SOLARIS[tm] 8 OPERATING ENVIRONMENT EXAM OBJECTIVES
Sun Certified System Administrator for Solaris 8 Operating
Environment, Part I Exam Objectives
Sun Certified System Administrator for Solaris 8 Operating
Environment, Part II Exam Objectives
Sun Certified System Administrator for Solaris 8 Operating
Environment Upgrade Exam Objectives
Sun Certified Network Administrator for Solaris 8
Operating Environment Objectives
SYSTEM CONCEPTS:
- Match selected system administration terms to their
respective definitions: daemons, shell, file system,
kernel, operating system.
- Define the effect of using various man command
options when viewing online manual pages.
THE BOOT PROM:
- State or recognize the combination of actions
required to interrupt a non-responsive system.
- State the command strings used to manipulate custom
device aliases.
INSTALLATION:
- Describe the sequence of steps required to perform
the Solaris 8 Operating Environment software
installation on a networked standalone system.
- Identify the function of the following package
administration commands: pkgadd, pkginfo, pkgchk, and
pkgrm.
- Identify the steps required to install a patch,
verify which patches are currently installed, and remove
a patch using the patchadd, patchrm, or showrev
commands.
INITIALIZATION AND SHUTDOWN:
- Match the Solaris run levels to their intended
functions.
- State the function of the following files or
directories and the relationships between them: /etc/inittab,
/etc/init.d, /etc/rc#(where # falls in the range of 0 to
6, or S), or /etc/rc#.d(where # falls in the range of 0
to 6, or S).
- Identify the commands used to change the run level
of a system to a specified state.
USER ADMINISTRATION:
- Identify the following login procedures: log into a
system, log out of a system, and changing login
passwords.
- State the command used to identify which users are
currently logged into the system.
- State the steps required to create user accounts on
the local system using the admintool utility.
- State the command syntax to add, modify, or delete
user / group accounts on the local system with the
useradd, groupadd, usermod, groupmod, userdel, or
groupdel commands.
- Given a user's login shell, list the shell
initialization files used to set up a user's work
environment at login.
SECURITY:
- Identify how to search for regular expressions in
the contents of one or more files.
- List command sequences used to display or modify
file and directory permissions.
- Differentiate the effect of selected umask values on
the permissions assigned to newly created files and
directories.
- List in sequence the steps to create, modify, and
delete access control lists (ACLs) on files.
PROCESS CONTROL:
- List the commands which display information for all
active processes on the system.
- State the effect of sending a specified signal to a
process.
- List the commands used to terminate an active
process.
FILE SYSTEMS:
- List the different types of file systems in the
Solaris Operating Environment.
- State the effect of the commonly used options of the
mount command
- Differentiate between the purpose of the /etc/mnttab
and /etc/vfstab files.
- Select correct statements about the intended purpose
of the /etc, /opt, /usr, /export, and / (the root)
directories.
- List the steps required to access data on diskettes
or CD-ROMs.
FILES AND DIRECTORIES:
- State the commands used to reduce the size of files
and directories for storage to tape.
- Match the file types of regular files, directories,
symbolic links, device files, and hard links to their
respective functions.
THE BOOT PROCESS:
- Match the boot command options to their respective
functions. Select the command that reports the current
run level of a Solaris System.
- Given a sample run control directory, differentiate
between the basic activity in a script whose name begins
with an upper case S and a script whose name begins with
an upper case K.
DISK CONFIGURATION:
- Select the command used to add device configuration
information for a new disk device without requiring a
reboot of Solaris.
- Differentiate between the uses of a character (raw)
disk (/dev/rdsk) and a block disk (/dev/dsk).
FORMAT:
- Identify the correct usage of the format command.
- Select correct statements about the use of the menu
selections for the format command.
- Select correct statements about the use of the menu
selections for the partition ubcommand under the format
command.
BACKUP AND RECOVERY:
- Match listed backup, archive, and restore utilities
to their respective functional capabilities.
- Identify the commands and steps required to backup a
file system to tape.
- Identify the commands and steps required to restore
a file system from tape.
BASIC COMMAND SYNTAX:
- Using absolute or relative pathnames, select valid
command strings to move between specified points within
a given directory tree.
- Select the metacharacter combinations necessary to
construct pathname abbreviations for access to files and
directories within the directory tree.
- State the commands needed to list the contents of
directories and determine the file types within a
directory.
- List the commands used to create or remove
directories. State the commands used to copy, create,
rename, or remove files.
EDITOR:
- List the keyboard sequences that are required to
switch between the three modes of operation used by the
vi editor.
- State the vi editor commands used to position and
move the cursor, create and delete text, and copy or
move text.
- Match the correct vi command sequences with their
respective search and replace functions.
REMOTE CONNECTION:
- State the command to perform remote system
operations such as remote login, remote copy, and remote
shell commands.
- State the subcommands that are used by the ftp
utility to transfer files between a local system and a
remote system.
CLIENT SERVER RELATIONSHIP:
- List and define the types of servers used in the
Solaris 8 Network Environment.
- List and define the types of clients used in the
Solaris 8 network environment.
SOLARIS NETWORK ENVIRONMENT:
- Define the function of each layer within the
seven-layer OSI model.
- Define the function of each layer in the five-layer
TCP/IP model.
- List the features and functions of the Ethernet.
- Describe the characteristics of RARP and ARP.
- Identify the commands which display information
about the local network interface.
- Describe the relationship between the RPC service
and the rpcbind process.
- Recall how to list registered RPC services.
- Identify the steps necessary to start and stop
network services via the command line.
SOLARIS SYSLOG:
- Identify the functions of syslog.
- Recall the syntax of the syslog configuration file.
- Deduce syslogd behavior from its configuration file.
- Configure syslog messages by increasing the logging
severity level for both the login and telnet daemons.
- Use the command line to update the system log.
DISK MANAGEMENT:
- List the utilities used to create, check, and mount
file systems.
- Identify the logical path name differences between
physical disks and virtual disks.
- List the advantages of a virtual disk management
application.
- Identify the characteristics and functions of
Solstice DiskSuite and the Sun StorEdge Volume Manager.
SOLARIS PSEUDO FILE SYSTEMS AND SWAP SPACE:
- State the characteristics of the Solaris pseudo file
system types.
- List and define the commands used to extract
information from entries in the /proc directory.
- List the steps to create and add a swap file to the
system swap space.
NFS:
- State the functions of an NFS server and an NFS
client.
- List the steps required to make resources available
and unavailable for mounting as a shared resource.
- Identify the command used in the /etc/dfs/dfstab
file on an NFS server to enable automatic sharing of
resources.
- Explain how entries in the /etc/vfstab file can
enable automatic mounting of resources on an NFS client.
- State the function of each of these commands:
mountall, umountall, shareall, and unshareall.
AUTOFS:
- List the benefits of using the automount utility.
- State the purpose of each of the types of automount
maps.
- Identify the steps needed to set up automount to
read a direct map.
- Identify circumstances under which the automount
daemon should be restarted.
CACHEFS:
- Given an existing client-server environment, explain
how to configure the cache file system.
- Use appropriate commands to check the status and
consistency of the cache file system.
- Identify the steps to set up cache file system
logging.
- List the steps necessary to perform a check of the
cache file system.
- Identify the steps to dismantle and delete a cache
file system.
NAMING SERVICES:
- State the purpose of a name service.
- List the different name services and compare their
functionality.
- Given a local area network with a need for a name
service, identify the appropriate name service switch
process and determine which configuration to use for
your network.
- Given a need for a name service, identify the
appropriate name service switch file and determine which
configuration to use for your network.
NIS:
- List and define the processes and components of the
NIS master server, NIS slave server, and NIS client.
- List the steps to configure an NIS master, slave,
and client.
- Given an existing network using the NIS name
service, list the steps to add a new NIS map.
- Given an existing network using the NIS name
service, list commands to update and propagate an NIS
map.
ROLE-BASED ACCESS CONTROL (RBAC):
- State the purpose of the Role-Based Access Control (RBAC)
with regard to Solaris security.
- Select the statements that describe RBAC database
features.
SOLARIS MANAGEMENT CONSOLE[tm]:
- List the configuration features of the Solaris
Management Console.
JUMPSTART-AUTOMATIC INSTALLATION:
- State the purpose of the JumpStart server.
- Identify the main components of a jumpstart server.
- List the parameters possible when using the
add_install_client script syntax.
- State the purpose of the boot service function on a
subnet.
- Identify the events that occur during the JumpStart
Client boot sequence.
- List the files necessary to support the JumpStart
boot operation.
- State the purpose of the sysidcfg file with and
without name service support.
- Select the statements that describe the steps
necessary to set up a JumpStart install server system to
provide the Solaris 8 release software necessary to
install a new system.
- State the purpose of the add_to_install_server,
modify_install_server and add_install_client scripts.
- Given the appropriate software source, explain how
to create a configuration server with a customized rules
file and class files.
- Given an NIS name service network environment,
explain how to configure NIS name service support for
JumpStart.
SECURITY:
- Identify how to search for regular expressions in
the contents of one or more files.
- List in sequence the steps to create, modify, and
delete access control lists (ACLs)on files
FILES AND DIRECTORIES:
- State the commands used to reduce the size of files
and directories for storage to tape.
- Match the file types of regular files, directories,
symbolic links, device files, and hard links to their
respective functions.
EDITOR:
- List the keyboard sequences that are required to
switch between the three modes of operatio n used by the
vi editor.
- State the vi editor commands used to position and
move the cursor, create and delete text, and copy or
move text.
- Match the correct vi command sequences with their
respective search and replace functions.
REMOTE CONNECTION:
- State the command to perform remote system
operations such as remote login, remote copy, an d
remote shell commands.
- State the subcommands that are used by the ftp
utility to transfer files between a local sy stem and a
remote system.
CLIENT-SERVER RELATIONSHIP:
- List and define the types of servers used in the
Solaris 8 Network Environment.
- List and define the types of clients used in the
Solaris 8 network environment.
SOLARIS NETWORK ENVIRONMENT:
- Define the function of each layer within the
seven-layer OSI model.
- Define the function of each layer in the five-layer
TCP/IP model.
- List the features and functions of the Ethernet.
- Describe the characteristics of RARP and ARP.
- Identify the commands which display information
about the local network interface.
- Describe the relationship between the RPC service
and the rpcbind process.
- Recall how to list registered RPC services.
- Identify the steps necessary to start and stop
network services via the command line.
CACHEFS:
- Given an existing client-server environment, explain
how to configure the cache file system.
- Use appropriate commands to check the status and
consistency of the cache file system.
- Identify the steps to set up cache file system
logging.
- List the steps necessary to perform a check of the
cache file system.
NAMING SERVICES:
- List the different name services and compare their
functionality.
- Given a local area network with a need for a name
service, identify the appropriate name service switch
process and determine which configuration to use for
your network.
ROLE-BASED ACCESS CONTROL (RBAC):
- State the purpose of the Role-Based Access Control (RBAC)
with regard to Solaris security.
- Select the statements that describe RBAC database
features.
SOLARIS MANAGEMENT CONSOLE:
- List the features of the Solaris Management Console.
JUMPSTART-AUTOMATIC INSTALLATION:
- State the purpose of the sysidcfg file with and
without name service support.
NETWORK MODEL:
- Identify the purpose of each layer in the TCP / IP
five layer Model.
- Describe the functionality of the following Network
Protocols: TCP, UDP, IP, and ICMP.
- Describe the relationship between the following
Network Protocols: TCP, UDP, IP, and ICMP.
- Describe peer-to-peer communication.
LOCAL AREA NETWORKS:
- Identify the role of the following LAN components:
Bridge, Repeater, Router, Switch, and Gateway.
- Identify the network topologies.
ETHERNET INTERFACE:
- State the purpose of the Ethernet address.
- Identify the commands to get and set driver
configuration.
ARP AND RARP:
- Explain the process of address resolution using ARP
and RARP.
- Identify the commands to manage ARP cache.
- Identify the configuration files and scripts used to
configure a network interface.
INTERNET LAYER:
- Describe the following: IP address, Broadcast
address, Netmask, Datagram, and Fragment.
- Describe Classless Interdomain Routing (CIDR).
- Identify the file used to set netmasks.
- Identify the features and benefits of the Variable
Length Subnet Masks (VLSM).
- Configure a Network Interface.
ROUTING:
- Describe IP routing.
- Identify the Solaris 8 daemons which implement
routing protocols.
- Identify the files used to configure routing.
- Identify the purpose of the files used to configure
routing.
- Administer the routing table.
TRANSPORT LAYER:
- Identify the features of the TCP and UDP.
- Define the terms connection oriented,
connection-less, stateful, and stateless.
- Describe the relationships between port numbers,
network services and inetd.
CLIENT-SERVER MODEL:
- Explain the terms client, server, and service.
- Administer internet services and RPC services.
- Collect information about services configured on
hosts.
DHCP:
- State the benefits of DHCP.
- Identify DHCP configuration files.
- State the purpose of DHCP configuration files.
- Administer DHCP clients and servers.
NETWORK MANAGEMENT TOOLS:
- Identify tools which use the Simple Network
Management Protocol (SNMP).
- Describe the Simple Network Management Protocol
(SNMP).
DOMAIN NAME SERVICE (DNS):
- Identify the purpose of DNS.
- Describe address resolution and reverse address
resolution.
- Identify the correct Resource Record syntax.
- Explain the steps needed to configure DNS.
- Identify the configuration files for DNS.
- State the purpose of DNS configuration files.
NETWORK TIME PROTOCOL:
- Describe the NTP features.
- Identify NTP configuration files.
- State the purpose of NTP files.
- Describe how to configure NTP.
TROUBLE SHOOTING:
- Identify common network problems.
- Diagnose network problems.
- Resolve network problems.
IPv6:
- Describe IPv6.
- Configure an IPv6 network interface.
|