Download Oracle Solaris 11 System Administration.1z0-821.PracticeTest.2018-08-06.139q.vcex

Vendor: Oracle
Exam Code: 1z0-821
Exam Name: Oracle Solaris 11 System Administration
Date: Aug 06, 2018
File Size: 4 MB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Purchase
Coupon: EXAM_HUB

Discount: 20%

Demo Questions

Question 1
User1 is attempting to assist user2 with terminating user2's process 1234. 
User1 entered the following: kill -9 1234
Why does the process continue to run?
  1. You can kill a process only if you are root.
  2. You can kill only a process that you own.
  3. You can kill the process only with the pkill command.
  4. You need to kill the process with a stronger kill signal.
Correct answer: B
Explanation:
Kill -9 Kill (terminates without cleanup) Only works if issued by process owner or super user (root) The program cannot respond to this signal; it must terminate Note: Unix provides security mechanisms to prevent unauthorized users from killing other processes. Essentially, for a process to send a signal to another, the owner of the signaling process must be the same as the owner of the receiving process or be the superuser.
Kill -9 
Kill (terminates without cleanup) 
Only works if issued by process owner or super user (root) 
The program cannot respond to this signal; it must terminate 
Note: Unix provides security mechanisms to prevent unauthorized users from killing other processes. Essentially, for a process to send a signal to another, the owner of the signaling process must be the same as the owner of the receiving process or be the superuser.
Question 2
Your server has one zone named dbzone (hat has been configured, but not yet installed). 
Which command would you use to view all the options that were used to configure this zone?
  1. zoneadm list –icv dbzone
  2. zones tat –c summary dbzone
  3. zonecfg –z dbzone info
  4. zonecfg –icv dbzone info
Correct answer: C
Explanation:
zonecfg info Display information about the current configuration. If resource-type is specified, displays only information about resources of the relevant type. If any property-name value pairs are specified, displays only information about resources meeting the given criteria. In the resource scope, any arguments are ignored, and info displays information about the resource which is currently being added or modified. Note:zonecfg –z zonename. Specify the name of a zone. Zone names are case sensitive. Zone names must begin with an alphanumeric character and can contain alphanumeric characters, the underscore (_) the hyphen (-), and the dot (.). The name global and all names beginning with SUNW are reserved and cannot be used. Incorrect answer:A: The zoneadm utility is used to administer system zones. A zone is an application container that is maintained by the operating system runtime.list option:Display the name of the current zones, or the specified zone if indicated. B: No such command.D: no such options zonecfg –icv
zonecfg info 
Display information about the current configuration. If resource-type is specified, displays only information about resources of the relevant type. If any property-name value pairs are specified, displays only information about resources meeting the given criteria. In the resource scope, any arguments are ignored, and info displays information about the resource which is currently being added or modified. 
Note:
zonecfg –z 
zonename. Specify the name of a zone. Zone names are case sensitive. Zone names must begin with an alphanumeric character and can contain alphanumeric characters, the underscore (_) the hyphen (-), and the dot (.). The name global and all names beginning with SUNW are reserved and cannot be used. 
Incorrect answer:
A: The zoneadm utility is used to administer system zones. A zone is an application container that is maintained by the operating system runtime.
list option:
Display the name of the current zones, or the specified zone if indicated. 
B: No such command.
D: no such options zonecfg –icv
Question 3
Your users are experiencing delay issues while using their main application that requires connections to remote hosts. You run the command uptime and get the flowing output:
1:07am up 346 day(s), 12:03, 4 users, load average: 0.02, 0.02, 0.01
Which command will be useful in your next step of troubleshooting?
  1. ipadm
  2. traceroute
  3. dladm
  4. snoop
  5. arp
Correct answer: B
Explanation:
Test the remote connection with traceroute. The Internet is a large and complex aggregation of network hardware, connected together by gateways. Tracking the route one's packets follow (or finding the miscreant gateway that's discarding your packets) can be difficult. traceroute utilizes the IP protocol `time to live' field and attempts to elicit an ICMP TIME_EXCEEDED response from each gateway along the path to some host. This program attempts to trace the route an IP packet would follow to some internet host by launching UDP probe packets with a small ttl (time to live) then listening for an ICMP "time exceeded" reply from a gateway.
Test the remote connection with traceroute. 
The Internet is a large and complex aggregation of network hardware, connected together by gateways. Tracking the route one's packets follow (or finding the miscreant gateway that's discarding your packets) can be difficult. traceroute utilizes the IP protocol `time to live' field and attempts to elicit an ICMP TIME_EXCEEDED response from each gateway along the path to some host. 
This program attempts to trace the route an IP packet would follow to some internet host by launching UDP probe packets with a small ttl (time to live) then listening for an ICMP "time exceeded" reply from a gateway.
Question 4
When upgrading an existing system from Solaris 11 Express to Oracle Solaris 11, what happens to the datalink names?
  1. They follow the default naming convention for the newly installed version.
  2. They maintain their names.
  3. They are called eth#.
  4. They are called el00g#.
  5. They are left unnamed, to avoid conflicts, and need to be renamed after the installation process is complete.
Correct answer: A
Explanation:
Network configuration in Oracle Solaris 11 includes * Generic datalink name assignment – Generic names are automatically assigned to datalinks using the net0, net1, netN naming convention, depending on the total number of network devices that are on the system Note: There is no upgrade path from Oracle Solaris 10 to Oracle Solaris 11. You must perform a fresh installation.
Network configuration in Oracle Solaris 11 includes 
* Generic datalink name assignment – Generic names are automatically assigned to datalinks using the net0, net1, netN naming convention, depending on the total number of network devices that are on the system 
Note: There is no upgrade path from Oracle Solaris 10 to Oracle Solaris 11. You must perform a fresh installation.
Question 5
You have installed software updates to a new boot environment (BE) and have activated that the booting to the new BE, you notice system errors. You want to boot to the last known good configuration. 
Which option would you use on a SPARC system to boot to the currentBE boot environment?
  1. boot –L currentBE
  2. boot –Z rpool/ROOT/currentBE
  3. boot –a Enter the currentBE dataset name when prompted.
  4. boot rpool/ROOT/currentBE
  5. boot –m currentBE
  6. beadm activate currentBE
Correct answer: F
Explanation:
You can change an inactive boot environment into an active boot environment. Only one boot environment can be active at a time. The newly activated boot environment becomes the default environment upon reboot. How to Activate an Existing Boot Environment 1. Use the following command to activate an existing, inactive boot environment:beadm activate beName beName is a variable for the name of the boot environment to be activated. Note the following specifications. beadm activate beName activates a boot environment by setting the bootable pool property, bootfs, to the value of the ROOT dataset of the boot environment that is being activated. beadm activate sets the newly activated boot environment as the default in the menu.lst file. 2. Reboot. The newly activated boot environment is now the default on the x86 GRUB menu or SPARC boot menu.
You can change an inactive boot environment into an active boot environment. Only one boot environment can be active at a time. The newly activated boot environment becomes the default environment upon reboot. 
How to Activate an Existing Boot Environment 
1. Use the following command to activate an existing, inactive boot environment:
beadm activate beName 
beName is a variable for the name of the boot environment to be activated. 
Note the following specifications. 
beadm activate beName activates a boot environment by setting the bootable pool property, bootfs, to the value of the ROOT dataset of the boot environment that is being activated. 
beadm activate sets the newly activated boot environment as the default in the menu.lst file. 
2. Reboot. 
The newly activated boot environment is now the default on the x86 GRUB menu or SPARC boot menu.
Question 6
Oracle Solaris 11 limits access to the system with usernames and passwords. The usernames are held in ___________, and the passwords are held in ___________. 
Select the correct pair.
  1. /etc/security/policy.conf /etc/passwd
  2. /etc/passwd /etc/shadow
  3. /etc/security /etc/passwd
  4. /etc/shadow /etc/passwd
Correct answer: B
Explanation:
The /etc/passwd file contains basic user attributes. This is an ASCII file that contains an entry for each user. Each entry defines the basic attributes applied to a user. /etc/shadow file stores actual password in encrypted format for user's account with additional properties related to user password i.e. it stores secure user account information. All fields are separated by a colon (:) symbol. It contains one entry per line for each user listed in /etc/passwd file.
The /etc/passwd file contains basic user attributes. This is an ASCII file that contains an entry for each user. Each entry defines the basic attributes applied to a user. 
/etc/shadow file stores actual password in encrypted format for user's account with additional properties related to user password i.e. it stores secure user account information. All fields are separated by a colon (:) symbol. It contains one entry per line for each user listed in /etc/passwd file.
Question 7
_________ serves as the interface between the SMF repository and the user to ensure that a consistent, picture of the repository is presented to the user.
  1. repository.db
  2. service manifest
  3. svc.startd
  4. svc.configd
Correct answer: D
Explanation:
SVC.CONFIGD is the repository daemon responsible for maintaining /etc/svc/repository.db. The repository.db must come clean during this integrity check otherwise it is a "no go" for usual boot sequence to run level 3. The repository may get corrupted due to various hardware issues, software bugs, disk write failures, etc. Note: When svc.configd(1M), the Solaris Repository Daemon, is started, it does an integrity check of the smf(5) repository, stored in /etc/svc/repository.db. This integrity check can fail due to a disk failure, the database file being corrupted either due to a hardware bug, a software bug, or an accidental overwrite. If the integrity check fails, svc.configd will write a message to the console.
SVC.CONFIGD is the repository daemon responsible for maintaining /etc/svc/repository.db. The repository.db must come clean during this integrity check otherwise it is a "no go" for usual boot sequence to run level 3. The repository may get corrupted due to various hardware issues, software bugs, disk write failures, etc. 
Note: When svc.configd(1M), the Solaris Repository Daemon, is started, it does an integrity check of the smf(5) repository, stored in /etc/svc/repository.db. This integrity check can fail due to a disk failure, the database file being corrupted either due to a hardware bug, a software bug, or an accidental overwrite. If the integrity check fails, svc.configd will write a message to the console.
Question 8
You are attempting to edit your crontab file in the bash shell. Instead of getting your usual vi interface, you are presented with an unfamiliar interface. In order to have your editor of choice-vi- what command must you type after exiting the unfamiliar editor?
  1. EDITOR=vi
  2. crontab=vi
  3. crontab – e vi
  4. env
Correct answer: A
Explanation:
Set the EDITOR variable to vi. Commands like `crontab -e` will use ed per default. If you'd like to use some better editor (like vi) you can use the environment variable EDITOR:# EDITOR=vi; crontab –e will open the users crontab in vi. Of course you can set this variable permanently. Incorrect answers C: -e Edits a copy of the current user's crontab file, or creates an empty file to edit if crontab does not exist. When editing is complete, the file is installed as the user's crontab file. If a username is given, the specified user's crontab file is edited, rather than the current user's crontab file; this can only be done by a user with the solaris.jobs.admin authorization. The environment variable EDITOR determines which editor is invoked with the -e option. The default editor is ed(1). All crontab jobs should be submitted using crontab. Do not add jobs by just editing the crontab file, because cron is not aware of changes made this way.
Set the EDITOR variable to vi. 
Commands like `crontab -e` will use ed per default. If you'd like to use some better editor (like vi) you can use the environment variable EDITOR:
# EDITOR=vi; crontab –e will open the users crontab in vi. Of course you can set this variable permanently. 
Incorrect answers 
C: -e Edits a copy of the current user's crontab file, or creates an empty file to edit if crontab does not exist. When editing is complete, the file is installed as the user's crontab file. If a username is given, the specified user's crontab file is edited, rather than the current user's crontab file; this can only be done by a user with the solaris.jobs.admin authorization. The environment variable EDITOR determines which editor is invoked with the -e option. The default editor is ed(1). All crontab jobs should be submitted using crontab. Do not add jobs by just editing the crontab file, because cron is not aware of changes made this way.
Question 9
You want to display the IP address assignments of the network interfaces. Which command should you use?
  1. ipadm show-if
  2. ipadm show-addr
  3. ipadm show-prop
  4. ipadm show-addrprop
Correct answer: B
Explanation:
'ipadm show-addr' displays all the configured addresses on the system. Example:# ipadm show-addr ADDROBJ TYPE STATE ADDR lo0/v4 static ok 127.0.0.1/8 lo0/v6 static ok ::1/128
'ipadm show-addr' displays all the configured addresses on the system. 
Example:
# ipadm show-addr 
ADDROBJ TYPE STATE ADDR 
lo0/v4 static ok 127.0.0.1/8 
lo0/v6 static ok ::1/128
Question 10
The following image properties are displayed on your system:
   
  
Which two options describe the boot environment policy property that is currently set for this image?
  1. All package operations are performed in a new BE set as active on the next boot.
  2. Do not create a new BE. The install, update, uninstall, or revert operation is not performed if a new BE is required.
  3. If a BE is created, do not set it as the active BE on the next boot
  4. A reboot is required for all package operations
  5. A reboot is not required after a package operation.
  6. For package operations that require a reboot, this policy creates a new BE set as active on the next boot.
Correct answer: DF
Explanation:
Image properties described below. * be-policy Specifies when a boot environment is created during packaging operations. The following values are allowed:/ default Apply the default BE creation policy: create-backup./ always-new (D, F) Require a reboot for all package operations (D) by performing them in a new BE set as active on the next boot (F). A backup BE is not created unless explicitly requested. This policy is the safest, but is more strict than most sites need since no packages can be added without a reboot.
Image properties described below. 
* be-policy 
Specifies when a boot environment is created during packaging operations. The following values are allowed:
/ default 
Apply the default BE creation policy: create-backup.
/ always-new (D, F) 
Require a reboot for all package operations (D) by performing them in a new BE set as active on the next boot (F). A backup BE is not created unless explicitly requested. 
This policy is the safest, but is more strict than most sites need since no packages can be added without a reboot.
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!