The Renovate Guide To 1Z0-821 Brain Dumps

It is more faster and easier to pass the Oracle 1Z0-821 exam by using High quality Oracle Oracle Solaris 11 System Administrator questuins and answers. Immediate access to the Regenerate 1Z0-821 Exam and find the same core area 1Z0-821 questions with professionally verified answers, then PASS your exam with a high score now.

Free 1Z0-821 Demo Online For Oracle Certifitcation:

Page: 1 / 20
Total 243 questions Full Exam Access
Question 1
View the Exhibit and review the disk configuration.
1Z0-821 dumps exhibit
The following command is executed on the disk: zpool create pool1 c3t3d0s0
What is the result of executing this command?
My answer: -
Reference answer: B
Reference analysis:

None

Question 2
Your are troubleshooting network throughput on your server.
To confirm that the load balancing among aggregated links is functioning properly, you want to examine the traffic statistics on the links comprising the aggregation.
The correct command is .
My answer: -
Reference answer: B
Reference analysis:

dlstat show-aggr [-r | -t] [-i interval] [-p] [ -o field[, ...]] [-u R|K|M|G|T|P] [link] Display per-port statistics for an aggregation.

Question 3
You are troubleshooting the Oracle Solaris11 Automated Installer (AI), which is not connecting with the IPS software repository.
Which three steps will help determine the cause of DNS name resolution failure?
My answer: -
Reference answer: ABF
Reference analysis:

Check DNS
* (A) Check whether DNS is configured on your client by verifying that a non-empty
/etc/resolv.conf file exists.
* (F) If /etc/resolv.conf does not exist or is empty, check that your DHCP server is providing DNS server information to the client:
# /sbin/dhcpinfo DNSserv
If this command returns nothing, the DHCP server is not set up to provide DNS server information to the client. Contact your DHCP administrator to correct this problem.
* (B) If an /etc/resolv.conf file exists and is properly configured, check for the following possible problems and contact your system administrator for resolution:
** The DNS server might not be resolving your IPS repository server name.
** No default route to reach the DNS server exists.

Question 4
The current ZFS configuration on your server is:
pool1 124K 3.91G 32K /pool1 pool1/data 31K 3.91G 31K /data
You need to create a new file system named /data2. /data2 will be a copy of the /data file system.
You need to conserve disk space on this server whenever possible.
Which option should you choose to create /data2, which will be a read writeable copy of the
/data file system, while minimizing the amount of total disk space used in pool1?
My answer: -
Reference answer: E
Reference analysis:

zfs snapshot [-r] [-o property=value] ... filesystem@snapname|volume@snapname Creates a snapshot with the given name. All previous modifications by successful system calls to the file system are part of the snapshot
zfs clone [-p] [-o property=value] ... snapshot filesystem|volume Creates a clone of the given snapshot.
Note:
Because snapshots are fast and low overhead, they can be used extensively without great concern for system performance or disk use .
With ZFS you can not only create snapshot but create a clone of a snapshot.
A clone is a writable volume or file system whose initial contents are the same as the dataset from which it was created. As with snapshots, creating a clone is nearly instantaneous, and initially consumes no additional disk space. In addition, you can snapshot a clone.
A clone is a writable volume or file system whose initial contents are the same as the original dataset. As with snapshots, creating a clone is nearly instantaneous, and initially consumes no additional space.
Clones can only be created from a snapshot. When a snapshot is cloned, it creates an implicit dependency between the parent and child.

Question 5
You have a ticket from a new user on the system, indicating that he cannot log in to his account. The information in the ticket gives you both the username and password. The ticket also shows that the account was set up three days ago.
As root, you switch users to this account with the following command: su – newuser
You do not get an error message.
You then run 1s -1a and see the following files:
local1.cshrc local1.login local1.profile .bash_history .bashrc .profile
As root, you grep the /etc/passwd file and the /etc/shadow file for this username, with these results:
/etc/passwd contains newuser:x:60012:10:/home/newuser:/usr/bin/bash
/etc/shadow contains newuser:UP: : : : :10: : As root, what is your next logical step?
My answer: -
Reference answer: B
Reference analysis:

The content of the /etc/shadow document indicates that the newuser account has no password.
We need to add a password.
The passwd utility is used to update user's authentication token(s). D: Here the user account already exist. There is no need to create it.
When invoked without the -D option, the useradd command creates a new user account using the values specified on the command line plus the default values from the system. Depending on command line options, the useradd command will update system files and may also create the new user's home directory and copy initial files.

Question 6
Given:
file1 and file2 are text files. dir1 and dir2 are directories.
Which two commands will be successful?
My answer: -
Reference answer: CF
Reference analysis:

C: Here the wildcard character ? is used (Matches any single character). file1 and file2 will be copied into dir1
F: the two files file1 and file2 are copied into directoy dir1. Note: cp - copy files and directories
Copy SOURCE to DEST, or multiple SOURCE(s) to DIRECTORY.
Cp has three principal modes of operation. These modes are inferred from the type and count of arguments presented to the program upon invocation.
* When the program has two arguments of path names to files, the program copies the contents of the first file to the second file, creating the second file if necessary.
* When the program has one or more arguments of path names of files and following those an argument of a path to a directory, then the program copies each source file to the destination directory, creating any files not already existing.
* When the program's arguments are the path names to two directories, cp copies all files in the source directory to the destination directory, creating any files or directories needed. This mode of operation requires an additional option flag, typically r, to indicate the
recursive copying of directories. If the destination directory already exists, the source is copied into the destination, while a new directory is created if the destination does not exist.

Question 7
View the exhibit.
1Z0-821 dumps exhibit
The configuration information in the exhibit is displayed on your system immediately after installing the OS.
Choose the option that describes the selection made during the Installation of the OS to obtain this configuration.
My answer: -
Reference answer: A
Reference analysis:

There are two ways to configure the network configuration: automatic or manual.
In the exhibit we see that DHCP has been used used. This indicates an automatic network configuration.

Question 8
You are going to create live zones on you server. Disk space is critical on this server so you need to reduce the amount of disk space required for these zones. Much of the data required for each of these zones is identical, so you want to eliminate the duplicate copies of data and store only data that is unique to each zone.
Which two options provide a solution for eliminating the duplicate copies of data that is common between all of these zones?
My answer: -
Reference answer: DE
Reference analysis:

n Oracle Solaris 11, you can use the deduplication (dedup) property to remove redundant data from your ZFS file systems. If a file system has the dedup property enabled, duplicate data blocks are removed synchronously. The result is that only unique data is stored, and common components are shared between files.

Question 9
You notice that the /var/.dm/messages file has become very large. Typically, this is managed by a crontab entry. Which entry should be in the root's crontab file?
My answer: -
Reference answer: B
Reference analysis:

This example shows how to display the default root crontab file.
$ suPassword:
# crontab -l
#ident "@(#)root 1.19 98/07/06 SMI" /* SVr4.0 1.1.3.1 */
#
# The root crontab should be used to perform accounting data collection.
#
#
10 3 * * * /usr/sbin/logadm
15 3 * * 0 /usr/lib/fs/nfs/nfsfind
30 3 * * * [ -x /usr/lib/gss/gsscred_clean ] && /usr/lib/gss/gsscred_clean
#10 3 * * * /usr/lib/krb5/kprop_script slave_kdcs

Question 10
Your server has a ZFS storage pool that is configured as follows:
1Z0-821 dumps exhibit
The server has two spate 140-GB disk drives: c3t5d0 c3t6d0 Which command would add redundancy to the pool1 storage pool?
My answer: -
Reference answer: A
Reference analysis:

You can convert a non-redundant storage pool into a redundant storage pool by using the zpool attach command.
Note: zpool attach [-f] pool device new_device
Attaches new_device to an existing zpool device. The existing device cannot be part of a raidz configuration. If device is not currently part of a mirrored configuration, device automatically transforms into a two-way mirror of device and new_device. If device is part of a two-way mirror, attaching new_device creates a three-way mirror, and so on. In either case, new_device begins to resilver immediately.

Question 11
You created an IP address for interface not.3 with the following command, which executed successfully:
ipadm create-addr –T static –a 192.168.0.100/24 net3/v4
You then ran: ipadm show–if
The result indicated that the interface was down.
You then ran:
ipadm delete-addr net3/v4
ipadm create-addr –T static –a 192.168.0.101/24 net3/v4 ipadm show-if
The last command indicated that the interface was up.
Why did it work with the second address specified, but not the first?
My answer: -
Reference answer: B
Reference analysis:

The first IP address is already in use.

Question 12
You need to install the gzip software package on your system. Which command would you use to find the software package in the configured repository?
My answer: -
Reference answer: A
Reference analysis:

Use the pkg search command to search for packages whose data matches the specified pattern.
Like the pkg contents command, the pkg search command examines the contents of packages. While the pkg contents command returns the contents, the pkg search command returns the names of packages that match the query.

Question 13
The following line is from /etc/shadow in a default Solaris 11 Installation:
jack: $5$9JFrt54$7JdwmO.F11Zt/ jFeeOhDmnw93LG7Gwd3Nd/cwCcNWFFg:0:15:30:3::: Which two are true?
My answer: -
Reference answer: BE
Reference analysis:

From the content of the /etc/shadow file we get:
* username: jack
* encrypted password: $5$9JFrt54$7JdwmO.F11Zt/ jFeeOhDmnw93LG7Gwd3Nd/cwCcNWFFg
* Last password change (lastchanged): Days since Jan 1, 1970 that password was last changed: 0
* Minimum: The minimum number of days required between password changes i.e. the number of days left before the user is allowed to change his/her password: 15
Maximum: The maximum number of days the password is valid (after that user is forced to change his/her password): 30 Warn : The number of days before password is to expire that user is warned that his/her password must be changed: 3
* Inactive : The number of days after password expires that account is disabled
* Expire : days since Jan 1, 1970 that account is disabled i.e. an absolute date specifying when the login may no longer be used

Question 14
You suspect a problem with the oponldap package and want to make sure that the files have not be modified or otherwise tampered with.
Which command would validate all of the files contained in the openldap package and report any problems?
My answer: -
Reference answer: A
Reference analysis:

pkgchk checks the accuracy of installed files or, by using the -l option, displays information about package files. pkgchk checks the integrity of directory structures and files. Discrepancies are written to standard error along with a detailed explanation of the problem.

Question 15
View the following information for a software package:
1Z0-821 dumps exhibit
Which command would you use to display this information for a software package that is not currently installed on your system?
My answer: -
Reference answer: B
Reference analysis:

By default, the pkg info command only lists information about installed packages on the system; however, we can use a similar command to look up information about uninstalled packages, as shown in here:
Example:
Listing Information About an Uninstalled Package
# pkg info -r php-52 Name: web/php-52 Summary: PHP Server 5.2
Description: PHP Server 5.2 Category: Development/PHP State: Not Installed Publisher: solaris
Version: 5.2.17
Build Release: 5.11
Branch: 0.175.0.0.0.1.530
Packaging Date: Wed Oct 12 14:01:41 2011
Size: 44.47 MB
FMRI: pkg://solaris/web/php-52@5.2.17, 5.11-0.175.0.0.0.1.530:20111012T140141Z
Note: pkg info command displays information about packages in a human-readable form. Multiple FMRI patterns may be specified; with no patterns, display information on all
installed packages in the image.
With -l, use the data available from locally installed packages. This is the default.
With -r, retrieve the data from the repositories of the image's configured publishers. Note that you must specify one or more package patterns in this case.

Question 16
What determines which bits in an IP address represent the subnet, and which represent the host?
My answer: -
Reference answer: C
Reference analysis:

A subnetwork, or subnet, is a logically visible subdivision of an IP network. The practice of dividing a network into two or more networks is called subnetting.
The routing prefix of an address is written in a form identical to that of the address itself. This is called the network mask, or netmask, of the address. For example, a specification of the most-significant 18 bits of an IPv4 address, 11111111.11111111.11000000.00000000, is written as 255.255.192.0.

Question 17
Your server has a ZFS storage pool that is configured as follows:
1Z0-821 dumps exhibit
The following partition scheme is used for every disk drive in pool1:
1Z0-821 dumps exhibit
Which two are true regarding the ZFS storage pool?
My answer: -
Reference answer: AE
Reference analysis:

None

Question 18
You are going to use the- Automated installer (AI) to install a non global zone named zone1. You have created a custom manifest for the non-global zone and named it zone1manifest
Which command will you use to add this custom manifest to the s11-sparc install service and associate this custom manifest with the non-global zone?
My answer: -
Reference answer: B
Reference analysis:

installadm add-manifest
Associates manifests with a specific install service, thus making the manifests available on the network, independently from creating a service. When publishing a non-default manifest, it is required to associate criteria either via criteria entered on the command line (-c) or via a criteria XML file (-C).

Question 19
You are currently working in both your home directory and the system directory /tmp. You are switch back and forth with full path names. Which pair of cd commands will provide you with a shortcut to switch between these two locations?
My answer: -
Reference answer: A
Reference analysis:

In the Bourne Again, C, Korn, TC, and Z shells, the tilde (~) is used as a shortcut for specifying your home directory.
cd –
It's the command-line equivalent of the back button (takes you to the previous directory you were in).
Note:
To make certain that you are in your home directory, type the cd (change directory) command. This command moves you to your home (default) directory.

Question 20
This iron is displayed on the desktop of a laptop computer, which is running Oracle Solaris 11.
1Z0-821 dumps exhibit
Which two statements describe the Information conveyed by this Icon?
My answer: -
Reference answer: BC
Reference analysis:

B: The Network Status notification icon is only displayed on the desktop if you are using NWAM to automatically configure your network.
C: All online (Wireless)
Indicates all manually enabled connections in the enabled network profile are online and that the required number of connections in the enabled profile group (if such a group exists) are online. The required number is the same as those described for the All online (Wired) status.
Note that at least one online connection is wireless.

Page: 1 / 20
Total 243 questions Full Exam Access