Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

Assume you are on a system that has a valid use account johnjay Consider the following command-line invocation:

rolemod –p “Network Administrator,All,Stop” johnjay

What is the result?

A.

The user will not acquire profiles allowed in /etc/secutity/policy.conf

B.

There is no effect. The user acquires all profiles before the Stop profile is read.

C.

The system will return an error.

D.

The user gets Network Administrator profile and all profiles listed in the All macro.

Full Access
Question # 5

You administer an Oracle Solaris 11 system that uses a user-defined Network Configuration Profile (NCP). You now need to modify the DNS name servers. Select the profile type that you will need to modify.

A.

Automatic-NCP

B.

Location profile

C.

Network Configuration Unit

D.

External Network Modifiers

Full Access
Question # 6

By default, which directory does the audit_binfile plug-in write log files in, and what is the maximum size of each log file?

A.

/var/adm/audit, 100 MB

B.

/var/audit, 100 MB

C.

/var/adm, no limit

D.

/var/audit, no limit

E.

/var/adm/audit, 16 EB

Full Access
Question # 7

You are the primary administrator for a set of Oracle Solaris 11 servers. You noticed some changes to configuration files.

You are concerned that someone may have unauthorized access or that an authorized user may be abusing the access privilege. You decide to track a set of security events across multiple servers. How will you configure the systems for this?

A.

Configure a centralized system-logging server and direct all servers to use it.

B.

Use audit-config to add the servers' host names to the audit_remote plug in.

C.

Add centralized NFS file systems to the /etc/security/audit_control file on each server.

D.

Modify the /etc/security/audit_startup file and add audit_remote logging on each server.

Full Access
Question # 8

Which option lists default checkpoints for building an image using the Distribution Constructor?

A.

manifest-valid and ba-init

B.

ba-arch and grub-setup

C.

transfer-ips-install and pre-pkg-img-mod

D.

pkg-img mod and create-usb

Full Access
Question # 9

You are considering using IPMP and Link Aggregation. Which two statements are true about these technologies?

A.

IPMP requires all interfaces to support the same bit rate.

B.

Both technologies can increase outbound bandwidth.

C.

Link Aggregation does not offer link failure protection.

D.

Link Aggregation requires all interfaces to support the same bit rate.

E.

IPMP supports load spreading across all interfaces for inbound traffic

Full Access
Question # 10

Which three options will take precedence over one-another in a local zone that uses the Fair Share Scheduler?

A.

the global resource control zone.cpu-shares

B.

the global default scheduling class

C.

the local zone attribute scheduling-class

D.

the local zone attribute cpu-shares

E.

the scheduling class of the pool assigned to a zone

Full Access
Question # 11

Consider the following commands and output on the local server:

Also, consider the following route table entry on a remote system:

192.168.2.0 192.168.1.200 UG 1 1

You must configure a virtual switch to connect over net0 to the remote system. Select two commands that complete the configuration.

A.

ipadm set-ifprop –p forwarding=on net0

B.

ipadn set-prop –p forwarding=on vnic2

C.

ipacim set-prop –p forwarding=on ipv4

D.

ipadm set-prop –p routing=on net0

E.

routeadm –ue ipv4-forwarding

F.

routeadm –ue ipv4-routing

Full Access
Question # 12

Which sequence of commands will create a virtual network interface?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 13

You administer an Oracle Solaris 11 server with multiple zones. You want to configure it so that all nonprivileged users in the global zone see only their own process.

What must you do to make the change?

A.

Modify the LIMITPRIV variable in the /etc/usr/user_attr file.

B.

Modify the basic privilege ser in the /etc/security/policy.conf file.

C.

Configure the priv= attribute in the /etc/security/prof_attr.d/core-os file.

D.

Configure privileges for the ps command in the /etc/security/exec_attrd/core-os file.

Full Access
Question # 14

Which utility/service must you use to set processes with FSS by default?

A.

priocntl

B.

svc:/system/scheduler:default

C.

dispadmin

D.

projmod

Full Access
Question # 15

User Frank is a member of two projects. He currently has a process running. He needs to move the process from its current project to the other project. Which command must Frank use to determine the process’ task ID?

A.

projects

B.

prtcl

C.

id

D.

ps

Full Access
Question # 16

How many Network Configuration Units (NCUs) are required to configure a working Network Configuration Profile (NCP)?

A.

0

B.

1

C.

2

D.

3

Full Access
Question # 17

While examining an Oracle Solaris 11 system, you discover an unfamiliar ELF binary in the /usr/bin directory. You want to know which package installed the binary. Which pkg subcommand should you use to identify the package, based on the absolute path to the binary?

A.

pkg info

B.

pkg list

C.

pkg search

D.

pkg contents

Full Access
Question # 18

You have set resource controls on a project. Now you want to set up syslog to monitor a particular resource control and log a message whenever the resource control is exceeded.

Which option would you choose to activate logging on the global resource control facility to establish a syslog action on a resource control?

A.

Use the rctladm command to enable the global syslog attribute of a resource control.

B.

Use the prctl command to enable the global syslog attribute of resource control.

C.

Use the ipcs command to enable the global syslog attribute of a resource control.

D.

Use the setrctl command to enable the global syslog attribute of a resource control.

E.

By default, global logging of resource control violations is already enabled. Make an entry in the syslog.conf file and refresh the system-log service.

Full Access
Question # 19

Which is the result of the following command?

# zfs send –i dpool/sales/qrreports@qtrreport dpool/sales/qrreports@mth3qtrreport

A.

An error message will be sent to standard error.

B.

The dpool/sales/qrreports@qtrreport snapshot is saved to disk.

C.

The dpool/sales/qrreports@mth3qtrreport snapshot is saved to disk

D.

The difference between the First snapshot and the second snapshot will be written to disk

Full Access
Question # 20

Select the two requirements of all interfaces in an IP network multipathing group (IPMP).

A.

be statically configured

B.

have test IP addresses configured

C.

have data IP addresses configured

D.

be connected to the same IP subnet

E.

have the same set of STREAMS modules

Full Access
Question # 21

You appended a site-specific Rights Profile to the /etc/security/prof_attr file.

Which file will be updated as a result of this operation?

A.

/etc/security/prof_attr.d/local-entries

B.

/etc/security/prof_attr.d/prof_attr

C.

/etc/security/prof_attr.d/core-os

D.

/etc/user_attr

Full Access