zone1 is a non-global zone that has been configured and installed.
zone1 was taken down for maintenance, and the following command was run:
zoneadm -z zone1 mark incomplete
The following information is displayed when listing the zones on your system:
Which task needs to be performed before you can boot zone1?
If administrative changes on the system have rendered a zone unusable or inconsistent, it is possible
to change the state of an installed zone to incomplete.
Marking a zone incomplete is irreversible. The only action that can be taken on a zone marked
incomplete is to uninstall the zone and return it to the configured state.
You need to make sure that all of the software packages on your server are up to date. Without
installing any updates, which two commands would display .my software updates that are available
in the default Oracle repository?
A: the pgk list command display a list of packages in the current image, including state and other
information. By default, package variants for a different architecture or zone type are excluded.
D: pkginfo displays information about software packages that are installed on the system (with the
first synopsis, with -l) or that reside on a particular device or directory (with the second synopsis,
Without options, pkginfo lists the primary category, package instance, and the names of all
completely installed and partially installed packages. It displays one line for each package selected.
With -r, retrieve the data from the repositories of the image's configured publishers. Note that you
must specify one or more package patterns in this case.
Which best describes the svc:/system/boot-config service?
Starting with the Oracle Solaris 11 Express release, Fast Reboot is supported on the SPARC platform,
as well as the x86 platform. On both platforms, this feature is controlled by the SMF and
implemented through a boot configuration service, svc:/system/boot-config. The boot-config service
provides a means for setting or changing the default boot configuration parameters.
The fastreboot_default property of the boot-config service enables an automatic fast reboot of the
system when either the reboot or the init 6 command is used. When the config/fastreboot_default
property is set to true the system automatically performs a fast reboot, without the need to use the
reboot -f command. By default, this property's value is set to false on the SPARC platform and to true
on the x86 platform.
A user jack, using a korn shell, requests a directory listing as follows:
[email protected]:/export/home/jack $ 1s
File filea Filea fileb Fileb filec Filec
Which two statements are correct?
A: starting with one single character, second character must be letter i, any characters, ending with
C: starting with letter e, f, or g, followed by anything.
You created an IP address for interface not.3 with the following command, which executed
ipadm create-addr T static a 192.168.0.100/24 net3/v4
You then ran:
The result indicated that the interface was down.
You then ran:
ipadm delete-addr net3/v4
ipadm create-addr T static a 192.168.0.101/24 net3/v4
The last command indicated that the interface was up.
Why did it work with the second address specified, but not the first?
The first IP address is already in use.
You have a ticket from a new user on the system, indicating that he cannot log in to his account. The
information in the ticket gives you both the username and password. The ticket also shows that the
account was set up three days ago.
As root, you switch users to this account with the following command:
You do not get an error message.
You then run 1s -1a and see the following files:
local1.cshrc local1.login local1.profile .bash_history .bashrc .profile
As root, you grep the /etc/passwd file and the /etc/shadow file for this username, with these results:
/etc/passwd contains newuser:x:60012:10:/home/newuser:/usr/bin/bash
/etc/shadow contains newuser:UP: : : : :10: :
As root, what is your next logical step?
The content of the /etc/shadow document indicates that the newuser account has no password.
We need to add a password.
The passwd utility is used to update user's authentication token(s).
D: Here the user account already exist. There is no need to create it.
When invoked without the -D option, the useradd command creates a new user account using the
values specified on the command line plus the default values from the system. Depending on
command line options, the useradd command will update system files and may also create the new
user's home directory and copy initial files.
You have a user that needs to use the cron tool to schedule some repetitive tasks. When the user
enters the crontab e command in a terminal window, the following error appears:
crontab: you are not authorized to use cron. Sorry
In order to troubleshoot this issue, in what directory would you start your invest
crontab: you are not authorized to use cron. Sorry.
This message means that either the user is not listed in the cron.allow file (if the file exists), or the
user is listed in the cron.deny file.
You can control access to the crontab command by using two files in the /etc/cron.d directory:
cron.deny and cron.allow. These files permit only specified users to perform crontab command tasks
such as creating, editing, displaying, or removing their own crontab files.
The cron.deny and cron.allow files consist of a list of user names, one user name per line.
You are having an issue with the shutdown command. You wish to determine if the file is a script or
an executable program. Which command would you use to determine this?
The file command determines the file type file tests each argument in an attempt to classify it. There
are three sets of tests, performed in this order: filesystem tests, magic tests, and language tests. The
first test that succeeds causes the file type to be printed.
What determines which bits in an IP address represent the subnet, and which represent the host?
A subnetwork, or subnet, is a logically visible subdivision of an IP network. The practice of dividing a
network into two or more networks is called subnetting.
The routing prefix of an address is written in a form identical to that of the address itself. This is
called the network mask, or netmask, of the address. For example, a specification of the most-
significant 18 bits of an IPv4 address, 11111111.11111111.11000000.00000000, is written as
Which two accurately identify features of a Solaris 10 branded zone?
B: It can be created by importing a Solaris 10 flash archive.
You can use the Oracle Solaris Flash archiving tools to create an image of an installed system that can
be migrated into a zone.
The system can be fully configured with all of the software that will be run in the zone before the
image is created. This image is then used by the installer when the zone is installed.
Note: You can use alternate methods for creating the archive. The installer can accept the following
* cpio archives
* gzip compressed cpio archives
* bzip2 compressed cpio archives
* pax archives created with the -x xustar (XUSTAR) format
ufsdump level zero (full) backups
Branded zones that run an environment different that the OS release on the system
* The lx branded zone introduced in the Solaris 10 8/07 release provides a Linux environment for
your applications and runs on x86 and x64 machines on the Oracle Solaris 10 OS.
* The solaris8 and solaris9 branded zones enable you to migrate an Oracle Solaris 8 or Oracle Solaris
9 system to an Oracle Solaris 8 or Oracle Solaris 9 Container on a host running the Oracle Solaris 10
8/07 Operating System or later Oracle Solaris 10 release.
* The Oracle Solaris 10 Container brand is available in OpenSolaris build 127. These branded zones
host Oracle Solaris 10 user environments.
Note: One of the powerful features of Solaris 11 is the ability to run a Solaris 10 environment in a
zone. Solaris 10 allows you to run Solaris 8 and 9 environments in zones, but only on SPARC.