QUESTION NO: 2
You need to make sure that all of the software packages on your server are up to date. Without
installing any updates, which two commands would display .my software updates that are
available in the default Oracle repository?
A. pkg list -u
B. pkg verify -u '*'
QUESTION NO: 3
Which best describes the svc:/system/boot-config service?
QUESTION NO: 4
A user jack, using a korn shell, requests a directory listing as follows:
jack@solaris:/export/home/jack $ 1s
file filea Filea fileb Fileb filec Filec
Which two statements are correct?
QUESTION NO: 5
You created an IP address for interface not.3 with the following command, which executed
successfully:
ipadm create-addr -T static -a 192.168.0.100/24 net3/v4
QUESTION NO: 6
You have a ticket from a new user on the system, indicating that he cannot log in to his account.
The information in the ticket gives you both the username and password. The ticket also shows
that the account was set up three days ago.
As root, you switch users to this account with the following command:
su - newuser
You do not get an error message.
You then run 1s -1a and see the following files:
local1.cshrc local1.login local1.profile .bash_history .bashrc .profile
QUESTION NO: 7
You have a user that needs to use the cron tool to schedule some repetitive tasks. When the user
enters the crontab -e command in a terminal window, the following error appears:
crontab: you are not authorized to use cron. Sorry
In order to troubleshoot this issue, in what directory would you start your invest
A. /etc/cron.d
B. /var/spool/cron
"Pass Any Exam. Any Time." - www.TwPass.com
QUESTION NO: 8
You are having an issue with the shutdown command. You wish to determine if the file is a script
or an executable program. Which command would you use to determine this?
A. od shutdown B. file
shutdown C. test
shutdown
D. cksum shutdown
E. attrib shutdown
Answer: B
Explanation: The file command determines the file type.
file tests each argument in an attempt to classify it. There are three sets of tests, performed in this
order: filesystem tests, magic tests, and language tests. The first test that succeeds causes the file
type to be printed.
Reference: man file
A. Subnet B.
unicast
C. netmask D.
multicast E.
broadcast
Answer: C
Explanation: A subnetwork, or subnet, is a logically visible subdivision of an IP network. The
practice of dividing a network into two or more networks is called subnetting.
The routing prefix of an address is written in a form identical to that of the address itself. This is
called the network mask, or netmask, of the address. For example, a specification of the mostsignificant 18 bits of an IPv4 address, 11111111.11111111.11000000.00000000, is written
as 255.255.192.0.
QUESTION NO: 10
Which two accurately identify features of a Solaris 10 branded zone?
Note:
Branded zones that run an environment different that the OS release on the system
* The lx branded zone introduced in the Solaris 10 8/07 release provides a Linux environment for
your applications and runs on x86 and x64 machines on the Oracle Solaris 10 OS.
* The solaris8 and solaris9 branded zones enable you to migrate an Oracle Solaris 8 or Oracle
Solaris 9 system to an Oracle Solaris 8 or Oracle Solaris 9 Container on a host running the Oracle
Solaris 10 8/07 Operating System or later Oracle Solaris 10 release.
* The Oracle Solaris 10 Container brand is available in OpenSolaris build 127. These branded
zones host Oracle Solaris 10 user environments.
QUESTION NO: 11
You are troubleshooting a newly installed desktop Oracle Solaris 11 system with a single network
interface. From this system, you can connect to other systems within the company intranet, but
cannot access any external services (such as websites and email), even when using IP
addresses.
Examining the routing table confirms that the default route to 192.168.1.1 is missing. DHCP is not
used at this site. Which two commands will temporarily mid permanently configure the default
route?
QUESTION NO: 12
You want the system to generate an email notification each time one of the services has changed
its state. Which option would send an email message to the system administrator whenever a
service changes to the maintenance state?
A. Use the setsc command in ALOM to enable the mail alerts to be sent to a specified email
address whenever the fault management facility detects a service change to the maintenance
state.
B. Make an entry in the /etc/syslog.conf file to instruct syslogd to send an email alert when it
receives a message from the SMF facility that a service has changed to the maintenance
state. C. Use the svccfg setnotify command to create a notification and send an email when a
service enters the maintenance state.
D. Use the scvadm command to enable the notification service. Set the -g maintenance option on
the netnotify service to send an email when a service enters the maintenance state.
Answer: C
Explanation: This procedure causes the system to generate an email notification each time one
of the services or a selected service has a change in state. You can choose to use either SMTP or
SNMP. Normally, you would only select SNMP if you already have SNMP configured for some
10
QUESTION NO: 13
How are operating system updates distributed in the Oracle Solaris 11 environment?
A. Updates are only available to customers with an active support contract. The updates are
distributed through the My Oracle Support web portal and installed in a central location. All
software packages are then updated manually from the command line using the smpatch
command.
B. Patches are download from http: //support.oracle.com either automatically or manually. All
software packages are then updated manually from the command line using the smpatch or
patchadd commands.
C. Software updates are published as packages to a repository. All software packages are then
updated manually from the command line using the pkg command.
D. Software updates, published as packages to an OS image. All software packages are then
updated manually from the command line using the pkg command.
Answer: C
Explanation: * Updating all of the packages on your installed system - To update all of the
packages on your system that have available updates, use the pkg update command, as follows:
# pkg update
Running this command updates packages that you might not otherwise consider updating, for
11
QUESTION NO: 14
User jack, whose account is configured to use the korn shell, logs in and examines the value of his
PATH environment variable:
jack@solaris: echo $PATH
/usr/gnu/bin:/usr/bin:/usr/sbin:/sbin
There is a shell script in jack's home directory called useradd:
-r-xr-xr-x 2 jack other 1239 2012-01-05 11:42 useradd
While in his home directory, jack attempts to run the script:
jack@solaris: useradd
What will happen, and why?
A. He will get a "file not found" error, because the current directory is not in his seaech path.
B. He will get a "file not found" error, because his home directory is not in his search path.
C. The useradd script will execute, because jack is in the same directory that the script is located
"Pass Any Exam. Any Time." - www.TwPass.com
12
QUESTION NO: 15
User jack on host solaris attempts to use ssh to log in to host oracle and receives this message:
jack@solaris:~$ ssh oracle
ssh: connect to host oracle port 22: connection refused
What is the problem?
QUESTION NO: 16
When speaking in an Oracle Support Engineer, you are asked to verify the version of the Solaris
11 build currently running on your system. Which command would display the Solaris 11 build
version currently running on your system?
13
QUESTION NO: 17
You need to configure an ISCSI target device on your x86 based Oracle Solaris II system. While
configuring the iSCSI device, the following error is displayed:
bash: stmfadm: command not found
Which option describes the solution to the problem?
A. The COMSTAR feature is not supported on the x86 platform. The feature is supported only on
the SPARC platform.
B. Use the iscsitadm command on the x86 platform when configuring an iSCSI target. C.
Install the storage-server group package on this system. D. Start the iSCSI target
daemon on this system.
Answer: C
Explanation: STMF - Manages transactions, such as context and resources for Small Computer
System Interface (SCSI) command execution, and tracking logical unit and port providers. STMF
also handles logical unit mappings, allocating memory, recovering failed operations, enumeration,
and other necessary functions of an I/O stack.
STMF is controlled by stmfadm, and stmfadm is the majority of the commands you will be using to
administer COMSTAR (COmmon Multiprotocl Scsi TARget).
Install the packages you need for COMSTAR with iSCSI and reboot:
"Pass Any Exam. Any Time." - www.TwPass.com
14
QUESTION NO: 18
Your SPARC server will not boot into multi user-server milestones and you need to troubleshoot to
out why. You need to start the server with minimal services running so that you can go through
each milestone manually to troubleshoot the issue.
Select the option that boots the server with the fewest services running.
A. boot -s
B. boot milestone none
C. boot -m milestone=single-user
D. boot -m milestone=none
E. boot -m none
Answer: D
Explanation: The command boot -m milestone=none is useful in repairing a system that have
problems booting early.
Boot Troubleshooting:
To step through the SMF portion of the boot process, start with:
boot -m milestone=none
15
QUESTION NO: 19
user1 is attempting to assist user2 with terminating user2's process 1234.
user1 entered the following: kill -9 1234
Why does the process continue to run?
QUESTION NO: 20
Your server has one zone named dbzone (hat has been configured, but not yet installed). Which
command would you use to view all the options that were used to configure this zone?
16
Incorrect answer:
A: The zoneadm utility is used to administer system zones. A zone is an application container that
is maintained by the operating system runtime.
list option:
Display the name of the current zones, or the specified zone if indicated. B:
No such command.
D: no such options zonecfg -icv
Reference: man zonecfg
QUESTION NO: 21
Your users are experiencing delay issues while using their main application that requires
connections to remote hosts. You run the command uptime and get the flowing output:
1:07am up 346 day(s), 12:03, 4 users, load average: 0.02, 0.02, 0.01
Which command will be useful in your next step of troubleshooting?
17
QUESTION NO: 22
When upgrading an existing system from Solaris 10 to Oracle Solaris 11, what happens to the
datalink names?
A. They follow the default naming convention for the newly installed version. B.
They maintain their names. C. They are called eth#.
D. They are called el00g#.
E. They are left unnamed, to avoid conflicts, and need to be renamed after the installation process
is complete.
Answer: A
Explanation: Network configuration in Oracle Solaris 11 includes
* Generic datalink name assignment - Generic names are automatically assigned to
datalinks using the net0, net1, netN naming convention, depending on the total number of
network devices that are on the system
18
QUESTION NO: 23
You have installed software updates to a new boot environment (BE) and have activated that the
booting to the new BE, you notice system errors. You want to boot to the last known good
configuration.
Which option would you use on a SPARC system to boot to the currentBE boot environment?
A. boot -L currentBE
B. boot -Z rpool/ROOT/currentBE
C. boot -a Enter the currentBE dataset name when prompted.
D. boot rpool/ROOT/currentBE
E. boot -m currentBE
F. beadm activate currentBE
Answer: F
Explanation: You can change an inactive boot environment into an active boot environment. Only
one boot environment can be active at a time. The newly activated boot environment becomes the
default environment upon reboot.
How to Activate an Existing Boot Environment
beadm activate beName
beName is a variable for the name of the boot environment to be activated.
Note the following specifications.
beadm activate beName activates a boot environment by setting the bootable pool property,
bootfs, to the value of the ROOT dataset of the boot environment that is being activated.
beadm activate sets the newly activated boot environment as the default in the menu.lst file.
The newly activated boot environment is now the default on the x86 GRUB menu or SPARC boot
menu.
"Pass Any Exam. Any Time." - www.TwPass.com
19
QUESTION NO: 24
Oracle Solaris 11 limits access to the system with usernames and passwords
The usernames are held in ___________, and the passwords are held in ___________.
Select the correct pair.
A. /etc/security/policy.conf /etc/passwd
B. /etc/passwd /etc/shadow C.
/etc/security /etc/passwd D.
/etc/shadow /etc/passwd
Answer: B
Explanation: The /etc/passwd file contains basic user attributes. This is an ASCII file that contains
an entry for each user. Each entry defines the basic attributes applied to a user.
/etc/shadow file stores actual password in encrypted format for user's account with additional
properties related to user password i.e. it stores secure user account information. All fields
areseparated by a colon (:) symbol. It contains one entry per line for each user listed in
/etc/passwd file.
QUESTION NO: 25
_________ serves as the interface between the SMF repository and the user to ensure that a
consistent, picture of the repository is presented to the user.
A. repository.db
B. service manifest
C. svc.startd
D. svc.configd
Answer: D
Explanation: SVC.CONFIGD is the repository daemon responsible for maintaining
"Pass Any Exam. Any Time." - www.TwPass.com
20
QUESTION NO: 26
You are attempting to edit your crontab file in the bash shell. Instead of getting your usual vi
interface, you are presented with an unfamiliar interface. In order to have your editor of choice-viwhat command must you type after exiting the unfamiliar editor?
A. EDITOR=vi B.
crontab=vi
C. crontab - e vi
D. env
Answer: A
Explanation: Set the EDITOR variable to vi.
Commands like `crontab -e` will use ed per default. If you'd like to use some better editor (like vi)
you can use the environment variable EDITOR:
# EDITOR=vi; crontab -e
will open the users crontab in vi. Of course you can set this variable permanently.
Incorrect answers
C: -e Edits a copy of the current user's crontab file, or creates an empty file to edit if crontab does
not exist. When editing is complete, the file is installed as the user's crontab file. If a username is
given, the specified user's crontab file is
edited, rather than the current user's crontab file; this can only be done by a user with the
solaris.jobs.admin authorization. The environment variable EDITOR determines which editor is
invoked with the -e option. The default editor is ed(1). All crontab jobs should be submitted using
crontab. Do not add jobs by just editing the crontab file, because cron is not aware of changes
made this way.
Reference: Setting the default editor
"Pass Any Exam. Any Time." - www.TwPass.com
21
QUESTION NO: 27
You want to display the IP address assignments of the network interfaces. Which command
should you use?
A. ipadm show-if
B. ipadm show-addr C.
ipadm show-prop
D. ipadm show-addrprop
Answer: B
Explanation: 'ipadm show-addr' displays all the configured addresses on the system.
Example:
# ipadm show-addr
ADDROBJ TYPE STATE ADDR
lo0/v4 static ok 127.0.0.1/8
lo0/v6 static ok ::1/128
Reference: ipadm(1M) - the new ifconfig(1M)
QUESTION NO: 28
The following image properties are displayed on your system:
Which two options describe the boot environment policy property that is currently set for this
22
A. All package operations are performed in a new BE set as active on the next boot.
B. Do not create a new BE. The install, update, uninstall, or revert operation is not performed if a
new BE is required.
C. If a BE is created, do not set it as the active BE on the next boot
D. A reboot is required for all package operations
E. A reboot is not required after a package operation.
F. For package operations that require a reboot, this policy creates a new BE set as active on the
next boot.
Answer: D,F
Explanation: image properties described below.
* be-policy
Specifies when a boot environment is created during packaging operations. The following values
are allowed:
/ default
Apply the default BE creation policy: create-backup.
/ always-new (D, F)
Require a reboot for all package operations (D) by performing them in a new BE set as active on
the next boot (F). A backup BE is not created unless explicitly requested.
This policy is the safest, but is more strict than most sites need since no packages can be added
without a reboot.
QUESTION NO: 29
dbzone is currently running on your server.
Which two methods would you use to safely and cleanly shut down dbzone and all of its
applications?
23
QUESTION NO: 30
View the Exhibit to see the information taken from the installation log file.
Based on the information presented in the Exhibit, which two options describe the state of the
system when the server is booted for the first time after the installation is complete?
24
QUESTION NO: 31
In order to display the IP addresses of network interfaces, what command would you use?
A. dladm
B. ipconfig
C. sves
D. ipadm E. ipaddr
QUESTION NO: 32
The su command by default makes an entry into the log file for every su command attempt. The
following is a single line from the file:
SU 12/18 23:20 + pts/1 user1-root
What does the + sign represent?
A. unsuccessful attempt
B. successful attempt
C. The attempt was from a pseudo terminal, and not the console.
D. The attempt was from a user that is in the adm group, same as root. E.
Time zone is not set.
Answer: B
Explanation: The sulog file, /var/adm/sulog, is a log containing all attempts (whether successful or
not) of the su command. An entry is added to the sulog file every time the su command is
executed. The fields in sulog are: date, time, successful (+) or unsuccessful (-), port, user
executing the su command, and user being switched to. In the preceding example, all su attempts
were successful, except for the attempt on 2/23 at 20:51, when user pete unsuccessfully
attempted to su to user root.
Look for entries where an unauthorized user has used the command inappropriately. The following
entry shows a successful (indicated by +) su from user userid to root.
SU 03/31 12:52 + pts/0 <userid>-root
Reference: /var/log/sulog, Solaris System Logs
26
QUESTION NO: 33
A user brian is configured to use the bash shell. His home directory is /export/home/brian, and
contains a .profile and a .bashrc file.
In the -profile, there are these lines:
genius =ritchie
export genius
In the .bashrc us this line:
genius=kernighan
In /etc/profile are these lines:
genius=thompson
export genius
When brian logs in and asks for the value of genius, what will he find, and why?
A. genius will be ritchie, because that was the value exported in .profile. B.
genius will be kernighan, because .bashrc executes after .profile.
C. genius will be ritchie because variable settings in .profile take precedence over variable settings
in .bashrc.
D. genius will be ritchie because .profile executes after .bashrc.
E. genius will be thompson because /etc/profile system settings always override local settings.
Answer: C
Explanation:
QUESTION NO: 34
Consider the following commands:
27
What is displayed when this sequence of commands is executed using the bash shell?
A. Hello, world
B. cat: cannot open file1: No such file or directory Hello, world
C. cat: cannot open file1: No such file or directory
D. bash: syntax error near unexpected token '| |'
E. bash: syntax error broker pipe
Answer: A
Explanation: First line (rm file1) deletes/removes file1.
Second line captures the text into file2.
The first part of line 3 (cat file1) fails as the file1 does not exist.
The || (OR) operator will execute the second statement of line 3 (cat file2). This statement will run
fine. The result of the third line will be the result of cat file2.
28
QUESTION NO: 35
You are logged in as root to a newly installed Solaris 11 system. You issue the command useradd
-d, and then examine the /usr/sadm/defadduser file. This file includes the entry defshell=/bin/sh.
Which shell will now be the default for the next account created?
A. bash shell
B. C shell
C. korn shod
D. bourne shell
Answer: A
Explanation: Oracle Solaris 11 introduces user environment and command-line argument
changes that include the following:
* Shell changes - The default shell, /bin/sh, is now linked to ksh93. The default user shell is the
Bourne-again (bash) shell.
* The legacy Bourne shell is available as /usr/sunos/bin/sh.
* The legacy ksh88 is available as /usr/sunos/bin/ksh from the shell/ksh88 package.
* Korn shell compatibility information is available in /usr/share/doc/ksh/COMPATIBILITY.
Reference: Oracle Solaris 11 Information Library, User Environment Feature Changes
QUESTION NO: 36
You want to display network interface information. Which command should you use?
29
QUESTION NO: 37
Which two options accurately describe the network characteristics of a zone?
30
QUESTION NO: 38
To assist in examining and debugging running processes, Solaris 11 has a utility that returns pro
arguments and the names and values of environment variables. What is the name of this utility?
A. ppgsz B. pargs
C. pmap D. pgrep
Answer: B
Explanation: The pargs utility examines a target process or process core
file and prints arguments, environment variables and values, or
the process auxiliary vector.
Reference: man pargs
31
QUESTION NO: 40
You need to know the IP address configured on interface net3, and that the interface is up. Which
command confirms these?
A. ipadm show-if B.
ipadm up-addr
C. ipadm show-addr
D. ipadm enable-if
E. ipadm refresh-addr
F. ipadm show-addrprop
Answer: C
Explanation: Show address information, either for the given addrobj or all the address objects
configured on the specified interface, including the address objects that are only in the persistent
configuration.
State can be:disabled, down, duplicate, inaccessible, ok, tentative
32
QUESTION NO: 41
You start to execute a program by using the following command:
~/bigscript &
You then determine that the process is not behaving as expected, and decide that you need to
terminate the process. Based on the information shown below, what is the process number you
should terminate?
A. 15163 B.
15156 C. 15166
D. 15165
Answer: A
Explanation: From the output exhibit we can deduce that the shell has id 15156.
It has spawned three subprocesses:
grep: id 15166 ps -aef
15165
The remaining 15163 must be the subshell (see note below).
This is the id of the process which should be terminated.
Reference: man ps
Note: The command ~/bigscript &
"Pass Any Exam. Any Time." - www.TwPass.com
33
QUESTION NO: 42
You have installed the SMF notification framework to monitor services. Which command is used to
set up the notifications for a particular service?
A. svccfg
B. svcadm C.
setnotify
D. smtp-notify
Answer: A
Explanation: How to Set Up Email Notification of SMF Transition Events
This procedure causes the system to generate an email notification each time one of the services
or a selected service has a change in state. You can choose to use either SMTP or SNMP.
Normally, you would only select SNMP if you already have SNMP configured for some other
reason.
By default, SNMP traps are sent on maintenance transitions. If you use SNMP for monitoring, you
can configure additional traps for other state transitions.
Example 1:
The following command creates a notification that sends email when transactions go into
the maintenance state.
# /usr/sbin/svccfg setnotify -g maintenancemailto:sysadmins@example.com
Example 2:
The following command creates a notification that sends email when the switch service goes into
the online state.
# /usr/sbin/svccfg -s svc:/system/name-service/switch:default setnotify to-online \
mailto:sysadmins@example.com
Note: The svccfg command manipulates data in the service configuration repository. svccfg can be
invoked interactively, with an individual subcommand, or by specifying a command file that
34
QUESTION NO: 43
User jack logs in to host Solaris and executes the following command sequence:
A. User jack can edit testfile because he has read and write permissions at the group level.
B. User jack can use cat to output the contents of testfile because he has read permission as the
file owner.
C. User jill can change the permissions of testfile because she has write permission for the file at
the group level.
D. User jill can edit testfile because she has read and write permission at the group level.
E. User jack can change permissions for testfile because he is the owner of the file.
F. User jack can change permissions for testfile because he has execute permission for the file.
Answer: D,E,F
Explanation:
QUESTION NO: 44
The OpenBoot firmware controls the operation of the system before the operating system is
loaded. Which four tasks are directly controlled by the OpenBoot firmware?
35
QUESTION NO: 45
Which two options are accurate regarding the non-global zone console?
36
QUESTION NO: 46
The default publisher on your system is:
You want to update the Oracle Solaris 11 environment on your system, but you are not able to
connect this system to the Internet to access the default Oracle repository. A repository has been
created on your local network and is named http://server1.example.com.
Which command would you choose to connect your system to the local repository?
Tthe pkg set-publisher command can be used to for example add a publisher or to enable or
disable a publisher.
37
QUESTION NO: 47
Your server has a ZFS storage pool that is configured as follows:
The following partition scheme is used for every disk drive in pool1:
38
QUESTION NO: 48
You enter dladm show-phys, which provides the following output:
39
QUESTION NO: 49
Choose three options that describe the features associated with a Live Media installation.
A. does not allow the root user to log in to the system directly from the console (or any terminal)
B. provides a "hands free" installation
C. installs the desktop based packages
D. can be used to install only x86 platforms
E. installs the server-based set of packages only
F. allows both automatic and manual configuration of the network
G. installs both the server-based and desktop-based package
Answer: B,C,D
Explanation: The graphical installer is officially known as the "Live Media." This means that
Oracle Solaris can be booted into RAM, causing zero impact on your existing operating system.
After it isloaded, you are free to experiment with Oracle Solaris to determine whether it is
something you would like to install to your system.
You can download Oracle Solaris 11 Live Media for x86, which is an approximately 800 MB image
file, and use a DVD burner to create the disk, or you can use the ISO image directly in a virtual
machine or through the Oracle Integrated Lights Out Manager (ILOM) Remote Console.
The Live Media is not intended for long-term use. For example, any changes that you make to the
system are lost when the system is shut down. Therefore, the next logical step is to install Oracle
Solaris on the system, which the Live Media makes easy by placing an Install Oracle Solaris icon
right on the desktop. But before we head down that road, let's step back a bit and consider the
installation options.
Note: The Live Media provides administrators with an opportunity to explore the Oracle Solaris 11
environment without installing it on a system. The system boots off the media directly allowing
administrators to start the installer should they choose to install it to a system.
Reference: Taking Your First Steps with Oracle Solaris 11
40
QUESTION NO: 50
In a fresh installation of Oracle Solaris 11, default datalinks are named with a genetic naming
convention, and they increment as you add interfaces. What is the default name?
A. eth# B. net#
C. el000g#
D. lo#
E. nic#
Answer: B
Explanation: When you install this Oracle Solaris release on a system for the first time, Oracle
Solaris automatically provides generic link names for all the system's physical network devices.
This name assignment uses the net# naming convention, where the # is the instance number. This
instance number increments for each device, for example, net0, net1, net2, and so on.
Note:
Network configuration in Oracle Solaris 11 includes
* Generic datalink name assignment - Generic names are automatically assigned to
datalinks using the net0, net1, netN naming convention, depending on the total number of
network devices that are on the system
QUESTION NO: 51
You are planning group names for a new system. You decide to use a numbering convention that
includes the year and month the project began, to form the group number and name for work
associated with that project.
So, for example, a project targeted to begin in January, 2013 would have the number (name):
201301(Pr20l301)
41
QUESTION NO: 52
The following line is from /etc/shadow in a default Solaris 11 Installation:
jack: $5$9JFrt54$7JdwmO.F11Zt/ jFeeOhDmnw93LG7Gwd3Nd/cwCcNWFFg:0:15:30:3:::
Which two are true?
42
QUESTION NO: 53
You are asked to determine user jack's default login directory. Which command would provide you
with useful information?
QUESTION NO: 54
You need to install the solaris-desktop group package. Which command would you use to list the
set of packages included in that software group?
A. pkg search
B. pkg info C. pkg
list D. pkginfo
E. pkg contents
Answer: A
Explanation: Use the pkg search command to search for packages whose data matches the
specified pattern.
Like the pkg contents command, the pkg search command examines the contents of packages.
While the pkg contents command returns the contents, the pkg search command returns the
names of packages that match the query.
"Pass Any Exam. Any Time." - www.TwPass.com
43
QUESTION NO: 55
Which files must be edited in order to set up logging of all failed login attempts?
QUESTION NO: 56
Which command would you use from the bash shell to determine the total amount of physical
memory installed in your Solaris system (x86 and SPARC)?
A. uname -a
B. prtconf | grep -i memory C.
sysdef | grep -i memory
D. vmstat
E. prtdiag | grep -i memory
Answer: B
44
QUESTION NO: 57
Which two options are characteristics of a fast reboot?
45
QUESTION NO: 58
You are installing the Solaris 11 OE by using the Interactive Text Installer. You have selected the
option to automatically configure the primary network controller. Which three items will
automatically be configured as a result of this selection?
A. The IP address.
B. The name service. C. The
time zone.
D. A default user account. E. The
terminal type. F. The root
password. G. The host name.
Answer: A,B,C
Explanation: IP address and name service (such as a DNS server) are provided by the DHCP
server.
QUESTION NO: 59
Which two SMF milestones can be specified at boot time?
46
QUESTION NO: 60
Your system is assigned an IP address object 192.168.0.222/24. However, the net
maskexpressed as four octetsis required. Which is the correct netmask?
A. 255.0.0.0
B. 255.255.0.0
C. 255.255.255.0
D. 255.255.255.24
E. 255.255.255.255
Answer: C
Explanation: A 24-bit network mask is expressed as 255.255.255.0.
Reference:http://www.subnet-calculator.com/
QUESTION NO: 61
View the following information for a software package:
47
Which command would you use to display this information for a software package that is not
currently installed on your system?
48
QUESTION NO: 62
user1 has a disk quota of 0.5 MB. The user attempts to run the following command on a file called
.bigfile that is 495 KB in size:
cp bigfile /tmp
Will the command execute successfully?
A. Yes. Quotas do not include any of the system files such as /tmp /swap. B.
Yes. The quota is set at the directory level, not the user level.
C. No. The command will fail because it will cause him to exceed his user quota. D.
No. A user cannot place files into the /tmp directory.
Answer: A
Explanation: UFS quotas enable system administrators to control the size of file systems. Quotas
limit the amount of disk space and the number of inodes, which roughly corresponds to the
number of files, that individual users can acquire. For this reason, quotas are especially useful on
the file systems where user home directories reside. As a rule, the public and /tmp file systems
usually do not benefit significantly by establishing quotas.
Note: The cp command copies files and directories.
Reference: System Administration Guide: Advanced Administration, Managing UFS Quotas
QUESTION NO: 63
Review the storage pool information:
"Pass Any Exam. Any Time." - www.TwPass.com
49
A. Shut the system down, replace disk c3t3d0, and boot the system. When the system is booted,
execute the zpool clear pool1 command.
B. Shut the system down, replace disk c3t3d0, and boot the system. When the system is booted
execute the zpool online pool1 command.
C. Shut the system down, replace disk c3t3d0, and boot the system. When the system is booted,
execute the zpool replace pool1 c3t3d0 command.
D. Shut the system down, replace disk c3t3d0, and boot the system. When the system is booted,
execute the zpool replace pool1 c3t3d0 c3t3d0 command.
Answer: C
Explanation: You might need to replace a disk in the root pool for the following reasons:
The root pool is too small and you want to replace it with a larger disk
The root pool disk is failing. In a non-redundant pool, if the disk is failing so that the system won't
boot, you'll need to boot from an alternate media, such as a CD or the network, before you replace
the root pool disk.
In a mirrored root pool configuration, you might be able to attempt a disk replacement without
having to boot from alternate media. You can replace a failed disk by using the zpool replace
command.
Some hardware requires that you offline and unconfigure a disk before attempting the zpool
replace operation to replace a failed disk.
For example:
# zpool offline rpool c1t0d0s0
# cfgadm -c unconfigure c1::dsk/c1t0d0
<Physically remove failed disk c1t0d0>
<Physically insert replacement disk c1t0d0>
# cfgadm -c configure c1::dsk/c1t0d0
# zpool replace rpool c1t0d0s0
# zpool online rpool c1t0d0s0
"Pass Any Exam. Any Time." - www.TwPass.com
50
QUESTION NO: 64
You are currently working in both your home directory and the system directory /tmp. You are
switch back and forth with full path names. Which pair of cd commands will provide you with a
shortcut to switch between these two locations?
A. cd ~ and cd - B. cd
and cd . C. cd ~ and cd
D. cd * and cd . .
Answer: A
Explanation: In the Bourne Again, C, Korn, TC, and Z shells, the tilde (~) is used as a shortcut for
specifying your home directory.
cd It's the command-line equivalent of the back button (takes you to the previous directory you were
in).
Note:
To make certain that you are in your home directory, type the cd (change directory) command.
This command moves you to your home (default) directory.
Reference: Changing the Working Directory (cd)
QUESTION NO: 65
A user jack, using a bash shell, requests a directory listing as follows:
51
QUESTION NO: 66
Which two are true about accounts, groups, and roles in the Solaris user database?
52
What is displayed when this sequence of commands is executed using the bash shell?
A. Hello, world
B. cat: cannot open file1
C. cat: cannot open file1Hello, world D. cat:
cannot open file1 Hello, World
E. bash: syntax error near unexpected token '&&'
Answer: B
Explanation: First line (rm file1) deletes/removes file1.
Second line captures the text into file2.
The first part of line 3 (cat file1) fails as the file1 does not exist.
The && (AND) operator will ensure that the third line fails. The result of line 3 will be the result of
first part of line 3 (cat file1).
53
QUESTION NO: 68
To confirm the IP addresses and netmasks have been correctly configured on the network
interfaces, which command(s) should you use?
A. ipadm show-if
B. ipadm show-nic
C. ipadm show-addr
D. ipadm show-addripadm show-mask
E. ipadm show-ipipadm show-mask
F. ipadm show-config
Answer: C
Explanation: Show address information, either for the given addrobj or all the address objects
configured on the specified interface, including the address objects that are only in the persistent
configuration.
Example:
# ipadm show-addr
ADDROBJ TYPE STATE ADDR
lo0/v4 static ok 127.0.0.1/8
lo0/v6 static ok ::1/128
54
QUESTION NO: 69
Subnets are created by using________.
A. subnet
B. netmask
C. unicast
D. broadcast
Answer: B
Explanation: The process of subnetting involves the separation of the network and subnet portion
of an address from the host identifier. This is performed by a bitwise AND operation between the
IP address and the (sub)network prefix. The result yields the network address or prefix, and the
remainder is the host identifier.
The routing prefix of an address is written in a form identical to that of the address itself. This is
called the network mask, or netmask, of the address. For example, a specification of the mostsignificant 18 bits of an IPv4 address, 11111111.11111111.11000000.00000000, is written as
255.255.192.0.
Reference: Subnetwork
QUESTION NO: 70
Which three options accurately describe Oracle Solaris 11 zones?
55
QUESTION NO: 71
View the Exhibit and review the disk configuration.
56
QUESTION NO: 72
You log in to the system as user1, then switch user to root by using the su - command. After
entering the correct password, yon enter the following commands:
whoami;who am i;id
Which option correctly represents the output?
A. uid-0(root) gid=0(root)
user1 console Dec 30 20:20
root
B. root
user1 console Dec 30 20:20
uid=0(root) gid=0(root)
C. user1 console Dec 30 20:20
root
uid=0(root) gid=0(root)
D. uid=0(root) gid=0(root)
root
user1 console Dec 30 20:20
Answer: B
Explanation: *The whoami utility displays your effective user ID as a name.
Here this would be root.
* who am i
The command who shows who is logged on.
Here this would be:
user1 console Dec 30 20:20
* The id utility displays the user and group names and numeric IDs, of the
calling process, to the standard output. If the real and effective IDs
are different, both are displayed, otherwise only the real ID is displayed.
Here this would be:
uid=0(root) gid=0(root)
57
QUESTION NO: 73
Your server has a ZFS storage pool that is configured as follows:
The server has two spare 146-GB disk drives: c3t5d0 c3t6d0
You need to add more space to the pool1 storage pool. Which command would add more mirrored
storage to the pool1 storage pool?
58
QUESTION NO: 74
You attempted to reboot a system via the init command, however the system did not perform boot
sequence into the Oracle Solaris Operating Environment. You are presented with a prompt from
the OpenBoot PROM. Which command would you enter, to boot the system from the default
device?
QUESTION NO: 75
You have a ZFS file system named /dbase/oral and you want to guarantee that 10 GB of storage
space is available to that dataset for all data, snapshots, and clones.
Which option would you choose?
59
Reference:Oracle Solaris ZFS Administration Guide Setting , Reservations on ZFS File Systems
QUESTION NO: 76
View the Exhibit.
60
QUESTION NO: 77
User jack logs in to host solaris and then attempts to log in to host oracle using ssh. He receives
the following error message:
The authenticity of host oracle (192.168.1.22) can't be established. RSA key fingerprint is
3B:23:a5:6d:ad:a5:76:83:9c:c3:c4:55:a5:18:98:a6
Are you sure you want to continue connecting (yes/no)?
A. The public host key supplied by solaria is not known to the host oracle.
B. The error would not occur if the RSA key fingerprint shown in the error message was added to
the /etc/ssh/known_hosts file on solaris.
C. The private host key supplied by oracle is not known to solaris.
D. If jack answers yes, the RSA public key for the host oracle will be added to the known_hosts file
for the user jack.
E. The public host key supplied by oracle is not known to the host solaris.
Answer: B,D
Explanation: The fingerprints are used to guard against man in the middle attacks. Since ssh
logins usually work over the internet (an insecure connection), someone could hijack your
connection. When you try to log into yourmachine.com, he could get "in the middle" and return
your challenge as if he was yourmachine.com. That way, he could get hold of your login password.
To make this attack harder, ssh stores the fingerprint of the server's public key on the first
connection attempt. You will see a prompt like:
The authenticity of host 'eisen (137.43.366.64)' can't be established.
RSA key fingerprint is cf:55:30:31:7f:f0:c4:a0:9a:02:1d:1c:41:cf:63:cf.
Are you sure you want to continue connecting (yes/no)
When you enter yes, ssh will add the fingerprint to your known_hosts file. you will see
Code:
Warning: Permanently added 'eisen,137.43.366.64' (RSA) to the list of known hosts.
61
QUESTION NO: 78
To help with your troubleshooting, you need to determine the version of the OBP. Which two
commands will provide you with this information?
A. printenv B.
banner C. .version
D. set-env
E. show-devs
F. value version
Answer: B,C
Explanation: B: banner
Displays power-on banner.
The PROM displays the system banner. The following example shows a
SPARCstation 2 banner. The banner for your SPARC system may be different.
SPARCstation 2, Type 4 Keyboard
ROM Rev. 2.0, 16MB memory installed, Serial # 289
Ethernet address 8:0:20:d:e2:7b, Host ID: 55000121
C: .version
Displays version and date of the boot PROM.
Note: OBP-OpenBootProm is a firmware which is placed on the sun
machine's prom chip.
It is a os independent user interface to deal with the sun machine's hardware components.
The user interface provides one or more commands to display system information.
QUESTION NO: 79
"Pass Any Exam. Any Time." - www.TwPass.com
62
A. User jill, a member of the group other, can do a long listing (is -1) of user jack's home directory. B.
User oracle, not a member of the group other, cannot execute the shell script. C. User jill, a member
of the group other, can make a copy of testfile in dira. D. User jill, a member of the group other, can
edit the data content of testfile. E. User jill, a member of the group other, cannot delete testfile.
F. User oracle, not a member of the group other, can do a short listing (1s) of dirb.
Answer: C,D,E
Explanation:
QUESTION NO: 80
The /usr/bin/p7zip file that is part of the p7zip package has been overwritten. This server is critical
to production and cannot be rebooted. Identify the command that would restore the file without
requiring a reboot.
63
QUESTION NO: 81
Given:
file1 and file2 are text files.
dir1 and dir2 are directories.
Which two commands will be successful?
A. cp dir1 dir1 B. cp
dir1 file1 C. cp file? dir1
D. cp file. dir1
E. cp file% dir2
F. cp file1 file2 dir1
Answer: C,F
Explanation: C: Here the wildcard character ? is used (Matches any single character).
file1 and file2 will be copied into dir1
F: the two files file1 and file2 are copied into directoy dir1.
Note: cp - copy files and directories
Copy SOURCE to DEST, or multiple SOURCE(s) to DIRECTORY.
Cp has three principal modes of operation. These modes are inferred from the type and count of
arguments presented to the program upon invocation.
* When the program has two arguments of path names to files, the program copies the contents of
the first file to the second file, creating the second file if necessary.
* When the program has one or more arguments of path names of files and following those an
argument of a path to a directory, then the program copies each source file to the destination
directory, creating any files not already existing.
* When the program's arguments are the path names to two directories, cp copies all files in the
source directory to the destination directory, creating any files or directories needed. This mode of
operation requires an additional option flag, typically r, to indicate the recursive copying of
directories. If the destination directory already exists, the source is copied into the destination,
while a new directory is created if the destination does not exist.
64
QUESTION NO: 82
You want to delete the IPv4 address on the interface net3. Which command should you use?
QUESTION NO: 83
Select two correct statements about the authentication services available in Oracle Solaris 11.
A. Pluggable Authentication Modules (PAM) is used to control the operation of services such
console logins and ftp.
B. The Secure Shell can be configured to allow logins across a network to remote servers without
transmitting passwords across the network.
C. Secure Remote Procedure Calls (Secure RPC) provides a mechanism to encrypt data on any
IP Socket connection.
D. Pluggable Authentication Modules (PAM) is used to implement the Secure Shell in Oracle
Solaris 11.
E. Simple Authentication and Security Layer (SASL) provides a mechanism to authenticate and
"Pass Any Exam. Any Time." - www.TwPass.com
65
QUESTION NO: 84
User brian changes the permissions for db_data this command:
chmod 4755 db_data
What is true?
"Pass Any Exam. Any Time." - www.TwPass.com
66
Note:
Permission
7full
6read and write
5read and execute
4read only
3write and execute
2write only
1execute only
0none
0 --- no permission
1 --x execute
2 -w- write
3 -wx write and execute
4 r-- read
5 r-x read and execute
6 rw- read and write
7 rwx read, write and execut
Solaris: Solaris Advanced User's Guide
QUESTION NO: 85
Which three of the components would degrade performance if used in a ZFS storage pool, and are
"Pass Any Exam. Any Time." - www.TwPass.com
67
QUESTION NO: 86
View the Exhibit and review the file system information displayed from a remote server.
68
You are configuring a new server. This new server has the following storage pool configured:
This new server also has the following file systems configured:
When you are finished building this new server, the pool1/data dataset must be an exact duplicate
of note server. What is the correct procedure to create the pool1/data dataset on this new server?
69
QUESTION NO: 88
To confirm the IP address and netmask have been correctly configured on the network interfaces
which command should you use?
A. ipdilm show-if
B. ipadm show-nic
C. ipadm show-addr
D. ipadm show-ifconfig
E. ipadm show-addripadm show-mask
Answer: C
Explanation: Show address information, either for the given addrobj or all the address objects
configured on the specified interface, including the address objects that are only in the persistent
configuration.
State can be:disabled, down, duplicate, inaccessible, ok, tentative
Example:
# ipadm show-addr
ADDROBJ TYPE STATE ADDR
lo0/v4 static ok 127.0.0.1/8
lo0/v6 static ok ::1/128
70
QUESTION NO: 89
You are the administrator of a system that a large number of developers work on. These
developers crash the system, and their applications, on a regular basis.
What command would you use to configure where the core files are saved?
A. savecore B.
dumpadm
C. svcadm
D. proc
E. coreadm
Answer: E
Explanation: The coreadm command is used to specify the name and location of core files
produced by abnormally-terminating processes.
Reference: man coreadm
QUESTION NO: 90
Which option displays the result of running the zfs list command?
71
QUESTION NO: 91
Which network protocol provides connectionless, packet-oriented communication between
applications?
A. TCP B. UDP
C. IP
D. ICMP
E. NFS
F. IPSec
Answer: B
"Pass Any Exam. Any Time." - www.TwPass.com
72
QUESTION NO: 92
A datalink can best be described as______.
73
QUESTION NO: 93
View the exhibit to inspect the file system configuration on your server.
Exhibit: *Missing*
Your department's backup policy is to perform a full backup to a remote system disk on Saturday. On
Sunday through Friday, you are to perform an incremental backup to the same remote system disk.
Each incremental backup will contain only data that has been modified since the previous
Saturday backup.
The server file systems must remain available at all times and can never be taken offline,
The backup must not only provide for the recovery of the most recent version of a file, but must
"Pass Any Exam. Any Time." - www.TwPass.com
74
75
QUESTION NO: 94
A user account must be a member of a primary group, and may also be a member of one or more
secondary groups. What is the maximum total number of groups that one user can concurrently
belong to?
A. 15 B. 16 C.
17 D. 63 E. 64 F.
65
G. The number of groups one user can concurrently belong to is unlimited in Solaris 11.
Answer: B
Explanation: Each user belongs to a group that is referred to as the user's primary group. The
GID number, located in the user's account entry within the /etc/passwd file, specifies the user's
primary group.
Each user can also belong to up to 15 additional groups, known as secondary groups. In the
/etc/group file, you can add users to group entries, thus establishing the user's secondary group
affiliations.
Note (4 PSARC/2009/542):
his project proposes changing the maximum value for NGROUPS_MAX
from 32 to 1024 by changing the definition of NGROUPS_UMAX from 32 to
1024.
The use for a larger number of groups is described in CR 4088757,
particular in the case of Samba servers and ADS clients; the
Samba servers map every SID to a Unix group. Users with more
than 32 groups SIDs are common. We've seen reports varying from
"64 is enough", "128 is absolutely enough" and "we've users with
more 190 group SIDS).
NGROUPS_MAX as defined by different Unix versions are as follows
(http://www.j3e.de/ngroups.html):
76
QUESTION NO: 95
Identify three differences between the shutdown and init commands.
77
QUESTION NO: 96
View the exhibit.
The configuration information in the exhibit is displayed on your system immediately after installing
"Pass Any Exam. Any Time." - www.TwPass.com
78
A. The automatic network configuration option was chosen during the installation of the OS.
B. The manual network configuration option was chosen during the installation of the OS. C.
The network was not configured during the installation of the OS.
D. The DHCP network configuration option was chosen during the Installation of the OS.
Answer: A
Explanation: There are two ways to configure the network configuration: automatic or manual.
In the exhibit we see that DHCP has been used used. This indicates an automatic network
configuration.
QUESTION NO: 97
Which command would you use to determine which package group is installed on your system?
79
QUESTION NO: 98
Oracle Solaris 11 kernel encounters a fatal error, and it results in a system panic. What type of file
does this generate?
A. a.out
B. objdump
C. core dump D. tape
dump E. crash dump
Answer: C
Explanation: A kernel panic is a type of error that occurs when the core (kernel) of an operating
system receives an instruction in an unexpected format or when it fails to handle properly. A kernel
panic can also follow when the operating system can't recover from a different type of error. A
kernel panic can be caused by damaged or incompatible software or, more rarely, damaged or
incompatible hardware.
When a server kernel panics it abruptly halts all normal system operations. Usually, a kernel
process named panic() outputs an error message to the console and stores debugging information
in nonvolitile memory to be written to a crash log file upon restarting the computer. Saving the
memory contents of the core and associated debugging information is called a "core dump."
QUESTION NO: 99
The following information is displayed for the svc:/network/ssh service:
80
Which describes the minimum set of commands to be executed to bring the svc: /network/ssh:
default service back online?
81
A. Enter set -o vi on the command line, or include it in each user's startup script. B.
Enter umask -s on the command line, or include it in each user's startup script.
C. Enter umask 000 on the command line, or include it in each user's startup script. D.
Enter umask 777 on the command line, or include it in each user's startup script.
E. It is not possible to automatically set the execute bit on with the umask setting, or vi option.
F. Enter umask 766 the command line, or include it in the global startup script for the default shell.
Answer: C
"Pass Any Exam. Any Time." - www.TwPass.com
82
A. arp
B. netstat
C. ipadm show-if
D. dladm show-addr E.
ipadm show-addr
Answer: E
Explanation: 'ipadm show-addr' displays all the configured addresses on the system.
Example:
# ipadm show-addr
ADDROBJ TYPE STATE ADDR
lo0/v4 static ok 127.0.0.1/8
lo0/v6 static ok ::1/128
83
The server has two spate 140-GB disk drives: c3t5d0 c3t6d0
Which command would add redundancy to the pool1 storage pool?
84
A. You need to run the pkill command with the process name. B.
You need to switch to super user to kill the process.
C. You need to run the ps command to get more information.
D. You need to run the prstat command to get more information.
Answer: B
Explanation: You can use the pgrep and pkill commands to identify and stop command
processes that you no longer want to run. These commands are useful when you mistakenly start a
process that takes a long time to run.
To terminate a process:
Type pgrep to find out the PID(s) for the process(es).
Type pkill followed by the PID(s).
You can kill any process that you own. Superuser can kill any process in the system except for
those processes with process IDs of 0, 1, 2, 3, and 4. Killing these processes most likely will crash
the system.
85
86
87
A. x86 only
B. x86 64-Bit only
C. SPARC only
D. both x86 and x86 64-Bit
E. x86, x86 64-Bit and SPARC
Answer: C
Explanation: No OpenBoot Environment on the Intel Platform. The Intel environment has no
OpenBoot PROM or NVRAM. On Intel systems, before the kernel is started, the system is
controlled by the basic input/output system (BIOS), the firmware interface on a PC. Therefore,
many features provided by OpenBoot are not available on Intel systems.
Note: The Open Boot PROM (OBP) bootloader only exists within SPARC. Before Solaris 10 01/06,
the bootloader for Solaris x86 was a Sun customized bootstrap software. After Solaris 10 01/06, it
uses GRUB, a well known bootloader that's commonly used in the Linux world.
With GRUB, it's much easier to make the system dual-boot Linux and Solaris. GRUB extends the
capabilities of the bootloader that was not available previously such as the ability to boot from a
USB DVD drive. Those who have used Linux will be quite familiar with GRUB and its options.
88
A. It is a RAIDZ storage pool and can withstand a single disk failure; data will be striped at: disk
components.
B. It is a double-parity RAIDZ storage pool and can withstand two disk failures; data will be striped
across four disk components.
C. It is an improperly configured RAIDZ storage pool; data will be striped across four disk
components, but only three drives are protected with redundancy.
D. It is an improperly configured RAIDZ storage pool; data will be striped across three disk
components, but only three drives are protected with redundancy.
Answer: D
Explanation: Device c3t6d0 is not included in the RAIDZ storage pool. The other three devices
are included in the raidz pool. The data on these devices are protected.
Note: In addition to a mirrored storage pool configuration, ZFS provides a RAID-Z configuration
with either single, double, or triple parity fault tolerance. Single-parity RAID-Z (raidz or raidz1) is
similar to RAID-5. Double-parity RAID-Z (raidz2) is similar to RAID-6.
Reference: RAID-Z Storage Pool Configuration
A. It converts an Oracle Solaris 11 host into a SCSI target device that can be accessed over a
storage network by Linux, Mac OS, or Windows client systems.
"Pass Any Exam. Any Time." - www.TwPass.com
89
Reference: Oracle Solaris Administration: Devices and File Systems, COMSTAR and iSCSI
Technology (Overview)
90
The global zone has 1024 MB of physical memory. You need to limit the non-global zone so that it
uses no more than 500 MB of the global zone's physical memory. Which option would you
choose?
91
A. Option A B. Option
B C. Option C D.
Option D E. Option E
Answer: C
Explanation: Add a memory cap.
zonecfg:my-zone> add capped-memory
Set the memory cap.
zonecfg:my-zone:capped-memory> set physical=50m
End the memory cap specification.
zonecfg:my-zone:capped-memory> end
Reference: System Administration Guide: Oracle Solaris Containers-Resource Management and
Oracle Solaris Zones, How to Configure the Zone
92
93
You back up the /pool1/data file system, creating a snapshot and copying that snapshot to tape
(/dev/rmt/0). You perform a full backup on Sunday night and Incremental backups on Monday
through Saturday night at 11:00 pm. Each incremental backup will copy only the data that has
been modified since the Sunday backup was started.
On Thursday, at 10:00 am, you had a disk failure. You replaced the disk drive (c4t0d0). You
created pool (pool1) on that disk.
Which option would you select to restore the data in the /pool1/data file system?
A. zfs create pool1/dataLoad the Monday tape and enter:zfs recv pool1/data < /dev/rmt/0Load the
Wednesday tape and enter:zfs recv -F pool1/data < /dev/rmt/0
B. Load the Sunday tape and restore the Sunday snapshot:zfs recv pooll/data < /dev/rmt/0zfs
rollback pool1/data@monLoad the Wednesday tape and restore the Wednesday snapshot:zfs
recv -i pooll/data < /dev/rmt/0zfs rollback pool1/data@wed
C. zfs create pooll/dataLoad the Wednesday tape and enter:zfs recv -F pool1/data < /dev/rmt/0
D. Load the Sunday tape and enter:zfs recv pool1/data < /dev/rmt/0Load the Wednesday tape and
enter:* commands missing*
Answer: D
Explanation: First the full backup must be restored. This would be the Sunday backup.
Then the last incremental backup must be restored. This would be the Wednesday backup.
Before restoring the Wednesday incremental file system snapshot, the most recent snapshot must
first be rolled back.
By exclusion D) would be best answer even though it is incomplete.
94
A. /var/spool/pkg
B. http://localhost/solaris
C. http://pkg.oracle.com/solaris/release
D. http://www.oracle.com/Solaris/download
E. /cdrom/cdrom0
Answer: C
Explanation: REPOSITORY DESCRIPTION
* http://pkg.oracle.com/solaris/release
The default repository for new Oracle Solaris 11 users. This repository receives
updates for each new release of Oracle Solaris. Significant bug fixes, security updates, and
new software may be provided at any time for users to install at Oracle's discretion.
*https://pkg.oracle.com/solaris/support
Provides bug fixes and updates. Accessible with a current support contract from Oracle.
* https://pkg.oracle.com/solaris/dev Provides the latest development updates. Accessible to users
enrolled in the Oracle Solaris 11 Platinum Customer Program and approved Oracle Partners.
Reference: Oracle Solaris 11, What's New for Application Developers
A. ping
B. DHCP C. HTTP
D. telnet E. syslog
F. traceroute
Answer: A,F
Explanation: The Internet Control Message Protocol (ICMP) is one of the core protocols of the
Internet Protocol Suite.
ICMP differs from transport protocols such as TCP and UDP in that it is not typically used to
exchange data between systems, nor is it regularly employed by end-user network applications
Which option describes the command used to create these snapshots of the root file system?
96
A. 10 3 * * * /usr/adm/messages
B. 10 3 * * * /usr/sbin/logadm
C. 10 3 * * * /usr/sbin/syslogrotate
D. 10 3 * * * /usi/sbin/logrotate
E. 10 3 * * * /usr/sbin/messages
Answer: B
Explanation: This example shows how to display the default root crontab file.
$ suPassword:
# crontab -l
#ident "@(#)root 1.19 98/07/06 SMI" /* SVr4.0 1.1.3.1 */
#
# The root crontab should be used to perform accounting data collection.
##
10 3 * * * /usr/sbin/logadm
15 3 * * 0 /usr/lib/fs/nfs/nfsfind
30 3 * * * [ -x /usr/lib/gss/gsscred_clean ] && /usr/lib/gss/gsscred_clean
#10 3 * * * /usr/lib/krb5/kprop_script ___slave_kdcs___
Reference: Oracle Solaris Administration: Common Tasks, Displaying crontab Files
97
A. Unicast
B. Multicast
C. Broadcast D.
Bayesian
E. Quality of Service Priority
Answer: B
Explanation: IPv6 defines three address types:
unicast
Identifies an interface of an individual node.
multicast
Identifies a group of interfaces, usually on different nodes. Packets that are sent to the multicast
address go to all members of the multicast group.
98
99
A. head
B. tail C. cat D.
file E. test
Answer: B
Explanation: tail is a program on Unix and Unix-like systems used to display the last few lines of a
text file or piped data.
By default, tail will print the last 10 lines of its input to the standard output. With command line
options the number of lines printed and the printing units (lines, blocks or bytes) may be changed.
The following example shows the last 20 lines of filename:
tail -n 20 filename
100
101
Note 2:
SMF allows notification by using SNMP or SMTP of state transitions. It publishes Information
Events for state transitions which are consumed by notification daemons like snmp-notify(1M) and
"Pass Any Exam. Any Time." - www.TwPass.com
102
A. kill -2 1234
B. kill -15 1234
C. kill -9 1234 D. kill -1
1234
Answer: B
Explanation: On POSIX-compliant platforms, SIGTERM is the signal sent to a process to request
its termination. The symbolic constant for SIGTERM is defined in the header file signal.h. Symbolic
signal names are used because signal numbers can vary across platforms, however on the vast
majority of systems, SIGTERM is signal #15.
SIGTERM is the default signal sent to a process by the kill or killall commands. It causes the
termination of a process, but unlike the SIGKILL signal, it can be caught and interpreted (or
ignored) by the process. Therefore, SIGTERM is akin to asking a process to terminate nicely,
allowing cleanup and closure of files. For this reason, on many Unix systems during shutdown, init
issues SIGTERM to all processes that are not essential to powering off, waits a few seconds, and
then issues SIGKILL to forcibly terminate any such processes that remain.
103
104
105
A. domainname
B. ping localhost.
C. ping 192.168.1.1
D. ping 23.45.82.174
E. ping www.oracle.com.
F. cat /etc/resolv.conf
Answer: E
Explanation: www.oracle.comwould have to be resolved to an IP name by the domain name
service.
106
A. pkill bigscript
B. ps bigscript
C. pgrep bigscript D. prstat
bigscript
Answer: C
Explanation: Pgrep takes a process name and return a PID.
Note: pgrep looks through the currently running processes and lists the process IDs which
matches the selection criteria to stdout. All the criteria have to match. For example,
pgrep -u root sshd
will only list the processes called sshd AND owned by root.
Incorrec answers:
ps bigscript: You can't pass a name to ps, it interprets it as arguments.
107
After Installing the OS, you need to verify the network interface information. Which command was
used to display the network interface information in the exhibit?
A. ifconfiq -a
B. ipadm show-addr
C. svcs -1 network/physical
D. netstat -a
Answer: B
Explanation: 'ipadm show-addr' displays all the configured addresses on the system.
Example:
# ipadm show-addr
ADDROBJ TYPE STATE ADDR
"Pass Any Exam. Any Time." - www.TwPass.com
108
A. pkgchk openldap B.
pkginfo openldap
C. pkg contents openldap
D. pkg verify openldap
E. pkg set-property signature-policy verify
Answer: A
Explanation: pkgchk checks the accuracy of installed files or, by using the -l option, displays
information about package files. pkgchk checks the integrity of directory structures and files.
Discrepancies are written to standard error along with a detailed explanation of the problem.
Reference: man pkgchk
A. crontab -e
B. crontab -e /var/spool/cron/crontab
C. crontab -r
D. crontab -e /etc/default/cron
Answer: A
Explanation: The main tool for setting up cron jobs is the crontab command, though this is not
available on every Unix variant. Typically under Solaris or Linux one would create a new crontab
or edit an existing one, using the command;
109
A. /usr/bin/bash
B. /usr/bin/ksh
C. $SHELL
D. the PID for the current shell
Answer: C
Explanation: Single quotes are most strict. They prevent even variable expansion. Double quotes
prevent wildcard expansion but allow variable expansion. For example:
#!/bin/sh
echo $SHELL
echo "$SHELL" echo
'$SHELL' This will print:
/usr/bin/bash
/usr/bin/bash
$SHELL
110
A. The id_rsa file contains the private key for rhosts-based host authentication.
B. The id_dsa.pub file contains the Digital Signature Algorithm public key for the user jack.
C. The id_rsa.pub file contains the Rivest Shamir Adelman public key for the host solaris.
D. The authorized_keys file contains the private keys of remote users authorized to access jack's
account on solaris.
E. The known_hosts file contains the verified public keys of remote hosts known to be trusted.
Answer: A,E
Explanation: A: You will see two files starting with id_rsa. id_rsa is the private key and id_rsa.pub
is public key.
E: The .ssh/known_hosts file
In order to use public-key secure connection with other hosts (ssh, scp, sftp) there is a special
directory, ~/.ssh/, where passphrases and public keys are stored. Normally you wouldn't need to
know the gory details, but from time to time a host will change its public key and then you have
difficulty using ssh or scp with that host, and have to edit a file named known_hosts.
If you try to ssh to another computer, but get an error message that warns about a changed or
incorrect public key, then it is probably just a case of that host changing its public key. (It is
possible, though usually not the case, that malicious hacking is involved.) Unless you actually
suspect hacker involvement, you can edit the file ~/.ssh/known_hosts using your usual text editor
(vi, emacs, nedit, or pico) and delete any line with the name of that host.
Then when you try to ssh that host again, it will be like the first time ever; ssh will ask you if you
want to accept a new public key, you type the whole word yes, and everything will proceed
normally from there.
Here is what a typical ~/.ssh/known_hosts file might contain. Note that newton is represented on
two different lines:
newton 1024 35
153438062610297067329638677441205712613292203533062535600064224677647442245028
855505387934431717435134842994423656065076260604296084868001730665553662299156
116414854701274715680961503198280525759778667306417179500370189017139564144825
610347509023078143132936185076849630461827976942220442313116255293297021841
ucsub 1024 37
132170811640421742212085598383135714069016332111955003414250071326834884018721
183646445780180633494496866895830879394309011412231102757022090299732775466435
111
112
The zone has never been booted. Which three options correctly describe this zone?
113
Note on zones:
After installing Oracle Solaris on a system, but before creating any zones, all processes run in the
global zone. After you create a zone, it has processes that are associated with that zone and no
other zone. Any process created by a process in a non-global zone is also associated with that
non-global zone.
Any zone which is not the global zone is called a non-global zone. Most people call non-global
zones simply "zones." Some people call them "local zones" but this is discouraged.
The default native zone file system model on Oracle Solaris 10 is called "sparse-root." This model
emphasizes efficiency and security at the cost of some configuration flexibility. Sparse-root zones
optimize physical memory and disk space usage by sharing some directories, like /usr and /lib.
Sparse-root zones have their own private file areas for directories like /etc and /var. Whole-root
zones increase configuration flexibility but increase resource usage. They do not use shared file
systems for /usr, /lib, and a few others.
There is no supported way to convert an existing sparse-root zone to a whole-root zone. Creating a
new zone is required.
Reference: Reference: Zones and Containers FAQ
114
115
116
A. cat. /etc/release
B. uname -a
C. pkg info kernel
D. banner (issued from the OpenBoot Prom)
E. cat /etc/motd
Answer: A
Explanation: Different UNIX-like operating systems store information about their release versions
differently. If you know what OS you have, but not sure about the version, then here's how you can
find out:
bash-2.03$ cat /etc/release
Solaris 8 2/04 s28s_hw4wos_05a SPARC
Copyright 2004 Sun Microsystems, Inc. All Rights Reserved.
Assembled 08 January 2004
Reference: How To: Find Out the Release Version of Your UNIX
117
A. The automatic network configuration option was chosen during the installation of the OS.
B. The manual network configuration option was chosen during the installation of the OS. C.
The network was not configured during the installation of the OS. D. The network interface is
configured with a static IP address.
Answer: C
Explanation: Only the loopback addresses are configured. No IP address is configured.
118
A. It cannot be destroyed. B. It
cannot be activated. C. It cannot
be renamed.
D. You can create a snapshot of it. E. It is
activated but unbootable.
F. It has been deleted and will be removed at the next reboot.
Answer: B,C
Explanation: If the boot environment is unbootable, it is marked with an exclamation point (!) in
the Active column in the beadm list output.
The beadm command restricts actions on unbootable boot environments as follows:
You cannot activate an unbootable boot environment. (B)
You cannot destroy a boot environment that is both unbootable and marked as active on reboot.
You cannot create a snapshot of an unbootable boot environment.
You cannot use an unbootable boot environment or boot environment snapshot with the -e option
of beadm create.
You cannot rename an unbootable boot environment. (C)
Reference: Creating and Administering Oracle Solaris 11 Boot Environments, Unbootable Boot
Environments
A. /var/adm/messages
B. /var/adm/messages.0 C. /var
/adm/messagas.1 D.
/var/adm/messages.2 E.
/var/adm/messages.3
119
121
2.
Mount the remote snapshot dataset.
For example:
# mount -F nfs remote-system:/rpool/snaps /mnt
122
123
124
Reference: Creating and Administering Oracle Solaris 11 Boot Environments, Creating a Boot
Environment
125
126
A. ipadm create-ip B.
ipadm enable-if
C. ipadm show-if D.
ipadm up-addr
Answer: B
Explanation: enable-if -t interface
Enables the given interface by reading the configuration from the persistent store. All the
persistent interface properties, if any, are applied and all the persistent addresses, if any, on the
given interface will be enabled.
-t, --temporary
Specifies that the enable is temporary and changes apply only to the active configuration.
127
A. dbzone is using 0.21% of the total CPU resource available in the zone's processor set.
B. dbzone is using 0.21% of the global zone's total CPU.
C. dbzone is using 5.48% of the total physical memory that has been allocated to the zone.
D. dbzone is using 2.37% of the global zone's total virtual memory.
E. The network is being utilized 100% with no physical bandwidth remaining.
Answer: A,C
Explanation: A: %PART
The amount of cpu used as a percentage of the total cpu in a processor-set to which the zone is
bound. A zone can only have processes bound to multiple processor sets if it is the global zone, or
if psrset(1m) psets are used. If multiple binding are found for a zone, it's %PART is the fraction
used of all bound psets. For [total] and [system], %PART is the percent used of all cpus on the
system.
Note: The zonestat utility reports on the cpu, memory, and resource control utilization of the
currently running zones. Each zone's utilization is reported both as a percentage of system
resources and the zone's configured limits.
The zonestat utility prints a series of interval reports at the specified interval. It optionally also
prints one or more summary reports at a specified interval.
Reference: man zonestat
128
129
A. It is not possible to make a script executable without using the chmod command.
B. umask value of 0002 set in /etc/profile
C. umask value of 0002 set in /export/home/jack/.bashrc
D. umask value of 0722 set in /etc/profile
E. umask value of 0722 set In /export/home/jack/.bashrc
Answer: B
Explanation: The user file-creation mode mask (umask) is use to determine the file permission for
newly created files. It can be used to control the default file permission for new files. It is a fourdigit octal number.
You can setup umask in /etc/bashrc or /etc/profile file for all users. By default most Unix distro set it
to 0022 (022) or 0002 (002).
In short,
130