Which of the following WS-Security token profiles is not supported in Metro?
A. X509 Token Profile
B. Kerberos Token Profile
C. SAML Token Profile
D. SOAP with Attachments (SWA) profile
E. Right Expression Language (REL) Token Profile
You are writing a client that sends a message to a JMS queue.
What two statements are true?
A. You cannot use resource injection to access a JMS destination from a Java EE application client.
B. You can use resource injection to access a JMS destination from a servlet.
C. You must use a JNDI lookup to access a JMS destination from a standalone Java class.
D. You cannot use a JNDI lookup to access a JMS destination from a session bean.
B:In addition to injecting a connection factory resource into a client program, you usually inject a destination resource. Unlike connection factories, destinations are specific to one domain or the other.
*A destination is the object a client uses to specify the target of messages it produces and the source of messages it consumes. In the PTP messaging domain, destinations are called queues. In the pub/sub messaging domain, destinations are called topics.
* In addition to looking up a connection factory in a client program, you usually look up a destination. Unlike connection factories, destinations are specific to one domain or the other. To create an application that allows you to use the same code for both topics and queues, you castand assign the destination to a Destination object. To preserve the semantics of queues and topics, however, you cast and assign the object to a destination of the appropriate type. For example, the following line of code performs a JNDI lookup of the previously created topic jms/MyTopic and casts and assigns it to a Destination object:
Destination myDest = (Destination) ctx.lookup("jms/MyTopic"); The following line of code looks up a queue named jms/MyQueue and casts and assigns it to a Queue object:
Queue myQueue = (Queue) ctx.lookup("jms/MyQueue");
A system administrator has received the Java ES distribution as a two-CD set, and wishes to configure an NFS server to use as an install server for Sun Cluster 3.2. What is the correct procedure?
A. Mount and share each CD from a separate server.
B. This is NOT possible, only the DVD distribution can be used in this case.
C. Create a working directory, share it using NFS, and combine the contents of both CDs into it using the cpio command.
D. Mount the first CD and share it using NFS. When prompted by the installer, unshare and unmount the CD, and repeat the process with the second CD.
A security administrator has a requirement to deploy the Solaris Security Toolkit onto all Solaris servers in the department. In this environment, there are a variety of platforms and operating system versions deployed. Onto which two platforms and operating system combinations can the Solaris Security Toolkit be deployed in a supported configuration? (Choose two.)
A. x86, Solaris 2.4
B. x64, Solaris 9
C. x86, Solaris 10
D. SPARC, Solaris 2.6
E. SPARC, Solaris 8
Company A owns, and is authoritative, for the domain aco.com. Company A is in the process of consolidating systems as a result of the purchase of Company B. As part of this transition effort, network administrators have configured Company A’s DNS server zone files to include and become authoritative for Company B’s bco.com domain. The administrators want to turn off Company B’s DNS servers. Which two steps should be completed prior to this shutdown? (Choose two.)
A. initiate zone transfer to A.root-servers.net
B. create an aco.com to bco.com reverse zone configuration file
C. reduce the TTL value for the aco.com domain
D. require hosts on bco.com to update the IP address used for DNS resolution
E. update the .com Top-Level name server entries for bco.com
You need to create a Flash Archive of a master server. You want to set the following characteristics of the archive:
The archive will be stored as /export/flash/flash_archive, but do not include the /export/flash directory in the archive
The archive description will be root_archive.
The archive must be compressed
The archive will be rooted at the root (/) directory admin is the author of the archive
Do not include Sizing information flash_root is the name of the Flash archive
Based on the above information, which command will you use to create the Flash Archive?
A. flar create -n flash_root -C -R / -d root_archive \
B. flar create -f flash_root -c -R / -d root_archive \
C. flar create -c -R / -x /export/flash \
D. flar create -n flash_root -c -R / -e root_archive \
Only local system files are used during the boot process to configure the system for local Ethernet LAN connectivity.
Immediately after reboot the ifconfig -a command displays:
lo0: flags=1000849<UP,LOOPBACK,RUNNING,MULTICAST,IPv4> mtu 8232 index 1 inet
127.0.0.1 netmask ff000000
Which local network configuration file is missing?
Your x86-based server will not boot Solaris 10 OS. You discover that you need to restore your pboot and boot block on the / (root) slice located on disk c0d0. You first boot off of the CD-ROM or DVD into single user mode. What commands should you run to restore the pboot and boot block on the slice?
A. # cd /usr/lib/ufs# installboot /dev/rdsk/c0d0s0
B. # cd /usr/platform/`uname -m`/lib/fs/ufs # install -bootblock -pboot /dev/rdsk/c0d0s0
C. # cd /usr/platform/`uname -m`/lib/# install-pboot /dev/rdsk/c0d0s2 -b bootblock /dev/rdsk/c0d0s2
D. # cd /usr/platform/`uname -m`/lib/fs/ufs # installboot /usr/platform/`uname -i`/lib/fs/ufs/pboot \ /usr/platform/`uname -i`/lib/fs/ufs/bootblk /dev/rdsk/c0d0s2
Click the Exhibit button. The exhibit shows information about data in Jane’s home directory. Which answer describes where the directory named dir1 is stored within the file system?
A. In the inode associated with directory dir1
B. In the directory file called dir1
C. In the ACL associated with dir1
D. In the directory file called widgets
E. In the inode associated with directory widgets
F. In the ACL associated with widgets
Which of the following best describes what the master.info file contains and how it is used?
A. It contains the values from the CHANGE MASTER statement.
B. When the slave restarts it looks for which master to use from this file.
C. It contains information about the master server, its slaves and its configuration.
D. It is used by an administrator to determine what slaves connect to the master, and other information about the master server.
Assuming you want to add an index on the isofficial column, which of the following statements are true?
A. A SELECT query with WHERE lsOfficial=’T’ will perform much faster with the index because there aren’t
many rows with that value.
B. A SELECT query with WHERE IsOfficial-`F’ will perform much faster with the index because there are
many rows with that value.
C. A SELECT query with a WHERE condition on the IsOfficial column won’t perform much faster because
there are only few distinct values.
D. Each UPDATE or INSERT statement will take longer because the additional index needs to be maintained.
E. You cannot add an index on ENUM columns.
Consider the following:
Which of the quoted values below will be returned for the name field in the SELECT results?
A. ‘ Tom’
B. ‘ Tom ‘
D. ‘Tom ‘