Which two files are relevant in deciding whether an rlogin attempt as root succeeds?
Which two files are relevant in deciding whether an rlogin attempt as root succeeds? (Choose two.)
Which file should you change to implement this policy?
Your company has decided that all passwords chosen by users must contain at least two capital letters and one number.
Which file should you change to implement this policy?
Which is the minimum Solaris OS software group that contains the man pages?
A company has upgraded their hardware and their new workstations have sufficient disk space to store the online man pages, rather than sharing them from the server.
Which is the minimum Solaris OS software group that contains the man pages?
Which configuration meets the minimal requirements for installation?
You want to install Solaris 10 OS on the x86 system that you built yourself. Which configuration meets the minimal requirements for installation?
Which procedure must you use?
Your x86-based system has a BIOS that does not support booting off of a CD-ROM, DVD-ROM, or network, and you want to install Solaris 10 OS on your system. Which procedure must you use?
Which command displays the alternative backup superblocks?
After a power outage, a user’s workstation in your department will no longer mount the user’s home directory. You believe that the superblock in the /dev/dsk/c0t0d0s7 file system has become corrupt.
Which command displays the alternative backup superblocks?
What is the result?
The second field in the /etc/group file is used to store the encoded group password.
Passwords are placed on certain group entries in this file. What is the result?
Which two are compatible FMRI formats to control rlogin service?
Given:
online 14:21:27 svc:/network/login:rlogin
You want to control rlogin service using rlogin FMRI (Fault Management Resource Identifier).
Which two are compatible FMRI formats to control rlogin service? (Choose two.)
How much disk space can you reclaim by removing these files?
One of your disks is almost full, so you decide to look for files that can be removed. In the file system, you find a directory with this content:
# ls -li
total 33570624
268566 -rw——- 5 bin bin 4294967296 Jan 23 11:59 file1 268566 -rw——- 5 bin bin 4294967296 Jan 23 11:59 file2 268566 -rw——- 5 bin bin 4294967296 Jan 23 11:59 file3 268566 -rw——- 5 bin bin 4294967296 Jan 23 11:59 file4
How much disk space can you reclaim by removing these files?
Which command can you use to verify that you have actually assumed the identity for fred?
To investigate the login problems experienced by user fred, you use su to assume the identity for fred.
Which command can you use to verify that you have actually assumed the identity for fred?