Answer Key Explanations


Question 1

A matches 3 because TCP is a Transport layer protocol. B matches 4 because FTP is an Application layer protocol. C matches 2 because ICMP is an Internet layer protocol, and D matches 1 because PPP is a Network Interface layer protocol.

Question 2

The correct answer is B, because the DHCP configuration filename that is automatically created when the DHCP server configuration utilities are run is /etc/inet/dhcpsvc.conf . Answers A, C, and D are incorrect because these filenames don't exist.

Question 3

The correct answer is C. When you run ndd /dev/hme link_speed , and the return value is 1 , it indicates that the interface is running at 100Mbps. Answer A is incorrect because the value would be if the interface was running at 10Mbps. Answer B is incorrect because the auto-negotiation capability is a different parameter of ndd , namely autoneg_cap . Answer D is incorrect because the hme0 interface cannot run at 1000Mbps.

Question 4

The correct answer is A, because /etc/default/mpathd is the file referenced by in.mpathd . Answer B is incorrect because /etc/inet/mpathd does not exist. Answer C is incorrect because /etc/default/inetd contains default settings for the inetd daemon. Answer D is incorrect because /etc/default/init is the file that is read by the init process when the system boots, to set environment variables .

Question 5

The correct answer is C because a diskless client knows only its own ethernet address. This address is passed in a RARP request to obtain the client's IP address, which, in turn , enables the client to continue the boot process. Answers A and B are incorrect because a diskless client does not possess these items of information ”it gets them from the server. Answer D is incorrect because the client does not have the IP address of the boot server ”the client sends a RARP message, which is broadcast to all hosts on the network, and the boot server responds with the client's IP address.

Question 6

The correct answer is C. The file /etc/nodename specifies the canonical name for a system. The entry in this file identifies the system name to be used for applications. Answer A is incorrect because /etc/inet/hosts provides IP address-to-hostname mapping. Answer B is incorrect because /etc/inet/networks associates network numbers with network names . Answer D is incorrect because /etc/system contains essential system kernel settings and configurable kernel variables.

Question 7

The correct answer is D. The ICMP protocol is used to send control or error messages. The destination unreachable error message is one example of a message produced by ICMP. This message is normally produced when there is no defined route to the remote host or network. Answers A, B, and C are incorrect because these protocols are not used to send control or error messages.

Question 8

The correct answer is C because the file /etc/nsswitch.conf shows the search order for name resolution. The relevant line of this file is the hosts: entry. Answer A is incorrect because /etc/inet/hosts contains a mapping of IP addresses to hostnames. Answer B is incorrect because /etc/resolv.conf is the file that lists the search order and addresses of DNS servers. Answer D is incorrect because /etc/named.conf is the configuration file used by the DNS daemon in.named .

Question 9

The correct answer is A. 802.3 is the IEEE identifier for ethernet. Answer B is incorrect because 802.4 is the IEEE identifier for the token bus network access method. Answer C is incorrect because 802.5 is the IEEE identifier for the token ring network access method. Answer D is incorrect because 802.2 is the IEEE identifier for the logical link control (LLC).

Question 10

The correct answers are A and C. UDP has a low overhead and is a connectionless, stateless, and unreliable protocol. Answer B is incorrect because UDP does not have a high overhead; it has a low overhead. Answers D and E are incorrect because these describe TCP, not UDP.

Question 11

The correct answer is A. The route monitor command provides continuous output of any changes that occur in the routing table. Answer B is incorrect because route flush removes all entries from the routing table. Answer C is incorrect because netstat -r simply displays all entries in the routing table. Answer D is incorrect because netstat -i is used to display interface statistics.

Question 12

The correct answer is B. The network mask 255.255.0.0 is the default mask for a class B network. Answer A is incorrect because this is the default netmask for a class A network. Answer C is incorrect because this is the default netmask for a class C network. Answer D is incorrect because this is the netmask for a class C network that uses subnetting.

Question 13

The correct answer is D. When specifying the datastore as type SUNWnisplus , the location must be the name of an NIS+ table. Answer A is incorrect because an absolute pathname must be used for the other two datastore options, SUNWfiles and SUNWbinfiles . Answers B and C are incorrect because they are not valid options for the datastore location.

Question 14

The correct answer is C. The Point-to-Point protocol (PPP) operates at the Network Interface layer of the TCP/IP model and transmits packets over serial point-to-point links. Answers A, B, and D are incorrect because PPP does not operate at these layers ; it operates at the Network Interface layer.

Question 15

The correct answers are A and B. The pntadm utility is used to add and remove networks that are under the management of DHCP. Answer C is incorrect because /etc/inet/networks associates network numbers with network names. Answer D is incorrect because the datastore type cannot be changed after it has been created.

Question 16

The correct answers are A and D. Encryption algorithms often use time as part of the encryption key. Time synchronization is also required because files and directories are time stamped when created or modified. Answers B and C are incorrect because they do not have time-critical elements.

Question 17

The correct answers are A and D. The two utilities that should be used to manage the dhcptab table are dhcpmgr and dhtadm . Answer B is incorrect because pntadm is used to manage DHCP network tables. Answer C is incorrect because dhcpconfig is used to configure the DHCP server.

Question 18

The correct answer is B. The command ifconfig hme0 removeif 192.168.7.4 will successfully remove the logical interface that has the named IP address assigned to it. Answer A is incorrect because ifconfig hme0 down will disable only the primary network interface. Answers C and D are incorrect because they both represent invalid use of the syntax of the ifconfig command.

Question 19

The correct answers are A and C. A faulty network adapter would cause a high number of output errors on the primary network interface. Additionally, a duplicate IP on the same network would also produce the same result. Answer B is incorrect because this would result in a high number of collisions. Answer D is incorrect because a remote host would have no effect on the number of output errors.

Question 20

The correct answers are A and B. The deprecated option ensures that the interface is not used for passing application data and the -failover option marks the address so that in.mpathd will not use it as a failover address. Answer C is incorrect because the failover option enables the interface as a failover address. Answer D is incorrect because the -deprecated option marks the interface as not deprecated and uses it for passing data to other applications. Answer E is incorrect because the unplumb option is used to remove a network interface.

Question 21

The correct answers are A and C. Zones of authority can cross one or more domains and a zone comprises a domain (or more than one domain), including the data associated with the domain. Answer B is incorrect because zones of authority can cross one or more domains; they are not restricted to a single domain. Answer D is incorrect because a zone comprises a domain as well as the data associated with the domain.

Question 22

The correct answer is D. IPv6 does not use the broadcast address mechanism. Answers A, B, and C are incorrect because anycast, multicast, and unicast are all address types that are used in IPv6.

Question 23

The correct answer is C. There are 15 strata, ranging from 1 to 15. A stratum-1 server is the most accurate and has its own time reference source.

Question 24

The correct answers are B and C. The command ifconfig hme0:2 plumb 192.168.9.9 will configure and enable the logical interface hme0:2 . The command ifconfig hme0 addif 192.168.9.9 up will also configure and enable the logical interface hme0:2 ; the latter command will automatically select the next available index number to use (because hme0:1 is already in use). Answer A is incorrect because this command would overwrite the primary network interface address with 192.168.9.9 , which is not required. Answers D and E are incorrect because the syntax for the ifconfig command is invalid.

Question 25

The correct answer is A. The configuration file /etc/inet/ndpd.conf is read by the in.ndpd process on startup. Answer B is incorrect because this file does not exist. Answer C is incorrect because /etc/inet/ipnodes is the file used to map IPv6 addresses to IPv6 hostnames, similar to the way in which /etc/inet/hosts is used in IPv4. Answer D is incorrect because this file does not exist. Unlike IPv4, where /etc/hosts is symbolically linked to /etc/inet/hosts , there is no such link for the ipnodes file.

Question 26

The correct answer is B. Domains such as com , gov , edu , and org are examples of top-level domains. Top-level domains are currently controlled by ICANN. Geographical domains are also further examples, based on their physical locations. Answer A is incorrect because the root domain is the single top domain in the DNS hierarchy and contains the names and addresses of top-level domains. The root domain is controlled by IANA. Answer C is incorrect because second-level domains are located below top-level domains in the DNS hierarchy. sun.com is an example of a second-level domain, which is controlled by Sun Microsystems. Answer D is incorrect because a fully qualified domain name (FQDN) is the portion of a uniform resource locator (URL) that fully identifies a domain on the Internet, such as www.sun.com .

Question 27

The correct answer is A. TCP uses a full-duplex connection, which allows concurrent data transfer in both directions. Answer B is incorrect because a simplex connection allows data transfer in a single direction ”it is one-way. Answer C is incorrect because a half-duplex connection allows data transfer in both directions, but not concurrently. Answer D is incorrect because double duplex does not exist.

Question 28

The correct answer is B. With 352 collisions and 16000 output packets, the collision rate is calculated as follows :

(100x352) / 16000 = 2.2%

Question 29

The correct answer is B. The route flush command is used to empty the routing table of all entries. Answer A is incorrect because route delete default removes only the default route entry (if defined). It does not affect any other entries in the routing table. Answer C is incorrect because init 2 causes the system to change its run level to level 2, and will only disable NFS. It does not remove the routing entries. Answer D is incorrect because route monitor is used to view continuous output of any changes made to the routing table. It does not remove any entries.

Question 30

The correct answer is D because the FAILURE_DETECTION_TIME variable specifies how long to wait before marking an interface as failed. The default setting for this variable is 10,000 milliseconds (or 10 seconds) and can be adjusted in the file /etc/default/mpathd . Answers A, B, and C are incorrect because these variable names do not exist.

Question 31

The correct answer is A. The Network Interface layer often incorporates the Hardware layer as part of its functionality, when the Hardware layer is not identified as a separate layer in its own right. Answers B, C, and D are incorrect because the Hardware layer is often incorporated within the Network Interface layer.

Question 32

The correct answer is B. arp -d < hostname > would delete the entry relating to < hostname > from the ARP cache. Answer A is incorrect because the -s option is used to add a static entry to the ARP cache. Answer C is incorrect because the -a option lists all entries in the ARP cache. Answer D is incorrect because the -f option is used in conjunction with a filename to add multiple entries to the ARP cache.

Question 33

The correct answer is D. A class C IP address uses the first 24 bits of the address to denote the network and the next 8 bits to denote the host address. Answer A is incorrect because this describes a class A IP address. Answer B is incorrect because 16 bits are used to denote the network portion of a class B IP address. Answer C is incorrect because 18 bits are used to denote the network portion of a classless IP address.

Question 34

The correct answer is B because the test address is used by the in.mpathd process to monitor the status of the interface. The test address is not used to pass network traffic from any other applications; it is solely used for failure and recovery detection. Answer A is incorrect because the test address is not used as a live failover. Answer C is incorrect because the test address is used all the time for failure and recovery detection. Answer D is incorrect because outbound load balancing is a feature of multipathing and is not applicable to test addresses because they do not pass any network traffic from other applications.

Question 35

The correct answer is A. Routing takes place at the Internet layer of the TCP/IP model. Answers B, C, and D are incorrect because routing does not take place at these layers; it is a function of the Internet layer.

Question 36

The correct answers are A, C, and F. The Ethernet II frame contains the sending and destination ethernet addresses and the cyclic redundancy check (CRC) fields. Answers B and D are incorrect because IP addresses are not contained within Ethernet II frames ; they are found in IP datagrams. Answer E is incorrect because the acknowledgment number field is not found within an Ethernet II frame; it is found within a TCP segment header.

Question 37

The correct answer is B. The file /etc/inet/ netmasks is used to assign permanent network mask entries. Answer A is incorrect because /etc/inet/hosts is used to provide IP address to hostname mapping. Answer C is incorrect because /etc/inet/networks associates network numbers with network names. Answer D is incorrect because /etc/hosts is a symbolic link to /etc/inet/hosts .

Question 38

The correct answer is B. The -C option to dhtadm creates the DHCP table. Answer A is incorrect because the -M option is used to modify a symbol or macro definition. Answer C is incorrect because the -A option is used to add a symbol or macro definition. Answer D is incorrect because the -D option is used to delete a symbol or macro definition.

Question 39

The correct answer is C. Unsolicited ARP messages are related to a host that made an ARP request. Information about the host is stored in the ARP cache. Answer A is incorrect because this describes a solicited ARP message. Answers B and D are incorrect because these are not ARP messages.

Question 40

The correct answer is A. Flow control is handled by the Transport Layer of the TCP/IP model. Answer B is incorrect because the Network Interface layer handles the transfer of frames across the network. Answer C is incorrect because the Internet layer handles the routing of packets between destinations as well as fragmentation. Answer D is incorrect because the Application layer interacts with running applications; it does not have anything to do with flow control.

Question 41

The correct answer is D. The -P option to the pntadm command is used to see the changes made to the DHCP table. Answer A is incorrect because the “M option is used to modify an entry that has been made to the DHCP table. Answer B is incorrect because the -C option is used to create the DHCP table. Answer C is incorrect because the -A option is used to add an entry to the DHCP table.

Question 42

The correct answers are A and C. IPv6 addresses the shortfall in IPv4 addresses and also makes routing easier through simplified headers. Answer B is incorrect because IPv6 provides classless addressing. Answer D is incorrect because IPv6 addresses are assigned automatically, with the autoconfiguration facility.

Question 43

The correct answer is A. The file /etc/hostname6.hme0 would configure and enable an IPv6 address on the hme0 network interface, following a reboot of the system. Answer B is incorrect because this would affect the primary IPv4 address. Answer C is incorrect because this would configure an IPv6 address on the hme6 interface. Answer D is incorrect because this would configure an IPv4 logical interface.

Question 44

The correct answer is B. /var/ntp/ntp. drift is the default location for the drift file, as specified in the configuration file, /etc/inet/ntp.conf . Answers A, C, and D are incorrect because they are invalid file names and do not exist.

Question 45

The correct answers are A and B. The dhcpagent process on the client handles the release and renewal of leases and also listens for server responses. Answer C is incorrect because to configure a DHCP client you need to create a specific file relating to a network interface. If you have an hme interface, hme0 , then the file to create is /etc/dhcp.hme0 . The client will use DHCP when it is rebooted. Answer D is incorrect because it is the server that manages the list of available IP addresses ”the pntadm command is used.

Question 46

The correct answers are B and C. Servers that use a high-availability failover mechanism, such as IP multipathing, make use of logical network interfaces. A server running a number of applications that require the system to appear as separate is also a good case for using logical network interfaces. Answer A is incorrect because logical network interfaces do not ease network congestion. The logical interfaces still use the single primary interface, so network throughput is not improved. Answer D is incorrect because the use of logical network interfaces does not improve hardware resilience because they all use the same physical network interface ”there is no resilience.

Question 47

The correct answer is D. The collision rate is determined by multiplying the number of collisions by 100 and then dividing by the total number of output packets. Answer A is incorrect because the number of collisions is divided by the total number of output packets, not input packets. Answer B is incorrect because the total number of output packets is used in the calculation, not the total number of input packets. Answer C is incorrect because multiplying the number of output packets by 100 and then dividing by the number of collisions would give the wrong collision rate.

Question 48

The correct answer is C. TCP establishes a virtual circuit connection between the sending and receiving hosts before data transmission can start. Answer A is incorrect because TCP establishes a virtual circuit connection. A characteristic of the connection is that it is full-duplex because it allows concurrent transmission of data in both directions. Answer B is incorrect because TCP establishes a virtual circuit connection and does not use half-duplex communications, which allow data transmission in both directions, but not concurrently. TCP makes use of full-duplex communications. Answer D is incorrect because TCP does not make a physical connection; it establishes a virtual circuit connection.

Question 49

The correct answer is B. Unsolicited ARP messages are held in the ARP cache for 5 minutes.

Question 50

The correct answer is B. The file /etc/inet/ipnodes provides IPv6 address-to-hostname mapping in the same way that /etc/inet/hosts does for IPv4. Answers A, C, and D are incorrect because these files do not exist.

Question 51

The correct answers are A and B. Each dhcp_network filename consists of the type of datastore and the IP address of the network being supported. An example for an ASCII datastore supporting the network 192.168.1.0 is named SUNWfiles1_192_168_1_0 . Answers C and D are incorrect because the hostname and IP address of the DHCP server are not items used to create the dhcp_network filename.

Question 52

The correct answer is C. The startup script /etc/rc2.d/S72inetsvc starts the in.named daemon. Answer A is incorrect because /etc/rcS.d/S30network.sh configures the network interface. Answer B is incorrect because /etc/rc2.d/S30sysid.net is the script that completes the configuration of the network. Answer D is incorrect because /etc/rc2.d/S69inet is a script that configures networking aspects, such as routing.

Question 53

The correct answers are A, C, and D. The IPv6 loopback address can be represented in three ways, namely ::1 , 0000:0000:0000:0000:0000:0000:0000:0001 , or 0:0:0:0:0:0:0:1 . Answer B is incorrect because the leading zeros have not been compressed; they have been discarded, making this an invalid IPv6 address. Answer E is incorrect because the :: compression character can be used only once in an IPv6 address.

Question 54

The correct answers are A, B, and D. Subnetting can be used to provide separate subnetworks, according to geographical area or department. It is also used to restrict access to a subnetwork and to reduce network contention by splitting up the network into a number of smaller, local subnetworks. Answer C is incorrect because the number of IP addresses increases with the use of subnetting. Answer E is incorrect because subnetting actually increases the complexity of network management.

Question 55

The correct answer is A. 100BASE-T4 is the media type that uses four pairs of wires: one to send, one to receive, and two bi-directional pairs. It is implemented on unshielded twisted pair cables, can be CAT-3 or CAT-4, but CAT-5 is recommended. 100 BASE-T4 operates over distances of about 100 meters . Answer B is incorrect because 100BASE-FX is implemented on fiber- optic cable, not twisted pair. Answer C is incorrect because 100BASE-TX uses two pairs of wires, not four. Answer D is incorrect because 100BASE-X is a term often used to describe 100BASE-FX and 100BASE-TX.

Question 56

The correct answer is B. The dhcp_network file contains the range of IP addresses that can be assigned by the DHCP server, for a single network. Answer A is incorrect because the dhcpagent process that runs on a DHCP client obtains default configuration information from the file /etc/default/dhcpagent . Answer C is incorrect because the dhcp_network file contains the range of IP addresses for a single network, not all networks. Answer D is incorrect because the configuration information for the DHCP server is found in the file /etc/inet/dhcpsvc.conf .

Question 57

The correct answer is D. The NTP server configuration file, /etc/inet/ntp.conf , is created by copying the file /etc/inet/ntp.server . It is then edited to meet the requirements of the local network. Answers A and B are incorrect because these files do not exist. Answer C is incorrect because the file, /etc/inet/ntp.client , is the template file used by an NTP client to create its configuration file.

Question 58

The correct answer is C. The sixth octet, FFFF , in the address indicates that an embedded IPv4 address is present in the IPv6 address. Answer A is incorrect because C0A8 is the hexadecimal representation of the first 16 bits of the IPv4 address 192.168 . Answer B is incorrect because 1507 is the hexadecimal representation of the second 16 bits of the IPv4 address 21.7 . The embedded IPv4 address occupies the rightmost 32 bits of the IPv6 address. Answer D is incorrect because 0000 is used as padding.

Question 59

The correct answer is D. The dhcpmgr utility can be found in the directory /usr/sadm/admin/bin . Answers A and B are incorrect because the dhcpmgr utility is not found in these directories. Answer C is incorrect because /usr/sadm/admin/dhcpmgr is a directory containing the Java, help, and library files required to run dhcpmgr . The utility itself is not found in this directory.

Question 60

The correct answer is B. TCP uses a congestion window on the sending side to manage the flow of data. If congestion is detected, the size of the congestion is halved to reduce the amount of data that is sent across the network. When acknowledgements are received from the receiving host, the congestion window is doubled in size to allow a greater number of packets to be sent across the network. Answer A is incorrect because the congestion window is not halved in size when acknowledgements are received; it is doubled in size. Also, the congestion window is not doubled in size when congestion is detected ; it is halved in size. Answers C and D are incorrect because they are not features of the congestion window.

Question 61

The correct answer is A. The application layer handles the formatting of data and any conversions that are necessary. Answer B is incorrect because the Internet layer handles the routing of packets and fragmentation/reassembly. Answer C is incorrect because the Network Interface layer handles the transmission of ethernet frames across the network. Answer D is incorrect because the Transport layer handles the end-to-end communication and does not deal with data formatting.

Question 62

The correct answer is B. The ring network topology is one where hosts are connected in a ring formation, and each host is connected only to its adjacent neighbors. Answer A is incorrect because a bus topology involves all hosts being connected to a single backbone cable. Answer C is incorrect because the star topology involves hosts being connected to a central hub. Answer D is incorrect because a VLAN topology involves the use of a central intelligent hub or switch and functions in a similar way to multiple star topology networks.

Question 63

The correct answer is A. The in.rarpd daemon will start at boot time only if the /tftpboot directory exists. Answers B, C, and D are incorrect because these directories do not exist.

Question 64

The correct answers are A and D. Logical interfaces can cause performance bottlenecks because they all use the same physical ethernet interface. They can also slow down the system boot process because each logical interface has to be configured at boot time. Answer B is incorrect because logical interfaces provide additional resources at a much lower cost because there is no need to purchase additional physical ethernet interfaces. Answer C is incorrect because logical interfaces are not an administration overhead; they allow central administration on a single host.



Solaris 9 Network Administration Exam Cram 2 (Exam Cram CX-310-044)
Solaris 9 Network Administrator Exam Cram 2 (Exam CX-310-044)
ISBN: 0789728702
EAN: 2147483647
Year: 2003
Pages: 174
Authors: John Philcox

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net