Read the most frequently asked 100 top Solaris Administrator interview questions and answers for freshers and experienced job interview questions pdf
Sun Solaris Administrator Interview Questions and Answers List
1. Explain about kadmin command?
Local kerbeors services can be managed by administering policies, keytabs and principles by managing the kadmin command. Kadmin.local is used to master KDC and it does not require any authentication. On the server login information is passed through a secured server. It checks the principle name by the value of the user environment variable.
2. Explain about the command prof_attr?
This forms the RBAC profile database. It displays the relationship between among the profiles in the database. It also gives authorizations between navigation for those files. One of the samples is
3. Explain the differences between setting files using octal codes and symbolic codes?
The main difference between setting files using octal and symbolic code files is symbolic codes are relative whereas octal codes are numeric codes. These settings will remain unless you change the settings explicitly by using symbolic codes. If group execute access gets executed it automatically removes write access permission.
4. What is the best solution to avoid large number of groups?
The best solution for not creating large number of groups lies with the system administrator. It is best to use structural group membership which reflects organizational divisions. To manage file access a system admin can use access control lists.
5. What is umask?
Wide set permissions can be set by using umask which can set write, read and execute permissions on new files created by the user. These settings can be made from the command line to reflect broad settings. It can also be set from the global system settings file. Umask command displays all the settings made with that command.
6. How can you determine whether a file is setUID?
The easiest way to determine whether a file is setUID or not by checking for files which are owned by the root and after checking for files that are owned by root you can check for s flag files assigned to the user permissions. In the permission table the first s refers to setUID root.
7. Explain about sticky bit permissions?
This command helps the network administrator to relax a bit. This command will not allow the deletion of the common files present in the common area. This command helps the users by not allowing them to rewrite on other files. Certain permissions can be set which will restrict users to delete files created by them.
8. Explain about the command ls?
Ls command gives a way to the main directory and also gives access permissions for files in Solaris. It displays and prints user and group ownerships, file access permissions, filename and files size and creation date.
9. Explain about the limitations present in sudo?
There are some limitations for sudo which makes RBAC popular they are
1) It is not possible to assign a user to work on specific file or profile.
2) It is also not possible to assign a user to work on a specific command.
3) By using shell commands and certain functions it is possible to have some restrictions on a user but it would consume time for a larger setup.
10. What is sudo?
Sudo maintains database of all the privileges assigned to a user name. These privileges can be indentified by different commands present in the database. This feature helps a user to format a disk but the root system cannot be changed.
11. What are the different ways to execute profiles?
Profiles can be executed in many different ways some of them are
1) Pfexec executes a single command in profile
2) With some restrictions pfsh and pfcsh can be executed.
3) By directly logging into the account using su.
12. What are the three different system management roles?
There are three different roles specified by Solaris they are
1) Primary administrator who is responsible for security
2) System administrator is responsible for day to day roles
3) Operator is responsible for data back up and maintenance.
13. What is Solaris Roles?
RBAC implementation depends upon the role specified in the administrator profiles. Roles are implemented according to the profile. Also access to certain files and configuration can be assigned by the user profile. It also allows RBAC to differentiate high technical knowledge roles from low ones.
14. What is RBAC?
RBAC is introduced into Solaris for managing specific tasks. These specific tasks are based and defined in the administrator profile. It is based on the standard developed by NIST. RBAC is a very important tool for performing multiple tasks. It also separates tasks which require high technical knowledge from low ones.
15. Describe about Logical Domains and its functions?
LDOMS system administrator center provides resources and links to developers who are trying to install Ldoms technology. It gives you flexibility to group system resources and discrete systems within a computer system physically. It allows you to group system resources physically within its own operating system, identity and resources.
Solaris UNIX version runs on intel, AMD and SPARC platforms. It has migrated from solely a SPARC platform to include other platforms from leading companies. It provides interoperability across various technologies such as developer products, desktop applications, data center, etc.
17. Explain about Solaris?
Solaris is a UNIX based operating system which is available for free. It supports workstations and servers from sun. It is widely recognized for its scalability. This product is almost supported by many server vendors. It is the famous successor to sun operating systems.
18. Display the all files recursively with path under current directory ?
– find . -depth -print
19. Set the Display automatically for the current new user ?
– export DISPLAY=`eval ‘who am i | cut -d”(” -f2 | cut -d”)” -f1’`Here in above command, see single quote, double quote, grave ascent is used. Observe carefully.
20. Display the processes, which are running under your username ?
– ps .aef | grep MaheshvjHere, Maheshvj is the username.
21. List some Hot Keys for bash shell ?
– Ctrl+l . Clears the Screen. Ctrl+r . Does a search in previously given commands in shell. Ctrl+u – Clears the typing before the hotkey. Ctrl+a . Places cursor at the beginning of the command at shell. Ctrl+e . Places cursor at the end of the command at shell. Ctrl+d . Kills the shell. Ctrl+z . Places the currently running process into background.
22. Display the files in the directory by file size ?
– ls .ltr | sort .nr .k 5
23. How to save man pages to a file ?
– man | col .b > Example : man top | col .b > top_help.txt
24. How to know the date and time for . when script is executed ?
– Add the following script line in shell script.eval echo “Script is executed at `date`” >> timeinfo.infHere, .timeinfo.inf. contains date & time details ie., when script is executed and history related to execution.
25. How do you find out drive statistics?
– iostat -E
26. Display disk usage in Kilobytes?
– du -k
27. Display top ten largest files/directories?
– du -sk * | sort -nr | head
28. How much space is used for users in kilobytes?
– quot -af
29. How to create null file?
– cat /dev/null > filename1
30. Access common commands quicker?
– ps -ef | grep -i $@
31. Display the page size of memory?
– pagesize -a
32. Display Ethernet Address arp table?
– arp -a
33. Display the no.of active established connections to localhost?
– netstat -a | grep EST
34. Display the state of interfaces used for TCP/IP traffic?
– netstat -i
35. Display the parent/child tree of a process?
– ptree Example: ptree 1267
36. Show the working directory of a process?
– pwdx Example: pwdx 1267
37. Display the processes current open files?
– pfiles Example: pfiles 1267
38. Display the inter-process communication facility status?
39. Display the top most process utilizing most CPU?
– top .b 1
40. Alternative for top command?
– prstat -a
41) Give the command that will display your default boot device.
the command would be
eeprom boot-device & not printenv as suggested
42) The hardware-level user interface that you see before the operating system has been started is called:
43) Partition sizes can be set manually or from what configuration?
44) What file controls global variables for system wide values for the Bourne Shell?
45) What file contains the location of the namespace configuration textfiles such as hosts.rev, named.local, etc..?
46) Which of the following commands can tell you whether packets are being delayed or dropped on your network?
47) What command enables a printer?
48) In order to save a template in /etc/format.dat, what two steps must occur?
name & save
49) What command will display the VTOC for disk c0t0d0s0?
50) Among the applications below, which one is not a client/server application?
51) When using the admintool, the membership list for groups is separated by what?
52) What file do you put the umask setting in?
The UMASK value for bourne and korn shell users can be modified system wide by editing the “umask” entry in the “/etc/profile” file. To change the default UMASK for the C shell, modify the UMASK variable in “/etc/default/login” file.
53) What flag used with patchadd will prevent a later back out by preventing patchadd from backing up files? If this flag is used, the patch cannot be removed.
You have to use the option “d” along with th patchadd commnad.
54) Which of the following can be an appropriate name for a cluster?
55) What file controls system wide password aging?
56) What SPARC emergency keyboard sequence will take the system to the ok prompt (forth monitor) but will send output to TTYA?
57) Which NFS daemons are found on the NFS server?
These five daemons will be in NFS server.
statd and lockd will be in NFS client too.
58) Where are the templates stored that are copied into the users home directories for their personal customizations?
59) What is “Piping” solaris?
piping:- sending the output of a command to the input of another is called piping.
some examples are:
$cal | wc
will output total line’s,word’s and character’s
$cal | wc | wc
will output total line’s,word’s and character’s
A unix pipe provides a one-way flow of data.
For example, if a Unix users issues the command
$who | sort |lpr
then the Unix shell would create three processes with two pipes between them:
A pipe can be explicitly created in Unix using the pipe system call. Two file descriptors are returned–fildes and fildes, and they are both open for reading and writing. A read from fildes accesses the data written to fildes on a first-in-first-out (FIFO) basis and a read from fildes accesses the data written to fildes also on a FIFO basis.
When a pipe is used in a Unix command line, the first process is assumed to be writing to stdout and the second is assumed to be reading from stdin. So, it is common practice to assign the pipe write device descriptor to stdout in the first process and assign the pipe read device descriptor to stdin in the second process. This is elaborated below in the discussion of multiple command pipelines.
60) How do we know how many LAN cards we have in server?
Just Type in the following command at prompt#ifconfig -a.That shall give the LAN Cards as well as total Physical and Logical IP Addresses
dmesg – It displays all configured items on systems.
61) How can i disable STOP+A utility on SUN machines, which brings system into OK> prompt?
in /etc/system set abort_enable=0 will disable STOP-A ________________________________________There are several ways to disable “STOP-A”
(1)Edit the /etc/default/kbd file
(2)Use the “kbd -a disable” command
(3) Edit /etc/system file
set abort_enable = 0
62) Consider the following crontab entry: ?59 23 13 * 5 /wipe.disk? What time will this cronjob run?
That means: on Black Friday, your hard drive will get wiped out.
==> (on 13th and Friday) 23:59, /wipe.disk will be running________________________________________If the 13’th Day of the month is Friday, the job will run. (week day starts from Sunday day 1).
63) What is the command to do an interactive boot from the ok prompt?
Answer: The Interactive Boot Process:
At the ok prompt, type boot -a and press Enter. The boot program prompts you interactively
After Power on,
at the ok prompt type,
64) Display the all files recursively with path under current directory ?
– find . -depth -print
65) How will you check current ip configuration?
A) # ifconfig –a
66) How will you set a default router ?
A) # /etc/defaultrouter
67) How to remove all current routes and assign 192.168.1.100 as default router?
A) # route flush
# route add default 192.168.1.100
68) How to change the network settings ?
A) # sys-unconfig
69) What all does the NVRAM store?
A) Ethernet Address / Host ID / Time of Day (TOD) clock and EEPROM Parameters
70) Where are all the port numbers stored?
A) Port numbers are stored in /etc/services
71) Where are eeprom file stored ?
72) Some important NIS commands :
1) # ypcat hosts à Prints info from hosts database
2) # ypmatch host1 hosts à Match individual host entries
3) # ypmatch user1 passwd
4) # ypwhich à Returns NIS master server.
73) Controlling the tape drive ?
1) mt –f /dev/rmt/0n à ‘n’ indicates no rewind.
74) What are the network utilities ?
1) snoop à To capture network packets & display contents
2) netstat –i à Displays state of Ethernet address
3) ndd command à Set & examine kernel parameters namely TCP/IP drivers.
75) Network Configuration :
1) /etc/resolv.conf : Contains Internet domain name, name server and search order.
2) /etc/nsswitch.conf : Specifies information source from files, NIS, NIS+ or DNS
3) /etc/hostname.[int](hme0eri0le0] : IP v4 host
4) /etc/nodename : IP v6 host
5) /etc/inet/hosts : Host namefile (/etc/host links to this file)
6) /etc/inet/netmasks : TCP/IP subnet router
7) /etc/inet/protocols : Network protocols
8) /etc/inet/services : Network service name & port numbers
9) /etc/notrouter : Create this file to prevent in.routed or in.rdiscd from starting at boot time
10) /etc/inet/inetd.conf : Internet super daemon config file
11) To change hostname / ip address :
76) How to configure interfaces at boot time>
A) /etc/rcS.d/s30network.sh file à This script is run each time system is booted. It uses ifconfig utility to configure each interface with IP add & other network info.It searches for files called : hostname.xxn in /etc where xx à int type & nà instance of interface