Solaris 10

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following is used to obtain information about devices and to display device pathnames in OpenBoot? A. show-devs B. dmesg C. pwd D. sysdef

A. The OpenBoot command show-devs is used to obtain information about devices and to display device pathnames. For more information, see the section "PROM Device Tree (Full Device Pathnames)."

Which type of link can point to a file that does not exist? A. Symbolic link B. Hard link C. Hardware link D. Software link

A. An advantage of a symbolic link over a hard link is that you can create a symbolic link to a file that does not yet exist. For more information, see the "Soft (Symbolic) Links" section.

Which of the following files contains encrypted password information? A. /etc/shadow B. /etc/passwd C. /etc/default/password D. /etc/password

A. The /etc/shadow file contains the encrypted password information for each user account. For more information, see the section "Where User Account Information Is Stored."

Which NVRAM variable specifies the device from which to start up? A. boot-device B. boot-file C. output-device D. input-device

A. The NVRAM variable named boot-device contains the name of the default startup device. For more information, see the section "Booting a SPARC System."

When installing a patch using the patchadd command, which of the following options does not create a backup of the files to be patched? A. -f B. -p C. -B D. -d

D. The -d option for the patchadd command does not create a backup of the files to be patched. For more information, see the "Obtaining a Patch" section.

Which of the following options to the mount command provides total compatibility with previous file system behavior, enforcing the 2GB maximum file size limit? A. -o compat B. largefiles C. -nolargefiles D. -o nolargefiles

D. The -o nolargefiles option of the mount command provides total compatibility with previous file system behavior, enforcing the 2GB maximum file size limit. For more information, see the "Mounting a File System with Large Files" section.

Which one of the following options to the ps command lists only processes for a particular user? A. -P B. -f C. -l D. -u

D. The -u option to the ps command lists only processes for a particular user.

Which directory contains the disk entries symbolically linked to the block device nodes in /devices? A. /kernel/drv B. /dev/rdsk C. /vol/dev/aliases D. /dev/dsk

D. The /dev/dsk directory contains the disk entries for the block device nodes in /devices. For more information, see the "Block and Raw Devices" section.

What does fsck do when it preens a file system? A. Forces checking of the file system B. Checks and fixes the file system noninteractively C. Checks writeable file systems only D. Only checks to determine if a file system needs checking

B. Normally, fsck is run noninteractively at bootup to preen the file systems after an abrupt system halt. Preening automatically fixes any basic file system inconsistencies and does not try to repair more serious errors. While preening a file system, fsck fixes the inconsistencies it expects from such an abrupt halt. For more serious conditions, the command reports the error and terminates. For more information, see the "Repairing File Systems" section.

Which of the following utilities has a built-in function to perform incremental backups? A. tar B. cpio C. ufsdump D. dd

C. ufsdump has built-in options for creating incremental backups that back up only those files that were changed since a previous backup. This saves tape space and time. For more information, see the section "The ufsdump Utility."

Which of the following contains the volume management configuration information used by vold? A. /etc/init.d/volmgt B. /etc/vfstab C. /etc/vold.conf D. /etc/inittab

C. vold reads the /etc/vold.conf configuration file at startup. The vold.conf file contains the Volume Manager configuration information used by vold. For more information, see the "Volume Management" section.

How can you later view system messages displayed at bootup? A. By issuing the dmesg command B. By viewing the /var/adm/messages file C. By issuing the sysdef command D. By viewing logs in the /var/svc/log directory

D. The boot process creates fewer messages. All the information that was provided by the boot messages in previous versions of Solaris is now located in the /var/svc/log directory. For more information, see the section "The Service Management Facility (SMF)."

What are the default file systems created by the Solaris installation program? A. /, /opt, /usr, /var, and swap B. /, /usr, /var, and swap C. /, /usr, and swap D. / and swap

D. The default partition scheme setup with the interactive installation program is root (/) and swap. For more information, see the "Disk Storage" section.

Which of the following is the preferred command used to inform the system about newly installed device drivers? A. devlinks B. drvconfig C. add_drv D. devfsadm

D. The devfsadm command is used to inform the system about newly installed device drivers. For more information, see the "Instance Names" section.

Which of the following commands displays capacity information on each mounted file system? A. du B. format C. prtvtoc D. df

D. The df command gives you capacity information on each mounted file system. For more information, see the "Displaying a File System's Disk Space Usage" section.

Which of the following commands is used to change the priority on a process? Choose all that apply. A. renice B. priocntl C. ps D. hup

A, B. The commands renice and priocntl are used to change the priority on a process.

On a Sun system, what is the first step in installing a new operating system? A. Informing the users B. Repartitioning the hard drive C. Finding the source distribution media D. Performing a full backup

A, B, C, D. All are correct. For more information, see the "The Solaris Installation Prechecklist" section.

The Solaris Product Registry enables you to do which of the following? Choose all that apply. A. View a list of installed software. B. Uninstall software. C. Launch the installer. D. Directly edit software packages with the registry editor.

A, B, C. The Solaris Product Registry enables you to view all installed software, uninstall software, or launch the installer to install additional software. For more information, see the "Tools for Managing Software" section.

When should a file system be checked with fsck? Choose all that apply. A. If the file system was unmounted improperly B. After a power outage C. Whenever a file system cannot be mounted D. When data has been accidentally deleted

A, B, C. fsck should be run after a power outage, when a file system is unmounted improperly, or whenever a file system cannot be mounted. For more information, see the "Repairing File Systems" section.

In Solaris, each disk device is described by which naming conventions? (Choose three.) A. Instance name B. Physical device name C. Virtual name D. Logical device name

A, B, D. In Solaris, each disk device is described in three ways, using three distinct naming conventions: Physical device name: Represents the full device pathname in the device information hierarchy. Instance name: Represents the kernel's abbreviated name for every possible device on the system. Logical device name: Used by system administrators with most file system commands to refer to devices. For more information, see Chapter 1.

When you add a new user account via the Add User Wizard, which of the following options are not available for setting the password? (Select the three best answers.) A. The password is cleared until first login. B. The account is locked. C. No password is assigned. D. Have the system generate a password.

A, B, D. The password is cleared until first login is no longer an option in Solaris 10. You cannot lock an account via the Add User Wizard in the SMC. The SMC cannot automatically generate a password for a user account. For more information, see the section "Adding User Accounts with the SMC."

Which of the following are functions of the /etc/group file? (Select the two best answers.) A. Assigns users to secondary groups B. Assigns a name to a group ID number C. Provides a special group for su privileges D. Specifies which users can access network resources, such as printers

A, B. The /etc/group file assigns users to secondary groups and assigns a name to a group ID number. For more information, see the section "Where User Account Information Is Stored."

Which of the following commands show(s) the jobs queued up by the at command? Choose all that apply. A. atq B. at -l C. ps D. crontab

A, B. The atq and at -1 commands show the jobs queued up by the at command.

Select all the conditions that prevent a patch from being installed. A. The patch being installed requires another patch that is not installed. B. The patch is incompatible with another, already installed patch. C. The patch was removed. D. The patch version is not the most up-to-date version. E. All of the above

A, B. The following conditions can prevent a patch from being installed: The patch being installed requires another patch that is not installed. The patch is incompatible with another, already installed patch. For more information, see the "Obtaining a Patch" section.

The system relies on information found in which of the following files to find the root, usr, or swap device? A. /etc/vfstab B. /etc/path_to_inst C. kernel D. /kernel/drv/ E. /etc/driver

A, B. The system relies on information found in both the /etc/vfstab file and the /etc/ path_to_inst file to find the root, usr, and swap device. For more information, see the "Instance Names" section.

What tasks does OpenBoot perform? (Select the two best answers.) A. Executing POST B. Loading bootblk C. Executing ufsboot D. Loading the operating system kernel

A, B. The two primary tasks of the OpenBoot firmware are to run the POST and to load the bootblock. For more information, see the section "The OpenBoot Environment."

What does the command tar xvf /tmp/backup.tar do? (Choose two.) A. It extracts the absolute paths of the archives in /tmp/backup.tar, creating new directories and overwriting files if necessary. B. It prints a verbose listing of the files and directories in /tmp/backup.tar. C. It compresses /tmp/backup.tar. D. It archives the current directory and its contents to /tmp/backup.tar.

A, B. This command uses the flags x (extract archive), v (verbose—lists all files and directories extracted), and f (archive is in the file following this argument). If backup.tar has files that specify absolute paths (for example, /etc/shadow), the files are extracted to disk using the absolute paths. New directories are created and files are overwritten, so be very sure that you trust the creator of a tar file before you extract it as root. Answer C is incorrect because the tar command does not compress data. Answer D is incorrect because the x option extracts files; the c option archives files. For more information, see Chapter 7, Performing System Backups and Restorations."

Where is information on printers found? (Choose two.) A. /etc/printers.conf B. /etc/lp C. /var/spool/lp D. /etc/print

A, B. When you set up a printer with Print Manager or lpadmin, Solaris makes the required changes in the system's /etc/printers.conf file and the /etc/lp directory. For more information, see the section "The Solaris Print Service."

You can determine the mapping of an instance name to a physical device name by doing what? Choose all that apply. A. Looking at output from the dmesg command B. Viewing the /var/adm/messages file C. Looking at output from the sysdef command D. Looking at output from the prtconf command

A, B. You can determine the mapping of an instance name to a physical device name by looking at the dmesg output and by viewing the /var/adm/messages file. For more information, see the "Instance Names" section.

Which of the following statements about the cpio command are true? (Choose three.) A. It is used to copy data from one place to another. B. It is not a good tool for backups. C. It can back up and restore individual files, not just entire file systems. D. Backups made by cpio are smaller than those created with tar.

A, C, D. cpio is used to copy data and backup and restore files and file systems in a more compressed format than tar. For more information, see the section "The cpio Utility."

What can the SMC Toolbox Editor allow you to do? (Choose three.) A. Suspend, resume, monitor, and control processes. B. Install software packages. C. Schedule, start, and manage jobs. D. View and manage mounts, shares, and usage information.

A, C, D. The SMC Toolbox Editor manages processes, users, file system mounts and shares, disks, and serial ports. It also schedules jobs and has a log viewer. You can also use SMC to install patches, but not to install software. For more information, see Chapter 4.

What information do you need during the installation process? (Choose three.) A. IP address B. Product code C. Time zone D. Root password

A, C, D. The Solaris Installation program prompts you for the following: hostname, IP address, subnet mask, whether to install IPv6, name service, whether to use the Kerberos network authentication system, time zone, root password, and language. For more information, see Chapter 2.

What are the characteristics of changing to the single-user run level? (Choose three.) A. It's equivalent to run level S. B. Shutdown state C. All users are logged out. D. File systems remain mounted.

A, C, D. The single-user milestone, also called run level S, is the single-user (system administrator) state. Only root is allowed to log in at the console, and any users logged in are logged out when entering this run level. All file systems previously mounted remain mounted and accessible. All services except the most basic operating system services are shut down in an orderly Manner. Answer B is incorrect because the single-user run level is not considered a shutdown state. The shutdown state would be run level 0. For more information, see Chapter 3.

Which of the following statements is true of a print server? (Choose two.) A. It is a system that has a local printer connected to it. B. It is a remote system that can send print requests to another system for printing. C. It is a system that makes a printer available to other systems on the network. D. Printing can be initiated from it.

A, C. A print server is a system that has a local printer connected to it. A print server makes a printer available to other systems on the network. For more information, see the section "Print Servers Versus Print Clients."

Which of the following are easily guessed passwords? (Choose two.) A. Britney B. TnK0Tb! C. Dietcoke D. ZunSp0ts

A, C. Although it is debatable what a "good" password might be, a proper name (Britney) is easy for a password guesser to guess. A password should contain a combination of letters, numbers, and symbols (such as space, comma, period, and so on). Varying case and mixing words can also help expand the number of possibilities that must be covered by a password-guessing program before the password is discovered. For more information, see Chapter 4.

What information does the inode contain? Choose all that apply. A. The type of the file B. File directory information C. The number of bytes in the file D. Logical volume information

A, C. An inode contains all of the information about a file except its name, which is kept in a directory. The inode information is kept in the cylinder information block and contains the following: The type of the file (regular, directory, block special, character special, link, and so on) The mode of the file (the set of read/write/execute permissions) The number of hard links to the file The user id of the file's owner The group id to which the file belongs The number of bytes in the file An array of 15 disk-block addresses The date and time the file was last accessed The date and time the file was last modified The date and time the file was created For more information, see the "The inode" section.

Which of the following file systems can reside on a local physical disk? (Choose two.) A. HSFS B. TMPFS C. UFS D. NFS

A, C. The High Sierra file system (HSFS) is a read-only file system used on CD-ROMs. The UNIX file system (UFS) is the default disk-based file system used by Solaris. TMPFS resides in memory. Data in this type of file system is destroyed upon reboot. NFS is the Network File System, which is remotely mounted over the network. For more information, see Chapter 1, "Managing File Systems."

What would you use the prstat command to do? (Choose two.) A. Get information on all the processes for a particular user. B. Determine disk usage. C. Determine which processes are consuming the most CPU cycles. D. Change system run levels.

A, C. The prstat command is used from the command line to monitor system processes. Like the ps command, it provides information on active processes. The difference is that you can specify whether you want information on specific processes, UIDs, CPU IDs, or processor sets. By default, prstat displays information about all processes sorted by CPU usage. prstat does not display disk usage; you use the df command to display that information. prstat is not used to change system run levels; you use the init command for that. For more information, see Chapter 5, "Managing System Processes."

Which of the following can be used to delete a printer? (Choose two.) A. lpadmin -x<printer-name> B. lpshut <printer-name> C. Print Manager D. lpadmin -D <printer-name>

A, C. To delete a printer from the system, you can use either the lpadmin -x command or the Print Manager interface. For more information, see the section "Deleting Printers and Managing Printer Access."

Which of the following commands show all patches applied to a system? Choose all that apply. A. patchadd -p B. pkginfo C. showrev -p D. smpatch

A, C. Use the patchadd -p command or the showrev -p command to show all patches that have been applied to a system. For more information, see the "Obtaining a Patch" section.

Which of the following commands finds all processes that have dt in the process argument string? Choose all that apply. A. pgrep -l -f dt B. ps -ef dt C. ps -el dt D. ps -ef|grep dt

A, D. Use the pgrep and ps commands to view processes running on your system. The commands pgrep -l -f dt and ps -ef|grep dt find all the processes that have dt in the process argument string and display them.

To what does a umask value of 022 set the default permissions on a file? A. 644 B. 755 C. 022 D. 533

A. A umask value of 022 sets the default permission on a file to 644 (rw-r--r--). For more information, see the section "Controlling File Access."

What is /pci@1f,0/pci@1,1/ide@3/disk@0,0? A. Full device pathname B. Physical device C. Logical device D. Instance

A. A full device pathname is a series of node names separated by slashes (/). The root of the tree is the machine node, which is not named explicitly but is indicated by a leading slash. Each device pathname has this form: driver-name@unit-address:device-arguments For more information, see the section "PROM Device Tree (Full Device Pathnames)."

Which of the following best describes a physical device name? A. It represents the full device pathname of a device. B. It is equivalent to the SCSI target ID of a device. C. It represents the actual name of a device, such as a disk, tape, and so on. D. It represents the kernel's abbreviated name for a device on the system.

A. A physical device name represents the full device pathname of the device. Physical device files are found in the /devices directory and have the following naming convention: /devices/sbus@1,f8000000/esp@0,40000/sd@3,0:a For more information, see the "Physical Device Name" section.

Which of the following is a system that provides services to other systems in its networked environment? A. Server B. Client C. File server D. AutoClient server

A. A server is a system that provides services or file systems, such as home directories or mail files, to other systems on the network. For more information, see the "Servers" section.

What is a software package? A. A group of files and directories that describe a software application B. A logical collection of software packages C. A collection of files that make up a software application D. A collection of files and directories

A. A software package is a collection of files and directories in a defined format. It is a group of files and directories that describe a software application. For more information, see the "Software Terminology" section.

What is the maximum length of a username? A. Eight characters B. Six characters C. Seven characters D. Unlimited

A. A user login name can contain two to eight uppercase characters (A-Z) or lowercase characters (a-z) or digits (0-9), but no underscores or spaces. The first character must be a letter, and at least one character must be a lowercase letter. For more information, see the section "Adding User Accounts with the SMC."

For which of the following is custom JumpStart used? A. To install the Solaris software on 50 identical systems B. To start a system that refuses to boot C. To set up AutoClient systems on a server D. To interactively guide you, step by step, in installing the Solaris software

A. Custom JumpStart allows you to automatically and identically install many systems with the same configuration without having to configure each of them individually. For more information, see the "Custom JumpStart" section.

Where is disk configuration information stored? A. On the disk label B. In several locations on the disk C. In the superblock D. In the partition table

A. Disk configuration information is stored on the disk label. For more information, see the "Displaying Disk Configuration Information" section.

If something is causing the file system to be busy, which of the following commands can you use to list all the processes accessing the file system? A. fuser B. mount C. ps D. finger

A. If something is causing the file system to be busy, you can use the fuser command to list all of the processes accessing the file system and to stop them if necessary. For more information, see the "The fuser Command" section.

On file permissions, what does the w in the example -rwxr-xr-x mean? A. Write privileges for the owner B. Write privileges for the owner and group C. Write privileges for everyone D. Write privileges for root only

A. On files, the w in the first field of the permissions list designates write privileges for the owner. For more information, see the section "Controlling File Access."

In output from the ps command, what does an R stand for in the S field? A. The process is on the run queue. B. The process is receiving input. C. It is a regular process. D. The process is sleeping, so it must be restarted.

A. In output from the ps command, the R in the S field means that the process is on the run queue.

What best describes a logical device name? A. It is a symbolic link to a physical device file. B. It represents the kernel's abbreviated name for every possible device on the system. C. It represents the full device pathname of a device. D. It defines the SCSI address of a disk device.

A. Logical device files in the /dev directory are symbolically linked to physical device files in the /devices directory. For more information, see the "Logical Device Name" section.

Logical devices are organized in subdirectories under which directory? A. /dev B. /devices C. /kernel D. /

A. Logical device names are used with most Solaris file system commands to refer to devices. Logical device files in the /dev directory are symbolically linked to physical device files in the /devices directory. For more information, see the "Logical Device Name" section.

You can remove a link using which of the following commands? A. rm B. rmdir C. rm -l D. rmlink

A. Remove a link using the rm command. For more information, see the "Soft (Symbolic) Links" section.

Which of the following gives the system administrator the flexibility to disable numerous network services during the installation of the OS, thus limiting your risk of exposure over the network while still providing a useful system? A. Secure by Default B. netservices limited C. netservices open D. Comment selected services in the inetd.conf file

A. Secure by Default gives the system administrator the flexibility to disable numerous network services during the installation of the OS, thus limiting your risk of exposure over the network while still providing a useful system. SBD can also be disabled using the netservices limited command, but this command is used after the OS has been installed. For more information, see the "Secure by Default" section.

Which of the following files gives a specified user permission to log in remotely from the specified host without having to supply a password? A. .rhosts B. /etc/hosts.equiv C. /etc/default/login D. /etc/hosts

A. The .rhosts file is the user equivalent of the /etc/hosts.equiv file. It contains a list of trusted hosts for a remote system, as well as a list of users. If a host/user combination is listed in this file, the specified user is granted permission to log in remotely from the specified host without having to supply a password. For more information, see the section "The .rhosts File."

Which one of the following signals kills a process unconditionally? A. 9 B. 0 C. 15 D. 1

A. Signal 9 stops a process unconditionally.

What is another name for swap space and the total physical memory combined? A. Virtual memory B. Random Access Memory C. Partition C or Slice 2 D. Static memory

A. Swap space plus the total amount of physical memory is also referred to as virtual memory. For more information, see the "Virtual File Systems" section.

Which of the following files can the system administrator modify to specify the program that should be called if media events happen, such as eject or insert? A. /etc/vold.conf B. /etc/rmmount.conf C. /etc/inittab D. /etc/mnttab

A. The "Actions" section of the vold.conf file specifies which program should be called if a particular event (action) occurs such as eject or insert. For more information, see the "Volume Management" section.

Which SMF command displays the services that must be running before the multi-user milestone is reached? A. svcs -d milestone/multi-user B. svcs -D milestone/multi-user C. svcs -p milestone/multi-user D. svcs -l milestone/multi-user

A. The -d option for the svcs command lists the services or service instances upon which the multi-user service instance is dependent on. For more information, see the section "SMF Command-Line Administration Utilities."

Which one of the following commands lists all processes running on the local system? A. ps -e B. ps -a C. ps -f D. ps -t

A. The -e option to the ps command lists all processes currently running on the system. The other options only list processes for the local user.

The .conf files reside in which directory? A. /kernel/drv B. /dev C. /devices D. /platform

A. The .conf files reside in the /kernel/drv directories. For more information, see the "Device Autoconfiguration" section.

UID 0 is typically which of the following? A. root B. A daemon C. adm D. lpr

A. The UID for the root login is always 0. For more information, see the section "Securing Superuser Access."

Which of the following stores the procedures used to boot the system? A. Boot block B. Superblock C. inode D. Disk label

A. The boot block stores the procedures used in booting the system. Without a boot block, the system does not boot. For more information, see the "Components of the UFS" section.

Which sequence of events best describes the boot process on a Sun SPARC system? A. Boot PROM phase, boot program phase, kernel initialization phase, init phase, and svc.startd phase B. Boot program phase, boot PROM phase, kernel initialization phase, svc.startd phase, and init phase C. Boot program phase, boot PROM phase, init phase, kernel initialization phase, svc.startd phase D. Boot PROM phase, boot program phase, svc.startd phase, kernel initialization phase

A. The boot process goes through the following five phases: boot PROM phase, boot programs phase, kernel initialization phase, init phase, and svc.startd phase. For more information, see the section "Booting a SPARC System."

Which of the following programs is responsible for executing ufsboot? A. bootblk B. kernel C. init D. boot

A. The bootblk program finds and executes the secondary boot program, called ufsboot, from the UFS and loads it into memory. For more information, see the section "Booting a SPARC System."

What resides in blocks 1 to 15 of the startup device? A. bootblk B. superblock C. kernel D. ufsboot

A. The bootblock resides in blocks 1 to 15 of the startup device. For more information, see the section "The boot Command."

Which one of the following sends a terminate signal (signal 15) to a process with a PID of 2930? A. kill 2930 B. stop 2930 C. Ctrl+C D. cancel 2930

A. The command kill 2930 sends a terminate signal (signal 15) to a process with a PID of 2930.

Which one of the following commands kills a process named test? A. pkill test B. kill test C. ps -ef||grep kill| kill -9 D. kill -test

A. The command pkill test kills a process named test.

Which of the following represents the correct format for an entry in the /etc/vfstab file? A. device to mount, device to fsck, mount point, FS type, fsck pass, mount at boot, mount options B. device to fsck, device to mount, mount point, FS type, fsck pass, mount at boot, mount point C. mount point, device to mount, device to fsck, mount point, FS type, fsck pass, mount at boot D. mount point, device to fsck, device to mount, mount point, FS type, fsck pass, mount at boot

A. The correct format for the /etc/vfstab file is as follows: device to mount, device to fsck, mount point, FS type, fsck pass, mount at boot, mount options. For more information, see the "Creating an Entry in the /etc/vfstab File to Mount File Systems" section.

Which of the following is the preferred command to create entries in the /dev directory for disk drives attached to the system? A. devfsadm B. add_drv C. drvconfig D. boot -r

A. The devfsadm command can be used to create entries in the /dev directory for disk drives attached to the system. For more information, see the "Instance Names" section.

Which of the following is the daemon responsible for handling both reconfiguration boot processing and updating /dev and /devices in response to dynamic reconfiguration event notifications from the kernel? A. devfsadmd B. inetd C. devfsdadm D. svc.startd

A. The devfsadmd daemon is the daemon responsible for handling both reconfiguration boot processing and updating /dev and /devices in response to dynamic reconfiguration event notifications from the kernel. For more information, see the "Instance Names" section.

Which of the following commands displays disk space occupied by mounted file systems? A. df B. du C. ls D. printenv

A. The df command with no options lists all mounted file systems and their device names. It also lists the total number of 512-byte blocks used and the number of files. For more information, see the "Displaying a File System's Disk Space Usage" section.

In Solaris, which of the following is referred to as the smallest allocable unit of disk space? A. Fragment B. Data block C. Logical block D. Byte

A. The file system fragment size is the smallest allocable unit of disk space, which by default is 1024 bytes. For more information, see the "Information on File Systems" section.

What does the following command sequence do? #cd /home/myjunk #tar cvf /dev/rmt/0 . A. It takes all the files in /home/myjunk, packages them into a single tar archive on /dev/rmt/0, and prints a commentary on the process. B. It extracts the contents of the tape at /dev/rmt/0 to /home/myjunk. C. It tars all the files in /dev/rmt/0 to /home/myjunk, creates a table of contents, and ignores checksum errors. D. It tars all the files in the current directory into two separate archives—one for the contents of myjunk and one for the rest of /home.

A. The first command changes your working directory, and the second creates the tar file. The commands shown in the example take all the files in the /home/myjunk directory, package them into a single tar archive on /dev/rmt/0, and print a commentary of the process. For more information, see the section "The tar Utility."

Which of the following is not a virtual file system? A. /export/home B. Tmpfs C. Cachefs D. Procfs

A. The following are virtual file systems: swapfs, procfs, lofs, cachefs, tmpfs, and mntfs. For more information, see the "Virtual File Systems" section.

Which of the following commands stops all processes that are using the /home2 file system? A. fuser -c -k /home2 B. fuser -k /home2 C. kill -9 /home2 D. umount /home2

A. The following command stops all processes that are using the /home2 file system by sending a SIGKILL to each one: fuser -c -k /home2. For more information, see the "The fuser Command" section.

The hardware-level user interface that you see before the operating system has been started is called what? A. OpenBoot B. EEPROM C. Firmware D. Boot PROM

A. The hardware-level user interface that you see before the operating system starts is called the OpenBoot PROM (OBP). For more information, see the section "The OpenBoot Environment."

What best describes an instance name? A. The kernel's abbreviated name for every possible device on the system B. A symbolic link to a physical device file C. The full device pathname of a device D. The SCSI address of a disk drive

A. The instance name represents the kernel's abbreviated name for every possible device on the system. For example, sd0 and sd1 represent the instance names of two SCSI disk devices. For more information, see the "Instance Names" section.

Which of the following represents the kernel's abbreviated name for every possible device on the system? A. Instance name B. Logical device C. Physical device name D. Pseudo device name

A. The instance name represents the kernel's abbreviation name for every possible device on the system. For more information, see the "Device Drivers" section.

What consists of a small static core and many dynamically loadable modules? A. The kernel B. ufsboot C. The shell D. The bootblock

A. The kernel consists of a two-piece static core that is made up of genunix and unix. genunix is the platform-independent generic kernel file, and unix is the platform-specific kernel file. When the system boots, ufsboot combines these two files and many dynamically loadable modules into memory to form the running kernel. For more information, see the section "The Kernel."

Which of the following mount options is used to mount file systems that have files larger than 2GB? A. largefiles B. nolargefiles C. lf D. nlf

A. The largefiles mount option lets users mount a file system containing files larger than 2GB. For more information, see the "Mounting File Systems" section.

Which one of the following logs keeps a record of all cron activity? A. /var/cron/log B. /var/spool/cron/log C. /var/adm/cron D. /var/adm/messages

A. The log file named /var/cron/log keeps a record of all cron activity.

/dev/dsk/c0t0d0s7 is what type of device? A. Logical device name B. Pseudo device name C. Full device path name D. Instance name

A. The logical device name is a link from the /dev directory to the physical device name located in the /devices directory. The following is an example of a logical device name: /dev/dsk/ c0t0d0s7. For more information, see the "Logical Device Name" section.

What is the sitewide initialization file for the C shell called? A. /etc/.login B. /etc/login C. $HOME/.login D. /etc/skel/local.login

A. The sitewide initialization file for the C shell is /etc/.login. For more information, see the section "Setting Up Shell Initialization Files."

What is the sitewide initialization file for the Korn shell called? A. /etc/profile B. $HOME/.profile C. /etc/.profile D. /etc/skel/local.profile

A. The sitewide initialization file for the Korn shell is /etc/profile. For more information, see the section "Setting Up Shell Initialization Files."

What determines the number of inodes to be created in a new file system? A. The number of inodes depends on the amount of disk space that is allocated for each inode and the total size of the file system. B. 2048 inodes are created per 1GB of file system space. C. The number is dynamic and the kernel assigns inodes as required by the number of files in a file system. D. By default, one inode is allocated for each 2KB of data space.

A. The number of inodes depends on the amount of disk space that is allocated for each inode and the total size of the file system. For more information, see the "inode" section.

Which of the following service states indicates that the service is configured to run, but is not yet running or available to run? A. Offline B. Maintenance C. Disabled D. Degraded

A. The offline status indicates that a service instance is enabled (configured to run), but the service is not yet running or available to run. A disabled service is configured not to start. For more information, see the section "SMF Command-Line Administration Utilities."

Which of the following methods are used to remove software packages from a system? A. pkgrm B. rm -r C. AdminTool D. All of the above

A. The pkgrm command removes software packages from the system. For more information, see the "Tools for Managing Software" section.

What does the plus sign (+) to the right of the permission mode field indicate (-rw-r-----+)? A. The file has an ACL. B. The sticky bit is set. C. setuid permission has been set on the file. D. It sets group ID on execution.

A. The plus sign (+) to the right of the permission mode field (-rw-r-----+) indicates that the file has an ACL. For more information, see the section "Setting ACL Entries."

Which of the following daemons services all printers? A. lpsched B. lpd C. lpr D. spoold

A. The print scheduler, lpsched, handles print requests on print servers. For more information, see the section "Restarting the Print Scheduler."

Which of the following is a system that has a local printer connected to it and makes the printer available to other systems on the network? A. Print server B. Print client C. Client D. Server

A. The print server is a system that has a local printer connected to it and makes the printer available to other systems on the network. For more information, see the section "Print Servers Versus Print Clients."

Which one of the following commands is issued to increase the priority of PID 8200? A. renice -n -4 -p 8200 B. nice -n -4 -p 8200 C. nice -i 8200 D. renice -I -p 8200

A. The renice -n -4 -p 8200 command is issued to increase the priority of a process with a PID of 8200.

Which of the following loads the operating system kernel? A. ufsboot B. openBoot C. bootblk D. init

A. The secondary startup program, ufsboot, loads the two-part operating system kernel. For more information, see the section "Booting a SPARC System."

What information is not required to install a server system? A. The server's Ethernet address B. The server's hostname C. The server's IP address D. The server's geographic region

A. The server's Ethernet address is not required to install a server system. During the installation, you are prompted to enter the IP address, hostname, and geographic region. For more information, see the "The Solaris Installation Prechecklist" section.

Which is not one of the six software groups in Solaris 10? A. Entire system support B. Reduced networking support C. Developer system support D. Entire distribution plus OEM system support

A. The six software groups are reduced networking support, core system support, end-user support, developer system support, entire distribution, and entire distribution plus OEM system support. For more information, see the "Software Groups" section.

Which of the following commands will display partition information about a disk? A. prtvtoc B. sysdef C. df -k D. sysinfo

A. The slice information for a particular disk can be viewed by using the prtvtoc command. For more information, see the "Disk Slices" section.

What is the minimum amount of RAM required to install Solaris 10 on a SPARC-based system? A. 256MB B. 512MB C. 96MB D. 128MB

A. The system on which you will install Solaris 10 must have a minimum of 256MB of RAM; however, 512MB of RAM is recommended. For more information, see the "Minimum System Requirements" section.

What are the three phases of the installation process? A. System configuration, installation, and post installation B. Power on, boot from CD, execute the installation program C. Boot from CD, start installation program, post installation D. Boot from CD, system configuration, software installation

A. The three phases of the installation process are system configuration, installation, and post installation. For more information, see the "Introduction" section.

Which of the following commands is used to instruct the system to mount the floppy automatically? A. volcheck B. vold C. mount D. automount

A. The volcheck command instructs vold to look at each device and determine if new media has been inserted into the drive. The system administrator issues this command to check the drive for installed media. By default, it checks the drive to which /dev/diskette points. For more information, see the "Volume Management" section.

Which of the following commands displays the time and date of the last reboot? A. who -b B. who -i C. uptime D. uname

A. The who -b command displays the time and date of the last reboot. For more information, see the section "Checking Who Is Logged In."

What is the proper syntax to set the default path in the Korn shell? A. PATH=</dirname1>:</dirname2>:</dirname3>:.; export PATH B. setenv path =(</dirname1> </dirname2> /dirname3> .) C. set path =(</dirname1> </dirname2> </dirname3> .) D. setenv PATH </dirname1>:</dirname2>:</dirname3>

A. To set the default path in the Korn shell, you issue the following command: PATH=</dirname1>:</dirname2>:</dirname3>:.; export PATH. For more information, see the section "Setting Up Shell Initialization Files."

Which of the following commands adds the printer luna to the class roughdrafts? A. lpadmin -p luna -c roughdrafts B. lpadmin -class roughdrafts -p luna C. lpadmin luna -c roughdrafts D. lpadmin -cp roughdrafts luna

A. To add a printer to a class, you use the following command syntax: lpadmin -p <printer-name> -c <printer-class>. For more information, see the section "Creating Printer Classes."

Say you have the following backup schedule: First Monday of the month—level 0 (tape 1) All other Mondays—level 1 (tape 2) Wednesdays—level 2 (tape 3) Fridays—level 4 (tape 4) Which tapes would be needed to fully restore the system if it goes down the second Saturday of the month? A. All four of them B. Tapes 2 through 4 C. Tapes 1, 2, and 4 D. Tapes 1, 3, and 4

A. To restore the data from backups, you first load the level 0 tape created the first Monday of the month, followed by the level 2 tape, followed by the level 3 tape, and finally the level 4 tape. For more information, see the section "The ufsdump Utility."

What is the proper syntax to set the default path in the C shell? A. set path = (</dirname1> </dirname2> </dirname3> .) B. PATH=</dirname1:/dirname2>:</dirname3>:.; export PATH C. setenv path =(</dirname1> </dirname2> </dirname3> .) D. set path=</dirname1> </dirname2> </dirname3>

A. To set the default path in the C shell, you issue the following command: set path = (</dirname1> </dirname2> </dirname3>.) For more information, see the section "Setting Up Shell Initialization Files."

Which of the following options do you type the mount command with to display a list of mounted file systems in /etc/vfstab format? A. -p B. -v C. -f D. -a

A. Type the mount command with the -p option to display a list of mounted file systems in /etc/vfstab format. For more information, see the "Creating an Entry in the /etc/vfstab File to Mount File Systems" section.

Which of the following causes high fragmentation? A. Creating large numbers of small files B. Creating large numbers of large files C. Not enough disk space D. A file's disk blocks being inefficiently scattered across the whole file system

A. Typically, creating large numbers of small files causes high fragmentation. The solution is to either create a larger file system or to decrease the block size (finer granularity). For more information, see the "Displaying a File System's Disk Space Usage" section.

What is the maximum UID number in Solaris 10? A. 2,147,483,647 B. 60,000 C. 120,000 D. Unlimited

A. UID numbers for regular users should range from 100 to 60,000, but they can be as high as 2,147,483,647. For more information, see the section "Adding User Accounts with the SMC."

You need to perform a backup of the root file system without bringing the system to single-user mode or unmounting the root file system. Which is the best method of backing up an active, mounted file system? A. fssnap, and then use ufsdump on the snapshot B. fnssnap, and then use ufsdump on the snapshot C. flarcreate, and then use ufsdump on the snapshot D. ufsdump alone can be used to back up an active file system. E. fssnapshot, and then use ufsdump on the snapshot

A. Unlike ufsdump, fssnap enables you to keep the file system mounted and the system in multi-user mode during backups. The snapshot is stored to disk, and then you can use Solaris backup commands such as ufsdump, tar, and cpio to back up the UFS snapshot. The result is a more reliable backup. For more information, see the section "The UFS Snapshot Utility."

What should you do to disable UFS logging on a file system? A. Use the -o nologging option with the mount command. B. Use the -l option with the mount command. C. You don't need to do anything; nologging is the default when mounting a file system. D. Use the logging feature in the newfs command when creating the file system.

A. Use the -o nologging option of the mount command to disable UFS logging on a file system. Logging is the default. For more information, see the "Mounting File Systems" section.

Which of the following commands shows you the disk usage of each file in each subdirectory of a file system? A. du B. df C. ls D. printenv

A. Use the du (directory usage) command to report the number of free disk blocks and files. For more information, see the "Displaying a File System's Disk Space Usage" section.

Which of the following commands do you issue to determine whether a file system is a UFS? A. fstyp B. prtvtoc C. format D. newfs -v

A. Use the fstyp command to determine a file system type. For example, use it to check whether a file system is a UFS. For more information, see the "The fstyp Command" section.

Which of the following commands do you use to view a full listing of file system parameters? A. fstyp B. mkfs C. newfs D. prtvtoc

A. Use the fstyp command to view file system parameters. Use the -v option to obtain a full listing of a file system's parameters. For more information, see the "The fstyp Command" section.

Which command is used to transition your system into the single-user milestone from the multiuser milestone? A. svcadm milestone single-user B. svcadm milestone/single-user C. init -s D. init single-user

A. Use the svcadm milestone single-user command to switch into the single-user milestone. For more information, see the section "Starting Services During Boot."

Which of the following commands displays each user logged in and the active processes owned by each user? A. whodo B. who C. w D. who -u

A. Use the whodo command to display each user logged in and the active processes owned by that user. For more information, see the section "The whodo Command."

Volume Manager provides access to the CD-ROM and floppy devices through which of the following directories? A. /vol/dev B. /dev/vol C. /dev D. /vold

A. Volume Manager provides access to the floppy disk and CD-ROM devices through the /vol/dev directory. For more information, see the "Volume Management" section.

When a file system is mounted, where are entries maintained? A. /etc/mnttab B. /etc/vfstab C. /etc/fstab D. /mnt

A. When a file system is mounted, an entry is maintained in the mounted file system table called /etc/mnttab. This file is actually a read-only file system and contains information about devices that are currently mounted. For more information, see the "Mounting File Systems" section.

The kernel reads which of the following files when loading? (This is where system configuration information is stored.) A. /etc/system B. kernel/sparcv9/unix C. /etc/inittab D. /kernel/unix

A. When the kernel is loading, it reads the /etc/system file, where system configuration information is stored. This file modifies the kernel's parameters and treatment of loadable modules. For more information, see the section "The Kernel."

What is the best way to delete a login but retain the user's files? A. Delete the login but deselect the Delete Home Directory check box. B. Change the password on the login. C. Change the UID of the login. D. Delete the login, but don't delete files by using the rm command.

A. When you delete a user account in the SMC, you deselect the Delete Home Directory check box to retain all the user's files. For more information, see the section "Deleting User Accounts with the SMC."

When adding a printer by using Print Manager, what is the Printer Server field used for? A. It defines the name of the system to which the printer is connected. B. It defines the system as a print server. C. It selects a system from which to download the print software. D. It defines a system that can spool to the local printers.

A. When you use Print Manager to add a printer, the Printer Server field defines the name of the system (hostname) to which the printer is connected. For more information, see the section "Setting Up a Printer by Using Print Manager."

Which of the following makes a secure password? A. A combination of six or more letters B. Your name forward, backward, or jumbled C. Keyboard patterns (such as asdfgh) D. Any word in the dictionary

A. You should ensure that passwords contain a combination of 6-8 letters, numbers, or special characters. For more information, see the section "Controlling System Access."

Which of the following commands changes a print request with the request ID eps1-29 to priority level 1? A. lp -i eps1-29 -q 1 B. lpadmin -i eps1 -q 0 C. lp -i eps1-29 -q 39 D. lpadmin -i eps1 -q 39

A. You use the lp command to change the priority of a print job to priority level 1: lp -I <job name> -q 1. For more information, see the section "Changing the Priority of a Print Request."

Which of the following commands displays the characteristics of the printer hplaser? A. lpstat -p hplaser -l B. lpstat -p hplaser C. lpadmin -p hplaser -l D. lpstat -a -p hplaser -l

A. You use the lpstat command to display the characteristics of a particular printer: lpstat -p <printer-name> -l. For more information, see the section "Checking Printer Status."

Which of the following commands is used to delete an ACL? A. setfacl -d <acl-entry-list> B. delfacl C. chown -acl D. setfacl -m

A. You use the setfacl -d command to delete an ACL on a file or directory. For more information, see the section "Setting ACL Entries."

Which of the following commands is used to set ACL entries on a file? A. setfacl B. chmod C. chown D. getfacl

A. You use the setfacl command to set ACL entries on a file or directory. For more information, see the section "Setting ACL Entries."

What is the function of the auto-boot? parameter that is set in the OpenBoot PROM? A. Boots automatically after power-on or reset B. Sets the default boot device C. Reboots after a watchdog reset D. Automatically performs a system reboot when a system core file has been generated

A. auto-boot? controls whether the system automatically starts up after a system reset or when the power is turned on. The default for this variable is true. When the system is powered on, the system automatically starts up to the default run level. For more information, see the section "OpenBoot NVRAM."

The bootstrap procedure consists of which of the following basic phases? (Choose three.) A. Load the kernel. B. Automatically boot the system if the auto-boot? parameter is set to true. C. Hardware powerup. D. Execute a power-on self-test (POST).

B, C, D. On SPARC-based Solaris systems, the bootstrap procedure consists of some basic phases. First, the system hardware is powered on, and the system firmware (PROM) executes a power-on self-test (POST). After the tests have completed successfully, the firmware attempts to autoboot if the appropriate OpenBoot configuration variable (auto-boot?) has been set to true. Otherwise, it enters interactive OpenBoot command mode. The bootstrap procedure does not include loading the kernel. For more information, see Chapter 3.

If the user doesn't specify a printer name, which of the following environment variables tells the print service where to print? (Choose two.) A. $HOME B. $LPDEST C. $PRINTER D. $DEFAULT_DEST

B, C. If the user doesn't specify a printer name or class in a valid style, the print command checks the user's PRINTER or LPDEST environment variable for a default printer name. For more information, see the section "Setting a User's Default Printer."

Which commands display active system processes and update at a specified interval? Choose all that apply. A. ps B. prstat C. sdtprocess D. ptree

B, C. The prstat and sdtprocess commands display active system processes and can be configured to update at a specified interval.

Which utilities can be used to show the process ancestry tree? Choose all that apply. A. ps B. ptree C. sdtprocess D. prsta

B, C. The utilities ptree and sdtprocess are used to show the process ancestry tree.

Which of the following are valid printer ports? (Choose two.) A. /dev/terma B. /dev/term/a C. /dev/ecpp0 D. /dev/term/ttya

B, C. Valid printer ports on a Solaris system include /dev/term/a, /dev/term/b, and /dev/ecpp0. For more information, see the section "Setting Up a Printer by Using Print Manager."

Which of the following can be used to add a local printer to a print server? (Select the two best answers.) A. SMC B. Print Manager C. lpadmin D. lp

B, C. You can use Print Manager or lpadmin to add a local printer to a print server. For more information, see the section "Setting Up a Printer by Using the lpadmin Command."

Which of the following is a service identifier used to identify a specific service within the Service Management Facility? (Choose two.) A. Milestone B. lrc:/etc/rc3.d/S90samba C. svc:/system/filesystem/local:default D. /var/svc/manifest/milestone/multi-user.xml

B, C. lrc:/etc/rc3.d/S90samba is the FRMI for a legacy service. svc:/system/filesystem/local:default is an example of a service identifier within the SMF. A milestone is a special type of service made up of a defined set of other services, but it does not define a specific service. /var/svc/manifest/milestone/multi-user.xml describes the dependencies for a milestone. For more information, see Chapter 3.

If a nonroot user does not want to use the system default printer, how can that user select another printer to be the default? (Choose two.) A. lpadmin B. Specify the printer in the $HOME/.printers file. C. lpstat -d <printername> D. Set the LPDEST variable. E. /usr/sadm/admin/bin.printmgr

B, D. The Print Manager allows the system administrator to set the default printer. If the user doesn't specify a printer name or class in a valid style, the command checks the printers entry in the /etc/nsswitch.conf file for the search order. By default, the /etc/nsswitch.conf file instructs the command to search the user's PRINTER or LPDEST environment variable for a default printer name. The user can set these variables. If neither environment variable for the default printer is defined, the command checks the .printers file in the user's home directory for the default printer alias; again, the user can set up this file. If the command does not find a default printer alias in the .printers file, it checks the print client's /etc/printers.conf file for configuration information. If the printer is not found in the /etc/printers.conf file, the command checks the name service (NIS or NIS+), if any. You must be root or a member of group 14 to use the Print Manager or the lpadmin command to set a system default printer. For more information, see Chapter 6, "Managing the LP Print Service."

Which of the following should you issue to stop the volume management daemon? A. svcadm stop svc:/system/filesystem/volfs:default B. /etc/init.d/volmgt stop C. ps -ef|grep vold, then kill the process ID for vold D. svcadm disable volfs

B, D. You can run the following run control script to stop the volume management daemon: /etc/init.d/volmgt stop. Or, stop the daemon using: svcadm disable volfs. For more information, see the "Troubleshooting Volume Manager" section.

To boot a system into a single-user state, which commands do you enter at the ok prompt? (Choose two.) A. boot B. boot -s C. boot -a D. boot -m milestone=single-user

B, D. You issue the boot -s command or the boot -m milestone=single-user at the OpenBoot ok prompt to boot the system into single-user mode. You can also boot to a specific milestone using the boot -m command. For more information, see the section "Booting a SPARC System."

In Solaris 10, which of the following commands stops the print service? A. lpsched B. lpshut C. cancel D. disable E. svcadm

B, E. The lpshut command is used to disable (stop) the print service; however, svcadm disable is preferred over lpshut. For more information, see the section "SVR4 Print Service."

If you want to create permanent aliases in NVRAM (that show up after a reboot), which of the following commands should you use? (Choose two) A. devalias B. nvalias C. setenv D. eeprom

B,D. You use the nvalias command from the OpenBoot PROM or the eeprom command from the UNIX prompt to create a permanent alias in NVRAM that remains in effect even after a reboot. For more information, see the section "OpenBoot Device Aliases."

Which of the following is the directory that provides character device access for the media in the primary floppy drive? A. /vol/dev/diskette0 B. /dev/rdiskette C. /vol/dev/aliases/floppy0 D. /floppy/floppy0

B. /dev/rdiskette and /vol/dev/rdiskette0 are the directories providing character device access for the medium in the primary floppy drive, usually drive 0. For more information, see the "Volume Management" section.

Which type of link cannot span file systems? A. Symbolic link B. Hard link C. Hardware link D. Software link

B. A hard link cannot span file systems, but a symbolic link can. For more information, see the "Hard Links" section.

What does a restricted shell not allow the user to do? A. Change directories. B. Redirect output. C. Remove files. D. Execute scripts.

B. A restricted shell does not allow the user to change directories or redirect output. For more information, see the section "Restricted Shells."

To what does a umask value of 022 set the default permissions on a directory? A. 644 B. 755 C. 022 D. 533

B. A umask value of 022 sets the default permission on a directory to 755 (rwxr-xr-x). For more information, see the section "Controlling File Access."

Which of the following commands is not large file-aware? A. labelit B. vi C. mkfs D. mount

B. A utility is called large file-aware if it can process large files in the same manner that it does small files. A large file—aware utility can handle large files as input and can generate large files as output. The vi command is not large file-aware. For more information, see the "Mounting a File System with Large Files" section.

Shell scripts that run setuid or setgid can be sufficiently secure. A. True B. False

B. Except for the executables that are shipped with the setuid bit set to root, you should disallow the use of setuid programs. For more information, see the section "The setuid and setgid Programs."

Where is the spool directory located in Solaris? A. /var/spool/lpd B. /var/spool/lp C. /usr/spool/lp D. /usr/spool/lpd

B. For Solaris, the spool directory is located in /var/spool/lp. For more information, see the section "The Print Spooler."

What can you do if CONSOLE= is included in the /etc/default/login file? A. Log in as root from the network and console. B. Log in as a regular user and then use su to become root. C. Log in as root from the console but not from the network. D. Log in as root from the network but not from the console.

B. In the /etc/default/login file, with no value defined for the variable CONSOLE, root cannot log in from anywhere—not even the console. The only way to get in to the system as root is to first log in as a regular user and become root by issuing the su command. For more information, see the section "Restricting Root Access."

Which of the following is a character device name? A. /dev/dsk/c0t3d0s0 B. /dev/rdsk/c0t3d0s0 C. /dev/cua D. /devices/sbus@1,f8000000/esp@0,40000/sd@3,0:a

B. In the character device name /dev/rdsk/c0t3d0s0, the /rdsk directory refers to the character or raw device file. The r in rdsk stands for raw. For more information, see the "Block and Raw Devices" section.

Which of the following are mapped to a physical device name in the /etc/path_to_inst file? A. Logical devices B. Instance names C. Physical devices D. Pseudo devices

B. Instance names are mapped to a physical device name in the /etc/path_to_inst file. For more information, see the "Instance Names" section.

Which of the following is not a task of the OpenBoot firmware? A. Testing and initializing the system hardware B. Loading the kernel C. Starting up the operating system from either a mass storage device or from a network D. Allowing modification and management of system startup configuration, such as NVRAM parameters

B. OpenBoot runs POSTs to initialize the system hardware. It also loads the primary startup program, bootblk, from the default startup device. The bootblk program finds and executes the secondary startup program, ufsboot, and loads it into memory. From that point, the ufsboot program loads the operating system kernel. For more information, see the section "The OpenBoot Environment."

Password aging and encryption are stored in which of the following files? A. /etc/passwd B. /etc/shadow C. /etc/default/passwd D. /etc/default/login

B. Password encryption and password aging details are stored in the /etc/shadow file. For more information, see the section "Where User Account Information Is Stored."

Which command is used to obtain a detailed view of the service state of all service instances in the configuration repository? A. inetadm -a B. svcs -a C. svcadm -a D. svcprop -l

B. Running the svcs command without options displays the status of all enabled services. Use the -a option to list all services, including disabled services. For more information, see the section "SMF Command-Line Administration Utilities."

What do software packages names usually start with? A. An abbreviation of the software package B. The company's stock symbol C. SUNW D. Anything the vendor chooses

B. Software package names usually start with the company's stock symbol. For more information, see the "Adding and Removing Software Packages" section.

What is a software group? A. A group of files and directories that describe a software application B. A logical collection of software packages C. Any software that can be installed on Solaris D. A collection of files that make up a software application

B. Software packages are grouped into software clusters, which are logical collections of software packages. For more information, see the "Software Terminology" section.

On an x86/x64-based system, which of the following is the bootloader? A. The BIOS B. GRUB C. The primary boot archive D. mboot

B. Solaris 10 utilizes an open-source bootloader called GRUB (Grand Unified Boot Loader). For more information, see the section "GRUB."

Which of the following files controls the default policy on password aging? A. /etc/default/login B. /etc/default/passwd C. /etc/shadow D. /etc/passwd

B. The /etc/default/passwd file controls the default policy on password aging. For more information, see the section "Controlling System Access."

Which of the following files contains a list of trusted hosts for a remote system? A. /.rhosts B. /etc/hosts.equiv C. /etc/default/login D. /etc/hosts

B. The /etc/hosts.equiv file contains a list of trusted hosts for a remote system, one per line. For more information, see the section "Trusted Hosts."

Which directory contains the Solaris default initialization files? A. /etc/default B. /etc/skel C. /etc/dfs D. /home

B. The /etc/skel directory contains the Solaris default initialization files. For more information, see the section "Customizing User Initialization Files."

Which of the following can restrict the set of operations that users are allowed to perform at the OpenBoot prompt? A. security-password B. security-mode C. set-secure D. set-security

B. The OpenBoot command security-mode restricts the set of operations that users are allowed to perform at the OpenBoot prompt. For more information, see the section "OpenBoot Security."

Which of the following signals kills a process unconditionally? A. SIGHUP B. SIGKILL C. SIGTERM D. SIGQUIT

B. The SIGKILL signal can be sent to a process with kill -9 or kill -SIGKILL. Signal 9 is called a sure, unconditional kill because a process cannot catch or ignore it. If the process is still around after a kill -9, either it is hung up in the UNIX kernel, waiting for an event such as disk I/O to complete, or you are not the owner of the process. SIGHUP is not used to kill a process. SIGTERM can be used to terminate a process, but not to kill it unconditionally. SIGQUIT sends a signal to the process to dump the core. For more information, see Chapter 5.

Which task cannot be performed by the SMC Disks Tool? A. View partition information. B. Format a disk. C. Partition a disk. D. Copy one disk's partition scheme to another disk.

B. The SMC Disks Tool cannot be used to format a disk. For more information, see the "Using the Solaris Management Console Disks Tool" section.

Which of the following makes specific checks and adjustments to system files and permissions to ensure system security? A. chmod B. aset C. An ACL D. The proper entry in the /etc/default/login file

B. The Solaris 10 system software includes ASET, which helps you monitor and control system security by automatically performing tasks you would otherwise do manually. ASET performs seven tasks, making specific checks and adjustments to system files and permissions to ensure system security. For more information, see the section "ASET."

Which of the following commands does the Unix utility use for printing in SRV4 Unix? A. lpr B. lp C. lpd D. spool

B. The Unix utility responsible for printing in SVR4 Unix is called lp. For more information, see the section "The Solaris Print Service."

Which type of installation preserves data and system configuration information? A. Initial B. Upgrade C. Preserve D. Interactive

B. The Upgrade option updates the Solaris software to the new release, preserving data, and saving as many modifications to the previous version of Solaris software as possible. For more information, see the "Upgrading the Operating System" section.

What does the at command do? A. It stands for "all terminate" and kills all nonroot processes. B. It runs a batch job once at a specific time in the future. C. It sets a repeating batch job to run at a specific time of day. D. It displays the time of last login for a user.

B. The at command is used to schedule jobs for execution at a later time. Unlike crontab, which schedules a job to happen at regular intervals, a job submitted with at executes once, at the designated time. For more information, see Chapter 5.

Which command, typed at the ok prompt, stops and asks for boot information during the boot process? A. boot -i B. boot -a C. boot -v D. boot -s

B. The boot -a command performs an interactive boot. With this option, you are prompted to enter the name of the kernel, the default modules directory, the name of the system file, the root file system type, and the device name for the root device. For more information, see the section "Booting a SPARC System."

Where is the bootpath property stored on an x86/x64-based system? A. In the boot archive B. In the bootenv.rc file C. In the menu.lst file D. In the bootblock

B. The bootpath property is stored in the /boot/solaris/bootenv.rc file. For more information, see the section "Modifying the Boot Behavior."

Which one of the following crontab entries instructs the system to run logchecker at 3:10 on Sunday and Thursday nights? A. 0 4 * * 10,3 /etc/cron.d/logchecker B. 10 3 * * 0,4 /etc/cron.d/logchecker C. * 10 3 0,4 /etc/cron.d/logchecker D. 10 3 * * 0-4 /etc/cron.d/logchecker

B. The crontab entry 10 3 * * 0,4 /etc/cron.d/logchecker instructs the system to run logchecker at 3:10 on Sunday and Thursday nights.

Output from df -k does not contain which of the following fields? A. Total size in kilobytes B. Fragmentation C. Capacity D. Kilobytes available

B. The df -k command does not display the percentage of fragmentation. For more information, see the "Displaying a File System's Disk Space Usage" section.

In the standard device file naming convention "cXtYdZ," what does the "tY" portion of the filename identify? A. The controller card to which this device is attached B. The SCSI target address of the device C. The LUN of the device D. The function number as contained on the "Core I/O" board

B. The fields of the logical device name cXtYdZ are as follows: cX—Refers to the SCSI controller number tY—Refers to the SCSI bus target number dZ—Refers to the disk number (always 0, except on storage arrays) For more information, see the "Logical Device Name" section.

Which of the following examples uses the mount command to map a directory to a file system as read/writeable, disallow setuid execution, and enable the creation of large files: A. mount -o rw,nosuid,large /dev/dsk/c0t0d0s0 /home2 B. mount -o rw,nosuid,largefiles /dev/dsk/c0t0d0s0 /home2 C. mount -o rw,nosuid,largefiles /dev/rdsk/c0t0d0s0 /home2 D. mount -o rw,suid,largefiles /dev/dsk/c0t0d0s0 /home2

B. The following command uses the mount command to map a directory to a file system as read/writeable, disallow setuid execution, and enable the creation of large files (more than 2GB in size): mount -o rw,nosuid,largefiles /dev/dsk/c0t0d0s0\ /home2 For more information, see the "Mounting a File System with Large Files" section.

The kernel consists of which of the following? A. The shell and environment variables B. A small static core and many dynamically loadable modules C. Boot PROM and the operating system D. System milestones

B. The kernel consists of a small static core and many dynamically loadable kernel modules. Many kernel modules are loaded automatically at boot time, but for efficiency, others—such as device drivers—are loaded from the disk as needed by the kernel. The shell and environmental variables are user-specific and are loaded when each user logs in. The boot PROM is firmware and is considered part of the hardware. Answer A is incorrect because the kernel does not contain shell and shell environment variables. Answer C is incorrect because, although the kernel is part of the operating system, it does not contain the boot PROM code. Answer D is incorrect because the system milestones are part of the operating system, not the kernel. For more information, see Chapter 3, "Performing System Boot and Shutdown Procedures for SPARC, x64-, and x86-Based Systems."

Which command can tell you if a print queue is down? A. lpadmin B. lpstat C. Admintool D. Print Manager

B. The lpstat -p <printer> command tells you whether a printer is active or idle, when it was enabled or disabled, and whether it is accepting print requests. The lpadmin command is used to configure the LP print service, such as adding printers. Print Manager can be used to create and remove printers, but it does not display information about printers. Admintool is not supported in Solaris 10. For more information, see Chapter 6.

Which of the following statements about dd is false? A. It quickly converts and copies files with different data formats. B. It is a good backup tool. C. It is used to transfer a complete file system or partition from a hard disk to a tape. D. It is used to copy all data from one disk to another.

B. The main advantage of the dd command is that it can quickly convert and copy files with different data formats, such as differences in block size or record length. The most common use of this command is to transfer a complete file system or partition from your hard disk to a tape. You can also use it to copy files from one hard disk to another. dd does not make a good backup tool. For more information, see the section "The dd Utility."

Which of the following indicates the general device driver for devices such as disk, tape, or serial line? A. Minor device number B. Major device number C. Device tree D. Pseudo device

B. The major device number indicates the general device driver for devices such as disk, tape, or serial line. For more information, see the "Major and Minor Device Numbers" section.

The minor device number: A. Indicates the general device driver for devices such as disk, tape, or serial line. B. Indicates the specific member within a driver. C. Uniquely defines a device and its device driver. D. Identifies the proper device location and device driver to the kernel.

B. The minor device number indicates the specific member within a driver. For more information, see the "Major and Minor Device Numbers" section.

The mountall command A. Mounts the CD-ROM and floppy automatically B. Mounts all file systems specified in the file system table C. Shares all files systems so that they can be mounted D. Mounts the tape in the tape drive

B. The mountall command mounts all file systems specified in the file system table (vfstab). For more information, see the "Mounting File Systems" section.

Which command is a friendlier way to create a file system? A. mkfs B. newfs C. fsck D. mknod

B. The newfs command automatically determines all the necessary parameters to pass to mkfs to construct new file systems. newfs was added in Solaris as a friendly front end to the mkfs command to make the creation of new file systems easier. The fsck command is used to check and repair file systems. The mknod command is used to create special device files. For more information, see Chapter 1.

What do the permissions dr-xr--r-- on a directory mean? A. Only the owner and group member can list files in this directory. B. Only the owner can open files in this directory. C. Neither read, write, nor execute privileges have been assigned. D. Only the owner can remove files in this directory.

B. The permissions r-xr--r-- on a directory allow only the owner to open files in that directory. For more information, see the section "Controlling File Access."

Which of the following commands verifies the accuracy of a software package installation? A. pkgadd B. pkgchk C. pkgask D. pkginfo

B. The pkgchk command checks the accuracy of a software package installation. For more information, see the "Tools for Managing Software" section.

Which statement about the restoresymtable file is true? A. The restoresymtable file manages the restoration of symbolic links to ensure that unnecessary copies of data are not restored. B. The restoresymtable file is used to coordinate the restoration of incremental dumps on top of a full dump. It can be deleted after the last incremental restoration. C. The restoresymtable file contains detailed information about the restored files. It's simply a log file that can be removed after the restoration of a full backup. D. The restoresymtable file is used for future full dumps of a file system that has been restored by using ufsrestore. It needs to be saved for when ufsrestore may be used to restore files to this file system later. E. You must not delete this binary file; it is needed by ufsrestore and ufsdump. You should put a backup copy of this file in another location.

B. The restoresymtable file is created by the ufsrestore command when restoring an entire file system. This is a temporary file that is created whenever you restore an entire file system from tape. The restoresymtable file is used only by ufsrestore for "checkpointing," which involves information passed between incremental restorations. For example, if you perform an incremental restoration of data from backup tapes, the system uses information from the restoresymtable file to restore incremental backups on top of the latest full backup. The restoresymtable file is not required after the file system has been successfully restored, and it can be deleted by using the rm command. It is not removed automatically. For more information, see the section "The ufsrestore Utility."

Which is not a valid software configuration group to choose during installation of the Solaris 10 operating environment? A. Core B. Client C. End user D. Developer

B. The six configuration groups are reduced networking support, core system support, end-user support, developer system support, entire distribution, and entire distribution plus OEM system support. For more information, see the "Software Groups" section.

Which file system block contains information about the file system? A. Boot block B. Superblock C. Inode D. Data block

B. The superblock stores much of the information about the file system. The boot block stores information used to boot the system and does not store information about file systems. An inode stores all the information about a file except its name. A storage or data block stores the actual data for each file. For more information, see Chapter 1.

If a system will not start due to a bad NVRAM variable, which of the following, performed before you see the OpenBoot prompt, resets the NVRAM variables to their default settings? A. set-default <variable> B. Stop+N C. set-defaults D. Ctrl+N

B. To reset the NVRAM variables to their default settings, you hold down the Stop+N keys simultaneously while the machine is powering up. For more information, see the section "OpenBoot NVRAM."

A user wants to execute a command later today, after leaving work. Which one of the following commands will allow him to do this? A. runat B. at C. submit D. None of the above

B. Use the at command to execute a command or script at a later time.

Which of the following commands is used to change the minfree value of a file system? A. mkfs B. tunefs C. newfs D. format

B. Use the tunefs command to change the minfree value of a file system. For more information, see the "Tuning File Systems" section.

You've added the user name bcalkins to the /etc/cron.d/cron.allow file. You've removed the name bcalkins from the /etc/cron.d/cron.deny file. Which statement is true regarding crontab? A. bcalkins cannot create crontab entries. B. bcalkins can create crontab entries. C. Only root can create crontab entries. D. No one can create crontab entries.

B. Users can manage jobs if their name appears in the /etc/cron.d/cron.allow file and does not appear in the /etc/cron.d/cron.deny file.

The second field of the /etc/group file is used to store the group password. What is the effect of a group password? A. Access to each group is granted only to users in a group. B. Users who are not members of the group can access it if they know the password. C. Users who are primary members of the group are required to use the group password to gain access to the group. D. Users who are secondary members of the group are required to use the group password to gain access to the group.

B. When using the newgrp command to switch your effective group ID, a password is demanded if the group has a password (the second field of the /etc/group file) and the user is not listed in /etc/group as being a member of that group. For more information, see Chapter 4.

You can protect the superuser account on a system by restricting access to a specific device through what file? A. /etc/hosts.equiv B. /etc/default/login C. /etc/default/passwd D. /etc/default/su

B. You can protect the superuser account on a system by restricting access to a specific device through the CONSOLE variable located in the /etc/default/login file. For more information, see the section "Restricting Root Access."

Which of the following commands removes a job from the print queue? A. lpmove B. cancel C. lpremove D. reject

B. You use the cancel command to remove a job from the print queue. For more information, see the section "Cancelling a Print Request."

Which of the following commands can be used in conjunction with the cpio command to perform incremental archives? A. sort B. find C. grep D. diff

B. You use the find command with cpio to perform incremental archives. For more information, see the section "The cpio Utility."

What command do you use to change run levels? A. run B. init C. kill D. su

B. You use the init command to change run levels. For more information, see the sections "The init Phase" and "The Service Managmeent Facility."

Which of the following commands displays users who don't have passwords? A. Use more /etc/passwd B. logins -p C. passwd D. attributes

B. You use the logins -p command to display usernames that do not have passwords associated with them. For more information, see the section "Monitoring Users and System Usage."

Which of the following is used in OpenBoot to test all devices that have built-in self-test methods below the specified device tree node? A. diag B. probe-scsi C. test-all D. test

C. The OpenBoot command test-all tests all devices that have built-in self-test methods below the specified device tree node. For more information, see the section "OpenBoot Diagnostics."

What does the pkgchk command do? (Choose two.) A. It displays information about software packages installed on the system. B. It stores answers in a response file so that they can be supplied automatically during an installation. C. It determines the accuracy of a software package installation. D. It determines whether a file's contents or attributes have changed since it was installed with the package.

C, D. The pkgchk command checks the accuracy of a software package installation. It also can be used to determine whether the contents or attributes of a file have changed since it was installed with the package. You use the pkginfo command to display software package information, and you use pkgask to store answers for an interactive installation. For more information, see Chapter 2.

Which of the following is a serial port device? A. /dev/bpp0 B. /dev/term/ttya C. /dev/term/a D. /dev/fd

C. /dev/term/a is the serial port A device, the primary serial port on a Sun system. For more information, see the section "Setting Up a Printer by Using Print Manager."

Which of the following is a system that uses remote services from a server, has limited disk space, and requires a server to function? A. AutoClient server B. File server C. Client D. Standalone

C. A client is a system that uses remote services from a server. Some clients have limited disk storage capacity, or perhaps none at all; these clients must rely on remote file systems from a server to function. For more information, see the "Servers" section.

What would a default umask of 023 set as default permissions on new files? A. Owner no rights; Group write only; World write and execute only B. Owner read, write, execute; Group read only; World execute only C. Owner read, write; Group read only; World read only D. Owner no rights; Group read and execute only; World read only

C. A umask of 023 makes a mask, automatically unsetting those permission bits from otherwisefull permissions. Because each digit represents an octal number corresponding, respectively, to Owner, Group, and World, the permissions displayed by the ls command would be rw-r--r--. The first 3 permission bits are rw- (read-write) for Owner, followed by r-- (read-only) for Group, and finally r-- (read-only) for World. For more information, see Chapter 4.

Which statement about Solaris Management Console is false? A. It provides single-console, single-login administration of multiple Solaris systems. B. It provides an easy-to-navigate GUI console. C. It has a command-line interface in addition to the GUI controls. D. It uses Role-Based Access Control.

C. Although you can find command-line equivalents to SMC tools such as smuser and smgroup, no command-line interface exists for the Solaris Management Console. Answers A, B, and D are all true and represent functionality found in the SMC. For more information, see Chapter 4.

This XML-based file contains a complete set of properties that are associated with an SMF service or a service instance. Where is this XML file stored? A. /var/svc/method B. /lib/svc/method C. /var/svc/manifest D. /var/svc/profile

C. An SMF manifest is an XML (Extensible Markup Language) file that contains a complete set of properties that are associated with a service or a service instance. The properties are stored in files and subdirectories located in /var/svc/manifest. For more information, see the section "The Service Management Facility (SMF)."

Your external CD-ROM was not turned on when the system was last booted with a reconfiguration reboot. To gain access to the CD-ROM, you could halt the system, turn on power to the CD-ROM, and start the system back up, or you could issue which of the following commands at the command prompt? A. drvconfig cdrom B. add_drv cdrom C. devfsadm D. drvconfig -d

C. An example of when to use the devfsadm command would be if the system has been started, but the power to the CD-ROM or tape drive was not turned on. During startup, the system did not detect the device; therefore, its drivers were not installed. The devfsadm command will perform these tasks. For more information, see the "Instance Names" section.

Which of the following types of utility is able to handle large files as input and to generate large files as output? A. Large file-compatible B. Large file-safe C. Large file-aware D. Large file-capable

C. As stated in the previous question and answer, a utility is called large file-aware if it can process large files in the same manner that it does small files. A large file-aware utility can handle large files as input and can generate large files as output. For more information, see the "Mounting a File System with Large Files" section.

What do you type to display all OpenBoot parameter settings, such as boot-device and ttyamode? A. nvalias B. devalias C. printenv D. show all

C. At the OpenBoot prompt, you use the printenv command to display all OpenBoot parameter settings. For more information, see the section "OpenBoot NVRAM."

Respectively, what are the user initialization files for the Bourne, Korn, and C shells? A. .bshrc, .kshrc, .cshrc B. .exrc, .profile, .login C. .profile, .profile, .login D. .profile works for all shells.

C. Bourne and Korn shells initialize with a .profile, whereas the C shell uses .login and .cshrc. For more information, see Chapter 4.

Which service state indicates that a service is not configured to start up and run? A. Uninitialized B. Offline C. Disabled D. Degraded

C. Disabled indicates that the service is not configured to start up and is not running. Uninitialized is the state of a service before the configuration has been read. Offline indicates that the service is not yet running but is configured to run. Degraded indicates that the service is enabled but is running at a limited capacity. For more information, see Chapter 3.

Which of the following tasks can be performed on a mounted file system? A. labelit B. fsck C. tunefs D. newfs

C. Do not use the following commands on a mounted file system: fsck, newfs, and labelit. newfs cannot be run on a mounted file system—it generates an error. For more information, see the "Unmounting a File System" section.

To what do the directories in /proc correspond? A. File systems B. Physical and virtual devices attached to the system C. Active process IDs D. Active UIDs

C. Each entry in the /proc directory is a decimal number corresponding to a process ID. Each directory in /proc has files that contain more-detailed information about that process. The /proc file system does not contain information about other file systems, devices, or active UIDs. For more information, see Chapter 5.

What effect does the sticky bit have if it is set on the /tmp directory as drwxrwxrwt 2 sys sys 512 May 26 11:02 /tmp? A. It permits superuser access only. B. It prohibits all read-write permissions. C. It allows only the owner to remove and rename his or her files. D. It is a security risk because any user can delete another user's files

C. If the sticky bit is set on the /tmp directory as rwxrwxrwx, only the owner can remove and rename his or her files. For more information, see the section "Sticky Bits."

In output from the ps command, which of the following does the UID field display? A. The parent process B. The process id C. The process owner D. The priority of the process

C. In output from the ps command, the UID field displays the process owner.

How do you temporarily change your system configuration to boot your x86/x64-based Solaris system in single-user mode? A. Edit the menu.lst file B. Change the system BIOS C. Edit the kernel command in the GRUB menu at boot time D. Select "Solaris failsafe" from the GRUB main menu

C. In the GRUB main menu, I can edit the kernel command as follows: kernel /platform/i86pc/multiboot -s to boot the system into single-user mode. The modification is temporary until the next time the system is booted. For more information, see the section "Modifying the Boot Behavior."

Which method of installation creates a copy of the OS, upgrades the copy, and allows you to fall back to the original version of the OS if you encounter problems? A. Custom JumpStart B. Upgrade C. Live upgrade D. Solaris Flash Archive

C. Live upgrade allows you to create a copy of the current operating environment and upgrade the copy while the system is running in the original environment. For more information, see the "Solaris Live Upgrade" section.

Which of the following stores system identification information, such as the hostid? A. Firmware B. OpenBoot C. NVRAM D. Kernel

C. Nonvolatile RAM (NVRAM) is where the system identification information—such as the host ID, Ethernet address, and TOD clock—is stored. For more information, see the section "The OpenBoot Environment."

What is the kernel architecture of an ultra 5? A. sun4m B. sun4c C. sun4u D. sun4

C. sun4u is the kernel architecture for all Sun UltraSPARC systems. For more information, see the "Requirements and Preparation for Installing the Solaris 10 Software" section.

Which of the following commands prepares a compressed tar patch file (with a .Z extension) for installation and saves approximately 25% on temporary disk space usage? A. installpatch -u 104945-02.tar.Z B. installpatch -f 104945-02.tar.Z C. /usr/bin/zcat 104945-02.tar.Z | tar xvf - D. unzip 104945-02.tar.Z | tar xvf -

C. Patches might come in compressed tar format, such as 104945-02.tar.Z. Use the zcat command to decompress this type of patch file. For more information, see the "Obtaining a Patch" section.

Which of the following commands lists the contents of a tar file without actually extracting the file? A. tar -cvf B. tar -xvf C. tar -tvf D. tar -txf

C. The -t option with the tar command lists the contents of a tar file. For more information, see the section "The tar Utility."

Which directory contains configuration files used to define a machine's identity? A. /dev B. /usr C. /etc D. /opt E. /var

C. The /etc directory contains configuration files that define a system's identity. For more information, see the "The Root (/) File System" section.

Which of the following files contains a list of file systems to be automatically mounted at bootup? A. /etc/fstab B. /etc/dfs/dfstab C. /etc/vfstab D. /etc/rc2.d/S74autofs

C. The /etc/vfstab file contains a list of file systems to be automatically mounted when the system is booted to the multiuser state. For more information, see the "Creating an Entry in the /etc/vfstab File to Mount File Systems" section.

Which of the following commands schedules a command to run once at a given time? A. crontab B. priocntl C. at D. cron

C. The at command schedules a command to run once at a given time.

What command is used to change read, write, and execute permissions on a file? A. chgrp B. chown C. chmod D. passwd

C. The chmod command changes access permissions on a file. You can use either symbolic mode (letters and symbols) or absolute mode (octal numbers) to change permissions on a file. For more information, see the section "Controlling File Access."

Which of the following statements about the dd command is false? A. It quickly converts and copies files with different data formats. B. It can be used to copy an entire file system or partition to tape. C. It can compress files quickly and efficiently. D. It can be used to read standard input from another program to write to tape.

C. The dd command quickly converts and copies files with different data formats, such as differences in block size or record length. dd can be used to copy an entire file system or partition to tape, and it can take input from other programs through standard input. It cannot, however, compress files as it copies, because it is a byte-by-byte image copy. For more information, see Chapter 7.

Which of the following shell commands creates logical links to device nodes in the /dev and /devices directories? A. boot -r B. drvconfig C. devfsadm D. devlinks

C. The devfsadm command a creates logical links to device nodes in /dev and /devices and loads the device policy. For more information, see the "Instance Names" section.

To view the capacity of all file systems mounted on a system, which command should you use? A. du -a B. ls C. df D. mountall

C. The df command and its options can be used to see the capacity of each file system mounted on a system, the amount of space available, and the percentage of space already in use. The ls command is used to list information about files and directories. The du command summarizes disk usage but does not provide file system capacity information. The mountall command is used to mount all file systems listed in the /etc/vfstab file. For more information, see Chapter 1.

Which of the following commands cancels all print requests for the user bcalkins on the printer jetprint? A. lprm -bcalkins jetprint B. cancel -Pjetprint bcalkins C. cancel -u bcalkins jetprint D. lpremove -Pjetprint bcalkins

C. The following command cancels all print requests for the user bcalkins on the printer named jetprint: cancel -u bcalkins jetprint For more information, see the section "Cancelling a Print Request."

On an active file system, which command successfully backs up the root file system to the /dev/rmt/0 tape device? A. ufsdump -S0uf /dev/rmt/0 / B. ufsdump 0uf /dev/rmt/0 `fssnap -o bs=/opt,raw` C. ufsdump 0uf /dev/rmt/0 `fssnap -o bs=/export,raw /` D. ufsdump 0uf /dev/rmt/0 `snapfs -o bs=/var/tmp,raw /`

C. The following example backs up the root (/) file system without requiring you to unmount the file system: # ufsdump 0uf /dev/rmt/0 `fssnap -o bs=/export,raw /` Because ufsdump requires the path to a raw device, the raw option is used. The command fssnap -o bs=/export,raw / is enclosed in backticks so that the file system snapshot is created in the /export file system and then backed up by ufsdump. After you use ufsdump, you need to ensure that you remove the snapshot to free up space on the backing store by using fssnap -d and by removing the temporary file created in /export. For more information, see the section "The UFS Snapshot Utility."

Which of the following commands cannot be used to copy file systems? A. dd B. ufsdump C. fsck D. volcopy

C. The fsck command checks and repairs file systems. Any of the others could be used to copy one file system to another. dd is used to convert and copy files reading input, one block at a time. ufsdump is used to perform file system dumps that can be used to copy file systems from one disk slice to another. volcopy is used to make an image copy of a file system. For more information, see Chapter 1.

Which of the following is a link from the /dev directory to the physical device name located in the /devices directory? A. Full device path name B. Pseudo device name C. Logical device name D. Instance name

C. The logical device name is a link from the /dev directory to the physical device name located in the /devices directory. For more information, see the "Logical Device Name" section.

Which of the following commands prevents queuing of print requests? A. disable B. cancel C. reject D. lpshut

C. The reject command disables any further requests for a printer or class that is entering the spooling area. For more information, see the section "SVR4 Print Service."

What is the best command to use to find your hardware platform and current operating system release? A. init -q B. sysdef C. uname -a D. arch

C. The uname command with the -a flag set displays basic information currently available from the system, including hardware platform and current operating system release. The sysdef command outputs the current system definition, such as hardware devices, loadable modules, and kernel parameters. The init command is used to start processes from information in the inittab file. The arch command displays the system's application architecture. For more information, see Chapter 2, "Installing the Solaris 10 Operating Environment."

Which of the following is the mechanism that manages removable media, such as the CD-ROM and floppy disk drives? A. autofs B. NFS C. vold D. init

C. The vold daemon is the mechanism that manages removable media, such as the CD-ROM and floppy disk drives. For more information, see the "Volume Management" section.

Which of the following actions notifies the user if an attempt is made to access a CD or disk that is no longer in the drive? A. vold B. volcheck C. volmissing D. rmmount

C. The volmissing action in the vold.conf file notifies the user if an attempt is made to access a CD or diskette that is no longer in the drive. For more information, see the "Volume Management" section.

Which of the following commands is used to remove a patch from a system? A. uninstall B. pkgrm -s C. patchrm D. rm -r /var/sasdm/pkg/<pkgname>/save

C. Use the patchrm command to remove a patch from a system. For more information, see the "Obtaining a Patch" section.

When a user creates a file or directory, which of the following controls the default file permissions assigned to the file or directory? A. chmod B. Permissions assigned C. umask D. chown

C. When a user creates a file or directory, the umask value controls the default file permissions assigned to the file or directory. For more information, see the section "Controlling File Access."

When you see the driver not attached message, it means which of the following? A. The device for this driver is not attached. B. A driver is unavailable for this device. C. No driver is currently attached to the device instance because there is no device at this node or the device is not in use. D. The kernel needs to be reconfigured to attach the device.

C. When you see the driver not attached message, it means no driver is currently attached to the device instance because there is no device at this node or the device is not in use. For more information, see the "Physical Device Name" section.

You can type mount /opt on the command line and not get an error message if which of the following conditions exits? A. /opt is listed in the /etc/rmtab. B. /opt is listed in the /etc/mnttab. C. /opt is listed in the /etc/vfstab. D. /opt is listed in the /etc/dfs/dfstab.

C. You can type mount /opt on the command line and not get an error message if /opt is listed in the /etc/vfstab file. For more information, see the "Creating an Entry in the /etc/vfstab File to Mount File Systems" section.

What key combination would you enter to interrupt a system that is not responding? A. Ctrl+B B. Ctrl+C C. Stop+A D. Ctrl+Alt+Delete E. Ctrl+Break

C. You interrupt a system that is not responding by pressing Stop+A. For more information, see the section "Stopping the System for Recovery Purposes: SPARC."

What do you type to check the target IDs on all the SCSI devices connected to all the SCSI controllers? A. test-all B. probe-scsi C. probe-scsi-all D. test-scsi

C. You use the probe-scsi-all command to check the target IDs on all the SCSI devices that are connected to all the SCSI controllers. For more information, see the section "OpenBoot Diagnostics."

Which of the following commands is used to set the auto-boot parameter? A. setenv auto-boot?=false B. set auto-boot=false C. eeprom auto-boot?=false D. nvset

C. eeprom auto-boot?=false is used to set the auto-boot? parameter from the UNIX shell. Option A is wrong because the = sign should not be used with the setenv command. Option B is wrong because there is not a set command at the OpenBoot prompt, and using set from the UNIX shell does not set an OpenBoot parameter. Option D is wrong because there is not an nvset command. For more information, see the section "OpenBoot NVRAM."

Sun distributes software patches in which of the following forms? Choose all that apply. A. Sun anonymous FTP site B. Email C. CD-ROM D. Sunsolve E. Sun Connection

D, E. Today, Sun customers can access software updates (patches) through two main methods, SunSolve and Sun Connection. For more information, see the "Obtaining a Patch" section.

In the Solaris Management Console, what field corresponds to the maximum number of days an account can go without being accessed before it is automatically locked? A. User Must Keep for: B. Max Inactive C. User Must Change Within: D. Expires if Not Used for:

D. "Expires if Not Used for:" is the correct option. Select how many days can elapse before the user's password expires if the user does not log in to this account. The "User Must Keep for:" field specifies the minimum number of days a user must wait before changing a password or reusing a previous password. The "User Must Change Within:" field allows you to set the maximum number of days that can elapse before a user must change his password. "Max Inactive" is an invalid field and does not appear in the SMC. For more information, see Chapter 4, "User and Security Administration."

A large file is a regular file whose size is greater than or equal to which of the following? A. 1TB B. 1GB C. 5GB D. 2GB

D. A large file is a regular file whose size is greater than or equal to 2GB. For more information, see the "Mounting a File System with Large Files" section.

How many groups can a user belong to? A. 1 B. 32 C. Unlimited D. 16

D. A user can belong to as many as 15 secondary groups. Added to the primary group, a user can belong to 16 total groups. For more information, see the section "Where User Account Information Is Stored."

Which of the following is not the valid FMRI name of a service instance? A. svc://localhost/network/inetd:default B. lrc:/etc/rc3_d/S90samba C. network/inetd:default D. svc:/inetd:default

D. A valid FMRI instance names has this form: svc://localhost/network/inetd:default svc:/network/inetd:default network/inetd:default svc:/inetd:default does not contain the service category name. lrc:/etc/rc3_d/S90samba is an FMRI for a legacy run control script not managed by the SMF. For more information, see the section "The Service Management Facility (SMF)."

Which of the following commands do you use to write or display labels on unmounted disk file systems? A. format B. prtvtoc C. newfs D. labelit

D. After you create the file system with newfs, you can use the labelit utility to write or display labels on unmounted disk file systems. For more information, see the "Creating a UFS" section.

What is not true about logical block sizes? A. The logical block size is the size of the blocks the Unix kernel uses to read or write files. B. By default, the logical block size is 8192 bytes. C. A larger logical block size increases efficiency for file systems in which most of the files are large. D. A small logical block size increases efficiency for file systems in which most of the files are large.

D. As a general rule, a larger logical block size increases efficiency for file systems in which most of the files are large. Use a smaller logical block size for file systems in which most of the files are small. For more information, see the "Logical Block Size" section.

Which of the following does the superblock not contain? A. Size and status of the file system B. Cylinder group size C. Pathname of the last mount point D. Boot information

D. Boot information Here are a few of the more important things contained in a superblock: Size and status of the file system Label (file system name and volume name) Size of the file system's logical block Date and time of the last update Cylinder group size Number of data blocks in a cylinder group Summary data block File system state (clean, stable, or active) Pathname of the last mount point For more information, see the "The Superblock" section.

Which of the following is attached to a host computer through a hierarchy of interconnected buses on the device tree? A. SBus cards B. SCSI peripherals C. Plug-in device drivers D. Nodes

D. Devices called nodes are attached to a host computer through a hierarchy of interconnected buses on the device tree. A node that represents the host computer's main physical address bus forms the tree's root node. For more information, see the section "The OpenBoot Architecture."

During installation, what default software group is selected to be installed? A. End-user distribution B. Core distribution C. Developer distribution D. Entire distribution

D. During the interactive installation, the entire distribution software group is selected by default. For more information, see the "Using the Interactive Installation Process (install-solaris)" section.

Which of the following do not make secure passwords? A. Phrases B. Nonsense words C. Words with numbers or symbols D. Employee numbers

D. Employee numbers are not secure passwords. For more information, see the section "Controlling System Access."

You need to modify the boot sequence on your x86/x64-based Solaris system. You want the system to try to boot from the DVD before it looks for a bootable partition on the internal disk drives. Where would you change this boot sequence? A. menu.lst B. Boot archive C. bootenv.rc D. System BIOS

D. If it becomes necessary to change the boot sequence, modify the BIOS settings before installing the Solaris OS. For example, the system's BIOS can be configured to boot from the CD/DVD in order to install the Solaris OS from DVD. Entering the BIOS setup screen is performed by pressing a key early in the startup process. For more information, see the section "Booting x86- and x64- Based Systems."

What statement is not true about disk slices on standard Solaris? A. Each slice can hold only one file system. B. A file system cannot span multiple disk slices. C. A file system cannot be increased or decreased. D. Slices can span multiple disks.

D. On a standard Solaris file system, a file system cannot span multiple disks or slices. It's only possible when using virtual file systems (that is, Solaris Volume Manager). For more information, see the "Disk Slices" section.

Physical device files are found in which of the following? A. /kernel/drv B. /dev C. /platform D. /devices

D. Physical device files are found in the /devices directory. For more information, see the "Physical Device Name" section.

Which of the following is not a default user initialization file? A. .cshrc B. .login C. .profile D. .exrc

D. The following are default user initialization files that are put into a user's home directory when the user's account is created: .cshrc, .login, and .profile. For more information, see the section "Customizing User Initialization Files."

Which of the following tasks cannot be performed with the format utility? A. Repairing defective sectors B. Partitioning C. Retrieving corrupted disk labels D. Displaying disk usage

D. The format utility is used to retrieve corrupted disk labels, repair defective sectors, format and analyze disks, partition disks, and label disks. For more information, see the "Using the format Utility to Create Slices" section.

Which command might you use to see which process is preventing a file system from being unmounted? A. ps B. mountall C. fsck D. fuser

D. The fuser command can be used to display which processes are using a particular file system. The following example uses the fuser command to find out why /cdrom is busy: fuser -c -u /cdrom. The fsck command is used to check and repair file systems. The mountall command is used to mount all file systems listed in the /etc/vfstab file. The ps command is used to list system processes and report their status, but it does not identify which file system a process may be accessing. For more information, see Chapter 1.

After reading the /etc/inittab file, which daemon does the init process start? A. sched B. /sbin/rc1 C. ufsboot D. svc.startd

D. The init process reads the /etc/inittab file and executes any process entries that have sysinit in the action field, so that any special initializations can take place before users log in. After reading the /etc/inittab file, init starts the svc.startd daemon, which is responsible for starting and stopping other system services such as mounting file systems and configuring network devices. In addition, svc.startd executes legacy run control (RC) scripts. For more information, see the section "The init Phase."

Which of the following statements is not true of a software package? A. A software package is a group of files and directories that describe a software application, such as manual pages and line printer support. B. A software package is a standard way to deliver bundled and unbundled software. C. Software packages are grouped into software clusters. D. Software packages are administered using the installf command.

D. The installf command is used to add a file to the software installation database, not to administer software packages. For more information, see the "Software Terminology" section.

Logical device files in the /dev directory are symbolically linked to which of the following in the /devices directory? A. Instance names B. Pseudo device files C. Full device path names D. Physical device files

D. The logical device name is a link from the /dev directory to the physical device name located in the /devices directory. For more information, see the "Logical Device Name" section.

Which of the following commands submits the spooler information that is to be printed? A. lpd B. print C. lpsched D. lp

D. The lp command places information to be printed into the spooler. For more information, see the section "The LP Print Daemons."

Which of the following commands is used to show software package information? A. pkgadd B. pkgchk C. pkgparam D. pkginfo

D. The pkginfo command displays software package information. For more information, see the "Tools for Managing Software" section.

Which of the following files lists all uses of the su command? A. /var/adm/wtmpx B. /var/adm/messages C. /var/adm/lastlog D. /var/adm/sulog

D. The sulog file lists all uses of the su command, not only those that are used to switch a user to superuser. The entries in the sulog file show the date and time the command was entered, whether it was successful, the port from which the command was issued, and the name of the user and the switched identity. For more information, see the section "Monitoring Superuser Access."

Which daemon is responsible for maintaining system services? A. init B. inetd C. startd D. svc.startd

D. The svc.startd daemon is responsible for maintaining the system services and ensures that the system boots to the correct milestone. Answers A and B do not maintain system services. Answer C is not a Solaris daemon. For more information, see Chapter 3.

Which of the following displays device configuration information, including system hardware, pseudo devices, loadable modules, and selected kernel parameters? A. messages B. prtconf C. dmesg D. sysdef

D. The sysdef command displays device configuration information, including system hardware, pseudo devices, loadable modules, and selected kernel parameters. For more information, see the "Physical Device Name" section.

What is the best command used to find out the name of your hardware's platform group and name? A. uname -a B. sysdef C. arch D. uname -m

D. To determine your system type, use the uname -m command. The system responds with the platform group and platform name for your system. For more information, see the "Requirements and Preparation for Installing the Solaris 10 Software" section.

How do you permanently disable the autoboot feature on an x86/x64-based system? A. Add the line timeout=false to the menu.lst file B. eeprom auto-boot?=false C. Add the line timeout=-1 to the bootenv.rc file D. Add the line timeout=-1 to the menu.lst file

D. Turn off autoboot by changing the line in the menu.lst file from timeout=10 to timeout=- 1. For more information, see the section "The GRUB Menu."

Which of the following commands is used to format a floppy disk and add a volume label? A. format -d B. labelit C. format D. fdformat

D. Use the fdformat command to format a floppy disk, and then add a volume label. For more information, see the "Troubleshooting Volume Manager" section.

Which of the following is not true about volume management? A. Volume Manager is started via the /etc/init.d/volmgt script. B. Volume Manager automatically mounts CDs and floppy disks. C. Volume Manager reads the /etc/vold.conf configuration file at startup. D. Volume Manager automatically checks and performs an fsck on file systems at bootup. E. Volume Manager is started via the svcadm enable volfs command.

D. Volume management does not automatically fsck file systems at bootup. It does, however, automatically mount CD-ROM and file systems when removable media containing recognizable file systems are inserted into the devices. For more information, see the "Volume Management" section.

Which of the following is not a valid method of installing Solaris 10? A. Installing over a WAN using HTTP B. Interactive C. Installing from a remote CD-ROM on a system on the same subnet D. Web Start

D. Web Start is not a method of installing the OS. Web Start installers are used to install software packages and Solaris Flash Archives are used when cloning systems. For more information on the methods of installation, see the "Methods of Installing the Solaris 10 Software" section.

You are a system administrator and suspect that one of your users has repeatedly tried to use su to gain root privileges. Which of the following files would you look at to see if your suspicion is correct? A. /usr/adm/syslog B. /usr/adm/lastlog C. /usr/adm/utmpx D. /var/adm/sulog

D. Whenever someone issues the su command to switch from a user and become root, this activity is logged in a file called /var/adm/sulog. The sulog file lists all uses of the su command, not only those used to switch from a user to superuser. The entries in this file show the date and time the command was entered, whether it was successful, the port from which the command was issued, and the name of the user and the switched identity. For more information, see the section "Monitoring Superuser Access."

Which option do you use with the OpenBoot boot command so that you are prompted for the name of the standalone program to load? A. -v B. -f C. -s D. -a

D. You issue the OpenBoot boot command with the -a option to be prompted for the name of the standalone program to load. For more information, see the section "The boot Command."

Which of the following commands creates a temporary device alias named bootdisk? A. setenv bootdisk /pci@1f,0/pci@1,1/ide@3/disk@0,0 B. set bootdisk /pci@1f,0/pci@1,1/ide@3/disk@0,0 C. nvalias bootdisk /pci@1f,0/pci@1,1/ide@3/disk@0,0 D. devalias bootdisk /pci@1f,0/pci@1,1/ide@3/disk@0,0

D. You use the devalias command to create a temporary device alias named bootdisk: devalias bootdisk /pci@1f,0/pci@1,1/ide@3/disk@0,0 For more information, see the section "OpenBoot Device Aliases."

Which of the following commands lists all hardware devices, system devices, loadable modules, and the values of selected kernel tunable parameters? A. more /var/adm/messages B. adb C. dmesg D. sysdef

D. You use the sysdef command to list all hardware devices, system devices, and loadable modules, as well as the values of selected kernel tunable parameters. For more information, see the section "The Kernel."

Which of the following is the recommended way to create a file system? A. mkfs B. format C. tunefs D. newfs

D. newfs is the friendly front end to the mkfs command. The newfs command automatically determines all the necessary parameters to pass to mkfs to construct new file systems. Newfs was added in Solaris to make the creation of new file systems easier. It's highly recommended that the newfs command be used to create file systems. For more information, see the "Creating a UFS" section.

Which statement about the pax utility is false? A. It supports a wide variety of archive formats, including tar and cpio. B. It is a POSIX-conformant archive utility. C. It does not have a built-in function to perform incremental backups. D. It is old and is not a recommended backup utility.

D. pax is a backup utility that has recently been added to Solaris. It works well as a backup utility. For more information, see the section "The pax Utility."

To what can rsh refer? A. The default system shell or the remote shell command B. A combination of the Bourne and C shell or a restricted shell C. The variable used to limit the number of login attempts or a restricted shell D. A restricted shell or the remote shell command

D. rsh refers to either a restricted shell or the remote shell command. You should not confuse the restricted shell /usr/lib/rsh with the remote shell /usr/bin/rsh. When you specify a restricted shell, you should not include the following directories in the user's path—/bin, /sbin, or /usr/bin. If you do include the m in the user's path, you will allow the user to start another shell (a nonrestricted shell). For more information, see the section "Restricted Shells."

What is the difference between chmod and umask? A. A chmod value can be set by individual users, whereas umask operates on the system level. B. chmod uses the sticky bit, and umask doesn't. C. umask permissions are stored in a directory rather than in files. D. umask changes the default permissions for every file and directory created in the future, whereas chmod works on a specific directory or file that already exists.

D. umask changes the default permissions for every file and directory created in the future, whereas chmod works on a specific directory or file that already exists. For more information, see the section "Controlling File Access."

vold does all of the following except for what? A. Gives other systems on the network automatic access to any disks and CDs the users insert into yo ur system B. Automatically mounts disks and CDs C. Enables the user to access disks and CDs without having to be logged in as root D. Automatically mounts a file system located on another system when that file system is accessed

D. vold does not automatically mount a file system located on another system when that file System is accessed. The facility responsible for that task is AutoFS. For more information, see the "Volume Management" section.

What command(s) is/are used to display disk space information? A. du B. df C. quota D. repquota E. All of the above

E. The following commands can be used to display disk space usage: du, df, quota, repquota. For more information, see the "Displaying a File System's Disk Space Usage" section.


Ensembles d'études connexes

George Washington was the first president of the United States

View Set

Cycle 2 Vocab- Antithesis-Maelstrom

View Set