which is a cause of this message?
You run the following command:
ping host1
After a short time, you receive the following response:
no answer from host1
Which is a cause of this message?
Which two commands are used to see the MAC address of a Solaris SPARC-based system?
Which two commands are used to see the MAC address of a Solaris SPARC-based system? (Choose two.)
Which two statements are true about the relationship between NIS master servers and NIS slave servers?
Which two statements are true about the relationship between NIS master servers and NIS slave servers? (Choose two.)
Which statement is true about creating a second NIS domain on the same server as the existing domain?
In preparation of an outsourcing operation, the current NIS domain needs to be split in two. Which statement is true about creating a second NIS domain on the same server as the existing domain?
which three statements are true about the zone’s file systems?
Given the following zone configuration:
zonepath: /export/zones/tancredo-z1
autoboot: true
pool:
inherit-pkg-dir:
dir: /lib
inherit-pkg-dir:
dir: /platform
inherit-pkg-dir:
dir: /sbin
inherit-pkg-dir:
dir: /usr
net:
address: 192.29.97.113/24
physical: e1000g0
Which three statements are true about the zone’s file systems? (Choose three.)
Which command can be used to find out who created the archives and when they were created?
You are responsible for maintaining a server used to support installations by means of Flash archives. Because of the diversity of systems on your organization’s network, you have many different Flash archives on this server. Which command can be used to find out who created the archives and when they were created?
Which two statements are correct?
A Solaris 10 OS is configured to log to the /var/adm/messages file using syslog. Which two statements are correct? (Choose two.)
What are three outcomes of executing the# svcadm restart system/name-service-cache command?
What are three outcomes of executing the
# svcadm restart system/name-service-cache command? (Choose three.)
In which file do you need to place the configuration parameters?
The security team requests that NFS logging be enabled. They supply you with the configuration parameters that they want.
In which file do you need to place the configuration parameters?
Which two approaches will meet your business needs?
You run an IT department and are responsible for purchasing hardware. Certain data that you have housed in a series of traditional disk slices are critical and must not be lost due to disk failure. The amount of data is large (720 gigabytes) and is read and written to frequently. The performance for both read and write operations needs improvement. You have plenty of money in your budget.
Which two approaches will meet your business needs? (Choose two.)