Question 376) Which is the directory that stores all the default hidden initialization file in the users' home directories when they were first created
a /etc/default/login
b /etc/default/
c /etc/skel/
d /etc/profile/
e /etc/home/
f /etc/.login/
Ans: c
Question 377) What is the difference between at and crontab ?
a crontab jobs scheduled to run once, at jobs scheduled to run many times
b crontab is the scheduler, at executes the commands
c at is the scheduler, crontab executes the commands
d crontab jobs are scheduled to run many times, at jobs are scheduled to run once
Ans: d
Question 378) Which command should be used to extract the file install.log from the backp.tar file which is in tar format?
a tar cvf backup.tar install.log
b tar xvf backup.tar install.log
c tar evf backup.tar install.log
Ans: b
Question 379) Which of the following situations will allow a user account to execute admintool?
a The account is a member of the sysadmin group.
b The account is root.
c The account is logged in at the console
d The account is a member of the sys group.
e The account is a member of the adm group.
Ans: a,b
Question 380) How to use rcp ?
a rcp file remote_host /tmp
b rcp
c rcp remote_host file /tmp
d rcp file remote_host/tmp
Ans: d
Question 381) Which of the following are valid fields in /etc/passwd?
a encrypted password
b user ID
c loginID
d primary groupID
e default shell
f secondary groupID
g password aging
Ans: b,c,d,e
Question 382) Why environment variables are defined in .login ?
a Since environment are inherited from .login
b Since .login is executed when each shell is started
Ans: a
a /etc/default/login
b /etc/default/
c /etc/skel/
d /etc/profile/
e /etc/home/
f /etc/.login/
Ans: c
Question 377) What is the difference between at and crontab ?
a crontab jobs scheduled to run once, at jobs scheduled to run many times
b crontab is the scheduler, at executes the commands
c at is the scheduler, crontab executes the commands
d crontab jobs are scheduled to run many times, at jobs are scheduled to run once
Ans: d
Question 378) Which command should be used to extract the file install.log from the backp.tar file which is in tar format?
a tar cvf backup.tar install.log
b tar xvf backup.tar install.log
c tar evf backup.tar install.log
Ans: b
Question 379) Which of the following situations will allow a user account to execute admintool?
a The account is a member of the sysadmin group.
b The account is root.
c The account is logged in at the console
d The account is a member of the sys group.
e The account is a member of the adm group.
Ans: a,b
Question 380) How to use rcp ?
a rcp file remote_host /tmp
b rcp
c rcp remote_host file /tmp
d rcp file remote_host/tmp
Ans: d
Question 381) Which of the following are valid fields in /etc/passwd?
a encrypted password
b user ID
c loginID
d primary groupID
e default shell
f secondary groupID
g password aging
Ans: b,c,d,e
Question 382) Why environment variables are defined in .login ?
a Since environment are inherited from .login
b Since .login is executed when each shell is started
Ans: a
Question 383) What is the file that defines the default fields of /etc/shadow eg. the period of which a user must change his/her password and the minimum period that the user must change his/her password This file also specifies the minimum password length?
a /etc/default/passwd
b /etc/default/shadow
c /etc/default/useradd
d /etc/default/login
e /etc/default/skel
Ans: a
Question 384) What are the initialization files if a user uses C shell
a /etc/profile
b /etc/profile
c /etc/login
d /etc/skel/local.cshrc
Ans: c
Question 385) Which of the following are serial devices?
a CPU
b memory
c terminal
d printer
Ans: c,d
Question 386) What is the impact of DTSOURCEPROFILE=true in the .dtprofile of a user account that uses the C shell as the login shell?
a None-only accounts that use the Bourne and Korn shells as login shells are affected
b The .profile file in the home directory of the user account is sourced
c The .login file in the home directory of the user account is sourced
d The .cshrc file in the home directory of the user account is sourced
Ans: c
Question 387) Which of the following command gives read and write permission to the owner of a new file, read permission to group, and no permissions to others or gives all permissions to the owner of a new directory, read and execute permissions to group, and no permissions to others
a umask 022
b umask 027
c umask 755
d umask 644
e umask 750
Ans: b
Question 388) Determine the option of the setfacl command that is used to replace the entire ACL with the new ACL
a -m
b -s
c -d
d -r
e -c
Ans: b
Question 389) What is the usage of an inode?
a stores the file type
b stores the file size
c stores the content of the file or directory
d None of above
Ans: a , b
Question 390) Which slice of a hardisk in unix file system represents the entire disk by definition
a 0
b 1
c 2
d 3
e 4
Ans: c
Question 391) The command used to mount an ISO format CDROM
a mount
b mount -F ISO -r /dev
c mount -f ISO CDROM
d mount -F ISO CDROM -r /dev
Ans: b
Question 392) Which of the following command report on all mounted file systems and include the number of files
a quot -af
b quot -mn
c quot -an
d quot -mf
Ans: a
Question 393) What is the access mode of a file created with the umask set to 123?
a 321
b #NAME?
c 345
d rw-r--r--
Ans: d
Question 394) Which of the following directory contains executable commands, system administration utilities,and library routines
a /root
b /sbin
c /usr
d /lib
e /opt
f /bin
Ans: c
Question 395) Which Solaris utility is used to partition a hardisk ?
a fdisk
b format
c newfs
d makefs
e fsck
Ans: b
Question 396) Which command show all mounted file systems ?
a mount
b mountall
c umount
d umountall
Ans: a
Question 397) What is the main advantage of using a striped virtual file system compared to concatenated virtual file system?
a We can create a volume that is larger than one disk
b We can use more than one slice in a single file system
c We can increase the size of a file system while it is in use
d We can increase the file system Input/Output performance
e We can have special data compression algorithms that increase the storage capacity
Ans: d
Question 398) A user logs into a system running Solaris 8 OE using the telnet command The user has been assigned a Korn Shell (Ksh) and home /home/user1 directory. The following files are executed on login by user1.
a /home/user1/.kshrc
b /etc/profile
c /home/user1/.profile
In which order are they executed?
Ans: b,c,a
Question 399) Which of the following commands may be used to perform remote backup with crontab ?
a rlogin
b rsh
c ssh
d ksh
e telnet
Ans: b
Question 400) You want to print three copies of a file, how do you do this ?
a lp -3 file
b lp -n 3 file
c lp.....
Ans: b
No comments:
Post a Comment