When the NIS service is functioning, what happens if a host name is looked up?
Given these entries in /etc/nsswitch.conf:
ipnodes: files [NOTFOUND=return]
hosts: nis [NOTFOUND=return] files
When the NIS service is functioning, what happens if a host name is looked up? (Choose three.)
Which two statements correctly describe the behavior of the name service switch?
Given the following line from a name service configuration file:
ethers: nis [UNAVAIL=return] files
Which two statements correctly describe the behavior of the name service switch? (Choose two.)
Which statement is true about the name service switch and the attempt to locate a host’s IP address?
Given the following line from a name service configuration file:
hosts: files nis nisplus dns
Which statement is true about the name service switch and the attempt to locate a host’s IP address?
Which two statements correctly describe the behavior of the name service switch?
Given this line from the name service configuration file:
hosts:nis [NOTFOUND=return] files
Which two statements correctly describe the behavior of the name service switch? (Choose two.)
Which two statements are true about the /etc/syslog.conf file?
Which two statements are true about the /etc/syslog.conf file? (Choose two.)
Which statement is true?
A system administrator found the following message in the /var/adm/messages file:
Jan 26 14:44:29 host genunix: [ID 936769 kern.notice] pm0 is /pseudo/pm@0
Which statement is true?
Which line needs to be added to the /etc/syslog.conf file?
The director of IT operations wants all important messages and all security related syslog events forwarded to a central system. The IT staff decides that this means that they need to forward all the auth messages and all other messages above the notice level, excluding the user messages to the bigbrother system.
Which line needs to be added to the /etc/syslog.conf file?
Which two commands create a role of helpdesk and assign the Printer Administration profile to it
You are configuring a remote server. Your help desk technicians need the ability to do printer administration. Because of sensitive data on this system, you cannot grant the help desk technicians full root access. Which two commands create a role of helpdesk and assign the Printer Administration profile to it, and then add a help desk technician with a userid of roger to that role? (Choose two.)
Which entries are contained in the /etc/security/exec_attr file after the required RBAC configuration
The security administrator wants to assign user bob to a netsec role so that the user can run the ifconfig(1M) and snoop(1M) commands with a rights profile named NSM. Which entries are contained in the /etc/security/exec_attr file after the required RBAC configuration is implemented when using privileges rather than uid 0?
What is the last step that must be performed on a SPARC-based system…
The root (/) file system is mirrored with a primary and secondary submirror. What is the last step that must be performed on a SPARC-based system so that the system boots automatically from the secondary submirror when a primary submirror fails?