Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Sun 310-012 Exam - Cheat-Test.com

Free 310-012 Sample Questions:

1.The action field in the syslogd configuration file may contain which two types of entry? (Choose two.)
A.a host name prefixed with @
B.a list of user email addresses
C.the full path name to a file or device file
D.a pipe sign (I) followed by a command to which the message output is piped
Answer: A, C

2.Which three are message severity entries used in the syslogd configuration file? (Choose three.)
A.lpr
B.alert
C.cron
D.mark
Answer: A, B, C

3.Given this entry from the /etc/syslog.conf file: mail.debug ifdef ('LOGHOST', /var/adm/authlog.current, @loghost) Which statement about syslogd behavior is true if a remote host is aliased as loghost?
A.The messages will be logged in /var/adm/authlog.current.
B.The messages will be remotely logged in /var/adm/authlog.current.
C.The messages will be forwarded to the syslogd on the remote host loghost and not recorded locally.
D.The messages will be logged locally in /var/adm/authlog.current and forwarded to by the loghost.
Answer: A

4.You want to enable the logging of every failed login attempt. To do this you must change the syslogd configuration file from its installation defaults. Which facility should you change?
A.auth
B.kern
C.user
D.notice
E.emerg
F.daemon
Answer: A

5.You have written a start script to launch application XXX when the system starts. You decide to add a command to the script. If the application does not launch, it logs a message with syslogd with the appropriate severity. Which command accomplishes this?
A.logger XXX failed to start
B.syslog ­s 7 XXX failed to start
C.logger ­p user.err XXX failed to start
D.logger ­F user ­s err XXX failed to start
E.echo XXX failed to start, severity=7 >>/var/adm/messages
Answer: C

6.Which two statements about the m4 macro processor are true? (Choose two.)
A.The ifdef statement makes it possible to log messages remotely.
B.Use of the ifdef statement makes remote logging of messages impossible.
C.Lines containing the ifdef statement are passed directly to syslogd for processing.
D.The m4 processor passes any line with syntax it does not recognize directly to syslogd.
E.Lines which do not contain recognized m4 syntax are ignored by the m4 processor and consequently
do not reach syslogd.
F.The m4 processor processes lines containing the ifdef statement, passing only the results to syslogd.
Answer: E, F

7.Which three functions can syslogd perform? (Choose three.)
A.writing messages to the system log
B.forwarding messages to a list of users.
C.forwarding input from root to the user's processes
D.forwarding messages to the syslogd on another host on the network
E.writing IPC messages to the processes that are generating errors rapidly F.interrupting processes that are producing errors above a pre­configured threshold
Answer: A, B, C

8.What determines the time frame that an automounted NFS resource remains mounted?
A.A listing in the /etc/mnttab file determines this.
B.The time period is built into the executable and cannot be adjusted
C.The client determines how long the NFS resource remains mounted.
D.The server determines how long the NFS resource remins mounted.
Answer: C

9.Which NIS system(s) contains the original ASCII files that are used to generate the NIS maps?
A.NIS client only
B.NIS slave server only
C.NIS master server only
D.NIS master server and NIS slave server
Answer: C

10.Which process or daemon is executed by the /usr/lib/netsvc/yp/ypstart script on an NIS client?
A.ypxfrd
B.ypbind
C.ypserv
D.rpc.yppasswdd
Answer: B

11.During the first build of a new NIS map, the slave servers do not know of its existence, so the push process attempt fails, What can you do to recover from this problem?
A.You transfer the source files from the NIS master to the NIS slave and execute a mark on the NIS slave.
B.You interrupt the build process with a Control­C, and push all of the maps from the master server at once using the ypinit ­s command.
C.You put the build process into background processing mode, add an empty map to the slave server, and foreground the build process to continue the build.
D.You interrupt the build process with a Control­C when the push process hangs, and execute the ypxfr command on the map from the slave server(s) to complete the build process.
Answer: D

12.Which command is used to manually pull individual NIS maps from the NIS master?
A.ypxfr
B.ypcat
C.ypserv
D.yppush
Answer: A

13.While configuring NIS on a system, you execute the command string: #domainname testlab.Region.Org.COM Which two statements about this command string are true? (Choose two.)
A.The server's name is testlab, and it resides on the region.org.com domain.
B.Executing this command populates the /etc/defaultdomain file with the domain name.
C.The domain name is case sensitive, and must be configured exactly as specified on the command­line
D.The domain name is the entire character string testlab.Region.Org.COM, and no DNS domain is specified.
Answer: C, D

14.Which three commands manually pull only the hosts maps from the NIS master to the NIS Slave? (Choose two.)
A.cd/var/yp; make
B.ypinit ­s nis_master
C./usr/lib/netsvc/yp/ypxfr/etc/hosts
D./usr/lib/netsvc/yp/ypxfr hosts.byaddr
E./usr/lib/netsvc/yp/ypxfr host.byname
Answer: B, D

15.Which three daemons are executed by the /usr/lib/netsvc/yp/ypstart script on an NIS master server? (Choose three.)
A.ypcat
B.ypbind
C.ypinit
D.ypserv
E.ypxfrd
Answer: A, B, C

16.You are using CacheFS for a number of your shared directories and need to check if logging has been enabled for /usr/share/main. Which command would check if it was enabled?
A.cachefslog /usr/share/man
B.cfsadmin ­l /usr/share/man
C.cachefslog ­f /usr/share/man
D.cachefslog ­l /usr/share/man
Answer: A

17.Which command creates a log called /var/home_cache.log and initiates logging for the
/export/home file system which is being cached?
A.cachefslog /var/home_cache.log
B.cachefslog ­h /var/home_cache. log
C.cachefswssize /var/home_cache. log
D.cachefslog ­f /var/home_cache. log /export/home
E.cachefslog ­s /var/home_cache. log /export/home
Answer: D

18.Which command configures the cache /export/home_cache that should be used when caching the /export/home file system?
A.cfsadmin ­l /export/home_cache
B.cfsadmin ­p /export/home_cache
C.cfsadmin ­c /export/home_cache
D.cfsadmin ­m /export/home_cache
E.cachefslog ­c /export/home_cache
Answer: C

19.Which command should be used to manualy invoke a consistency check and perform any necessary updates on a cacheFS file system?
A.cfsadmin ­c
B.cfsadmin ­d
C.cfsadmin ­s
D.cachefsstat ­z
E.cachefswssize ­s
Answer: C

20.What must be done before you run the command to check the integrity of the cached system
/export/home_cache?
A.delete the cache
B.check the cache statistics
C.obtain the cache ID number
D.unmount the cached file system
E.adjust the working set size of the cache
F.find all backup superblock numbers for the file system
Answer: D

21.Which two statements about naming services are true? (Choose two.)
A.Naming services provide a means for centralizing commonly used data.
B.Naming services provide a means of keeping commonly used data consistent across large networks.
C.Naming services allow user's files to be held centrally, while logging into different systems on the network
D.Naming services provide a means of making the system less dependent on the network for functionality
Answer: A, B

22.You have been tasked with rationalizing all the user accounts on the many systems on your network bringing them under the central control of a naming service. Which three are naming services that would enable you to do this? (Choose three.)
A.Configure your network to use NIS.
B.Configure your network to use FTP.
C.Configure your network to use NFS.
D.Configure your network to use DNS.
E.Configure your network to use NFS+.
F.Configure your network to use LDAP.
Answer: A, B, C

23.The auto_home autofs is an example of which type of map?
A.xfn
B.direct
C.master
D.generic
E.indirect
Answer: E

24.Given this line from a name service configuration file: hosts files nis nisplus dns Which statement correctly describes the behavior of the name service switch?
A.The attempt to locate a host's IP address would begin with DNS and continue if necessary, to use each name service, reading right to left stopping only if the IP addres was found or the name service list exhausted.
B.The attempt to locate a host's IP address wourd begin with local files and continue, if necessary, to use each name service, reading left to right stopping only if the IP address was found or the name service list exhausted.
C.The attempt to locate a host's IP address wourd begin with DNS and continue, if necessary, to use each name service, reading right to left stopping if the IP address was found, any of the name services were unavailabele, or the name service list exhausted.
D.The attempt to locate a host's IP address would begin with local files and continue, if necessary, to use each name service, reading left to right stopping if the IP address was found, any of the name services were unavailable, or the name service list exhausted.
Answer: B

25.You administer a very large network of systems, using the NIS+ naming service. Your company wants to wants to implemetn a solution with equiralent scalability that will support a more heterogeneous environment. Which action provides the solution?
A.configure your network to use NIS
B.configure your network to use FTP
C.configure your network to use NFS
D.configure your network to use NIS+
E.configure your network to use DNS F.configure your network to use LDAP
Answer: F

26.Given: ethers: nis [UNAVAIL=return] files Which two statements correctly describe the behavior
of the name service switch? (Choose two.)
A.If the NIS server does not find the appropriate entry in the ethers table, you will be prompted to continue.
B.If the NIS server does not respond, the search for the ethers entry will end without looking in the local file.
C.If NIS does not find the appropriate entry in its ethers map, the search will end without looking in the local file.
D.If the NIS server does not respond, the search for the ethers entry will continue by looking for it in the local file.
E.If NIS does not find the appropriate entry in its ethers table, the search will continue by looking for it in the local file.
Answer: B, D

27.Which three can function as naming services for the Soaris 8 Operating Environment? (Choose three)
A.NIS+
B.DNS
C.NFS
D.UFS
E.UNS
F.LDAP
Answer: A, B, C

28.Which name should be given to a direct automount map when it is created?
A.It can be called anything
B.It can only be called auto.direct
C.It can only be called auto_direct
D.It can only be called auto_master.
E.It can be called anything as long as it is preceded by auto_.
Answer: A


© 2014 Cheat-Test.com, All Rights Reserved