1. Trang chủ
  2. » Công Nghệ Thông Tin

Solaris 9 System Administrator Exam phần 9 pot

58 159 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Tiêu đề Practice Exam 2
Trường học University of Solaris
Chuyên ngành System Administration
Thể loại Bài tập
Năm xuất bản 2002
Thành phố San Francisco
Định dạng
Số trang 58
Dung lượng 232,69 KB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Chapter 20426 Practice Exam Questions Question 1 What is the name of the command used to add the contents of the Solaris 9 Software 2 of 2 distribution CD to an install server?. [Select

Trang 1

Practice Exam 2

This chapter provides 58 questions on the topics that pertain to Exam

310-015, “Sun Certified System Administrator for the Solaris 9 OperatingEnvironment—Part II.” This exam must be completed in 105 minutes.Keep in mind that to become certified, you must pass both the 310-014 examand this one

.

20

Trang 2

Chapter 20

426

Practice Exam Questions

Question 1

What is the name of the command used to add the contents of the Solaris 9

Software (2 of 2) distribution CD to an install server?

Question 2

Which of the following virtual devices or RAID levels does the SVM support?

[Select all that apply.]

❑ A Concatenated virtual device

Which of the following /etc/nsswitch.conf file entries would cause DNS, NIS+,

and then /etc files to be searched when trying to resolve a hostname?

❍ A hosts: dns nisplus files

❍ B hosts: files nisplus dns

❍ C ipaddress: file nisplus dns

❍ D ipaddress: dns nisplus files

Trang 3

❍ A A boot server cannot reside on an install server.

❍ B One or more install clients are not on the same subnet as the install server.

❍ C All install clients are not on the same subnet.

❍ D NIS or NIS+ cannot locate a boot server that resides on an install server.

Trang 4

Chapter 20

428

Question 8

Which of the following steps are not used to add a new NIS map? [Select all that

apply.]

❑ A Create a text file with the appropriate information.

❑ B Use the make command.

❑ C Use the makedbm command.

❑ D Use the yppush command.

Question 9

Which of the following are valid entries for an AutoFS direct map? [Select all that

apply.]

❑ A /usr/local/bin nfsserver:/usr/local/bin

❑ B /usr/games -ro nfsserver:/usr/games

❑ C /usr/bin nfsserver1:/usr/bin nfsserver2:/usr/bin

❑ D /- nfsserver:/usr/data

❑ E /usr/data nfsserver:/usr/data -ro

Question 10

Which of the following are features of a virtual disk management system?

[Select all that apply.]

❑ A Graphical administration tool

❑ B Improved reliability

❑ C Improved performance

❑ D Overcomes physical disk limitations

Trang 5

Practice Exam 2 429

Question 11

Which of the following are fields in a custom JumpStart rules file?

[Select all that apply.]

Which of the following situations do not require the automount command to be

executed manually? [Select all that apply.]

❑ A Addition to auto_master

❑ B Addition to direct map

❑ C Addition to indirect map

❑ D Deletion from auto_master

❑ E Deletion from direct map

❑ F Deletion from indirect map

Trang 6

Chapter 20

Which of the following is the default source facility for syslog messages if a

source is not specified?

NIS+ uses certain files to store the information that NIS+ clients request What

are these files collectively referred to as?

Question 17

In regards to Ethernet addresses associated with network interfaces, which of

the following statements is true?

❍ A They are displayed in the xx:xx:xx:xx:xx format

(five 8-bit bytes) using the ifconfig command.

❍ B They are displayed in the xx:xx:xx:xx:xx:xx format

(six 8-bit bytes) using the netstat command.

❍ C They are displayed in the xx:xx:xx:xx:xx format

(five 8-bit bytes) using the netstat command.

❍ D They are displayed in the xx:xx:xx:xx:xx:xx format

(six 8-bit bytes) using the ifconfig command.

Trang 7

Which of the following are valid actions that can be specified in the

/etc/syslog.conf file? [Select all that apply.]

❑ A The name of a file

❑ B An exclamation mark (!)

❑ C The name of a host

❑ D The name of a user account

Trang 8

Chapter 20

432

Question 22

Which of the following commands can be used to determine shared NFS

resources? [Select all that apply.]

Which of the following is the best procedure for generating the data files used

to create NIS maps?

❍ A Edit the /etc files to remove any information not needed by NIS.

❍ B Copy the /etc/files to a directory and clean up the copy for use in

building NIS maps.

❍ C Create a new set of data files by using the makenisdata command.

❍ D Run the buildmap command for each map and enter the appropriate

data when prompted.

Question 24

Which file is used by Custom JumpStart installation to define which profile a

system or group of systems should use for installation?

Question 25

Which term describes the technique of writing data across multiple disks to

improve performance and to overcome disk limitations?

Question 26

Which command is used to make an NFS resource unavailable for mounting?

Trang 9

Practice Exam 2 433

Question 27

What is the name of the command used to add a role to the RBAC database?

Question 28

The Solaris 9 operating system supports six types of name services Five of

these are /etc files, DNS, LDAP, NIS, and NIS+ What is the name of the sixth

Trang 10

Chapter 20

434

Question 31

Which file is used to automatically mount NFS resources during system boot or

when the mountall command is used?

Identify the name of the NIS+ table that contains the Ethernet addresses of

sys-tems in the domain.

Question 33

Which command do you use to add a new NIS map?

Question 34

You use the domainname command to set the domain name for a system using

/etc files, but after the system is rebooted, the domain name is lost Why?

❍ A The domain name has to be re-entered after every reboot.

❍ B You didn’t use the -p command-line argument to make it permanent.

❍ C You forgot to edit the /etc/defaultdomain file and enter the domain.

Trang 11

Practice Exam 2 435

Question 35

Which /etc file contains a list of the servers (and paths) that provide boot, root,

and swap areas for network/install clients?

❑ B Entire Distribution Plus OEM System Support

❑ C End User Support

❑ D Developer System Support

Trang 12

Chapter 20

436

Question 39

What is the command-line argument used with the setup_install_server

com-mand to set up a boot server?

Identify the facility used to capture and log messages from system components

and user programs.

Trang 13

Practice Exam 2 437

Question 44

Which of the following are keywords that can be defined in a profile or class file?

[Select all that apply.]

❑ A Intel clients only

❑ B SPARC clients only

❑ C Both Intel and SPARC clients

❑ D Any client on a subnet different from the install server

Which of the following NFS mount options must be specified in the /etc/vfstab

file to support failover? [Select all that apply.]

❑ A Read-only (ro)

❑ B Read-write (rw)

❑ C No interrupts allowed (nointr)

❑ D Advertise as public (public)

Trang 14

Chapter 20

Which of the following swap-related operations can be performed by the swap

command? [Select all that apply.]

❑ A Create swap space

❑ B Add swap space

❑ C List swap space

❑ D Delete swap space

Question 50

Identify the command used to split and combine Flash Archives.

Question 51

Which of the following describes the function of the ypbind daemon?

❍ A Locates an NIS client on a different subnet and authenticates it across

the subnets.

❍ B Locates an NIS server (ypserv daemon) on the same subnet and

provides a lookup service for its clients.

❍ C Locates an NIS server (ypserv daemon) on a different subnet and

provides a lookup service for its clients.

❍ D Locates an NIS+ server (ypserv daemon) anywhere on the network

and provides a lookup service for its clients.

Question 52

Identify the default facility.level used for the logger command.

Trang 15

Practice Exam 2 439

Question 53

Which of the following describe uses of the /etc/security/policy.conf file?

[Select all that apply.]

❑ A Specifies profiles that are granted to all users

❑ B Specifies privileged operations that are granted to all users

❑ C Specifies authorizations and profiles that are granted to root

❑ D Specifies authorizations that are granted to all users

Question 54

Identify the file used to store the global core file configuration.

Question 55

What does dumpadm -n do?

❍ A Enables the savecore procedure.

❍ B Resets the crash dump configuration to its default.

❍ C Resets the savecore numbers sequence to start at zero.

❍ D Disables the savecore procedures.

Trang 16

Chapter 20

440

Question 58

Which of the following is the definition of an SVM data set?

❍ A A collection of physical disk slices or partitions that is managed as a

single logical device.

❍ B A set of volumes and hot spares that can be shared by several host

systems.

❍ C A collection of slices that can be used as hot spares to automatically

replace failed slices.

❍ D A database used to store information on the SVM configuration.

Replicas of the database are used to provide redundancy.

Trang 18

Chapter 21

Trang 19

serv- serv- serv- serv- serv- serv- serv- serv- serv- serv- serv- serv- serv- serv- serv- serv- serv- serv- serv- serv- serv- serv- serv- serv- serv- serv- serv- serv- serv- serv- serv- serv- serv- serv- serv- serv- serv- serv- serv- serv- serv- serv- serv- serv- serv- serv- serv- serv- Practice Exam 2 Answers 443

answer B is incorrect Answers C and D use an invalid keyword (ipaddress)and therefore are incorrect

Question 5

All of the answers are correct The system sharing an NFS resource can beidentified by hostname or IP address If the file system type is not specifiedusing the -F command-line argument, NFS is assumed NFS-specificoptions can be specified using the -ocommand-line argument

Question 6

The correct answer is B Answer A is incorrect because a boot server can reside

on an install server Answer C is incorrect because the location of clients inrelation to other clients does not determine the need for boot servers It is thelocation of the clients in relation to the install server that determines the needfor a separate boot server Answer D is incorrect because NIS and NIS+ do notlocate systems but serve only as a database of information

Question 7

The correct answer is A Answer D is used to propagate a new map Answers

B, C, and E are not valid

Question 8

The correct answers are B and D The makecommand is used when ing a default map The yypushcommand is used for propagating an updatednon-default map Answer A is incorrect because the text file is used to add anew map Likewise, the makedbmcommand is used for new maps Therefore,answer C is incorrect

Trang 20

Chapter 21

444

not provide a valid mount point Therefore, answer D is incorrect The mat for a direct map entry is mount point, options, and then resource Theformat of answer E is mount point, resource, and then options Therefore,answer E is incorrect

key-al If either is not specified, a hyphen (-) is used in place of the script name.Question 12

Answers C and F are correct Changes to indirect maps do not require ning the automountcommand Changes to the auto_masterand direct mapsrequire that the automount command be executed manually Therefore,answers A, B, D, and E are incorrect

run-Question 13

Answers A, B, and D are correct The hostname, IP address, and Ethernetaddress of the client need to be added to NIS/NIS+ to support JumpStartinstallation System locale is not required to install client Therefore, answer

C is incorrect Because the client information is added to the appropriatename service, there is no need to identify the name service Therefore,answer E is incorrect

Question 14

The correct answer is C ypinitis used to initialize NIS servers and clients.Therefore, answer A is incorrect ypstopis used to stop the ypbindprogram

Trang 21

Practice Exam 2 Answers 445

Therefore, answer B is incorrect ypcrankis not valid Therefore, answer D

is incorrect ypwhichis used to identify the NIS server Therefore, answer E

is incorrect

Question 15

The correct answer is C useris used for messages from user programs mail

is used for messages related to mail Therefore, answer A is incorrect auth

is used for messages related to login authentication Therefore, answer B isincorrect kernis used for messages related to the kernel Therefore, answer

D is incorrect If a source is not specified, useris assumed

Question 16

The correct answer is tables.

Question 17

Answer D is correct The Ethernet address is six 8-bit bytes or 48-bits long

It can be displayed using the ifconfig command Because the Ethernetaddress is six, not five, 8-bit bytes long, the netstat command cannot beused to display the Ethernet address of a network interface Therefore,answers A, B and C are incorrect

Question 18

The correct answers are A and C Custom JumpStart and JumpStart areautomatic installation methods Therefore, answers B and D are incorrect.Question 19

The correct answer is C Although some of the name services use ASCII files

or provide both hostname and IP address resolution, DNS is the only oneused on the Internet Therefore, answers A, B, and D are incorrect

Trang 22

Chapter 21

446

Question 20

The correct answer is B RAID 1 is a configuration that uses mirroring in anidentical (not interleaved) fashion Therefore, answer A is incorrect A con-catenated virtual file system uses one partition at a time Therefore, answer

C is incorrect Hot spare is not a type of virtual file system Therefore,answer D is incorrect

Question 21

The correct answers are A, C, and D If a filename is specified, the message

is appended to the file If a hostname is specified, the message is sent to thehost If a user account name is specified, the message is displayed on the stan-dard output of the logged-in user The only other valid action is an asterisk(*), which causes the message to be displayed on the standard output device

of all logged-in user accounts Therefore, answer B is incorrect

Question 22

The correct answers are A and C The sharecommand, used without ments, lists all locally shared NFS resources The dfsharescommand can beused to list locally or remotely shared resources The dfmountscommand is used

argu-to list locally or remotely mounted resources Therefore, answer B is incorrect.The mountallcommand is used to mount local file systems Therefore, answer

D is incorrect The mountcommand is used to mount or list currently mountedlocal file systems and NFS resources Therefore, answer E is incorrect

Trang 23

Practice Exam 2 Answers 447

Question 31

The correct answer is B The /etc/dfs/dfstabfile is used to automaticallyshare NFS resources Therefore, answer A is incorrect The /etc/mnttabfilelists the currently mounted file systems and NFS resources Therefore,answer C is incorrect The /etc/dfs/sharetabfile lists the NFS resourcescurrently shared Therefore, answer D is incorrect

Trang 24

Chapter 21

The correct answer is A etherscontains network client Ethernet addressesassociated hostnames Therefore, answer B is incorrect timezone containsnetwork client time zone information Therefore, answer C is incorrect

hostscontains system hostnames and IP addresses Therefore, answer D isincorrect vfstabcontains a list of file systems to be mounted automatically.Therefore, answer E is incorrect

Trang 25

Practice Exam 2 Answers 449

for administration, and users are not allowed to access the system Therefore,answer B is incorrect All network services except the NFS server are started

at run level 2 Therefore answer C is incorrect Run level 6 is the rebootstate, and the system is being restarted Therefore, answer E is incorrect

Question 38

All the answers are correct From smallest to largest, they are End UserSupport, Developer System Support, Entire Distribution, and EntireDistribution Plus OEM System Support

Question 42

The correct answer is A /dev/vx/dskis associated with the Volume Managervirtual file systems Therefore, answer B is incorrect /dev/md/dskis associ-ated with Disk Suite virtual file systems Therefore, answer C is incorrect.Answer D is not valid

Question 43

The correct answer is syslogor syslogd

Trang 26

Chapter 21

450

Question 44

Answers are A, B, C, and D are correct All of these keywords can be defined

in a profile The install_typekeyword must be defined and must be thefirst entry in the profile file

Question 45

Answer B is correct, because Intel clients typically obtain a bootable imagefrom a local disk or local CD-ROM Only SPARC clients use TFTP toobtain a bootable image Therefore, answers A and C are incorrect Intelclients can be configured to use the Remote Program Load (RPL) The sub-net has no impact on use of TFTP; therefore, answer D is incorrect.Question 46

A matches 4, B matches 5, C matches 1, D matches 2, and E matches 3 Thelayers of the TCP/IP Network Model from highest to lowest are as follows:Application, Transport, Network, Data Link, and Physical

Question 47

Answer A is correct Only the read-only (ro) NFS mount option is required

to set up failover Therefore, answers B, C and D are incorrect

Question 48

rootis the correct answer The root=listcommand-line argument is used

to specify a list of clients that have root access

Question 49

Answer B, C, and D are correct The swapcommand is used to add, list, anddelete swap space The mkfile command is used to create swap space.Therefore, answer A is incorrect

Trang 27

Practice Exam 2 Answers 451

Question 52

user.noticeis the correct answer

Question 53

Answers are A and D are correct Privileged operations are not granted via

policy.conf Therefore, answer B is incorrect The policy.confgrants izations and profiles to all users, not to root Therefore, answer C is incorrect.Question 54

author-The /etc/coreadm.conffile is the correct answer

Question 55

Answer D is the correct answer The command-line argument to enable the

savecoreprocedure is -y Therefore, answer A is incorrect The dumpadm

command does not support the functions specified in answers B and C

Question 56

The logcommand-line argument is the correct answer

Trang 28

Chapter 21

452

Question 57

Answer B is the correct answer Answer A is used to specify the NFS Serverlogging configuration (location of log files and work buffer) Therefore,answer A is incorrect The files specified in answers C and D are not valid.Question 58

Answer B is the correct answer Answer A is the definition of a volume.Therefore, answer A is incorrect Answer C is the definition of a hot sparepool Therefore, answer C is incorrect Answer D is the definition of a statedatabase Therefore, answer D is incorrect

Trang 29

What’s on the CD-ROM

.

A

Ngày đăng: 14/08/2014, 02:22