oracle.braindumps.1z0-821.v2018-07-23.by.emily...2018/07/23  · user's crontab file. if a username...

116
https://www.gratisexam.com/ 1z0-821.exam.140q Number : 1z0-821 Passing Score : 800 Time Limit : 120 min https://www.gratisexam.com/ 1z0-821 Oracle Solaris 11 System Administration

Upload: others

Post on 28-Jan-2021

9 views

Category:

Documents


0 download

TRANSCRIPT

  • https://www.gratisexam.com/

    1z0-821.exam.140q

    Number: 1z0-821Passing Score: 800Time Limit: 120 min

    https://www.gratisexam.com/

    1z0-821

    Oracle Solaris 11 System Administration

  • https://www.gratisexam.com/

    Exam A

    QUESTION 1User1 is attempting to assist user2 with terminating user2's process 1234.User1 entered the following: kill -9 1234

    Why does the process continue to run?

    https://www.gratisexam.com/

    A. You can kill a process only if you are root.

    B. You can kill only a process that you own.

    C. You can kill the process only with the pkill command.

    D. You need to kill the process with a stronger kill signal.

    Correct Answer: BSection: (none)Explanation

    Explanation/Reference:Explanation:Kill -9Kill (terminates without cleanup)Only works if issued by process owner or super user (root)The program cannot respond to this signal; it must terminate

    Note: Unix provides security mechanisms to prevent unauthorized users from killing other processes. Essentially, for a process to send a signal to another, theowner of the signaling process must be the same as the owner of the receiving process or be the superuser.

    QUESTION 2Your server has one zone named dbzone (hat has been configured, but not yet installed). Which command would you use to view all the options that were used toconfigure this zone?

    A. zoneadm list –icv dbzone

    B. zones tat –c summary dbzone

    C. zonecfg –z dbzone info

  • https://www.gratisexam.com/

    D. zonecfg –icv dbzone info

    Correct Answer: CSection: (none)Explanation

    Explanation/Reference:Explanation:zonecfg infoDisplay information about the current configuration. If resource-type is specified, displays only information about resources of the relevant type. If any property-name value pairs are specified, displays only information about resources meeting the given criteria. In the resource scope, any arguments are ignored, and infodisplays information about the resource which is currently being added or modified.

    Note:zonecfg –zzonename. Specify the name of a zone. Zone names are case sensitive. Zone names must begin with an alphanumeric character and can contain alphanumericcharacters, the underscore (_) the hyphen (-), and the dot (.). The name global and all names beginning with SUNW are reserved and cannot be used.

    Incorrect answer:A: The zoneadm utility is used to administer system zones. A zone is an application container that is maintained by the operating system runtime.list option:Display the name of the current zones, or the specified zone if indicated.B: No such command.D: no such options zonecfg –icv

    QUESTION 3Your users are experiencing delay issues while using their main application that requires connections to remote hosts. You run the command uptime and get theflowing output:

    1:07am up 346 day(s), 12:03, 4 users, load average: 0.02, 0.02, 0.01

    Which command will be useful in your next step of troubleshooting?

    A. ipadm

    B. traceroute

    C. dladm

    D. snoop

    E. arp

  • https://www.gratisexam.com/

    Correct Answer: BSection: (none)Explanation

    Explanation/Reference:Explanation:Test the remote connection with traceroute.

    The Internet is a large and complex aggregation of network hardware, connected together by gateways. Tracking the route one's packets follow (or finding themiscreant gateway that's discarding your packets) can be difficult. traceroute utilizes the IP protocol `time to live' field and attempts to elicit an ICMPTIME_EXCEEDED response from each gateway along the path to some host.

    This program attempts to trace the route an IP packet would follow to some internet host by launching UDP probe packets with a small ttl (time to live) thenlistening for an ICMP "time exceeded" reply from a gateway.

    QUESTION 4When upgrading an existing system from Solaris 11 Express to Oracle Solaris 11, what happens to the datalink names?

    A. They follow the default naming convention for the newly installed version.

    B. They maintain their names.

    C. They are called eth#.

    D. They are called el00g#.

    E. They are left unnamed, to avoid conflicts, and need to be renamed after the installation process is complete.

    Correct Answer: ASection: (none)Explanation

    Explanation/Reference:Explanation:Network configuration in Oracle Solaris 11 includes* Generic datalink name assignment – Generic names are automatically assigned to datalinks using the net0, net1, netN naming convention, depending on the totalnumber of network devices that are on the system

    Note: There is no upgrade path from Oracle Solaris 10 to Oracle Solaris 11. You must perform a fresh installation.

    QUESTION 5You have installed software updates to a new boot environment (BE) and have activated that the booting to the new BE, you notice system errors. You want to bootto the last known good configuration.

    Which option would you use on a SPARC system to boot to the currentBE boot environment?

  • https://www.gratisexam.com/

    A. boot –L currentBE

    B. boot –Z rpool/ROOT/currentBE

    C. boot –a Enter the currentBE dataset name when prompted.

    D. boot rpool/ROOT/currentBE

    E. boot –m currentBE

    F. beadm activate currentBE

    Correct Answer: FSection: (none)Explanation

    Explanation/Reference:Explanation:You can change an inactive boot environment into an active boot environment. Only one boot environment can be active at a time. The newly activated bootenvironment becomes the default environment upon reboot.

    How to Activate an Existing Boot Environment1. Use the following command to activate an existing, inactive boot environment:beadm activate beName

    beName is a variable for the name of the boot environment to be activated.

    Note the following specifications.

    beadm activate beName activates a boot environment by setting the bootable pool property, bootfs, to the value of the ROOT dataset of the boot environment thatis being activated.

    beadm activate sets the newly activated boot environment as the default in the menu.lst file.

    2. Reboot.The newly activated boot environment is now the default on the x86 GRUB menu or SPARC boot menu.

    QUESTION 6Oracle Solaris 11 limits access to the system with usernames and passwords.The usernames are held in ___________, and the passwords are held in ___________.Select the correct pair.

    A. /etc/security/policy.conf /etc/passwd

    B. /etc/passwd /etc/shadow

  • https://www.gratisexam.com/

    C. /etc/security /etc/passwd

    D. /etc/shadow /etc/passwd

    Correct Answer: BSection: (none)Explanation

    Explanation/Reference:Explanation:The /etc/passwd file contains basic user attributes. This is an ASCII file that contains an entry for each user. Each entry defines the basic attributes applied to auser.

    /etc/shadow file stores actual password in encrypted format for user's account with additional properties related to user password i.e. it stores secure user accountinformation. All fields are separated by a colon (:) symbol. It contains one entry per line for each user listed in /etc/passwd file.

    QUESTION 7_________ serves as the interface between the SMF repository and the user to ensure that a consistent, picture of the repository is presented to the user.

    A. repository.db

    B. service manifest

    C. svc.startd

    D. svc.configd

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:Explanation:SVC.CONFIGD is the repository daemon responsible for maintaining /etc/svc/repository.db. The repository.db must come clean during this integrity checkotherwise it is a "no go" for usual boot sequence to run level 3. The repository may get corrupted due to various hardware issues, software bugs, disk write failures,etc.

    Note: When svc.configd(1M), the Solaris Repository Daemon, is started, it does an integrity check of the smf(5) repository, stored in /etc/svc/repository.db. Thisintegrity check can fail due to a disk failure, the database file being corrupted either due to a hardware bug, a software bug, or an accidental overwrite. If theintegrity check fails, svc.configd will write a message to the console.

    QUESTION 8You are attempting to edit your crontab file in the bash shell. Instead of getting your usual vi interface, you are presented with an unfamiliar interface. In order tohave your editor of choice-vi- what command must you type after exiting the unfamiliar editor?

  • https://www.gratisexam.com/

    A. EDITOR=vi

    B. crontab=vi

    C. crontab – e vi

    D. env

    Correct Answer: ASection: (none)Explanation

    Explanation/Reference:Explanation:Set the EDITOR variable to vi.

    Commands like `crontab -e` will use ed per default. If you'd like to use some better editor (like vi) you can use the environment variable EDITOR:

    # EDITOR=vi; crontab –e will open the users crontab in vi. Of course you can set this variable permanently.

    Incorrect answersC: -e Edits a copy of the current user's crontab file, or creates an empty file to edit if crontab does not exist. When editing is complete, the file is installed as theuser's crontab file. If a username is given, the specified user's crontab file is edited, rather than the current user's crontab file; this can only be done by a user withthe solaris.jobs.admin authorization. The environment variable EDITOR determines which editor is invoked with the -e option. The default editor is ed(1). All crontabjobs should be submitted using crontab. Do not add jobs by just editing the crontab file, because cron is not aware of changes made this way.

    QUESTION 9You want to display the IP address assignments of the network interfaces. Which command should you use?

    https://www.gratisexam.com/

    A. ipadm show-if

    B. ipadm show-addr

    C. ipadm show-prop

    D. ipadm show-addrprop

    Correct Answer: B

  • https://www.gratisexam.com/

    Section: (none)Explanation

    Explanation/Reference:Explanation:'ipadm show-addr' displays all the configured addresses on the system.

    Example:# ipadm show-addrADDROBJ TYPE STATE ADDRlo0/v4 static ok 127.0.0.1/8lo0/v6 static ok ::1/128

    QUESTION 10The following image properties are displayed on your system:

    Which two options describe the boot environment policy property that is currently set for this image?

    A. All package operations are performed in a new BE set as active on the next boot.

    B. Do not create a new BE. The install, update, uninstall, or revert operation is not performed if a new BE is required.

    C. If a BE is created, do not set it as the active BE on the next boot

    D. A reboot is required for all package operations

  • https://www.gratisexam.com/

    E. A reboot is not required after a package operation.

    F. For package operations that require a reboot, this policy creates a new BE set as active on the next boot.

    Correct Answer: DFSection: (none)Explanation

    Explanation/Reference:Explanation:Image properties described below.

    * be-policySpecifies when a boot environment is created during packaging operations. The following values are allowed:/ defaultApply the default BE creation policy: create-backup.

    / always-new (D, F)Require a reboot for all package operations (D) by performing them in a new BE set as active on the next boot (F). A backup BE is not created unless explicitlyrequested.

    This policy is the safest, but is more strict than most sites need since no packages can be added without a reboot.

    QUESTION 11dbzone is currently running on your server.

    Which two methods would you use to safely and cleanly shut down dbzone and all of its applications?

    A. zlogin –z dbzone halt

    B. zoneadm –z dbzone shutdown –i0

    C. zoneadm –z dbzone shutdown

    D. zoneadm –z dbzone halt

    E. zlogin dbzone shutdown –i0

    Correct Answer: DESection: (none)Explanation

    Explanation/Reference:Explanation:D: zoneadm halt command halts the specified zones. halt bypasses running the shutdown scripts inside the zone. It also removes run time resources of the zone.

  • https://www.gratisexam.com/

    E: Use: zlogin zone shutdownto cleanly shutdown the zone by running the shutdown scripts.

    Use this procedure to cleanly shut down a zone. 1. Become superuser, or assume the Primary Administrator role.2. Log in to the zone to be shut down, for example, my-zone, and specify shutdown as the name of the utility and init 0 as the state global# zlogin my-zoneshutdown -y -g0 -i 0

    QUESTION 12View the Exhibit to see the information taken from the installation log file.Based on the information presented in the Exhibit, which two options describe the state of the system when the server is booted for the first time after theinstallation is complete?

    A. NWAM will be used to configure the network interface.

    B. The network/physical service is offline.

    C. You cannot log in from the console as root. You must first log in as a user and then su to root account.

  • https://www.gratisexam.com/

    D. The root user can log in from the console login.

    E. You will be prompted to configure the network interface after the initial login.

    Correct Answer: BDSection: (none)Explanation

    Explanation/Reference:

    QUESTION 13In order to display the IP addresses of network interfaces, what command would you use?

    A. dladm

    B. ipconfig

    C. sves

    D. ipadm

    E. ipaddr

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:Explanation:'ipadm show-addr' displays all the configured addresses on the system.

    Example:# ipadm show-addrADDROBJ TYPE STATE ADDRlo0/v4 static ok 127.0.0.1/8lo0/v6 static ok ::1/128

    QUESTION 14The su command by default makes an entry into the log file for every su command attempt. The following is a single line from the file:

    SU 12/18 23:20 + pts/1 user1-root

    What does the + sign represent?

  • https://www.gratisexam.com/

    A. unsuccessful attempt

    B. successful attempt

    C. The attempt was from a pseudo terminal, and not the console.

    D. The attempt was from a user that is in the adm group, same as root.

    E. Time zone is not set.

    Correct Answer: BSection: (none)Explanation

    Explanation/Reference:Explanation:The sulog file, /var/adm/sulog, is a log containing all attempts (whether successful or not) of the su command. An entry is added to the sulog file every time the sucommand is executed. The fields in sulog are: date, time, successful (+) or unsuccessful (-), port, user executing the su command, and user being switched to. Inthe preceding example, all su attempts were successful, except for the attempt on 2/23 at 20:51, when user pete unsuccessfully attempted to su to user root.

    Look for entries where an unauthorized user has used the command inappropriately. The following entry shows a successful (indicated by +) su from user userid toroot.

    SU 03/31 12:52 + pts/0 -root

    QUESTION 15A user brian is configured to use the bash shell. His home directory is /export/home/brian, and contains a .profile and a .bashrc file.In the -profile, there are these lines:genius =ritchieexport genius

    In the .bashrc us this line:genius=kernighan

    In /etc/profile are these lines:genius=thompsonexport genius

    When brian logs in and asks for the value of genius, what will he find, and why?

    A. genius will be ritchie, because that was the value exported in .profile.

    B. genius will be kernighan, because .bashrc executes after .profile.

    C. genius will be ritchie because variable settings in .profile take precedence over variable settings in .bashrc.

  • https://www.gratisexam.com/

    D. genius will be ritchie because .profile executes after .bashrc.

    E. genius will be thompson because /etc/profile system settings always override local settings.

    Correct Answer: CSection: (none)Explanation

    Explanation/Reference:Explanation:

    QUESTION 16Consider the following commands:

    What is displayed when this sequence of commands is executed using the bash shell?

    A. Hello, world

    B. cat: cannot open file1: No such file or directory Hello, world

    C. cat: cannot open file1: No such file or directory

    D. bash: syntax error near unexpected token '| |'

    E. bash: syntax error broker pipe

    Correct Answer: BSection: (none)Explanation

    Explanation/Reference:

    QUESTION 17You are logged in as root to a newly installed Solaris 11 system. You issue the command useradd -d, and then examine the /usr/sadm/defadduser file. This fileincludes the entry defshell=/bin/sh. Which shell will now be the default for the next account created?

    A. bash shell

  • https://www.gratisexam.com/

    B. C shell

    C. korn shod

    D. bourne shell

    Correct Answer: ASection: (none)Explanation

    Explanation/Reference:Explanation:Oracle Solaris 11 introduces user environment and command-line argument changes that include the following:

    * Shell changes - The default shell, /bin/sh, is now linked to ksh93. The default user shell is the Bourne-again (bash) shell.* The legacy Bourne shell is available as /usr/sunos/bin/sh.* The legacy ksh88 is available as /usr/sunos/bin/ksh from the shell/ksh88 package.* Korn shell compatibility information is available in /usr/share/doc/ksh/COMPATIBILITY.

    QUESTION 18You want to display network interface information. Which command should you use?

    A. ipadm show-if

    B. ipadm show-addr

    C. ipadm show-prop

    D. ipadm show-addrprop

    Correct Answer: ASection: (none)Explanation

    Explanation/Reference:

    QUESTION 19You start to execute a program by using the following command:

    ~/bigscript &

    You then determine that the process is not behaving as expected, and decide that you need to terminate the process.

    Based on the information shown below, what is the process number you should terminate?

  • https://www.gratisexam.com/

    A. 15163

    B. 15156

    C. 15166

    D. 15165

    Correct Answer: ASection: (none)Explanation

    Explanation/Reference:Explanation:From the output exhibit we can deduce that the shell has id 15156.It has spawned three subprocesses:grep: id 15166ps –aef 15165The remaining 15163 must be the subshell (see note below).This is the id of the process which should be terminated.

    QUESTION 20You have installed the SMF notification framework to monitor services. Which command is used to set up the notifications for a particular service?.

    https://www.gratisexam.com/

    A. svccfg

    B. svcadm

    C. setnotify

  • https://www.gratisexam.com/

    D. smtp-notify

    Correct Answer: ASection: (none)Explanation

    Explanation/Reference:Explanation:How to Set Up Email Notification of SMF Transition EventsThis procedure causes the system to generate an email notification each time one of the services or a selected service has a change in state. You can choose touse either SMTP or SNMP. Normally, you would only select SNMP if you already have SNMP configured for some other reason.

    By default, SNMP traps are sent on maintenance transitions. If you use SNMP for monitoring, you can configure additional traps for other state transitions.

    1. Become an administrator or assume a role that includes the Service Management rights profile.'2. Set notification parameters.Example 1:The following command creates a notification that sends email when transactions go into the maintenance state.# /usr/sbin/svccfg setnotify -g maintenance mailto:[email protected]

    Example 2:The following command creates a notification that sends email when the switch service goes into the online state.

    # /usr/sbin/svccfg -s svc:/system/name-service/switch:default setnotify to-online \ mailto:[email protected]

    Note: The svccfg command manipulates data in the service configuration repository. svccfg can be invoked interactively, with an individual subcommand, or byspecifying a command file that contains a series of subcommands.Changes made to an existing service in the repository typically do not take effect for that service until the next time the service instance is refreshed.

    QUESTION 21User jack logs in to host Solaris and executes the following command sequence:

    Which three statements are correct?

  • https://www.gratisexam.com/

    A. User jack can edit testfile because he has read and write permissions at the group level.

    B. User jack can use cat to output the contents of testfile because he has read permission as the file owner.

    C. User jill can change the permissions of testfile because she has write permission for the file at the group level.

    D. User jill can edit testfile because she has read and write permission at the group level.

    E. User jack can change permissions for testfile because he is the owner of the file.

    F. User jack can change permissions for testfile because he has execute permission for the file.

    Correct Answer: DEFSection: (none)Explanation

    Explanation/Reference:

    QUESTION 22The OpenBoot firmware controls the operation of the system before the operating system is loaded.

    Which four tasks are directly controlled by the OpenBoot firmware?

    A. Provides a list of boot entries from which to choose

    B. Allows hardware to identify itself and load its own plug-in device driver

    C. Loads the boot loader from the configured boot device

    D. Performs basic hardware testing

    E. Installs the console

    F. Reads and executes the boot archive

    G. Extract and executes the kernel image

    Correct Answer: ABCDSection: (none)Explanation

    Explanation/Reference:Explanation:OpenBoot firmware is executed immediately after you turn on your system. The primary tasks of OpenBoot firmware are to:* Test and initialize the system hardware (D)* Determine the hardware configuration (D)*Boot the operating system from either a mass storage device or from a network

  • https://www.gratisexam.com/

    *Provide interactive debugging facilities for testing hardware and software

    Some notable features of OpenBoot firmware.* Plug-in Device Drivers (B)

    Most common tasks that you perform using OpenBoot* Booting Your SystemThe most important function of OpenBoot firmware is to boot the system.Note: If auto-boot? is true, the system will boot from either the default boot device or from the diagnostic boot device depending on whether OpenBoot is indiagnostic mode. (C)

    QUESTION 23Which two options are accurate regarding the non-global zone console?

    A. Access the non-global zone console by using the zlogin –c command.

    B. Access the non-global zone console by using the zlogin –1 command.

    C. Disconnect from the non-global zone console by using the ~. keys.

    D. Disconnect from the non-global zone console by using the #. keys.

    Correct Answer: ACSection: (none)Explanation

    Explanation/Reference:Explanation:A: How to Log In to the Zone Console Use the zlogin command with the -C option and the name of the zone, for example, my-zone.global# zlogin -C my-zoneC: To disconnect from a non-global zone, use one of the following methods.* To exit the zone non-virtual console:zonename# exit* To disconnect from a zone virtual console, use the tilde (~) character and a period:zonename# ~.

    QUESTION 24The default publisher on your system is:

    You want to update the Oracle Solaris 11 environment on your system, but you are not able to connect this system to the Internet to access the default Oraclerepository. A repository has been created on your local network and is named http://server1.example.com.

  • https://www.gratisexam.com/

    Which command would you choose to connect your system to the local repository?

    A. pkg publisher to specify the new publisher

    B. pkg set-publisher to set the stickiness on the http://server1.example.com publisher and unset stickiness for http://pkg.oracle.com/solaris/release

    C. pkg add-publisher to add the new publisher

    D. pkg set-publisher to set the origin for the publisher

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:Explanation:Solaris 11 Express makes it pretty easy to set up a local copy of the repository.A common reason folks need access to a local repository is because their system is not connected to the Internet.

    Tthe pkg set-publisher command can be used to for example add a publisher or to enable or disable a publisher.

    Note: Example Adding a PublisherUse the -g option to specify the publisher origin URI.

    # pkg set-publisher -g http://pkg.example.com/release example.com

    Example Specifying the Preferred PublisherUse the -P option to specify a publisher as the preferred publisher. The specified publisher moves to the top of the search order. You can specify the -P optionwhen you add a publisher or you can modify an existing publisher.# pkg set-publisher -P example.com

    Example Enabling or Disabling a Publisher

    Use the -d option to disable a publisher. The preferred publisher cannot be disabled. A disabled publisher is not used in package operations such as list and install.You can modify the properties of a disabled publishers.Use the -e option to enable a publisher.# pkg set-publisher -d example2.com

    QUESTION 25Your server has a ZFS storage pool that is configured as follows:

  • https://www.gratisexam.com/

    The following partition scheme is used for every disk drive in pool1:

    Which two are true regarding the ZFS storage pool?

    A. The data on c3t3d0 is duplicated on c3t4do.

    B. The data is striped across disks c3t3d0 and c3t4do and mirrored across vdevs mirror-0 and mirror-1.

    C. The storage pool is 146 GB total size (rounded to the nearest GB).

    D. The storage pool is 584 G8 total size (rounded to the nearest GB).

    E. The storage pool is 292 GB total size (rounded to the nearest GB).

    Correct Answer: AESection: (none)

  • https://www.gratisexam.com/

    Explanation

    Explanation/Reference:

    QUESTION 26You enter dladm show-phys, which provides the following output:

    You then enter:ipadm create-ip net3

    What is the output?

    A. ipadm: cannot; create interface net3: Operation failed.

    B. ipadm: cannot create interface net3: Interface already exists.

    C. ipadm: cannot create interface net3: IP address object not specified.

    D. No_response, The command was successful.

    Correct Answer: BSection: (none)Explanation

    Explanation/Reference:Explanation:According to the exhibit the interface already exists.The command ipadm create-ip net3 is supposed to create a new interface net3.

    QUESTION 27Choose three options that describe the features associated with a Live Media installation.

    A. does not allow the root user to log in to the system directly from the console (or any terminal)

    B. provides a "hands free" installation

    C. installs the desktop based packages

    D. can be used to install only x86 platforms

  • https://www.gratisexam.com/

    E. installs the server-based set of packages only

    F. allows both automatic and manual configuration of the network

    G. installs both the server-based and desktop-based package

    Correct Answer: BCDSection: (none)Explanation

    Explanation/Reference:Explanation:The graphical installer is officially known as the "Live Media." This means that Oracle Solaris can be booted into RAM, causing zero impact on your existingoperating system. After it is loaded, you are free to experiment with Oracle Solaris to determine whether it is something you would like to install to your system.

    You can download Oracle Solaris 11 Live Media for x86, which is an approximately 800 MB image file, and use a DVD burner to create the disk, or you can use theISO image directly in a virtual machine or through the Oracle Integrated Lights Out Manager (ILOM) Remote Console.

    The Live Media is not intended for long-term use. For example, any changes that you make to the system are lost when the system is shut down. Therefore, thenext logical step is to install Oracle Solaris on the system, which the Live Media makes easy by placing an Install Oracle Solaris icon right on the desktop. Butbefore we head down that road, let's step back a bit and consider the installation options.

    Note: The Live Media provides administrators with an opportunity to explore the Oracle Solaris 11 environment without installing it on a system. The system bootsoff the media directly allowing administrators to start the installer should they choose to install it to a system.

    QUESTION 28In a fresh installation of Oracle Solaris 11, default datalinks are named with a genetic naming convention, and they increment as you add interfaces. What is thedefault name?

    A. eth#

    B. net#

    C. el000g#

    D. lo#

    E. nic#

    Correct Answer: BSection: (none)Explanation

    Explanation/Reference:Explanation:When you install this Oracle Solaris release on a system for the first time, Oracle Solaris automatically provides generic link names for all the system's physical

  • https://www.gratisexam.com/

    network devices. This name assignment uses the net# naming convention, where the # is the instance number. This instance number increments for each device,for example, net0, net1, net2, and so on.

    Note:Network configuration in Oracle Solaris 11 includes* Generic datalink name assignment – Generic names are automatically assigned to datalinks using the net0, net1, netN naming convention, depending on the totalnumber of network devices that are on the system

    QUESTION 29You are planning group names for a new system. You decide to use a numbering convention that includes the year and month the project began, to form the groupnumber and name for work associated with that project.

    So, for example, a project targeted to begin in January, 2013 would have the number (name):201301(Pr20l301)

    What are the two problems with your plan?

    A. Group names may not contain a numeric character

    B. Group names may be no longer than 7 characters.

    C. Group numbers should not be larger than 60000.

    D. Group names should be all lowercase.

    Correct Answer: CDSection: (none)Explanation

    Explanation/Reference:Explanation:C: The Group ID (GID) field contains the group's numerical ID. GIDs can be assigned whole numbers between 100 and 60000.D: Group names contain only lowercase characters and numbers.

    QUESTION 30The following line is from /etc/shadow in a default Solaris 11 Installation:

    jack: $5$9JFrt54$7JdwmO.F11Zt/ jFeeOhDmnw93LG7Gwd3Nd/cwCcNWFFg:0:15:30:3:::

    Which two are true?

    A. Passwords for account jack must be a minimum of 15 characters long.

    B. The password for account jack has expired.

  • https://www.gratisexam.com/

    C. The password for account jack has 5 characters.

    D. A history of 3 prior passwords for the account jack is kept to inhibit password reuse.

    E. The minimum lifetime for a password for account jack is 15 days.

    Correct Answer: BESection: (none)Explanation

    Explanation/Reference:Explanation:From the content of the /etc/shadow file we get:* username: jack* encrypted password: $5$9JFrt54$7JdwmO.F11Zt/ jFeeOhDmnw93LG7Gwd3Nd/cwCcNWFFg* Last password change (lastchanged): Days since Jan 1, 1970 that password was last changed: 0* Minimum: The minimum number of days required between password changes i.e. the number of days left before the user is allowed to change his/her password:15Maximum: The maximum number of days the password is valid (after that user is forced to change his/her password): 30 Warn : The number of days beforepassword is to expire that user is warned that his/her password must be changed: 3* Inactive : The number of days after password expires that account is disabled* Expire : days since Jan 1, 1970 that account is disabled i.e. an absolute date specifying when the login may no longer be used

    QUESTION 31You are asked to determine user jack’s default login directory. Which command would provide you with useful information?

    A. cat /etc/passwd | grep jack

    B. cat /etc/group | grep jack

    C. cat /etc/shadow | grep jack

    D. cat /etc/default/passwd | grep jack

    Correct Answer: ASection: (none)Explanation

    Explanation/Reference:Explanation:The /etc/passwd contains one entry per line for each user (or user account) of the system. All fields are separated by a colon (:) symbol. Total seven fields asfollows.

    1. Username: It is used when user logs in. It should be between 1 and 32 characters in length.2. Password: An x character indicates that encrypted password is stored in /etc/shadow file.

  • https://www.gratisexam.com/

    3. User ID (UID): Each user must be assigned a user ID (UID). UID 0 (zero) is reserved for root and UIDs 1-99 are reserved for other predefined accounts. FurtherUID 100-999 are reserved by system for administrative and system accounts/groups.4. Group ID (GID): The primary group ID (stored in /etc/group file)5. User ID Info: The comment field. It allow you to add extra information about the users such as user's full name, phone number etc. This field use by fingercommand.6. Home directory: The absolute path to the directory the user will be in when they log in. If this directory does not exists then users directory becomes /7. Command/shell: The absolute path of a command or shell (/bin/bash). Typically, this is a shell. Please note that it does not have to be a shell.

    QUESTION 32You need to install the solaris-desktop group package. Which command would you use to list the set of packages included in that software group?

    A. pkg search

    B. pkg info

    C. pkginfo

    D. pkg contents

    Correct Answer: ASection: (none)Explanation

    Explanation/Reference:Explanation:Use the pkg search command to search for packages whose data matches the specified pattern.Like the pkg contents command, the pkg search command examines the contents of packages. While the pkg contents command returns the contents, the pkgsearch command returns the names of packages that match the query.

    QUESTION 33Which files must be edited in order to set up logging of all failed login attempts?

    https://www.gratisexam.com/

    A. /etc/default/login, /var/adm/loginlog, /etc/syslog.conf

    B. /etc/default/login, /var/adm/authlog, /etc/syslog.conf

    C. /var/adm/loginlog, /var/adm/authlog, /etc/syslog.conf

    D. /etc/default/login, /var/adm/authlog, /var/adm/loginlog

  • https://www.gratisexam.com/

    Correct Answer: BSection: (none)Explanation

    Explanation/Reference:Explanation:This procedure captures in a syslog file all failed login attempts.1. Set up the /etc/default/login file with the desired values for SYSLOG and SYSLOG_FAILED_LOGINSEdit the /etc/default/login file to change the entry. Make sure that SYSLOG=YES is uncommented.2. Create a file with the correct permissions to hold the logging information.Create the authlog file in the /var/adm directory.

    3. Edit the syslog.conf file to log failed password attempts.Send the failures to the authlog file.

    QUESTION 34Which command would you use from the bash shell to determine the total amount of physical memory installed in your Solaris system (x86 and SPARC)?

    A. uname –a

    B. prtconf | grep –i memory

    C. sysdef | grep –i memory

    D. vmstat

    E. prtdiag | grep –i memory

    Correct Answer: BSection: (none)Explanation

    Explanation/Reference:Explanation:The prtconf command prints the system configuration information. The output includes the total amount of memory, and the configuration of system peripheralsformatted as a device tree.

    If a device path is specified on the command line for those command options that can take a device path, prtconf will only display information for that device node.

    QUESTION 35Which two options are characteristics of a fast reboot?

    A. A fast reboot bypasses grub.

  • https://www.gratisexam.com/

    B. A fast reboot cannot be used after a system panic on the x86 platform.

    C. A fast reboot can only be executed on the SPARC platform when the config/fastreboot_default property for the svc:/system/boot-config:default service is set totrue.

    D. A fast reboot uses an in-kernel boot loader to load the kernel into memory.

    E. A fast reboot is the default on all platforms.

    Correct Answer: CDSection: (none)Explanation

    Explanation/Reference:Explanation:C: To change the default behavior of the Fast Reboot feature on the SPARC platform, so that a fast reboot is automatically performed when the system reboots,see below.

    The following example shows how to set the property's value to true on the SPARC platform, so that a fast reboot is initiated by default:

    # svccfg -s "system/boot-config:default" setprop config/fastreboot_default=true# svcadm refresh svc:/system/boot-config:default

    D: Fast Reboot implements an in-kernel boot loader that loads the kernel into memory and then switches to that kernel.The firmware and boot loader processes are bypassed, which enables the system to reboot within seconds.

    The Fast Reboot feature is managed by SMF and implemented through a boot configuration service, svc:/system/boot-config. The boot-config service provides ameans for setting or changing the default boot configuration parameters. When the config/fastreboot_default property is set to true, the system performs a fastreboot automatically, without the need to use the reboot -f command. This property's value is set to true on the x86 platform. For task-related information, includinghow to change the default behavior of Fast Reboot on the SPARC platform, see Accelerating the Reboot Process on an x86 Based System.

    Note: One new feature, called Fast Reboot, will allow the system to boot up without doing the routine set of hardware checks, a move that can make system boottimes up to two-and-a-half times faster, Oracle claimed. This feature can be handy in that an administrator applying a patch or software update across thousands ofSolaris deployments can reboot them all the more quickly.

    QUESTION 36You are installing the Solaris 11 OE by using the Interactive Text Installer. You have selected the option to automatically configure the primary network controller.Which three items will automatically be configured as a result of this selection?

    A. The IP address.

    B. The name service.

    C. The time zone.

    D. A default user account.

  • https://www.gratisexam.com/

    E. The terminal type.

    F. The root password.

    G. The host name.

    Correct Answer: ABCSection: (none)Explanation

    Explanation/Reference:Explanation:IP address and name service (such as a DNS server) are provided by the DHCP server.

    QUESTION 37Which two SMF milestones can be specified at boot time?

    A. none

    B. network

    C. all

    D. config

    E. unconfig

    F. devices

    Correct Answer: ACSection: (none)Explanation

    Explanation/Reference:Explanation:The milestones that can be specified at boot time are

    nonesingle-usermulti-usermulti-user-serverall

    QUESTION 38Your system is assigned an IP address object 192.168.0.222/24. However, the net mask — expressed as four octets — is required. Which is the correct netmask?

  • https://www.gratisexam.com/

    A. 255.0.0.0

    B. 255.255.0.0

    C. 255.255.255.0

    D. 255.255.255.24

    E. 255.255.255.255

    Correct Answer: CSection: (none)Explanation

    Explanation/Reference:Explanation:A 24-bit network mask is expressed as 255.255.255.0.

    QUESTION 39View the following information for a software package:

    Which command would you use to display this information for a software package that is not currently installed on your system?

    A. pkg list gzip

    B. pkg info -r gzip

    C. pkg search –1 gzip

    D. pkg verify –v gzip

  • https://www.gratisexam.com/

    E. pkg contents gzip

    Correct Answer: BSection: (none)Explanation

    Explanation/Reference:Explanation:By default, the pkg info command only lists information about installed packages on the system; however, we can use a similar command to look up informationabout uninstalled packages, as shown in here:Example:Listing Information About an Uninstalled Package# pkg info -r php-52Name: web/php-52Summary: PHP Server 5.2Description: PHP Server 5.2Category: Development/PHPState: Not InstalledPublisher: solarisVersion: 5.2.17Build Release: 5.11Branch: 0.175.0.0.0.1.530Packaging Date: Wed Oct 12 14:01:41 2011Size: 44.47 MBFMRI: pkg://solaris/web/[email protected], 5.11-0.175.0.0.0.1.530:20111012T140141Z

    Note: pkg info command displays information about packages in a human-readable form.Multiple FMRI patterns may be specified; with no patterns, display information on all installed packages in the image.

    With -l, use the data available from locally installed packages.This is the default.

    With -r, retrieve the data from the repositories of the image's configured publishers. Note that you must specify one or more package patterns in this case.

    QUESTION 40user1 has a disk quota of 0.5 MB. The user attempts to run the following command on a file called .bigfile that is 495 KB in size:

    cp bigfile /tmp

    Will the command execute successfully?

    A. Yes. Quotas do not include any of the system files such as /tmp /swap.

  • https://www.gratisexam.com/

    B. Yes. The quota is set at the directory level, not the user level.

    C. No. The command will fail because it will cause him to exceed his user quota.

    D. No. A user cannot place files into the /tmp directory.

    Correct Answer: ASection: (none)Explanation

    Explanation/Reference:Explanation:UFS quotas enable system administrators to control the size of file systems. Quotas limit the amount of disk space and the number of inodes, which roughlycorresponds to the number of files, that individual users can acquire. For this reason, quotas are especially useful on the file systems where user home directoriesreside. As a rule, the public and /tmp file systems usually do not benefit significantly by establishing quotas.

    Note: The cp command copies files and directories.

    QUESTION 41You log in to the system as user1, then switch user to root by using the su - command. After entering the correct password, yon enter the following commands:

    whoami;who am i;id

    Which option correctly represents the output?

  • https://www.gratisexam.com/

    A. Option A

    B. Option B

    C. Option C

    D. Option D

    Correct Answer: BSection: (none)Explanation

    Explanation/Reference:Explanation:* The whoami utility displays your effective user ID as a name.Here this would be root.* who am iThe command who shows who is logged on.Here this would be:user1 console Dec 30 20:20

    * The id utility displays the user and group names and numeric IDs, of the calling process, to the standard output. If the real and effective IDs are different, both aredisplayed, otherwise only the real ID is displayed.Here this would be:uid=0(root) gid=0(root)

    Note:Each UNIX proces has 3 UIDs associated to it. Superuser privilege is UID=0.

    Real UID--------

    This is the UID of the user/process that created THIS process. It can be changed only if the running process has EUID=0.

    Effective UID-------------

    This UID is used to evaluate privileges of the process to perform a particular action. EUID can be change either to RUID, or SUID if EUID!=0. If EUID=0, it can bechanged to anything.

    Saved UID---------

  • https://www.gratisexam.com/

    If the binary image file, that was launched has a Set-UID bit on, SUID will be the UID of the owner of the file. Otherwise, SUID will be the RUID.

    QUESTION 42Your server has a ZFS storage pool that is configured as follows:

    The server has two spare 146-GB disk drives: c3t5d0 c3t6d0

    You need to add more space to the pool1 storage pool. Which command would add more mirrored storage to the pool1 storage pool?

    A. zpool add pool1 mirror c3t5d0 c3t6d0

    B. zpool attach pool1 mirror c3t5d0 c3t6d0

    C. zpool attach pool1 c3r3d0 c3r5d0; zpool attach pool1 c3r4d0 c3r6d0

    D. zpool add pool1 c3r3d0 c3r5d0; zpool add pool1 c3r4d0 c3r6d0

    Correct Answer: ASection: (none)Explanation

    Explanation/Reference:

    QUESTION 43You attempted to reboot a system via the init command, however the system did not perform boot sequence into the Oracle Solaris Operating Environment. Youare presented with a prompt from the OpenBoot PROM. Which command would you enter, to boot the system from the default device?

    A. boot -net install

    B. boot

    C. boot –default

    D. boot –s0

  • https://www.gratisexam.com/

    Correct Answer: BSection: (none)Explanation

    Explanation/Reference:Explanation:BootWith this form, boot loads and executes the program specified by the default boot arguments from the default boot device

    Note: boot has the following general format:boot [device-specifier] [arguments]where device-specifier and arguments are optional.

    QUESTION 44You have a ZFS file system named /dbase/oral and you want to guarantee that 10 GB of storage space is available to that dataset for all data, snapshots, andclones.

    Which option would you choose?

    A. zfs set refreservation=10g dbase/oral

    B. zfs set quota=10g dbase/oral

    C. zfs set refquota=10g dbase/oral

    D. zfs set reservation=10g dbase/oral

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:Explanation:A ZFS reservation is an allocation of disk space from the pool that is guaranteed to be available to a dataset. As such, you cannot reserve disk space for a datasetif that space is not currently available in the pool. The total amount of all outstanding, unconsumed reservations cannot exceed the amount of unused disk space inthe pool. ZFS reservations can be set and displayed by using the zfs set and zfs get commands. For example:

    # zfs set reservation=5G tank/home/bill# zfs get reservation tank/home/billNAME PROPERTY VALUE SOURCEtank/home/bill reservation 5G local

    QUESTION 45

  • https://www.gratisexam.com/

    View the Exhibit.

    Which is true regarding the disk drive?

    A. This disk configuration could be used as a ZFS root disk.

    B. This disk contains an SMI disk label.

    C. Slice 7 represents the entire disk and cannot be used as a slice for a file system

    D. The disk contains an EFI disk label.

    Correct Answer: ASection: (none)Explanation

    Explanation/Reference:Explanation:Installing a ZFS Root PoolThe installer searches for a disk based on a recommended size of approximately 13 GB.

    QUESTION 46User jack logs in to host solaris and then attempts to log in to host oracle using ssh. He receives the following error message:

    The authenticity of host oracle (192.168.1.22) can't be established. RSA key fingerprint is 3B:23:a5:6d:ad:a5:76:83:9c:c3:c4:55:a5:18:98:a6Are you sure you want to continue connecting (yes/no)?

    Which two are true?

  • https://www.gratisexam.com/

    A. The public host key supplied by solaria is not known to the host oracle.

    B. The error would not occur if the RSA key fingerprint shown in the error message was added to the /etc/ssh/known_hosts file on solaris.

    C. The private host key supplied by oracle is not known to solaris.

    D. If jack answers yes, the RSA public key for the host oracle will be added to the known_hosts file for the user jack.

    E. The public host key supplied by oracle is not known to the host solaris.

    Correct Answer: BDSection: (none)Explanation

    Explanation/Reference:Explanation:The fingerprints are used to guard against man in the middle attacks. Since ssh logins usually work over the internet (an insecure connection), someone couldhijack your connection. When you try to log into yourmachine.com, he could get "in the middle" and return your challenge as if he was yourmachine.com. That way,he could get hold of your login password.

    To make this attack harder, ssh stores the fingerprint of the server's public key on the first connection attempt. You will see a prompt like:

    The authenticity of host 'eisen (137.43.366.64)' can't be established.RSA key fingerprint is cf:55:30:31:7f:f0:c4:a0:9a:02:1d:1c:41:cf:63:cf.Are you sure you want to continue connecting (yes/no)

    When you enter yes, ssh will add the fingerprint to your known_hosts file. you will see

    Code:Warning: Permanently added 'eisen, 137.43.366.64' (RSA) to the list of known hosts.

    The next time you login, ssh will check whether the host key has changed. A changing host key usually indicates a man in the middle attack, and ssh refuses toconnect.

    QUESTION 47To help with your troubleshooting, you need to determine the version of the OBP. Which two commands will provide you with this information?

    A. printenv

    B. banner

    C. .version

    D. set-env

    E. show-devs

  • https://www.gratisexam.com/

    F. value version

    Correct Answer: BCSection: (none)Explanation

    Explanation/Reference:Explanation:B: bannerDisplays power-on banner.The PROM displays the system banner. The following example shows a SPARCstation 2 banner. The banner for your SPARC system may be different.

    SPARCstation 2, Type 4 KeyboardROM Rev. 2.0, 16MB memory installed, Serial # 289Ethernet address 8:0:20:d:e2:7b, Host ID: 55000121C: .versionDisplays version and date of the boot PROM.

    Note: OBP-OpenBootProm is a firmware which is placed on the sun machine's prom chip.It is a os independent user interface to deal with the sun machine's hardware components.The user interface provides one or more commands to display system information.

    QUESTION 48You need to connect two nonglobal zones using a private virtual network.Identify the network resources required in the global zone to accomplish this.

    A. an etherstub and two virtual network interfaces

    B. a virtual bridge

    C. two virtual network interfaces.

    D. two etherstubs

    Correct Answer: ASection: (none)Explanation

    Explanation/Reference:

    QUESTION 49The /usr/bin/p7zip file that is part of the p7zip package has been overwritten. This server is critical to production and cannot be rebooted. Identify the command thatwould restore the file without requiring a reboot.

  • https://www.gratisexam.com/

    A. pkg verify p7zip

    B. pkg fix p7sip

    C. pkg rebuild-index p7zip

    D. pkg revert p7zip

    E. pkg uninstsll p7zip

    F. pkg install p7zip

    G. pkg install --no-backup-be p7sip

    H. pkg refresh p7zip

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:Explanation:Use the pkg revert command to restore files to their as-delivered condition.

    QUESTION 50Given:

    file1 and file2 are text files.dir1 and dir2 are directories.

    Which two commands will be successful?

    A. cp dir1 dir1

    B. cp dir1 file1

    C. cp file? dir1

    D. cp file. dir1

    E. cp file% dir2

    F. cp file1 file2 dir1.

    https://www.gratisexam.com/

  • https://www.gratisexam.com/

    Correct Answer: CFSection: (none)Explanation

    Explanation/Reference:Explanation:C: Here the wildcard character ? is used (Matches any single character).file1 and file2 will be copied into dir1F: the two files file1 and file2 are copied into directoy dir1.Note: cp - copy files and directoriesCopy SOURCE to DEST, or multiple SOURCE(s) to DIRECTORY.

    Cp has three principal modes of operation. These modes are inferred from the type and count of arguments presented to the program upon invocation.* When the program has two arguments of path names to files, the program copies the contents of the first file to the second file, creating the second file ifnecessary.* When the program has one or more arguments of path names of files and following those an argument of a path to a directory, then the program copies eachsource file to the destination directory, creating any files not already existing.* When the program's arguments are the path names to two directories, cp copies all files in the source directory to the destination directory, creating any files ordirectories needed. This mode of operation requires an additional option flag, typically r, to indicate the recursive copying of directories. If the destination directoryalready exists, the source is copied into the destination, while a new directory is created if the destination does not exist.

    QUESTION 51You want to delete the IPv4 address on the interface net3. Which command should you use?

    A. ipadm delete-ip net3/v4

    B. ipadm down-addr net3/v4

    C. ipadm disable-if net3/v4

    D. ipadm delete-vni net3/v4

    E. ipadm delete-addr net3/v4

    F. ipadm deiete-ipv4 ner3/v4

    Correct Answer: ESection: (none)Explanation

    Explanation/Reference:Explanation:

  • https://www.gratisexam.com/

    The ipadm delete-addr subcommand removes addresses from interfaces.

    To remove an address from the IPMP group, type the following command:

    # ipadm delete-addr addrobjThe addrobj uses the naming convention inder-interface/user-string.

    QUESTION 52Select two correct statements about the authentication services available in Oracle Solaris 11.

    A. Pluggable Authentication Modules (PAM) is used to control the operation of services such console logins and ftp.

    B. The Secure Shell can be configured to allow logins across a network to remote servers without transmitting passwords across the network.

    C. Secure Remote Procedure Calls (Secure RPC) provides a mechanism to encrypt data on any IP Socket connection.

    D. Pluggable Authentication Modules (PAM) is used to implement the Secure Shell in Oracle Solaris 11.

    E. Simple Authentication and Security Layer (SASL) provides a mechanism to authenticate and encrypt access to local file system data.

    Correct Answer: AESection: (none)Explanation

    Explanation/Reference:Explanation:A: Pluggable Authentication Modules (PAM) are an integral part of the authentication mechanism for the Solaris. PAM provides system administrators with theability and flexibility to choose any authentication service available on a system to perform end-user authentication.

    By using PAM, applications can perform authentication regardless of what authentication method is defined by the system administrator for the given client.

    PAM enables system administrators to deploy the appropriate authentication mechanism for each service throughout the network. System administrators can alsoselect one or multiple authentication technologies without modifying applications or utilities. PAM insulates application developers from evolutionary improvementsto authentication technologies, while at the same time allowing deployed applications to use those improvements.

    PAM employs run-time pluggable modules to provide authentication for system entry services.

    E: The Simple Authentication and Security Layer (SASL) is a method for adding authentication support to connection-based protocols.Simple Authentication and Security Layer (SASL) is a framework for authentication and data security in Internet protocols. It decouples authentication mechanismsfrom application protocols, in theory allowing any authentication mechanism supported by SASL to be used in any application protocol that uses SASL.Authentication mechanisms can also support proxy authorization, a facility allowing one user to assume the identity of another. They can also provide a datasecurity layer offering data integrity and data confidentiality services. DIGEST-MD5 provides an example of mechanisms which can provide a data-security layer.Application protocols that support SASL typically also support Transport Layer Security (TLS) to complement the services offered by SASL.

    QUESTION 53

  • https://www.gratisexam.com/

    User brian changes the permissions for db_data this command:

    chmod 4755 db_data

    What is true?

    A. db_data now has permissions rwsr-xr-x and can be deleted only by user brian.

    B. db_data now has permissions rwsr-xr-x and, if executed, will inn with the permissions of user brian.

    C. db_data now has permissions rwxr-sr-x and can be deleted only by members of the group owning it.

    D. The permissions for db_data cannot be determined, because the permissions prior to the change have not been specified.

    E. db_data must be an ordinary file, because special permissions cannot be set on a directory.

    Correct Answer: CSection: (none)Explanation

    Explanation/Reference:Explanation:Use the chmod command to change permissions for a file or directory. You must be the owner of a file or directory, or have root access, to change its permissions.Here we do not know if brian owns db_data.

    Note:

    Permission7 full6 read and write5 read and execute4 read only3 write and execute2 write only1 execute only0 none

    0 --- no permission1 --x execute2 -w- write3 -wx write and execute4 r-- read5 r-x read and execute6 rw- read and write7 rwx read, write and execut

  • https://www.gratisexam.com/

    Solaris: Solaris Advanced User's Guide

    QUESTION 54Which three of the components could be used in a ZFS storage pool, but are not recommended configurations?

    A. A file on a UFS file system

    B. A Veritas Volume Manager (VxVM) volume

    C. A LUN In a hardware RAID array

    D. A disk slice from an SMI labeled disk

    E. A Solaris Volume Manager (SVM) volume

    F. An EFI labeled disk

    Correct Answer: ABESection: (none)Explanation

    Explanation/Reference:Explanation:A: ZFS also allows you to use UFS files as virtual devices in your storage pool. This feature is aimed primarily at testing and enabling simple experimentation, notfor production use. The reason is that any use of files relies on the underlying file system for consistency. If you create a ZFS pool backed by files on a UFS filesystem, then you are implicitly relying on UFS to guarantee correctness and synchronous semantics.However, files can be quite useful when you are first trying out ZFS or experimenting with more complicated layouts when not enough physical devices are present.All files must be specified as complete paths and must be at least 64 Mbytes in size.

    B, E: You can construct logical devices for ZFS using volumes presented by software-based volume managers, such as Solaris Volume Manager (SVM) or VeritasVolume Manager (VxVM). However, these configurations are not recommended. While ZFS functions properly on such devices, less-than-optimal performancemight be the result.

    QUESTION 55View the Exhibit and review the file system information displayed from a remote server.

  • https://www.gratisexam.com/

    You are configuring a new server. This new server has the following storage pool configured:

    This new server also has the following file systems configured:

  • https://www.gratisexam.com/

    When you are finished building this new server, the pool1/data dataset must be an exact duplicate of note server. What is the correct procedure to create the pool1/data dataset on this new server?

    A. zfs create –o mountpoint=/data –o refquota=1g pool1/data

    B. zfs set mountpoint=none pool1zfs create pool1/data

    C. zfs set mountpoint=none pool1zfs create –o mountpoint=/data –o quota=1g pool1/data

    D. zfs create quota=1g pool1/data

    E. zfs create mountpoint=/data pool1/data

    F. zfs set quota=1g pool1/data

    Correct Answer: ASection: (none)Explanation

    Explanation/Reference:Explanation:

    QUESTION 56You have installed an update to the gzip package and need to "undo" .ho update and return the package to its "as-delivered" condition. Which command would youuse?

    A. pkg undo

    B. pkg revert

    C. pkg fix

    D. pkg uninstall

    Correct Answer: B

  • https://www.gratisexam.com/

    Section: (none)Explanation

    Explanation/Reference:Explanation:Use the pkg revert command to restore files to their as-delivered condition.

    QUESTION 57To confirm the IP address and netmask have been correctly configured on the network interfaces which command should you use?

    A. ipdilm show-if

    B. ipadm show-nic

    C. ipadm show-addr

    D. ipadm show-ifconfig

    E. ipadm show-addripadm show-mask

    Correct Answer: CSection: (none)Explanation

    Explanation/Reference:Explanation:Show address information, either for the given addrobj or all the address objects configured on the specified interface, including the address objects that are only inthe persistent configuration.

    State can be: disabled, down, duplicate, inaccessible, ok, tentative

    Example:# ipadm show-addrADDROBJ TYPE STATE ADDRlo0/v4 static ok 127.0.0.1/8lo0/v6 static ok ::1/128

    QUESTION 58You are the administrator of a system that a large number of developers work on. These developers crash the system, and their applications, on a regular basis.What command would you use to configure where the core files are saved?

    A. savecore

    B. dumpadm

    C. svcadm

  • https://www.gratisexam.com/

    D. proc

    E. coreadm

    Correct Answer: ESection: (none)Explanation

    Explanation/Reference:Explanation:The coreadm command is used to specify the name and location of core files produced by abnormally-terminating processes.

    QUESTION 59Which option displays the result of running the zfs list command?

    A. Option A

    B. Option B

    C. Option C

  • https://www.gratisexam.com/

    D. Option D

    Correct Answer: BSection: (none)Explanation

    Explanation/Reference:Explanation:The zfs list command provides an extensible mechanism for viewing and querying dataset information.

    You can list basic dataset information by using the zfs list command with no options. This command displays the names of all datasets on the system and thevalues of their used, available, referenced, and mountpoint properties. For more information about these properties, see Introducing ZFS Properties.

    For example:

    # zfs listNAME USED AVAIL REFER MOUNTPOINTpool 476K 16.5G 21K /poolpool/clone 18K 16.5G 18K /pool/clonepool/home 296K 16.5G 19K /pool/homepool/home/marks 277K 16.5G 277K /pool/home/markspool/home/marks@snap 0 - 277K -pool/test 18K 16.5G 18K /test

    QUESTION 60Which network protocol provides connectionless, packet-oriented communication between applications?

    A. TCP

    B. UDP

    C. IP

    D. ICMP

    E. NFS

    F. IPSec

    Correct Answer: BSection: (none)Explanation

    Explanation/Reference:Explanation:

  • https://www.gratisexam.com/

    The User Datagram Protocol (UDP) is one of the core members of the Internet Protocol Suite, the set of network protocols used for the Internet. With UDP,computer applications can send messages, in this case referred to as datagrams, to other hosts on an Internet Protocol (IP) network without requiring priorcommunications to set up special transmission channels or data paths.Compared to TCP, UDP is a simpler message-based connectionless protocol.

    QUESTION 61A datalink can best be described as______.

    A. a driver for a Network Interface Card

    B. the software connecting the Internet Layer and the Physical Layer

    C. a device that provides Classless Inter-Domain Routing

    D. a logical object used for IP Multipathing

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:Explanation:The command dladm is used to configure data-link interfaces in Sun Solaris. A configured data-link is represented in the system as interface that can be used forTCP/IP. Each data-link relies on either a single network device or an link aggregation device to send & recieve packets.

    Network interfaces provide the connection between the system and the network. These interfaces are configured over data links, which in turn correspond toinstances of hardware devices in the system.

    In the current model of the network stack, interfaces and links on the software layer build on the devices in the hardware layer. More specifically, a hardware deviceinstance in the hardware layer has a corresponding link on the data-link layer and a configured interface on the interface layer. This one-to-one relationship amongthe network device, its data link, and the IP interface is illustrated in the figure that follows.

    Network Stack Showing Network Devices, Links, and Interfaces:

  • https://www.gratisexam.com/

    QUESTION 62View the exhibit to inspect the file system configuration on your server.

  • https://www.gratisexam.com/

    View the Exhibit to inspect the file system configuration on your server.

    Your department's backup policy is to perform a full backup to a remote system disk on Saturday.

    On Sunday through Friday, you are to perform a differential backup to the same remote system disk: The server file systems must remain available at all times and can never be taken offline.The backup must not only provide for the recovery of the most recent version of a file, but must also allow recovery of previous versions of a file created sinceSaturday's full backup.

    Following your company policy, which option describes a valid procedure for backing up the /data file system to a remote disk named /remote/backup?

  • https://www.gratisexam.com/

    A. Option A

    B. Option B

    C. Option C

    D. Option D

    Correct Answer: CSection: (none)

  • https://www.gratisexam.com/

    Explanation

    Explanation/Reference:

    QUESTION 63A user account must be a member of a primary group, and may also be a member of one or more secondary groups. What is the maximum total number of groupsthat one user can concurrently belong to?

    A. 15

    B. 16

    C. 17

    D. 63

    E. 64

    F. 65

    G. The number of groups one user can concurrently belong to is unlimited in Solaris 11.

    Correct Answer: BSection: (none)Explanation

    Explanation/Reference:Explanation:Each user belongs to a group that is referred to as the user’s primary group. The GID number, located in the user’s account entry within the /etc/passwd file,specifies the user’s primary group.

    Each user can also belong to up to 15 additional groups, known as secondary groups. In the /etc/group file, you can add users to group entries, thus establishingthe user’s secondary group affiliations.

    Note (4 PSARC/2009/542):his project proposes changing the maximum value for NGROUPS_MAX from 32 to 1024 by changing the definition of NGROUPS_UMAX from 32 to 1024.

    The use for a larger number of groups is described in CR 4088757, particular in the case of Samba servers and ADS clients; the Samba servers map every SID toa Unix group. Users with more than 32 groups SIDs are common. We've seen reports varying from"64 is enough", "128 is absolutely enough" and "we've users with more 190 group SIDS).

    NGROUPS_MAX as defined by different Unix versions are as follows (http://www.j3e.de/ngroups.html):

    Linux Kernel >= 2.6.3 65536Linux Kernel < 2.6.3 32

  • https://www.gratisexam.com/

    Tru64 / OSF/1 32IBM AIX 5.2 64IBM AIX 5.3 ... 6.1 128OpenBSD, NetBSD, FreeBSD, Darwin (Mac OS X) 16Sun Solaris 7, 8, 9, 10 16 (can vary from 0-32)

    HP-UX 20IRIX 16 (can vary from 0-32)Plan 9 from Bell Labs 32Minix 3 0 (Minix-vmd: 16)QNX 6.4 8

    QUESTION 64Identify three differences between the shutdown and init commands.

    A. Only shutdown broadcasts a final shutdown warning to all logged-in users.

    https://www.gratisexam.com/

    B. init does not terminate all services normally. The shutdown command performs a cleaner shutdown of all services.

    C. The shutdown command can only bring the system to the single-user milestone. The init command must be used to shut the system down to run level 0.

    D. Only shutdown sends a shutdown message to any systems that are mounting resources from the system that is being shut down.

    E. The shutdown command will shut the system down and turn off power; init will only shut the system down.

    Correct Answer: ABESection: (none)Explanation

    Explanation/Reference:

    QUESTION 65View the exhibit.

  • https://www.gratisexam.com/

    The configuration information in the exhibit is displayed on your system immediately after installing the OS.

    Choose the option that describes the selection made during the Installation of the OS to obtain this configuration.

    A. The automatic network configuration option was chosen during the installation of the OS.

    B. The manual network configuration option was chosen during the installation of the OS.

    C. The network was not configured during the installation of the OS.

    D. The DHCP network configuration option was chosen during the Installation of the OS.

    Correct Answer: ASection: (none)Explanation

    Explanation/Reference:Explanation:There are two ways to configure the network configuration: automatic or manual.In the exhibit we see that DHCP has been used used. This indicates an automatic network configuration.

    QUESTION 66Which command would you use to determine which package group is installed on your system?

    A. pkg list group/system/\*

    B. pkg info

    C. uname –a

    D. cat /var/sadm/system/admin/CLUSTEP

    Correct Answer: BSection: (none)Explanation

  • https://www.gratisexam.com/

    Explanation/Reference:Explanation:The pkg info command provides detailed information about a particular IPS package.

    Note: The pkginfo command does the same for any SVR4 packages you may have installed on the same system.

    pkg info example:$ pkg info p7zipName: compress/p7zipSummary: The p7zip compression and archiving utilityDescription: P7zip is a unix port of the 7-Zip utility. It has support for numerous compression algorithms, including LZMA and LZMA2, as well as for various archiveand compression file formats, including 7z, xz, bzip2, gzip, tar, zip (read-write) and cab, cpio, deb, lzh, rar, and rpm (read-only).Category: System/CoreState: InstalledPublisher: solarisVersion: 9.20.1Build Release: 5.11Branch: 0.175.0.0.0.2.537Packaging Date: Wed Oct 19 09:13:22 2011Size: 6.73 MBFMRI: pkg://solaris/compress/[email protected], 5.11-0.175.0.0.0.2.537:20111019T091322Z

    QUESTION 67Oracle Solaris 11 kernel encounters a fatal error, and it results in a system panic.

    What type of file does this generate?

    A. a.out

    B. objdump

    C. core dump

    D. tape dump

    E. crash dump

    Correct Answer: CSection: (none)Explanation

    Explanation/Reference:Explanation:A kernel panic is a type of error that occurs when the core (kernel) of an operating system receives an instruction in an unexpected format or when it fails to handleproperly. A kernel panic can also follow when the operating system can’t recover from a different type of error. A kernel panic can be caused by damaged or

  • https://www.gratisexam.com/

    incompatible software or, more rarely, damaged or incompatible hardware.

    When a server kernel panics it abruptly halts all normal system operations. Usually, a kernel process named panic() outputs an error message to the console andstores debugging information in nonvolitile memory to be written to a crash log file upon restarting the computer. Saving the memory contents of the core andassociated debugging information is called a “core dump.”

    QUESTION 68The following information is displayed for the svc:/network/ssh service:

    Which describes the minimum set of commands to be executed to bring the svc: /network/ssh: default service back online?

  • https://www.gratisexam.com/

    A. Option A

    B. Option B

    C. Option C

    D. Option D

    E. Option E

    F. Option F

    G. Option G

    Correct Answer: CSection: (none)Explanation

    Explanation/Reference:

    QUESTION 69You are the administrator for a group of shell script developers. They use vi, and have asked you to make their scripts automatically executable when they savetheir files.How can this be accomplished?

  • https://www.gratisexam.com/

    A. Enter set –o vi on the command line, or include it in each user's startup script.

    B. Enter umask –s on the command line, or include it in each user's startup script.

    C. Enter umask 000 on the command line, or include it in each user's startup script.

    D. Enter umask 777 on the command line, or include it in each user's startup script.

    E. It is not possible to automatically set the execute bit on with the umask setting, or vi option.

    F. Enter umask 766 the command line, or include it in the global startup script for the default shell.

    Correct Answer: ESection: (none)Explanation

    Explanation/Reference:Explanation:Unlike DOS, which uses the file extension to determine if a file is executable or not, UNIX relies on file permissions.The value assigned by umask is subtracted from the default. User's file creation mask. umask sets an environment variable which automatically sets file permissions on newly created files. i.e. it will set the shell process's filecreation mask to mode.

    umask 000 would grant full permissions.

    Note: 777 full permissions

    QUESTION 70You have connected a new printer at a fixed IP address.It appears to work correctly most of the time, but at other times does not respond.You suspect that the assigned address may not be unique within the network.What command will be useful to confirm this?

    A. arp

    B. netstat

    C. ipadm show-if

    D. dladm show-addr

    E. ipadm show-addr

    Correct Answer: ESection: (none)Explanation

    Explanation/Reference:

  • https://www.gratisexam.com/

    Explanation:'ipadm show-addr' displays all the configured addresses on the system.

    Example:# ipadm show-addrADDROBJ TYPE STATE ADDRlo0/v4 static ok 127.0.0.1/8lo0/v6 static ok ::1/128

    QUESTION 71Your server has a ZFS storage pool that is configured as follows:

    The server has two spate 140-GB disk drives: c3t5d0 c3t6d0

    Which command would add redundancy to the pool1 storage pool?

    A. zpool attach pool1 c3t5d0 c3t6d0

    B. zpool attach pool1 c3t3d0 c3c5d0; zpoo1 attach pool1 c3t4d0 c3t6d0

    C. zpool mirror pool1 c3t5d0 c3t6d0

    D. zpool add pool1 mirror c3t5d0 c3t6d0

    E. zpool add raidz pool1 c3t5d0 c3t6d0

    Correct Answer: ASection: (none)Explanation

    Explanation/Reference:Explanation:You can convert a non-redundant storage pool into a redundant storage pool by using the zpool attach command.

  • https://www.gratisexam.com/

    Note: zpool attach [-f] pool device new_device

    Attaches new_device to an existing zpool device. The existing device cannot be part of a raidz configuration. If device is not currently part of a mirroredconfiguration, device automatically transforms into a two-way mirror of device and new_device. If device is part of a two-way mirror, attaching new_device creates athree-way mirror, and so on. In either case, new_device begins to resilver immediately.

    QUESTION 72A user on the system has started a process, but it needs to be terminated.The process ID was determined as follows:pgrep userprograml5317

    The user attempted to terminate the program as follows:pkill 15317

    This command runs without an error message, and the process continues to run.

    What is the issue?

    A. You need to run the pkill command with the process name.

    B. You need to switch to super user to kill the process.

    C. You need to run the ps command to get more information.

    D. You need to run the prstat command to get more information.

    Correct Answer: BSection: (none)Explanation

    Explanation/Reference:Explanation:You can use the pgrep and pkill commands to identify and stop command processes that you no longer want to run. These commands are useful when youmistakenly start a process that takes a long time to run.

    To terminate a process:

    Type pgrep to find out the PID(s) for the process(es).

    Type pkill followed by the PID(s).

    You can kill any process that you own. Superuser can kill any process in the system except for those processes with process IDs of 0, 1, 2, 3, and 4. Killing theseprocesses most likely will crash the system.

  • https://www.gratisexam.com/

    QUESTION 73You are logged in to a Solaris 11 system as user jack. You issue the following sequence of commands:

    Identify two correct statements.

    A. You have the effective privilege of the account root.

    B. Your GID is 10.

    C. Your home directory is /root.

    D. You are running the shell specified for the account root.

    E. Your UID is 1.

    Correct Answer: ABSection: (none)Explanation

    Explanation/Reference:Explanation:Oracle Solaris provides predefined rights profiles. These profiles, listed in the /etc/security/prof_attr, can be assigned by the root role to any account. The root roleis assigned all privileges and all authorizations, so can perform all tasks, just as root can when root is a user.

    To perform administrative functions, you open a terminal and switch the user to root. In that terminal, you can then perform all administrative functions.

    $ su - rootPassword: Type root password#When you exit the shell, root capabilities are no longer in effect.

    QUESTION 74Which two are implemented using the Internet Control Message Protocol (ICMP)?

    A. ping

  • https://www.gratisexam.com/

    B. DHCP

    C. HTTP

    D. telnet

    E. syslog

    F. traceroute

    Correct Answer: AFSection: (none)Explanation

    Explanation/Reference:Explanation:The Internet Control Message Protocol (ICMP) is one of the core protocols of the Internet Protocol Suite.ICMP differs from transport protocols such as TCP and UDP in that it is not typically used to exchange data between systems, nor is it regularly employed by end-user network applications (with the exception of some diagnostic tools like ping and traceroute).

    QUESTION 75Review the information taken from your server:

    Which option describes the command used to create these snapshots of the root file system?

  • https://www.gratisexam.com/

    A. Option A

    B. Option B

    C. Option C

    D. Option D

    Correct Answer: ASection: (none)Explanation

    Explanation/Reference:Explanation:zfs snapshot [-r] [-o property=value] ... filesystem@snapname|volume@snapnameCreates a snapshot with the given name. All previous modifications by successful system calls to the file system are part of the snapshot. See the “Snapshots”section for details.

    -rRecursively create snapshots of all descendent datasets. Snapshots are taken atomically, so that all recursive snapshots correspond to the same moment in time.

    QUESTION 76You notice that the /var/.dm/messages file has become very large. Typically, this is managed by a crontab entry. Which entry should be in the root's crontab file?

    A. 10 3 * * * /usr/adm/messages

    B. 10 3 * * * /usr/sbin/logadm

    C. 10 3 * * * /usr/sbin/syslogrotate

    D. 10 3 * * * /usi/sbin/logrotate

    E. 10 3 * * * /usr/sbin/messages

    Correct Answer: BSection: (none)Explanation

    Explanation/Reference:Explanation:This example shows how to display the default root crontab file.

    $ suPassword:

    # crontab -l

  • https://www.gratisexam.com/

    #ident "@(#)root 1.19 98/07/06 SMI" /* SVr4.0 1.1.3.1 */## The root crontab should be used to perform accounting data collection.##10 3 * * * /usr/sbin/logadm15 3 * * 0 /usr/lib/fs/nfs/nfsfind30 3 * * * [ -x /usr/lib/gss/gsscred_clean ] && /usr/lib/gss/gsscred_clean#10 3 * * * /usr/lib/krb5/kprop_script ___slave_kdcs___

    QUESTION 77User1 is attempting to run the following command:cp bigfile verybig

    The system displays the following errer:cp: cannot create verybig: Disc quota exceeded

    Your initial troubleshooting shows that the df -h command indicates the account is at 100% capacity. What command would you use to determine how much diskspace the user has available?

    A. zfs get quota rpool/export/home/user1

    B. zfs userused@user1

    C. zfs quota=1M /rpool/export/home/user1

    D. df –h | grep user1

    Correct Answer: ASection: (none)Explanation

    Explanation/Reference:Explanation:ZFS quotas can be set and displayed by using the zfs set and zfs get commands. In the following example, a quota of 10 Gbytes is set on tank/home/bonwick.

    # zfs set quota=10G tank/home/bonwick# zfs get quota tank/home/bonwickNAME PROPERTY VALUE SOURCEtank/home/bonwick quota 10.0G local

    QUESTION 78Select the packet type that identifies members of the group and sends information to all the network interfaces in that group.

  • https://www.gratisexam.com/

    A. Unicast

    B. Multicast

    C. Broadcast

    D. Bayesian

    E. Quality of Service Priority

    Correct Answer: BSection: (none)Explanation

    Explanation/Reference:Explanation:IPv6 defines three address types:

    unicastIdentifies an interface of an individual node.

    multicastIdentifies a group of interfaces, usually on different nodes. Packets that are sent to the multicast address go to all members of the multicast group.

    anycastIdentifies a group of interfaces, usually on different nodes. Packets that are sent to the anycast address go to the anycast group member node that is physicallyclosest to the sender.

    QUESTION 79The current ZFS configuration on your server is:

    pool1 124K 3.91G 32K /pool1pool1/data 31K 3.91G 31K /data

    You need to create a new file system named /data2. /data2 will be a copy of the /data file system.You need to conserve disk space on this server whenever possible.

    Which option should you choose to create /data2, which will be a read writeable copy of the /data file system, while minimizing the amount of total disk space usedin pool1?

    A. zfs set mountpoint=/data2 compression=on pool1/data2

    B. zfs snapshot pool1/data@nowzfs set mountpoint=/data2, comptession=on pool1/data@now

    C. zfs create snapshot pool1/data@nowzfs send pool1/data@now | zfs recv pool1/data2

    D. zfs create snapshot pool1/data@nowzfs clone -o mountpoint=/data2 pool1/data@now pool1/data2

  • https://www.gratisexam.com/

    E. zfs snapshot pool1/data@nowzfs clone -o mountpoint=/data2 -ocompression=on pool1/data@now pool1/data2

    F. zfs snapshot pool1/data@nowzfs clone -o mountpoint=/data2 pool1/data@now pool1/data2

    Correct Answer: ESection: (none)Explanation

    Explanation/Reference:Explanation:zfs snapshot [-r] [-o property=value] ... filesystem@snapname|volume@snapnameCreates a snapshot with the given name. All previous modifications by successful system calls to the file system are part of the snapshotzfs clone [-p] [-o property=value] ... snapshot filesystem|volumeCreates a clone of the given snapshot.

    Note:Because snapshots are fast and low overhead, they can be used extensively without great concern for system performance or disk use .With ZFS you can not only create snapshot but create a clone of a snapshot. A clone is a writable volume or file system whose initial contents are the same as the dataset from which it was created. As with snapshots, creating a clone isnearly instantaneous, and initially consumes no additional disk space. In addition, you can snapshot a clone.

    A clone is a writable volume or file system whose initial contents are the same as the original dataset. As with snapshots, creating a clone is nearly instantaneous,and initially consumes no additional space.

    Clones can only be created from a snapshot. When a snapshot is cloned, it creates an implicit dependency between the parent and child.

    QUESTION 80You wish to troubleshoot some issues that you are having on the system. You want to monitor the /var/adm/messages file in real time. Which command would youuse to do this?

    A. head

    B. tail

    C. cat

    D. file

    E. test

    Correct Answer: BSection: (none)Explanation

    Explanation/Reference:

  • https://www.gratisexam.com/

    Explanation:tail is a program on Unix and Unix-like systems used to display the last few lines of a text file or piped data.

    By default, tail will print the last 10 lines of its input to the standard output. With command line options the number of lines printed and the printing units (lines,blocks or bytes) may be changed. The following example shows the last 20 lines of filename:tail -n 20 filename

    QUESTION 81Which two options describe how to override the default boot behavior of an Oracle Solaris 11 SPARC system to boot the system to the single-user milestone?

    A. from the ok prompt, issue this command: boot -m milestone=single-user

    https://www.gratisexam.com/

    B. From the ok prompt, issue this command: boot -m milestone/single-user

    C. From the ok prompt, issue this command: boot -milestone=single-user

    D. From the ok prompt. issue this command:boot -s

    E. From from the ok prompt, issue this command:boot -m milestone=s

    Correct Answer: ADSection: (none)Explanation

    Explanation/Reference:Explanation:By default, Solaris will boot to the pseudo milestone “all” and start all services. This behaviour can be changed at boot time using either “-s” to reach single-user, orthe new SMF option “-m milestone=XXX” (see kernel(1M) for a list of the bootable milestones) to select an explicit milestone.

    Note: boot -s is the same as: boot -m milestone=single-user

    with the difference being that the former is a lot less to type and is what most SysAdmins will be familiar with.

  • https://www.gratisexam.com/

    QUESTION 82In a default standalone installation of Oracle Solaris 11, what is the default minimum length in characters of a user password, and where is the minimum passwordlength defined?

    A. Default minimum length is 8, and is defined in /etc/default/password.

    B. Default minimum length is 6, and is defined in /etc/default/password.

    C. Default minimum length is 8, and is defined in /etc/shadow.

    D. Default minimum length is 6, and is defined in /etc/shadow.

    E. Default minimum length is 8, and is defined in /usr/sadm/defadduser.

    F. Default minimum length is 6, and is defined in /usr/sadm/defadduser.

    Correct Answer: BSection: (none)Explanation

    Explanation/Reference:Explanation:By default, the passwd command assumes a minimum length of six characters. You can use the PASSLENGTH default in the /etc/defaults/passwd files to changethat by setting the minimum number of characters that a user's password must contain to some other number.

    QUESTION 83Which four can the SMF notification framework be configured to monitor and report?

    A. all service transition states

    B. service dependencies that have stopped or faulted

    C. service configuration modifications

    D. legacy services that have not started

    E. services that have been disabled

    F. service fault management events

    G. processes that have been killed

    Correct Answer: AEFGSection: (none)Explanation

    Explanation/Reference:Explanation:

  • https://www.gratisexam.com/

    Note 1: State Transition Sets are defined as:

    toSet of all transitions that have as the final state of the transition.

    form-Set of all transitions that have as the initial state of the transition.

    Set of all transitions that have as the initial s