Sun Certified System Administrator for Solaris 8 Study Guide

by ;
Edition: 1st
Format: Paperback
Pub. Date: 2001-10-12
Publisher(s): Prentice Hall
List Price: $39.99

Rent Book

Select for Price
There was a problem. Please try again later.

New Book

We're Sorry
Sold Out

Used Book

We're Sorry
Sold Out

eBook

We're Sorry
Not Available

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Summary

Sun Certified System Administrator for Solaris 8 Study Guideis the only Solaris 8 administration exam prep guide endorsed by Sun Educational Services - and the only book with assessment questions approved by the exam's creators. More than a study guide, it's an outstanding reference - covering files, filesystems, disks, backup, installation, initialization, shutdown, commands, shells, security, processes, GUIs, user administration, troubleshooting, and much more.

Author Biography

PETER H. GREGORY is manager of Security Strategy at AT&T Wireless in Redmond, Washington. He has served as computing systems and security architect, system administrator, network engineer, webmaster, and network software engineer for AT&T Wireless. Previously, he was lead software development engineer for a UNIX-based casino management product. His previous books include Solaris Security (Prentice Hall PTR/Sun Microsystems Press).

Table of Contents

Preface xvii
System Concepts
1(26)
Operating System
2(1)
Programs and Processes
3(14)
The ps Command
4(3)
The prstat Command
7(4)
Signals
11(1)
Terminating an Active Process
12(2)
The pkill Command
14(3)
Daemon Processes
17(1)
The File System
17(2)
Getting Help
19(4)
Man Pages
19(4)
Chapter Summary
23(1)
Test Yourself
23(4)
Installation
27(36)
Installation Planning
28(2)
Memory
28(1)
Disk Space
28(1)
Software Clusters
29(1)
Network Information
29(1)
Release Media
30(1)
Software Installation on a New System
30(3)
Installing from CD-ROM
31(2)
Software Installation on an Existing System: Solaris Upgrade
33(4)
Preparing for an Upgrade
34(1)
Upgrade Procedure
35(2)
Installing Software Packages
37(9)
pkgadd Command
37(3)
pkginfo Command
40(4)
pkgrm Command
44(2)
Noninteractive Package Installation and Removal
46(4)
pkgchk Command
47(3)
Installing Patches
50(8)
Where to Obtain Patches
50(1)
Patch Installation
51(1)
Decisions about Patches
51(1)
Installing a Patch
52(3)
Listing Which Patches Are Currently Installed
55(2)
Removing a Patch
57(1)
Chapter Summary
58(1)
Test Yourself
59(4)
The Boot PROM
63(18)
Overview of the Boot PROM
64(1)
Accessing the Boot PROM
64(1)
Entering Boot PROM with Stop A or BREAK
64(1)
Entering Boot PROM at Powerup
65(1)
Boot PROM Commands
65(2)
Boot PROM Configuration Variables
67(3)
Accessing Boot PROM Configuration Variables
68(1)
Accessing Boot PROM Configuration Variables from UNIX
69(1)
Boot PROM Security Levels
70(1)
Devices and Device Aliases
71(3)
The devalias Command
72(1)
The nvalias and nvunalias Commands
73(1)
Troubleshooting
74(2)
System Boots from Wrong Device
74(1)
System Boots from a Disk Instead of from the Network
75(1)
System Boots from the Wrong Disk
75(1)
System Will Not Boot from Disk
75(1)
Nonresponsive System
75(1)
Chapter Summary
76(1)
Test Yourself
77(4)
Initialization and Shutdown
81(18)
System Run Levels
82(6)
Show System Run Level
83(1)
Sync File Systems
84(1)
Change System Run Level
84(1)
Change Run Level With Init
84(1)
Change Run Level with shutdown
84(2)
Change Run Level with reboot
86(1)
Change Run Level with halt
87(1)
Change Run Level with poweroff
88(1)
The OpenBoot boot Command
88(3)
System Initialization
91(1)
System Shutdown
92(1)
Chapter Summary
93(1)
Test Yourself
94(5)
User Administration
99(44)
Account Configuration Files
100(6)
The Password File
100(1)
The Shadow File
101(3)
The Group File
104(1)
Primary and Secondary Groupids
105(1)
The Root Account
106(1)
Admintool
106(7)
Add User Account
106(1)
Modify User Account
107(1)
Lock User Account
108(1)
Delete User Account
108(1)
Add Group
109(2)
Modify Group
111(1)
Delete Group
111(2)
User Administration Shell Commands
113(9)
useradd Command
113(3)
usermod Command
116(3)
userdel Command
119(1)
groupadd Command
120(1)
groupmod Command
121(1)
groupdel Command
122(1)
Shells
122(6)
Bourne Shell
123(1)
Initialization Files
123(1)
Environment Variables
124(1)
Aliases
124(1)
C-Shell
124(1)
Initialization Files
124(1)
Environment Variables
125(1)
Aliases
125(1)
Command History
125(1)
Filename Completion
125(1)
Korn Shell
125(1)
Initialization Files
126(1)
Environment Variables
126(1)
Aliases
126(1)
Command-Line Editing
127(1)
Command History
127(1)
Restricted Shells
127(1)
User Account Commands
128(9)
Finding Files by Usernames or Group
128(1)
What Users Are Logged In?
129(1)
who Command
129(1)
rwho Command
130(1)
rusers Command
131(1)
finger Command
132(2)
Change Password
134(1)
Password Complexity
135(1)
Root and Password Changes
136(1)
Chapter Summary
137(1)
Test Yourself
138(5)
Files and Directories
143(24)
Paths
144(1)
Path Metacharacters
145(1)
Exploring the File System
145(4)
File System Navigation
145(1)
Listing the Contents of Directories
146(2)
Determining File Size, Type, Owner, and Modification Date
148(1)
The file Command
149(1)
Working with Files
149(9)
Creating Files Using the touch Command
149(1)
Creating Files Using Output Redirection
150(1)
Creating Files Using Copy
151(1)
Moving Files
152(1)
Renaming Files
153(1)
Removing Files
153(2)
Displaying the Contents of Text Files
155(1)
Searching for Text within Files
156(2)
Working with Directories
158(4)
Creating Subdirectories
158(1)
Renaming and Moving Directories
159(2)
Removing Directories
161(1)
Chapter Summary
162(1)
Test Yourself
162(5)
VI Editor
167(18)
Starting the vi Editor
168(1)
vi Modes
169(1)
Command Mode
169(1)
Input Mode
170(1)
Last Line Mode
170(1)
Exiting vi
170(1)
Moving around the File
171(1)
Advanced Moving around the File
171(1)
Text Editing
172(2)
Inserting Text
173(1)
Commands While Inserting Text
173(1)
Deleting Text
173(1)
Changing Text
173(1)
Copying, Inserting, Searching, and Replacing
174(2)
Copying Text into Buffers
174(1)
Inserting Text from Buffers
175(1)
Search and Replace
175(1)
Reading and Writing Files
176(1)
Miscellaneous Commands
177(1)
Numerals Before vi Commands
178(1)
Mapping New Commands
178(1)
vi Configuration Commands
179(1)
vi Configuration File
179(1)
Chapter Summary
180(1)
Test Yourself
180(5)
Disks
185(26)
Adding Disks to a System
186(2)
Adding a Device Dynamically Using the devfsadm Command
186(2)
Disk Devices
188(2)
Raw and Block Device Interfaces
188(1)
Device Interfaces File Names
188(1)
Tools and Disk Interfaces Used
189(1)
Formatting Disks
190(9)
Partition Submenu
192(2)
Formatting a Disk
194(1)
Changing the Partition Table
195(4)
Creating, Tuning, and Checking File Systems
199(8)
Creating File Systems with newfs
199(3)
Tuning File Systems with tunefs
202(1)
Checking File Systems with fsck
202(3)
Lost Files in lost+found
205(2)
Chapter Summary
207(1)
Test Yourself
208(3)
File Systems
211(32)
File System Types
212(3)
UFS File System
212(1)
S5FS File System
212(1)
HSFS File System
213(1)
PCFS File System
213(1)
UDFS File System
213(1)
NFS File System
213(1)
CacheFS File System
213(1)
TMPFS File System
214(1)
LOFS File System
214(1)
PROCFS File System
214(1)
Mnttab File System
214(1)
XMEMFS File System
214(1)
Solaris File Systems
215(5)
File Systems and Their Function
215(1)
Directories
215(1)
File Types
216(2)
Inodes
218(1)
Creating Hard and Symbolic Links with the In Command
219(1)
Mounting Fixed File Systems
220(9)
The mount and umount Commands
220(5)
Automatic File System Mounting at Boot Time
225(1)
The /etc/vfstab File and the mount Command
226(1)
The /etc/mnttab File
227(1)
The mountall and umountall Commands
228(1)
Working with Removable File Systems
229(4)
Mounting and Unmounting Removable Media without Volume Management
229(1)
Creating UFS File Systems on a Diskette
230(2)
Ejecting Media
232(1)
Volume Management
233(5)
Volume Management Daemon
235(1)
Mounting CD-ROMs with Volume Management
235(1)
Mounting Disketes with Volume Management
235(1)
Volume Management Configuration
236(2)
Chapter Summary
238(1)
Test Yourself
239(4)
Backup and Recovery
243(62)
Compressing Files
244(7)
compress and uncompress
244(2)
zcat
246(1)
pack, unpack, and pcat
247(1)
gzip, gunzip, and gzcat
248(3)
Creating Archive Files
251(31)
tar
252(7)
cpio
259(7)
zip and unzip
266(13)
jar
279(3)
Backing Up a System to Tape
282(16)
Tape Devices
282(1)
The mt Command
283(2)
ufsdump and ufsrestore
285(7)
ufsrestore Interactive Mode
292(3)
tar and cpio
295(3)
Recovering a System from a Backup Tape
298(1)
Chapter Summary
299(1)
Test Yourself
300(5)
Security
305(28)
File and Directory Permissions
306(3)
Working with File Permissions
306(1)
Files with SetUID and SetGID Permissions
307(1)
Working with Directory Permissions
308(1)
Directories with Sticky Bit Permissions
308(1)
Directories with SetUID and SetGID Permissions
309(1)
Displaying File and Directory Permissions
309(2)
Changing File and Directory Permissions
311(10)
The chown Command
312(1)
The Chgrp Command
313(1)
The Chmod Command
314(4)
The umask Command
318(2)
umask and Directories
320(1)
File and Directory Access Control Lists
321(5)
Setting Access Control Lists
322(2)
Displaying Access Control Lists
324(2)
Working with Access Control Lists
326(1)
Finding Files and Directories with Permission Attributes
326(2)
Chapter Summary
328(1)
Test Yourself
329(4)
Remote Administration
333(26)
Remote Sessions
334(7)
telnet Command
334(4)
rlogin Command
338(3)
Remote Commands
341(2)
Remote File Copy
343(7)
rcp Command
343(1)
ftp Command
344(6)
Remote Login Access Control
350(2)
/etc/default/login File
350(1)
/etc/nologin File
351(1)
Remote Administration Access Control
352(3)
/etc/hosts.equiv File
352(1)
rhosts File
352(1)
Format of /etc/hosts.equiv and .rhosts
352(1)
/etc/hosts.equiv and .rhosts Search Order
353(2)
Chapter Summary
355(1)
Test Yourself
356(3)
Appendix A Answers 359(10)
Appendix B Examination Objectives 369(4)
Appendix C Sample Pre-Test Agreement 373(4)
Appendix D Sun Certification Program Policy on Candidate Misconduct 377(2)
Appendix E Supplemental Information 379(22)
Appendix F Additional Resources 401(2)
Index 403

Excerpts

Why Certification?What is all the commotion about technical certifications? Is it just hype? Is it just 21st Century snake oil? Or is there really something to it? What is the true value of a certification? In the quest for competitive advantage among IT professionals, certification is rapidly becoming key to distinguishing between potential job candidates. Here is what industry analysts are saying: Certification in leading technologies (such as Solaris) is a key to higher pay. This reflects a trend where companies are paying more for knowledge, rather than just experience. Certification is becoming the new standard for professionalism in business. Although the college degree is still very important, the technical certification is evidence of proficiency with a particular technology or product. Certification is an independent, objective verification of knowledge. Having a certification may be the difference in getting invited to the interview. Technologists need differentiators-not just accomplishments, but objective measures of technical proficiency-to stay competitive and stand out from the crowd of wannabe's. Managers value certification because it increases quality and productivity of work. Solaris is the market leader in the UNIX space. UNIX is the leader in the server OS space. Solaris does the heavy lifting on Wall Street, in compute-intensive engineering and biotechnology, and in E-commerce.You need a certification if you want to stay ahead of the competition. This book will guide you to Solaris certification. Intended AudienceThis study guide is intended for experienced UNIX administrators who wish to prepare for the Sun Certified System Administrator for the Solaris 8 Operating Environment, Part I exam.This book does not teach system administration, nor is it a substitute for systems administration classes taught by Sun Microsystems or its affiliates. Although this book may be a little "teachy" here and there, its purpose is to provide review material to help candidates prepare for the exam.If you wish to take the exam but feel that you need to learn more, contact Sun Education at http://suned.sun.com/. There you can find out about training materials and classes in your area. You can also contact Sun Education at:Sun Education UBRM12-175 500 Eldorado Blvd. Broomfield, CO 80021 Phone: (800) 422-8020, or (303) 464-4097 Fax: (303) 464-4490 Registering for the ExamFollow these steps to register for the exam:1.Purchase a Certification Voucher by calling Sun Education at 1-800-422-8020. Outside the U.S., contact your local Sun Education office. If you do not know the location of your local Sun Education office, you can find it at: http://suned.sun.com/USA/certification/global_contacts/index.htmlThe exam costs U.S. $150.00.You will be given a voucher number, which will be the letters "SE" followed by eight digits; for example, SE01470053. Save this number--you will need it to schedule the examination. 2.Schedule your examination by visiting the Prometric Services Web site athttp://2test.com/ a.Select Information Technology Certifications. You'll then be taken to a login page; you must log in to continue (you will have an opportunity to create a login if this is your first visit to the site). b.After logging in, you will see the Certification Program page; select Sun Education from the pull-down menu. c.Select the country where you will take your exam. d.Select 310-011 SUN CERTIFIED SYSTEM ADMINISTRATOR FOR SOLARIS 8 PART I from the pull-down menu. Select the state or province if this appears on your screen. e.The exam is available only in English. f.Select

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.