How Many Questions Of 1Z0-821 Exam Price

Cause all that matters here is passing the Oracle 1Z0-821 exam. Cause all that you need is a high score of 1Z0-821 Oracle Solaris 11 System Administrator exam. The only one thing you need to do is downloading Examcollection 1Z0-821 exam study guides now. We will not let you down with our money-back guarantee.

Check 1Z0-821 free dumps before getting the full version:

Page: 1 / 20
Total 243 questions Full Exam Access
Question 1
Which two accurately identify features of a Solaris 10 branded zone?
My answer: -
Reference answer: BE
Reference analysis:

B: It can be created by importing a Solaris 10 flash archive.
You can use the Oracle Solaris Flash archiving tools to create an image of an installed
system that can be migrated into a zone.
The system can be fully configured with all of the software that will be run in the zone before the image is created. This image is then used by the installer when the zone is installed.
Note: You can use alternate methods for creating the archive. The installer can accept the following archive formats:
* cpio archives
* gzip compressed cpio archives
* bzip2 compressed cpio archives
* pax archives created with the -x xustar (XUSTAR) format Ä ufsdump level zero (full) backups
Note:
Branded zones that run an environment different that the OS release on the system
* The lx branded zone introduced in the Solaris 10 8/07 release provides a Linux environment for your applications and runs on x86 and x64 machines on the Oracle Solaris 10 OS.
* The solaris8 and solaris9 branded zones enable you to migrate an Oracle Solaris 8 or Oracle Solaris 9 system to an Oracle Solaris 8 or Oracle Solaris 9 Container on a host running the Oracle Solaris 10 8/07 Operating System or later Oracle Solaris 10 release.
* The Oracle Solaris 10 Container brand is available in OpenSolaris build 127. These branded zones host Oracle Solaris 10 user environments.
Note: One of the powerful features of Solaris 11 is the ability to run a Solaris 10 environment in a zone. Solaris 10 allows you to run Solaris 8 and 9 environments in zones, but only on SPARC.

Question 2
You are using AI to install a new system. You have added to following information to the AI manifest:
source = “http://sysA.example.com/zone_cfg/zone.cfg”/> Which statement is true with regard to the zone.cfg?
My answer: -
Reference answer: A
Reference analysis:

https://docs.oracle.com/cd/E23824_01/html/E21798/glitd.html#scrolltoc http://docs.oracle.com/cd/E23824_01/html/E21798/glitd.html#aizoneconf

Question 3
You upgraded your server to Oracle Solaris 11 and you imported zpool (pool1) that was created in Solaris 10. You need to create an encrypted ZFS file system in pool1, but first you need to make sure that your server supports ZFS encryption.
Which four statements are true for support of ZFS encryption?
My answer: -
Reference answer: ABCF
Reference analysis:

A (not H): You can use your existing storage pools as long as they are upgraded. You have the flexibility of encrypting specific file systems.
B (not E): Can I enable encryption on an existing pool?
Yes, the pool must be upgraded to pool version 30 to allow encrypted ZFS file systems and volumes.
C (not D): ZFS encryption is integrated with the ZFS command set. Like other ZFS operations, encryption operations such as key changes and rekey are performed online. F (not G): Encryption is the process in which data is encoded for privacy and a key is needed by the data owner to access the encoded data. You can set an encryption policy when a ZFS dataset is created, but the policy cannot be changed.

Question 4
You are installing the Solaris 11 Operation System by using the Text Installer. A panel
prompts you to create a root password and a user account.
Which four describe your options for completing this panel of the Installation?
My answer: -
Reference answer: ABDG
Reference analysis:

A: You are not required to create a user account. B: You must create a root password.
D: If you create a user account in this panel, you need to provide both the user's password and a root password.
In this case, root will be a role assigned to the user.
G: If you do not create a user account, you still need to provide a root password. In this case, root will be a regular user.

Question 5
A user jack, using a korn shell, requests a directory listing as follows:
jack@solaris:/export/home/jack $ 1s File filea Filea fileb Fileb filec Filec
Which two statements are correct?
My answer: -
Reference answer: AC
Reference analysis:

A: starting with one single character, second character must be letter i, any characters, ending with letter a.
C: starting with letter e, f, or g, followed by anything.

Question 6
View the Exhibit.
1Z0-821 dumps exhibit
After Installing the OS, you need to verify the network interface information. Which command was used to display the network interface information in the exhibit?
My answer: -
Reference answer: B
Reference analysis:

'ipadm show-addr' displays all the configured addresses on the system. Example:
# ipadm show-addr
ADDROBJ TYPE STATE ADDR
lo0/v4 static ok 127.0.0.1/8 lo0/v6 static ok ::1/128

Question 7
You display the IP interface information with ipmpstat -i.
Which two characteristics are indicated by characters that may be included in the FLAGS column?
My answer: -
Reference answer: DE
Reference analysis:

FLAGS
Indicates the status of each underlying interface, which can be one or any combination of the following:
(D) d indicates that the interface is down and therefore unusable.
(E) M indicates that the interface is designated by the system to send and receive IPv6 multicast traffic for the IPMP group.
Note:
i indicates that the INACTIVE flag is set for the interface. Therefore, the interface is not used to send or receive data traffic.
s indicates that the interface is configured to be a standby interface.
m indicates that the interface is designated by the system to send and receive IPv4 multicast traffic for the IPMP group.
b indicates that the interface is designated by the system to receive broadcast traffic for the IPMP group.
h indicates that the interface shares a duplicate physical hardware address with another interface and has been taken offline. The h flag indicates that the interface is unusable.

Question 8
The /usr/bin/p7zip file that is part of the p7zip package has been overwritten. This server is critical to production and cannot be rebooted. Identify the command that would restore the file without requiring a reboot.
My answer: -
Reference answer: D
Reference analysis:

Use the pkg revert command to restore files to their as-delivered condition.

Question 9
You have a ZFS file system named /dbase/oral and you want to guarantee that 10 GB of storage space is available to that dataset for all data, snapshots, and clones.
Which option would you choose?
My answer: -
Reference answer: D
Reference analysis:

A ZFS reservation is an allocation of disk space from the pool that is guaranteed to be available to a dataset. As such, you cannot reserve disk space for a dataset if that space is not currently available in the pool. The total amount of all outstanding, unconsumed reservations cannot exceed the amount of unused disk space in the pool. ZFS reservations can be set and displayed by using the zfs set and zfs get commands. For example:
# zfs set reservation=5G tank/home/bill
# zfs get reservation tank/home/bill NAME PROPERTY VALUE SOURCE
tank/home/bill reservation 5G local

Question 10
You want to deploy Oracle Solaris 11 with the Automated Installer (AI). You need to make sure that your server and network meet the requirements for using AI.
Identify two requirements for using AI.
My answer: -
Reference answer: AD
Reference analysis:

A: An automated installation of a client over the network consists of the following high-level steps:
Step 1. The client system boots over the network and gets its network configuration and the location of the install server from the DHCP server.
Step 2: The install server provides a boot image to the client. Etc.
D: If two client machines need to be installed with the same version of the Oracle Solaris 11 OS but need to be installed differently in other ways, then create two AI manifests for the AI install service. The different AI manifests can specify different packages to install or a different slice as the install target, for example.

Question 11
Which operation will fail if the DNS configuration is incorrect?
My answer: -
Reference answer: E
Reference analysis:

www.oracle.com would have to be resolved to an IP name by the domain name service.

Question 12
You are installing the Oracle Solaris 11 Operating System by using the Text Installer. Which two options describe the features associated with the Text Installer?
My answer: -
Reference answer: CD
Reference analysis:

None

Question 13
The core dump configuration for your system is:
1Z0-821 dumps exhibit
A user is running a process in the global zone and the process crashes. The process information is:
User1 2663 2618 0 17:46:42 pts/2 0:00 /usr/bin/bash
The server host name is: zeus
What will the per-process core file be named?
My answer: -
Reference answer: C
Reference analysis:

Note the first line:
global core file pattern: /globalcore/core.%f.%p
The program name is bash The runtime process ID is 2663
Note: By default, the global core dump is disabled. You need to use the coreadm command with the -e global option to enable it. The -g option causes the command to append the program name(%f) and the runtime process ID (%p) to the core file name.

Question 14
The advantage of core tiles is that they allow you an opportunity to examine the cause of problems, so that they can be resolved.
However, core files must be managed because they .
My answer: -
Reference answer: A
Reference analysis:

Part of the job of cleaning up heavily loaded file systems involves locating and removing files that have not been used recently. You can locate unused files by using the ls or find commands.
Other ways to conserve disk space include emptying temporary directories such as the directories located in /var/tmp or /var/spool, and deleting core and crash dump files.
Note: Core files are generated when a process or application terminates abnormally. Core files are managed with the coreadm command.
For example, you can use the coreadm command to configure a system so that all process core files are placed in a single system directory. This means it is easier to track problems by examining the core files in a specific directory whenever a process or daemon terminates abnormally.

Question 15
Which two SMF milestones can be specified at boot time?
My answer: -
Reference answer: AC
Reference analysis:

The milestones that can be specified at boot time are none
single-user multi-user
multi-user-server all

Question 16
You are the administrator of a system that a large number of developers work on. These developers crash the system, and their applications, on a regular basis.
What command would you use to configure where the core files are saved?
My answer: -
Reference answer: E
Reference analysis:

The coreadm command is used to specify the name and location of core files produced by abnormally-terminating processes.

Question 17
Which two options are accurate regarding the non-global zone console?
My answer: -
Reference answer: AC
Reference analysis:

A: How to Log In to the Zone Console Use the zlogin command with the -C option and the name of the zone, for example, my-zone.
global# zlogin -C my-zone
C: To disconnect from a non-global zone, use one of the following methods.
* To exit the zone non-virtual console: zonename# exit
* To disconnect from a zone virtual console, use the tilde (~) character and a period: zonename# ~.

Question 18
Subnets are created by using .
My answer: -
Reference answer: B
Reference analysis:

The process of subnetting involves the separation of the network and subnet portion of an address from the host identifier. This is performed by a bitwise AND operation between the IP address and the (sub)network prefix. The result yields the network address or prefix, and the remainder is the host identifier.
The routing prefix of an address is written in a form identical to that of the address itself. This is called the network mask, or netmask, of the address. For example, a specification of the most-significant 18 bits of an IPv4 address, 11111111.11111111.11000000.00000000, is written as 255.255.192.0.

Question 19
A user jack, using a bash shell, requests a directory listing as follows:
1Z0-821 dumps exhibit
Which three statements are correct?
My answer: -
Reference answer: ACD
Reference analysis:

A: dir followed by a single letter.
C: dir followed by any characters ending with a.
D: dir followed by any characters, then character b, then one single character. only dirabc matches

Question 20
Review the non-global zone configuration displayed below:
1Z0-821 dumps exhibit
The global zone has 1024 MB of physical memory. You need to limit the non-global zone so that it uses no more than 500 MB of the global zone's physical memory. Which option would you choose?
1Z0-821 dumps exhibit
My answer: -
Reference answer: C
Reference analysis:

Add a memory cap.
zonecfg:my-zone> add capped-memory
Set the memory cap.
zonecfg:my-zone:capped-memory> set physical=50m End the memory cap specification.
zonecfg:my-zone:capped-memory> end

Page: 1 / 20
Total 243 questions Full Exam Access