Download Oracle Solaris 11 System Administration.1z0-821.PracticeTest.2018-03-14.243q.vcex

Vendor: Oracle
Exam Code: 1z0-821
Exam Name: Oracle Solaris 11 System Administration
Date: Mar 14, 2018
File Size: 6 MB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Purchase
Coupon: EXAM_HUB

Discount: 20%

Demo Questions

Question 1
zone1 is a non-global zone that has been configured and installed. 
zone1 was taken down for maintenance, and the following command was run:
zoneadm -z zone1 mark incomplete 
The following information is displayed when listing the zones on your system: 
     
Which task needs to be performed before you can boot zone1?
  1. The zone needs to be installed.
  2. The zone needs to be brought to the ready state.
  3. The zone needs to be uninstalled and reinstalled.
  4. The zone needs to be brought to the complete state.
Correct answer: C
Explanation:
If administrative changes on the system have rendered a zone unusable or inconsistent, it is possible to change the state of an installed zone to incomplete. Marking a zone incomplete is irreversible. The only action that can be taken on a zone marked incomplete is to uninstall the zone and return it to the configured state.
If administrative changes on the system have rendered a zone unusable or inconsistent, it is possible to change the state of an installed zone to incomplete. 
Marking a zone incomplete is irreversible. The only action that can be taken on a zone marked incomplete is to uninstall the zone and return it to the configured state.
Question 2
You need to make sure that all of the software packages on your server are up to date. Without installing any updates, which two commands would display .my software updates that are available in the default Oracle repository?
  1. pkg list -u
  2. pkg verify –u ‘*’
  3. pkg search –u
  4. pkg info –r ‘*’
  5. pkg install –nv
  6. pkg update –nv ‘*’
Correct answer: AD
Explanation:
A: the pgk list command display a list of packages in the current image, including state and other information. By default, package variants for a different architecture or zone type are excluded.D: pkginfo displays information about software packages that are installed on the system (with the first synopsis, with -l) or that reside on a particular device or directory (with the second synopsis, with -r).Without options, pkginfo lists the primary category, package instance, and the names of all completely installed and partially installed packages. It displays one line for each package selected. With -r, retrieve the data from the repositories of the image's configured publishers. Note that you must specify one or more package patterns in this case.
A: the pgk list command display a list of packages in the current image, including state and other information. By default, package variants for a different architecture or zone type are excluded.
D: pkginfo displays information about software packages that are installed on the system (with the first synopsis, with -l) or that reside on a particular device or directory (with the second synopsis, with -r).
Without options, pkginfo lists the primary category, package instance, and the names of all completely installed and partially installed packages. It displays one line for each package selected. 
With -r, retrieve the data from the repositories of the image's configured publishers. Note that you must specify one or more package patterns in this case.
Question 3
Which best describes the svc:/system/boot-config service?
  1. It is used to change the milestone on a system.
  2. It is used to set the default run level of the system.
  3. It provides the parameters used to set the system to automatically perform a fast or slow reboot.
  4. When the service is enabled, the system performs a fast reboot by default; when it is disable the system performs a slow reboot by default.
Correct answer: C
Explanation:
Starting with the Oracle Solaris 11 Express release, Fast Reboot is supported on the SPARC platform, as well as the x86 platform. On both platforms, this feature is controlled by the SMF and implemented through a boot configuration service, svc:/system/boot-config. The boot-config service provides a means for setting or changing the default boot configuration parameters.The fastreboot_default property of the boot-config service enables an automatic fast reboot of the system when either the reboot or the init 6 command is used. When the config/fastreboot_default property is set to true the system automatically performs a fast reboot, without the need to use the reboot -f command. By default, this property's value is set to false on the SPARC platform and to true on the x86 platform.
Starting with the Oracle Solaris 11 Express release, Fast Reboot is supported on the SPARC platform, as well as the x86 platform. On both platforms, this feature is controlled by the SMF and implemented through a boot configuration service, svc:/system/boot-config. The boot-config service provides a means for setting or changing the default boot configuration parameters.
The fastreboot_default property of the boot-config service enables an automatic fast reboot of the system when either the reboot or the init 6 command is used. When the config/fastreboot_default property is set to true the system automatically performs a fast reboot, without the need to use the reboot -f command. By default, this property's value is set to false on the SPARC platform and to true on the x86 platform.
Question 4
A user jack, using a korn shell, requests a directory listing as follows:
jack@solaris:/export/home/jack $ 1s
File filea Filea fileb Fileb filec Filec 
Which two statements are correct?
  1. The pattern [?i]*a will expand to filea Filea.
  2. The pattern [fF]*a? will expand to [fF] *a?.
  3. The pattern [gfe] * will expand to file filea fileb filec.
  4. The pattern [g-e] * will expand to file filea fileb filec.
  5. The pattern [fF] [a-zA-z] i*e will expand to file.
Correct answer: AC
Explanation:
A: starting with one single character, second character must be letter i, any characters, ending with letter a.C: starting with letter e, f, or g, followed by anything.
A: starting with one single character, second character must be letter i, any characters, ending with letter a.
C: starting with letter e, f, or g, followed by anything.
Question 5
You created an IP address for interface not.3 with the following command, which executed successfully:
ipadm create-addr –T static –a 192.168.0.100/24 net3/v4 
You then ran:
ipadm show–if 
The result indicated that the interface was down. 
You then ran:
ipadm delete-addr net3/v4 
ipadm create-addr –T static –a 192.168.0.101/24 net3/v4 
ipadm show-if 
The last command indicated that the interface was up. 
Why did it work with the second address specified, but not the first?
  1. The 192.168.0.100 address is reserved for broadcast messages.
  2. Another device exists on the network, using the 192.168.0.100 address.
  3. The network interface card does not support the address 192.168.0.100.
  4. The address 192.168.0.100 is at a boundary and may not be configured in Oracle Solaris 11.
  5. 192.168.0.100 is a DHCP address and may not be statically configured in Oracle Solaris 11.
Correct answer: B
Explanation:
The first IP address is already in use.
The first IP address is already in use.
Question 6
You have a ticket from a new user on the system, indicating that he cannot log in to his account. The information in the ticket gives you both the username and password. The ticket also shows that the account was set up three days ago. 
As root, you switch users to this account with the following command:
su – newuser 
You do not get an error message. 
You then run 1s -1a and see the following files:
local1.cshrc local1.login local1.profile .bash_history .bashrc .profile 
As root, you grep the /etc/passwd file and the /etc/shadow file for this username, with these results:
/etc/passwd contains newuser:x:60012:10:/home/newuser:/usr/bin/bash
/etc/shadow contains newuser:UP: : : : :10: :
As root, what is your next logical step?
  1. Usermod –f 0
  2. passwd newuser
  3. mkdir /home/newuser
  4. useradd –D
Correct answer: B
Explanation:
The content of the /etc/shadow document indicates that the newuser account has no password. We need to add a password. The passwd utility is used to update user's authentication token(s). D: Here the user account already exist. There is no need to create it.When invoked without the -D option, the useradd command creates a new user account using the values specified on the command line plus the default values from the system. Depending on command line options, the useradd command will update system files and may also create the new user's home directory and copy initial files.
The content of the /etc/shadow document indicates that the newuser account has no password. 
We need to add a password. 
The passwd utility is used to update user's authentication token(s). 
D: Here the user account already exist. There is no need to create it.
When invoked without the -D option, the useradd command creates a new user account using the values specified on the command line plus the default values from the system. Depending on command line options, the useradd command will update system files and may also create the new user's home directory and copy initial files.
Question 7
You have a user that needs to use the cron tool to schedule some repetitive tasks. When the user enters the crontab –e command in a terminal window, the following error appears:
crontab: you are not authorized to use cron. Sorry
In order to troubleshoot this issue, in what directory would you start your invest
  1. /etc/cron.d
  2. /var/spool/cron
  3. /var/spool/cron/crontable
  4. /var/spool/cron/atjobs
Correct answer: A
Explanation:
crontab: you are not authorized to use cron. Sorry.This message means that either the user is not listed in the cron.allow file (if the file exists), or the user is listed in the cron.deny file. You can control access to the crontab command by using two files in the /etc/cron.d directory: cron.deny and cron.allow. These files permit only specified users to perform crontab command tasks such as creating, editing, displaying, or removing their own crontab files.The cron.deny and cron.allow files consist of a list of user names, one user name per line.
crontab: you are not authorized to use cron. Sorry.
This message means that either the user is not listed in the cron.allow file (if the file exists), or the user is listed in the cron.deny file. 
You can control access to the crontab command by using two files in the /etc/cron.d directory: cron.deny and cron.allow. These files permit only specified users to perform crontab command tasks such as creating, editing, displaying, or removing their own crontab files.
The cron.deny and cron.allow files consist of a list of user names, one user name per line.
Question 8
You are having an issue with the shutdown command. You wish to determine if the file is a script or an executable program. 
Which command would you use to determine this?
  1. od shutdown
  2. file shutdown
  3. test shutdown
  4. cksum shutdown
  5. attrib shutdown
Correct answer: B
Explanation:
The file command determines the file type file tests each argument in an attempt to classify it. There are three sets of tests, performed in this order: filesystem tests, magic tests, and language tests. The first test that succeeds causes the file type to be printed.
The file command determines the file type file tests each argument in an attempt to classify it. There are three sets of tests, performed in this order: filesystem tests, magic tests, and language tests. The first test that succeeds causes the file type to be printed.
Question 9
What determines which bits in an IP address represent the subnet, and which represent the host?
  1. Subnet
  2. unicast
  3. netmask
  4. multicast
  5. broadcast
Correct answer: C
Explanation:
A subnetwork, or subnet, is a logically visible subdivision of an IP network. The practice of dividing a network into two or more networks is called subnetting. The routing prefix of an address is written in a form identical to that of the address itself. This is called the network mask, or netmask, of the address. For example, a specification of the most-significant 18 bits of an IPv4 address, 11111111.11111111.11000000.00000000, is written as 255.255.192.0.
A subnetwork, or subnet, is a logically visible subdivision of an IP network. The practice of dividing a network into two or more networks is called subnetting. 
The routing prefix of an address is written in a form identical to that of the address itself. This is called the network mask, or netmask, of the address. For example, a specification of the most-significant 18 bits of an IPv4 address, 11111111.11111111.11000000.00000000, is written as 255.255.192.0.
Question 10
Which two accurately identify features of a Solaris 10 branded zone?
  1. executes in a Solaris 10 global zone
  2. is created by importing a Solaris 10 flash archive
  3. enables Linux binary applications to run unmodified
  4. provides a complete runtime environment for Solaris 9 applications
  5. allows a Solaris 10 global zone to be migrated into a Solaris 10 non-global zone on a Solaris 11 system
Correct answer: BE
Explanation:
B: It can be created by importing a Solaris 10 flash archive.You can use the Oracle Solaris Flash archiving tools to create an image of an installed system that can be migrated into a zone. The system can be fully configured with all of the software that will be run in the zone before the image is created. This image is then used by the installer when the zone is installed. Note: You can use alternate methods for creating the archive. The installer can accept the following archive formats:* cpio archives * gzip compressed cpio archives * bzip2 compressed cpio archives * pax archives created with the -x xustar (XUSTAR) format Ä ufsdump level zero (full) backups Note:Branded zones that run an environment different that the OS release on the system  * The lx branded zone introduced in the Solaris 10 8/07 release provides a Linux environment for your applications and runs on x86 and x64 machines on the Oracle Solaris 10 OS. * The solaris8 and solaris9 branded zones enable you to migrate an Oracle Solaris 8 or Oracle Solaris 9 system to an Oracle Solaris 8 or Oracle Solaris 9 Container on a host running the Oracle Solaris 10 8/07 Operating System or later Oracle Solaris 10 release. * The Oracle Solaris 10 Container brand is available in OpenSolaris build 127. These branded zones host Oracle Solaris 10 user environments. Note: One of the powerful features of Solaris 11 is the ability to run a Solaris 10 environment in a zone. Solaris 10 allows you to run Solaris 8 and 9 environments in zones, but only on SPARC.
B: It can be created by importing a Solaris 10 flash archive.
You can use the Oracle Solaris Flash archiving tools to create an image of an installed system that can be migrated into a zone. 
The system can be fully configured with all of the software that will be run in the zone before the image is created. This image is then used by the installer when the zone is installed. 
Note: You can use alternate methods for creating the archive. The installer can accept the following archive formats:
* cpio archives 
* gzip compressed cpio archives 
* bzip2 compressed cpio archives 
* pax archives created with the -x xustar (XUSTAR) format 
Ä ufsdump level zero (full) backups 
Note:
Branded zones that run an environment different that the OS release on the system  
* The lx branded zone introduced in the Solaris 10 8/07 release provides a Linux environment for your applications and runs on x86 and x64 machines on the Oracle Solaris 10 OS. 
* The solaris8 and solaris9 branded zones enable you to migrate an Oracle Solaris 8 or Oracle Solaris 9 system to an Oracle Solaris 8 or Oracle Solaris 9 Container on a host running the Oracle Solaris 10 8/07 Operating System or later Oracle Solaris 10 release. 
* The Oracle Solaris 10 Container brand is available in OpenSolaris build 127. These branded zones host Oracle Solaris 10 user environments. 
Note: One of the powerful features of Solaris 11 is the ability to run a Solaris 10 environment in a zone. Solaris 10 allows you to run Solaris 8 and 9 environments in zones, but only on SPARC.
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!