Assume you are on a system that has a valid use account johnjay Consider the following command-line invocation:
rolemod –p “Network Administrator,All,Stop” johnjay
What is the result?
You administer an Oracle Solaris 11 system that uses a user-defined Network Configuration Profile (NCP). You now need to modify the DNS name servers. Select the profile type that you will need to modify.
By default, which directory does the audit_binfile plug-in write log files in, and what is the maximum size of each log file?
You are the primary administrator for a set of Oracle Solaris 11 servers. You noticed some changes to configuration files.
You are concerned that someone may have unauthorized access or that an authorized user may be abusing the access privilege. You decide to track a set of security events across multiple servers. How will you configure the systems for this?
Which option lists default checkpoints for building an image using the Distribution Constructor?
You are considering using IPMP and Link Aggregation. Which two statements are true about these technologies?
Which three options will take precedence over one-another in a local zone that uses the Fair Share Scheduler?
Consider the following commands and output on the local server:
Also, consider the following route table entry on a remote system:
192.168.2.0 192.168.1.200 UG 1 1
You must configure a virtual switch to connect over net0 to the remote system. Select two commands that complete the configuration.
You administer an Oracle Solaris 11 server with multiple zones. You want to configure it so that all nonprivileged users in the global zone see only their own process.
What must you do to make the change?
User Frank is a member of two projects. He currently has a process running. He needs to move the process from its current project to the other project. Which command must Frank use to determine the process’ task ID?
How many Network Configuration Units (NCUs) are required to configure a working Network Configuration Profile (NCP)?
While examining an Oracle Solaris 11 system, you discover an unfamiliar ELF binary in the /usr/bin directory. You want to know which package installed the binary. Which pkg subcommand should you use to identify the package, based on the absolute path to the binary?
You have set resource controls on a project. Now you want to set up syslog to monitor a particular resource control and log a message whenever the resource control is exceeded.
Which option would you choose to activate logging on the global resource control facility to establish a syslog action on a resource control?
Which is the result of the following command?
# zfs send –i dpool/sales/qrreports@qtrreport dpool/sales/qrreports@mth3qtrreport
Select the two requirements of all interfaces in an IP network multipathing group (IPMP).
You appended a site-specific Rights Profile to the /etc/security/prof_attr file.
Which file will be updated as a result of this operation?