Solaris MCQs

Solaris MCQs

Answer these 100+ Solaris MCQs and assess your grip on the subject of Solaris.
Scroll below and get started!

1: When using the ls command to display size of files, you display file sizes and directory sizes in Kbytes, Mbytes, Gbytes, or Tbytes (when the file or directory size is larger than 1024 bytes) using:

A.   -l

B.   -s

C.   -ld

D.   -h

2: What command would you use to restart the SSH server daemon on Solaris 10 using the Service Management Framework (SMF)?

A.   svcs -r sshd

B.   inetadm restart ssh

C.   svcadm restart ssh

D.   /etc/init.d/ssh restart

3: Which of the following commands can be used for remote copying?

A.   rcp

B.   ftp

C.   rlogin

D.   rsh

4: What will auditing tell you about a Solaris system's security?

A.   Auditing tells you how well your disk is encrypted.

B.   It will tell you how many viruses are on the system.

C.   It will tell you about changes made to the system.

D.   Auditing tells the user how fast they can secure their system.

5: What is an example of an encrypted authentication service within Solaris?

A.   SeLinux

B.   Kerberos

C.   Arkcellos

D.   Enigma

6: Under the Solaris Operating System, are double-quotes, left single-quotes and right single-quotes interchangable?

A.   Solaris doesn't use quotes.

B.   Yes, but only double quotes and left-single quotes are interchangeable.

C.   No. Command syntax must be exact.

D.   Quotes are only used to mark text for reference and not read by the compiler.

7: To verify that a certificate was not altered en route, you use the fingerprint (digest):

A.   SHA1

B.   MD5

C.   All are correct

D.   None are correct

8: You can use Patch Manager to perform the following on your system:

A.   Analyse it and determine which patches are needed

B.   Apply patches according to system policy

C.   Download patches onto the system

D.   All are correct

9: Which command allows you to update your current password?

A.   passwd (*)

B.   changepass

C.   password

D.   passupd

10: Solaris 10 OS stores user account and group entry information in the which of following system files?

A.   /etc/group

B.   /etc/shadow

C.   /etc/passwd

D.   /etc/passwd /etc/shadow /etc/group

11: Which of the following act as an interface between the user and the kernel?

A.   RAM

B.   Shell

C.   Directory Hierarchy

D.   Kernel

12: What is the difference between ARC and L2ARC?

A.   ARC is stored on a cloud environment.

B.   L2ARC runs slower.

C.   ARC is the primary cache, and L2ARC is the secondary cache.

D.   There is no difference.

13: pkgadm can display the following certificate type:

A.   None are correct

B.   Trusted

C.   Signing

D.   All are correct

14: What is a good simple rule to enforce with new users within the Trusted Extension System?

A.   Write your password on the monitor.

B.   Keep your password private.

C.   Announce your password to your friends and loved ones.

D.   Include your password as a signature in your emails.

15: To find only those files larger than 400 blocks in the current working directory, you use:

A.   du | grep -e "4??"

B.   ls -ls | grep 400

C.   find . -exec ls -s \; -print

D.   find . -size +400 -print

16: Within the Solaris Operating System, what is the first line of defense to protect the file system?

A.   Default UNIX permissions assigned to every file system object.

B.   Turn off the system.

C.   Reboot the system.

D.   Compress every file and folder on the system.

17: What are the benefits of NFS?

A.   It shares executables and data files

B.   It shares host names over network

C.   It shares common read only file systems

D.   All of the given options are valid benefits

18: Within the Solaris Operating System, what are authentication services used for?

A.   They are used to authenticate services.

B.   Greeting users who use the system.

C.   Secure identification of users via password, or other forms of identification.

D.   Encouraging more users to use the system without security measures.

19: The following crontab file (besides root) is stored in the /var/spool/cron/crontabs directory:

A.   adm

B.   all are correct

C.   uucp

D.   sys

20: To add a new attached printer you use:

A.   LP print service commands

B.   Both Solaris Print Manager and LP print service commands

C.   Solaris Print Manager

21: You need to prevent the new staff from performing “console aborts”. How do you do this?

A.   It is impossible to prevent console aborts.

B.   Console aborts are encouraged to retain data integrity.

C.   Change the value of KEYBOARD_ABORT to “disable” in the /etc/default/kbd file.

D.   There is no need to prevent console aborts.

22: In the context of Solaris, what are SAN devices?

A.   SAN devices are PBX devices such as telephones and answering machines.

B.   SAN devices are various kinds of tape drives.

C.   SAN devices are used to convert your hard disk to beta max format.

D.   Storage area network devices are storage devices in a high-speed network that are also connected to servers.

23: Which of the following commands can be used to ping a host?

A.   ping

B.   pngn

C.   png

D.   pinging

24: For managing terminals and modems, you use:

A.   Service Access Facility (SAF) commands

B.   Solaris Management Console’s Serial Ports tool

C.   Both

25: Is it possible to log in via serial port?

A.   No.

B.   Yes, but access must be granted via the VGA port.

C.   Yes, but you must also be connected via usb port.

D.   Yes.

26: What is ZFS?

A.   A framework for using MS Dos.

B.   A terminal emulator.

C.   An operating system existing within Solaris.

D.   A file system used by Solaris.

27: What is an example of a protocol used on Solaris' network layer?

A.   lyrIP

B.   Piv4

C.   IPv4

D.   IP_4

28: Which of the following is TRUE about /bin/ksh ?

A.   Indicates the Bourne shell

B.   Indicates the Z shell

C.   Indicates the Korn shell

D.   Indicates the C shell

29: Which of the following are main components of SunOS operating system?

A.   Kernel, Shell and Directory Hierarchy

B.   Shell

C.   Kernel

D.   Directory Hierarchy

30: What can be called discrete rights to processes that perform operations?

A.   Total access.

B.   Privelages

C.   Secure accommodation.

D.   Operational accessories.

31: How to check filesystem damage?

A.   fsok

B.   sync

C.   fsck

D.   ck

32: When installing a non-hot-pluggable device, what must you do before installation?

A.   Nothing. Just do it really fast before the electricity reaches the circuit.

B.   Wait for the system to idle.

C.   Short the motherboard circuit out to make it safe.

D.   Shut down the system.

33: What is the outpout of svcs -d name_of_service command?

A.   Returns the location of service logs

B.   List all the services this service is depended upon

C.   List all the processes this service is running

D.   Service status

34: You suspect an unauthorized use of the “su” command. Where do you look and what would it tell you?

A.   “/usr/adm/sulog”, and it shuts down all su privelages.

B.   “/sys/logs/masterlogs”, and it contains every log file in the system.

C.   “/var/adm/sulog”, and it tells you every use of the “su” command.

D.   “/var/admin/logs”, and it tells you information about unauthorized users.

35: What command is used to configure Solaris' multipathing support?

A.   pathtooladmin

B.   mpathsolaris

C.   multipathtool

D.   mpathadm

36: What is a UNIX File System (UFS) ACL, and what does it do?

A.   Access Control Lists are lists of files that are safe to edit.

B.   Access Control Lists prevent certain users from using the system.

C.   Administrative Control Liasons use hardware to prevent unauthorized access to the system,

D.   Access Control Lists restrict or grant read, write, or execute access to specific users or groups.

37: Which manages all the physical resources of the computer?

A.   CPU

B.   Processor

C.   Shell

D.   Kernel

38: What is the difference between RAID-0 (Concatenation), and RAID-0 (Stripe) Volumes?

A.   Concatenated RAID-0 writes to the first available component, while Stripe distributes the data equally across all components.

B.   There is no difference and they are directly interchangeable.

C.   RAID volumes are encrypted, while Stripe volumes are compressed.

D.   Concatenated RAID-0 writes to the last available component, Stripe writes to the first available component.

39: To view the system's Solaris Release Information you:

A.   use the sacadm command

B.   display the contents of the /etc/release file

C.   use the Solaris Information Manager

D.   execute the command: whatis -V

40: Which of the following command will output the default shell for the current user ?

A.   echo $DEFAULT

B.   echo $SHELL

C.   ifconfig $SHELL

D.   ifconfig $DEFAULT

41: To display the size of one or more directories, subdirectories, and files, you use:

A.   the df command

B.   the du command

C.   the fileinfo command

D.   the fuse command

42: Which of the following field in /etc/passwd represents user primary group?

A.   uucp

B.   GID

C.   UID

D.   grp

43: Which of the following commands can be used to capture network packets?

A.   snoop

B.   nwpckt

C.   nwpackets

D.   capture

44: If you are on a stand alone system, and you want to bring it to single user mode, you execute:

A.   init 0

B.   init s

C.   init 6

D.   init 3

45: Which of the following is NOT a valid output for command : echo $SHELL

A.   /bin/tch

B.   /bin/sh

C.   /bin/ksh

D.   /bin/bash

46: To display a system’s Host ID number you use:

A.   the hmadm command

B.   the hostid command

C.   the host command

D.   the who command

47: The '-g' switch to the shutdown command is followed by:

A.   grace time in seconds

B.   groups which may abort the shutdown

C.   groups to be notified of the shutdown

D.   grace time in minutes

48: Solaris is what kind of operating system?

A.   Unix

B.   Windows

C.   SunOS

D.   Linux

49: Which of the following Solaris 10 command will list all configurable hardware in the system?

A.   configadm

B.   cfgadmin

C.   configadmin

D.   cfgadm

50: Do you have to be a super user to install a device to your Solaris system?

A.   Any user can install a device to the system.

B.   You have to be a guest user with permissions that supersede the super user.

C.   Yes.

D.   No.