Sun Certified System Administrator for Solaris 10 Study Guide Exams 310-XXX & 310-XXX
Chapter 1: UNIX Operating System: Mind the Gap
- Table 1-1: Some events in the history of UNIX
- Table 1-2: Examples of UNIX flavors
- Table 1-3: Characteristics of UNIX
- Table 1-4: History of Solaris releases
- Table 1-5: Command prompts displayed by different shells for an ordinary user and a superuser
Chapter 2: Installing Solaris 10 Software
- Table 2-1: Hardware requirements for Solaris 10 installation
- Table 2-2: Different installation methods
- Table 2-3: Different display options
- Table 2-4: Disk space requirements for installing different Solaris software groups
- Table 2-5: The required installation media and software
- Table 2-6: Some commands for package management
Chapter 3: Performing System Boot and Shutdown
- Table 3-1: Commonly used OpenBoot PROM commands (do not type ok; it's a command prompt)
- Table 3-2: Emergency commands from keyboard (<key1>-<key2> means hold down both keys at the same time)
- Table 3-3: Solaris run levels
- Table 3-4: Different ways of shutting down a system under different situations
- Table 3-5: Prompts for different run levels
- Table 3-6: Different commands for shutting down the system under different situations
- Table 3-7: Different methods for booting under different situations
- Table 3-8: A list of NVRAM parameters, also called openboot configuration variables
- Table 3-9: Commands to view and change the values of the NVRAM parameters
- Table 3-10: Relationship between the init run levels and the SMF milestones
Chapter 4: Managing File Systems
- Table 4-1: Number of bytes per inode with varying disk size
- Table 4-2: Comparison of hard and soft links
- Table 4-3: Default file systems created during Solaris installation
- Table 4-4: Possible values of a file system state flag
Chapter 5: Managing Disks
- Table 5-1: Device interface types required by some commonly used commands
- Table 5-2: Differences between the disk slices on SPARC and x86 systems
- Table 5-3: File systems on disk slices
- Table 5-4: Main tasks that you can perform by using the format utility
- Table 5-5: Commands that generate the output that includes a list of devices
- Table 5-6: Commands for mounting and unmounting file systems
- Table 5-7: Operands to be used with the -o option of the mount command
- Table 5-8: Accessing data on removable media managed by volume management
Chapter 6: Performing User Administration
- Table 6-1: Components of a user account explained
- Table 6-2: Integers used to specify user ID
- Table 6-3: Fields of an entry in the passwd file
- Table 6-4: Fields in the /etc/shadow file entries
- Table 6-5: Fields in the /etc/group file
- Table 6-6: Default values for some options in the useradd command (you can change these default values by using the -D option with the useradd command)
- Table 6-7: User initialization files for the Bourne, C, and Korn shells (the files are copied into the user's home directory at the time the account is created)
- Table 6-8: Default user initialization files for the Bourne, C, and Korn shells (copied to the user's home directory when you create a user account)
- Table 6-9: Order in which the initialization files are executed for C shell, Bourne shell, and Korn shell when a user logs in
Chapter 7: Performing Security Administration
- Table 7-1: Parameters in the file /etc/default/passwd
- Table 7-2: Commands related to file security
- Table 7-3: File types displayed by the ls command
- Table 7-4: The permission symbols displayed by the ls command
- Table 7-5: Symbolic mode options for the chmod command (the + means the permission is added, = means the permission is assigned, and - means the permission is taken away)
- Table 7-6: Examples for octal permissions using the absolute mode options for the chmod command
Chapter 8: Managing Network Printers and System Processes
- Table 8-1: Some commands to manage processes
- Table 8-2: Summary of fields in the output of the ps command
- Table 8-3: Summary of process states
- Table 8-4: A list of process properties that appear as options in various process management command
- Table 8-5: Most common signals used for controlling processes
- Table 8-6: Acceptable range of values for the crontab time fields
- Table 8-7: Access to the crontab command managed by the cron.allow and cron.deny files
- Table 8-8: Values for the <userList> in the allow or deny files
- Table 8-9: The allow and deny access rules
Chapter 9: Performing System Backups and Restores
- Table 9-1: Some standard file systems to back up
- Table 9-2: Comparison of various backup types
- Table 9-3: Typical tape devices used for backup
- Table 9-4: Examples of incremental and differential backups
- Table 9-5: Options for the cpio command
- Table 9-6: Options for the pax command
- Table 9-7: Comparison of cpio, pax, and tar commands
- Table 9-8: Comparison of various backup commands
- Table 9-9: Commands available for using the ufsrestore command in interactive mode
Chapter 10: Working with the Solaris Network Environment
- Table 10-1: Reserved ports for well-known applications
- Table 10-2: Summary of layers of protocols in the OSI and Internet layering models
- Table 10-3: Variations of Ethernet networks
- Table 10-4: Class structure of IP addresses
- Table 10-5: Network address ranges for different classes
- Table 10-6: Incomplete list of services converted to use SMF
Chapter 11: Managing Naming Services
- Table 11-1: Comparison of various naming services
- Table 11-2: Database sources supported by the switch file
- Table 11-3: The default NIS files (the <key> in the file extension by<key> specifies the key in the file)
- Table 11-4: The NIS daemons
- Table 11-5: NIS utilities
- Table 11-6: The configuration directives in the resolv.conf file
Chapter 12: Managing Virtual File Systems and Core Dumps
- Table 12-1: General guidelines for setting up the swap space on your system as a function of physical memory space
- Table 12-2: Daemons automatically started in NFS version 4 when the system boots
- Table 12-3: Files related to the NFS service
- Table 12-4: Common NFS errors and possible solutions
- Table 12-5: Patterns that can be used to configure the core file paths
Chapter 13: Managing Storage Volumes
- Table 13-1: Comparison of mirrored and duplexed disk systems
- Table 13-2: Performance improvement and fault tolerance provided by various RAID levels
- Table 13-3: Read policies for RAID I volumes
Chapter 14: Managing Access Control and System Messaging
- Table 14-1: Comparison of superuser and RBACK models (RBAC provides more options and flexibility)
- Table 14-2: Fields in an entry of the /etc/security/auth_attr database
- Table 14-3: Fields in an entry of the /etc/security/exec_attr database
- Table 14-4: Files for RBAC databases
- Table 14-5: Commands for RBAC management
- Table 14-6: The most common error condition sources, called source facilities
- Table 14-7: The most common priority levels for syslog messages
Chapter 15: Performing Advanced Installation
- Table 15-1: Fields in an entry of the rules file
- Table 15-2: Different subcommands that can be used with the flar command
- Table 15-3: Characteristics of global and non-global zones compared
- Table 15-4: Subcommands that can be used during an interactive session with the zonecfg utility
- Table 15-5: Subcommands with the zoneadm command to perform various tasks (commands are issued from the global zone)
Категории