be used to perform accounting data collection.
https://www.gratisexam.com/
#
#
10 3 * * * /usr/sbin/logadm
15 3 * * 0 /usr/lib/fs/nfs/nfsfind
30 3 * * * [ -x /usr/lib/gss/gsscred_clean ] && /usr/lib/gss/gsscred_clean
#10 3 * * * /usr/lib/krb5/kprop_script ___slave_kdcs___
QUESTION 69
User1 is attempting to run the following command:
cp bigfile verybig
Your initial troubleshooting shows that the df -h command indicates the account is at 100% capacity. What command would you use to determine how much disk
space the user has available?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
ZFS quotas can be set and displayed by using the zfs set and zfs get commands. In the following example, a quota of 10 Gbytes is set on tank/home/bonwick.
QUESTION 70
Select the packet type that identifies members of the group and sends information to all the network interfaces in that group.
A. Unicast
B. Multicast
https://www.gratisexam.com/
C. Broadcast
D. Bayesian
E. Quality of Service Priority
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
IPv6 defines three address types:
unicast
Identifies an interface of an individual node.
multicast
Identifies a group of interfaces, usually on different nodes. Packets that are sent to the multicast address go to all members of the multicast group.
anycast
Identifies a group of interfaces, usually on different nodes. Packets that are sent to the anycast address go to the anycast group member node that is physically
closest to the sender.
QUESTION 71
The current ZFS configuration on your server is:
You need to create a new file system named /data2. /data2 will be a copy of the /data file system.
You need to conserve disk space on this server whenever possible.
Which option should you choose to create /data2, which will be a read writeable copy of the /data file system, while minimizing the amount of total disk space used
in pool1?
https://www.gratisexam.com/
Correct Answer: E
Section: (none)
Explanation
Explanation/Reference:
Explanation:
zfs snapshot [-r] [-o property=value] ... filesystem@snapname|volume@snapname
Creates a snapshot with the given name. All previous modifications by successful system calls to the file system are part of the snapshot
zfs clone [-p] [-o property=value] ... snapshot filesystem|volume
Creates a clone of the given snapshot.
Note:
Because snapshots are fast and low overhead, they can be used extensively without great concern for system performance or disk use .
With ZFS you can not only create snapshot but create a clone of a snapshot.
A clone is a writable volume or file system whose initial contents are the same as the dataset from which it was created. As with snapshots, creating a clone is
nearly instantaneous, and initially consumes no additional disk space. In addition, you can snapshot a clone.
A clone is a writable volume or file system whose initial contents are the same as the original dataset. As with snapshots, creating a clone is nearly instantaneous,
and initially consumes no additional space.
Clones can only be created from a snapshot. When a snapshot is cloned, it creates an implicit dependency between the parent and child.
QUESTION 72
You wish to troubleshoot some issues that you are having on the system. You want to monitor the /var/adm/messages file in real time. Which command would you
use to do this?
A. head
B. tail
C. cat
D. file
E. test
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
tail is a program on Unix and Unix-like systems used to display the last few lines of a text file or piped data.
https://www.gratisexam.com/
By default, tail will print the last 10 lines of its input to the standard output. With command line options the number of lines printed and the printing units (lines,
blocks or bytes) may be changed. The following example shows the last 20 lines of filename:
tail -n 20 filename
QUESTION 73
Which two options describe how to override the default boot behavior of an Oracle Solaris 11 SPARC system to boot the system to the single-user milestone?
Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
By default, Solaris will boot to the pseudo milestone “all” and start all services. This behaviour can be changed at boot time using either “-s” to reach single-user, or
the new SMF option “-m milestone=XXX” (see kernel(1M) for a list of the bootable milestones) to select an explicit milestone.
with the difference being that the former is a lot less to type and is what most SysAdmins will be familiar with.
QUESTION 74
In a default standalone installation of Oracle Solaris 11, what is the default minimum length in characters of a user password, and where is the minimum password
length defined?
https://www.gratisexam.com/
E. Default minimum length is 8, and is defined in /usr/sadm/defadduser.
F. Default minimum length is 6, and is defined in /usr/sadm/defadduser.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
By default, the passwd command assumes a minimum length of six characters. You can use the PASSLENGTH default in the /etc/defaults/passwd files to change
that by setting the minimum number of characters that a user's password must contain to some other number.
QUESTION 75
Which four can the SMF notification framework be configured to monitor and report?
Explanation/Reference:
Explanation:
Note 1: State Transition Sets are defined as:
to<state>
Set of all transitions that have <state> as the final state of the transition.
form-<state>
Set of all transitions that have <state> as the initial state of the transition.
<state>
Set of all transitions that have <state> as the initial state of the transitional.
Set of all transitions. (A)
https://www.gratisexam.com/
Valid values of state are maintenance, offline (G), disabled (E), online and degraded. An example of a transitions set definition: maintenance, from-online, to-
degraded.
F: In this context, events is a comma separated list of SMF state transition sets or a comma separated list of FMA (Fault Management Architecture) event classes.
events cannot have a mix of SMF state transition sets and FMA event classes. For convenience, the tags problem- {diagnosed, updated, repaired, resolved}
describe the lifecycle of a problem diagnosed by the FMA subsystem - from initial diagnosis to interim updates and finally problem closure.
Note 2:
SMF allows notification by using SNMP or SMTP of state transitions. It publishes Information Events for state transitions which are consumed by notification
daemons like snmp-notify(1M) and smtp-notify(1M). SMF state transitions of disabled services do not generate notifications unless the final state for the transition is
disabled and there exist notification parameters for that transition. Notification is not be generated for transitions that have the same initial and final state.
QUESTION 76
You have been asked to do an orderly shutdown on a process with a PID of 1234, with the kill command.
A. kill -2 1234
B. kill -15 1234
C. kill -9 1234
D. kill -1 1234
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
On POSIX-compliant platforms, SIGTERM is the signal sent to a process to request its termination. The symbolic constant for SIGTERM is defined in the header
file signal.h. Symbolic signal names are used because signal numbers can vary across platforms, however on the vast majority of systems, SIGTERM is signal #15.
SIGTERM is the default signal sent to a process by the kill or killall commands. It causes the termination of a process, but unlike the SIGKILL signal, it can be
caught and interpreted (or ignored) by the process. Therefore, SIGTERM is akin to asking a process to terminate nicely, allowing cleanup and closure of files. For
this reason, on many Unix systems during shutdown, init issues SIGTERM to all processes that are not essential to powering off, waits a few seconds, and then
issues SIGKILL to forcibly terminate any such processes that remain.
QUESTION 77
user1, while in his home directory, is attempting to run the following command in his home directory: cp bigfile verybig
https://www.gratisexam.com/
The system displays the following error:
cp: cannot create verybig: Disc quota exceeded
Your initial troubleshooting shows that the df -h command indicates he is at 100% capacity. What command would you use to increase the disk space available to
the user?
Correct Answer: E
Section: (none)
Explanation
Explanation/Reference:
Explanation:
ZFS quotas can be set and displayed by using the zfs set and zfs get commands.
We can remove the quota restriction by setting to quota to none.
QUESTION 78
You need to install the gzip software package on your system. Which command would you use to find the software package in the configured repository?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Use the pkg search command to search for packages whose data matches the specified pattern.
Like the pkg contents command, the pkg search command examines the contents of packages. While the pkg contents command returns the contents, the pkg
search command returns the names of packages that match the query.
https://www.gratisexam.com/
QUESTION 79
What is the result of executing the following command?
svcs -d svc:/network/ssh:default
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
The svcs command displays information about service instances as recorded in the service configuration repository.
-d Lists the services or service instances upon which the given service instances depend.
QUESTION 80
Which two accurately describe the Solaris IPS repository?
Correct Answer: BE
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Image Packaging System (IPS) is a new network based package management system included in Oracle Solaris 11. It provides a framework for complete software
lifecycle management such as installation, upgrade and removal of software packages. IPS also enables you to create your own software packages, create and
manage package repositories, and mirror existing package repositories.
https://www.gratisexam.com/
Oracle Solaris software is distributed in IPS packages. IPS packages are stored in IPS package repositories, which are populated by IPS publishers.
E: The following command displays property information about the local repository.
When more than one publisher's packages are present and no publisher is specified in the package name in the pkg command
QUESTION 81
Which operation will fail if the DNS configuration is incorrect?
A. domainname
B. ping localhost.
C. ping 192.168.1.1
D. ping 23.45.82.174
E. ping www.oracle.com.
F. cat /etc/resolv.conf
Correct Answer: E
Section: (none)
Explanation
Explanation/Reference:
Explanation:
www.oracle.com would have to be resolved to an IP name by the domain name service.
QUESTION 82
You have a process called bigscript, and you need to know the PID number for this process.
A. pkill bigscript
https://www.gratisexam.com/
B. ps bigscript
C. pgrep bigscript
D. prstat bigscript
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Pgrep takes a process name and return a PID.
Note: pgrep looks through the currently running processes and lists the process IDs which matches the selection criteria to stdout. All the criteria have to match. For
example, pgrep -u root sshd will only list the processes called sshd AND owned by root.
Incorrec answers:
ps bigscript: You can’t pass a name to ps, it interprets it as arguments.
QUESTION 83
Server A, Server B, and Server C are connected to the same network switch and are on the sari Each server has a single network interface, net0.
You received a tech support call that Server B has lost network connectivity. Your troubleshooting has discovered:
https://www.gratisexam.com/
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Check the physical connection.
QUESTION 84
View the Exhibit.
After Installing the OS, you need to verify the network interface information. Which command was used to display the network interface information in the exhibit?
A. ifconfiq –a
B. ipadm show-addr
C. svcs –1 network/physical
D. netstat –a
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
'ipadm show-addr' displays all the configured addresses on the system.
Example:
# ipadm show-addr
https://www.gratisexam.com/
ADDROBJ TYPE STATE ADDR
lo0/v4 static ok 127.0.0.1/8
lo0/v6 static ok ::1/128
QUESTION 85
You suspect a problem with the oponldap package and want to make sure that the files have not be modified or otherwise tampered with.
Which command would validate all of the files contained in the openldap package and report any problems?
A. pkgchk openldap
B. pkginfo openldap
C. pkg contents openldap
D. pkg verify openldap
E. pkg set-property signature-policy verify
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
pkgchk checks the accuracy of installed files or, by using the -l option, displays information about package files. pkgchk checks the integrity of directory structures
and files. Discrepancies are written to standard error along with a detailed explanation of the problem.
QUESTION 86
You are installing the Solaris 11 Operation System by using the Text Installer. A panel prompts you to create a root password and a user account.
Which four describe your options for completing this panel of the Installation?
https://www.gratisexam.com/
https://www.gratisexam.com/
E. If you provide a username, that user is given root privileges.
F. If you provide a username, root is an account rather than a role and is set to expire immediately.
G. If you do not provide a username, root is an account rather than a role and is set to expire immediately.
Explanation/Reference:
Explanation:
A: You are not required to create a user account.
B: You must create a root password.
D: If you create a user account in this panel, you need to provide both the user's password and a root password.
In this case, root will be a role assigned to the user.
G: If you do not create a user account, you still need to provide a root password.
In this case, root will be a regular user.
QUESTION 87
Which option would you choose to display the kernel revision level for your operating system?
A. cat. /etc/release
B. uname -a
C. pkg info kernel
D. banner (issued from the OpenBoot Prom)
E. cat /etc/motd
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 88
After installing the OS, the following network configuration information is displayed from the system:
https://www.gratisexam.com/
Which option describes the state of this server?
A. The automatic network configuration option was chosen during the installation of the OS.
B. The manual network configuration option was chosen during the installation of the OS.
C. The network was not configured during the installation of the OS.
D. The network interface is configured with a static IP address.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Only the loopback addresses are configured. No IP address is configured.
QUESTION 89
The /etc/hosts file can be best described as______.
Correct Answer: E
Section: (none)
Explanation
Explanation/Reference:
Explanation:
As your machine gets started, it will need to know the mapping of some hostnames to IP addresses before DNS can be referenced. This mapping is kept in the /etc/
hosts file. In the absence of a name server, any network program on your system consults this file to determine the IP address that corresponds to a host name.
https://www.gratisexam.com/
QUESTION 90
Review the boot environment information displayed on your system:
A. It cannot be destroyed.
B. It cannot be activated.
C. It cannot be renamed.
D. You can create a snapshot of it.
E. It is activated but unbootable.
F. It has been deleted and will be removed at the next reboot.
Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
Explanation:
If the boot environment is unbootable, it is marked with an exclamation point (!) in the Active column in the beadm list output.
QUESTION 91
You are attempting to troubleshoot an event that should have made an entry into the messages log. This event happened about two weeks ago. Which file should
you look at first?
A. /var/adm/messages
B. /var/adm/messages.0
https://www.gratisexam.com/
C. /var /adm/messagas.1
D. /var/adm/messages.2
E. /var/adm/messages.3
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
The /var/adm/messages is the file to which all the messages printed on the console are logged to by the Operating System. This helps to track back check the
console messages to troubleshoot any issues on the system.
The /var/adm/messages file monitored and managed by newsyslog and its configuration file is /usr/lib/newsyslog.
This script runs as the roots cron job everyday, checks the /var/adm/messages file and copies/moves it to /var/adm/messages.0, 1, 2, 3, 4, 5, 6, 7. In other words, it
does the Log Rotation for the /var/adm/messages.
In an event the /var file system is running out of space, these files needs to checked and can be removed (not the actual /var/adm/messages itself) to free up space
on the file system.
However, care has to be taken, if you decide to empty the /var/adm/messages itself for any reason. This process is called Truncation.
QUESTION 92
Review the boot environments displayed on your system:
https://www.gratisexam.com/
D. It is unbootable.
E. It is active now and on reboot.
F. It has been removed and will no longer be available after the next reboot.
Correct Answer: E
Section: (none)
Explanation
Explanation/Reference:
Explanation:
In the below output, NR (now running) means the BE is active now and will be the active BE on reboot.
Example:
Display your existing BE information.
# beadm list
BE Active Mountpoint Space Policy Created
-- ------ ---------- ----- ------ -------
solaris NR / 12.24G static 2011-10-04 09:42
QUESTION 93
On localSYS, your SPARC based server, you back up the root file system with recursive snapshots of the root pool. The snapshots are stored on a remote NTS file
system.
This information describes the remote system where the snapshots are stored:
Disk c0t0d0 has failed in your root pool and has been replaced. The disk has already been part< and labeled and now you need to restore the root file system.
Which procedure would you follow to restore the ZFS root file system on localSYS?
A. boot cdrom -smount -f nfs backup_server:/rpool/snaps /rmtzpool create rpool c0t0d0s0cat /mnt/rpool.1202 | zfs receive -Fdu rpoolzpool set bootfs=rpool/ROOT/
solaris rpoolRecreate swap and dump devices.Reinstall the bootblock on c0t0d0.
B. boot cdrom -smount -f nfs backup_server:/rpool/snaps /mntzpool create rpool c0t0d0s0zfs create -o mountpoint=/ rpool/ROOTcat /mnt/rpool.1011 | zfs receive -
Fdu rpoolzpool set bootfs=rpool/ROOT/solaris rpoolRecreate swap and dump devices.Reinstall the bootblock on c0t0d0.
C. boot cdrom -smount -F nfs backup_server:/rpool/snaps /mntcat /mnt/rpool.1011 | zfs receive -Fdu rpoolzpool set bootfs=rpool/ROOT/solaris rpool
c0t0d0s0Reinstall the bootblock on c0t0d0s0
D. boot cdrom -smount -f nfs backup_server:/rpool/snaps /rmtzpool create rpool c0t0d0s0zfs receive -Fdu /mnt/rpool.1011zpool set bootfs=rpool/ROOT/solaris
rpoolReinstall the bootblock on c0t0d0.
https://www.gratisexam.com/
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
How to Recreate a ZFS Root Pool and Restore Root Pool Snapshots
In this scenario, assume the following conditions:
* ZFS root pool cannot be recovered
* ZFS root pool snapshots are stored on a remote system and are shared over NFS
* The system is booted from an equivalent Solaris release to the root pool version so that the Solaris release and the pool version match. Otherwise, you will need
to add the -o version=version-number property option and value when you recreate the root pool in step 4 below.
1.
Boot from CD/DVD or the network.
On a SPARC based system, select one of the following boot methods:
ok boot net -s
ok boot cdrom -s
If you don't use -s option, you'll need to exit the installation program.
2.
Mount the remote snapshot dataset.
For example:
3.
Recreate the root pool.
For example:
4.
Restore the root pool snapshots.
This step might take some time. For example:
https://www.gratisexam.com/
5.
Set the bootfs property on the root pool BE.
For example:
6.
Install the boot blocks on the new disk.
On a SPARC based system:
QUESTION 94
You have edited /etc/profile to include the lines:
dennis_says=hello
export dennie_says
You now create a new user account brian, and specify use of the bash shell. When brian logs in and enters
Echo $dennis_says
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
The $HOME/.profile file is an initialization file that is executed after the /etc/profile when logging in to the Bourne or Korn shell. The file contains user preferences for
variable settings. If the ENV variable is set to .kshrc, the .kshrc file executes every time a new shell begins execution. The $HOME/.profile is copied from the /etc/
skel/local.profile file by the Administration Tool when creating a new account.
https://www.gratisexam.com/
Note: /etc/skel/local.profile
Per-system configuration file for
sh/ksh/ksh93/bash login sessions,
installed for new users
QUESTION 95
You want to install the openldap software package to a now boot environment for testing before introducing the now software package to the production
environment. What option describes the correct procedure to:
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
If you want to create a backup of an existing boot environment, for example, prior to modifying the original boot environment, you can use the beadm command to
create and mount a new boot environment that is a clone of your active boot environment. This clone is listed as an alternate boot environment in the GRUB menu
for x86 systems or in the boot menu for SPARC systems.
When you clone a boot environment by using the beadm create command, all supported zones in that boot environment are copied into the new boot environment.
Note: If the directory for the mount point does not exist, the beadm utility creates the directory, then mounts the boot environment on that directory.
https://www.gratisexam.com/
If the boot environment is already mounted, the beadm mount command fails and does not remount the boot environment at the newly specified location.
On reboot, the newly active boot environment is displayed as the default selection in the x86 GRUB menu or the SPARC boot menu.
QUESTION 96
You are installing the Oracle Solaris 11 Operating System by using the Text Installer. Which two options describe the features associated with the Text Installer?
Correct Answer: CD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 97
The interface net3 should be operating, but is not.
Command:
A. ipadm create-ip
B. ipadm enable-if
C. ipadm show-if
D. ipadm up-addr
https://www.gratisexam.com/
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Enable-if -t interface
Enables the given interface by reading the configuration from the persistent store. All the persistent interface properties, if any, are applied and all the persistent
addresses, if any, on the given interface will be enabled.
-t, --temporary
Specifies that the enable is temporary and changes apply only to the active configuration.
QUESTION 98
When issuing the zonestat 2 1h is command, the following information is displayed:
Which two options accurately describe the statistics contained in the output?
A. dbzone is using 0.21% of the total CPU resource available in the zone's processor set.
B. dbzone is using 0.21% of the global zone's total CPU.
C. dbzone is using 5.48% of the total physical memory that has been allocated to the zone.
D. dbzone is using 2.37% of the global zone's total virtual memory.
E. The network is being utilized 100% with no physical bandwidth remaining.
Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A: %PART
The amount of cpu used as a percentage of the total cpu in a processor-set to which the zone is bound. A zone can only have processes bound to multiple
https://www.gratisexam.com/
processor sets if it is the global zone, or if psrset(1m) psets are used. If multiple binding are found for a zone, it's %PART is the fraction used of all bound psets. For
[total] and [system], %PART is the percent used of all cpus on the system.
Note: The zonestat utility reports on the cpu, memory, and resource control utilization of the currently running zones. Each zone's utilization is reported both as a
percentage of system resources and the zone's configured limits.
The zonestat utility prints a series of interval reports at the specified interval. It optionally also prints one or more summary reports at a specified interval.
QUESTION 99
The advantage of core tiles is that they allow you an opportunity to examine the cause of problems, so that they can be resolved.
However, core files must be managed because they_____.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Part of the job of cleaning up heavily loaded file systems involves locating and removing files that have not been used recently. You can locate unused files by using
the ls or find commands.
Other ways to conserve disk space include emptying temporary directories such as the directories located in /var/tmp or /var/spool, and deleting core and crash
dump files.
Note: Core files are generated when a process or application terminates abnormally. Core files are managed with the coreadm command.
For example, you can use the coreadm command to configure a system so that all process core files are placed in a single system directory. This means it is easier
to track problems by examining the core files in a specific directory whenever a process or daemon terminates abnormally.
QUESTION 100
The line
set noexec_user_stack= l
should be added to the /etc/system file to prevent an executable stack while executing user programs. What is the purpose of this?
https://www.gratisexam.com/
A. help prevent core dumps on program errors
B. help programs to execute more quickly by keeping to their own memory space
C. log any messages into the stack log
D. help make buffer-overflow attacks more difficult
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
How to Disable Programs From Using Executable Stacks
Purpose: Prevent executable stack from overflowing.
You must be in the root role.
QUESTION 101
User jack makes use of the bash shell; his home directory is/export/home/jack.
What is the correct setting of umask, and where should it be set, to allow jack to create a shell script using the vi editor, that is executable by default?
A. It is not possible to make a script executable without using the chmod command.
B. umask value of 0002 set in /etc/profile
C. umask value of 0002 set in /export/home/jack/.bashrc
D. umask value of 0722 set in /etc/profile
E. umask value of 0722 set In /export/home/jack/.bashrc
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
The user file-creation mode mask (umask) is use to determine the file permission for newly created files. It can be used to control the default file permission for new
files. It is a four-digit octal number.
You can setup umask in /etc/bashrc or /etc/profile file for all users. By default most Unix distro set it to 0022 (022) or 0002 (002).
https://www.gratisexam.com/
1. The default umask 002 used for normal user. With this mask default directory permissions are 775 and default file permissions are 664.
2. The default umask for the root user is 022 result into default directory permissions are 755 and default file permissions are 644.
3. For directories, the base permissions are (rwxrwxrwx) 0777 and for files they are 0666 (rw-rw-rw).
In short,
1. A umask of 022 allows only you to write data, but anyone can read data.
2. A umask of 077 is good for a completely private system. No other user can read or write your data if umask is set to 077.
3. A umask of 002 is good when you share data with other users in the same group. Members of your group can create and modify data files; those outside your
group can read data file, but cannot modify it. Set your umask to 007 to completely exclude users who are not group members.
QUESTION 102
Which two options are valid methods of installing a solaris10 branded zone on a system running Oracle Solaris 11?
A. Use the V2V process to migrate an existing Solaris 8 or 9 non-global zone from a Solaris 10 system to a solaris10 branded zone.
B. Use the V2V process to migrate an existing Solaris 10 non-global whole root zone from a Solaris 10 system to a solaris10 branded whole root zone.
C. Install a solaris10 branded zone directly from the Oracle Solaris 10 media.
D. Migrate an existing 64-bit Solaris 10 system to a solaris10 branded non-global zone using the P2V process.
E. Use the V2V process to migrate an existing Solaris 10 non-global sparse root zone from a Solaris 10 system to a solaris10 branded sparse root zone.
Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
Explanation:
B: How to Migrate an Existing native Non-Global Zone
Use the V2V process to migrate an existing zone on your Solaris 10 system to a solaris10 brand zone on a system running the Oracle Solaris 11 release.
C: How to Install the solaris10 Branded Zone
A configured solaris10 branded zone is installed by using the zoneadm command with the install subcommand.
QUESTION 103
Which modification needs to be made to the Service Management Facility before you publish a new package to the IPS repository?
https://www.gratisexam.com/
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
pkg/image_root
(astring) The path to the image whose file information will be used as a cache for file data.
QUESTION 104
Given the following output of the zpool status command:
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 105
Before booting testzone, a non-global zone, you want to connect to the zone's console so that you can watch the boot process.
https://www.gratisexam.com/
Choose the command used xo connect to testzone's console.
A. zoneadm – C testzone
B. zoneadm – console testzone
C. zlogin – z testzone console
D. zlogin – z testzone – C
E. zlogin – C testzone
F. zoneadm – z testzone – C
Correct Answer: E
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 106
Identify the two security features incorporated in the Oracle Solaris 11 Cryptographic Framework.
Correct Answer: DE
Section: (none)
Explanation
Explanation/Reference:
Explanation:
The framework enables providers of cryptographic services to have their services used by many consumers in the Oracle Solaris operating system. Another name
for providers is plugins. The framework allows three types of plugins:
* User-level plugins - Shared objects that provide services by using PKCS #11 libraries, such as pkcs11_softtoken.so.1.
* Kernel-level plugins - Kernel modules that provide implementations of cryptographic algorithms in software, such as AES.
https://www.gratisexam.com/
Many of the algorithms in the framework are optimized for x86 with the SSE2 instruction set and for SPARC hardware.
* Hardware plugins - Device drivers and their associated hardware accelerators. The Niagara chips, the ncp and n2cp device drivers, are one example. A hardware
accelerator offloads expensive cryptographic functions from the operating system. The Sun Crypto Accelerator 6000 board is one example.
QUESTION 107
Review the ZFS dataset output that is displayed on your system:
Explanation/Reference:
Explanation:
A: + Indicates the file/directory was added in the later dataset
C: R Indicates the file/directory was renamed in the later dataset
E: - Indicates the file/directory was removed in the later dataset
G: M Indicates the file/directory was modified in the later dataset
The following table summarizes the file or directory changes that are identified by the zfs diff command.
https://www.gratisexam.com/
File or Directory Change Identifier
* File or directory is modified or file or directory link changed
M
* File or directory is present in the older snapshot but not in the newer snapshot
—
* File or directory is present in the newer snapshot but not in the older snapshot
+
QUESTION 108
Which five statements describe options available for installing the Oracle Solaris 11operating system using the installation media?
A. You can perform a text or LiveCD installation locally or over the network.
B. The text Installer does not install the GNOME desktop. The GNOME desktop package must he added after you have installed the operating system.
C. The LiveCD Installation cannot be used to install multiple instances of Oracle Solaris.
D. The LiveCD installer cannot be used if you need to preserve a specific Solaris Volume Table of Contents (VTOC) slice in your current operating system.
E. The LiveCD Installer is for x86 platforms only.
F. The GUI installer cannot be used to upgrade your operating system from Solaris 10.
https://www.gratisexam.com/
G. If you are installing Oracle Solaris 11 on an x86-based system that will have more than one operating system installed in it, you cannot partition your disk during
the installation process.
H. The LiveCD installer can be used for SPARC or x86 platforms.
Explanation/Reference:
Explanation:
https://www.gratisexam.com/
A: If the network is setup to perform automated installations, you can perform a text installation over the network by setting up an install service on the network and
selecting a text installation when the client system boots.
B: After a fresh install of Solaris 11 express, only the console mode is activated.
To add Gnome, simply do :
This will install additional packages that are not installed by default.
Unfortunately, you CAN'T. There is no direct upgrade installer or other tool that will allow you to upgrade from earlier releases of Solaris to Solaris 11. This is
primarily due to the vast changes in the packaging mechanism in Solaris 10.
QUESTION 109
When setting up Automated Installer (AI) clients, an interactive tool can be used to generate a custom system configuration profile. The profile will specify the time
zone, data and time, user and root accounts, and name services used for an AI client installation. This interactive tool will prompt you to enter the client information
and an SC profile (XML) will be created.
A. sys-unconfig
B. installadm set-criteria
C. sysconfig create-profile
D. installadm create-profile
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Use the installadm set-criteria command to update the client criteria associated with an AI manifest that you already added to a service using installadm add-
manifest.
Use the installadm add-manifest command to add a custom AI manifest to an install service.
The value of manifest is a full path and file name with .xml extension. The manifest file contains an AI manifest (installation instructions). The manifest file can also
reference or embed an SC manifest (system configuration instructions).
https://www.gratisexam.com/
QUESTION 110
Review the zonestat command:
Select the option that correctly describes the information that is displayed by this command.
A. It is a sample of dbzone’s physical memory usage taken every hour over a 24-hour period.Only the top 10 samplings of peak memory usage are displayed. All
other utilization data is eliminated.
B. It is a sample of dbzone’s CPU, virtual memory, and networking utilization.Physical memory is executed from the report.The sampling is taken every 10 minutes
over a 24-hour period and peak utilization id displayed each hour.
C. It is a sample of dbzone’s CPU, virtual memory, and networking utilization.Physical memory is executed from the report.The sampling is taken every 10 minutes
over a 24-hour period and displayed each hour.
D. It is a sample of dbzone’s physical memory usage taken every 10 seconds and 24-hour period.Only peak virtual memory usage and CPU utilization are
displayed each hour.All other Utilization data is eliminated.
E. It is a sample of dbzone’s physical memory usage taken every 10 seconds and 24-hour period.Only peak memory usage is displayed each hour.All other
utilization data is eliminated.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
* (Not A, B, C): interval (here 10 seconds): Specifies the length in seconds to pause between each interval report.
* duration (here 24 h)
Note: The zonestat utility reports on the cpu, memory, and resource control utilization of the currently running zones. Each zone's utilization is reported both as a
percentage of system resources and the zone's configured limits.
The zonestat utility prints a series of interval reports at the specified interval. It optionally also prints one or more summary reports at a specified interval.
The default output is a summary of cpu, physical, and virtual memory utilization. The -r option can be used to choose detailed output for specific resources.
QUESTION 111
You are configuring NFS on a server. Select the two statements that are true.
https://www.gratisexam.com/
A. Resources listed in /etc/dfs/dfstab are automatically shared on boot up.
B. A directory cannot be shared if a subdirectory below it is already shared.
C. Renaming a share created with the zfs set share command is not supported.
D. NFS and SMB protocols cannot be used simultaneously to share the same directory.
Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A: ZFS can automatically share file systems by setting the sharenfs property. Using this property, you do not have to modify the /etc/dfs/dfstab file when a new file
system is shared. The sharenfs property is a comma-separated list of options to pass to the share command. The value on is an alias for the default share options,
which provides read/write permissions to anyone. The value off indicates that the file system is not managed by ZFS and can be shared through traditional means,
such as the /etc/dfs/dfstab file. All file systems whose sharenfs property is not off are shared during boot.
QUESTION 112
You have already generated a 256-bit AES raw key and named the keystore file /mykey. You need to use the key to create an encrypted file system.
Which command should you use to create a ZFS encrypted file system named pool1/encrypt using the /mykey keystore?
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Example: Encrypting a ZFS File System by Using a Raw Key
In the following example, an aes-256-ccm encryption key is generated by using the pktool command and is written to a file, /cindykey.file.
https://www.gratisexam.com/
# zfs create -o encryption=aes-256-ccm -o keysource=raw, file:///cindykey.file tank/home/cindys
QUESTION 113
You need to set up an Oracle Solaris 11 host as an iSCSI target so that the host's disk can be accessed over a storage network. The disk device is c3t4d0.
Which six options describe the steps that need to be taken on this host to enable an iSCSI target?
Explanation/Reference:
Explanation:
How to Create an iSCSI LUN
The following steps are completed on the system that is providing the storage device.
Example: target# zpool create sanpool mirror c2t3d0 c2t4d0
(C)2. Create a ZFS volume to be used as a SCSI LUN.
(D)3. Create a LUN for the ZFS volume.
Example:
target# stmfadm create-lu /dev/zvol/rdsk/sanpool/vol1
Logical unit created: 600144F0B5418B0000004DDAC7C10001
https://www.gratisexam.com/
target# stmfadm add-view 600144F0B5418B0000004DDAC7C10001
This procedure assumes that you are logged in to the local system will contains the iSCSI target.
Note: The stmfadm command manages SCSI LUNs. Rather than setting a special iSCSI property on the ZFS volume, create the volume and use stmfadm to create
the LUN.
QUESTION 114
Identify the Automated Installer’s (AI) equivalent to jumpStart’s finish scripts and sysidcfg files.
A. Manifest files
B. SMF system configuration profile files
C. Installadm create - client
D. IPS software package repository
E. installadm create-service
F. svccfg - s application/pkg/server setprop sysidcfg
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Comparing sysidcfg File Keywords to System Configuration Profile Directives
The following table compares sysidcfg file keywords with example AI system configuration profile specifications.
Etc.
QUESTION 115
You need to update an OS image on a client. The pkg publishers command displays the wrong publisher with the wrong update:
PUBLISHERTYPESTATUSURI
https://www.gratisexam.com/
Solaris origin onlinehttp://pkg.oracle.com/solaris/release
Select the option that describes the procedure used to update the OS image on the system from the updated publisher.
A. Copy the repository from the ISO image onto the local client. Configure the repository on the client by using the svccfg - s command so that the Solaris publisher
is connected to the new repository. Refresh the application/pkg/server service.Issue the pkgrepo refresh command to refresh the repository catalog
B. Configure the publisher on the client using the svcfg - s command so that the Solaris publisher is connected to the repository at http://sysA.example.comRefresh
the application/pkg/server service. Issue the pkgrepo refresh command to repository catalog
C. Use the pkg set-publisher command to change the URL of the publisher Solaris to http://sysA.example.com. Issue the pkg update command to update the OS
image.
D. Add the new publisher http://sysA.example.com SolarisUse the pkg set-publisher command to set the publisher search order and place http://sysA.example.com
of http://pkg.oracle.com/solaris/releaseIssue the pkg publisher command to view the publishers. Set the new publisher to sticky.Issue the pkg update command
to update the OS image.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
You can use the pkg set-publisher command to change a publisher URI.
To change the origin URI for a publisher, add the new URI and remove the old URI. Use the -g option to add a new origin URI. Use the -G option to remove the old
origin URI.
Note: You can use either the install or update subcommand to update a package.
The install subcommand installs the package if the package is not already installed in the image. If you want to be sure to update only packages that are already
installed, and not install any new packages, then use the update subcommand.
QUESTION 116
alice is a user account used by Alice on a Solaris 11 system.
sadmin is a role account on the same system.
https://www.gratisexam.com/
Your task is to add the command /usr/sbin/cryptoadm to the Network management profile, so that Alice can execute it, while assuming the sadmin role.
Explanation/Reference:
Explanation:
C: /etc/security/exec_attr is a local database that specifies the execution attributes associated with profiles. The exec_attr file can be used with other sources for
execution profiles, including the exec_attr NIS map and NIS+ table.
A profile is a logical grouping of authorizations and commands that is interpreted by a profile shell to form a secure execution environment.
QUESTION 117
Select the two statements that correctly describe the operation of NWAM.
Correct Answer: AD
Section: (none)
Explanation
https://www.gratisexam.com/
Explanation/Reference:
Explanation:
A: Conditional and system locations can be manually activated, which means that the location remains active until explicitly disabled.
D: A location comprises certain elements of a network configuration, for example a name service and firewall settings, that are applied together, when required. You
can create multiple locations for various uses. For example, one location can be used when you are connected at the office by using the company intranet. Another
location can be used at home when you are connected to the public Internet by using a wireless access point. Locations can be activated manually or automatically,
according to environmental conditions, such as the IP address that is obtained by a network connection.
QUESTION 118
On server A, you enter the following command to add a static route to serverA route -p add -host 192.168.1.101 192.168.1.101 -static
https://www.gratisexam.com/
F. to optimize link aggregation using a direct connection between two systems
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
For example, you would type the following to specify the target system 192.168.10.137, which is on the same subnet as the interfaces in IPMP group itops0:
QUESTION 119
Before booting test zone a non-global zone, you want to connect to the zone’s console so that you can watch the boot process.
A. zoneadm -C testzone
B. zoneadm -console testzone
C. zlogin - z testzone console
D. zlogin - z testzone - C
E. zlogin -C testzone
F. zoneadm - testzone - c
Correct Answer: E
Section: (none)
Explanation
Explanation/Reference:
Explanation:
The following options are supported:
C
Connects to the zone console. Connects to the zone console.
https://www.gratisexam.com/
Note:
After you install a zone, you must log in to the zone to complete its application environment. You might log in to the zone to perform administrative tasks as well.
Unless the -C option is used to connect to the zone console, logging in to a zone using zlogin starts a new task. A task cannot span two zones
QUESTION 120
Consider the following rule file for use with the Basic Audit Reporting Tool (BART).
CHECK all
IGNORE dirmtime
/etc/security
/etc/notices
IGNORE contents
/export/home
IGNORE mtime size contents
/var
CHECK
You are using BART to detect inappropriate changes to the file system.
Correct Answer: DF
Section: (none)
Explanation
Explanation/Reference:
Explanation:
D: According to line /etc/security
F: According to line /export/home
Not E: According to line IGNORE dirmtime
Note: In default mode, the bart compare command, as shown in the following example, checks all the files installed on the system, with the exception of modified
https://www.gratisexam.com/
directory timestamps (dirmtime):
CHECK all
IGNORE dirmtime
Note 2: The Basic Audit Reporting Tool (BART) feature of Oracle Solaris enables you to comprehensively validate systems by performing file-level checks of a
system over time. By creating BART manifests, you can easily and reliably gather information about the components of the software stack that is installed on
deployed systems.
BART is a useful tool for integrity management on one system or on a network of systems.
QUESTION 121
The ZFS configuration on your server is:
Pool1 6.67G31K/pool
Pool1/data31K31K/data
Select the three commands that you would use to 1. Create, 2. List, and 3. Delete a snapshot of the /data file system.
Explanation/Reference:
Explanation:
A: Snapshots are created by using the zfs snapshot command, which takes as its only argument the name of the snapshot to create.
D: You can list snapshots as follows:
# zfs list -t snapshot
E: Snapshots are destroyed by using the zfs destroy command. For example:
QUESTION 122
A local repository is available on this system and you need to enable clients to access this repository via HTTP. The repository information is:
https://www.gratisexam.com/
PUBLISHERTYPESTATUSURI
solarisoriginonlinehttp://sysA.example.com
Identify two of the steps that are required to make the local repository on this server available to the client via HTTP.
A. On the server: set the pkg/inst_root and pkg/readonly properties for the svc:/application/pkg/server:default service and enabled the service
B. On the server: set the sharefs property on the ZFS file system containing the IPS repository.
C. On the client: reset the origin for the solaris publisher.
D. On the client: set the pkg/inst_root and pkg/readonly properties for the svc:/application/server:default service enable the service.
E. On the client: start the pkg.depotd process.
Correct Answer: AE
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A: Configure the Repository Server Service
To enable clients to access the local repository via HTTP, enable the application/pkg/server
Service Management Facility (SMF) service.
# svccfg -s application/pkg/server setprop pkg/inst_root=/export/repoSolaris11
# svccfg -s application/pkg/server setprop pkg/readonly=true
QUESTION 123
In an effort to reduce storage space on your server, you would like to eliminate duplicate copies of data in your server’s ZFS file systems.
How do you specify that pool1/data should not contain duplicate data blocks (redundant data) on write operations?
https://www.gratisexam.com/
E. zfs create - o dedup=on pool1/data
Correct Answer: E
Section: (none)
Explanation
Explanation/Reference:
Explanation:
ZFS Deduplication Property
Solaris Express Community Edition, build 129: In this Solaris release, you can use the deduplication property to remove redundant data from your ZFS file systems.
If a file system has the dedup property enabled, duplicate data blocks are removed synchronously. The result is that only unique data is stored and common
components are shared between files.
QUESTION 124
When you issue the “gzip: zommand not found” message is displayed. You need to install the gzip utility on your system.
Which command would you use to check if the gzip utility is available from the default publisher for installation?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Searching for Packages
Use the pkg search command to search for packages whose data matches the specified pattern.
Like the pkg contents command, the pkg search command examines the contents of packages. While the pkg contents command returns the contents, the pkg
search command returns the names of packages that match the query.
pkg search
https://www.gratisexam.com/
search [-HIaflpr] [-o attribute ...] [-s repo_uri] query
Search for matches to the query, and display the results.
Which tokens are indexed are action-dependent, but may include content hashes and pathnames.
Note: pkg is the retrieval client for the image packaging system. With a valid configuration, pkg can be invoked to create locations for packages to be installed,
called 'images', and install packages into those images. Packages are published by publishers, who may make their packages available at one or more repositories.
pkg, then, retrieves packages from a publisher's repository and installs them into an image.
QUESTION 125
The following information is displayed about the compress/zjp software package, which Is currently installed on this system:
NAME (PUBLISHER)VERSIONIFO
Compress/zip3.1.2-0.175.0.0.0.0.537if-
NAMEVERSIONDATECOMMENT
Compress/zip3.109 Dec 2011 04:50:38 ESTNone
Which statement describes the information that is displayed tor the compress/zip software package?
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
An “f” in the F column indicates the package is frozen. If a package is frozen, you can only install or update to packages that match the frozen version.
Note: The “i” in the I column indicates that these packages are installed in this image.
Adding and Updating Oracle Solaris 11 Software Packages, Showing Package Install State Information
QUESTION 126
The crash dump notification on your server is:
https://www.gratisexam.com/
Documentation states that there should be two core files for each crash dump in the /var/crash directory named vmdump.0
A. savecore -f vmdump.0
B. dumpadm uncompressed
C. gunzip vmdump.0
D. dumpadm -z off
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Decompress using savecore -f vmdump.0
-f dumpfile Attempt to save a crash dump from the specified file instead of from the system's current dump device. This option may be useful if the information
stored on the dump device has been copied to an on-disk file by means of the dd(1M) command.
QUESTION 127
After installing the OS, you boot the system and notice that the syslogd daemon is not accepting messages from remote systems.
Which two options should you select to modify the syslogd daemon configuration so that it accepts messages from remote systems?
A. svccfg -s svc:/system/system -log setprop start/exec= “syslogd -t”Restart the syslogd daemon.
https://www.gratisexam.com/
B. Set the following parameter in the /etc/syslogd.conf file: LOG_FROM_REMOTE= YESRestart the syslogd daemon.
C. svcadm enable svc:/system/system -log/config/log_from_remoteRestart the syslogd daemon.
D. svccfg -s svc:/system/system-log setprop config/log_from_remote=trueRestart the syslogd daemon.
E. Set the following parameter in the /etc/default/syslogd file: LOG_FROM_REMOTE=YESRestart the syslogd daemon.
Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
B: The /etc/default/syslogd file contains the following default parameter settings. See FILES.
LOG_FROM_REMOTE
Specifies whether remote messages are logged. LOG_FROM_REMOTE=NO is equivalent to the -t command-line option. The default value for
LOG_FROM_REMOTE is YES.
QUESTION 128
You need to migrate a UFS file system named /production_ufs to a ZFS file system named /production_ufs. The /production_ufs file system cannot be taken down
or be out of production during the migration, and the current /production_ufs file system must remain active until the /ptoduction_zfs file system is copied and ready.
A. Create a snapshot of the UFS file system. Create the new ZFS file system. Use cpio to copy data from the snapshot to the new ZFS file system.
B. Create a new Boot Environment. Create the ZFS file system. Use lucreate -m to copy data from the Current UFS file system to the new ZFS file system.
C. Mirror the existing UFS file system by using SVM.After both submissions are in sync, migrate one of the submissions to a ZFS file System by using Live
Upgrade.
D. Create the new ZFS file system by using zfs create import to import data from the existing UFS file system into the new ZFS file system
E. Create the new zfs file system by using the zfs create -o shadow.
Correct Answer: E
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Migrating Data With ZFS Shadow Migration
https://www.gratisexam.com/
ZFS shadow migration is a tool you can use to migrate data from an existing file system to a new file system. A shadow file system is created that pulls data from
the original source as necessary.
You can use the shadow migration feature to migrate file systems as follows:
* A local or remote ZFS file system to a target ZFS file system
* A local or remote UFS file system to a target ZFS file system
QUESTION 129
ServerA contains two ISO images of a package repository named so1.repo.iso-a and so1.repo.iso-b respectively. You need to create a single local package
repository on server that clients can connect to. The package repository will be stored on the /export/IPS file system and named repo. The preferred publisher will
be named solaris and the publisher URL will be http://serverA.example.com.
Which is the correct procedure to perform on ServerA to create the local Package repository?
A. cat so1.repo.iso-a sol.repo.iso-b > so1.full.isoMount the ISO image and use the rsync command to extract the contents of the ISO file to the /export/IPS file
system.Set the pkg/inst_root property to /export/IPS/repo and the pkg/readonly property to true.Set the preferred publisher by using pkg set-publisher -Ghttp://
pkg.oracle.com/solaris/release/ \-g http”//serverA.example.com/ solaris
B. cat so1.repo.iso-a so1.repo.iso-b > /export/IPS/repoSet the pkg/inst_root property to true and the pkg/readonly property to /export/IPSSet the preferred publisher
by using pkg set-publisher -G http://serverA.example.com/ \-g http://pkg/oracle.com/solaris/rekease/solaris
C. cat so1.repo.iso-a so1.repo.iso-b > so1.full.isoMount the ISO image and use the rsync command to extract the contents of the ISO file to /export/IPS/repoSet
the pkg/inst_root property to /export/IPS/repo and the pkg/readonly property to trueSet the preferred publisher by using pkg set-publisher solaris \-g http://
pkg.oracle.com/
D. cat so1.repo, iso-a so1.repo.iso-b > /export/IPS/repo.isoMount the ISO image and copy the repo directory from the ISO image to /export/IPS/reposet the pkg/
inst_root property and the pkg/readonly property to /export/IPS/reposet the preferred pkg/inst_root property by using pkg set-publisher - G http://
serverA.example.com/ \- g http://pkg.oracle.com/solaris.com/release/- p solaris
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 130
https://www.gratisexam.com/
You want to configure an iSCSI target device on your system.
Select the group package required to install this functionality on your system.
https://www.gratisexam.com/
A. storage-server
B. solaris-small-server
C. storage-avs
D. storage-nas
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
How to Create an iSCSI LUN
The disk volume provided by the server is referred to as the target. When the LUN is associated with an iSCSI target, it can be accessed by an iSCSI initiator.
The following tasks are completed on the system that is providing the storage device.
1. Install the COMSTAR storage server software.
target# pkg install storage-server
Etc.
QUESTION 131
The core dump configuration in your non global zone is
https://www.gratisexam.com/
A user is running a process in a non-global zone (testzone) and the process crashes. The process information is:
user126632618017:46:42pts/20:00/usr/bin/bash
When the user's process crashes in testzone, a non-global zone, where will the core dump be saved?
Correct Answer: E
Section: (none)
Explanation
Explanation/Reference:
Explanation:
The line
init core file pattern: /var/core/core.%f.%p
will be used for the non-global process to determine the destination of the dump file.
Note: When a process is dumping core, up to three core files can be produced: one in the per-process location, one in the system-wide global location, and, if the
process was running in a local (non-global) zone, one in the global location for the zone in which that process was running.
QUESTION 132
You create a flash archive of the Solaris 10 global zone on the serves named sysA. The archive name is s10-system.flar, and it is stored on a remote server named
backup_server.
https://www.gratisexam.com/
On sysA, you create a Solaris 10 branded zone named s10-zone.
You want to use the flash archive, located On" /net/bactup_servers/10-system.flar, to install the Operating system in the s10-zone zone.
Which command do you choose to install the s10-system.flar archive in the Solaris 10 branded zone (s10-zone)?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
The zoneadm command is the primary tool used to install and administer non-global zones. Operations using the zoneadm command must be run from the global
zone on the target system.
QUESTION 133
How should you permanently restrict the non-global zone testzone so that it does not use more than 20 CPU shares while it is running?
A. While configuring the zone, add this entry:add rct1set name = capped.cpu-sharesadd value (priv = privileged, limit = 20, action = none)endexit
B. While configuring the zone, add this entry: add rct1set name= zone.cpu-sharesadd value (priv=privileged, limit=20, action=none)endexitfrom command line,
enter: # dispadmin - d FSS
C. From the command line enter: #prct1 -n zone.cpu-shares - r - v 20 - i zone testzone
D. From the command line, enter:#prct1 - n zone.cpu-shares - v 80 - r - i zone global
Correct Answer: C
Section: (none)
Explanation
https://www.gratisexam.com/
Explanation/Reference:
Explanation:
The prctl utility allows the examination and modification of the resource controls associated with an active process, task, or project on the system. It allows access
to the basic and privileged limits and the current usage on the specified entity.
Note: project.cpu-shares
Number of CPU shares granted to a project for use with the fair share scheduler
QUESTION 134
You are going to create live zones on you server. Disk space is critical on this server so you need to reduce the amount of disk space required for these zones.
Much of the data required for each of these zones is identical, so you want to eliminate the duplicate copies of data and store only data that is unique to each zone.
Which two options provide a solution for eliminating the duplicate copies of data that is common between all of these zones?
Correct Answer: DE
Section: (none)
Explanation
Explanation/Reference:
Explanation:
n Oracle Solaris 11, you can use the deduplication (dedup) property to remove redundant data from your ZFS file systems. If a file system has the dedup property
enabled, duplicate data blocks are removed synchronously. The result is that only unique data is stored, and common components are shared between files.
QUESTION 135
Solaris 11 includes a redesigned software packaging model: the Image Packaging system.
Which three describe advantages of the Image Packaging System over the previous Solaris 10 SVR4 packaging model?
https://www.gratisexam.com/
A. Eliminates patching of the software package
B. Makes the patching process more efficient with less downtime
C. Eliminates OS version upgrade
D. Allows for the installation of the OS without a local DVD or installation server
E. Allows the use of a repository mirror to speed up package operation
F. Allows users to publish their own software package in a software repository
Explanation/Reference:
QUESTION 136
You upgraded your server to Oracle Solaris 11 and you imported zpool (pool1) that was created in Solaris 10. You need to create an encrypted ZFS file system in
pool1, but first you need to make sure that your server supports ZFS encryption.
A. The encrypted file system must have been created in Oracle Solaris11. To encrypt a ZFS file system from a previous version of Solaris, upgrade the zpool and
create a new encrypted ZFS file system into the encrypted ZFS file system.
B. If you plan to create an encrypted file system in an existing zpool, the zpool must be upgraded to ZFS version 30.
C. ZFS encryption is integrated with the ZFS command set and no additional packages need to be installed.
D. ZFS encryption requires that the ZFS Dataset Encryption package be installed.
E. If you plan to create an encrypted file system in an existing zpool, the pool must be upgraded to ZFS version 21, minimum.
F. Encryption is supported at the pool or dataset (file system) level.
G. Encryption is supported at the pool level only for every file system in the pool will be encrypted.
H. You cannot create an encrypted file system in a zpool that was created prior to oracle Solaris11. Create a new zpool in Solaris11, create an encrypted ZFS file
system in the new zpool, and move or copy the data from the existing file system into the new encrypted file system.
Explanation/Reference:
Explanation:
A (not H): You can use your existing storage pools as long as they are upgraded. You have the flexibility of encrypting specific file systems.
https://www.gratisexam.com/
B (not E): Can I enable encryption on an existing pool?
Yes, the pool must be upgraded to pool version 30 to allow encrypted ZFS file systems and volumes.
C (not D): ZFS encryption is integrated with the ZFS command set. Like other ZFS operations, encryption operations such as key changes and rekey are performed
online.
F (not G): Encryption is the process in which data is encoded for privacy and a key is needed by the data owner to access the encoded data. You can set an
encryption policy when a ZFS dataset is created, but the policy cannot be changed.
QUESTION 137
Identify three options that describe the new Oracle Solaris 11 zone features.
Explanation/Reference:
Explanation:
A: The beadm utility includes support for creating and administering non-global zone boot environments.
Note: A boot environment is a bootable instance of the Oracle Solaris operating system image plus any other application software packages installed into that
image. System administrators can maintain multiple boot environments on their systems, and each boot environment can have different software versions installed.
B: Role-based access control (RBAC) is a security feature for controlling user access to tasks that would normally be restricted to the root role. By applying security
attributes to processes and to users, RBAC can divide up superuser capabilities among several administrators.
QUESTION 138
You run the command dlstat show-link -r.
Select the two correct statements regarding the information displayed in the INTRS column.
https://www.gratisexam.com/
Correct Answer: CE
Section: (none)
Explanation
Explanation/Reference:
Explanation:
In this output, the statistics for interrupt (INTRS) are significant. Low interrupt numbers indicate greater efficiency in performance. If the interrupt numbers are high,
then you might need to add more resources to the specific link.
Example:
# dlstat -r -i 1
LINK IPKTS RBYTES INTRS POLLS CH<10 CH10-50 CH>50
e1000g0 101.91K 32.86M 87.56K 14.35K 3.70K 205 5
nxge1 9.61M 14.47G 5.79M 3.82M 379.98K 85.66K 1.64K
vnic1 8 336 0 0 0 0 0
e1000g0 0 0 0 0 0 0 0
nxge1 82.13K 123.69M 50.00K 32.13K 3.17K 724 24
vnic1 0 0 0 0 0 0 0
Note: dlstat show-link [-r [-F] | -t] [-i interval] [-a] [-p] [ -o field[, ...]] [-u R|K|M|G|T|P] [link]
Display statistics for a link.
-r
Display receive-side statistics only. Includes bytes and packets received, hardware and software drops, and so forth.
link
iusedby
ibytes
ipkts
intrs
polls
hdrops: hardware drops
sdrops: software drops (owing to bandwidth enforcement)
ch<10: number of packet chains of length < 10
ch10-50: number of packet chains of length between 10 and 50
ch>50: number of packet chains of length > 50
QUESTION 139
You need to set up a local package repository to serve 75 client systems. Multiple clients will being the package repository concurrently and you need to ensure that
https://www.gratisexam.com/
the local repository performs very well under this heavy load, especially during package intensive operations.
Which option would ensure the best performance of the repository during package-intensive rations by multiple clients?
A. Set up multipathing on the package repository server to distribute the network load multiple network interfaces.
B. Deploy a second instance of the package repository server to run as a read writable mirror.
C. Deploy a second instance of the package repository server to run as a read-only mirror.
D. Deploy a second instance of the package repository server to run as a clone of the primary repository server.
E. Deploy a package repository locally on each client.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 140
View the Exhibit and review the zpool and ZFS configuration information from your system.
https://www.gratisexam.com/
Identify the correct procedure for breaking the /prod_data mirror, removing c4t0d0 and c4t2d0, and making the data on c4t0d0and c4t2d0 accessible under the
https://www.gratisexam.com/
dev_data mount point.
A. zpool split pool1 pool2 c4t0d0 c4t2d0zpool import pool2zfs set mountpoint = /dev_data pool2/prod_data
B. zpool detach pool1 pool2zpool attach pool2zfs set mountpoint=/dev_data pool2/prod_data
C. zpool split pool1/prod_data -n pool2/dev_datazfs set mountpoint = /dev_data pool2/prod_data
D. zpool split pool1 pool2 c4t0d0 c4t2d0zpool import pool2
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
In this Solaris release, you can use the zpool split command to split a mirrored storage pool, which detaches a disk or disks in the original mirrored pool to create
another identical pool.
After the split operation, import the new pool.
QUESTION 141
United States of America export laws include restrictions on cryptography.
Identify the two methods with which these restrictions are accommodated in the Oracle Solaris 11 Cryptographic Framework.
Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://www.gratisexam.com/
The elfsign command has subcommands to request a certificate from Sun and to sign binaries. Another subcommand verifies the signature. Unsigned binaries
cannot be used by the Oracle Solaris Cryptographic Framework. To sign one or more providers requires the certificate from Sun and the private key that was used
to request the certificate.
C: Export law in the United States requires that the use of open cryptographic interfaces be restricted. The Oracle Solaris Cryptographic Framework satisfies the
current law by requiring that kernel cryptographic providers and PKCS #11 cryptographic providers be signed.
QUESTION 142
You are setting up a local IPS package repository on your Oracle Solaris11 server: solaris.example.com.
You want to point the existing local IPS publisher to the new local IPS repository located in /repo.
1. Download and rsync the contents of the Oracle Solaris11 repository ISO image to the /repo directory.
2. Configure the repository server service properties. The svcprop command display, the IPS related properties:
pkg/inst_root astring/repo
pkg/readonly Boolean true
#ls/repo
Pkg5.repository publisher
The svcs publisher command shows the svc: /application/pkg/server: default service is online.
The pkg publisher command shows the svc: /application/pkg/server: default service is online.
Which steps needs to be performed to set the local IPS publisher to the local IPS repository/repo?
https://www.gratisexam.com/
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Set the Publisher Origin To the File Repository URI
To enable client systems to get packages from your local file repository, you need to reset the origin for the solaris publisher. Execute the following command on
each client:
Example:
# pkg set-publisher -G '*' -M '*' -g /net/host1/export/repoSolaris11/ solaris
QUESTION 143
You are troubleshooting the Oracle Solaris11 Automated Installer (AI), which is not connecting with the IPS software repository.
Which three steps will help determine the cause of DNS name resolution failure?
Explanation/Reference:
Explanation:
Check DNS
* (A) Check whether DNS is configured on your client by verifying that a non-empty /etc/resolv.conf file exists.
* (F) If /etc/resolv.conf does not exist or is empty, check that your DHCP server is providing DNS server information to the client:
# /sbin/dhcpinfo DNSserv
If this command returns nothing, the DHCP server is not set up to provide DNS server information to the client. Contact your DHCP administrator to correct this
problem.
* (B) If an /etc/resolv.conf file exists and is properly configured, check for the following possible problems and contact your system administrator for resolution:
** The DNS server might not be resolving your IPS repository server name.
https://www.gratisexam.com/
** No default route to reach the DNS server exists.
QUESTION 144
You created a new zpool. Now you need to migrate the existing ZFS file system from pool1/prod to pool2/prod.
Which method would you use to modify the ZFS shadow migration daemon defaults to increase the concurrency and overall speed of migration?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
shadowd is a daemon that provides background worker threads to migrate data for a shadow migration. A shadow migration gradually moves data from a source
file system into a new “shadow” file system. Users can access and change their data within the shadow file system while migration is occurring.
The shadowd service is managed by the service management facility, smf(5). Administrative actions on this service, such as enabling, disabling, or requesting
restart, can be performed using svcadm(1M). The service's status can be queried using the svcs(1) command.
The svccfg(1M) command can be used to manage the following parameter related to shadowd:
config_params/shadow_threads
Note: Oracle Solaris 11: In this release, you can migrate data from an old file system to a new file system while simultaneously allowing access and modification of
the new file system during the migration process.
Setting the shadow property on a new ZFS file system triggers the migration of the older data. The shadow property can be set to migrate data from the local
system or a remote system with either of the following values:
file:///path
nfs://host:path
https://www.gratisexam.com/
QUESTION 145
The current ZFS configuration on server is:
You need to backup the /data file system while the file system is active.
Select the option that creates a full backup of the /data file system and stores the backup on server in the pool named backup.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://docs.oracle.com/cd/E23823_01/html/819-5461/ghzvz.html
https://www.gratisexam.com/
https://www.gratisexam.com/
https://www.gratisexam.com/