How to Contact the Author

How to Contact the Author

You can reach Quentin Docter by e-mailing him at <qdocter@yahoo.com>.


Assessment Test and Answers

1. 

What is the core of the Solaris operating system is called?

  1. Shell

  2. Kernel

  3. Core

  4. Daemon

b. the core of solaris is called the kernel. the shell is the user interface, where users enter commands. a daemon is a background process running in solaris. see chapter 1 for more information.

2. 

Which of the following file systems does Solaris 9 support? (Choose all that apply.)

  1. UFS

  2. UDF

  3. PCFS

  4. NFS

  5. HFS

a, b, c, d. solaris 9 supports the unix file system (ufs), universal disk format (udf), personal computer file system (pcfs), and network file system (nfs), as well as many others. hfs is not a valid file system. see chapter 1 for more information.

3. 

If you want to get help on a specific Solaris command, what command do you use?

  1. man

  2. help

  3. !

  4. ?

a. the man command, used as man name , will give you the manual page for that command. see chapter 1 for more information.

4. 

You are adding a patch to your Solaris server. Which of the following commands do you execute if you want to save disk space and not create a backout directory when you install the patch?

  1. patchadd -d

  2. patchadd -r

  3. patchadd -n

  4. patchadd -nobackout

a. the patchadd -d command will not create a backout directory. this saves hard disk space, but prevents you from uninstalling the patch in the future. none of the other switches are valid. see chapter 2 for more information.

5. 

On which hardware platforms can you install Solaris 9? (Choose all that apply.)

  1. sun4d

  2. sun4m

  3. sun4u

  4. i86pc

b, c, d. solaris 9 can be installed on the sun4m, sun4u, and i86pc platforms. although sun4d is a valid sun hardware platform, it is not supported by solaris 9. see chapter 2 for more information.

6. 

You have just upgraded your Solaris 8 server to Solaris 9. Which file contains a list of local modifications that the upgrade could not preserve?

  1. /a/var/sadm/data/upgrade

  2. /a/var/sadm/system/data/upgrade_cleanup

  3. /var/sadm/install/contents

  4. /var/sadm/install/upgrade_cleanup

b. to see whether any local modifications were not kept during the upgrade process, check the a/var/sadm/system/data/upgrade_cleanup file. the /var/sadm/install/contents file is the installed software database. the other two files are fictional. see chapter 2 for more information.

7. 

In the Boot PROM, which command is used to create permanent device aliases?

  1. devalias

  2. nvalias

  3. tdalias

  4. alias

b. the devalias and nvalias commands are used to create device aliases. only the nvalias command is used to create permanent aliases in nvramrc. see chapter 3 for more information.

8. 

From the Forth Monitor prompt, which of the following commands displays the computer's Ethernet address?

  1. banner

  2. addr

  3. enetaddr

  4. ethernet

a. the banner and the .enet-addr commands display the computer's ethernet address. only banner is correct among the answer options. see chapter 3 for more information.

9. 

In the OpenBoot PROM, which of the following commands enables you to run a diagnostic test on the floppy disk drive?

  1. test,floppy

  2. test /floppy

  3. test-floppy

  4. test floppy

d. the test floppy command will run a diagnostic test on the floppy disk drive. all of the other commands use the wrong syntax. see chapter 3 for more information.

10. 

Which of the built-in user accounts has the User ID of 1?

  1. root

  2. bin

  3. daemon

  4. lp

c. the daemon account has the uid of 1. the root account is uid 0, bin is uid 2, and lp is uid 71. see chapter 4 for more information.

11. 

Which of the following commands creates a user named abradley with a primary group of mdte and a UID of 1068?

  1. useradd -G mdte -U 1068

  2. useradd -G mdte -u 1068

  3. useradd -g mdte -U 1068

  4. useradd -g mdte -u 1068

d. the correct syntax to create the user with the specified options is useradd -g mdte -u 1068 . an uppercase -g switch is used for secondary groups, and the -u switch is not valid with the useradd command. see chapter 4 for more information.

12. 

Which of the following files contains a user account's encrypted password?

  1. /etc/passwd

  2. /etc/shadow

  3. /etc/encrypt

  4. /etc/users

b. the user's encrypted password is located in the /etc/shadow file. the /etc/passwd file contains usernames and a placeholder for the password. see chapter 4 for more information.

13. 

Consider the following directory output:

lrw-r--r--    1 root     other      4105 Aug  1 12:21 abc123
 

What type of file is abc123?

  1. A locked file

  2. A regular file

  3. A symbolic link

  4. A hard link

c. symbolic links are preceded with an l as the first character, before the permissions. locked files, `regular` files, and hard links do not have a designation. their permission block would look like -rw-r--r-- . see chapter 5 for more information.

14. 

What is the result of the following command?

# chmod 640 file1
 

  1. On file1, the user will have Read access, the group will have Read and Write access, and other will have Limited access.

  2. On file1, the user will have Read, Write, and Execute access; the group will have Read and Write access; and other will have no access.

  3. On file1, the user will have Read, Write, and Execute access; the group will have Read-only access; and other will have no access.

  4. On file1, the user will have Read and Write access, the group will have Read-only access, and other will have no access.

d. the chmod command changes permissions. the permissions on file1 are being changed by using absolute mode. the first number is for the user (6 means read and write), the second number is for group (4 is read-only), and the third number is for other (0 is no access). see chapter 5 for more information.

15. 

You have just installed Solaris 9 by using all default options. What is the default umask on this computer?

  1. 000

  2. 022

  3. 755

  4. 644

  5. Unable to determine

b. the default umask in solaris is 022. see chapter 5 for more information.

16. 

Which of the following commands displays system configuration information, including the hardware platform, memory, and device configuration?

  1. sysdef

  2. prtconf

  3. dmesg

  4. config

b. the prtconf command displays all of the listed configurations. see chapter 6 for more information.

17. 

Which hard disk slice is typically reserved for the /home or /export/home file systems?

  1. 0

  2. 1

  3. 4

  4. 7

d. slice 7 is usually reserved for /home or /export/home . slice 0 is for the root file system ( / ), 1 is typically swap space, and 4 is usually free for whatever the user wants to use it as. see chapter 6 for more information.

18. 

You are presented with the following menu:

MENU:
       disk       - select a disk
       type       - select (define) a disk type
       partition  - select (define) a partition table
       current    - describe the current disk
       format     - format and analyze the disk
       repair     - repair a defective sector
       show       - translate a disk address
       label      - write label to the disk
       analyze    - surface analysis
       defect     - defect list management
       backup     - search for backup labels
       verify     - read and display labels
       save       - save new disk/partition definitions
       volname    - set 8-character volume name
       !<cmd>     - execute <cmd>, then return
 

Which command did you type to display this menu?

  1. fdisk

  2. partition

  3. format

  4. analyze

c. the displayed menu is the format menu, from which you can manage hard disks. see chapter 6 for more information.

19. 

Which of the following is the correct function of an inode?

  1. It contains enough information to begin the system's boot process.

  2. It contains file system information, including the size of the file system and the disk label.

  3. It contains information about a file except for the file's filename.

  4. It contains a listing of all directories in the file system.

c. inodes are responsible for containing all the information about a file except for the file's filename. the boot process information is stored in the boot block, and the superblock contains file system information. see chapter 7 for more information.

20. 

Which of the following are not pseudo file systems? (Choose all that apply.)

  1. PROCFS

  2. NFS

  3. TMPFS

  4. LOFS

  5. HSFS

b, e. the process file system (procfs), temporary file system (tmpfs), and loopback file system (lofs) are all pseudo, or virtual, file systems. the network file system (nfs) is a network-based file system, and the high sierra file system (hsfs) is a disk-based file system. see chapter 7 for more information.

21. 

During system maintenance, you have unmounted all file systems. You want to remount the file systems listed in the local /etc/vfstab file. Which command should you execute to accomplish this?

  1. mount

  2. mountall

  3. umount

  4. umountall

b. the mountall command mounts all file systems listed in the /etc/vfstab file. the mount command mounts one specific file system. the umount command unmounts a file system, whereas umountall unmounts all file systems listed in /etc/vfstab . see chapter 7 for more information.

22. 

Which of the following directories is the default print spooling directory?

  1. /var/spool/lp

  2. /var/spool/print

  3. /etc/lp/spool

  4. /var/lp/spool

a. the /var/spool/lp directory is the default directory for print spooling jobs. the /var/spool/print directory is the client-side print job staging area. the /etc/lp/spool and /var/lp/spool directories do not exist by default. see chapter 8 for more information.

23. 

Which of the following Solaris print commands prevents the printer from receiving print requests from print clients?

  1. stop

  2. cancel

  3. disable

  4. reject

d. the reject command is used to keep print queues from accepting new print jobs. the disable command keeps the printer from printing, but new jobs can still enter the queue. the cancel command will cancel a specific print job. see chapter 8 for more information.

24. 

You want to stop a misbehaving process named proc1, but your attempt to stop the process has failed. Therefore, you want to stop the process unconditionally. Which of the following commands should you use?

  1. kill -9 proc1

  2. kill proc1

  3. pkill -9 proc1

  4. pkill proc1

c. the pkill -9 proc1 command will send a kill signal to the process proc1 . you cannot use the process name, only the process id number, with the kill command. not specifying a signal number sends a sigterm signal (signal 15), which is not an unconditional kill. see chapter 8 for more information.

25. 

Which file maintains a list of the dates, times, and levels of system backups made with ufsdump?

  1. /etc/dump.log

  2. /etc/ufsdump.log

  3. /etc/dump

  4. /etc/dumpdates

d. the /etc/dumpdates file tracks backups made with ufsdump . the log includes backup dates, times, and levels. see chapter 9 for more information.

26. 

You make a level 0 backup on Sunday, a level 5 backup on Tuesday, and a level 6 backup on Thursday. If you make a level 5 backup on Friday, from how far back will the files be backed up?

  1. Files that have changed since Sunday.

  2. Files that have changed since Tuesday.

  3. Files that have changed since Thursday.

  4. More information is needed.

a. a level 5 backup is an incremental backup. incremental backups back up files that have changed since the last lower-level backup. in this case, that was on sunday. see chapter 9 for more information.

27. 

You perform a level 0 backup on a Wednesday evening. What files are backed up?

  1. All files that have been modified that day.

  2. All files on the root file system (/) that have been modified that day.

  3. All files on the root file system (/) only.

  4. All files on the computer.

d. a level 0 backup is a full backup, which backs up all files on the computer. see chapter 9 for more information.

28. 

Which of the following is layer 5 in the OSI networking model?

  1. Data Link

  2. Network

  3. Session

  4. Transport

c. the session layer is layer 5. in order, the layers (from bottom up) are physical, data link, network, transport, session, presentation, and application. see chapter 10 for more details.

29. 

Which of the following files contains the domain name of the computer you are logged into?

  1. /etc/domain

  2. /etc/defaultdomain

  3. /etc/hosts

  4. /etc/domainname

b. the /etc/defaultdomain file contains the name of the domain that the computer belongs to. there is no /etc/domain file or /etc/domainname file. the /etc/hosts file is for host name resolution. see chapter 10 for more information.

30. 

Which of the following protocols are used to boot diskless client computers over the network? (Choose all that apply.)

  1. RARP

  2. TFTP

  3. DHCP

  4. RPC

a, b. reverse address resolution protocol (rarp) and trivial file transfer protocol (tftp) are used to boot computers over the network. dynamic host configuration protocol (dhcp) is for assigning ip addresses and other network-related information to computers, and remote procedure call (rpc) is a protocol to initiate processes on remote computers that are already operational. see chapter 10 for more information.

31. 

Which one of the following file systems enables you to create a new virtual root file system (/) within an existing file system?

  1. CacheFS

  2. LOFS

  3. TMPFS

  4. VFS

b. the loopback file system (lofs) enables you to create a new virtual root file system ( / ) within an existing file system. the cache file system (cachefs) is for speeding up access to slow devices, such as remote volumes or cd-rom drives, and the temporary file system (tmpfs) is for temporary files. vfs typically stands for virtual file system, but all of the examples listed are virtual file systems (there is no specific vfs in solaris). see chapter 11 for more information.

32. 

Which of the following daemons must be running on an NFS server for it to function properly? (Choose all that apply.)

  1. nfsd

  2. mountd

  3. nfslogd

  4. automountd

  5. statd

  6. lockd

a, b. all of the listed daemons are part of the nfs service. the only two that are required to be running for nfs to work are nfsd and mountd . see chapter 11 for more information.

33. 

Which of the following is an automount point that contains associations between a mount point on a client and a directory on a server?

  1. Automount map

  2. Indirect map

  3. Direct map

  4. Master map

c. the direct map contains mappings between a mount point and a directory. all of the maps listed are automount maps. see chapter 11 for more information.

34. 

Which of the following storage volume types provides fault tolerance with the greatest increase in disk read speed?

  1. Transactional volume

  2. RAID 0

  3. RAID 1

  4. RAID 5

d. a raid 5 volume, also known as a disk stripe with parity, provides built-in fault tolerance as well as increased disk read speed. transactional volumes are for logging and are being phased out. raid 0 volumes do not provide fault tolerance. raid 1 volumes (mirrored volumes) provide fault tolerance but aren't noted for their speed. see chapter 12 for more information.

35. 

Which of the following are read policies on a RAID 1 volume? (Choose all that apply.)

  1. Parallel

  2. Serial

  3. Round robin

  4. Geometric

  5. First

c, d, e. the raid 1 read policies are round robin, geometric, and first. parallel and serial are raid 1 write policies. see chapter 12 for more information.

36. 

What is the primary advantage of using a RAID 0 volume?

  1. Increased storage capacity

  2. Increased disk I/O performance

  3. Provides fault tolerance

  4. Allows more than eight volumes per hard disk

b. raid 0 volumes are used for speed. they increase hard disk i/o performance. they do not increase storage capacity, nor do they provide fault tolerance. soft partitions allow for more than eight volumes per hard disk. see chapter 12 for more information.

37. 

You have just created a role named backupadm on your Solaris computer. You are going to assign the role to a user named cmalcolm. Which of the following commands do you use to perform this task?

  1. rolemod -R backupadm cmalcolm

  2. rolemod -R cmalcolm backupadm

  3. usermod -R backupadm cmalcolm

  4. usermod -R cmalcolm backupadm

c. users are associated with roles with the usermod command, not the rolemod command. the proper syntax is usermod -r rolename username . see chapter 13 for more information.

38. 

Which of the following commands is used to create Access Control Lists on files and directories?

  1. setacl

  2. setfacl

  3. chmod

  4. mkacl

b. the setfacl command is used to create access control lists. the setacl and mkacl commands do not exist. the chmod command is used to modify standard file and directory permissions. see chapter 13 for more information.

39. 

Consider the following information:

root::::auths=solaris.*,solaris.grant;profiles=All
 

Which RBAC file is this information from?

  1. /etc/user_attr

  2. /etc/security/auth_attr

  3. /etc/security/prof_attr

  4. /etc/security/exec_attr

a. the entry is a user entry from the /etc/user_attr file, which grants access to profiles and authorizations. the four files listed are all role-based access control (rbac) database files. see chapter 13 for more information.

40. 

You run the last command on your Solaris workstation. From which database does the last command pull its data?

  1. /var/adm/utmpx

  2. /var/adm/wtmpx

  3. /var/adm/messages

  4. /var/log/syslog

b. the last command gets its information from the /var/adm/wtmpx file. the who command gets its information from the /var/adm/utpmx file. see chapter 14 for more information.

41. 

You want to manually add an entry into the system log after you force a reboot of your Solaris server. Which command should you use?

  1. syslog

  2. syslogedit

  3. logedit

  4. logger

d. the logger command is used to manually edit the system log. the syslog command is shorthand for the system log, and the syslogedit and logedit commands do not exist. see chapter 14 for more information

42. 

Which of the following daemons is responsible for listening for and responding to all incoming TCP connections?

  1. inetd

  2. syslogd

  3. listend

  4. tcpd

a. the internet services daemon, inetd , is responsible for listening for and responding to all incoming tcp and udp connection requests. the syslogd daemon is responsible for logging syslog activity. the listend and tcpd daemons do not exist. see chapter 14 for more information.

43. 

Your NIS server is responsible for a domain named flyingsquid.com. Which of the following directories, by default, stores the maps for the NIS server?

  1. /var/yp/flyingsquid.com

  2. /var/nis/flyingsquid.com

  3. /var/flyingsquid.com

  4. /var/nisplus/flyingsquid.com

a. the maps for a domain are stored in the /var/yp/ domainname directory. in this case, that would be /var/yp/flyingsquid.com . see chapter 15 for more information.

44. 

You are configuring a NIS server for your domain. What is the default directory that contains the source files for the NIS maps?

  1. /var/maps

  2. /var/nis

  3. /var/yp

  4. /etc

d. the /etc directory is the default directory for the source files. this can be changed by editing /var/yp/makefile . by default, the /var/maps and /var/nis directories do not exist. the /var/yp directory contains nis information and files. see chapter 15 for more information.

45. 

You are attempting to connect to a server on your network by using your Solaris client computer. Which of the following files on your computer tells it which name service to use to resolve the name of the server?

  1. /etc/hosts

  2. /etc/nsswitch.conf

  3. /etc/nameservice

  4. /etc/defaultdomain

b. the name service switch file, /etc/nsswitch.conf , tells the local computer which name service (nis, nis+, dns, ldap, or files) to use to resolve host names, as well as to obtain other critical network information. the /etc/hosts file resolves ip addresses to host names, and the /etc/defaultdomain file contains the computer's domain name. see chapter 15 for more information.

46. 

Which of the following installation programs can be used to install from a Web Start Flash archive? (Choose all that apply.)

  1. Solaris Live Upgrade

  2. Web Start

  3. Custom JumpStart

  4. suninstall

a, b, c, d. all of the solaris installation programs can be used to install from a web start flash archive. see chapter 16 for more information.

47. 

You are beginning a custom JumpStart installation. Which of the following files is used by custom JumpStart to match a computer to an installation profile?

  1. A begin script

  2. rules

  3. rules.ok

  4. Web Start Flash archive

c. the rules.ok file is used to match a client computer to an installation profile. as the administrator, you create the rules file and validate it. the validated version, rules.ok , is used by custom jumpstart. see chapter 16 for more information.

48. 

Which of the following are legal values for the install_type variable in a custom JumpStart profile? (Choose all that apply.)

  1. install

  2. initial_install

  3. upgrade

  4. flash_install

b, c, d. you have three options for an installation type when using custom jumpstart. you can choose an initial installation ( initial_install ), an upgrade ( upgrade ), or an installation from a web start flash archive ( flash_install ). see chapter 16 for more information.

Answers

1. 

B. The core of Solaris is called the kernel. The shell is the user interface, where users enter commands. A daemon is a background process running in Solaris. See Chapter 1 for more information.

2. 

A, B, C, D. Solaris 9 supports the UNIX File System (UFS), Universal Disk Format (UDF), Personal Computer File System (PCFS), and Network File System (NFS), as well as many others. HFS is not a valid file system. See Chapter 1 for more information.

3. 

A. The man command, used as man name, will give you the manual page for that command. See Chapter 1 for more information.

4. 

A. The patchadd -d command will not create a backout directory. This saves hard disk space, but prevents you from uninstalling the patch in the future. None of the other switches are valid. See Chapter 2 for more information.

5. 

B, C, D. Solaris 9 can be installed on the sun4m, sun4u, and i86pc platforms. Although sun4d is a valid Sun hardware platform, it is not supported by Solaris 9. See Chapter 2 for more information.

6. 

B. To see whether any local modifications were not kept during the upgrade process, check the a/var/sadm/system/data/upgrade_cleanup file. The /var/sadm/install/contents file is the installed software database. The other two files are fictional. See Chapter 2 for more information.

7. 

B. The devalias and nvalias commands are used to create device aliases. Only the nvalias command is used to create permanent aliases in NVRAMRC. See Chapter 3 for more information.

8. 

A. The banner and the .enet-addr commands display the computer's Ethernet address. Only banner is correct among the answer options. See Chapter 3 for more information.

9. 

D. The test floppy command will run a diagnostic test on the floppy disk drive. All of the other commands use the wrong syntax. See Chapter 3 for more information.

10. 

C. The daemon account has the UID of 1. The root account is UID 0, bin is UID 2, and lp is UID 71. See Chapter 4 for more information.

11. 

D. The correct syntax to create the user with the specified options is useradd -g mdte -u 1068. An uppercase -G switch is used for secondary groups, and the -U switch is not valid with the useradd command. See Chapter 4 for more information.

12. 

B. The user's encrypted password is located in the /etc/shadow file. The /etc/passwd file contains usernames and a placeholder for the password. See Chapter 4 for more information.

13. 

C. Symbolic links are preceded with an l as the first character, before the permissions. Locked files, "regular" files, and hard links do not have a designation. Their permission block would look like -rw-r--r--. See Chapter 5 for more information.

14. 

D. The chmod command changes permissions. The permissions on file1 are being changed by using absolute mode. The first number is for the user (6 means Read and Write), the second number is for group (4 is Read-only), and the third number is for other (0 is no access). See Chapter 5 for more information.

15. 

B. The default umask in Solaris is 022. See Chapter 5 for more information.

16. 

B. The prtconf command displays all of the listed configurations. See Chapter 6 for more information.

17. 

D. Slice 7 is usually reserved for /home or /export/home. Slice 0 is for the root file system (/), 1 is typically swap space, and 4 is usually free for whatever the user wants to use it as. See Chapter 6 for more information.

18. 

C. The displayed menu is the format menu, from which you can manage hard disks. See Chapter 6 for more information.

19. 

C. Inodes are responsible for containing all the information about a file except for the file's filename. The boot process information is stored in the boot block, and the superblock contains file system information. See Chapter 7 for more information.

20. 

B, E. The Process File System (PROCFS), Temporary File System (TMPFS), and Loopback File System (LOFS) are all pseudo, or virtual, file systems. The Network File System (NFS) is a network-based file system, and the High Sierra File System (HSFS) is a disk-based file system. See Chapter 7 for more information.

21. 

B. The mountall command mounts all file systems listed in the /etc/vfstab file. The mount command mounts one specific file system. The umount command unmounts a file system, whereas umountall unmounts all file systems listed in /etc/vfstab. See Chapter 7 for more information.

22. 

A. The /var/spool/lp directory is the default directory for print spooling jobs. The /var/spool/print directory is the client-side print job staging area. The /etc/lp/spool and /var/lp/spool directories do not exist by default. See Chapter 8 for more information.

23. 

D. The reject command is used to keep print queues from accepting new print jobs. The disable command keeps the printer from printing, but new jobs can still enter the queue. The cancel command will cancel a specific print job. See Chapter 8 for more information.

24. 

C. The pkill -9 proc1 command will send a KILL signal to the process proc1. You cannot use the process name, only the process ID number, with the kill command. Not specifying a signal number sends a SIGTERM signal (signal 15), which is not an unconditional kill. See Chapter 8 for more information.

25. 

D. The /etc/dumpdates file tracks backups made with ufsdump. The log includes backup dates, times, and levels. See Chapter 9 for more information.

26. 

A. A level 5 backup is an incremental backup. Incremental backups back up files that have changed since the last lower-level backup. In this case, that was on Sunday. See Chapter 9 for more information.

27. 

D. A level 0 backup is a full backup, which backs up all files on the computer. See Chapter 9 for more information.

28. 

C. The Session layer is layer 5. In order, the layers (from bottom up) are Physical, Data Link, Network, Transport, Session, Presentation, and Application. See Chapter 10 for more details.

29. 

B. The /etc/defaultdomain file contains the name of the domain that the computer belongs to. There is no /etc/domain file or /etc/domainname file. The /etc/hosts file is for host name resolution. See Chapter 10 for more information.

30. 

A, B. Reverse Address Resolution Protocol (RARP) and Trivial File Transfer Protocol (TFTP) are used to boot computers over the network. Dynamic Host Configuration Protocol (DHCP) is for assigning IP addresses and other network-related information to computers, and Remote Procedure Call (RPC) is a protocol to initiate processes on remote computers that are already operational. See Chapter 10 for more information.

31. 

B. The Loopback File System (LOFS) enables you to create a new virtual root file system (/) within an existing file system. The Cache File System (CacheFS) is for speeding up access to slow devices, such as remote volumes or CD-ROM drives, and the Temporary File System (TMPFS) is for temporary files. VFS typically stands for Virtual File System, but all of the examples listed are virtual file systems (there is no specific VFS in Solaris). See Chapter 11 for more information.

32. 

A, B. All of the listed daemons are part of the NFS service. The only two that are required to be running for NFS to work are nfsd and mountd. See Chapter 11 for more information.

33. 

C. The direct map contains mappings between a mount point and a directory. All of the maps listed are automount maps. See Chapter 11 for more information.

34. 

D. A RAID 5 volume, also known as a disk stripe with parity, provides built-in fault tolerance as well as increased disk read speed. Transactional volumes are for logging and are being phased out. RAID 0 volumes do not provide fault tolerance. RAID 1 volumes (mirrored volumes) provide fault tolerance but aren't noted for their speed. See Chapter 12 for more information.

35. 

C, D, E. The RAID 1 read policies are round robin, geometric, and first. Parallel and serial are RAID 1 write policies. See Chapter 12 for more information.

36. 

B. RAID 0 volumes are used for speed. They increase hard disk I/O performance. They do not increase storage capacity, nor do they provide fault tolerance. Soft partitions allow for more than eight volumes per hard disk. See Chapter 12 for more information.

37. 

C. Users are associated with roles with the usermod command, not the rolemod command. The proper syntax is usermod -R rolename username. See Chapter 13 for more information.

38. 

B. The setfacl command is used to create Access Control Lists. The setacl and mkacl commands do not exist. The chmod command is used to modify standard file and directory permissions. See Chapter 13 for more information.

39. 

A. The entry is a user entry from the /etc/user_attr file, which grants access to profiles and authorizations. The four files listed are all role-based access control (RBAC) database files. See Chapter 13 for more information.

40. 

B. The last command gets its information from the /var/adm/wtmpx file. The who command gets its information from the /var/adm/utpmx file. See Chapter 14 for more information.

41. 

D. The logger command is used to manually edit the system log. The syslog command is shorthand for the system log, and the syslogedit and logedit commands do not exist. See Chapter 14 for more information

42. 

A. The Internet services daemon, inetd, is responsible for listening for and responding to all incoming TCP and UDP connection requests. The syslogd daemon is responsible for logging syslog activity. The listend and tcpd daemons do not exist. See Chapter 14 for more information.

43. 

A. The maps for a domain are stored in the /var/yp/domainname directory. In this case, that would be /var/yp/flyingsquid.com. See Chapter 15 for more information.

44. 

D. The /etc directory is the default directory for the source files. This can be changed by editing /var/yp/makefile. By default, the /var/maps and /var/nis directories do not exist. The /var/yp directory contains NIS information and files. See Chapter 15 for more information.

45. 

B. The name service switch file, /etc/nsswitch.conf, tells the local computer which name service (NIS, NIS+, DNS, LDAP, or files) to use to resolve host names, as well as to obtain other critical network information. The /etc/hosts file resolves IP addresses to host names, and the /etc/defaultdomain file contains the computer's domain name. See Chapter 15 for more information.

46. 

A, B, C, D. All of the Solaris installation programs can be used to install from a Web Start Flash archive. See Chapter 16 for more information.

47. 

C. The rules.ok file is used to match a client computer to an installation profile. As the administrator, you create the rules file and validate it. The validated version, rules.ok, is used by custom JumpStart. See Chapter 16 for more information.

48. 

B, C, D. You have three options for an installation type when using custom JumpStart. You can choose an initial installation (initial_install), an upgrade (upgrade), or an installation from a Web Start Flash archive (flash_install). See Chapter 16 for more information.