New Year Special - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: spcl70

1z0-821 PDF

$33

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

1z0-821 PDF + Testing Engine

$52.8

$175.99

3 Months Free Update

  • Exam Name: Oracle Solaris 11 System Administration
  • Last Update: Jan 13, 2025
  • Questions and Answers: 243
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

1z0-821 Engine

$39.6

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

1z0-821 Practice Exam Questions with Answers Oracle Solaris 11 System Administration Certification

Question # 6

Which three of the components could be used in a ZFS storage pool, but are not recommended configurations?

A.

A file on a UFS file system

B.

A Veritas Volume Manager (VxVM) volume

C.

A LUN In a hardware RAID array

D.

A disk slice from an SMI labeled disk

E.

A Solaris Volume Manager (SVM) volume

F.

An EFI labeled disk

Full Access
Question # 7

You have installed an update to the gzip package and need to "undo" .ho update and return the package to its "as-delivered" condition. Which command would you use?

A.

pkg undo

B.

pkg revert

C.

pkg fix

D.

pkg uninstall

Full Access
Question # 8

Subnets are created by using________.

A.

subnet

B.

netmask

C.

unicast

D.

broadcast

Full Access
Question # 9

You have installed the SMF notification framework to monitor services. Which command is used to set up the notifications for a particular service?

A.

svccfg

B.

svcadm

C.

setnotify

D.

smtp-notify

Full Access
Question # 10

You suspect a problem with the oponldap package and want to make sure that the files have not be modified or otherwise tampered with.

Which command would validate all of the files contained in the openldap package and report any problems?

A.

pkgchk openldap

B.

pkginfo openldap

C.

pkg contents openldap

D.

pkg verify openldap

E.

pkg set-property signature-policy verify

Full Access
Question # 11

How are operating system updates distributed in the Oracle Solaris 11 environment?

A.

Updates are only available to customers with an active support contract. The updates are distributed through the My Oracle Support web portal and installed in a central location. All software packages are then updated manually from the command line using the smpatch command.

B.

Patches are download from http: //support.oracle.com either automatically or manually. All software packages are then updated manually from the command line using the smpatch or patchadd commands.

C.

Software updates are published as packages to a repository. All software packages are then updated manually from the command line using the pkg command.

D.

Software updates, published as packages to an OS image. All software packages are then updated manually from the command line using the pkg command.

Full Access
Question # 12

View the Exhibit to see the information taken from the installation log file.

Based on the information presented in the Exhibit, which two options describe the state of the system when the server is booted for the first time after the installation is complete?

1z0-821 question answer

A.

NWAM will be used to configure the network interface.

B.

The network/physical service is offline.

C.

You cannot log in from the console as root. You must first log in as a user and then su to root account.

D.

The root user can log in from the console login.

E.

You will be prompted to configure the network interface after the initial login.

Full Access
Question # 13

You have been tasked with creating a dedicated virtual network between two local zones within a single system. In order to isolate the network traffic from other zones on that system.

To accomplish this, you will create__________.

A.

An ether stub

B.

A virtual router

C.

A virtual switch

D.

A virtual bridge.

E.

A virtual network interface

F.

Nothing because a virtual switch is automatically created then the virtual network interfaces are created.

Full Access
Question # 14

The COMSTAR framework provides support for the iSCSI protocol.

Select three options that correctly describe the COMSTAR framework.

A.

iSCSI devices can be used as dump devices.

B.

SCSI commands are carried over IP networks and enable you to mount disk devices from across the network onto your local system.

C.

Large amounts of data can be transferred over an IP network with very little network degradation.

D.

COMSTAR allows you to convert any Solaris11 host into a SCSI target device that can be accessed over a storage network.

E.

One IP port can handle multiple ISCSI target devices.

Full Access
Question # 15

The following line is from /etc/shadow in a default Solaris 11 Installation:

jack: $5$9JFrt54$7JdwmO.F11Zt/ jFeeOhDmnw93LG7Gwd3Nd/cwCcNWFFg:0:15:30:3:::

Which two are true?

A.

Passwords for account jack must be a minimum of 15 characters long.

B.

The password for account jack has expired.

C.

The password for account jack has 5 characters.

D.

A history of 3 prior passwords for the account jack is kept to inhibit password reuse.

E.

The minimum lifetime for a password for account jack is 15 days.

Full Access
Question # 16

You are installing the Oracle Solaris 11 Operating System by using the Text Installer. Which two options describe the features associated with the Text Installer?

A.

It can be used to install only SPARC systems.

B.

It installs gnome as the default user environment on a system capable of displaying a graphical environment.

C.

You can choose whether root is a role or user account.

D.

You can do both automatic and manual configuration of the network.

E.

You can select how to configure the remaining network interfaces.

Full Access
Question # 17

You are attempting to troubleshoot an event that should have made an entry into the messages log. This event happened about two weeks ago. Which file should you look at first?

A.

/var/adm/messages

B.

/var/adm/messages.0

C.

/var /adm/messagas.1

D.

/var/adm/messages.2

E.

/var/adm/messages.3

Full Access
Question # 18

You are logged in as root to a newly installed Solaris 11 system. You issue the command useradd -d, and then examine the /usr/sadm/defadduser file. This file includes the entry defshell=/bin/sh. Which shell will now be the default for the next account created?

A.

bash shell

B.

C shell

C.

korn shod

D.

bourne shell

Full Access
Question # 19

You are troubleshooting a newly installed desktop Oracle Solaris 11 system with a single network interface. From this system, you can connect to other systems within the company intranet, but cannot access any external services (such as websites and email), even when using IP addresses.

Examining the routing table confirms that the default route to 192.168.1.1 is missing. DHCP is not used at this site. Which two commands will temporarily mid permanently configure the default route?

A.

ipadm set-gateway 192.168.1.1

B.

route add default 192.168.1.1

C.

ipadm set-default 192.168.1.1

D.

dladm route-add –d 192.168.1.1

E.

echo 192.168.1.1 >/etc/gateway

F.

echo 192.168.1.1 >/etc/defaultrouter

Full Access
Question # 20

Identify the Automated Installer’s (AI) equivalent to jumpStart’s finish scripts and sysidcfg files.

A.

Manifest files

B.

SMF system configuration profile files

C.

Installadm create - client

D.

IPS software package repository

E.

installadm create-service

F.

svccfg - s application/pkg/server setprop sysidcfg

Full Access
Question # 21

Which two statements describe the COMSTAR framework available in Oracle Solaris 11?

A.

It converts an Oracle Solaris 11 host into a SCSI target device that can be accessed over a storage network by Linux, Mac OS, or Windows client systems.

B.

iSCSI targets cannot be configured as dump devices.

C.

It provides support for iSCSI devices that use SLP.

D.

It is used to connect to Fibre Channel or iSCSI Storage Area Network (SAN) environments.

E.

It provides an upgrade and update path to convert your iSCSI LUNs from Solaris 10 systems.

Full Access
Question # 22

You are having an issue with the shutdown command. You wish to determine if the file is a script or an executable program. Which command would you use to determine this?

A.

od shutdown

B.

file shutdown

C.

test shutdown

D.

cksum shutdown

E.

attrib shutdown

Full Access
Question # 23

The current ZFS configuration on server is:

1z0-821 question answer

You need to backup the /data file system while the file system is active.

Select the option that creates a full backup of the /data file system and stores the backup on server in the pool named backup.

A.

Mount -F nfs system: /backup / mntzfs snapshot pool/data@monday>/mnt/Monday

B.

Mount -F nfs systemB: /backup/mntzfs snapshot pool1/data@Mondayzfs clone pool1/data@monday/mnt/Monday

C.

Zfs send pool1/data@Monday | ssh system zfs recv backup/monday

D.

Zfs snapshot pool1/data@Monday | ssh system zfs recv backup/monday

Full Access
Question # 24

User brian changes the permissions for db_data this command:

chmod 4755 db_data

What is true?

A.

db_data now has permissions rwsr-xr-x and can be deleted only by user brian.

B.

db_data now has permissions rwsr-xr-x and, if executed, will inn with the permissions of user brian.

C.

db_data now has permissions rwxr-sr-x and can be deleted only by members of the group owning it.

D.

The permissions for db_data cannot be determined, because the permissions prior to the change have not been specified.

E.

db_data must be an ordinary file, because special permissions cannot be set on a directory.

Full Access
Question # 25

You want to install the openldap software package to a now boot environment for testing before introducing the now software package to the production environment. What option describes the correct procedure to:

1) create a new BE named nowBE

2) install the software to that new BE only

A.

pkg install --newBE openldap

B.

pkg install --be-nama newBE openldap

C.

beadm create newBEbeadm mount newBE /mntpkg -R /mnt update openldap

D.

beadm create newBEbeadm activate newBEpkg install openldap

Full Access
Question # 26

The default publisher on your system is:

1z0-821 question answer

You want to update the Oracle Solaris 11 environment on your system, but you are not able to connect this system to the Internet to access the default Oracle repository. A repository has been created on your local network and is named http://server1.example.com.

Which command would you choose to connect your system to the local repository?

A.

pkg publisher to specify the new publisher

B.

pkg set-publisher to set the stickiness on the http://server1.example.com publisher and unset stickiness for http://pkg.oracle.com/solaris/release

C.

pkg add-publisher to add the new publisher

D.

pkg set-publisher to set the origin for the publisher

Full Access
Question # 27

New features wore added to ZFS in Oracle Solaris11. Your justification to upgrade from Solaris10 to oracle Solaris11 is that it will be possible to take advantage of the enhancements that were made to ZFS.

Identify the three ZFS functions and features that are included in Oracle Solaris 11, but not in Solaris 10.

A.

Encrypted ZFS datasets

B.

Ability for ZFS to detect and remove redundant data from the tile system

C.

Shadow Data Migration

D.

Ability to split a mirrored ZFS storage pool

E.

Ability to use ZFS on the boot drive and boot to a ZFS root file system.

F.

elimination of the swap file system when using ZFS on the root disk

Full Access
Question # 28

You are troubleshooting the failure of a computer to mount an NFS file system hosted by a server (hostname mars) in the local area network.

Select the three commands that will enable you to identify the problem.

A.

ping - s mars

B.

cat /etc/vfstab

C.

cat /etc/dfs/dfstab

D.

sharemgr show -v

E.

showmount -e mars

F.

rpcinfo -s mars | egrep ‘nfs|mountd’

Full Access
Question # 29

Which two are implemented using the Internet Control Message Protocol (ICMP)?

A.

ping

B.

DHCP

C.

HTTP

D.

telnet

E.

syslog

F.

traceroute

Full Access
Question # 30

You are asked to determine user jack’s default login directory. Which command would provide you with useful information?

A.

cat /etc/passwd | grep jack

B.

cat /etc/group | grep jack

C.

cat /etc/shadow | grep jack

D.

cat /etc/default/passwd | grep jack

Full Access
Question # 31

You want to delete the IPv4 address on the interface net3. Which command should you use?

A.

ipadm delete-ip net3/v4

B.

ipadm down-addr net3/v4

C.

ipadm disable-if net3/v4

D.

ipadm delete-vni net3/v4

E.

ipadm delete-addr net3/v4

F.

ipadm deiete-ipv4 ner3/v4

Full Access
Question # 32

Which two options are accurate regarding the non-global zone console?

A.

Access the non-global zone console by using the zlogin –c command.

B.

Access the non-global zone console by using the zlogin –1 command.

C.

Disconnect from the non-global zone console by using the ~. keys.

D.

Disconnect from the non-global zone console by using the #. keys.

Full Access
Question # 33

Which three files must be edited in order to set up logging of all failed login attempts?

A.

/var/adm/authlog

B.

/etc/syslog.conf

C.

/etc/default/login

D.

/var/adm/loginlog

Full Access
Question # 34

You notice that the /var/.dm/messages file has become very large. Typically, this is managed by a crontab entry. Which entry should be in the root's crontab file?

A.

10 3 * * * /usr/adm/messages

B.

10 3 * * * /usr/sbin/logadm

C.

10 3 * * * /usr/sbin/syslogrotate

D.

10 3 * * * /usi/sbin/logrotate

E.

10 3 * * * /usr/sbin/messages

Full Access
Question # 35

User jack logs in to host solar in and issues the following command:

jack@solaris:-$ ls .ssh

id_dsa id_dsa.pub id_rsa id_rsa.pub known_hosts authorized_keys

Which two are true?

A.

The id_rsa file contains the private key for rhosts-based host authentication.

B.

The id_dsa.pub file contains the Digital Signature Algorithm public key for the user jack.

C.

The id_rsa.pub file contains the Rivest Shamir Adelman public key for the host solaris.

D.

The authorized_keys file contains the private keys of remote users authorized to access jack’s account on solaris.

E.

The known_hosts file contains the verified public keys of remote hosts known to be trusted.

Full Access
Question # 36

The following information is displayed about the compress/zjp software package, which Is currently installed on this system:

NAME (PUBLISHER)VERSIONIFO

Compress/zip3.1.2-0.175.0.0.0.0.537if-

NAMEVERSIONDATECOMMENT

Compress/zip3.109 Dec 2011 04:50:38 ESTNone

Which statement describes the information that is displayed tor the compress/zip software package?

A.

This package cannot be removed.

B.

This package can be updated to a new version when the new version of the package becomes available.

C.

This package cannot be updated.

D.

This package can be updated to version 3.1.3 but not 3.2.

E.

This package cannot be downgraded to version 3.1.1.

Full Access
Question # 37

Which three options accurately describe Oracle Solaris 11 zones?

A.

can be NFS servers

B.

are whole root type only

C.

cannot have their own time zone setting

D.

can execute z£s and zpool commands (from a non-global zone)

E.

are virtualized operating system environments, each with its own dedicated OS and kernel

F.

are virtualized operating system environments, created with a single instance of the OS shared kernel

Full Access
Question # 38

You have edited /etc/profile to include the lines:

dennis_says=hello

export dennie_says

You have also edited /etc/skel/local.profile to include the line:

dennis_says=world

You now create a new user account brian, and specify use of the bash shell. When brian logs in and enters

Echo $dennis_says

What will he see, and why?

A.

world, because the local.profile entry will be executed last

B.

hello, because the global /etc/profile entry overrides the local.profile entry

C.

hello, because the local.profile entry is not automatically sourced on login

D.

hello, because the value specified in local.profile was not exported

E.

nothing, because the variable was not exported in local.profile

Full Access
Question # 39

dbzone is currently running on your server.

Which two methods would you use to safely and cleanly shut down dbzone and all of its applications?

A.

zlogin –z dbzone halt

B.

zoneadm –z dbzone shutdown –i0

C.

zoneadm –z dbzone shutdown

D.

zoneadm –z dbzone halt

E.

zlogin dbzone shutdown –i0

Full Access
Question # 40

After installing the OS, you boot the system and notice that the syslogd daemon is not accepting messages from remote systems.

Which two options should you select to modify the syslogd daemon configuration so that it accepts messages from remote systems?

A.

svccfg -s svc:/system/system -log setprop start/exec= “syslogd -t”Restart the syslogd daemon.

B.

Set the following parameter in the /etc/syslogd.conf file: LOG_FROM_REMOTE= YESRestart the syslogd daemon.

C.

svcadm enable svc:/system/system -log/config/log_from_remoteRestart the syslogd daemon.

D.

svccfg -s svc:/system/system-log setprop config/log_from_remote=trueRestart the syslogd daemon.

E.

Set the following parameter in the /etc/default/syslogd file: LOG_FROM_REMOTE=YESRestart the syslogd daemon.

Full Access
Question # 41

Your task is to convert a JumpStart sysidcfg file to an Automated Installer (AI) sc_profile.xml file, using js2ai.

Select two unsupported items that will require changes.

A.

terminal = zterms

B.

name_service-NTS+

C.

timezone=US/pacific

D.

system_locale=en_US

E.

network_interface=PRIMARY

F.

root_password=rJmvLUXM10cU

Full Access
Question # 42

You have been asked to terminate a process that appears to be hung and will not terminate. The process table is shown below:

root 15163 15156 0 12:51:15 pts/3 0:00 hungscript

What command will terminate the process?

A.

kill -9 15163

B.

kill -1 15163

C.

kill -15 15163

D.

kill -2 15163

Full Access
Question # 43

You are troubleshooting interface net3 and you enter the following sequence of commands:

1z0-821 question answer

Your next command should be:

A.

ipadm up-addr net3/v4

B.

ipadm enable-if -T net3

C.

D.

ipadm create-ip -T static -a 192.168.1.25/24 -n net3

E.

ipadm create-addr -T static -a 192.168.1.25/24 net3

Full Access
Question # 44

Identify the correctly matching pair of equivalent functionality of JumpStart and Automated installer (AI).

A.

JumpStart: begin script AI: package repository

B.

JumpStart: setup_serverAI: installadm create-service

C.

JumpStart: add_Install_clientAI: SMF system configuration profile files

D.

JumpStart: finish scripts and sysidsfg filesAI: manifest files

Full Access
Question # 45

A user jack, using a bash shell, requests a directory listing as follows:

1z0-821 question answer

Which three statements are correct?

A.

The pattern dir? will expand to dira dirb dirc.

B.

The pattern dir*a will expand to diraa.

C.

The pattern dir*a will expand to dira diraa.

D.

The pattern dir*b? will expand to dirabc.

E.

The pattern dir*b? will expand to dirb dirabc.

Full Access
Question # 46

You are using AI to install a new system. You have added to following information to the AI manifest:

source = “http://sysA.example.com/zone_cfg/zone.cfg”/ >

Which statement is true with regard to the zone.cfg?

A.

The zone.cfg file is text file in a zonecfg export format.

B.

The zone.cfg file is an AI manifest that specifies how the zone is to be installed.

C.

The zone.cfg file is an xml file in a form suitable for use as a command file for the zonecfg command.

D.

The zone.cfg file is an SC profile with keywords that are specific for configuring a as part of the installation process.

E.

It is am xml configuration file from the /etc/zone directory. It will be used as a profile for the zone. It specifies the zonename, zonepath, and other zonecfg parameters.

Full Access
Question # 47

A change in your company’s security policy now requires an audit trial of all administrators assuming the sysadm role, capturing:

  • Executed commands, including options
  • Logins and logouts

There are two command necessary to accomplish this change. One is a rolemod command. What is the other?

A.

auditconfig set policy=argv

B.

auditconfig -setpolicy +argv

C.

auditconfig -setflags lo, ex sysadm

D.

auditconfig set flags=lo, ex sysadm

Full Access
Question # 48

In an effort to reduce storage space on your server, you would like to eliminate duplicate copies of data in your server’s ZFS file systems.

How do you specify that pool1/data should not contain duplicate data blocks (redundant data) on write operations?

A.

zfs create - o compression=on pool1/data

B.

zpool create -o deduplication =on pool1; zfs create pool1/data

C.

zfs create - o deduplication=on pool1; zfs create pool1/data

D.

zfs create - o dedupratio=2 pool1/data

E.

zfs create - o dedup=on pool1/data

Full Access
Question # 49

You are configuring NFS on a server. Select the two statements that are true.

A.

Resources listed in /etc/dfs/dfstab are automatically shared on boot up.

B.

A directory cannot be shared if a subdirectory below it is already shared.

C.

Renaming a share created with the zfs set share command is not supported.

D.

NFS and SMB protocols cannot be used simultaneously to share the same directory.

Full Access
Question # 50

Which files must be edited in order to set up logging of all failed login attempts?

A.

/etc/default/login, /var/adm/loginlog, /etc/syslog.conf

B.

/etc/default/login, /var/adm/authlog, /etc/syslog.conf

C.

/var/adm/loginlog, /var/adm/authlog, /etc/syslog.conf

D.

/etc/default/login, /var/adm/authlog, /var/adm/loginlog

Full Access
Question # 51

You are the administrator for a group of shell script developers. They use vi, and have asked you to make their scripts automatically executable when they save their files.

How can this be accomplished?

A.

Enter set –o vi on the command line, or include it in each user's startup script.

B.

Enter umask –s on the command line, or include it in each user's startup script.

C.

Enter umask 000 on the command line, or include it in each user's startup script.

D.

Enter umask 777 on the command line, or include it in each user's startup script.

E.

It is not possible to automatically set the execute bit on with the umask setting, or vi option.

F.

Enter umask 766 the command line, or include it in the global startup script for the default shell.

Full Access
Question # 52

user1 has a disk quota of 0.5 MB. The user attempts to run the following command on a file called .bigfile that is 495 KB in size:

cp bigfile /tmp

Will the command execute successfully?

A.

Yes. Quotas do not include any of the system files such as /tmp /swap.

B.

Yes. The quota is set at the directory level, not the user level.

C.

No. The command will fail because it will cause him to exceed his user quota.

D.

No. A user cannot place files into the /tmp directory.

Full Access
Question # 53

You have been asked to do an orderly shutdown on a process with a PID of 1234, with the kill command.

Which command is best?

A.

kill -2 1234

B.

kill -15 1234

C.

kill -9 1234

D.

kill -1 1234

Full Access
Question # 54

The /etc/hosts file can be best described as______.

A.

a local database of host names for rlogin, rsh, and rep

B.

the configuration file for the host name of the system

C.

a local database of information for the uname command

D.

the configuration file for the Domain Name Service (DNS)

E.

a local database of host names and their associated IP addresses

Full Access
Question # 55

You are asked to troubleshoot networking issues on an unfamiliar system.

Select the correct command to display what network devices are installed.

A.

ifconfig -a

B.

dladm show-dev

C.

dladm show-phys

D.

dladm show-ether

E.

netadm show-dev

F.

netadm show-ether

Full Access
Question # 56

You want to deploy Oracle Solaris 11 with the Automated Installer (AI). You need to make sure that your server and network meet the requirements for using AI.

Choose the three options that describe the requirements for using AI.

A.

You can create only one manifest per install service. If you need more than one manifest create multiple install services.

B.

If two client machines have different architectures and need to be installed with the same version of the Oracle Solaris 11 OS, then create two AI manifests and a single install service.

C.

You need a separate install service for each different client architecture that you plan to install, and for each different version of the Oracle Solaris 11 OS that you plan to install on client systems.

D.

If two client machines have different architectures and need to be installed with different versions of the Oracle Solaris 11 OS, then create two AI manifests and two install services.

E.

The install server needs to be able to access an Oracle Solaris Image Packaging System (IPS) software package repository; the clients do not.

F.

The install server can be either an x86 machine or a SPARC machine.

Full Access
Question # 57

Server A, Server B, and Server C are connected to the same network switch and are on the sari Each server has a single network interface, net0.

You received a tech support call that Server B has lost network connectivity. Your troubleshooting has discovered:

Server A can ping Server C, but not Server B.

Server B can ping localhost, but not Server A or C.

Server C can ping Server A, but not Server B.

On Server F3, you enter the following command:

dladm show-phys | grep net0

Response:

net0/v4 Ethernet down 0 unknown el00gl

What is the next logical troubleshooting action?

A.

Run arp -a on all servers.

B.

Confirm that the router is working.

C.

Confirm that the power light of the network switch is on.

D.

Confirm that the physical network connections are intact.

E.

On Server A and C, run tranceroute –n server.

F.

On Server B, run tranceroute –n servera and tranceroute –n serverc.

Full Access
Question # 58

What is the output of the following command, if executed using the default shell for the root role account of a standard Live CD Install of Oracle Solaris 11?

echo '$SHELL'

A.

/usr/bin/bash

B.

/usr/bin/ksh

C.

$SHELL

D.

the PID for the current shell

Full Access
Question # 59

You have already generated a 256-bit AES raw key and named the keystore file /mykey. You need to use the key to create an encrypted file system.

Which command should you use to create a ZFS encrypted file system named pool1/encrypt using the /mykey keystore?

A.

zfs create - o encryption = /mykey pool1/encrypt

B.

zfs create - o encryption = 256-ccm - o keysource = raw, file : ///my key pool1/encrypt

C.

zfs create - o encryption = AES keysource = /mykey pool1/encrypt

D.

zfs create - o encryption = on keystore = /mykey pool1/encrypt

Full Access
Question # 60

You need to install the gzip software package on your system. Which command would you use to find the software package in the configured repository?

A.

pkg search gzip

B.

pkg info gzip

C.

pkg contents gzip

D.

pkginfo gzip

E.

yum list gzip

Full Access
Question # 61

This iron is displayed on the desktop of a laptop computer, which is running Oracle Solaris 11.

1z0-821 question answer

Which two statements describe the Information conveyed by this Icon?

A.

NWAM is disabled.

B.

NWAM is automatically configuring the network.

C.

The wireless network card is manually configured and operational.

D.

The wireless network card is manually configured but not operational.

E.

The wireless network card is automatically configured and operational.

F.

The wireless network card is automatically configured but not operational.

Full Access
Question # 62

View the Exhibit.

1z0-821 question answer

After Installing the OS, you need to verify the network interface information. Which command was used to display the network interface information in the exhibit?

A.

ifconfiq –a

B.

ipadm show-addr

C.

svcs –1 network/physical

D.

netstat –a

Full Access
Question # 63

User jack on host solaris attempts to use ssh to log in to host oracle and receives this message:

jack@solaris:~$ ssh oracle

ssh: connect to host oracle port 22: connection refused

What is the problem?

A.

Host oracle does not have a valid host public key.

B.

Host oracle does not have a valid host private key.

C.

Host solaris does not have a valid host public key.

D.

Host does not have a valid host private key.

E.

Host solaris is not configured for host-based authentication.

F.

Host oracle is not configured for host-based authentication.

G.

Host oracle is not running the ssh service.

Full Access
Question # 64

Identify three options that describe the new Oracle Solaris 11 zone features.

A.

There are boot environments for zones.

B.

Administrators can delegate common administration tasks by using RBAC.

C.

Oracle Solaris 11 supports Solaris 8, 9, and 10 branded zones.

D.

You can migrate a physical Solaris 10 system and its non-global zones to a solaris10 branded zone running on an Oracle Solaris 11 system.

E.

It is possible to change the host ID of a zone.

Full Access
Question # 65

You need to configure an ISCSI target device on your x86 based Oracle Solaris II system. While configuring the iSCSI device, the following error is displayed:

bash: stmfadm: command not found

Which option describes the solution to the problem?

A.

The COMSTAR feature is not supported on the x86 platform. The feature is supported only on the SPARC platform.

B.

Use the iscsitadm command on the x86 platform when configuring an iSCSI target.

C.

Install the storage-server group package on this system.

D.

Start the iSCSI target daemon on this system.

Full Access
Question # 66

You create a flash archive of the Solaris 10 global zone on the serves named sysA. The archive name is s10-system.flar, and it is stored on a remote server named backup_server.

On sysA, you create a Solaris 10 branded zone named s10-zone.

You want to use the flash archive, located On" /net/bactup_servers/10-system.flar, to install the Operating system in the s10-zone zone.

Which command do you choose to install the s10-system.flar archive in the Solaris 10 branded zone (s10-zone)?

A.

zoneadm -z s10 -zone install - a /net/backup_server/s10-system.flar -u

B.

zonecfg -z s10 -zone install - a /net/backup_server/s10-system.flar -u

C.

zoneadm - z s10 -zone clone - s /net/backup_server/s10-system.flar

D.

zone cfg - a s10-zone create - t SUNWsolaris10\

E.

zonecfg -z s10-zone install -f /net/backup/backup_server/s10-system.flar

Full Access
Question # 67

Which two options accurately describe the network characteristics of a zone?

A.

DHCP address assignment cannot be configured in a shared IP zone.

B.

Shared IP is the default type of network configuration.

C.

Exclusive IP is the default type of network configuration.

D.

By default, all IP addresses, netmasks, and routes are set by the global zone and cannot be altered in a non global zone.

E.

IPMP cannot be managed within the non-global zone.

F.

Commands such as snoop and dladm cannot be used on datalinks that are in use by a running zone.

Full Access
Question # 68

Which two options describe how to override the default boot behavior of an Oracle Solaris 11 SPARC system to boot the system to the single-user milestone?

A.

from the ok prompt, issue this command:

boot -m milestone=single-user

B.

From the ok prompt, issue this command:

boot -m milestone/single-user

C.

From the ok prompt, issue this command:

boot -milestone=single-user

D.

From the ok prompt. issue this command:

boot -s

E.

From from the ok prompt, issue this command:

boot -m milestone=s

Full Access
Question # 69

To confirm the IP addresses and netmasks have been correctly configured on the network interfaces, which command(s) should you use?

A.

ipadm show-if

B.

ipadm show-nic

C.

ipadm show-addr

D.

ipadm show-addr

ipadm show-mask

E.

ipadm show-ip

ipadm show-mask

F.

ipadm show-config

Full Access
Question # 70

The su command by default makes an entry into the log file for every su command attempt. The following is a single line from the file:

SU 12/18 23:20 + pts/1 user1-root

What does the + sign represent?

A.

unsuccessful attempt

B.

successful attempt

C.

The attempt was from a pseudo terminal, and not the console.

D.

The attempt was from a user that is in the adm group, same as root.

E.

Time zone is not set.

Full Access
Question # 71

You need to make sure that all of the software packages on your server are up to date. Without installing any updates, which two commands would display .my software updates that are available in the default Oracle repository?

A.

pkg list -u

B.

pkg verify –u ‘*’

C.

pkg search –u

D.

pkg info –r ‘*’

E.

pkg install –nv

F.

pkg update –nv ‘*’

Full Access
Question # 72

Which operation will fail if the DNS configuration is incorrect?

A.

domainname

B.

ping localhost.

C.

ping 192.168.1.1

D.

ping 23.45.82.174

E.

ping www.oracle.com.

F.

cat /etc/resolv.conf

Full Access