Answer these 100+ Solaris MCQs and assess your grip on the subject of Solaris.
Scroll below and get started!
A. -l
B. -s
C. -ld
D. -h
A. svcs -r sshd
B. inetadm restart ssh
C. svcadm restart ssh
D. /etc/init.d/ssh restart
A. rcp
B. ftp
C. rlogin
D. rsh
A. Auditing tells you how well your disk is encrypted.
B. It will tell you how many viruses are on the system.
C. It will tell you about changes made to the system.
D. Auditing tells the user how fast they can secure their system.
A. SeLinux
B. Kerberos
C. Arkcellos
D. Enigma
A. Solaris doesn't use quotes.
B. Yes, but only double quotes and left-single quotes are interchangeable.
C. No. Command syntax must be exact.
D. Quotes are only used to mark text for reference and not read by the compiler.
A. SHA1
B. MD5
C. All are correct
D. None are correct
A. Analyse it and determine which patches are needed
B. Apply patches according to system policy
C. Download patches onto the system
D. All are correct
A. passwd (*)
B. changepass
C. password
D. passupd
A. /etc/group
B. /etc/shadow
C. /etc/passwd
D. /etc/passwd /etc/shadow /etc/group
A. RAM
B. Shell
C. Directory Hierarchy
D. Kernel
A. ARC is stored on a cloud environment.
B. L2ARC runs slower.
C. ARC is the primary cache, and L2ARC is the secondary cache.
D. There is no difference.
A. None are correct
B. Trusted
C. Signing
D. All are correct
A. Write your password on the monitor.
B. Keep your password private.
C. Announce your password to your friends and loved ones.
D. Include your password as a signature in your emails.
A. du | grep -e "4??"
B. ls -ls | grep 400
C. find . -exec ls -s \; -print
D. find . -size +400 -print
A. Default UNIX permissions assigned to every file system object.
B. Turn off the system.
C. Reboot the system.
D. Compress every file and folder on the system.
A. It shares executables and data files
B. It shares host names over network
C. It shares common read only file systems
D. All of the given options are valid benefits
A. They are used to authenticate services.
B. Greeting users who use the system.
C. Secure identification of users via password, or other forms of identification.
D. Encouraging more users to use the system without security measures.
A. adm
B. all are correct
C. uucp
D. sys
A. LP print service commands
B. Both Solaris Print Manager and LP print service commands
C. Solaris Print Manager
A. It is impossible to prevent console aborts.
B. Console aborts are encouraged to retain data integrity.
C. Change the value of KEYBOARD_ABORT to “disable” in the /etc/default/kbd file.
D. There is no need to prevent console aborts.
A. SAN devices are PBX devices such as telephones and answering machines.
B. SAN devices are various kinds of tape drives.
C. SAN devices are used to convert your hard disk to beta max format.
D. Storage area network devices are storage devices in a high-speed network that are also connected to servers.
A. ping
B. pngn
C. png
D. pinging
A. Service Access Facility (SAF) commands
B. Solaris Management Console’s Serial Ports tool
C. Both
A. No.
B. Yes, but access must be granted via the VGA port.
C. Yes, but you must also be connected via usb port.
D. Yes.
A. A framework for using MS Dos.
B. A terminal emulator.
C. An operating system existing within Solaris.
D. A file system used by Solaris.
A. lyrIP
B. Piv4
C. IPv4
D. IP_4
A. Indicates the Bourne shell
B. Indicates the Z shell
C. Indicates the Korn shell
D. Indicates the C shell
A. Kernel, Shell and Directory Hierarchy
B. Shell
C. Kernel
D. Directory Hierarchy
A. Total access.
B. Privelages
C. Secure accommodation.
D. Operational accessories.
A. fsok
B. sync
C. fsck
D. ck
A. Nothing. Just do it really fast before the electricity reaches the circuit.
B. Wait for the system to idle.
C. Short the motherboard circuit out to make it safe.
D. Shut down the system.
A. Returns the location of service logs
B. List all the services this service is depended upon
C. List all the processes this service is running
D. Service status
A. “/usr/adm/sulog”, and it shuts down all su privelages.
B. “/sys/logs/masterlogs”, and it contains every log file in the system.
C. “/var/adm/sulog”, and it tells you every use of the “su” command.
D. “/var/admin/logs”, and it tells you information about unauthorized users.
A. pathtooladmin
B. mpathsolaris
C. multipathtool
D. mpathadm
A. Access Control Lists are lists of files that are safe to edit.
B. Access Control Lists prevent certain users from using the system.
C. Administrative Control Liasons use hardware to prevent unauthorized access to the system,
D. Access Control Lists restrict or grant read, write, or execute access to specific users or groups.
A. CPU
B. Processor
C. Shell
D. Kernel
A. Concatenated RAID-0 writes to the first available component, while Stripe distributes the data equally across all components.
B. There is no difference and they are directly interchangeable.
C. RAID volumes are encrypted, while Stripe volumes are compressed.
D. Concatenated RAID-0 writes to the last available component, Stripe writes to the first available component.
A. use the sacadm command
B. display the contents of the /etc/release file
C. use the Solaris Information Manager
D. execute the command: whatis -V
A. echo $DEFAULT
B. echo $SHELL
C. ifconfig $SHELL
D. ifconfig $DEFAULT
A. the df command
B. the du command
C. the fileinfo command
D. the fuse command
A. uucp
B. GID
C. UID
D. grp
A. snoop
B. nwpckt
C. nwpackets
D. capture
A. init 0
B. init s
C. init 6
D. init 3
A. /bin/tch
B. /bin/sh
C. /bin/ksh
D. /bin/bash
A. the hmadm command
B. the hostid command
C. the host command
D. the who command
A. grace time in seconds
B. groups which may abort the shutdown
C. groups to be notified of the shutdown
D. grace time in minutes
A. Unix
B. Windows
C. SunOS
D. Linux
A. configadm
B. cfgadmin
C. configadmin
D. cfgadm
A. Any user can install a device to the system.
B. You have to be a guest user with permissions that supersede the super user.
C. Yes.
D. No.