What Practical 1Z0-821 Exam Question Is

Passleader offers free demo for 1Z0-821 exam. "Oracle Solaris 11 System Administrator", also known as 1Z0-821 exam, is a Oracle Certification. This set of posts, Passing the Oracle 1Z0-821 exam, will help you answer those questions. The 1Z0-821 Questions & Answers covers all the knowledge points of the real exam. 100% real Oracle 1Z0-821 exams and revised by experts!

Check 1Z0-821 free dumps before getting the full version:

Page: 1 / 20
Total 243 questions Full Exam Access
Question 1
To confirm the IP address and netmask have been correctly configured on the network interfaces which command should you use?
My answer: -
Reference answer: C
Reference analysis:

Show address information, either for the given addrobj or all the address objects configured on the specified interface, including the address objects that are only in the persistent configuration.
State can be: disabled, down, duplicate, inaccessible, ok, tentative Example:
# ipadm show-addr
ADDROBJ TYPE STATE ADDR
lo0/v4 static ok 127.0.0.1/8 lo0/v6 static ok ::1/128

Question 2
You log in to the system as user1, then switch user to root by using the su - command. After entering the correct password, yon enter the following commands:
whoami;who am i;id
Which option correctly represents the output?
1Z0-821 dumps exhibit
My answer: -
Reference answer: B
Reference analysis:

* The whoami utility displays your effective user ID as a name. Here this would be root.
* who am i
The command who shows who is logged on. Here this would be:
user1 console Dec 30 20:20
* The id utility displays the user and group names and numeric IDs, of the calling process, to the standard output. If the real and effective IDs are different, both are displayed, otherwise only the real ID is displayed.
Here this would be: uid=0(root) gid=0(root)
Note:
Each UNIX proces has 3 UIDs associated to it. Superuser privilege is UID=0.
Real UID
--------
This is the UID of the user/process that created THIS process. It can be changed only if the running process has EUID=0.
Effective UID
-------------
This UID is used to evaluate privileges of the process to perform a particular action. EUID can be change either to RUID, or SUID if EUID!=0. If EUID=0, it can be changed to anything.
Saved UID
---------
If the binary image file, that was launched has a Set-UID bit on, SUID will be the UID of the owner of the file. Otherwise, SUID will be the RUID.

Question 3
You have installed the SMF notification framework to monitor services. Which command is used to set up the notifications for a particular service?
My answer: -
Reference answer: A
Reference analysis:

How to Set Up Email Notification of SMF Transition Events
This procedure causes the system to generate an email notification each time one of the services or a selected service has a change in state. You can choose to use either SMTP or SNMP. Normally, you would only select SNMP if you already have SNMP configured for some other reason.
By default, SNMP traps are sent on maintenance transitions. If you use SNMP for monitoring, you can configure additional traps for other state transitions.
1. Become an administrator or assume a role that includes the Service Management rights profile.'
2. Set notification parameters. Example 1:
The following command creates a notification that sends email when transactions go into the maintenance state.
# /usr/sbin/svccfg setnotify -g maintenance mailto:sysadmins@example.com
Example 2:
The following command creates a notification that sends email when the switch service goes into the online state.
# /usr/sbin/svccfg -s svc:/system/name-service/switch:default setnotify to-online \ mailto:sysadmins@example.com
Note: The svccfg command manipulates data in the service configuration repository. svccfg can be invoked interactively, with an individual subcommand, or by specifying a command file that contains a series of subcommands.
Changes made to an existing service in the repository typically do not take effect for that service until the next time the service instance is refreshed.

Question 4
Which two statements are true concerning the creation of user accounts by using the useradd command?
My answer: -
Reference answer: CE
Reference analysis:

None

Question 5
You have been tasked with creating a dedicated virtual network between two local zones within a single system, in order to isolate the network traffic from other zones on that system.
To accomplish this, you will create .
My answer: -
Reference answer: D
Reference analysis:

First create a virtual switch, then create a virtual network interface.

Question 6
Your users are experiencing delay issues while using their main application that requires connections to remote hosts. You run the command uptime and get the flowing output:
1:07am up 346 day(s), 12:03, 4 users, load average: 0.02, 0.02, 0.01 Which command will be useful in your next step of troubleshooting?
My answer: -
Reference answer: B
Reference analysis:

Test the remote connection with traceroute.
The Internet is a large and complex aggregation of network hardware, connected together by gateways. Tracking the route one's packets follow (or finding the miscreant gateway that's discarding your packets) can be difficult. traceroute utilizes the IP protocol `time to live' field and attempts to elicit an ICMP TIME_EXCEEDED response from each gateway along the path to some host.
This program attempts to trace the route an IP packet would follow to some internet host by launching UDP probe packets with a small ttl (time to live) then listening for an ICMP "time exceeded" reply from a gateway.

Question 7
The su command by default makes an entry into the log file for every su command attempt. The following is a single line from the file:
SU 12/18 23:20 + pts/1 user1-root What does the + sign represent?
My answer: -
Reference answer: B
Reference analysis:

The sulog file, /var/adm/sulog, is a log containing all attempts (whether successful or not) of the su command. An entry is added to the sulog file every time the su command is executed. The fields in sulog are: date, time, successful (+) or unsuccessful (-), port, user executing the su command, and user being switched to. In the preceding example, all su attempts were successful, except for the attempt on 2/23 at 20:51, when user pete unsuccessfully attempted to su to user root.
Look for entries where an unauthorized user has used the command inappropriately. The following entry shows a successful (indicated by +) su from user userid to root.
SU 03/31 12:52 + pts/0 <userid>-root

Question 8
Which three statements accurately describe the Automated Installation (AI) client?
My answer: -
Reference answer: ACE
Reference analysis:

Each client uses one and only one AI manifest to complete its installation. The AI manifest is selected for a client according to the following algorithm:
* If no custom AI manifests are defined for this install service, the default AI manifest is used. The default AI manifest is not associated with any client criteria etc.
Each client can use any number of system configuration profiles. If a client system does not use any configuration profile, then an interactive tool opens on that client at first boot after that client installation to complete the configuration of that client.

Question 9
You are having an issue with the shutdown command. You wish to determine if the file is a script or an executable program. Which command would you use to determine this?
My answer: -
Reference answer: B
Reference analysis:

The file command determines the file type file tests each argument in an attempt to classify it. There are three sets of tests, performed in this order: filesystem tests, magic tests, and language tests. The first test that succeeds causes the file type to be printed.

Question 10
Which modification needs to be made to the Service Management Facility before you publish a new package to the IPS repository?
My answer: -
Reference answer: D
Reference analysis:

pkg/image_root
(astring) The path to the image whose file information will be used as a cache for file data.

Question 11
Which two are implemented using the Internet Control Message Protocol (ICMP)?
My answer: -
Reference answer: AF
Reference analysis:

The Internet Control Message Protocol (ICMP) is one of the core protocols of the Internet Protocol Suite.
ICMP differs from transport protocols such as TCP and UDP in that it is not typically used to exchange data between systems, nor is it regularly employed by end-user network applications (with the exception of some diagnostic tools like ping and traceroute).

Question 12
Identify three options that describe the new Oracle Solaris 11 zone features.
My answer: -
Reference answer: ABD
Reference analysis:

A: The beadm utility includes support for creating and administering non-global zone boot environments.
Note: A boot environment is a bootable instance of the Oracle Solaris operating system image plus any other application software packages installed into that image. System administrators can maintain multiple boot environments on their systems, and each boot environment can have different software versions installed.
B: Role-based access control (RBAC) is a security feature for controlling user access to tasks that would normally be restricted to the root role. By applying security attributes to processes and to users, RBAC can divide up superuser capabilities among several administrators.

Question 13
How are operating system updates distributed in the Oracle Solaris 11 environment?
My answer: -
Reference answer: C
Reference analysis:

* Updating all of the packages on your installed system – To update all of the packages on your system that have available updates, use the pkg update command, as follows:
# pkg update
Running this command updates packages that you might not otherwise consider updating, for example, kernel components and other low-level system packages.
* Adding or updating individual packages – To add individual software packages, use the pkg install command. Any dependent packages are also updated at the same time.
* install package updates that deliver fixes– A pkg update operation might include bug fixes, so the operation is similar to applying a specific patch or patches in previous Oracle Solaris releases.
Note: The IPS interfaces first check for updates for currently installed packages before retrieving them via the network. By default, interfaces check repository catalogs in the following locations:
* The default installation repository at pkg.oracle.com/solaris/release.
* The support repository in My Oracle Support. This repository is restricted to users with Oracle Solaris 11 Express support contracts, and it contains packages with the latest bug fixes. For this reason, a support contract must be purchased for production deployments.

Question 14
You want to deploy Oracle Solaris 11 with the Automated Installer (AI). You need to make sure that your server and network meet the requirements for using AI.
Choose the three options that describe the requirements for using AI.
My answer: -
Reference answer: BEF
Reference analysis:

B (not A, not D, Not C): If two client machines need to be installed with the same version of the Oracle Solaris 11 OS but
need to be installed differently in other ways, then create two AI manifests for the AI install service. The different AI manifests can specify different packages to install or a different
slice as the install target, for example.
Note: An AI manifest provides installation instructions.
The AI manifest specifies one or more IPS package repositories where the client retrieves the packages needed to complete the installation. The AI manifest also includes the names of additional packages to install and information such as target installation device and partition information.
F: The install server can be either an x86 machine or a SPARC machine.

Question 15
You want to display network interface information. Which command should you use?
My answer: -
Reference answer: A
Reference analysis:

None

Question 16
View the Exhibit to see the information taken from the installation log file.
Based on the information presented in the Exhibit, which two options describe the state of the system when the server is booted for the first time after the installation is complete?
1Z0-821 dumps exhibit
My answer: -
Reference answer: BD
Reference analysis:

None

Question 17
You start to execute a program by using the following command:
~/bigscript &
You then determine that the process is not behaving as expected, and decide that you need to terminate the process.
Based on the information shown below, what is the process number you should terminate?
1Z0-821 dumps exhibit
My answer: -
Reference answer: A
Reference analysis:

From the output exhibit we can deduce that the shell has id 15156. It has spawned three subprocesses:
grep: id 15166
ps –aef 15165
The remaining 15163 must be the subshell (see note below). This is the id of the process which should be terminated.

Question 18
You are setting up an automated installer (AI) install server and issue the following command:
installadm create-service -n prod_ai -s /repo/prod_ai.iso
-i 192.168.1.100 -c 5 -d /export/repo
Which four options describe the install server that you have configured?
My answer: -
Reference answer: ABDF
Reference analysis:

A: -n <svcname>
Uses this install service name instead of default service name.
B: -i <dhcp_ip_start>
Sets up a new DHCP server. The IP addresses, starting from dhcp_address_start, are set up.
D: -c <count_of_ipaddr>
Sets up a total number of IP addresses in the DHCP table equal to the value of the count_of_ipaddr. The first IP address is the value of dhcp_ip_start that is provided by the -i option.
F: -s <srcimage>
Specifies location of AI ISO image to use for setting up the install service.
<targetdir>
Required: Specifies location to set up net image.

Question 19
Which statement is correct about shudown and init commands?
My answer: -
Reference answer: A
Reference analysis:

None

Question 20
You have already generated a 256-bit AES raw key and named the keystore file /mykey. You need to use the key to create an encrypted file system.
Which command should you use to create a ZFS encrypted file system named pool1/encrypt using the /mykey keystore?
My answer: -
Reference answer: B
Reference analysis:

Example: Encrypting a ZFS File System by Using a Raw Key
In the following example, an aes-256-ccm encryption key is generated by using the pktool command and is written to a file, /cindykey.file.
# pktool genkey keystore=file outkey=/cindykey.file keytype=aes keylen=256
Then, the /cindykey.file is specified when the tank/home/cindy file system is created.
# zfs create -o encryption=aes-256-ccm -o keysource=raw, file:///cindykey.file tank/home/cindys

Page: 1 / 20
Total 243 questions Full Exam Access