|
Question 262. Swap space in Solaris 10 OS is managed by the swapfs file system. Which two statements accurately describe swapfs? (Choose two.) A. The swap file system consists only of swap slices and swap files. B. The swap file system might consist of physical RAM, swap slices, and swap files. C. The swapfs provides real physical swap space addresses in response to swap space reservation requests. D. The swap slices and swap files managed by swapfs need to be twice as large as physical RAM on the system. E. The swapfs provides virtual swap space addresses, thus decreasing the need for physical swap on systems with large, available memory. Answer: B, E Question 263. The security team requests that NFS logging be enabled. They supply you with the configuration parameters that they want. In which file do you need to place the configuration parameters? A. /etc/default/lognfs B. /etc/default/nfslogd C. /etc/default/nfs_log D. /etc/default/nfs/nfslogd Answer: B Question 264. If the auto mounter is used, which client file no longer needs to be updated to allow the automatic mounting of NFS resources upon reboot of the client? A. /etc/vfstab B. /etc/default/fs C. /etc/dfs/dfstab D. /etc/dfs/fstypes E. /etc/dfs/sharetab Answer: A Question 265. You run an IT department and are responsible for purchasing hardware. Certain data that you have housed in a series of traditional disk slices are critical and must not be lost due to disk failure. The amount of data is large (720 gigabytes) and is read and written to frequently. The performance for both read and write operations needs improvement. You have plenty of money in your budget. Which two approaches will meet your business needs? (Choose two.) A. secure the data using RAID 0 B. secure the data using RAID 1 C. secure the data using RAID 5 D. secure the data using RAID 0+1 E. secure the data using RAID 1+0 Answer: D, E Question 266. You must set up three users to administer the artwork department. These users will be launching several applications with the EUID of department administrator. Using the RBAC mechanism, what is the sequence of events to execute this process? A. create entries for the applications in the RBAC profile database, associate a role with the new profile entry, and give the three users access to the role B. update the $HOME/.rbac_privs file for each user to point to applications in question and amend the user attribute database to use the admin EUID with these applications C. create entries for the applications in the RBAC policy attributes database, associate a profile with the new policy entry, associate a role with this profile, and give the three users access to the role D. create entries for the applications in the RBAC execution attributes database, associate a profile with the new execution entry, associate a role with this profile, and give the three users access to the role Answer: D Question 267. Which two commands list all the authorizations assigned to user john? (Choose two.) A. auths john B. su john -c auths C. grep -w john /etc/user_attr D. grep john /etc/security/auth_attr E. grep -w john /etc/security/auth_attr Answer: A, B Question 268. A Solaris 10 OS is configured to log to the /var/adm/messages file using syslog. Which two statements are correct? (Choose two.) f A. The logadm utility automatically rotates the /var/adm/messages file. B. The tail -f /var/adm/messages command can be used to monitor the /var/adm/messages file in real time C. The syslog facility automatically trims the /var/adm/messages file, deleting messages that are more than twenty-four hours old. D. The /var/adm/messages file is a DBF formatted binary file. The Solaris Management Console Log Viewer GUI is the only way to monitor the /var/adm/messages file in real time. E. The /var/adm/messages file only contains the severity of the message. The facility of the message must be interpreted using the process name and ID contained in the message. Answer: A, B Question 269. Sometimes a process must give up some of its memory space allocation to another process. The process has some of its pages in RAM paged out. Which two statements accurately describe this paging process? (Choose two.) A. All the modified data memory pages of a process are moved to a swap area. B. Selected anonymous memory pages that contain private data or stack information are placed in a swap area. C. Unchanged file system pages are NOT placed in swap areas because file system data exist as permanent storage. D. The size of a memory page is fixed and is based on the architecture of the machine running Solaris 10 OS (8192 bytes for SPARC, 4096 bytes for x86 platforms). Answer: B, C Question 270. Given: Lo0: flags=100849mtu 8232 index 1 inet 127.0.0.1 netmask ff000000 hme0: flags=1000863 mtu 1500 index 2 inet 192.200.200.9 netmask ffffff00 broadcast 192.200.200.255 ether 7:1:20:8a:74:e1 What is the MAC address? Answer: 7:1:20:8a:74:e1 Question 271. You want to allow the NFS server saturn to share the /var/tmp directory read-only with clients pluto and mars. You also want to allow pluto to have root access to this directory. Which line should you add to the /etc/dfs/dfstab file for saturn? A. share -F nfs -o ro,root=pluto /var/tmp B. share -F nfs root_access pluto /var/tmp C. share -F nfs -o,ro=mars:pluto,root=pluto /var/tmp D. share -F nfs -o,root=pluto,ro=mars,pluto /var/tmp E. share -F nfs ro,root=pluto /var/tmp client=mars:pluto Answer: C Question 272. During boot up, your x86-based laptop that is running the Solaris 10 OS displays the message: NFS server arizona not responding, still trying Which two are valid troubleshooting procedures for this problem? (Choose two.) A. restart the NFS client-side daemons B. verify that the nfsd daemon is running on your laptop C. verify that your laptop is connected to the correct network D. verify that the server arizona is up and that its network interface is up. E. verify that the NFS client entry in /etc/inetd.conf is correct, then get inetd to reread the /etc/inetd.conf Answer: C, D Question 273. Which statement about RAID levels is true? A. RAID 5 uses distributed parity B. RAID 0+1 provides no advantage over RAID 1. C. RAID 0 refers to striping but NOT to concatenation. D. RAID 1 is the only RAID level providing redundancy. Answer: A Question 274. Which two statements are true about hot spare usage and features? (Choose two.) A. A hot spare can hold data NOT in immediate use. B. A hot spare can improve the robustness of a RAID-0 volume. C. A hot spare is a slice that is functional and available, but NOT in use. D. A hot spare is a volume that is functional and available, but NOT in use. E. A hot spare is on reserve to substitute for a failed slice in a sub mirror or RAID-5 volume. Answer: C, E Question 275. When will Solaris Volume Manager software volumes continue to function normally in the event of the corruption of one copy of its state database? A. when the master copy of the state database is NOT corrupted B. when the copy of the state database on the boot disk is available C. when more than half of the copies of the state database are available D. when NOT more than a single copy of the state database is corrupted Answer: C Question 276. Based upon the business needs of the company, highly available data are very important, but the cost of a fully mirrored data configuration is beyond the current financial resources of the company. Which RAID configuration should you choose to hold the companies data? A. RAID 0 B. RAID 1 C. RAID 5 D. RAID 1+0 E. RAID 0+1 Answer: C Question 277. You run an IT department and are responsible for purchasing hardware within a given budget. You are aware that 70 GB of data housed in a series of traditional disk slices is becoming critical to the business. You decide to mirror the data but have concerns about write performance. You can purchase the disk space to mirror the data. What is a cost-free configuration enhancement that achieves fast write performance? A. Arranging for the mirror to consist of just two disks. B. Using RAID 5 to hold the data in each half of the mirror. C. Striping the data across the disks in each half the mirror. D. Concatenating the data across the disks in each half of the mirror. Answer: C Question 278. You work as a network administrator for ITCertKeys.com. You use 10 disks to form a 10-column RAID 5 volume. What proportion of space is used for housing the parity? A. ½ B. 1/10 C. 2/10 D. 9/10 Answer: B Question 279. You have a 10 GB, 10 times 1GB, RAID 5. How much disk space do you lose by using RAID 5? A. 1/10 B. 1/2 C. 1/3 D. 1/4 Answer: A Question 280. Which statement about an Ethernet address is true? A. it is unique for every system B. it has an entry in the /etc/inet/hosts file C. It is a 32-bit address divided into four 8-bit fields D. It is a number assigned by the system administrator Answer: A
|
Question 1. Which of the following is a responsibility of the Operations Role Cluster? A. detecting intrusions and protecting against viruses B. managing business-to-business trading interfaces C. managing IT-procurement and purchasing functions D. prioritizing service improvement requests and identifying gaps for future functionality Answer: B Question 2. In what way does Capacity Management contribute to improving IT Service Management? A. By identifying the major technology components, infrastructure, people and processes that underpin the end-to-end delivery of service B. By preventing interruptions to IT services as well as recovering services after an interruption occurs C. By planning and monitoring the job scheduling process according to the requirements in the Operational Level Agreements (OLAs) D. By planning the implementation of business requirements for IT Services so they are in place when the business needs them Answer: D Question 3. Which Service Management Function (SMF) needs to ensure that efficient incident detection and recovery tools and processes are in place to handle any service outages that do occur? A. Availability Management B. Release Management C. Service Desk D. System Administration Answer: A Question 4. Which Role Cluster has a portfolio of business-aligned IT services as a quality goal? A. Operations B. Partner C. Service D. Support Answer: C Question 5. Which Service Management Function deals with the day-to-day activities and tasks related to maintaining and adjusting the IT security infrastructure? A. Availability Management B. Security Administration C. Security Management D. System Administration Answer: B Question 6. What is the relationship between releases and changes? A. A change includes both changed hardware and software components and components that were not changed. A release only includes changed hardware and software components. B. Changes are incorporated into the IT environment by releases. C. Releases and changes are incorporated into the IT environment independently of each other. D. Releases are incorporated into the IT environment by changes. Answer: B Question 7. Which of the following is a key requirement for planning service solutions? A. a managed IT environment B. a milestone-driven implementation process C. take the perspective of end-to-end services D. understanding of the business and the operational requirements Answer: D Question 8. Which of the following describes the concept of Service Management Functions (SMFs)? A. a model for measuring the performance of the process B. a model for organizing IT staff C. organizational units that support IT operations D. processes, procedures and policies to deliver and support IT service solutions Answer: D Question 9. What is a goal of Security Administration? A. accessibility B. confidentiality C. connectivity D. interconnectivity Answer: B Question 10. Which steps in the MOF Risk Management Process follow each other immediately? A. Analyzing and Prioritizing Risks - Planning and Scheduling Risk Actions B. Analyzing and Prioritizing Risks - Tracking and Reporting Risks C. Identifying Risks in Operations - Planning and Scheduling Risk Actions D. Identifying Risks in Operations - Tracking and Reporting Risks Answer: A
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.