What Virtual 1Z0-821 Exam Prep Is

Exam Code: 1Z0-821 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: Oracle Solaris 11 System Administrator
Certification Provider: Oracle
Free Today! Guaranteed Training- Pass 1Z0-821 Exam.

Also have 1Z0-821 free dumps questions for you:

After installing the OS, you boot the system and notice that the syslogd daemon is not
accepting messages from remote systems.
Which two options should you select to modify the syslogd daemon configuration so that it accepts messages from remote systems?

  • A. svccfg -s svc:/system/system -log setprop start/exec= “syslogd -t”Restart the syslogd daemon.
  • B. Set the following parameter in the /etc/syslogd.conf file: LOG_FROM_REMOTE= YESRestart the syslogd daemon.
  • C. svcadm enable svc:/system/system -log/config/log_from_remoteRestart the syslogd daemon.
  • D. svccfg -s svc:/system/system-log setprop config/log_from_remote=trueRestart the syslogd daemon.
  • E. Set the following parameter in the /etc/default/syslogd file: LOG_FROM_REMOTE=YESRestart the syslogd daemon.

Answer: BD

B: The /etc/default/syslogd file contains the following default parameter settings. See FILES.
Specifies whether remote messages are logged. LOG_FROM_REMOTE=NO is equivalent to the -t command-line option. The default value for LOG_FROM_REMOTE is YES.

ServerA contains two ISO images of a package repository named so1.repo.iso-a and so1.repo.iso-b respectively. You need to create a single local package repository on server that clients can connect to. The package repository will be stored on the /export/IPS file system and named repo. The preferred publisher will be named solaris and the publisher URL will be http://serverA.example.com.
Which is the correct procedure to perform on ServerA to create the local Package repository?

  • A. cat so1.repo.iso-a sol.repo.iso-b > so1.full.isoMount the ISO image and use the rsync command to extract the contents of the ISO file to the /export/IPS file system.Set the pkg/inst_root property to /export/IPS/repo and the pkg/readonly property to true.Set the preferred publisher by using pkg set-publisher -Ghttp://pkg.oracle.com/solaris/release/ \-g http”//serverA.example.com/ solaris
  • B. cat so1.repo.iso-a so1.repo.iso-b > /export/IPS/repoSet the pkg/inst_root property to true and the pkg/readonly property to /export/IPSSet the preferred publisher by using pkg set-publisher -G http://serverA.example.com/ \-g http://pkg/oracle.com/solaris/rekease/solaris
  • C. cat so1.repo.iso-a so1.repo.iso-b > so1.full.isoMount the ISO image and use the rsync command to extract the contents of the ISO file to /export/IPS/repoSet the pkg/inst_root property to /export/IPS/repo and the pkg/readonly property to trueSet the preferred publisher by using pkg set-publisher solaris \-g http://pkg.oracle.com/
  • D. cat so1.repo, iso-a so1.repo.iso-b > /export/IPS/repo.isoMount the ISO image and copy the repo directory from the ISO image to /export/IPS/reposet the pkg/inst_root property and the pkg/readonly property to /export/IPS/reposet the preferred pkg/inst_root property by using pkg set-publisher - G http://serverA.example.com/ \- g http://pkg.oracle.com/solaris.com/release/- p solaris

Answer: A

Consider the following commands:
1Z0-821 dumps exhibit
What is displayed when this sequence of commands is executed using the bash shell?

  • A. Hello, world
  • B. cat: cannot open file1: No such file or directory Hello, world
  • C. cat: cannot open file1: No such file or directory
  • D. bash: syntax error near unexpected token '| |'
  • E. bash: syntax error broker pipe

Answer: B

Which two options accurately describe the network characteristics of a zone?

  • A. DHCP address assignment cannot be configured in a shared IP zone.
  • B. Shared IP is the default type of network configuration.
  • C. Exclusive IP is the default type of network configuration.
  • D. By default, all IP addresses, netmasks, and routes are set by the global zone and cannot be altered in a non global zone.
  • E. IPMP cannot be managed within the non-global zone.
  • F. Commands such as snoop and dladm cannot be used on datalinks that are in use by a running zone.

Answer: AB

A: Non-global zones can not utilize DHCP (neither client nor server).
B (not C): By default, non-global zones will be configured with a shared IP functionality. What this means is that IP layer configuration and state is shared between the zone you’re creating and the global zone. This usually implies both zones being on the same IP subnet for each given NIC.
Note: A zone is a virtual operating system abstraction that provides a protected environment in which applications run. The applications are protected from each other to provide software fault isolation. To ease the labor of managing multiple applications and their environments, they co-exist within one operating system instance, and are usually managed as one entity.
The original operating environment, before any zones are created, is also called the "global zone" to distinguish it from non-global zones, The global zone is the operating system instance.
Incorrect Answer
E: Exclusive-IP zones can use IPMP. IPMP is configured the same way in an exclusive-IP zone as it is on a system not using zones.
For shared-IP zones, IPMP can be configured in the global zone. F: Full IP-level functionality is available in an exclusive-IP zone. An exclusive-IP zone has its own IP-related state.
An exclusive-IP zone is assigned its own set of data-links using the zonecfg command. The zone is given a data-link name such as xge0, e1000g1, or bge32001, using the physical property of the net resource. The address property of the net resource is not set.
Note that the assigned data-link enables the snoop command to be used.
The dladm command can be used with the show-linkprop subcommand to show the assignment of data-links to running exclusive-IP zones.

You are troubleshooting the failure of a computer to mount an NFS file system hosted by a server (hostname mars) in the local area network.
Select the three commands that will enable you to identify the problem.

  • A. ping - s mars
  • B. cat /etc/vfstab
  • C. cat /etc/dfs/dfstab
  • D. sharemgr show -v
  • E. showmount -e mars
  • F. rpcinfo -s mars | egrep ‘nfs|mountd’

Answer: BEF

B: The mount point Error. The following message appears during the boot process or in response toan explicit mount request and indicates a non-existent mount point.
Mount: mount-point /DS9 does not exist.
To solve the mount point error condition, check that the mount point exists on the client. Check the spelling of the mount point on the command line or in the /etc/vfstab file (B) on the client, or comment outthe entry and reboot the system.
Note: The /etc/vfstab file lists all the file systems to be automatically mounted at system boot time, with the exception of the /etc/mnttab and /var/run file systems.
E: showmount
This command displays all clients that have remotely mounted file systems that are shared from an NFS server, or only the file systems that are mounted by clients, or the shared file systems with the client access information. The command syntax is:
showmount [ -ade ] [ hostname ]
where -a prints a list of all the remote mounts (each entry includes the client name and the
directory), -d prints a list of the directories that are remotely mounted by clients, -e prints a list of the files shared (or exported), and hostname selects the NFS server to gather the information from. If hostname is not specified the local host is queried.
F: * mountd Daemon
This daemon handles file-system mount requests from remote systems and provides access control. The mountd daemon checks /etc/dfs/sharetab to determine which file systems are available for remote mounting and which systems are allowed to do the remote mounting.
* Commands for Troubleshooting NFS Problems
These commands can be useful when troubleshooting NFS problems. rpcinfo Command
This command generates information about the RPC service that is running on a system.

Which three statements are true concerning Image Packaging System (IPS) incorporation package?

  • A. Installing an incorporation package does not install any other packages.
  • B. Every feature or tool has a separate IPS incorporation.
  • C. They constrain the versions of packages they incorporate.
  • D. They are a content management tool and not a version management tool.
  • E. Their dependencies are always of TYPE-REQUIRE.
  • F. They are defined by their manifest

Answer: ACE

Solaris 11 includes a redesigned software packaging model: the Image Packaging system.
Which three describe advantages of the Image Packaging System over the previous Solaris 10 SVR4 packaging model?

  • A. Eliminates patching of the software package
  • B. Makes the patching process more efficient with less downtime
  • C. Eliminates OS version upgrade
  • D. Allows for the installation of the OS without a local DVD or installation server
  • E. Allows the use of a repository mirror to speed up package operation
  • F. Allows users to publish their own software package in a software repository

Answer: AEF

Examine this command and its output:
$ zfs list -r -t all tank
tank 2.41G 2.43G 32K /tank
tank/database 2.41G 2.43G 2.41G /tank/database tank/[email protected] 20K - 2.00G –
Next you execute:
# zfs destroy tank/database
Which statement is true about the result of executing this command?

  • A. It destroys the tank/database dataset.
  • B. It destroys tank/database and all descendant datasets.
  • C. It fails because the tank/[email protected] snapshot depends on the tank/database dataset.
  • D. It fails because the tank/[email protected] clone depends on the tank/database dataset.
  • E. It fails because the tank/database data set is not empty.

Answer: C

Select two correct statements about the authentication services available in Oracle Solaris 11.

  • A. Pluggable Authentication Modules (PAM) is used to control the operation of services such console logins and ftp.
  • B. The Secure Shell can be configured to allow logins across a network to remote servers without transmitting passwords across the network.
  • C. Secure Remote Procedure Calls (Secure RPC) provides a mechanism to encrypt data on any IP Socket connection.
  • D. Pluggable Authentication Modules (PAM) is used to implement the Secure Shell in Oracle Solaris 11.
  • E. Simple Authentication and Security Layer (SASL) provides a mechanism to authenticate and encrypt access to local file system data.

Answer: AE

A: Pluggable Authentication Modules (PAM) are an integral part of the authentication mechanism for the Solaris. PAM provides system administrators with the ability and flexibility to choose any authentication service available on a system to perform end-user authentication.
By using PAM, applications can perform authentication regardless of what authentication method is defined by the system administrator for the given client.
PAM enables system administrators to deploy the appropriate authentication mechanism for each service throughout the network. System administrators can also select one or multiple authentication technologies without modifying applications or utilities. PAM insulates application developers from evolutionary improvements to authentication technologies, while at the same time allowing deployed applications to use those improvements.
PAM employs run-time pluggable modules to provide authentication for system entry services.
E: The Simple Authentication and Security Layer (SASL) is a method for adding authentication support to connection-based protocols.
Simple Authentication and Security Layer (SASL) is a framework for authentication and data security in Internet protocols. It decouples authentication mechanisms from application protocols, in theory allowing any authentication mechanism supported by SASL to be used in any application protocol that uses SASL. Authentication mechanisms can also support proxy authorization, a facility allowing one user to assume the identity of another. They can also provide a data security layer offering data integrity and data confidentiality services. DIGEST-MD5 provides an example of mechanisms which can provide a data-security layer. Application protocols that support SASL typically also support Transport Layer Security (TLS) to complement the services offered by SASL.

Which files must be edited in order to set up logging of all failed login attempts?

  • A. /etc/default/login, /var/adm/loginlog, /etc/syslog.conf
  • B. /etc/default/login, /var/adm/authlog, /etc/syslog.conf
  • C. /var/adm/loginlog, /var/adm/authlog, /etc/syslog.conf
  • D. /etc/default/login, /var/adm/authlog, /var/adm/loginlog

Answer: B

This procedure captures in a syslog file all failed login attempts.
1. Set up the /etc/default/login file with the desired values for SYSLOG and SYSLOG_FAILED_LOGINS
Edit the /etc/default/login file to change the entry. Make sure that SYSLOG=YES is uncommented.
2. Create a file with the correct permissions to hold the logging information. Create the authlog file in the /var/adm directory.
3. Edit the syslog.conf file to log failed password attempts. Send the failures to the authlog file.

Your are troubleshooting network throughput on your server.
To confirm that the load balancing among aggregated links is functioning properly, you want to examine the traffic statistics on the links comprising the aggregation.
The correct command is .

  • A. dlstat - aggr
  • B. dlstat show-aggr
  • C. dlstat show-link -r
  • D. dlstat show-link -aggr
  • E. dlstat show-phys -aggr

Answer: B

dlstat show-aggr [-r | -t] [-i interval] [-p] [ -o field[, ...]] [-u R|K|M|G|T|P] [link] Display per-port statistics for an aggregation.

Review the zonestat command:
zonestate - q physical - memory -R high -z -p -p “zones” 10 24h 60m
Select the option that correctly describes the information that is displayed by this command.

  • A. It is a sample of dbzone’s physical memory usage taken every hour over a 24-hour period.Only the top 10 samplings of peak memory usage are displaye
  • B. All other utilization data is eliminated.
  • C. It is a sample of dbzone’s CPU, virtual memory, and networking utilization.Physical memory is executed from the report.The sampling is taken every 10 minutes over a 24- hour period and peak utilization id displayed each hour.
  • D. It is a sample of dbzone’s CPU, virtual memory, and networking utilization.Physical memory is executed from the report.The sampling is taken every 10 minutes over a 24- hour period and displayed each hour.
  • E. It is a sample of dbzone’s physical memory usage taken every 10 seconds and 24-hour period.Only peak virtual memory usage and CPU utilization are displayed each hour.All other Utilization data is eliminated.
  • F. It is a sample of dbzone’s physical memory usage taken every 10 seconds and 24-hour period.Only peak memory usage is displayed each hour.All other utilization data is eliminated.

Answer: D

* (Not A, B, C): interval (here 10 seconds): Specifies the length in seconds to pause between each interval report.
* duration (here 24 h)
* -R report[, report] (here high) Print a summary report.
High Print a summary report detailing the highest usage of each resource and zone during any interval of the zonestat utility invocation.
Note: The zonestat utility reports on the cpu, memory, and resource control utilization of the currently running zones. Each zone's utilization is reported both as a percentage of system resources and the zone's configured limits.
The zonestat utility prints a series of interval reports at the specified interval. It optionally
also prints one or more summary reports at a specified interval.
The default output is a summary of cpu, physical, and virtual memory utilization. The -r option can be used to choose detailed output for specific resources.

You want the system to generate an email notification each time one of the services has changed its state. Which option would send an email message to the system administrator whenever a service changes to the maintenance state?

  • A. Use the setsc command in ALOM to enable the mail alerts to be sent to a specified email address whenever the fault management facility detects a service change to the maintenance state.
  • B. Make an entry in the /etc/syslog.conf file to instruct syslogd to send an email alert when it receives a message from the SMF facility that a service has changed to the maintenance state.
  • C. Use the svccfg setnotify command to create a notification and send an email when a service enters the maintenance state.
  • D. Use the scvadm command to enable the notification servic
  • E. Set the –g maintenance option on the netnotify service to send an email when a service enters the maintenance state.

Answer: C

This procedure causes the system to generate an email notification each time one of the services or a selected service has a change in state. You can choose to use either SMTP or SNMP. Normally, you would only select SNMP if you already have SNMP configured for some other reason.
By default, SNMP traps are sent on maintenance transitions. If you use SNMP for monitoring, you can configure additional traps for other state transitions.
1. Become an administrator or assume a role that includes the Service Management rights profile.
2. Set notification parameters.
The following command creates a notification that sends email when transactions go into the maintenance state
# /usr/sbin/svccfg setnotify -g maintenance mailto:sysadmins@example.com

On which is the open boot prom available?

  • A. x86 only
  • B. x86 64-Bit only
  • C. SPARC only
  • D. both x86 and x86 64-Bit
  • E. x86, x86 64-Bit and SPARC

Answer: C

No OpenBoot Environment on the Intel Platform. The Intel environment has no OpenBoot PROM or NVRAM. On Intel systems, before the kernel is started, the system is controlled by the basic input/output system (BIOS), the firmware interface on a PC. Therefore, many features provided by OpenBoot are not available on Intel systems.
Note: The Open Boot PROM (OBP) bootloader only exists within SPARC. Before Solaris 10 01/06, the bootloader for Solaris x86 was a Sun customized bootstrap software. After Solaris 10 01/06, it uses GRUB, a well known bootloader that's commonly used in the
Linux world.
With GRUB, it's much easier to make the system dual-boot Linux and Solaris. GRUB extends the capabilities of the bootloader that was not available previously such as the ability to boot from a USB DVD drive. Those who have used Linux will be quite familiar with GRUB and its options.

You have a ZFS file system named /dbase/oral and you want to guarantee that 10 GB of storage space is available to that dataset for all data, snapshots, and clones.
Which option would you choose?

  • A. zfs set refreservation=10g dbase/oral
  • B. zfs set quota=10g dbase/oral
  • C. zfs set refquota=10g dbase/oral
  • D. zfs set reservation=10g dbase/oral

Answer: D

A ZFS reservation is an allocation of disk space from the pool that is guaranteed to be available to a dataset. As such, you cannot reserve disk space for a dataset if that space is not currently available in the pool. The total amount of all outstanding, unconsumed reservations cannot exceed the amount of unused disk space in the pool. ZFS reservations can be set and displayed by using the zfs set and zfs get commands. For example:
# zfs set reservation=5G tank/home/bill
# zfs get reservation tank/home/bill NAME PROPERTY VALUE SOURCE
tank/home/bill reservation 5G local

The COMSTAR framework provides support for the iSCSI protocol. Select three options that correctly describe the COMSTAR framework.

  • A. iSCSI devices can be used as dump devices.
  • B. SCSI commands are carried over IP networks and enable you to mount disk devices from across the network onto your local system.
  • C. Large amounts of data can be transferred over an IP network with very little network degradation.
  • D. COMSTAR allows you to convert any Solaris11 host into a SCSI target device that can be accessed over a storage network.
  • E. One IP port can handle multiple ISCSI target devices.

Answer: BDE

B: By carrying SCSI commands over IP networks, the iSCSI protocol enables you to access block devices from across the network as if they were connected to the local system. COMSTAR provides an easier way to manage these iSCSI target devices.
D: Common Multiprotocol SCSI TARget, or COMSTAR, a software framework that enables you to convert any Oracle Solaris 11 host into a SCSI target device that can be accessed over a storage network by initiator hosts.
E: One IP port can handle multiple iSCSI target devices.

The su command by default makes an entry into the log file for every su command attempt. The following is a single line from the file:
SU 12/18 23:20 + pts/1 user1-root What does the + sign represent?

  • A. unsuccessful attempt
  • B. successful attempt
  • C. The attempt was from a pseudo terminal, and not the console.
  • D. The attempt was from a user that is in the adm group, same as root.
  • E. Time zone is not set.

Answer: B

The sulog file, /var/adm/sulog, is a log containing all attempts (whether successful or not) of the su command. An entry is added to the sulog file every time the su command is executed. The fields in sulog are: date, time, successful (+) or unsuccessful (-), port, user executing the su command, and user being switched to. In the preceding example, all su attempts were successful, except for the attempt on 2/23 at 20:51, when user pete unsuccessfully attempted to su to user root.
Look for entries where an unauthorized user has used the command inappropriately. The following entry shows a successful (indicated by +) su from user userid to root.
SU 03/31 12:52 + pts/0 <userid>-root

The global zone has 8 CPUS. YOU suspect that one of your non global /ones, dbzone, is consuming all of the CPU resources.
Which command would you use to view the CPU utilization for all of the zones to confirm this?

  • A. Run from the global zone:prstat -Z
  • B. Run from each zonezlogin <zonename> mpstat
  • C. Run from the global zone:zonestar -r summary
  • D. Run from the global zone:rctladm -1
  • E. Run from the global zone:prctl -i

Answer: A

If you're logged on to the system, you can run prstat -Z to generate a summary of cpu/memory utilization by zone.

Which two options are accurate regarding the non-global zone console?

  • A. Access the non-global zone console by using the zlogin –c command.
  • B. Access the non-global zone console by using the zlogin –1 command.
  • C. Disconnect from the non-global zone console by using the ~. keys.
  • D. Disconnect from the non-global zone console by using the #. keys.

Answer: AC

A: How to Log In to the Zone Console Use the zlogin command with the -C option and the name of the zone, for example, my-zone.
global# zlogin -C my-zone
C: To disconnect from a non-global zone, use one of the following methods.
* To exit the zone non-virtual console: zonename# exit
* To disconnect from a zone virtual console, use the tilde (~) character and a period: zonename# ~.

A user jack, using a bash shell, requests a directory listing as follows:
1Z0-821 dumps exhibit
Which three statements are correct?

  • A. The pattern dir? will expand to dira dirb dirc.
  • B. The pattern dir*a will expand to diraa.
  • C. The pattern dir*a will expand to dira diraa.
  • D. The pattern dir*b? will expand to dirabc.
  • E. The pattern dir*b? will expand to dirb dirabc.

Answer: ACD

A: dir followed by a single letter.
C: dir followed by any characters ending with a.
D: dir followed by any characters, then character b, then one single character. only dirabc matches

Which two statements are true concerning the network stack on Oracle Solaris 11?

  • A. Hardware network interfaces and datalinks have a one-to-one relationship.
  • B. IP addresses are assigned to datalinks.
  • C. A single IP interface can have either an IPv4 address or an IPv6 address but not both.
  • D. A single IP interface can have both an IPv4 address and an IPv6 address.
  • E. A single datalink can have only one IP interface.

Answer: AD


P.S. Thedumpscentre.com now are offering 100% pass ensure 1Z0-821 dumps! All 1Z0-821 exam questions have been updated with correct answers: https://www.thedumpscentre.com/1Z0-821-dumps/ (243 New Questions)