Oracle Solaris 11 System Administration
Question No: 41 – (Topic 1)
User brian changes the permissions for db_data this command: chmod 4755 db_data
What is true?
db_data now has permissions rwsr-xr-x and can be deleted only by user brian.
db_data now has permissions rwsr-xr-x and,if executed,will inn with the permissions of user brian.
db_data now has permissions rwxr-sr-x and can be deleted only by members of the group owning it.
The permissions for db_data cannot be determined,because the permissions prior to the change have not been specified.
db_data must be an ordinary file,because special permissions cannot be set on a directory.
Answer: C Explanation:
Use the chmod command to change permissions for a file or directory. You must be the owner of a file or directory,or have root access,to change its permissions.
Here we do not know if brian owns db_data. Note:
Permission 7 full
6 read and write
5 read and execute 4 read only
3 write and execute
2 write only
1 execute only
0 — no permission 1 -x execute
-wx write and execute 4 r- read
5 r-x read and execute 6 rw- read and write
7 rwx read,write and execut
Solaris: Solaris Advanced User#39;s Guide
Question No: 42 – (Topic 1)
User jack logs in to host Solaris and executes the following command sequence:
Which three statements are correct?
User jack can edit testfile because he has read and write permissions at the group level.
User jack can use cat to output the contents of testfile because he has read permission as the file owner.
User jill can change the permissions of testfile because she has write permission for the file at the group level.
User jill can edit testfile because she has read and write permission at the group level.
User jack can change permissions for testfile because he is the owner of the file.
User jack can change permissions for testfile because he has execute permission for the file.
Question No: 43 – (Topic 1)
Which three options accurately describe Oracle Solaris 11 zones?
can be NFS servers
are whole root type only
cannot have their own time zone setting
can execute z拢s and zpool commands (from a non-global zone)
are virtualized operating system environments,each with its own dedicated OS and kernel
are virtualized operating system environments,created with a single instance of the OS shared kernel
Answer: A,D,F Explanation:
A: Zones can use Oracle Solaris 11 products and features such as the following: Oracle Solaris ZFS encryption
Network virtualization and QoS CIFS and NFS
C: Non-global zones cannot modify the system clock by default,but each zone can have a separate time zone setting.
F (not E): The Oracle Solaris Zones partitioning technology is used to virtualize operating system services and provide an isolated and secure environment for running applications. A zone is a virtualized operating system environment created within a single instance of the Oracle Solaris operating system.
Question No: 44 – (Topic 1)
Select two correct statements about the authentication services available in Oracle Solaris 11.
Pluggable Authentication Modules (PAM) is used to control the operation of services
such console logins and ftp.
The Secure Shell can be configured to allow logins across a network to remote servers without transmitting passwords across the network.
Secure Remote Procedure Calls (Secure RPC) provides a mechanism to encrypt data on any IP Socket connection.
Pluggable Authentication Modules (PAM) is used to implement the Secure Shell in Oracle Solaris 11.
Simple Authentication and Security Layer (SASL) provides a mechanism to authenticate and encrypt access to local file system data.
Answer: A,E Explanation:
A: Pluggable Authentication Modules (PAM) are an integral part of the authentication mechanism for the Solaris. PAM provides system administrators with the ability and flexibility to choose any authentication service available on a system to perform end-user authentication.
By using PAM,applications can perform authentication regardless of what authentication method is defined by the system administrator for the given client.
PAM enables system administrators to deploy the appropriate authentication mechanism for each service throughout the network. System administrators can also select one or multiple authentication technologies without modifying applications or utilities. PAM insulates application developers from evolutionary improvements to authentication technologies,while at the same time allowing deployed applications to use those improvements.
PAM employs run-time pluggable modules to provide authentication for system entry services.
E: The Simple Authentication and Security Layer (SASL) is a method for adding authentication support to connection-based protocols.
Simple Authentication and Security Layer (SASL) is a framework for authentication and data security in Internet protocols. It decouples authentication mechanisms from application protocols,in theory allowing any authentication mechanism supported by SASL to be used in any application protocol that uses SASL. Authentication mechanisms can also support proxy authorization,a facility allowing one user to assume the identity of another. They can also provide a data security layer offering data integrity and data confidentiality services.
DIGEST-MD5 provides an example of mechanisms which can provide a data-security layer. Application protocols that support SASL typically also support Transport Layer Security (TLS) to complement the services offered by SASL.
Question No: 45 – (Topic 1)
You need to make sure that all of the software packages on your server are up to date. Without installing any updates,which two commands would display .my software updates that are available in the default Oracle repository?
pkg list -u
pkg verify -u ‘*’
pkg search -u
pkg info -r ‘*’
pkg install -nv
pkg update -nv ‘*’
Answer: A,D Explanation:
A: the pgk list command display a list of packages in the current image,including state and other information. By default,package variants for a different architecture or zone type are excluded.
D: pkginfo displays information about software packages that are installed on the system (with the first synopsis,with -l) or that reside on a particular device or directory (with the second synopsis,with -r).
Without options,pkginfo lists the primary category,package instance,and the names of all completely installed and partially installed packages. It displays one line for each package selected.
With -r,retrieve the data from the repositories of the image#39;s configured publishers. Note that you must specify one or more package patterns in this case.
Question No: 46 – (Topic 1)
View the exhibit.
The configuration information in the exhibit is displayed on your system immediately after installing the OS.
Choose the option that describes the selection made during the Installation of the OS to obtain this configuration.
The automatic network configuration option was chosen during the installation of the OS.
The manual network configuration option was chosen during the installation of the OS.
The network was not configured during the installation of the OS.
The DHCP network configuration option was chosen during the Installation of the OS.
Answer: A Explanation:
There are two ways to configure the network configuration: automatic or manual.
In the exhibit we see that DHCP has been used used. This indicates an automatic network configuration.
Question No: 47 – (Topic 1)
You need to know the IP address configured on interface net3,and that the interface is up. Which command confirms these?
Show address information,either for the given addrobj or all the address objects configured on the specified interface,including the address objects that are only in the persistent configuration.
State can be: disabled,down,duplicate,inaccessible,ok,tentative Example:
# ipadm show-addr
ADDROBJ TYPE STATE ADDR
lo0/v4 static ok 127.0.0.1/8 lo0/v6 static ok ::1/128
Question No: 48 – (Topic 1)
You need to install the solaris-desktop group package. Which command would you use to list the set of packages included in that software group?
Answer: A Explanation:
Use the pkg search command to search for packages whose data matches the specified pattern.
Like the pkg contents command,the pkg search command examines the contents of packages. While the pkg contents command returns the contents,the pkg search command returns the names of packages that match the query.
Question No: 49 – (Topic 1)
The following information is displayed for the svc:/network/ssh service:
Which describes the minimum set of commands to be executed to bring the svc:
/network/ssh: default service back online?
Question No: 50 – (Topic 1)
You start to execute a program by using the following command:
You then determine that the process is not behaving as expected,and decide that you need to terminate the process.
Based on the information shown below,what is the process number you should terminate?
Answer: A Explanation:
From the output exhibit we can deduce that the shell has id 15156. It has spawned three subprocesses:
grep: id 15166
ps -aef 15165
The remaining 15163 must be the subshell (see note below). This is the id of the process which should be terminated.
|Lowest Price Guarantee||Yes||No||No|
|Free VCE Simulator||Yes||No||No|