getcertified4sure.com

1Z0-821 Exam

All About Best Quality 1Z0-821 Practice Question




Exambible 1Z0-821 Questions are updated and all 1Z0-821 answers are verified by experts. Once you have completely prepared with our 1Z0-821 exam prep kits you will be ready for the real 1Z0-821 exam without a problem. We have Abreast of the times Oracle 1Z0-821 dumps study guide. PASSED 1Z0-821 First attempt! Here What I Did.

Free 1Z0-821 Demo Online For Oracle Certifitcation:

NEW QUESTION 1
Your server has a ZFS storage pool that is configured as follows:
1Z0-821 dumps exhibit
The server has two spare 146-GB disk drives: c3t5d0 c3t6d0
You need to add more space to the pool1 storage pool. Which command would add more
mirrored storage to the pool1 storage pool?

  • A. zpool add pool1 mirror c3t5d0 c3t6d0
  • B. zpool attach pool1 mirror c3t5d0 c3t6d0
  • C. zpool attach pool1 c3r3d0 c3r5d0; zpool attach pool1 c3r4d0 c3r6d0
  • D. zpool add pool1 c3r3d0 c3r5d0; zpool add pool1 c3r4d0 c3r6d0

Answer: A

NEW QUESTION 2
You are attempting to edit your crontab file in the bash shell. Instead of getting your usual vi interface, you are presented with an unfamiliar interface. In order to have your editor of choice-vi- what command must you type after exiting the unfamiliar editor?

  • A. EDITOR=vi
  • B. crontab=vi
  • C. crontab – e vi
  • D. env

Answer: A

Explanation:
Set the EDITOR variable to vi.
Commands like `crontab -e` will use ed per default. If you'd like to use some better editor (like vi) you can use the environment variable EDITOR:
# EDITOR=vi; crontab –e will open the users crontab in vi. Of course you can set this variable permanently.
Incorrect answers
C: -e Edits a copy of the current user's crontab file, or creates an empty file to edit if crontab does not exist. When editing is complete, the file is installed as the user's crontab file. If a username is given, the specified user's crontab file is edited, rather than the current user's crontab file; this can only be done by a user with the solaris.jobs.admin authorization. The environment variable EDITOR determines which editor is invoked with the -e option. The default editor is ed(1). All crontab jobs should be submitted using crontab. Do not add jobs by just editing the crontab file, because cron is not aware of changes made this way.

NEW QUESTION 3
View the following information for a software package:
1Z0-821 dumps exhibit
Which command would you use to display this information for a software package that is not currently installed on your system?

  • A. pkg list gzip
  • B. pkg info -r gzip
  • C. pkg search –1 gzip
  • D. pkg verify –v gzip
  • E. pkg contents gzip

Answer: B

Explanation:
By default, the pkg info command only lists information about installed packages on the system; however, we can use a similar command to look up information about uninstalled packages, as shown in here:
Example:
Listing Information About an Uninstalled Package
# pkg info -r php-52 Name: web/php-52 Summary: PHP Server 5.2
Description: PHP Server 5.2 Category: Development/PHP State: Not Installed Publisher: solaris
Version: 5.2.17
Build Release: 5.11
Branch: 0.175.0.0.0.1.530
Packaging Date: Wed Oct 12 14:01:41 2011
Size: 44.47 MB
FMRI: pkg://solaris/web/php-52@5.2.17, 5.11-0.175.0.0.0.1.530:20111012T140141Z
Note: pkg info command displays information about packages in a human-readable form. Multiple FMRI patterns may be specified; with no patterns, display information on all
installed packages in the image.
With -l, use the data available from locally installed packages. This is the default.
With -r, retrieve the data from the repositories of the image's configured publishers. Note that you must specify one or more package patterns in this case.

NEW QUESTION 4
You are logged in to a Solaris 11 system as user jack. You issue the following sequence of commands:
1Z0-821 dumps exhibit
Identify two correct statements.

  • A. You have the effective privilege of the account root.
  • B. Your GID is 10.
  • C. Your home directory is /root.
  • D. You are running the shell specified for the account root.
  • E. Your UID is 1.

Answer: AB

Explanation:
Oracle Solaris provides predefined rights profiles. These profiles, listed in the
/etc/security/prof_attr, can be assigned by the root role to any account. The root role is assigned all privileges and all authorizations, so can perform all tasks, just as root can when root is a user.
To perform administrative functions, you open a terminal and switch the user to root. In that terminal, you can then perform all administrative functions.
$ su - root
Password: Type root password
#
When you exit the shell, root capabilities are no longer in effect.

NEW QUESTION 5
Given the following output of the zpool status command:
1Z0-821 dumps exhibit
Identify the correct statement regarding pool1’s configuration.

  • A. Data written to pool1 will be stripped across four disk components.
  • B. The rsdz1-0 and c3t640 components are submirrors of pool1.
  • C. Data will only be stripped across the three disks in rsidz configuration.
  • D. The configuration is a bug in Solaris 11; it cannot be created by an administrator.

Answer: B

NEW QUESTION 6
Which modification needs to be made to the Service Management Facility before you publish a new package to the IPS repository?

  • A. The pkg.depotd must be disabled.
  • B. The pkg/readonly property for the application/pkg/server service must be set to false.
  • C. The Pkg/writabie_root property for the application/Pkg/server service must be set to true.
  • D. The pkg/image.root property for the application/pkg/server service must be set to the location of the repository.

Answer: D

Explanation:
pkg/image_root
(astring) The path to the image whose file information will be used as a cache for file data.

NEW QUESTION 7
You notice that the /var/.dm/messages file has become very large. Typically, this is managed by a crontab entry. Which entry should be in the root's crontab file?

  • A. 10 3 * * * /usr/adm/messages
  • B. 10 3 * * * /usr/sbin/logadm
  • C. 10 3 * * * /usr/sbin/syslogrotate
  • D. 10 3 * * * /usi/sbin/logrotate
  • E. 10 3 * * * /usr/sbin/messages

Answer: B

Explanation:
This example shows how to display the default root crontab file.
$ suPassword:
# crontab -l
#ident "@(#)root 1.19 98/07/06 SMI" /* SVr4.0 1.1.3.1 */
#
# The root crontab should be used to perform accounting data collection.
#
#
10 3 * * * /usr/sbin/logadm
15 3 * * 0 /usr/lib/fs/nfs/nfsfind
30 3 * * * [ -x /usr/lib/gss/gsscred_clean ] && /usr/lib/gss/gsscred_clean
#10 3 * * * /usr/lib/krb5/kprop_script slave_kdcs

NEW QUESTION 8
Solaris 11 includes a redesigned software packaging model: the Image Packaging system.
Which three describe advantages of the Image Packaging System over the previous Solaris 10 SVR4 packaging model?

  • A. Eliminates patching of the software package
  • B. Makes the patching process more efficient with less downtime
  • C. Eliminates OS version upgrade
  • D. Allows for the installation of the OS without a local DVD or installation server
  • E. Allows the use of a repository mirror to speed up package operation
  • F. Allows users to publish their own software package in a software repository

Answer: AEF

NEW QUESTION 9
New features wore added to ZFS in Oracle Solaris11. Your justification to upgrade from Solaris10 to oracle Solaris11 is that it will be possible to take advantage of the enhancements that were made to ZFS.
Identify the three ZFS functions and features that are included in Oracle Solaris 11, but not in Solaris 10.

  • A. Encrypted ZFS datasets
  • B. Ability for ZFS to detect and remove redundant data from the tile system
  • C. Shadow Data Migration
  • D. Ability to split a mirrored ZFS storage pool
  • E. Ability to use ZFS on the boot drive and boot to a ZFS root file system.
  • F. elimination of the swap file system when using ZFS on the root disk

Answer: ABC

Explanation:
http://www.oracle.com/technetwork/server-storage/solaris11/overview/solaris-matrix- 1549264.html

NEW QUESTION 10
User1 is attempting to assist user2 with terminating user2's process 1234. User1 entered the following: kill -9 1234
Why does the process continue to run?

  • A. You can kill a process only if you are root.
  • B. You can kill only a process that you own.
  • C. You can kill the process only with the pkill command.
  • D. You need to kill the process with a stronger kill signal.

Answer: B

Explanation:
Kill -9
Kill (terminates without cleanup)
Only works if issued by process owner or super user (root) The program cannot respond to this signal; it must terminate
Note: Unix provides security mechanisms to prevent unauthorized users from killing other processes. Essentially, for a process to send a signal to another, the owner of the signaling process must be the same as the owner of the receiving process or be the superuser.

NEW QUESTION 11
Examine this command and its output:
$ zfs list -r -t all tank
Name USED AVAIL REFER MOUNTPOINT
tank 3.00G 1.84G 32K /tank
tank/database 3.00G 1.84G 2.00G /tank/database tank/[email protected] 1.00G - 2.00G –
Which two conclusions can be drawn based on this output?

  • A. The tank dataset consumes 3 GB of storage.
  • B. The tank/[email protected] dataset consumes 1 GB of storage that is shared with its parent.
  • C. The tank/[email protected] dataset consumes 1 GB of storage that is not shared with its parent.
  • D. The tank/[email protected] dataset consumes 2 GB of storage that is shared with its child.
  • E. The tank/[email protected] dataset consumes 2 GB of storage that is not shared with its child.

Answer: AB

NEW QUESTION 12
The /usr/bin/p7zip file that is part of the p7zip package has been overwritten. This server is critical to production and cannot be rebooted. Identify the command that would restore the file without requiring a reboot.

  • A. pkg verify p7zip
  • B. pkg fix p7sip
  • C. pkg rebuild-index p7zip
  • D. pkg revert p7zip
  • E. pkg uninstsll p7zip
  • F. pkg install p7zip
  • G. pkg install --no-backup-be p7sip
  • H. pkg refresh p7zip

Answer: D

Explanation:
Use the pkg revert command to restore files to their as-delivered condition.

NEW QUESTION 13
Which two options are characteristics of a fast reboot?

  • A. A fast reboot bypasses grub.
  • B. A fast reboot cannot be used after a system panic on the x86 platform.
  • C. A fast reboot can only be executed on the SPARC platform when the config/fastreboot_default property for the svc:/system/boot-config:default service is set to true.
  • D. A fast reboot uses an in-kernel boot loader to load the kernel into memory.
  • E. A fast reboot is the default on all platforms.

Answer: CD

Explanation:
C: To change the default behavior of the Fast Reboot feature on the SPARC platform, so that a fast reboot is automatically performed when the system reboots, see below.
The following example shows how to set the property's value to true on the SPARC platform, so that a fast reboot is initiated by default:
# svccfg -s "system/boot-config:default" setprop config/fastreboot_default=true
# svcadm refresh svc:/system/boot-config:default
D: Fast Reboot implements an in-kernel boot loader that loads the kernel into memory and then switches to that kernel.
The firmware and boot loader processes are bypassed, which enables the system to reboot within seconds.
The Fast Reboot feature is managed by SMF and implemented through a boot configuration service, svc:/system/boot-config. The boot-config service provides a means for setting or changing the default boot configuration parameters. When the config/fastreboot_default property is set to true, the system performs a fast reboot automatically, without the need to use the reboot -f command. This property's value is set to true on the x86 platform. For task-related information, including how to change the default behavior of Fast Reboot on the SPARC platform, see Accelerating the Reboot Process on an x86 Based System.
Note: One new feature, called Fast Reboot, will allow the system to boot up without doing the routine set of hardware checks, a move that can make system boot times up to two- and-a-half times faster, Oracle claimed. This feature can be handy in that an administrator applying a patch or software update across thousands of Solaris deployments can reboot them all the more quickly.

NEW QUESTION 14
Which command should you choose to display the current parameters for the FSS scheduler?

  • A. dispadmin - c FSS
  • B. prionctl -c FSS
  • C. dispadmin -c FSS -g
  • D. priocntl -c FSS -g

Answer: C

Explanation:
The dispadmin command displays or changes process scheduler parameters while the system is running.
-c class
Specifies the class whose parameters are to be displayed or changed. Valid class values are: RT for the real-time class, TS for the time-sharing class, IA for the inter-active class, FSS for the fair-share class, and FX for the fixed-priority class. The time-sharing and inter- active classes share the same scheduler, so changes to the scheduling parameters of one will change those of the other.
-g
Gets the parameters for the specified class and writes them to the standard output.

NEW QUESTION 15
Review the ZFS dataset output that is displayed on your system:
1Z0-821 dumps exhibit
Which four correctly describe the output?

  • A. /data/file4 has been added.
  • B. The link /data/file3 has been added.
  • C. /data/file3 has been renamed to /data/file13.
  • D. /data/file4 has been modified and is now larger.
  • E. /data/file1 has been deleted.
  • F. /data/file1 has been modified and is now smaller.
  • G. /data/file5 has been modified.
  • H. /data/file3 (a link) has been removed.

Answer: ACEG

Explanation:
A: + Indicates the file/directory was added in the later dataset
C: R Indicates the file/directory was renamed in the later dataset E: - Indicates the file/directory was removed in the later dataset
G: M Indicates the file/directory was modified in the later dataset
Note: Identifying ZFS Snapshot Differences (zfs diff)
You can determine ZFS snapshot differences by using the zfs diff command.
The following table summarizes the file or directory changes that are identified by the zfs diff command.
File or Directory Change Identifier
* File or directory is modified or file or directory link changed M
* File or directory is present in the older snapshot but not in the newer snapshot

* File or directory is present in the newer snapshot but not in the older snapshot
+
* File or directory is renamed R

NEW QUESTION 16
To inspect network interface net3, you enter the following commands:
1Z0-821 dumps exhibit
What problem do you suspect? Assume the user is authorized and provided the correct password.

  • A. The net3 interface hasn't been enabled yet.
  • B. The net3 vnic hasn't been created.
  • C. The net3/v4 ip object hasn't been configured.
  • D. The net3 interface is not attached to a NIC or etherstub.

Answer: C

Explanation:
The following command marks the address object net1/v4a up that was previously marked
down.
# ipadm up-addr net1/v4a

NEW QUESTION 17
Review the boot environment information displayed on your system:
1Z0-821 dumps exhibit
Which two options accurately describe the newBE boot environment?

  • A. It cannot be destroyed.
  • B. It cannot be activated.
  • C. It cannot be renamed.
  • D. You can create a snapshot of it.
  • E. It is activated but unbootable.
  • F. It has been deleted and will be removed at the next reboot.

Answer: BC

Explanation:
If the boot environment is unbootable, it is marked with an exclamation point (!) in the
Active column in the beadm list output.
The beadm command restricts actions on unbootable boot environments as follows: You cannot activate an unbootable boot environment. (B)
You cannot destroy a boot environment that is both unbootable and marked as active on reboot.
You cannot create a snapshot of an unbootable boot environment.
You cannot use an unbootable boot environment or boot environment snapshot with the -e option of beadm create.
You cannot rename an unbootable boot environment. (C)

NEW QUESTION 18
You log in to the system as user1, then switch user to root by using the su - command. After entering the correct password, yon enter the following commands:
whoami;who am i;id
Which option correctly represents the output?
1Z0-821 dumps exhibit

  • A. Option A
  • B. Option B
  • C. Option C
  • D. Option D

Answer: B

Explanation:
* The whoami utility displays your effective user ID as a name. Here this would be root.
* who am i
The command who shows who is logged on. Here this would be:
user1 console Dec 30 20:20
* The id utility displays the user and group names and numeric IDs, of the calling process, to the standard output. If the real and effective IDs are different, both are displayed, otherwise only the real ID is displayed.
Here this would be: uid=0(root) gid=0(root)
Note:
Each UNIX proces has 3 UIDs associated to it. Superuser privilege is UID=0.
Real UID
--------
This is the UID of the user/process that created THIS process. It can be changed only if the running process has EUID=0.
Effective UID
-------------
This UID is used to evaluate privileges of the process to perform a particular action. EUID can be change either to RUID, or SUID if EUID!=0. If EUID=0, it can be changed to anything.
Saved UID
---------
If the binary image file, that was launched has a Set-UID bit on, SUID will be the UID of the owner of the file. Otherwise, SUID will be the RUID.

NEW QUESTION 19
You need to install the gzip software package on your system. Which command would you use to find the software package in the configured repository?

  • A. pkg search gzip
  • B. pkg info gzip
  • C. pkg contents gzip
  • D. pkginfo gzip
  • E. yum list gzip

Answer: A

Explanation:
Use the pkg search command to search for packages whose data matches the specified pattern.
Like the pkg contents command, the pkg search command examines the contents of packages. While the pkg contents command returns the contents, the pkg search command returns the names of packages that match the query.

NEW QUESTION 20
A user account must be a member of a primary group, and may also be a member of one or more secondary groups. What is the maximum total number of groups that one user can concurrently belong to?

  • A. 15
  • B. 16
  • C. 17
  • D. 63
  • E. 64
  • F. 65
  • G. The number of groups one user can concurrently belong to is unlimited in Solaris 11.

Answer: B

Explanation:
Each user belongs to a group that is referred to as the user’s primary group. The GID number, located in the user’s account entry within the /etc/passwd file, specifies the user’s primary group.
Each user can also belong to up to 15 additional groups, known as secondary groups. In the /etc/group file, you can add users to group entries, thus establishing the user’s secondary group affiliations.
Note (4 PSARC/2009/542):
his project proposes changing the maximum value for NGROUPS_MAX from 32 to 1024 by changing the definition of NGROUPS_UMAX from 32 to 1024.
The use for a larger number of groups is described in CR 4088757, particular in the case of Samba servers and ADS clients; the Samba servers map every SID to a Unix group. Users with more than 32 groups SIDs are common. We've seen reports varying from "64 is enough", "128 is absolutely enough" and "we've users with more 190 group SIDS).
NGROUPS_MAX as defined by different Unix versions are as follows (http://www.j3e.de/ngroups.html):
Linux Kernel >= 2.6.3 65536
Linux Kernel < 2.6.3 32 Tru64 / OSF/1 32
IBM AIX 5.2 64
IBM AIX 5.3 ... 6.1 128
OpenBSD, NetBSD, FreeBSD, Darwin (Mac OS X) 16 Sun Solaris 7, 8, 9, 10 16 (can vary from 0-32)
HP-UX 20
IRIX 16 (can vary from 0-32)
Plan 9 from Bell Labs 32
Minix 3 0 (Minix-vmd: 16)
QNX 6.4 8

NEW QUESTION 21
You are creating a non-global zone on your system.
Which option assigns a zpool to a non-global zone, and gives the zone administrator permission to create zfs file system in that zpool?

  • A. While creating the non-global zone, make the following entry: add deviceset match=/dev/rdsk/c4t0d0endBoot the zone and log in the zone as roo
  • B. Create the zpool: zpool create pool2 c4t0d0In the non-global zone, root can now create ZFS file system in the pool2 zpool
  • C. In the global zone, create the zpool: global# zpool create pool2 c4t1d0While creating the no-global zone, make the following entry: add datasetset name=pool2endadd fsset dir=pool1set special=pool1set type=zfspool1endBoot the zone, log in the zone as root, and create the zfs file system in the pool2 zpool.
  • D. In the global zone, create the zpool:global#zpool create pool2 c4t1d0While creating the global zone, make the following entry: add datasetset name=pool2endBoot the zone, log in to the zone as root and create the zfs file systems in the pool2 zpool.
  • E. In the global zone, create the zpool and the ZFS file systems that you want to use in the non-global zone: global#zpool create pool2 c4t1d0global#zfs create pool2/dataWhile creating the non-global zone, make the following entry for each ZFS file system that you want to make available in the zone: add fsset dir=/dataset special=pool2/dataset type=zfsend
  • F. Create the zpool in the global zone: global#zpool create pool2 c4t1d0Boot the non- global zone, log in to the zone as root, and issue this command to delegate ZFS permissions to root: non-global zone# zfs allow root create , destroy, mount pool2Log in to the non-global zone create ZFS file systems in the pool2 zpool.

Answer: C

Explanation:
http://docs.oracle.com/cd/E19253-01/819-5461/gbbst/index.html

NEW QUESTION 22
The su command by default makes an entry into the log file for every su command attempt. The following is a single line from the file:
SU 12/18 23:20 + pts/1 user1-root What does the + sign represent?

  • A. unsuccessful attempt
  • B. successful attempt
  • C. The attempt was from a pseudo terminal, and not the console.
  • D. The attempt was from a user that is in the adm group, same as root.
  • E. Time zone is not set.

Answer: B

Explanation:
The sulog file, /var/adm/sulog, is a log containing all attempts (whether successful or not) of the su command. An entry is added to the sulog file every time the su command is executed. The fields in sulog are: date, time, successful (+) or unsuccessful (-), port, user executing the su command, and user being switched to. In the preceding example, all su attempts were successful, except for the attempt on 2/23 at 20:51, when user pete unsuccessfully attempted to su to user root.
Look for entries where an unauthorized user has used the command inappropriately. The following entry shows a successful (indicated by +) su from user userid to root.
SU 03/31 12:52 + pts/0 <userid>-root

NEW QUESTION 23
......

P.S. Easily pass 1Z0-821 Exam with 243 Q&As Downloadfreepdf.net Dumps & pdf Version, Welcome to Download the Newest Downloadfreepdf.net 1Z0-821 Dumps: https://www.downloadfreepdf.net/1Z0-821-pdf-download.html (243 New Questions)