Oracle Solaris 11 System Administration
Question No: 81 – (Topic 1)
You have installed the SMF notification framework to monitor services. Which command is used to set up the notifications for a particular service?
Answer: A Explanation:
How to Set Up Email Notification of SMF Transition Events
This procedure causes the system to generate an email notification each time one of the services or a selected service has a change in state. You can choose to use either SMTP or SNMP. Normally,you would only select SNMP if you already have SNMP configured for some other reason.
By default,SNMP traps are sent on maintenance transitions. If you use SNMP for monitoring,you can configure additional traps for other state transitions.
Become an administrator or assume a role that includes the Service Management rights profile.#39;
Set notification parameters. Example 1:
The following command creates a notification that sends email when transactions go into the maintenance state.
The following command creates a notification that sends email when the switch service goes into the online state.
Note: The svccfg command manipulates data in the service configuration repository. svccfg can be invoked interactively,with an individual subcommand,or by specifying a command file that contains a series of subcommands.
Changes made to an existing service in the repository typically do not take effect for that service until the next time the service instance is refreshed.
Question No: 82 – (Topic 1)
You want to display network interface information. Which command should you use?
Question No: 83 – (Topic 1)
The default publisher on your system is:
You want to update the Oracle Solaris 11 environment on your system,but you are not able to connect this system to the Internet to access the default Oracle repository. A repository has been created on your local network and is named http://server1.example.com.
Which command would you choose to connect your system to the local repository?
pkg publisher to specify the new publisher
pkg add-publisher to add the new publisher
pkg set-publisher to set the origin for the publisher
Answer: D Explanation:
Solaris 11 Express makes it pretty easy to set up a local copy of the repository.
A common reason folks need access to a local repository is because their system is not connected to the Internet.
Tthe pkg set-publisher command can be used to for example add a publisher or to enable or disable a publisher.
Note: Example Adding a Publisher
Use the -g option to specify the publisher origin URI.
# pkg set-publisher -g http://pkg.example.com/release example.com Example Specifying the Preferred Publisher
Use the -P option to specify a publisher as the preferred publisher. The specified publisher moves to the top of the search order. You can specify the -P option when you add a publisher or you can modify an existing publisher.
# pkg set-publisher -P example.com Example Enabling or Disabling a Publisher
Use the -d option to disable a publisher. The preferred publisher cannot be disabled. A disabled publisher is not used in package operations such as list and install. Youcan modify the properties of adisabled publishers.
Use the -e option to enable a publisher.
# pkg set-publisher -d example2.com
Question No: 84 – (Topic 1)
To help with your troubleshooting,you need to determine the version of the OBP. Which two commands will provide you with this information?
Answer: B,C Explanation: B: banner
Displays power-on banner.
The PROM displays the system banner. The following example shows a SPARCstation 2 banner. The banner for your SPARC system may be different.
SPARCstation 2,Type 4 Keyboard
ROM Rev. 2.0,16MB memory installed,Serial # 289 Ethernet address 8:0:20:d:e2:7b,Host ID: 55000121 C: .version
Displays version and date of the boot PROM.
Note: OBP-OpenBootProm is a firmware which is placed on the sun machine#39;s prom chip.
It is a os independent user interface to deal with the sun machine#39;s hardware components. The user interface provides one or more commands to display system information.
Question No: 85 – (Topic 1)
user1 has a disk quota of 0.5 MB. The user attempts to run the following command on a file called .bigfile that is 495 KB in size:
cp bigfile /tmp
Will the command execute successfully?
Yes. Quotas do not include any of the system files such as /tmp /swap.
Yes. The quota is set at the directory level,not the user level.
No. The command will fail because it will cause him to exceed his user quota.
No. A user cannot place files into the /tmp directory.
Answer: A Explanation:
UFS quotas enable system administrators to control the size of file systems. Quotas limit the amount of disk space and the number of inodes,which roughly corresponds to the number of files,that individual users can acquire. For this reason,quotas are especially useful on the file systems where user home directories reside. As a rule,the public and /tmp file systems usually do not benefit significantly by establishing quotas.
Note: The cp command copies files and directories.
Question No: 86 – (Topic 1)
The su command by default makes an entry into the log file for every su command attempt. The following is a single line from the file:
SU 12/18 23:20 pts/1 user1-root What does the sign represent?
The attempt was from a pseudo terminal,and not the console.
The attempt was from a user that is in the adm group,same as root.
Time zone is not set.
Answer: B Explanation:
The sulog file,/var/adm/sulog,is a log containing all attempts (whether successful or not) of the su command. An entry is added to the sulog file every time the su command is executed. The fields in sulog are: date,time,successful ( ) or unsuccessful (-),port,user executing the su command,and user being switched to. In the preceding example,all su attempts were successful,except for the attempt on 2/23 at 20:51,when user pete
unsuccessfully attempted to su to user root.
Look for entries where an unauthorized user has used the command inappropriately. The following entry shows a successful (indicated by ) su from user userid to root.
SU 03/31 12:52 pts/0 lt;useridgt;-root
Question No: 87 – (Topic 1)
Oracle Solaris 11 limits access to the system with usernames and passwords
The usernames are held in ,and the passwords are held in . Select the correct pair.
Answer: B Explanation:
The /etc/passwd file contains basic user attributes. This is an ASCII file that contains an entry for each user. Each entry defines the basic attributes applied to a user.
/etc/shadow file stores actual password in encrypted format for user#39;s account with additional properties related to user password i.e. it stores secure user account information. All fields are separated by a colon (:) symbol. It contains one entry per line for each user listed in /etc/passwd file.
Question No: 88 – (Topic 1)
Identify three differences between the shutdown and init commands. Identify two differences between the shutdown and init commands.
Only shutdown broadcasts a final shutdown warning to all logged-in users.
init does not terminate all services normally. The shutdown command performs a cleaner shutdown of all services.
The shutdown command can only bring the system to the single-user milestone. The init command must be used to shut the system down to run level 0.
Only shutdown sends a shutdown message to any systems that are mounting resources from the system that is being shut down.
The shutdown command will shut the system down and turn off power; init will only shut the system down.
Question No: 89 – (Topic 1)
Which files must be edited in order to set up logging of all failed login attempts?
Answer: B Explanation:
This procedure captures in a syslog file all failed login attempts.
Set up the /etc/default/login file with the desired values for SYSLOG and SYSLOG_FAILED_LOGINS
Edit the /etc/default/login file to change the entry. Make sure that SYSLOG=YES is uncommented.
Create a file with the correct permissions to hold the logging information. Create the authlog file in the /var/adm directory.
Edit the syslog.conf file to log failed password attempts. Send the failures to the authlog file.
Question No: 90 – (Topic 1)
Which two options accurately describe the network characteristics of a zone?
DHCP address assignment cannot be configured in a shared IP zone.
Shared IP is the default type of network configuration.
Exclusive IP is the default type of network configuration.
By default,all IP addresses,netmasks,and routes are set by the global zone and cannot be altered in a non global zone.
IPMP cannot be managed within the non-global zone.
Commands such as snoop and dladm cannot be used on datalinks that are in use by a running zone.
Answer: A,B Explanation:
A: Non-global zones can not utilize DHCP (neither client nor server).
B (not C): By default,non-global zones will be configured with a shared IP functionality. What this means is that IP layer configuration and state is shared between the zone you’re creating and the global zone. This usually implies both zones being on the same IP subnet for each given NIC.
Note: A zone is a virtual operating system abstraction that provides a protected environment in which applications run. The applications are protected from each other to provide software fault isolation. To ease the labor of managing multiple applications and their environments,they co-exist within one operating system instance,and are usually managed as one entity.
The original operating environment,before any zones are created,is also called the quot;global zonequot; to distinguish it from non-global zones,The global zone is the operating system instance.
E: Exclusive-IP zones can use IPMP. IPMP is configured the same way in an exclusive-IP zone as it is on a system not using zones.
For shared-IP zones,IPMP can be configured in the global zone. F: Full IP-level functionality is available in an exclusive-IP zone. An exclusive-IP zone has its own IP-related state.
An exclusive-IP zone is assigned its own set of data-links using the zonecfg command. The zone is given a data-link name such as xge0,e1000g1,or bge32001,using the physical
property of the net resource. The address property of the net resource is not set. Note that the assigned data-link enables the snoop command to be used.
The dladm command can be used with the show-linkprop subcommand to show the assignment of data-links to running exclusive-IP zones.
|Lowest Price Guarantee||Yes||No||No|
|Free VCE Simulator||Yes||No||No|