Do you know that? 10% of new freelancers are earning $100 or more per hour. next

Contact Email: teammmrem@yahoo.com

<< All Upwork (oDesk) and Elance Tests << Elance test answers << IT & Programming category

Test answers for Solaris 2020

(135) Last updated: February 28
Elance • IT & Programming
Questions and answers are regularly updated. Answered and not answered tests questions.

This helps getting job: Hundreds of (cover letter examples , interview questions , profile samples ) • Earn on Upwork (oDesk)
Job assistance: jobs popularityfreelance rates

Popular test answers: HTML, .Net, CSS, English, SEO, Photoshop, iOS, Java, Android, Ruby, Python, JavaScript

See all 6 tests answers updated

Find Upwork (oDesk) and Elance test answers on this website:



Collapse | Expand

135 Answered Test Questions:

1. When using the ls command to display size of files,  you display file sizes and directory sizes in  Kbytes, Mbytes, Gbytes, or Tbytes  (when the file or directory size is larger than 1024 bytes) using:

Answers:

• -l

• -s

• -ld

• -h

2. If you need to shut down Solaris in 30 seconds for an installation, what is the command?

Answers:

• seconds-30

• -time30

• -s30

• -g30

3. Which command allows you to update your current password?

Answers:

• changepass

• passupd

• password

• passwd (*)

4. Which of the following command can be used to see the detailed boot sequence?

Answers:

• svcadm -m

• boot -m verbose

• boot -seq verbose

• svcadm -seq

5. What command is used to configure Solaris' multipathing support?

Answers:

• mpathsolaris

• mpathadm

• multipathtool

• pathtooladmin

6. You can use Patch Manager to perform the following on your system:

Answers:

• All are correct

• Analyse it and determine which patches are needed

• Apply patches according to system policy

• Download patches onto the system

7. What is ZFS?

Answers:

• An operating system existing within Solaris.

• A file system used by Solaris.

• A framework for using MS Dos.

• A terminal emulator.

8. Which of the following act as an interface between the user and the kernel?

Answers:

• Directory Hierarchy

• RAM

• Kernel

• Shell

9. Within the Solaris Operating System, what is the first line of defense to protect the file system?

Answers:

• Reboot the system.

• Default UNIX permissions assigned to every file system object.

• Compress every file and folder on the system.

• Turn off the system.

10. Solaris 10 OS stores user account and group entry information in the which of following system files?

Answers:

• /etc/passwd

• /etc/shadow

• /etc/passwd /etc/shadow /etc/group

• /etc/group

11. What is the difference between ARC and L2ARC?

Answers:

• ARC is stored on a cloud environment.

• L2ARC runs slower.

• There is no difference.

• ARC is the primary cache, and L2ARC is the secondary cache.

12. What can be called discrete rights to processes that perform operations?

Answers:

• Privelages

• Total access.

• Secure accommodation.

• Operational accessories.

13. Which of the following is TRUE about /bin/ksh ?

Answers:

• Indicates the Bourne shell

• Indicates the C shell

• Indicates the Korn shell

• Indicates the Z shell

14. Which of the following commands can be used for remote copying?

Answers:

• ftp

• rlogin

• rcp

• rsh

15. When installing a non-hot-pluggable device, what must you do before installation?

Answers:

• Short the motherboard circuit out to make it safe.

• Wait for the system to idle.

• Nothing. Just do it really fast before the electricity reaches the circuit.

• Shut down the system.

16. What is a good simple rule to enforce with new users within the Trusted Extension System?

Answers:

• Announce your password to your friends and loved ones.

• Include your password as a signature in your emails.

• Keep your password private.

• Write your password on the monitor.

17. You need to prevent the new staff from performing ???console aborts???. How do you do this?

Answers:

• Change the value of KEYBOARD_ABORT to ???disable??? in the /etc/default/kbd file.

• Console aborts are encouraged to retain data integrity.

• It is impossible to prevent console aborts.

• There is no need to prevent console aborts.

18. What are the benefits of NFS?

Answers:

• It shares common read only file systems

• It shares executables and data files

• It shares host names over network

• All of the given options are valid benefits

19. pkgadm can display the following certificate type:

Answers:

• All are correct

• Trusted

• None are correct

• Signing

20. To find only those files larger than 400 blocks in the current working directory, you use:

Answers:

• ls -ls | grep 400

• du | grep -e "4??"

• find . -exec ls -s \; -print

• find . -size +400 -print

21. The following crontab file (besides root) is stored in the /var/spool/cron/crontabs directory:

Answers:

• sys

• adm

• uucp

• all are correct

22. What is an example of a protocol used on Solaris' network layer?

Answers:

• lyrIP

• Piv4

• IP_4

• IPv4

23. Which of the following commands can be used to ping a host?

Answers:

• pinging

• png

• pngn

• ping

24. To add a new attached printer you use:

Answers:

• Both Solaris Print Manager and LP print service commands

• LP print service commands

• Solaris Print Manager

25. Within the Solaris Operating System, what are authentication services used for?

Answers:

• Secure identification of users via password, or other forms of identification.

• Greeting users who use the system.

• Encouraging more users to use the system without security measures.

• They are used to authenticate services.

26. In the context of Solaris, what are SAN devices?

Answers:

• SAN devices are PBX devices such as telephones and answering machines.

• SAN devices are various kinds of tape drives.

• Storage area network devices are storage devices in a high-speed network that are also connected to servers.

• SAN devices are used to convert your hard disk to beta max format.

27. How to check filesystem damage?

Answers:

• fsok

• sync

• ck

• fsck

28. What will auditing tell you about a Solaris system's security?

Answers:

• It will tell you about changes made to the system.

• Auditing tells the user how fast they can secure their system.

• Auditing tells you how well your disk is encrypted.

• It will tell you how many viruses are on the system.

29. Is it possible to log in via serial port?

Answers:

• Yes.

• No.

• Yes, but access must be granted via the VGA port.

• Yes, but you must also be connected via usb port.

30. For managing terminals and modems, you use:

Answers:

• Both

• Solaris Management Console???s Serial Ports tool

• Service Access Facility (SAF) commands

31. Which of the following are main components of SunOS operating system?

Answers:

• Kernel

• Kernel, Shell and Directory Hierarchy

• Shell

• Directory Hierarchy

32. What is an example of an encrypted authentication service within Solaris?

Answers:

• Kerberos

• SeLinux

• Enigma

• Arkcellos

33. To verify that a certificate was not altered en route, you use the fingerprint (digest):

Answers:

• SHA1

• None are correct

• MD5

• All are correct

34. What is a UNIX File System (UFS) ACL, and what does it do?

Answers:

• Access Control Lists prevent certain users from using the system.

• Access Control Lists are lists of files that are safe to edit.

• Access Control Lists restrict or grant read, write, or execute access to specific users or groups.

• Administrative Control Liasons use hardware to prevent unauthorized access to the system,

35. Which of the following command will output the default shell for the current user ?

Answers:

• echo $SHELL

• ifconfig $SHELL

• ifconfig $DEFAULT

• echo $DEFAULT

36. Which manages all the physical resources of the computer?

Answers:

• Processor

• Kernel

• Shell

• CPU

37. What is the outpout of svcs -d name_of_service command?

Answers:

• Service status

• List all the services this service is depended upon

• List all the processes this service is running

• Returns the location of service logs

38. To view the system's Solaris Release Information you:

Answers:

• use the sacadm command

• display the contents of the /etc/release file

• use the Solaris Information Manager

• execute the command: whatis -V

39. To display the size of one or more directories,  subdirectories, and files, you use:

Answers:

• the fuse command

• the fileinfo command

• the df command

• the du command

40. You suspect an unauthorized use of the ???su??? command. Where do you look and what would it tell you?

Answers:

• ???/var/admin/logs???, and it tells you information about unauthorized users.

• ???/var/adm/sulog???, and it tells you every use of the ???su??? command.

• ???/sys/logs/masterlogs???, and it contains every log file in the system.

• ???/usr/adm/sulog???, and it shuts down all su privelages.

41. To display a system???s Host ID number you use:

Answers:

• the who command

• the host command

• the hmadm command

• the hostid command

42. Under the Solaris Operating System, are double-quotes, left single-quotes and right single-quotes interchangable?

Answers:

• Solaris doesn't use quotes.

• No. Command syntax must be exact.

• Yes, but only double quotes and left-single quotes are interchangeable.

• Quotes are only used to mark text for reference and not read by the compiler.

43. What is location that your project database definition would be stored?

Answers:

• /etc/newswitch.conf

• /etc/nsswitch.conf

• /etc/newswitch.conf

• /etc/nsswitch.def

44. Which of the following commands can be used to capture network packets?

Answers:

• nwpackets

• snoop

• nwpckt

• capture

45. Which of the following is NOT a valid output for command : echo $SHELL

Answers:

• /bin/bash

• /bin/tch

• /bin/ksh

• /bin/sh

46. Solaris is what kind of operating system?

Answers:

• SunOS

• Unix

• Linux

• Windows

47. The International Organization for Standardization designed the OSI Reference Model that uses structured layers. What does the acronym OSI mean?

Answers:

• Operating Systems International

• Open Systems Interconnection

• Open Standards International

• Only Systems Interconnection

48. What is the difference between RAID-0 (Concatenation), and RAID-0 (Stripe) Volumes?

Answers:

• Concatenated RAID-0 writes to the first available component, while Stripe distributes the data equally across all components.

• RAID volumes are encrypted, while Stripe volumes are compressed.

• Concatenated RAID-0 writes to the last available component, Stripe writes to the first available component.

• There is no difference and they are directly interchangeable.

49. Which of the following is TRUE about following command and the option: useradd -u 800 -g TEST

Answers:

• UID number for the new user : 800 Primary group for the new user : TEST

• UID number for the new user : 800 User name for the new user : TEST

• UID number for the new user : TEST Primary group for the new user : 800

• UID number for the new user : 800 Secondary group for the new user : TEST

50. To list the total number of physical processors on a system, you use:

Answers:

• psrinfo -p

• proc -v

• enumerate -P -v

• what -p

51. Which of the following command can be used to add new user accounts to the local system?

Answers:

• adduser

• moduser

• useradd

• usermod

52. The '-g' switch to the shutdown command is followed by:

Answers:

• grace time in seconds

• grace time in minutes

• groups which may abort the shutdown

• groups to be notified of the shutdown

53. When setting up a volume in VTS, what data storage scheme does VTS use?

Answers:

• FAT32

• NTFS

• SATA

• RAID

54. Though the traditional UNIX crypt algorithm is insufficient for current systems, why is it still utilized?

Answers:

• For the sake of backwards compatibility.

• Solaris wanted to leave a back end open for government officials.

• It was far too expensive for Solaris to keep it up to standards.

• Unix is slow to update their crypt algorithms.

55. Which of the following field in /etc/passwd represents user primary group?

Answers:

• uucp

• grp

• UID

• GID

56. Which of the following Solaris 10 command will list all configurable hardware in the system?

Answers:

• configadm

• cfgadm

• configadmin

• cfgadmin

57. If you are on a stand alone system, and you want to bring it to single user mode, you execute:

Answers:

• init 6

• init 0

• init 3

• init s

58. When tuning Solaris, does one system's /etc/system settings govern another systems environment?

Answers:

• No.

• Yes, all settings are global within a network.

• Yes, but only marginally.

• Yes, even settings changed on disconnected systems will be altered.

59. To automatically execute system tasks, you use:

Answers:

• all are correct

• at

• crontab

• none are correct

60. If you add a user to a group while they are already logged on, what do they have to do in order to be able to access files owned by that group?

Answers:

• Change their password.

• Run the "groups" command.

• Log out of the shell and back in.

• Nothing, they will immediately have access.

61. Do you have to be a super user to install a device to your Solaris system?

Answers:

• Any user can install a device to the system.

• No.

• Yes.

• You have to be a guest user with permissions that supersede the super user.

62. You have been assigned the task of interpreting VTS probe errors. Where do you find them?

Answers:

• /var/sunvts/logs/vtsk.err

• vts.probe.errors

• system/vts/probe/errors

• etc/user/errors/vtsk

63. To set up a terminal, you use:

Answers:

• the Service Access Facility

• the Solaris Terminal Manager

• the Solaris Management Console

• the Solaris Print Manager

64. What is the default difference between run levels 2 and 3?

Answers:

• Run level 3 starts NFS services

• Run level 3 starts a web server

• Run level 2 starts NFS services

65. If an adjustment in the /etc/system file has rendered your system unbootable, what command would you use to recover?

Answers:

• rec path -r

• ok boot -a

• restart ok -a

• boot.ok.a

66. What is the name of the daemon that handles FTP transfers?

Answers:

• ftp.daemon

• in.tftc

• in.ftpd

• ftp.123

67. What command would you use to restart the SSH server daemon on Solaris 10 using the Service Management Framework (SMF)?

Answers:

• inetadm restart ssh

• /etc/init.d/ssh restart

• svcs -r sshd

• svcadm restart ssh

68. Which of the following is a default shell for root user?

Answers:

• bourne

• Z

• korn

• C

69. If '-1 < N < 7', Scripts in /etc/rcN.d are executed in:

Answers:

• accordance to comment on '#!' first line

• creation order

• ASCII order of their names

• accordance to their ownership

70. To apply patches to a machine, you use:

Answers:

• None are correct

• smpatch

• the Solaris Management Console Patches GUI tool

• All are correct

71. If you are at the PROM level (you pressed stop-A and got to the ok prompt), and you want to start the system from the Solaris DVD-ROM disk, you use the command:

Answers:

• boot dvd

• boot dvdrom -s

• boot cdrom -s

• boot cd

72. On a newly installed Solaris system, the script /sbin/rc4 performs the following actions contained in the scripts in /etc/rc4.d:

Answers:

• Starts the htt_server process

• None are correct

• Starts smdb and nmdb

• Starts pppoed or pppd daemons

73. Which of the following command can be used to stop a running service?

Answers:

• svcadm stop name_of_service

• svcadm kill name_of_service

• svcadm disable name_of_service

• svcadm -s name_of_service

74. Which of the following is a user profile for a user with Bourne shell as a default shell?

Answers:

• .prof

• .profile

• .bash_profile

• .profile_bash

75. The tnd daemon pulls tnrhdb and tnrhtp information from the LDAP directory and local files. What governs the order that they are loaded?

Answers:

• Their order in the ldapload.conf file.

• They load at the same time.

• Their order in the nsswitch.conf file.

• Their order in the loadingorder.conf file.

76. Which of the following is TRUE for files /etc/hosts.equiv and $HOME/.rhosts?

Answers:

• They run first during install

• They are created by default during the installation

• Thery are related to system security

• They can be created by superuser only

77. Which of the following Solaris 10 command scan for new devices?

Answers:

• devfsadm

• devsadm

• devfadm

• scan

78. When exporting a ZFS storage pool, what effect does the ???zpool export tank??? command have, and what can be done in the event of a failure?

Answers:

• ???zpool export tank??? remounts the system, and -f induces system shutdown.

• ???zpool export tank??? attempts to unmount any mounted file system. The -f option is used to forcefully unmount file systems in the event of a failure.

• The ???zpool export tank??? command forcefully shuts down the system and encrypts the hard disk.

• ???zpool export tank??? encapsulates malicious code in a sandbox. If the system fails, unplug the server.

79. To remove entire temporary directories, you cd to the temp directories,  then use the following command:

Answers:

• find .. -type d -exec rm {} \;

• rm -r *

• rm *

• rm -r /*

80. To remove a crontab file, you use the command:

Answers:

• crontab -r

• rm /etc/cron.d/cron

• rm /var/spool/cron/crontabs

• rm -f /var/spool/cron/crontabs

81. What does system mount option (Solaris 10) nodevices signify?

Answers:

• To disallow the opening of device-special files

• Disallow write access to the file system

• Disallow the execution of programs from the file system

• Disallow clients from mounting sub-directories of shared directories

82. If the repository of the SMF (Service Management Facility) has become corrupted, you can stop the svc.configd daemon with:

Answers:

• pkill svc.configd

• kill -9 svc.configd

• kill -1 svc.configd

• kill svc.configd

83. Which of the following is the default shell for root user in Solaris Operating System ?

Answers:

• C

• Korn

• Bourne

• Borne

84. Once you installed a software package, you can check if the installation is correct with:

Answers:

• pkgverify

• pkgadm -c

• pkgchk -v

• pkginfo -V

85. To display the total number of blocks that are contained in a directory, you use:

Answers:

• du -s

• df -s

• du -h

• df -h

86. If you are at the PROM level (you pressed stop-A and got to the ok prompt), and you want to check the revision number, you use the command:

Answers:

• version

• banner

• revision

• promrev

87. How can you get the WWN info about the HBA ports in a system under Solaris 10?

Answers:

• fcinfo hba-port

• prtdiag -v

• getinfo hba

• hbainfo --WWN

88. Crash dump files are created in the directory:

Answers:

• /var/dump

• /var/crash/

• /var/core

• /crash

89. What must happen before logging into the system?

Answers:

• The user has to use their default program to enter the system without logging in.

• A default project must be assigned to the user.

• The user must press their hand against the monitor.

• The user must log in to the system, and set a default project.

90. What system resource call specifies the total number of files that can be assigned by the open(2) system call?

Answers:

• max.open.file

• open(2)sys.max

• process.max-file-descriptor

• max-file-call

91. Which of the following command will delete the password for user "test" and prompt for a new password on login?

Answers:

• passwd -d test

• password -df test

• passwd -f test

• passwd -df test

92. What directories are included in the root path?

Answers:

• /bin, /root, /mnt, /lib

• /run, /dev, /lib32, /boot

• /usr/gnu/bin:/usr/bin:/usr/sbin:/sbin

• /usr, /share, /etc

93. To create a soft partition, what parameters are needed with the metainit command?

Answers:

• metainit [-s diskset] soft-partition -p [-e] component size

• Metainit [-s set] soft-partition p -e componentsize

• m# [-s d#] soft-partition -p [-e] component *s*

• metainit [-f disks] soft-part -p [-e] component state

94. If users want to perform drag-and-drop operations, what must be true about the source and target label?

Answers:

• They must be different.

• They must be the same.

• The target must be hidden.

• They must be linked.

95. Where are the details displayed by the ls -l command stored?

Answers:

• The file header.

• The directory header

• The inode table.

• The inode for the file. (*)

96. What is the outpout of svcs command?

Answers:

• List all available services

• List all active services

• List all failing services

• List all the processes

97. Which of the following is TRUE about ROOT USER?

Answers:

• User ID=1, Group ID=1

• User ID=1, Group ID=0

• User ID=0, Group ID=0

• User ID=0, Group ID=1

98. How do you list all of the zones that are configured on a system?

Answers:

• listzones

• zones list

• zoneadm list -c

• zoneadm list all

99. To set the hard and soft limits on the number of inodes and the amount of disk space for each user, you use:

Answers:

• quotaon -s

• quotach

• edquota

• quot

100. Because the command, ???mpathadm modify??? is only effective while the system is running, what must be updated to retain changes that are made after a shutdown?

Answers:

• /kernel/disc/scsi_vhci.conf

• /kern/drv/scsi_vhci.conf

• /kernel/config/scsi_vhci.conf

• /kernel/drv/scsi_vhci.conf

101. Which of the followiing commands can be used to change the priority of a process?

Answers:

• priocntl

• nice

• priority

• proc

102. Which of the following is an INVALID control for password management in Solaris 10

Answers:

• HISTORY

• DICTIONLIST

• PWDPOLICY

• NAMECHECK

103. What is Oracle VTS?

Answers:

• Oracle's Video Testing Suite

• A varification testing suite.

• Oracle Variable Transaction System for managing memory.

• It is an Oracle validation test for hardware diagnostics.

104. Which of the following shell is a superset of the Bourne shell with C shell-likeenhancements and additional feature?

Answers:

• Z

• Korn

• Bash

• TC

105. Which of the folllwing files contain user passwords?

Answers:

• /etc/passwd

• Both /etc/passwd and /etc/shadow

• /etc/group

• /etc/shadow

106. To check the status of active processes on a system, you use:

Answers:

• prstat

• pkill

• all are correct

• pgrep

107. To remove a software package you use the command:

Answers:

• all are correct

• pkgrm

• pkgadm -d

• pkgdel

108. Which of the following Solaris 10 command will list all open TCP connections?

Answers:

• netstat -d inet

• netstat -l inet

• netstat -f inet

• netstat -o inet

109. If you want to view information on the certificate you have stored in the package keystore, you use the command:

Answers:

• pkgadm --list

• pkgcert list

• pkgadm listcert

• patchcert list

110. Which of the following directories contain kernel?

Answers:

• /

• /usr

• /etc

• /, /usr and /platform

111. If you are at the PROM level (you pressed stop-A and got to the ok prompt), and you want to get to run level 3 (without a reboot), you use the command:

Answers:

• init 3

• init

• reset

• boot

112. On an inittab File the line starts with 'p3:', if the third field is 'respawn' it means that:

Answers:

• The process indicated on the last field is killed if it is started

• The process indicated on the last field is started, and restarted when it dies

• The process indicated on the second field is started

• All are correct

• The process indicated on the last field is restarted when it dies

113. On a SPARC system, if you want to create a crash (core) dump, you do:

Answers:

• dump

• halt -d

• mkcrash

• core -c

114. Which of the following is not a function of the harness (VTSK) in VTS' agent layer?

Answers:

• Encryption of messages.

• Updating status messages.

• Handling of different user interface commands.

• Logging of messages

115. For a service called SSS, to inspect its properties you do:

Answers:

• svc.inspect SSS

• inetadm -l SSS

• properties -s SSS

• svc --list SSS

116. To verify that a printer's banner page is optional on printer printer-name, you should look for the output line "Banner not required" in response to:

Answers:

• lpstat -P printer-name -v

• lpstat -p printer-name -l

• lpstat printer-name -l

• lpstat -p printer-name

117. Which of the following Solaris 10 commands can be used to create an alias temporarily?

Answers:

• ifconfig

• temp

• echo

• alias

118. By default, the package keystore of a signed packages that is used with pkgadd and patchadd, is stored at:

Answers:

• /var/sadm/pkgs

• /var/sadm/security

• /var/sadm/patch

• /var/adm/pkgs

119. When applying patches with Patch Manager, you

Answers:

• Need to set up the keystore manually but the certificates are handled automatically

• Do not need to set up the keystore manually but the certificates are handled manually

• Need to set up the keystore and certificates manually

• Do not need to set up the keystore and certificates manually

120. To install a package non-interactively, by default you can set an response file to the 'pkgadd -a' command in:

Answers:

• /var/sadm/pkgs

• /var/adm/install/pkgs

• /var/sadm/pkginst/auto

• /var/sadm/install/admin

121. Instead of using the pprosetup and pprosvc commands, it is better to use the command:

Answers:

• pkgadm -P

• pkgadm -p

• patchadm

• smpatch

122. In order to use the 'smpatch add' command, your system should be in:

Answers:

• single-user mode

• multi-user without networking mode

• All are correct

• PROM (ok prompt) mode

• any run level is okay when installing patches

123. If you want to get a list of all software packages installed on the system you use:

Answers:

• pkginfo -l -a

• pkglist -a

• pkginfo --all

• pkginfo

124. Which of the following Solaris 10 commands can be used to create a permanent alias?

Answers:

• ifconfig

• temp

• alias

• echo

125. Which of the following commands will output all the interfaces to a system?

Answers:

• ping

• ifconfig

• ipconfig

• netstat

126. After the cron daemon executes an at job, the at job???s file:

Answers:

• is removed from the atjobs directory

• is moved to /tmp

• stays the atjobs directory, but is no longer executable

• is moved to /var/spool/cron/

127. Which is not a tunable parameter in Solaris?

Answers:

• Range

• Implicit

• Range Configuration

• Commitment Level

128. The equivalent of using the following three commands: smpatch analyze, smpatch download, and smpatch add, is to use the command:

Answers:

• smpatch install

• smpatch update

• smpatch apply

• patchadd -u -a -i

129. To display information about how disk space is used,  the following is employed:

Answers:

• the diskuseage command

• the df command

• the diskinfo command

• the du command

130. What does command ps print without option?

Answers:

• all jobs belong to the user

• all process

• all jobs

• all process belong to the user

131. You can change the locales on your system without  reinstalling the OS or manually adding and removing packages,  using the command:

Answers:

• localeadm

• chlocale

• localeset

• locale

132. To list all users of each mounted UFS file system and the number of 1024-byte blocks used, you employ:

Answers:

• quot -a

• du -a -u

• who -d UFS

• users -F ufs

133. To schedule single (one-time) system tasks, you use the following facility:

Answers:

• schedule

• at

• systask

• crontab

134. To determine whether a system has 32 bit or 64???bit capabilities  enabled on x86 based systems, you use:

Answers:

• the isainformation command

• the isalist command

• all are correct

• the archinfo command

135. The Service Access Facility enables you to set up  ttymon and listen port monitors by using:

Answers:

• the nlsadmin command

• the ttyadm command

• the pmadm command

• the sacadm command