InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
What Are The Network Utilities? |
| Answer» | |
| 2. |
Controlling The Tape Drive? |
|
Answer» MT –f /dev/rmt/0n à ‘N’ INDICATES no REWIND. Mt –f /dev/rmt/0n à ‘n’ indicates no rewind. |
|
| 3. |
Where Are All The Port Numbers Stored? |
|
Answer» PORT NUMBERS are STORED in /etc/services. Port numbers are stored in /etc/services. |
|
| 4. |
What All Does The Nvram Store? |
|
Answer» ETHERNET ADDRESS / HOST ID / Time of Day (TOD) clock and EEPROM PARAMETERS. Ethernet Address / Host ID / Time of Day (TOD) clock and EEPROM Parameters. |
|
| 5. |
What Is The Command To Do An Interactive Boot From The Ok Prompt? |
|
Answer» The Interactive Boot Process: At the ok prompt, TYPE boot -a and PRESS ENTER. The boot program prompts you interactively. After POWER on, Press, STOP+A At the ok prompt type, Ok>boot –a The Interactive Boot Process: At the ok prompt, type boot -a and press Enter. The boot program prompts you interactively. After Power on, Press, STOP+A At the ok prompt type, Ok>boot –a |
|
| 6. |
Consider The Following Crontab Entry: ?59 23 13 * 5 /wipe. Disk? What Time Will This Cronjob Run? |
|
Answer» That means: on BLACK Friday, your hard drive will get wiped out. ==> (on 13th and Friday) 23:59, /WIPE. DISK will be RUNNING If the 13’Th Day of the month is Friday, the JOB will run. (week day starts from Sunday day 1). That means: on Black Friday, your hard drive will get wiped out. ==> (on 13th and Friday) 23:59, /wipe. disk will be running If the 13’Th Day of the month is Friday, the job will run. (week day starts from Sunday day 1). |
|
| 7. |
How Can I Disable Stop+a Utility On Sun Machines, Which Brings System Into Ok> Prompt? |
|
Answer» in /etc/system set ABORT enable=0 will disable STOP-A There are several ways to disable “STOP-A”
in /etc/system set abort enable=0 will disable STOP-A There are several ways to disable “STOP-A” |
|
| 8. |
How Do We Know How Many Lan Cards We Have In Server? |
|
Answer» Just TYPE in the following COMMAND at prompt#ifconfig -a. That SHALL give the LAN Cards as well as total Physical and LOGICAL IP Addresses dmesg – It displays all configured items on systems. Just Type in the following command at prompt#ifconfig -a. That shall give the LAN Cards as well as total Physical and Logical IP Addresses dmesg – It displays all configured items on systems. |
|
| 9. |
What Is “piping” Solaris? |
|
Answer» Piping:- sending the output of a command to the input of ANOTHER is CALLED piping. Some examples are: $cal | WC Will output total lines, WORDS and character’s $cal | WC | wc Will output total lines, words and character’s A UNIX pipe provides a one-way flow of data. For example, if a UNIX USERS issues the command $who | sort |lpr. Then the UNIX shell would create three processes with two pipes between them: A pipe can be explicitly created in UNIX USING the pipe system call. Two file descriptors are returned–filedes [0] and filedes [1], and they are both open for reading and writing. A read from filedes[0] accesses the data written to filedes[1] on a first-in-first-out (FIFO) basis and a read from filedes[1] accesses the data written to filedes[0] also on a FIFO basis. When a pipe is used in a UNIX command line, the first process is assumed to be writing to stdout and the second is assumed to be reading from stdin. So, it is common practice to assign the pipe write device descriptor to stdout in the first process and assign the pipe read device descriptor to stdin in the second process. This is elaborated below in the discussion of multiple command pipelines. Piping:- sending the output of a command to the input of another is called piping. Some examples are: $cal | WC Will output total lines, words and character’s $cal | WC | wc Will output total lines, words and character’s A UNIX pipe provides a one-way flow of data. For example, if a UNIX users issues the command $who | sort |lpr. Then the UNIX shell would create three processes with two pipes between them: A pipe can be explicitly created in UNIX using the pipe system call. Two file descriptors are returned–filedes [0] and filedes [1], and they are both open for reading and writing. A read from filedes[0] accesses the data written to filedes[1] on a first-in-first-out (FIFO) basis and a read from filedes[1] accesses the data written to filedes[0] also on a FIFO basis. When a pipe is used in a UNIX command line, the first process is assumed to be writing to stdout and the second is assumed to be reading from stdin. So, it is common practice to assign the pipe write device descriptor to stdout in the first process and assign the pipe read device descriptor to stdin in the second process. This is elaborated below in the discussion of multiple command pipelines. |
|
| 10. |
Which Nfs Daemons Are Found On The Nfs Server? |
|
Answer»
These five DAEMONS will be in NFS server. These five daemons will be in NFS server. |
|
| 11. |
What File Do You Put The Umask Setting In? |
|
Answer» The UMASK value for Bourne and korn shell USERS can be MODIFIED system wide by EDITING the “umask” ENTRY in the “/etc/profile” file. To change the default UMASK for the C shell, MODIFY the UMASK variable in “/etc/default/login” file. The UMASK value for Bourne and korn shell users can be modified system wide by editing the “umask” entry in the “/etc/profile” file. To change the default UMASK for the C shell, modify the UMASK variable in “/etc/default/login” file. |
|
| 12. |
How To Know The Date And Time For . When Script Is Executed ? |
|
Answer» Add the following script line in SHELL script. Eval echo “Script is executed at `date`” >> TIME info.inf Here, .timeinfo.inf. Contains date & time details ie. When script is executed and history RELATED to execution. Add the following script line in shell script. Eval echo “Script is executed at `date`” >> time info.inf Here, .timeinfo.inf. Contains date & time details ie. When script is executed and history related to execution. |
|
| 13. |
List Some Hot Keys For Bash Shell? |
|
Answer» Ctrl+l . Clears the SCREEN. Ctrl+r . Does a search in previously given commands in shell. Ctrl+l – Clears the typing before the HOTKEY. Ctrl+a . Places cursor at the beginning of the COMMAND at shell. Ctrl+e . Places cursor at the END of the command at shell. Ctrl+d . Kills the shell. Ctrl+z . Places the currently running process into BACKGROUND. Ctrl+l . Clears the Screen. Ctrl+r . Does a search in previously given commands in shell. Ctrl+l – Clears the typing before the hotkey. Ctrl+a . Places cursor at the beginning of the command at shell. Ctrl+e . Places cursor at the end of the command at shell. Ctrl+d . Kills the shell. Ctrl+z . Places the currently running process into background. |
|
| 14. |
Display The Processes, Which Are Running Under Your Username? |
|
Answer» – PS .AEF | grep Mahesh vjHere, Mahesh vj is the username. – Ps .aef | grep Mahesh vjHere, Mahesh vj is the username. |
|
| 15. |
Set The Display Automatically For The Current New User? |
|
Answer» – export DISPLAY=`EVAL ‘who am i | cut -d”(” -F2 | cut -d”)” -f1’`Here in above command, see single quote, double quote, grave ACCENT is USED. Observe carefully. – export DISPLAY=`eval ‘who am i | cut -d”(” -f2 | cut -d”)” -f1’`Here in above command, see single quote, double quote, grave accent is used. Observe carefully. |
|
| 16. |
Explain About Solaris? |
|
Answer» Solaris is a UNIX based operating system which is AVAILABLE for free. It supports workstations and servers from sun. It is widely recognized for its scalability. This product is ALMOST supported by many SERVER VENDORS. It is the FAMOUS successor to sun operating systems. Solaris is a UNIX based operating system which is available for free. It supports workstations and servers from sun. It is widely recognized for its scalability. This product is almost supported by many server vendors. It is the famous successor to sun operating systems. |
|
| 17. |
Describe About Logical Domains And Its Functions? |
|
Answer» LDOMS system administrator center provides RESOURCES and LINKS to developers who are trying to install Ldoms technology. It gives you flexibility to group system resources and discrete systems within a COMPUTER system physically. It allows you to group system resources physically within its own operating system, identity and resources. Solaris UNIX version runs on Intel, AMD and SPARC platforms. It has migrated from solely a SPARC platform to include other platforms from leading companies. It provides interoperability across various technologies such as developer products, DESKTOP applications, data center, etc. LDOMS system administrator center provides resources and links to developers who are trying to install Ldoms technology. It gives you flexibility to group system resources and discrete systems within a computer system physically. It allows you to group system resources physically within its own operating system, identity and resources. Solaris UNIX version runs on Intel, AMD and SPARC platforms. It has migrated from solely a SPARC platform to include other platforms from leading companies. It provides interoperability across various technologies such as developer products, desktop applications, data center, etc. |
|
| 18. |
What Is Rbac? |
|
Answer» RBAC is INTRODUCED into SOLARIS for managing specific tasks. These specific tasks are based and defined in the administrator profile. It is based on the STANDARD developed by NIST. RBAC is a very IMPORTANT tool for performing multiple tasks. It also separates tasks which require high TECHNICAL knowledge from low ones. RBAC is introduced into Solaris for managing specific tasks. These specific tasks are based and defined in the administrator profile. It is based on the standard developed by NIST. RBAC is a very important tool for performing multiple tasks. It also separates tasks which require high technical knowledge from low ones. |
|
| 19. |
What Is Solaris Roles? |
|
Answer» RBAC implementation depends UPON the role specified in the administrator profiles. Roles are implemented according to the profile. Also access to certain files and configuration can be assigned by the user profile. It also allows RBAC to differentiate HIGH technical KNOWLEDGE roles from LOW ones. RBAC implementation depends upon the role specified in the administrator profiles. Roles are implemented according to the profile. Also access to certain files and configuration can be assigned by the user profile. It also allows RBAC to differentiate high technical knowledge roles from low ones. |
|
| 20. |
What Are The Three Different System Management Roles? |
|
Answer» There are THREE different ROLES specified by Solaris they are
There are three different roles specified by Solaris they are |
|
| 21. |
What Are The Different Ways To Execute Profiles? |
|
Answer» Profiles can be executed in many different ways some of them are
Profiles can be executed in many different ways some of them are |
|
| 22. |
What Is Sudo? |
|
Answer» Sudo maintains DATABASE of all the privileges assigned to a USER name. These privileges can be identified by different COMMANDS present in the database. This feature helps a user to format a disk but the root SYSTEM cannot be changed. Sudo maintains database of all the privileges assigned to a user name. These privileges can be identified by different commands present in the database. This feature helps a user to format a disk but the root system cannot be changed. |
|
| 23. |
Explain About The Limitations Present In Sudo? |
|
Answer» There are some LIMITATIONS for SUDO which makes RBAC popular they are
There are some limitations for sudo which makes RBAC popular they are |
|
| 24. |
Explain About The Command Ls? |
|
Answer» Ls COMMAND gives a way to the main directory and ALSO gives access permissions for FILES in Solaris. It displays and prints USER and GROUP ownerships, file access permissions, filename and files size and creation date. Ls command gives a way to the main directory and also gives access permissions for files in Solaris. It displays and prints user and group ownerships, file access permissions, filename and files size and creation date. |
|
| 25. |
Explain About Sticky Bit Permissions? |
|
Answer» This command HELPS the NETWORK administrator to relax a bit. This command will not allow the deletion of the common FILES present in the common area. This command helps the USERS by not allowing them to rewrite on other files. Certain permissions can be set which will restrict users to delete files created by them. This command helps the network administrator to relax a bit. This command will not allow the deletion of the common files present in the common area. This command helps the users by not allowing them to rewrite on other files. Certain permissions can be set which will restrict users to delete files created by them. |
|
| 26. |
How Can You Determine Whether A File Is Setuid? |
|
Answer» The easiest way to DETERMINE whether a FILE is setuid or not by checking for files which are owned by the ROOT and after checking for files that are owned by root you can check for s flag files assigned to the user permissions. In the PERMISSION table the FIRST s refers to setuid root. The easiest way to determine whether a file is setuid or not by checking for files which are owned by the root and after checking for files that are owned by root you can check for s flag files assigned to the user permissions. In the permission table the first s refers to setuid root. |
|
| 27. |
What Is Umask? |
|
Answer» Wide set permissions can be set by using umask which can set write, read and execute permissions on new files created by the user. These SETTINGS can be made from the COMMAND line to REFLECT BROAD settings. It can also be set from the global system settings file. Umask command displays all the settings made with that command. Wide set permissions can be set by using umask which can set write, read and execute permissions on new files created by the user. These settings can be made from the command line to reflect broad settings. It can also be set from the global system settings file. Umask command displays all the settings made with that command. |
|
| 28. |
What Is The Best Solution To Avoid Large Number Of Groups? |
|
Answer» The best solution for not creating large number of groups lies with the system administrator. It is best to USE structural GROUP membership which REFLECTS ORGANIZATIONAL divisions. To manage file access a system admin can use access CONTROL lists. The best solution for not creating large number of groups lies with the system administrator. It is best to use structural group membership which reflects organizational divisions. To manage file access a system admin can use access control lists. |
|
| 29. |
Explain The Differences Between Setting Files Using Octal Codes And Symbolic Codes? |
|
Answer» The main DIFFERENCE between setting FILES using octal and symbolic code files is symbolic CODES are relative whereas octal codes are numeric codes. These settings will remain unless you change the settings explicitly by using symbolic codes. If group execute access gets executed it AUTOMATICALLY removes write access permission. The main difference between setting files using octal and symbolic code files is symbolic codes are relative whereas octal codes are numeric codes. These settings will remain unless you change the settings explicitly by using symbolic codes. If group execute access gets executed it automatically removes write access permission. |
|
| 30. |
Explain About The Command Prof_attr? |
|
Answer» This forms the RBAC PROFILE database. It displays the relationship between among the profiles in the database. It also GIVES authorizations between NAVIGATION for those files. One of the SAMPLES is Solaris.admin.fsmgr.read.solaris.admin.serialmgr.read. This forms the RBAC profile database. It displays the relationship between among the profiles in the database. It also gives authorizations between navigation for those files. One of the samples is Solaris.admin.fsmgr.read.solaris.admin.serialmgr.read. |
|
| 31. |
Explain About Admin Command? |
|
Answer» Local Kerberos services can be MANAGED by administering policies, key tabs and principles by managing the admin command. Admin.local is used to master KDC and it does not require any authentication. On the SERVER login information is passed through a secured server. It checks the PRINCIPLE name by the value of the user environment VARIABLE. Local Kerberos services can be managed by administering policies, key tabs and principles by managing the admin command. Admin.local is used to master KDC and it does not require any authentication. On the server login information is passed through a secured server. It checks the principle name by the value of the user environment variable. |
|