Oracle Solaris 11 System Administration
Question No: 31 – (Topic 1)
You log in to the system as user1,then switch user to root by using the su – command. After entering the correct password,yon enter the following commands:
whoami;who am i;id
Which option correctly represents the output?
Answer: B Explanation:
The whoami utility displays your effective user ID as a name. Here this would be root.
who am i
The command who shows who is logged on. Here this would be:
user1 console Dec 30 20:20
The id utility displays the user and group names and numeric IDs,of the calling process,to the standard output. If the real and effective IDs
are different,both are displayed,otherwise only the real ID is dis- played.
Here this would be: uid=0(root) gid=0(root)
Each UNIX proces has 3 UIDs associated to it. Superuser privilege is UID=0.
This is the UID of the user/process that created THIS process. It can be changed only if the running process has EUID=0.
This UID is used to evaluate privileges of the process to perform a particular action. EUID can be change either to RUID,or SUID if EUID!=0. If EUID=0,it can be changed to anything.
If the binary image file,that was launched has a Set-UID bit on,SUID will be the UID of the owner of the file. Otherwise,SUID will be the RUID.
Question No: 32 – (Topic 1)
When speakingtoan Oracle Support Engineer,you are asked to verify the version of the Solaris 11 build currently running on your system.
Which command would display the Solaris 11 build version currently running on your system?
pkg info all
prtconf | grep -i update
pkg info entire
Answer: B Explanation:
Which Solaris release you are running on your system can be determined using the following command:
This will tell you which release you are running and when it was released. The more recent your system,the more info is contained in this file.
# cat /etc/release
Oracle Solaris 10 8/11 s10s_u10wos_17b SPARC
Copyright (c) 1983,2011,Oracle and/or its affiliates. All rights reserved. Assembled 23 August 2011
Question No: 33 – (Topic 1)
You are asked to determine user jack’s default login directory. Which command would provide you with useful information?
cat /etc/passwd | grep jack
cat /etc/group | grep jack
cat /etc/shadow | grep jack
cat /etc/default/passwd | grep jack
Answer: A Explanation:
The /etc/passwd contains one entry per line for each user (or user account) of the system. All fields are separated by a colon (:) symbol. Total seven fields as follows.
Username: It is used when user logs in. It should be between 1 and 32 characters in length.
Password: An x character indicates that encrypted password is stored in /etc/shadow file.
User ID (UID): Each user must be assigned a user ID (UID). UID 0 (zero) is reserved for root and UIDs 1-99 are reserved for other predefined accounts. Further UID 100-999 are reserved by system for administrative and system accounts/groups.
Group ID (GID): The primary group ID (stored in /etc/group file)
User ID Info: The comment field. It allow you to add extra information about the users such as user#39;s full name,phone number etc. This field use by finger command.
Home directory: The absolute path to the directory the user will be in when they log in. If this directory does not exists then users directory becomes /
Command/shell: The absolute path of a command or shell (/bin/bash). Typically,this is a shell. Please note that it does not have to be a shell.
Question No: 34 – (Topic 1)
The following line is from /etc/shadow in a default Solaris 11 Installation:
jack: $5$9JFrt54$7JdwmO.F11Zt/ jFeeOhDmnw93LG7Gwd3Nd/cwCcNWFFg:0:15:30:3::: Which two are true?
Passwords for account jack must be a minimum of 15 characters long.
The password for account jack has expired.
The password for account jack has 5 characters.
A history of 3 prior passwords for the account jack is kept to inhibit password reuse.
The minimum lifetime for a password for account jack is 15 days.
Answer: B,E Explanation:
From the content of the /etc/shadow file we get:
encrypted password: $5$9JFrt54$7JdwmO.F11Zt/ jFeeOhDmnw93LG7Gwd3Nd/cwCcNWFFg
Last password change (lastchanged): Days since Jan 1,1970 that password was last changed: 0
Minimum: The minimum number of days required between password changes i.e. the number of days left before the user is allowed to change his/her password: 15
Maximum: The maximum number of days the password is valid (after that user is forced to change his/her password): 30 Warn : The number of days before password is to expire that user is warned that his/her password must be changed: 3
Inactive : The number of days after password expires that account is disabled
Expire : days since Jan 1,1970 that account is disabled i.e. an absolute date specifying when the login may no longer be used
Question No: 35 – (Topic 1)
User jack logs in to host solaris and then attempts to log in to host oracle using ssh. He receives the following error message:
The authenticity of host oracle (192.168.1.22) can#39;t be established. RSA key fingerprint is 3B:23:a5:6d:ad:a5:76:83:9c:c3:c4:55:a5:18:98:a6
Are you sure you want to continue connecting (yes/no)?
Which two are true?
The public host key supplied by solaria is not known to the host oracle.
The error would not occur if the RSA key fingerprint shown in the error message was added to the /etc/ssh/known_hosts file on solaris.
The private host key supplied by oracle is not known to solaris.
If jack answers yes,the RSA public key for the host oracle will be added to the known_hosts file for the user jack.
The public host key supplied by oracle is not known to the host solaris.
Answer: B,D Explanation:
The fingerprints are used to guard against man in the middle attacks. Since ssh logins usually work over the internet (an insecure connection),someone could hijack your connection. When you try to log into yourmachine.com,he could get quot;in the middlequot; and return your challenge as if he was yourmachine.com. That way,he could get hold of your login password.
To make this attack harder,ssh stores the fingerprint of the server#39;s public key on the first connection attempt. You will see a prompt like:
The authenticity of host #39;eisen (137.43.366.64)#39; can#39;t be established. RSA key fingerprint is cf:55:30:31:7f:f0:c4:a0:9a:02:1d:1c:41:cf:63:cf. Are you sure you want to continue connecting (yes/no)
When you enter yes,ssh will add the fingerprint to your known_hosts file. you will see Code:
Warning: Permanently added #39;eisen,137.43.366.64#39; (RSA) to the list of known hosts.
The next time you login,ssh will check whether the host key has changed. A changing host key usually indicates a man in the middle attack,and ssh refuses to connect.
Question No: 36 – (Topic 1)
To assist in examining and debugging running processes,Solaris 11 has a utility that returns pro arguments and the names and values of environment variables.
What is the name of this utility?
Answer: B Explanation:
The pargs utility examines a target process or process core file and prints arguments,environment variables and values,or the process auxiliary vector.
Question No: 37 – (Topic 1)
Which two are true about accounts,groups,and roles in the Solaris user database?
All Solaris user accounts must have a unique UID number.
A Solaris account name may be any alphanumeric string,and can have a maximum length of 8 characters.
Account UID numbers 0-09 are system-reserved.
The GID for an account determines the default group ownership of new files created by that account.
The groups that an account is a member of are determined by the entries in the
Answer: A,B Explanation:
A: Solaris uses a UID (User ID) to identify each user account. The UID is a unique number assigned to each user. It is usually assigned by the operating system when the account is created.
B: In Solaris the account name can include any alphanumeric string (and . _ -). The maximum length is 8 characters.
Question No: 38 – (Topic 1)
You have a ZFS file system named /dbase/oral and you want to guarantee that 10 GB of storage space is available to that dataset for all data,snapshots,and clones.
Which option would you choose?
zfs set refreservation=10g dbase/oral
zfs set quota=10g dbase/oral
zfs set refquota=10g dbase/oral
zfs set reservation=10g dbase/oral
Answer: D Explanation:
A ZFS reservation is an allocation of disk space from the pool that is guaranteed to be available to a dataset. As such,you cannot reserve disk space for a dataset if that space is not currently available in the pool. The total amount of all outstanding,unconsumed reservations cannot exceed the amount of unused disk space in the pool. ZFS reservations can be set and displayed by using the zfs set and zfs get commands. For example:
# zfs set reservation=5G tank/home/bill
# zfs get reservation tank/home/bill NAME PROPERTY VALUE SOURCE
tank/home/bill reservation 5G local
Question No: 39 – (Topic 1)
You created an IP address for interface not.3 with the following command,which executed successfully:
ipadm create-addr -T static -a 192.168.0.100/24 net3/v4 You then ran:
The result indicated that the interface was down. You then ran:
ipadm delete-addr net3/v4
ipadm create-addr -T static -a 192.168.0.101/24 net3/v4 ipadm show-if
The last command indicated that the interface was up.
Why did it work with the second address specified,but not the first?
The 192.168.0.100 address is reserved for broadcast messages.
Another device exists on the network,using the 192.168.0.100 address.
The network interface card does not support the address 192.168.0.100.
The address 192.168.0.100 is at a boundary and may not be configured in Oracle Solaris 11.
192.168.0.100 is a DHCP address and may not be statically configured in Oracle Solaris 11.
Answer: B Explanation:
The first IP address is already in use.
Question No: 40 – (Topic 1)
You are planning group names for a new system. You decide to use a numbering convention that includes the year and month the project began,to form the group number and name for work associated with that project.
So,for example,a project targeted to begin in January,2013 would have the number (name): 201301(Pr20l301)
What are the two problems with your plan?
Group names may not contain a numeric character
Group names may be no longer than 7 characters.
Group numbers should not be larger than 60000.
Group names should be all lowercase.
Answer: C,D Explanation:
C: The Group ID (GID) field contains the group#39;s numerical ID. GIDs can be assigned whole numbers between 100 and 60000.
D: Group names contain only lowercase characters and numbers.
|Lowest Price Guarantee||Yes||No||No|
|Free VCE Simulator||Yes||No||No|