1. A _______ is a program that resides in system memory. When called upon it performs a specific system function. Administrators can specify which ones they wish their system to run using scripts or start them manually from the command line.
a. kernel
b. daemon
c. operating system
d. server
Answer: b
2. A _______ is a functional grouping of files & directories.
a. bundle
b. fileset
c. package
d. sector
Answer: c
3. A cluster is a logical grouping of _______.
a. bundles
b. filesets
c. packages
d. sectors
Answer: c
4. A computer named ABOX is a trusted host of BBOX. Which is true of users on ABOX trying to access BBOX?
a. users never need an additional password to login to BBOX
b. users must each be in ABOX's /etc/hosts.equiv file in order to avoid password prompting
c. the /etc/hosts.equiv checking is skipped if executing a command as superuser
d. all must have password entries in the /etc/shadow file of BBOX
Answer: c
5. A file permission is listed as following : -rw-rw-r-- filen, which commands do not change its permissions?
a. chmod u-w filen
b. chmod u-x filen
c. chmod g-w filen
d. chmod g-x filen
Answer: b,d
Neither the user nor the group have execute permissions, therefore, removing the execute permissions causes no change.
6. A logical collection of files and directories contained in a partition is a _______.
a. fileset
b. sector
c. sub-directory
d. file system
Answer: d
7. A system is multitasking when:
a. more than one user can run processes
b. multiple users can login
c. more than one process is allowed per user
d. a processor can run more than one task at a time
Answer: d
The key here is to note that the question is about a *system* multitasking, not users.
8. A tree of directories and files is called:
a. a file system
b. a cluster
c. a hard drive
d. a partition
Answer: a
9. A user account that is a member of the sysadmin group can perform:
a. adding/deleting users
b. adding/deleting printers
c. adding/removing packages
d. adding/removing patches
e. adding/removing hardware
Answer: a,b,c
10. Besides the pkgadd command, what is another way to install a software package?
a. pkginfo
b. pkgtool
c. admintool
d. instpkg
Answer: c
Admintool provides a GUI interface for manipulating packaged software.
11. Besides the root file system, what other file system is required to boot a usable system ?
a. /usr
b. /var
c. /opt
d. /home
e. none of the above
Answer: a
The /usr file system is a locally mounted standard ufs type file system used to store system files and directories. This file system contains files that are specific to the architecture of the system, such as SPARC executables.
12. Consider the following: "cp /etc/rc2.d/S22mylp /etc/rc2.d/.S22mylp.orig"
a. There is a problem, because init will execute both run control files at startup.
b. There is a problem, because init will get confused and fail to run at startup.
c. This is not a problem, because they will cancel each other out when init executes both files at startup.
d. This is not a problem, because .S22mylp.orig will not be executed by init at startup.
Answer: d
Init will only process start/stop files the beging with uppercase "S" or uppercase "K".
13. "cp a b report", what does "report" represent?
a. a file
b. an option
c. a directory
d. a user name
Answer: c
14. Environment variables are known in all _______ created after the variable is defined.
a. sub-shells
b. aliases
c. processes
d. jobs
Answer: a
15. Excluding diskettes, the only type of disk-based file system that can be created on a standard
Solaris 8 operating system is UFS.
a. true
b. false
Answer: a
16. Executables can be identified as such by:
a. an asterisk following the name using the ls -F command
b. a hyphen in the first column using the ls -l command
c. the directory in which they reside
d. a filename ending in .exe
Answer: a
17. Regarding "file1" below. Why does the time stamp show year instead of minutes like it does in "file2"?
<br><img src="../Samples/Samples/dirlist.gif">
a. executables display that kind of time stamp by default
b. files larger than 100000 bytes use different time stamps
c. tom tailored his .profile script to make this happen
d. the file was last modified more than 6 months ago, so this is normal
Answer: d
18. Regarding "file2" below. Why does it display a user-owner of "157" instead of a login-id?
<br><img src="../Samples/Samples/dirlist.gif">
a. 157 is a valid login-id in the /etc/passwd file
b. this file is linked to a file with inode 157
c. it was created by someone with uid 157. Then that user was deleted from /etc/passwd
d. it was created by someone with gid 157. Then that user was deleted from /etc/shadow
Answer: c
19. For a directory named /tmp with absolute mode permissions of 777, change the permissions to add the sticky bit:
a. chmod 1777 /tmp
b. chmod o+t /tmp
c. chmod 2777 /tmp
d. chmod g+s /tmp
Answer: a
20. For files /etc/hosts.equiv and $HOME/.rhosts, which is true:
a. created by superuser only
b. related to system access security
c. created by default during the installation
d. run first during install
Answer: b
21. For run level 3, the rc program is _______ and the rc script directory is _______. (In order)
a. /etc/rc3 and /etc/rc3d
b. /etc/rc3 and /etc/rc.3d
c. /etc/rc3.d and /etc/rc3
d. /etc/rc3 and /etc/rc3.d
Answer: d
22. For the device name /dev/dsk/c0t3d0sa, what does the letter 'a' identify ?
A. partition
B. disk
C. controller
D. slice
Answer: A,D
A partition and a slice are synonymous terms.
23. From where does the root account obtain it's special privileges?
a. any account with a login-id of "root" is treated specially by the system
b. the UID of 0 associated with the "root" account gives it special privilege
c. it is inherited from the file system which is also named root
d. the root account has no special powers
Answer: b
24. The ______ acts as an intermediary between applications running on a computer and the hardware inside the computer. It controls physical and virtual memory, schedules processes, and starts and stops daemons. All commands interact with it.
a. file system
b. shell
c. storage
d. kernel
Answer: d
25. Which shells are available by default in Solaris 8?
a. Bourne shell
b. Korn shell
c. C shell
d. Z shell
e. TC shell
f. Ash shell
g. PDKSH shell
h. BASH shell
Answer: a,b,c,d,e,h
26. The ______ is the intermediary between the users and the computer. It accepts user input, routes it to the proper device for processing, and returns program output back to the user, and interacts with peripherals through device drivers written specially for each component of the system.
a. kernel
b. file system
c. operating system
d. daemon
Answer: c
27. When viewing a man-page, which character will allow a forward-search through the text?
a. ?
b. h
c. s
d. /
e. e
Answer: d
28. When viewing a man-page, which character will display helpful commands that can be used?
a. ?
b. h
c. s
d. /
e. e
Answer: b
29. What key-sequence will interrupt the running OS and return to the OpenBoot "ok" prompt?
a. ctrl-c
b. ctrl-alt-del
c. stop-n
d. stop-a
Answer: d
The stop-n sequence may be used while the system is booting to reset the values of the NVRAM to the factory defaults.
30. As the system boots up, the stop-d sequence is initiated. What will this accomplish?
a. diagnostic mode will be run
b. the system will stop booting
c. the system NVRAM will be reset to factory defaults
d. nothing
Answer: a
The stop-d sequence during the OpenBoot phase will initiate diagnostic mode, accomplishing the same as "diag-switch?=true".
31. As the system boots up, the stop-n sequence is initiated. What will this accomplish?
a. diagnostic mode will be run
b. the system will stop booting
c. the system NVRAM will be reset to factory defaults
d. nothing
Answer: c
32. Aliases defined by the OpenBoot ______ command are lost during a system reboot or reset.
a. nvalias
b. setenv
c. devalias
d. sunalias
Answer: c
The OpenBoot nvalias command can be used to permanently store alias configurations. The command devalias does not permanently store alias configurations.
33. Aliases defined by the OpenBoot ______ command are stored in NVRAM and are not lost after reboot.
a. nvalias
b. setenv
c. devalias
d. sunalias
Answer: a
The OpenBoot nvalias command can be used to permanently store alias configurations. The command devalias does not permanently store alias configurations.
34. How many lines do the commands "head" and "tail" display by default?
a. 10 lines
b. 5 lines
c. 15 lines
d. 20 lines
Answer: a
35. How many system run levels are there?
a. 4
b. 6
c. 8
d. 9
Answer: c
Run Levels: 0, s or S, 1, 2, 3, 4, 5, 6
36. What key-sequence moves the cursor one character to the left in vi?
a. l
b. u
c. k
d. h
Answer: d
37. What key-sequence moves the cursor one character to the right in vi?
a. l
b. u
c. k
d. h
Answer: a
38. What key-sequence changes the mode to insert/edit in vi?
a. d
b. i
c. x
d. e
Answer: b
39. What key-sequence deletes the current character in vi?
a. d
b. i
c. x
d. e
Answer: c
40. What key-sequence searches backwards in vi?
a. ?
b. /
c. s
d. b
Answer: a
41. What does "cp file1 file2" accomplish?
a. copies file1 and file2 into buffer
b. moves file1 to file2
c. adds the contents of file1 to file2
d. copies file1 to file2
Answer: d
42. Which command displays disk-usage in MB?
a. df -k
b. quota -k
c. df -MB
d. du
Answer: a
43. Which searches the entire system for the file "filex" and reports results?
a. find / -name filex -print
b. find / -filex -print
c. find / -find filex -print
d. find filex -print
Answer: a
44. Which key-sequence will quit vi without saving changes?
a. :q!
b. :q
c. :ZZ
d. ctrl-d
Answer: a
45. Which answer will provide online help regarding "login"?
a. help
b. help login
c. cat login
d. man login
Answer: d
46. ______ will remove the widget directory, and if example is now empty, remove example as well.
a. rmdir -p example/widget
b. rm example/widget
c. rf -p example/widget
d. rm -rf widget
Answer: a
47. The mkdir command creates directories with default permissions ______ (which is then modified by the umask value).
a. 555
b. 444
c. 666
d. 777
Answer: d
Directories are created with default permissions 777 and altered by umask. For example, if umask is set to 022, then a directory created would be default permissions 777 - 022 = 755.
48. What is accomplished by executing the following command "cd ~/files"?
a. the working directory is changed to the subdirectory /files in /
b. the working directory is changed to ./files
c. an error is returned because it is not valid to use ~ (tilde) in this fashion
d. the working directory is changed to the /files subdirectory of the user's home directory
Answer: d
49. ______ will generate a listing of all files stored on /dev/rmt/0.
a. tar cvf
b. ufsrestore t
c. ufsrestore f /dev/rmt/0
d. tar -vf /dev/rmt/0
Answer: b
50. The ______ command is a new tool for adding devices to the system without requiring reboot.
a. fsadm
b. devfsadm
c. fsadmdev
d. devadm
Answer: b
51. From the OpenBoot prompt "boot -s" starts the system in ______ mode.
a. setup
b. install
c. interactive
d. verbose
e. single-user
Answer: e
52. The command "tar cvf matt.tar *" will:
a. not work
b. create a tar file with the name "matt.tar" and include all the files in the local directory
c. open the tar file named "matt.tar" and expand all the files in the archive
d. create a tar file with the name "*" containing the files "matt" and "tar"
Answer: b
53. ______ is the directory where configuration files are stored.
a. /usr
b. /tmp
c. /export/
d. /etc
Answer: d
The /etc directory contains host-specific system administrative configuration files and databases.
54. ______ is the directory that can serve as the root of file systems that are shared.
a. /
b. /usr/export/
c. /export/
d. /etc
Answer: c
The /export directory is not a file system by default; rather, is a part of the root directory
|