There is a valid SMF manifest located underneath the /var/svc/manifest directory.
Which four methods can be used to add it to the services repository?
A recursive snapshot was taken of the root pool and the snapshot streams are stored on a remote system. The boot disk has failed, has been replaced, and the root pool snapshots have been restored. Which two steps are still required to make the system bootable?
Consider the following:
root@scolll-server:~# pkg publisher
PUBLISHER TYPE STATUS URI
solaris origin online https://pkg.oracle.com/solaris/support/
What does "origin" in the TYPE column say about the package repository?
Select the two requirements of all interfaces in an IP network multipathing group (IPMP).
Frank is a member of two projects on you system. He has a process running in a project called project-clock and needs to move it under the other project he belongs to.
Which command must Frank use to move the process?
Your company requires all nonglobal zones to have a limit on the number of processes. The policy is designed to prevent runaway processes from impacting the global zone and other nonglobal zones. To set a limit on processes, you set the following controls:
rctl:
name: zone.max-processes
value: (priv=privileged,limit=1000,action=none)
rctl:
name: zone.max-lwps
value: (priv=privileged,limit=5000,action=deny)
You must now enable system logging for the zone.max-processes resource control to record when the limit is exceeded. Which command enables system logging for a resource control?
Which option lists default checkpoints for building an image using the Distribution Constructor?
You decide to create a new rights profile to include a selection of Solaris authorizations and commands. The commands in your selection will require extra privileges.
Which two files will you modify to add these privileges and authorizations?
You administer an Oracle Solaris 11 system that uses a user-defined Network Configuration Profile (NCP). You now need to modify the DNS name servers. Select the profile type that you will need to modify.
Consider the following commands and output on the local server:
Also, consider the following route table entry on a remote system:
192.168.2.0 192.168.1.200 UG 1 1
You must configure a virtual switch to connect over net0 to the remote system. Select two commands that complete the configuration.
The following information describes the current dump configuration of your server:
Assume that the following command lines have been run on a system:
(root) # coreadm –g $HOME/var/core/%m.core.%f.%t
(non-root) $ coreadm –p core.%f.%p
Identify the result of a subsequent process crash.
You need to create a virtual network with two zones, one with a web server and the other with an application server that the web server calls. You decide to create a virtual switch and virtual network interface cards (VNICs) for the zones.
Select the command that will create the virtual switch.
You have set resource controls on a project. Now you want to set up syslog to monitor a particular resource control and log a message whenever the resource control is exceeded.
Which option would you choose to activate logging on the global resource control facility to establish a syslog action on a resource control?
You are considering using IPMP and Link Aggregation. Which two statements are true about these technologies?