Review Questions and Answers

1. 

You are working on your network but are not able to mount a remote hard disk. To see whether the remote resource is available, you are going to try to log into the remote computer. Which of the following utilities can be used to log into a remote computer? (Choose all that apply.)

  1. rcp

  2. telnet

  3. rlogin

  4. login

b, c. the telnet and rlogin commands can be used to log into a remote computer. additionally, the ftp command can be used, but it's for downloading files. the rcp command copies files, and the login command is not valid.

2. 

You are attempting to log into a remote computer on your network. Which of the following files are used to provide authentication if you want to log in remotely? (Choose two.)

  1. /etc/hosts.equiv

  2. /etc/.rlogin

  3. .rlogin

  4. /hosts.equiv

a, c. the /etc/hosts.equiv and .rlogin files are used to provide remote authentication for users logging in over the network.

3. 

Which of the following statements accurately describe the function of the TCP protocol? (Choose all that apply.)

  1. It provides guaranteed delivery of packets.

  2. It is faster than the UDP protocol.

  3. It addresses and routes packets.

  4. It provides error correction if a packet is missing.

a, d. tcp provides guaranteed delivery of packets and also provides error correction. however, because of its additional responsibilities, it is not faster than udp. addressing and routing is the responsibility of the ip protocol.

4. 

Which of the following statements accurately describes the function of the IP protocol?

  1. It provides guaranteed delivery of packets.

  2. It is faster than the UDP protocol.

  3. It addresses and routes packets.

  4. It provides error correction if a packet is missing.

c. addressing and routing is the responsibility of the ip protocol. tcp provides guaranteed delivery of packets and also provides error correction. ip must be used in conjunction with either tcp or udp to provide network service. ip is not faster than the udp protocol.

5. 

Which of the following protocols is responsible for starting processes on remote computers on a network?

  1. RCP

  2. RPC

  3. TCP

  4. UDP

  5. IP

b. processes are started remotely with the remote procedure call (rpc) protocol. rcp is not a protocol; rcp is the remote copy command. tcp, udp, and ip are core protocols in the tcp/ip protocol suite.

6. 

You are attempting to access one of your servers, named server1. However, the server seems to be unavailable. You type the command ping server1 and get the response ping: no answer from server1. What does this indicate?

  1. server1 is functioning properly.

  2. ping server1 is not a valid command.

  3. The name server1 is not recognized by the ping command.

  4. server1 is down or unable to respond to ICMP requests

d. the `no answer` message indicates that ping was able to resolve the name server1 , but that server1 was unable to respond to the icmp request. this could indicate that the server is down or malfunctioning, or it could also indicate that a firewall between the client and server is preventing the icmp packets from passing through.

7. 

You are attempting to access one of your servers, named server1. However, the server seems to be unavailable. You type the command ping server1 and get the response ping: unknown host server1. What does this indicate?

  1. server1 is functioning properly.

  2. ping server1 is not a valid command.

  3. The name server1 is not recognized by the ping command.

  4. server1 is down or unable to respond to ICMP requests.

c. the `unknown host` message indicates that ping was not able to resolve the name server1 . this could indicate a name resolution problem or that the name of the server was typed in wrong.

8. 

You are configuring your workstations to operate in local files mode. Your network consists of several subnets. Which of the following are required pieces of configuration information for your client computers? (Choose all that apply.)

  1. IP address

  2. Subnet mask

  3. Default router address

  4. Name of every host on the network

  5. Address of a DNS server

  6. Name of the network configuration server

a, b, c. for your client computers, an ip address, subnet mask, and default router are required. knowing the names of every host on the network or having a dns server would be very useful for resolving names on the network, but they are not required. because you are running in local files mode, you do not need a network configuration server.

9. 

You are the Solaris administrator for your company. You are trying to log in to a server by using the ftp command. However, you are receiving no response. You suspect that the problem might be an improperly functioning daemon. Which of the following daemons controls the FTP service?

  1. in.ftpd

  2. ftpd

  3. inetd

  4. rpc.ftpd

a. the in.ftpd daemon is responsible for running the ftp service. the inetd daemon starts in.ftpd but is not directly responsible for ftp . the other two are not valid daemons.

10. 

During boot, your Solaris 9 computer displays the following information:

click to expand

Which of the following is the computer's Ethernet address?

  1. #8675309

  2. 0:3:ba:15:d:18

  3. 84107d19

  4. The Ethernet address is not listed.

b. the display is from the system banner. the ethernet address will always have colons and be the left entry on the bottom line. in this example, the ethernet address is 0:3:ba:15:d:18.

11. 

You are booting your Sun-manufactured Solaris server. The server boots to an ok prompt, and you want to identify the server's MAC address. Which commands can you use to find it? (Choose all that apply.)

  1. enet-addr

  2. mac-addr

  3. banner

  4. .enet-addr

  5. show-net

  6. test net

c, d. the two valid commands to display the ethernet address are banner and .enet-addr . the only other valid command listed is test net , which tests the network adapter.

12. 

The computers on your network are configured in local files mode. Your computer is missing the /etc/nodename file. Which of the following best describes what will happen?

  1. Your computer will obtain its node name from the OpenBoot program.

  2. Your computer will prompt you for its node name during boot.

  3. Your computer will not be able to participate on the network.

  4. Your computer will run the hostconfig program to attempt to obtain a host name from a network configuration server.

  5. Your computer will automatically re-create a blank /etc/nodename file.

d. if your computer is missing the /etc/nodename file, it will run hostconfig to obtain a host name from a network configuration server. if no server is available, your host will not have a name.

13. 

Your Solaris workstation is named comp1. The primary network interface is named smc0. What is the name of the host name interface file?

  1. /etc/hostname.smc0

  2. /etc/hostname.comp1

  3. /etc/comp1.smc0

  4. /etc/comp1.interface

a. the format for the host name interface file is /etc/hostname. interface , where interface is the name of the network adapter. your system's host name or ip address is entered into the file itself.

14. 

Which of the following statements accurately describe the /etc/inet/hosts file? (Choose all that apply.)

  1. It contains mappings of IP addresses to host names on the network.

  2. Comments in the file are preceded with a pound sign.

  3. Only one host name can be listed per line.

  4. The file is known as the hosts database.

a, b, d. the /etc/inet/hosts file (and the /etc/hosts file, because /etc/hosts is symbolically linked to /etc/inet/hosts ) is used by your computer to resolve host names to ip addresses on your network. comments in the file are preceded with a pound sign, multiple host names can appear on one line, and the file is also called the hosts database.

15. 

You are the Solaris administrator for your company. You are configuring client computers to run in local files mode. Your network has one domain, one subnet, and is not connected to the Internet. Which of the following files are not needed on your client computers? (Choose all that apply.)

  1. /etc/nodename

  2. /etc/defaultdomain

  3. /etc/defaultrouter

  4. /etc/inet/netmasks

b, c, d. the /etc/nodename file is required on all computers on the network. the other files are not needed unless you have multiple domains (in the case of /etc/defaultdomain ) or multiple subnets (for /etc/defaultrouter and /etc/inet/netmasks ).

16. 

Which of the following correctly describes the information present in an /etc/defaultdomain file?

  1. The computer's node name.

  2. The fully qualified domain name of the domain that the computer belongs to.

  3. The fully qualified domain name of the domain that the computer's login server belongs to.

  4. The computer's node name and the fully qualified domain name of the domain that the computer belongs to.

b. the only piece of information in the /etc/defaultdomain file is the fully qualified domain name (such as www.sun.com ) of the domain that the computer belongs to.

17. 

In Solaris, which of the following utilities can be used to copy files from one computer to another? (Choose all that apply.)

  1. rpc

  2. rcp

  3. rsh

  4. rup

  5. ftp

b, e. the rcp and ftp utilities are used to copy files from remote computers in solaris. rpc is a protocol, not a utility. the rsh command invokes a remote shell, and rup checks whether a remote computer is operational.

18. 

Which of the following statements accurately describe IP addresses? (Choose all that apply.)

  1. They are 32-bit addresses.

  2. They are 48-bit addresses.

  3. IP addresses must be unique on the network.

  4. IP addresses identify computers on the network.

  5. Only servers and printers need IP addresses on the network.

a, c, d. ip addresses are 32-bit addresses that identify computers on the network. on any given network, each ip address must be unique. all computers that need to communicate on the network need an ip address, not just servers and printers.

19. 

Which of the following TCP/IP commands can be used to display usernames of users logged into remote computers on the network? (Choose all that apply.)

  1. who

  2. rwho

  3. rusers

  4. spray

  5. ping

b, c. the rwho and rusers commands can display usernames of users logged into the network. the who command can display users, but only on the local machine. the spray and ping commands are both network testers.

20. 

You are the Solaris administrator on your network. You are logged in under a regular user account without superuser privileges. You want to remotely log into one of your servers to perform an administrative task and you want to supply a different username than the one you are currently using when you log in remotely. Which of the following commands will enable you to do this? (Choose all that apply.)

  1. telnet

  2. rlogin

  3. telnet -l

  4. rlogin -l

a, d. the telnet and rlogin commands enable you to log into a remote system. the telnet command automatically asks you for your username. the rlogin command assumes that you are logging in as your current identity. to specify otherwise, use the rlogin -l command.

Answers

1. 

B, C. The telnet and rlogin commands can be used to log into a remote computer. Additionally, the ftp command can be used, but it's for downloading files. The rcp command copies files, and the login command is not valid.

2. 

A, C. The /etc/hosts.equiv and .rlogin files are used to provide remote authentication for users logging in over the network.

3. 

A, D. TCP provides guaranteed delivery of packets and also provides error correction. However, because of its additional responsibilities, it is not faster than UDP. Addressing and routing is the responsibility of the IP protocol.

4. 

C. Addressing and routing is the responsibility of the IP protocol. TCP provides guaranteed delivery of packets and also provides error correction. IP must be used in conjunction with either TCP or UDP to provide network service. IP is not faster than the UDP protocol.

5. 

B. Processes are started remotely with the Remote Procedure Call (RPC) protocol. RCP is not a protocol; rcp is the remote copy command. TCP, UDP, and IP are core protocols in the TCP/IP protocol suite.

6. 

D. The "no answer" message indicates that ping was able to resolve the name server1, but that server1 was unable to respond to the ICMP request. This could indicate that the server is down or malfunctioning, or it could also indicate that a firewall between the client and server is preventing the ICMP packets from passing through.

7. 

C. The "unknown host" message indicates that ping was not able to resolve the name server1. This could indicate a name resolution problem or that the name of the server was typed in wrong.

8. 

A, B, C. For your client computers, an IP address, subnet mask, and default router are required. Knowing the names of every host on the network or having a DNS server would be very useful for resolving names on the network, but they are not required. Because you are running in local files mode, you do not need a network configuration server.

9. 

A. The in.ftpd daemon is responsible for running the FTP service. The inetd daemon starts in.ftpd but is not directly responsible for ftp. The other two are not valid daemons.

10. 

B. The display is from the system banner. The Ethernet address will always have colons and be the left entry on the bottom line. In this example, the Ethernet address is 0:3:ba:15:d:18.

11. 

C, D. The two valid commands to display the Ethernet address are banner and .enet-addr. The only other valid command listed is test net, which tests the network adapter.

12. 

D. If your computer is missing the /etc/nodename file, it will run hostconfig to obtain a host name from a network configuration server. If no server is available, your host will not have a name.

13. 

A. The format for the host name interface file is /etc/hostname.interface, where interface is the name of the network adapter. Your system's host name or IP address is entered into the file itself.

14. 

A, B, D. The /etc/inet/hosts file (and the /etc/hosts file, because /etc/hosts is symbolically linked to /etc/inet/hosts) is used by your computer to resolve host names to IP addresses on your network. Comments in the file are preceded with a pound sign, multiple host names can appear on one line, and the file is also called the hosts database.

15. 

B, C, D. The /etc/nodename file is required on all computers on the network. The other files are not needed unless you have multiple domains (in the case of /etc/defaultdomain) or multiple subnets (for /etc/defaultrouter and /etc/inet/netmasks).

16. 

B. The only piece of information in the /etc/defaultdomain file is the fully qualified domain name (such as www.sun.com) of the domain that the computer belongs to.

17. 

B, E. The rcp and ftp utilities are used to copy files from remote computers in Solaris. RPC is a protocol, not a utility. The rsh command invokes a remote shell, and rup checks whether a remote computer is operational.

18. 

A, C, D. IP addresses are 32-bit addresses that identify computers on the network. On any given network, each IP address must be unique. All computers that need to communicate on the network need an IP address, not just servers and printers.

19. 

B, C. The rwho and rusers commands can display usernames of users logged into the network. The who command can display users, but only on the local machine. The spray and ping commands are both network testers.

20. 

A, D. The telnet and rlogin commands enable you to log into a remote system. The telnet command automatically asks you for your username. The rlogin command assumes that you are logging in as your current identity. To specify otherwise, use the rlogin -l command.




Solaris 9. Sun Certified System Administrator Study Guide
Solaris 9 Sun Certified System Administrator Study Guide
ISBN: 0782141811
EAN: 2147483647
Year: 2003
Pages: 194

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net