Solaris Admin Interview Preparation Guide
Sharpen your Solaris Admin interview expertise with our handpicked 40 questions. Each question is designed to test and expand your Solaris Admin expertise. Suitable for all experience levels, these questions will help you prepare thoroughly. Dont miss out on our free PDF download, containing all 40 questions to help you succeed in your Solaris Admin interview. Its an invaluable tool for reinforcing your knowledge and building confidence.40 Solaris Admin Questions and Answers:
1 :: Explain about kadmin command?
Local kerbeors services can be managed by administering policies, keytabs and principles by managing the kadmin command. Kadmin.local is used to master KDC and it does not require any authentication. On the server login information is passed through a secured server. It checks the principle name by the value of the user environment variable.
2 :: Explain about the command prof_attr?
This forms the RBAC profile database. It displays the relationship between among the profiles in the database. It also gives authorizations between navigation for those files. One of the samples is
Solaris.admin.fsmgr.read.solaris.admin.serialmgr.read.
Solaris.admin.fsmgr.read.solaris.admin.serialmgr.read.
3 :: Explain the differences between setting files using octal codes and symbolic codes?
The main difference between setting files using octal and symbolic code files is symbolic codes are relative whereas octal codes are numeric codes. These settings will remain unless you change the settings explicitly by using symbolic codes. If group execute access gets executed it automatically removes write access permission.
4 :: What is the best solution to avoid large number of groups?
The best solution for not creating large number of groups lies with the system administrator. It is best to use structural group membership which reflects organizational divisions. To manage file access a system admin can use access control lists.
5 :: What is umask?
Wide set permissions can be set by using umask which can set write, read and execute permissions on new files created by the user. These settings can be made from the command line to reflect broad settings. It can also be set from the global system settings file. Umask command displays all the settings made with that command.
6 :: How can you determine whether a file is setUID?
The easiest way to determine whether a file is setUID or not by checking for files which are owned by the root and after checking for files that are owned by root you can check for s flag files assigned to the user permissions. In the permission table the first s refers to setUID root.
7 :: Explain about sticky bit permissions?
This command helps the network administrator to relax a bit. This command will not allow the deletion of the common files present in the common area. This command helps the users by not allowing them to rewrite on other files. Certain permissions can be set which will restrict users to delete files created by them.
8 :: Explain about the command ls?
Ls command gives a way to the main directory and also gives access permissions for files in Solaris. It displays and prints user and group ownerships, file access permissions, filename and files size and creation date.
9 :: Explain about the limitations present in sudo?
There are some limitations for sudo which makes RBAC popular they are
1) It is not possible to assign a user to work on specific file or profile.
2) It is also not possible to assign a user to work on a specific command.
3) By using shell commands and certain functions it is possible to have some restrictions on a user but it would consume time for a larger setup.
1) It is not possible to assign a user to work on specific file or profile.
2) It is also not possible to assign a user to work on a specific command.
3) By using shell commands and certain functions it is possible to have some restrictions on a user but it would consume time for a larger setup.
10 :: What is sudo?
Sudo maintains database of all the privileges assigned to a user name. These privileges can be indentified by different commands present in the database. This feature helps a user to format a disk but the root system cannot be changed.