Question 301) The reason why Solaris is distributive is that
a use of resources across network
b distribution of computers on network
c more than on person can access one file at the same time
Ans: a
Question 302) Which 2 commands or utilities can be used to display a list of active process?
a prstat
b sdtprocess
c ps -al
d proc
Ans: a,b
Question 303) What should I modify if I would like to change the password aging period?
a /etc/shadow
b /etc/password
c /etc/default/passwd
d /etc/inetinit
Ans: c
Question 304) What command allows you to log into remote systems, including non-UNIX systems?
a rlogin
b telnet
c remote
Ans:b
Question 305) What is minimum file system required other than /root
a /etc
b /export/home
c /usr
d /user
Ans: c
Question 306) What is the ftp command used for?
a send files to a remote system
b get files from a remote system.
c transfer files using ASCII, binary, DOS, or UNIX format
d All the above
Ans: d
Question 307) The /etc/cron.d/cron.deny file exists, but not the /etc/cron.d/cron.allow file Which of the following statements is true regarding access to the cron capability?
a Without a cron.allow file, no one, including root, is allowed to create,edit, or delete crontab files.
b Without a cron.allow file, only root is allowed to create, edit, or delete crontab files.
c Any user account not listed in the cron.deny file can create, edit, or delete crontab files.
d Any user account listed in the cron.deny file cannot create, edit, or delete crontab files.
Ans: c,d
Question 308) Questionuick install installs which cluster of packages ?
a core
b entire OS
c developer's package
d end-users' package
Ans: c
Question 309) What #rsh machinename does ?
a create a remote shell on local machine
b log user into a remote shell
c log user into the remote machine
d run a command on the remote machine, then exit
Ans: c
Question 310) What command identifies who is logged in on the network?
a rusers
b whoami
c rlog
Ans: a
Question 311) You are aware of a scheduled power outage Which 3 commands protect your computer against power outage?
a shutdown -i 0 -g 300 -y
b shutdown -i 1 -g 300 -y
c shutdown -i 5 -g 300 -y
Ans a,b,c
Question 312) The entry "SULOG=/var/adm/sulog" to enable logging of su usage is added to which of the following files?
a /dev/console
b /etc/passwd
c /etc/default/login
d /etc/default/su
e /var/adm/loginlog
Ans: d
Question 313) What is the ping command used for?
a to determine if the named host is up and running
b to determine if the pong is working.
c to determine if a user is logged into a specific workstation.
Ans: a
Question 314) the command used to check the accuracy of package installation
a pkginfo
b shpkg
c testpkg
d showrev -p
Ans: a
Question 315) What command displays the status of various network-related data structures?
a status
b netstat
c rstat
Ans: b
Question 316) What is the task of the compress command?
a Used to combine two files into one
b Used to compress files.
c Used to combine two or more files into one
Ans: b
Question 317) What is the result of the following command?
setfacl -s urw-,gr--,or--file1
a Access mode 644 is added to the existing ACLs for file1.
b Access mode 644 is deleted from the existing ACLs for file1.
c Access mode 644 replaces the existing ACLs for file1.
d Access mode 622 is added to the existing ACLs for file1.
e Access mode 622 replaces the existing ACLs for file1.
Ans: c
Question 318) What can verify the accuracy and integrity of a software package?
a pkgchk
b pkgchk -l
c pkginfo -l
d pkginfo -v
Ans: a
Question 319) What is the uuencode command used for?
a Create an ACSII-encoded representation of the binary file
b Create a file with a password protection.
c Create a directory with password protection.
Ans: a
Question 320) Which file contains the characteristics definition of printers stored?
a /usr/share/lib/terminfo
b /usr/share/lib/termcap
c /usr/share/lib/printer
d /etc/default/printer
Ans: a
Question 321) Which commands can be used to install a package from CD-ROM?
a admintool with Source Media set to CD with Volume Management
b pkgadd -d /cdrom/cdrom0
c admintool with Source Media set to CD without Volume Management
d pkgadd -s /cdrom/cdrom0
Ans: a,b,c
Question 322) What command is used to send mail from the command line?
a mailx
b sendmail
c xmail
Ans: a
Question 323) Shell is
a interpreter and trAns:lator
b carry out user requests.
c act as a programming language only
Ans: a
Question 324) What database consists of a series of files that describe control sequnces?
a termcon
b terminfo
c datainfo
Ans: b
Question 325) Every printer definition must contain two things. What are they?
a printer type , printer name
b printer type , location
c content type , printer type
Ans: c
a use of resources across network
b distribution of computers on network
c more than on person can access one file at the same time
Ans: a
Question 302) Which 2 commands or utilities can be used to display a list of active process?
a prstat
b sdtprocess
c ps -al
d proc
Ans: a,b
Question 303) What should I modify if I would like to change the password aging period?
a /etc/shadow
b /etc/password
c /etc/default/passwd
d /etc/inetinit
Ans: c
Question 304) What command allows you to log into remote systems, including non-UNIX systems?
a rlogin
b telnet
c remote
Ans:b
Question 305) What is minimum file system required other than /root
a /etc
b /export/home
c /usr
d /user
Ans: c
Question 306) What is the ftp command used for?
a send files to a remote system
b get files from a remote system.
c transfer files using ASCII, binary, DOS, or UNIX format
d All the above
Ans: d
Question 307) The /etc/cron.d/cron.deny file exists, but not the /etc/cron.d/cron.allow file Which of the following statements is true regarding access to the cron capability?
a Without a cron.allow file, no one, including root, is allowed to create,edit, or delete crontab files.
b Without a cron.allow file, only root is allowed to create, edit, or delete crontab files.
c Any user account not listed in the cron.deny file can create, edit, or delete crontab files.
d Any user account listed in the cron.deny file cannot create, edit, or delete crontab files.
Ans: c,d
Question 308) Questionuick install installs which cluster of packages ?
a core
b entire OS
c developer's package
d end-users' package
Ans: c
Question 309) What #rsh machinename does ?
a create a remote shell on local machine
b log user into a remote shell
c log user into the remote machine
d run a command on the remote machine, then exit
Ans: c
Question 310) What command identifies who is logged in on the network?
a rusers
b whoami
c rlog
Ans: a
Question 311) You are aware of a scheduled power outage Which 3 commands protect your computer against power outage?
a shutdown -i 0 -g 300 -y
b shutdown -i 1 -g 300 -y
c shutdown -i 5 -g 300 -y
Ans a,b,c
Question 312) The entry "SULOG=/var/adm/sulog" to enable logging of su usage is added to which of the following files?
a /dev/console
b /etc/passwd
c /etc/default/login
d /etc/default/su
e /var/adm/loginlog
Ans: d
Question 313) What is the ping command used for?
a to determine if the named host is up and running
b to determine if the pong is working.
c to determine if a user is logged into a specific workstation.
Ans: a
Question 314) the command used to check the accuracy of package installation
a pkginfo
b shpkg
c testpkg
d showrev -p
Ans: a
Question 315) What command displays the status of various network-related data structures?
a status
b netstat
c rstat
Ans: b
Question 316) What is the task of the compress command?
a Used to combine two files into one
b Used to compress files.
c Used to combine two or more files into one
Ans: b
Question 317) What is the result of the following command?
setfacl -s urw-,gr--,or--file1
a Access mode 644 is added to the existing ACLs for file1.
b Access mode 644 is deleted from the existing ACLs for file1.
c Access mode 644 replaces the existing ACLs for file1.
d Access mode 622 is added to the existing ACLs for file1.
e Access mode 622 replaces the existing ACLs for file1.
Ans: c
Question 318) What can verify the accuracy and integrity of a software package?
a pkgchk
b pkgchk -l
c pkginfo -l
d pkginfo -v
Ans: a
Question 319) What is the uuencode command used for?
a Create an ACSII-encoded representation of the binary file
b Create a file with a password protection.
c Create a directory with password protection.
Ans: a
Question 320) Which file contains the characteristics definition of printers stored?
a /usr/share/lib/terminfo
b /usr/share/lib/termcap
c /usr/share/lib/printer
d /etc/default/printer
Ans: a
Question 321) Which commands can be used to install a package from CD-ROM?
a admintool with Source Media set to CD with Volume Management
b pkgadd -d /cdrom/cdrom0
c admintool with Source Media set to CD without Volume Management
d pkgadd -s /cdrom/cdrom0
Ans: a,b,c
Question 322) What command is used to send mail from the command line?
a mailx
b sendmail
c xmail
Ans: a
Question 323) Shell is
a interpreter and trAns:lator
b carry out user requests.
c act as a programming language only
Ans: a
Question 324) What database consists of a series of files that describe control sequnces?
a termcon
b terminfo
c datainfo
Ans: b
Question 325) Every printer definition must contain two things. What are they?
a printer type , printer name
b printer type , location
c content type , printer type
Ans: c
No comments:
Post a Comment