PrepAway - Latest Free Exam Questions & Answers

Tag: f

Which entries are contained in the /etc/security/exec_attr file after the required RBAC configuration is imple

The security administrator wants to assign user bob to a netsec role so that the user can run the ifconfig and snoop commands with a rights profile named NSM. Which entries are contained in the /etc/security/exec_attr file after the required RBAC configuration is implemented?

What commands should you run to restore the pboot and boot block on the slice?

Your x86-based server will not boot Solaris 10 OS. You discover that you need to restore your pboot and boot block on the / (root) slice located on disk c0d0. You first boot off of the CD-ROM or DVD into single user mode. What commands should you run to restore the pboot and boot block on the slice?

Which FORTH Monitor command can you use to list all the commands that contain the net string?

As system administrator, you want to create an alias for the secondary network interface on a SPARC-based workstation. However, you cannot remember the exact FORTH Monitor syntax for the command that lists all the network interfaces at the ok prompt. All you remember is that the command contains the string net.
Which FORTH Monitor command can you use to list all the commands that contain the net string?

Which statement about the restoresymtable file is true?

Which statement about the restoresymtable file is true?