×
INTELLIGENT WORK FORUMS
FOR COMPUTER PROFESSIONALS

Contact US

Log In

Come Join Us!

Are you a
Computer / IT professional?
Join Tek-Tips Forums!
  • Talk With Other Members
  • Be Notified Of Responses
    To Your Posts
  • Keyword Search
  • One-Click Access To Your
    Favorite Forums
  • Automated Signatures
    On Your Posts
  • Best Of All, It's Free!

*Tek-Tips's functionality depends on members receiving e-mail. By joining you are opting in to receive e-mail.

Posting Guidelines

Promoting, selling, recruiting, coursework and thesis posting is forbidden.

Students Click Here

Sun Solaris Part II

Sun Solaris Part II

Sun Solaris Part II

(OP)
Hi,

I would be going for Part II certification exam in a weeks time, can anyone please help me in finding some practice test questions.

Regards,
Anita

RE: Sun Solaris Part II

if you answer at all this questions u can passed your exam whithout any problem :

Chapitre 1

10) What 2 terms are synonymous with the term "server"

    --network
    --domain    I think it's domain or network, along with host
    ***---host *
    --printer
    ***---process


60) SunRay Enterprise Appliance is an example of a thin client.


Chapitre 2

73.  What does the Network Layer in the OSI model do?

    ***---routing and delivery


74.  What do you use to get the Ethernet address from the IP address?

    ***---ARP


41. Fill in  - write the ethernet address, given the output of the ifconfig -a command.


61. A header is added to each segment recieved on the way down the model, and a header is removed from each segment on the way up the model. What is this called?

    ***---Encapsulation


62 Ethernet is a type of local area network (LAN) through cables.What is a characteristic of ethernet

    ***---Each address is "Unique"


63. (PPP) Point-to-Point Protocol transmits datagrams over serial links


64.  Transmission Control Protocol (TCP) is a connection-oriented protocol that provide??

    ***---Full duplex




65.  User Datagram Protocol (UDP) provides what?

    ***--- Half-duplex


67.  How can you display the systems hardware (Ethernet address) address.

    ***--- ifconfig -a

hme0: flags=1000843<UP, BROADCAST, RUNNING, MULTICAST, IPv4> mtu 1500 index 2
    inet 192.168.10.25 netmask ffffff00 broadcast 192.168.10.255
    "ether 8:0:20:a2:11:de"


68. What are the options for "snoop"?   pg. 2-17

    -V    Provides a summary verbose output
    -v    Provides a "detailed" verbose output
    -o    Redirects the snoop activity output to 'filename'
    -i    Displays packets that were previously captured in filneame

snoop allows you to determine what information is actually traveling between systems


69.  How do you list registered RPC programs?  pg. 2-19

    ***--- rpcinfo -p


4) what are the main functions or RPC(Remote Procedural call)?

    **--Dynamically configure ports


16) How do you stop the sprayd daemon?

    --/etc/init.d/sprayd stop  (no because there is no sprayd script in the init.d dir)
    --pkill -HUP inetd
    ** ps -ef |grep spray and kill -9 on the corresponding PID **
    ** rpcinfo -d sprayd **


24) Host A is trying to get the ethernet address of Host B.  All it has is the IP address.  What protocol will it use to find the mac address?

    ** ARP **


23) What does RPC do?

    ** Dynamically sets up port numbers for services **


9) What layer in the OSI (or TCP) model ensures messages arrive to correct "place"?

    ** TRANSPORT


75.  What does the pkill -HUP inetd command do?

    **--- starts and resets the RPC


Chapitre 3

11) take this line in syslog.conf :
  mail.debug    ifdef('LOGHOST', /var/log/authlog, @loghost)
What do you know about the setup of this machine if mail.debug is sent to  /var/log/authlog?

    *** The answer here is that in the /etc/hosts file, the local host is aliased as "loghost", therefore the M4 processer evaluates LOGHOST as True, and sends it to /var/log/authlog


12) what level/severity is a login failure(assuming we know the facility)?

    -- .err
    -- .crit
    ** -- .notice
    -- .warning
    -- .debug


45. If you want to change the login facility from the defaults in /etc/syslog.conf, what would you change?

    ***--notice


53. Know the action field of the /etc/syslog.conf file.   Read 3-6 thru  3-8 !!!

     (two tab separated fields... selector.action)
     (selector field consists of "facility.level")
     (action field consists of where)
     (systax                   *.err         /var/adm/messages)
     (you can modify the inetd to log TCP connections using the syslogd)


53a.    How do you change the authorization system including "login, su,?

    ***--- auth


53b.    What 'Level' do you change to log all attempted logins?

    ***---notice


53c.  Know that you must prefix the host name or IP address with the @ sign when using syslog.

    ex.  mail.debug ifdef('LOGHOST', /sys/log/authlog,  @loghosts)
this means that the local machine of the hosts is 'loghosts' and messages will be routed to  /sys/log/authlog


54. What does the m4 macro processer do? Pick two.    pg. 3-11

    **--processes 'ifdef' statements in the /etc/syslog.conf
    **--routes messages to the appropriate places
(know that if m4 does not recognize any m4 commands on a line, it passes the output back to syslogd as a two-column output that syslogd then uses to route messages to appropriate destinations)


70.  What can the syslog function do?  pg. 3-2

    ***---Write messages to a system log
    ***---Write messages to the system console
    ***---Forward messages to a list of users
    ***---Forward messages to the syslogd on other hosts over the network
***---sort messages by their souce of their importance and route them to specif.  destin.


76.  Be able to pick three selector levels from a list that has levels and facilities in the syslog. pg. 3-7

    ***--- emerg
    ***---crit
    ***--- err
    ***--- notice
    ***---alert
    ***---warning
    ***---debug



71.  How do you enable TCP tracing in inetd?   pg. 3-16

    ***---add the ' -t'   (ex.  /usr/sbin/inted  -s  -t  &)


72.  How can you change the priority of the message to user.err will route the message to the /var/adm/messages and write that the system rebooted ?    pg. 3-18/19

    ***---   # logger -p user.err System Rebooted


Chapitre 4

75.  Type in the command that checks a file system.

    ***--- fsck


77.Select three examples of block device paths.  Mine were 2 virtual and one regular mixed with 3 raw device paths

BLOCK DEVICE PATHS  pg.  4-5
    /dev/md/dsk
    /dev/vx/dsk
    /dev/dsk/
    dev/rdsk           RAW DEVICE PATHS   look for the RDSK for the wrong answer


55. What can contiguous sector groups be configured into in the Sun StorEdge Volume Manager?

    ***--subdisk


78.  Solstice Disksuite uses what?

    ***---standard partitioned disk slices that have been created using the 'FORMAT' utility (  ex. /dev/md/dsk/d42  )


79.  Sun StoreEdge Volume Manager manages disk space by?    pg. 4-7

    **-- contiguous sectors
    **-- Contiguous sector groups can be configured into SUBDISKS


80.    What are features of concantenated volumes?

    pg. 4--14  the highlighted area

82.  What must you first create when using Solstice DiskSuite before you can manage disks?

    **-- metastate database


83.  Your /export/data file system is filling up and you cannot afford to move the entire file system, what can you do when using Solstice DiskSuite?

    **--you can concatenate available space from other diskpartitions to increase the size


84.  When growing  a file system, is the original data in preserved?

    ***--- YES


Chapitre 5

18) in the /proc directory what is the naming convention of all the sub-directories?

    ** they are named with a number representing the process ID **


19) What must you do before checking the integrity of a cachefs filesystem?

    ** umount the cachedir **


20) what is the command to force a consistency check for a cachefs filesystem?

    **cfsadmin -s **


21) How you do enable cachefs logging?

    **cachefslog -f /LOGDIR/logfile /cahedir **


22) how do you add a swap file?

    ** swap -a **

58. How do you display cache statistics?

     cfsadmin -l




85.  What are characteristics of the /proc directory?   pg.  5-3

***--- The name of each entry in the /proc directory is a decimal number corresponding to a process ID
***-- Each process ID named directory in /proc has files that contain more detailed information about that process
***-- The owner of each file in /proc directory and below is determined by the user ID of the process


86.  The fdfs file system is a pseudo file system that maintains a repository of file descriptors for open files.


87.  What is /dev/fd/2?   see table on 5-5

    **-- Standard Error (stderr)
    /dev/fd/0  Standard input
    /dev/fd/1 Standard output
    /dev/fd/3    Name of file


88.  /var/run?

    **-- only root can run process files in /var/run


89.  What is Criteria for Swap Space?

    **-- To save any possible panic dumps resulting from a fatal system failure, there must be sufficient swap space to hold the necessary memory pages in RAM at the time of failure
    **-- The amount of RAM + swap memory must be at least equal to the requirements of both the Solaris Operating Environment and any currently running processes.


90.  How do you permanently add swap files?

    **--edit the /etc/vfstab

Device to    device to        mount    FS    Fsck        Mount        Mount
Mount        fsck        point     Type    Pass        at boot        options

/dev/dsk/c0t0d0s1    -           -       swap        -         no             -    

then reboot system or run /sbin/swap -a



Chapitre 6

56. What does a NFS server do?


57. What does a NFS client do?


66.  Network File System (NFS) does what?

***--- A client-server application that enables you to view and, optionally, store and update files on a remote system as though they were on your own system.


83b) What should be added to the /etc/vfstab to automatically mount the cache file system on the mount point /test  during bootup and set it up for read only and no interrupt option?

    **--  server1:/var/     -       nfs     -       yes nointr, hard


91.  What are benifits of NFS?

**Files are located in centralized locations.  You can make a copy of a file accessible to many users or systems simultaneously.  This is an especially useful feature with 'home' directories or common data files.Systems can share one or more software packages that are located in a central location.
**This reduces the disk space requirements for individual systems
**Remote file sharing is transparent to user and to any applications, because these resources appear as if they were resident on local systems
**NFS provides file sharing in a heterogeeneous (many different O/S's..,unix, windows, solaris) environment, potentially containing many different operating systems.


92.  Know .

NFS server: A system that contains the file resources to be shared with other systems on the network

NFS Client: A system that 'mounts' the file resources shared over the network and presents the file resources as if they were local.


93.  Know pg. 6-2


94.  Know entry for share command

ex.  #share -F nfs -o ro /usr/share/man


95.  Know that    'root=client'

Informs clients that root user on the specified client system or systems can perform superuser privileged request on the shared resource.

ex. # share -F nfs -o root=client2 'directory'


96.***dfshares  displays shared resources for local server   pg. 6-14/15


97.***dfmounts  displays shared resource and clients mounting the resource for the local server.


98. How do you stop and start NFS daemons?

#/etc/init.d/nfs.server stop
#/etc/init.d/nfs.server start


14) When doing a remote mount over the network, what options(choose 2) would allow the client trying to mount to reboot if the mount is hanging?

    --nointr
    --**intr **
    --soft
    --**hard **
    --bg
    --fg


15) Where (if anywhere) can you set the time limit for a shared resource/dirrectory before it is unshared?

    **---on the dfs server with the -o option for remote mount (verify)**
    ---in the kernel
    ---you can't
    ---on the dfs client with the -o option for remote mount


99. How do you start NFS log daemon?

***# /usr/lib/nfs/nfslogd






Chapitre 7

38. What do you do when the auto_master map is updated?

    ***---run automount


39. What's the purpose of automount?


40. What are valid direct map entries?

    ***--/AbsoluteMtPoint   -ro     server:/mountedDevice


50. What is the file on the client system that doesn't need to be updated after using automount?

    ***---/etc/vfstab


100. Know table on    pg 7-13


101. Know that the automountd daemon will unmount the file system after a period of inactivity of 10 min on the server.


1) After you modify the "Auto_Home" map, what(if anything) do you need
to do?
    --restart automountd
    --run automount command
    ** --you don't need to do anything


Chapitre 8

19) What must you do before checking the integrity of a cachefs filesystem?

    ** umount the cachedir **


20) what is the command to force a consistency check for a cachefs filesystem?

    **cfsadmin -s **


21) How you do enable cachefs logging?

    **cachefslog -f /LOGDIR/logfile /cahedir **

58. How do you display cache statistics?

    - cfsadmin -l


102.  How do you create a CacheFS file system?

    **-- cfsadmin -c /cache/cache0


103.  know correct entry to mount remote CacheFS file system.

 #mount -F cachefs -o  backfstype=nfs,cachedir=/cache/cache0,   cacheid=data_cache hosts1:/export/data   /data


Chapitre 9


2) You are an SA using NIS+, you want to change to a naming service that is  similar in   scalability but for a more heterogeneous environment  What should you use?

    -DNS
    ** -LDAP
    -NIS
    -FTP(all I know is , don't choose this one...)


3) In the /etc directory, what file is used as the  nsswitch.conf when you are implementing nis+? (FILL-IN)

    --nsswitch.nis+
    ** --nsswitch.nisplus


17) take a loot at this line in nsswitch.conf:      hosts       files nis dns nis+
What is the sequence/when does it stop?

    --it reads from left to right reading the local files first, then stops when it is
    found or one of the nameservices  isn't available
    --same as above, except it adds "or when the nameservice list is exhausted"


46. What is a name service?


47. If you're managing a network, and you're afraid of user's logins and passwords being stolen, what 2 naming services would you use?

    ***--NIS+
    ***--LDAP
76.  Type in the file that is used for DNS name service directory

    ***--- nsswitch.dns
    *.nisplus
    *.nis   *.ldap


109.  DNS can:

    *Resolve host name and IP address requests on the intranet
    Sun.
    corp.
    Solaris.

    solaris.corp.sun.com


111.     DNS  (uses zone files)
and
     NIS+  LDAP  are  hierarchical


Chapitre 10

13) When you build the NIS maps FOR THE FIRST TIME, and the make utility fails to push the maps to the slaves, what can you do to get the maps to the slaves?

    --ypinit -s MASTER_NAME for all slave servers
    ** --ypxfr
    --yppush
    --ypinit –c


33. What are 3 tasks done on NIS master to support the client?

    *** --- -etc/bootparams,  /etc/hosts, /etc/ethers


44. Fill in - nsswitch.nis. What template in   /etc  is used for nis name service?

    ***--nsswitch.nis.   JUST TYPE IN ...(NOT /etc/.....)


48. Understand this - hosts: nis [NOTFOUND=return] files.
    Know that if you remove the [NOTFOUND=return] entry, you can search the NIS hosts table and the local hosts file. But, what if nis in unavailable?




49. What daemon answers ypbind request from clients?

    ***--ypserv


51. Know that you have to edit the /etc/hosts file on the NIS slave server.


113.  **All hosts in NIS environment are clients, including the NIS Master and all slaves**


114.  Daemons on NIS machines:

    Server processes: ypserv YPBIND rpc.ypupdated rpc.yppasswdd
    Slave Processes: ypserv YPBIND
    Client Processes: YPBIND


115.If you choose to locate teh source files for security reasons. in another directory.
 modify the :

    " /var/yp/Makefile  " by changing the
    DIR=/etc.    to    DIR=/yourchoice
    PWDIR=/etc.    to    PWDIR=/yourchoice


116. Create a NIS Server:

    **copy /etc/nsswitch.nis    to    /etc/nsswitch.conf
    **Choose NIS Domainname     by executing   #domainname
or modifying the /etc/defaultdomain
    **touch  /etc:   bootparams    ethers    locale   timezone netgroup netmasks
(" BELT,NN ")
    **ypinit -m   (for master)
    **Do you want this procedure to quit on non-fatal errors? [y/n: n] :"N"
    ** /usr/lib/netsvc/yp/ypstart
    **cd /var/yp     /usr/ccs/bin/make


117.   Create NIS Slave:

    ***copy /etc/nsswitch.nis    to /etc/nsswitch.conf
    ***Choose NIS Domainname     by executing   #domainname
ex.  domainname   classroom.Central.Sun.COM    (must exactly match server)
    ***ypinit -c     (make slave client of master )
    ***/usr/lib/netsvc/yp/ypstart
    ***ypinit -s   (make slave)
    ***/usr/lib/netsvc/yp/ypstart


118.  How to update password map on server:

    **# /usr/lib/netsvc/yp/rpc.yppasswdd  /etc/passed  -m  passwd


119.Know that :

    ** The "first time " you build a new map, the slave servers do not know of its existence and so the push process attempts fail.
    **Send an interrupt (Control-C) to build process when the push process hangs,
    **execute the "ypxfr" command on hte map from the slave servers to complete the build process.


112.  NIS Master Server

**Contain original /etc  ASCII files used to build NIS maps   (Slave servers do NOT)
**Provide single point of control for entire NIS domain
**Contain NIS maps generated from ASCII files
**Easy to setup


108. Name Services provide

    *Ease of management
    *Immediate reflection of changes to all clients
    *Assurance that clients do not miss updates
    *Secondary servers prevent a single point of failure
·    Centralizes the shared information in your network  about: hostnames,
 IP address, usernames, passwords, and automount maps
    NOT good for sales transactions with many frequent updates


Chapitre11

110.  LDAP is good for:

    *online phone directory
    *most email address Books
    *Automatically locating network resources
    *Tighten security


Chapitre 12

5) You've added a user to an existing role.  The user can no longer user regular, non-priveleged commands.  What happened?

    **--Did not assign user to Profiles


6) You've added a user to a role.  What does that user need to know before they can assume the role?

    ---need to su to the role
    ---can NOT telnet, rlogin
    ---need role password


30. What is the default shell assigned to a role?

    ***---pfshell     ex. pfsh, pfksh, pfcsh


59. Know roleadd, rolemod, useradd, usermod syntax.


104.    Roleadd -P (Profile)  -A (adds a Authorization)

    cdm
        Rolemod -P (Profile)  -A (adds a Authorization)
    els
        Useradd -R
    (Role)
        cdms

ex.  roleadd -m -d /export/home/tarback -c "Privilaged tar Backup Role"
 -P "Backup and Restore" tarback

Useradd -R (Role)

ex. useradd -m -d /export/home/usera -c "User Account usera" –s /usr/bin/ksh -R datauser usera


105. RBAC

/etc/user_atter user:qualifier:reserved:reserved:attribute
USER:::type=normal;auths=solaris.system.date;roles=sysadmin;

/etc/security/auth_attr
solaris.device.GRANT:::Delegate Device::help=DevAllocate.html

/etc/security/prof_attr
PRINTER MANAGEMENT:::Manage print jobs:help=Printer.html

/etc/security/exec_attr
Printer Management:suser:::/usr/lib/lp/lpmove:EUID=0
                                           EGID=14



Chapitre 13

42. Adminsuite - what can it do? Look on page 10-65 for answers.


43. What are the benefits of SMC?


106.  Benifits of using Solaris Management Console (SMC)

    *The network features of the SMC reduce the number of remote logins
required to do administration, including reboots, backups...
    *Brings all tools together in one location
    *Can manage all SMC servers from one location
    * Once a new application is added to a SMC server, anyone can run application.
    *SMC gives user a "graphical representation" of the the administration components available and the level of user privilage required to  run them.


107.  Solaris  "AdminSuite" can  do ALL below...

    ***Mount File system with LARGE files**
    ***Force Direct input/output (no caching)
    ***Ignore access time updates on Files**
    ***Log UFS transactions
    ***Honor Set UID mode*
    ***Honor Diskspace quotas**
    ***Allow waiting processes to be halted
    ***Force system shut-down, lock File system, Unmount File system


Chapitre 14

7) EXHIBIT question:  Know :

the class file , rules file from jumpstart


25) Why can't a jumpstart client use a boot server on a different subnet?

    ** the RARP request will fail **


26. What type of Jumpstart server must be available on every subnet that has a client?
(2 questions like this.  )

    **---boot server


27. During the Jumpstart boot process, /etc/inet/hosts is consulted to obtain what client information?

    ***---IP address


28. Know rules. This question is shown in an exhibit.


29. What is the option for add_install_client that specifies the sysidcfg file?

    **--- -p  server:/export/config


31. What are 2 client identification parameters that cannot be configured using name service, but with sysidcfg?

    ****----locale,
    ****--- timezone


32. What 4 files must be configured on the boot server?

    *** ethers
    *** hosts
    *** bootparamsd


34. What are 4 network daemons used in the client Jumpstart
installation?

    ***-- -in.rarpd,
    ***--  rpc.bootparamd,
    ***-- in.tftpd,
    ***-- mountd


36. What script do you use to add CD 2 of 2 in the Jumpstart process?

    ***-  add_to_install_server


37. What script do you use to add Webstart in the Jumpstart process?

    ***---modify_install_server





120.  Three Main components of Jumpstart:

    1. Boot Server:   must reside on same subnet as client!
    2. Installation Server:  provides "image" of Solaris O/S
    3. Configuration Server:  provides information for client to partition disk, create File systems, add or remove Solaris packages.


121.  To specify the server and absolute path of the directory that holds the sysidcfg file:

    -p   option
    ex.    -p  servername:/export/config    client1  sun4u


122. What are five daemons that run during Jumpstart Process:

    /usr/sbin/in.rarpd
    tftp
    /etc/bootparamsd
    mountd
    nfsd


123.  For boot operations to proceed. the following files and directories must be properly configured on boot server:

    /etc/ethers        for ethernet to   /etc/hosts lookups
    /etc/hosts        for ip and hosts lookup from ether address
    /etc/bootparams        for files used to boot clients
    /etc/dfs/dfstab        for shares if software on the server to share out
    /tftpboot            for inetboot to run  add_install_client script


125.    Setting up software on Jumpstart Install Server:

#  ./setup_install_server  /export/install..  to install Disk 1  ( executable )  (where to install)

#  ./add_to_install_server   /export/install   to install Disk 2    ( executable )   (where to install)

#  ./modify_install_server      enables interactive WebStart....


126.  Know that exhibit of "Rules"   File has the word "class" in it. (pg. 13.34)


127 Know that exhibit of "Class"  file has SUNWman ... and other packages to install.


128. Know that exhibit of "Sysidconfg"  file has.

    system_locale=en_US
    timezone=US/Mountain
    timeserver=localhosts


129.    How to perform Dry run installation to test installation?

    #  /usr/sbin/install.d/pfinstall  -D  | -d disk_file (test against file -c path (path for Solaris OS)


130..  Know that to Jumpstart a client successfully....

1.    Turn on Client
2.     ok    boot net   -  install



RE: Sun Solaris Part II

(OP)
Thanks Zoufri75, you are more than helpful.

Regards,
Anita

RE: Sun Solaris Part II

Hi Zou

Are you cheating SUN tests or Anita.If not ..I truly appreciate your great cooperation

sushveer
IBM certified specialist-p-series AIX5L System Administration
AIX/SOLARIS/WEBSPHERE-MQ/TIVOLI Administrator

RE: Sun Solaris Part II

hi guys,
i have few doubts in computer network programming. Anyone can help me.

Red Flag This Post

Please let us know here why this post is inappropriate. Reasons such as off-topic, duplicates, flames, illegal, vulgar, or students posting their homework.

Red Flag Submitted

Thank you for helping keep Tek-Tips Forums free from inappropriate posts.
The Tek-Tips staff will check this out and take appropriate action.

Reply To This Thread

Posting in the Tek-Tips forums is a member-only feature.

Click Here to join Tek-Tips and talk with other members! Already a Member? Login