April 6, 2009

Linux \ Solaris Interview Question – 13

Question 301) The reason why Solaris is distributive is that
a use of resources across network
b distribution of computers on network
c more than on person can access one file at the same time

Ans: a

Question 302) Which 2 commands or utilities can be used to display a list of active process?
a prstat
b sdtprocess
c ps -al
d proc

Ans: a,b

Question 303) What should I modify if I would like to change the password aging period?
a /etc/shadow
b /etc/password
c /etc/default/passwd
d /etc/inetinit

Ans: c

Question 304) What command allows you to log into remote systems, including non-UNIX systems?
a rlogin
b telnet
c remote

Ans:b

Question 305) What is minimum file system required other than /root
a /etc
b /export/home
c /usr
d /user

Ans: c

Question 306) What is the ftp command used for?
a send files to a remote system
b get files from a remote system.
c transfer files using ASCII, binary, DOS, or UNIX format
d All the above

Ans: d

Question 307) The /etc/cron.d/cron.deny file exists, but not the /etc/cron.d/cron.allow file Which of the following statements is true regarding access to the cron capability?
a Without a cron.allow file, no one, including root, is allowed to create,edit, or delete crontab files.
b Without a cron.allow file, only root is allowed to create, edit, or delete crontab files.
c Any user account not listed in the cron.deny file can create, edit, or delete crontab files.
d Any user account listed in the cron.deny file cannot create, edit, or delete crontab files.

Ans: c,d

Question 308) Questionuick install installs which cluster of packages ?
a core
b entire OS
c developer's package
d end-users' package

Ans: c

Question 309) What #rsh machinename does ?
a create a remote shell on local machine
b log user into a remote shell
c log user into the remote machine
d run a command on the remote machine, then exit

Ans: c

Question 310) What command identifies who is logged in on the network?
a rusers
b whoami
c rlog

Ans: a

Question 311) You are aware of a scheduled power outage Which 3 commands protect your computer against power outage?
a shutdown -i 0 -g 300 -y
b shutdown -i 1 -g 300 -y
c shutdown -i 5 -g 300 -y

Ans a,b,c

Question 312) The entry "SULOG=/var/adm/sulog" to enable logging of su usage is added to which of the following files?
a /dev/console
b /etc/passwd
c /etc/default/login
d /etc/default/su
e /var/adm/loginlog

Ans: d

Question 313) What is the ping command used for?
a to determine if the named host is up and running
b to determine if the pong is working.
c to determine if a user is logged into a specific workstation.

Ans: a

Question 314) the command used to check the accuracy of package installation
a pkginfo
b shpkg
c testpkg
d showrev -p

Ans: a

Question 315) What command displays the status of various network-related data structures?
a status
b netstat
c rstat

Ans: b

Question 316) What is the task of the compress command?
a Used to combine two files into one
b Used to compress files.
c Used to combine two or more files into one

Ans: b

Question 317) What is the result of the following command?
setfacl -s urw-,gr--,or--file1
a Access mode 644 is added to the existing ACLs for file1.
b Access mode 644 is deleted from the existing ACLs for file1.
c Access mode 644 replaces the existing ACLs for file1.
d Access mode 622 is added to the existing ACLs for file1.
e Access mode 622 replaces the existing ACLs for file1.

Ans: c

Question 318) What can verify the accuracy and integrity of a software package?
a pkgchk
b pkgchk -l
c pkginfo -l
d pkginfo -v

Ans: a

Question 319) What is the uuencode command used for?
a Create an ACSII-encoded representation of the binary file
b Create a file with a password protection.
c Create a directory with password protection.

Ans: a

Question 320) Which file contains the characteristics definition of printers stored?
a /usr/share/lib/terminfo
b /usr/share/lib/termcap
c /usr/share/lib/printer
d /etc/default/printer

Ans: a


Question 321) Which commands can be used to install a package from CD-ROM?
a admintool with Source Media set to CD with Volume Management
b pkgadd -d /cdrom/cdrom0
c admintool with Source Media set to CD without Volume Management
d pkgadd -s /cdrom/cdrom0

Ans: a,b,c

Question 322) What command is used to send mail from the command line?
a mailx
b sendmail
c xmail

Ans: a

Question 323) Shell is
a interpreter and trAns:lator
b carry out user requests.
c act as a programming language only

Ans: a

Question 324) What database consists of a series of files that describe control sequnces?
a termcon
b terminfo
c datainfo

Ans: b

Question 325) Every printer definition must contain two things. What are they?
a printer type , printer name
b printer type , location
c content type , printer type

Ans: c

No comments:

Post a Comment