1.
Which command is used in manual network configuration mode?
Correct Answer
C. Ifconfig
Explanation
In manual network configuration mode, the command "ifconfig" is used. This command allows users to configure and manage network interfaces on a system. It can be used to assign IP addresses, enable or disable interfaces, set netmasks, configure routing, and perform various other network-related tasks. Therefore, "ifconfig" is the correct command to use in manual network configuration mode.
2.
Which command is used in automatic network configuration mode?
Correct Answer
D. Ipadm & dladm
Explanation
The command "ipadm" is used for network configuration in the automatic network configuration mode. Additionally, the command "dladm" is also used for network configuration. Both commands are commonly used in configuring and managing network interfaces and IP addresses in various operating systems.
3.
What is the new network driver framework introduced in Solaris 11 ?
Correct Answer
C. GLDv3
Explanation
GLDv3 is the new network driver framework introduced in Solaris 11. It stands for "Generic LAN Driver version 3". This framework provides a standardized interface between the network drivers and the networking stack in Solaris 11. It allows for improved performance, scalability, and flexibility in network driver development and management. GLDv3 supports various network technologies and provides a common set of APIs for network driver developers to use.
4.
What is use of GLDv3? (2 correct answers)
Correct Answer(s)
B. Link aggregation
C. Ability to support MAC layers other than Ethernet
Explanation
GLDv3 is used for link aggregation, which allows multiple physical links to be combined into a single logical link, increasing bandwidth and providing redundancy. It also supports MAC layers other than Ethernet, enabling the use of different types of media access control protocols.
5.
Name MAC layers other than Ethernet ? (2 correct answers)
Correct Answer(s)
A. IP tunnels
C. Infiniband
Explanation
The MAC layers other than Ethernet are IP tunnels and Infiniband. IP tunnels are used to encapsulate IP packets within another IP packet, allowing them to be transmitted over a different network. Infiniband is a high-speed networking technology commonly used in high-performance computing environments. Both of these MAC layers provide alternative methods for transmitting data and have different features and capabilities compared to Ethernet.
6.
Which command is used for changing MAC addresses in Oracle Solaris 11 ?
Correct Answer
B. Dladm
Explanation
The correct answer is "dladm". In Oracle Solaris 11, the "dladm" command is used for managing and configuring network interfaces. It can be used to change the MAC address of a network interface. The "chmac" command is not a valid command in Oracle Solaris 11. The "dlmac" and "sysmac" commands are also not valid commands in Oracle Solaris 11.
7.
Enhancements to dladm provides? (2 correct answers)
Correct Answer(s)
A. The ability to allow links to be renamed
B. The ability to set properties for NIC drivers using a common command
Explanation
The enhancements to dladm provide the ability to rename links and set properties for NIC drivers using a common command. This means that users can easily change the names of their network links and configure properties for their NIC drivers without having to use multiple commands or interfaces. These enhancements improve the overall usability and efficiency of managing network links and NIC drivers.
8.
How does VNICs, virtual switches and interconnects, VLANs, and routing and firewall functionality help in Networking virtualization? (2 correct answers)
Correct Answer(s)
B. It consolidates an entire distributed computing environment on a single system for prototyping, testing and deployments
D. Removes the restriction of pHysical network devices attached to the system
Explanation
VNICs, virtual switches and interconnects, VLANs, and routing and firewall functionality help in networking virtualization by consolidating an entire distributed computing environment onto a single system for prototyping, testing, and deployments. This allows for easier management and control of the network infrastructure. Additionally, this virtualization removes the restriction of physical network devices attached to the system, providing more flexibility and scalability in network configurations.
9.
How does Network resource management enables any organization to create OS-enforced network sharing policies?
Correct Answer
D. Allows setting bandwidth limits on NICs/VNICs, and assigning CPU resource limits for servicing the NICs/VNICs
Explanation
Network resource management enables any organization to create OS-enforced network sharing policies by allowing them to set bandwidth limits on NICs/VNICs and assign CPU resource limits for servicing the NICs/VNICs. This means that the organization can control the amount of network bandwidth that each NIC/VNIC can utilize, as well as allocate a specific amount of CPU resources for handling the network traffic. By doing so, the organization can ensure fair and efficient network sharing among different users or applications within the network.
10.
All non-global zones including Solaris 10 zones can have its own exclusive IP stack using VNICs with the limitation of dedicating a physical NIC to a zone.
Correct Answer
B. False
Explanation
Non-global zones, including Solaris 10 zones, can have their own exclusive IP stack using VNICs without the limitation of dedicating a physical NIC to a zone. In Solaris 10, VNICs were introduced to allow zones to have their own virtual network interfaces, which can be configured with their own IP addresses and network settings. This allows for more flexibility in network configuration and eliminates the need to dedicate a physical NIC to each zone. Therefore, the correct answer is False.
11.
Administrators can switch between automatic and manual networking by enabling Automatic or DefaultFixed network configuration profile, or by creating their own profile using which command line utilities? (2 correct answers)
Correct Answer(s)
A. Netadm
C. Netcfg
Explanation
Administrators can switch between automatic and manual networking by using the command line utilities netadm and netcfg. Netadm is a command line tool used to manage network profiles in Oracle Solaris. It allows administrators to enable or disable network profiles, switch between automatic and manual networking, and configure network interfaces. Netcfg is another command line utility that allows administrators to create and manage network profiles. It provides a flexible and customizable way to configure network interfaces and switch between different network configurations. Both netadm and netcfg are powerful tools that administrators can use to control and manage networking settings in Oracle Solaris.
12.
Which SMF network service enables administrators to switch between automatic and manual networking?
Correct Answer
A. Svc:/network/pHysical:default
Explanation
The correct answer is svc:/network/physical:default. This service enables administrators to switch between automatic and manual networking.
13.
Fill in the blanks.
Automatic networking, the default for the _____________, discovers and connects to networks (both wired and wireless) depending on network conditions.
Correct Answer
C. Live Media install
14.
What does 'LLPD' stand for?
Correct Answer
B. Link Layer Discovery Protocol
Explanation
The correct answer is "Link Layer Discovery Protocol." LLPD stands for Link Layer Discovery Protocol, which is a network protocol used to discover and advertise network devices and services in a local area network. It allows devices to automatically discover and communicate with each other, making it easier to set up and manage network connections.
15.
What is LLPD?
Correct Answer
A. LLDP is a one-way link layer protocol
Explanation
LLDP stands for Link Layer Discovery Protocol, which is a one-way link layer protocol. It is used by network devices to advertise their identity, capabilities, and neighbors on a local area network. LLDP allows devices to discover and communicate with each other without the need for manual configuration. It operates at the data link layer of the OSI model and is commonly used in Ethernet networks.
16.
Fill in the blanks.
_______ utility can be used to enable or disable an LLDP agent on a physical datalink.
Correct Answer
C. Lldpadm
Explanation
The correct answer is lldpadm.
17.
What is 'Link protection' used for?
Correct Answer
B. Mechanism for preventing potentially malicious or misbehaving guest VMs from sending harmful packets to the network
Explanation
Link protection is used as a mechanism for preventing potentially malicious or misbehaving guest VMs from sending harmful packets to the network. This feature ensures that the network remains secure and protected from any harmful activities or attacks that may be initiated by guest VMs. It helps to maintain the integrity and safety of the network environment by isolating and preventing any harmful traffic from reaching the network.
18.
When is Oracle Solaris IP Filter, ipf used?
Correct Answer
A. When link protection does not support inbound filtering or customizable filtering rules
Explanation
Oracle Solaris IP Filter (ipf) is used when link protection does not support inbound filtering or customizable filtering rules. This means that when the existing link protection mechanisms or rules do not provide the necessary flexibility or control over inbound filtering, ipf can be used as an alternative solution. It allows for the customization of filtering rules to meet specific requirements and grant exclusive access to a physical link or Virtual NIC to a guest VM. It is also used to prevent L2 frame spoofing and can be used to generate any type of packet, including non-harmful ones.
19.
What is Bridging?
Correct Answer
D. OSI layer two technology that is used to connect together separate layer 2 subnetworks, allowing communication between attached nodes as if only a single subnetwork were in use
Explanation
Bridging is an OSI layer two technology that connects separate layer 2 subnetworks, enabling communication between attached nodes as if they were in a single subnetwork. This technology eliminates the need for multiple subnetworks and simplifies communication between nodes.
20.
Basic Ethernet bridging support has been added using which protocols? (2 correct answers)
Correct Answer(s)
C. TRILL
D. Spanning Tree
Explanation
The correct answer is TRILL and Spanning Tree. TRILL (Transparent Interconnection of Lots of Links) is a protocol that enables Ethernet bridging in large networks. It allows for efficient forwarding of Ethernet frames across multiple links. Spanning Tree Protocol (STP) is another protocol used for Ethernet bridging. It prevents loops in the network by selectively blocking redundant links, ensuring a loop-free topology. Both TRILL and Spanning Tree are commonly used in Ethernet bridging to improve network performance and reliability.
21.
IP tunneling functionality has been re-implemented in Oracle Solaris 11 and IP interfaces can be plumbed and managed using which command line utility?
Correct Answer
A. Dladm
Explanation
The correct answer is "dladm". In Oracle Solaris 11, the IP tunneling functionality has been re-implemented, and the "dladm" command line utility is used to plumb and manage IP interfaces.
22.
Which of the following statements best describe 'IP Multipathing (IPMP)'? (2correct answers)
Correct Answer(s)
B. Provides transparent redundancy for IP level communications between the applications running on a system
C. Allows creating multiple paths to the first router
Explanation
IP Multipathing (IPMP) provides transparent redundancy for IP level communications between the applications running on a system. This means that if one interface fails, the IPMP feature automatically switches the communication to another available interface without any interruption or awareness required from the applications. Additionally, IPMP allows creating multiple paths to the first router, which increases the reliability and availability of the network connection.
23.
In order for incoming & outgoing traffic to be forward over an actual fabric, for example a network switch, the fabric must be configured to accept traffic from the specific VNICs of each individual VLAN.
Correct Answer
A. True
Explanation
The statement is true because for incoming and outgoing traffic to be forwarded over a network switch, the fabric needs to be configured to accept traffic from the specific Virtual Network Interface Cards (VNICs) of each individual Virtual Local Area Network (VLAN). This configuration ensures that the traffic is properly routed and delivered to the intended destinations within the network.