Oracle Certified Associate (OCA), Oracle Solaris 11 System Administrator
1. Which installer is more appropriate for a stand-alone server installation?
A. Text-based installer CD
B. Live CD
C. USB installation
D. Automated Installer
2. Which of the following is NOT a characteristic of the text-based installer?
A. Does not require higher-end graphics cards
B. Does not require as much RAM as the Live CD
C. Is used to install Solaris 11’s graphical environment
D. Can be used to start an over-the-network installation
3. Which of the following installers is used to create multiple network-based install images?
A. USB installer
B. Text-based installer CD
C. Live CD
D. Automated Installer
4. Which of the following files can help verify or troubleshoot an installation?
A. Verification log
B. Install log
C. Network log
D. install.conf
5. Which of the following installers will only install on an x86 platform?
A. Setup.exe
B. Automated installer
C. Text-based installer
D. Live CD
6. Which package is installed by default as part of the text-based installer?
A. Solaris-desktop
B. Solaris-large-server
C. Solaris-common
D. Solaris.msi
7. What is the minimum disk space required for the text-based installer?
A. 2.5 GB
B. 5 GB
C. 7 GB
D. 13 GB
8. Which command allows you to inspect the contents of a software package?
A. pkg contents
B. pkg info
C. pkg verify
D. pkg inspect
9. Which command allows you to search for and install the most current versions of packages on
the system?
A. pkg refresh
B. pkg update
C. pkg install
D. pkg search
10. The GUI tool used with IPS is called:
A. IPS Manager
B. Package Manager
C. Solaris Package Manager
D. Solaris Software Updater
11. The default publisher that is included in an initial Solaris 11 installation, as indicated by the
pkg publisher
command, is:
A. solaris
B. Oracle
C. OpenSolaris
D. community
12. An alternate bootable image which has different kernel or software updates applied is called
a:
A. Dual-boot image
B. Inactive image
C. Boot Environment
D. Secondary image
13. Which command is used to delete a boot environment that is no longer needed?
A. beadm delete
B. beadm destroy
C. beadm update
D. beadm remove
14. Which GUI application can help you to manage Boot Environments?
A. Boot Environment Utility
B. Image Manager
C. Boot Manager
D. Package Manager
15. Which switch used with the svcs command can help troubleshoot dependency issues?
A. -d
B. -a
C. -l
D. -b
16. Which command is used to clear the maintenance state of a service?
A. svcadm reset
B. svcadm clear
C. svcadm -c
D. svcadm -r
17. What is the standard naming convention used in Solaris 11 service notation?
A. Uniform Resource Locator
B. Fault Management Resource Identifier
C. Service Naming System
D. Daemon Naming System
18. Which of the following is a valid FMRI service name?
A. svc:/localhost/network/nfs/server:default
B. svcs://localhost/network/nfs/server:default
C. svc://localhost/network/nfs/server/default
D. svc://localhost/network/nfs/server:default
19. What does Solaris 11 use instead of boot run-levels?
A. Init levels
B. Start-up groups
C. Milestones
D. Checkpoints
20. A service scheme that cannot be managed by the SMF is called a __________ service.
A. managed
B. primary
C. legacy
D. alternate
21. Which service state means that a service is running in a defined limited mode?
A. Maintenance
B. Offline
C. Disabled
D. Degraded
22. Which command enables a newly-created custom service?
A. svccfg enable NewService
B. svcadm enable NewService
C. svccfg import NewService
D. svcs enable NewService
23. Where are service logs located in the filesystem?
A. /var/svc/log
B. /var/logs
C. /etc/svcs
D. /tmp/logs
24. Which ZFS feature means no size restrictions on files and directories?
A. RAID parity support
B. 256-bit checksums
C. 128-bit addressing
D. Data compression
25. A structure containing directories and files is called a:
A. Pool
B. Filesystem
C. Clone
D. Snapshot
26. Which command is used to manage ZFS storage pools?
A. poolmgr
B. poolcfg
C. zfs pool
D. zpool
27. Which ZFS feature must be enabled when the filesystem is created?
A. Permissions
B. Compression
C. Quotas
D. Encryption
28. Which of the following is read-only copy of the state of a ZFS filesystem?
A. Snapshot
B. Clone
C. Pool
D. Zone
29. Which command tells you every command that has been run on a particular zfs pool?
A. zpool status
B. zpool history
C. zfs history
D. zoneadm history
30. What is used to make a copy of a zfs filesystem?
A. Clone
B. Snapshot
C. Pool
D. Zone
31. How many global zones can exist on a system?
A. 0
B. 2
C. 1
D. Up to 256
32. What is the first step in getting zone properly installed and configured on the system?
A. Installing the zone
B. Creating the zone
C. Configuring the zone
D. Managing the zone
33. Which command allocates resources to zones?
A. zfs
B. zpool
C. zoneadm
D. zonecfg
34. Which of the following options allows you to undo a change made with zonecfg that has
not been committed?
A. end
B. undo
C. revert
D. quit
35. Which of the following commands collects and reports performance/usage data for zone?
A. zonestat
B. zonecfg
C. zonadm
D. zonemgr
36. What is used to configure and manage a Solaris 11 network connection?
A. NCP
B. TCP
C. IP
D. AP
37. How many active NCPs can exist?
A. Up to 256
B. 0
C. 2
D. 1
38. What is the command used to administer NCPs?
A. ncpadm
B. netstat
C. netadm
D. netmgr
39. Which of the following commands is used to administer Solaris 11 network interfaces?
A. netadm
B. ipadm
C. ipstat
D. netstat
40. In which directory are most of the commands used to administer the network in Solaris 11
located?
A. /etc
B. /user/bin
C. /var/svc
D. /usr/sbin
41. Which command manages datalinks in Solaris 11?
A. dladm
B. netadm
C. ipadm
D. ifconfig
42. How many primary groups can a Solaris 11 user belong to?
A. Up to 1024
B. 2
C. 1
D. 0
43. What is the default group for a new Solaris 11 user account?
A. Root
B. Staff
C. Users
D. None
44. How many supplemental groups can a Solaris 11 user belong to?
A. Up to 1024
B. 2
C. 1
D. 0
45. Which accounts do not typically have home directories assigned to them?
A. Root accounts
B. Standard accounts
C. Privileged accounts
D. System accounts
46. What type of access control model is used in Solaris 11 to sassing privileges to specific
roles?
A. Role-Based Access Control (RBAC)
B. Rule-Based Access Control (RBAC)
C. Mandatory Access Control (MAC)
D. Rights-Based Access Control (RBAC)
47. All of the following commands will give you information about the currently logged in user
EXCEPT:
A. id
B. current
C. who am I
D. whoami
48. Which of the following commands will change user account settings?
A. usermod
B. userchg
C. adduser
D. roleadd
49. Which of the commands is used to create a group?
A. groupadd
B. roleadd
C. groups
D. group -a
50. Which of the following commands is used to add a role to a user account?
A. usermod –r
B. usermod –R
C. usermod +R
D. usermod -g
51. Where is the template file for both the bash and ksh93 shells located?
A. $HOME/.profile
B. /etc/profile
C. $HOME/.bash_profile
D. /etc/skel/local.profile
52. All of the following are considered shell metacharacters, EXCEPT:
A. ?
B. /
C. a
D. -
53. Which of the following commands is used to configure quotas for a user?
A. zfs set quota
B. usermod -q
C. zfs quota
D. usermod set quota
54. Which of the following is the best way to assign file permissions?
A. Assign to users
B. Assign to groups
C. Assign to roles
D. Assign to Others
55. All of the following are Unix file permissions EXCEPT:
A. Full Control
B. Read
C. Write
D. Execute
56. All of the following are octal permission values EXCEPT:
A. 4
B. 2
C. 7
D. 1
57. Which command manages core dump files?
A. coreadm
B. dumpadm
C. mdb
D. coremgr
58. Which of the following statements is true regarding file permissions?
A. file permissions are subtracted from umasks
B. file permissions are subtractive
C. umasks are added to file permissions
D. umasks are subtractive
59. All of the following permission sets are correct, EXCEPT:
A. 5 is read and execute combined (4+1)
B. 7 is read, write and execute combined (4+2+1)
C. 3 is write and execute combined (2+1)
D. 6 is read and write combined (3+3)
60. All of the following are groups that can receive permissions, EXCEPT:
A. Owner
B. Group
C. Root
D. Others
61. Which of the following is the default umask for a Solaris 11 system?
A. 077
B. 027
C. 022
D. 000
62. All of the following are part of the process to gain access to system resources EXCEPT:
A. Identification
B. Accounting
C. Authorization
D. Authentication
63. Which file serves as a policy file for Solaris 11 when using local files authentication?
A. /etc/passwd
B. /etc/default/passwd
C. /etc/shadow
D. /etc/default/policy
64. Which of the following is a deprecated authentication service?
A. NFS
B. /etc/passwd
C. LDAP
D. NIS
65. All of the following are characteristics of Network Information Services (NIS) authentication
EXCEPT:
A. Uses ldapclient command to configure system as client
B. Uses flat files
C. No security
D. Not installed by default
66. Which command will give information on authorizations assigned to users?
A. roles
B. auths
C. perms
D. svcs -a
67. Which command can be used to determine a process ID (PID) for a process?
A. pkill
B. pargs
C. pgrep
D. pid
68. Which of the following commands is used to change the priority of a process?
A. nice
B. kill -9
C. ps -ef
D. pgrep
69. Which command is used to schedule a single task or job?
A. cron.allow
B. tasksched
C. cron
D. at
70. Which file relating to scheduling tasks is not created by default?
A. cron.deny
B. cron.allow
C. at.deny
D. crontab.allow
71. Where does crontab store its jobs?
A. /var/spool/cron/crontabs
B. /etc/cron/crontabs
C. /var/cron/crontabs
D. /home/$USER
72. System performance issues are almost always attributable to:
A. Permissions
B. Files
C. Users
D. Hardware
73. Most log files are stored in a subdirectory of which directory?
A. /etc
B. /var
C. /logs
D. /usr/sbin
74. Which command allows you to view crash dump files?
A. /usr/bin/savecore
B. /usr/bin/cdump
C. /usr/bin/mdb
D. /usr/sbin/dumpadm
75. Which command is ran to retrieve the dumped data files?
A. savecore
B. dumpadm
C. mdb
D. coreadm