Summary

Summary

SMC is a powerful and versatile tool for managing multiple systems from a single interface where different systems can be customized to administer their own local applications, as well as a set of common applications. This flexibility gives SMC a number of advantages over the admintool or command-line administration. For more information on SMC, read the administrator’s guide on docs.sun.com.

Questions

1. 

What is the optimal use for SMC?

  1. Managing single systems with no customization

  2. Managing single systems with customization

  3. Managing multiple systems with no customization

  4. Managing multiple systems with customization

 D. The optimal use for SMC is to manage multiple systems with customization.

2. 

How is SMC customized?

  1. By compiling new applications

  2. By the creation of toolboxes that define applications for each system

  3. By the creation of a toolbox that defines applications for all systems

  4. By leveraging the object-oriented patterns in Java (SMC is built on Java)

 B. SMC is customized by the creation of toolboxes that define applications for each system.

3. 

Which of the following is not performed by SMC by default?

  1. Assign rights and roles to users.

  2. Configure and format new disks for the system, including laying out partitions, and copying configurations from one disk to another in preparation for RAI

  3. Create a single user account or generate multiple accounts using a consistent specification.

  4. Optimize parallel execution of intermediate source bytecode.

 D. SMC does not perform, by default, optimized parallel execution of intermediate source bytecode.

4. 

Which of the following is not performed by SMC by default?

  1. Manage RMI services through a distributed interface.

  2. Create new groups or modify existing groups.

  3. Create user policies and apply them.

  4. Execute jobs in real time or schedule them for regular, repeated execution.

 A. SMC does not perform, by default, management of RMI services through a distributed interface.

5. 

Which of the following is not performed by SMC by default?

  1. Install support for serial ports, modems, and related physical layer technologies such as PP

  2. Monitor processes and search for resumed, deleted, or suspended processes.

  3. Support developers through profiling and disassemble.

  4. Review system logs and search for anomalous or suspicious entries.

 C. SMC does not support, by default, developers through profiling and disassembly.

6. 

Which of the following is not performed by SMC by default?

  1. Set up mailing lists.

  2. View mounted file systems.

  3. Authenticate administrative users

  4. Authenticate nonadministrative users

 D. SMC does not perform, by default, authentication of nonadministrative users.

7. 

What does the SMC option –auth-data allow?

  1. Allows authentication data to be read from a file

  2. Stipulates the name of a toolbox to read in from a file

  3. Designates the domain name for the systems that are being managed

  4. Nominates the hostname and port number of the server to manage

 A. The SMC option  auth-data allows authentication data to be read from a file.

8. 

What does the SMC option –toolbox allow?

  1. Allows authentication data to be read from a file

  2. Stipulates the name of a toolbox to read in from a file

  3. Designates the domain name for the systems that are being managed

  4. Nominates the hostname and port number of the server to manage

 B. The SMC option  toolbox stipulates the name of a toolbox to read in from a file.

9. 

What does the SMC option –domain designate?

  1. Allows authentication data to be read from a file

  2. Stipulates the name of a toolbox to read in from a file

  3. Designates the domain name for the systems that are being managed

  4. Nominates the hostname and port number of the server to manage

 C. The SMC option  domain designates the domain name for the systems that are being managed.

10. 

What does the SMC option –hostname:port nominate?

  1. Allows authentication data to be read from a file

  2. Stipulates the name of a toolbox to read in from a file

  3. Designates the domain name for the systems that are being managed

  4. Nominates the hostname and port number of the server to manage

 D. The SMC option  hostname:port nominates the hostname and port number of the server to manage.

11. 

What does the SMC option –J specify?

  1. Passes any command-line options to the Java Virtual Machine, such as the initial and maximum heap sizes

  2. Specifies a password for the role rolename

  3. Specifies a password for username

  4. Specifies a role to execute SMC

 A. The SMC option  J passes any command-line options to the Java Virtual Machine, such as the initial and maximum heap sizes.

12. 

What does the SMC option -rolepassword specify?

  1. Passes any command-line options to the Java Virtual Machine, such as the initial and maximum heap sizes

  2. Specifies a password for the role rolename

  3. Specifies a password for username

  4. Specifies a role to execute SMC


 B. The SMC option  rolepassword specifies a password for the role rolename.

13. 

What does the SMC option -password specify?

  1. Passes any command-line options to the Java Virtual Machine, such as the initial and maximum heap sizes

  2. Specifies a password for the role rolename

  3. Specifies a password for username

  4. Specifies a role to execute SMC

 C. The SMC option  password specifies a password for username.

14. 

What does the SMC option -rolename specify?

  1. Passes any command-line options to the Java Virtual Machine, such as the initial and maximum heap sizes

  2. Specifies a password for the role rolename

  3. Specifies a password for username

  4. Specifies a role to execute SMC

 D. The SMC option  rolename specifies a role to execute SMC.

15. 

Which of the following is not a valid entry in the auth-data file?

  1. hostname=ivana

  2. username=root

  3. password=my1asswd

  4. clash=su

 D.  clash=su is not a valid entry in the auth-data file.

Answers

1. 

D. The optimal use for SMC is to manage multiple systems with customization.

2. 

B. SMC is customized by the creation of toolboxes that define applications for each system.

3. 

D. SMC does not perform, by default, optimized parallel execution of intermediate source bytecode.

4. 

A. SMC does not perform, by default, management of RMI services through a distributed interface.

5. 

C. SMC does not support, by default, developers through profiling and disassembly.

6. 

D. SMC does not perform, by default, authentication of nonadministrative users.

7. 

A. The SMC option –auth-data allows authentication data to be read from a file.

8. 

B. The SMC option –toolbox stipulates the name of a toolbox to read in from a file.

9. 

C. The SMC option –domain designates the domain name for the systems that are being managed.

10. 

D. The SMC option –hostname:port nominates the hostname and port number of the server to manage.

11. 

A. The SMC option –J passes any command-line options to the Java Virtual Machine, such as the initial and maximum heap sizes.

12. 

B. The SMC option –rolepassword specifies a password for the role rolename.

13. 

C. The SMC option –password specifies a password for username.

14. 

D. The SMC option –rolename specifies a role to execute SMC.

15. 

D. clash=su is not a valid entry in the auth-data file.



Part I: Solaris 9 Operating Environment, Exam I