Cause all that matters here is passing the Oracle 1Z0-821 exam. Cause all that you need is a high score of 1Z0-821 Oracle Solaris 11 System Administrator exam. The only one thing you need to do is downloading Ucertify 1Z0-821 exam study guides now. We will not let you down with our money-back guarantee.

2016 Aug 1Z0-821 exam answers

Q11. - (Topic 1) 

Which command would you use to determine which package group is installed on your system? 

A. pkg list group/system/\* 

B. pkg info 

C. uname –a 

D. cat /var/sadm/system/admin/CLUSTEP 

Answer: B 

Explanation: 

The pkg info command provides detailed information about a particular IPS package. 

Note: The pkginfo command does the same for any SVR4 packages you may have installed on the same system. 

pkg info example: $ pkg info p7zip Name: compress/p7zip Summary: The p7zip compression and archiving utility Description: P7zip is a unix port of the 7-Zip utility. It has support for numerous compression algorithms,including LZMA and LZMA2,as well as for various archive and compression file formats,including 7z,xz,bzip2,gzip,tar,zip (read-write) and cab,cpio,deb,lzh,rar,and rpm (read-only). Category: System/Core State: Installed Publisher: solaris Version: 9.20.1 Build Release: 5.11 Branch: 0.175.0.0.0.2.537 Packaging Date: Wed Oct 19 09:13:22 2011 Size: 6.73 MB FMRI: pkg://solaris/compress/p7zip@9.20.1,5.11-0.175.0.0.0.2.537:20111019T091322Z 


Q12. - (Topic 1) 

Which network protocol provides connectionless,packet-oriented communication between applications? 

A. TCP 

B. UDP 

C. IP 

D. ICMP 

E. NFS 

F. IPSec 

Answer: B 

Explanation: 

The User Datagram Protocol (UDP) is one of the core members of the Internet Protocol Suite,the set of network protocols used for the Internet. With UDP,computer applications can send messages,in this case referred to as datagrams,to other hosts on an Internet Protocol (IP) network without requiring prior communications to set up special transmission channels or data paths. Compared to TCP,UDP is a simpler message-based connectionless protocol. 


Q13. - (Topic 1) 

User jack logs in to host solaris and then attempts to log in to host oracle using ssh. He receives the following error message: 

The authenticity of host oracle (192.168.1.22) can't be established. RSA key fingerprint is 3B:23:a5:6d:ad:a5:76:83:9c:c3:c4:55:a5:18:98:a6 

Are you sure you want to continue connecting (yes/no)? 

Which two are true? 

A. The public host key supplied by solaria is not known to the host oracle. 

B. The error would not occur if the RSA key fingerprint shown in the error message was added to the /etc/ssh/known_hosts file on solaris. 

C. The private host key supplied by oracle is not known to solaris. 

D. If jack answers yes,the RSA public key for the host oracle will be added to the known_hosts file for the user jack. 

E. The public host key supplied by oracle is not known to the host solaris. 

Answer: B,D 

Explanation: 

The fingerprints are used to guard against man in the middle attacks. Since ssh logins 

usually work over the internet (an insecure connection),someone could hijack your 

connection. When you try to log into yourmachine.com,he could get "in the middle" and 

return your challenge as if he was yourmachine.com. That way,he could get hold of your 

login password. 

To make this attack harder,ssh stores the fingerprint of the server's public key on the first 

connection attempt. You will see a prompt like: 

The authenticity of host 'eisen (137.43.366.64)' can't be established. 

RSA key fingerprint is cf:55:30:31:7f:f0:c4:a0:9a:02:1d:1c:41:cf:63:cf. 

Are you sure you want to continue connecting (yes/no) 

When you enter yes,ssh will add the fingerprint to your known_hosts file. you will see 

Code: 

Warning: Permanently added 'eisen,137.43.366.64' (RSA) to the list of known hosts. 

The next time you login,ssh will check whether the host key has changed. A changing host 

key usually indicates a man in the middle attack,and ssh refuses to connect. 


Q14. - (Topic 1) 

You are attempting to edit your crontab file in the bash shell. Instead of getting your usual vi interface,you are presented with an unfamiliar interface. In order to have your editor of choice-vi- what command must you type after exiting the unfamiliar editor? 

A. EDITOR=vi 

B. crontab=vi 

C. crontab – e vi 

D. env 

Answer: A 

Explanation: 

Set the EDITOR variable to vi. 

Commands like `crontab -e` will use ed per default. If you'd like to use some better editor (like vi) you can use the environment variable EDITOR: 

# EDITOR=vi; crontab –e will open the users crontab in vi. Of course you can set this variable permanently. 

Incorrect answers 

C: -e Edits a copy of the current user's crontab file,or creates an empty file to edit if crontab does not exist. When editing is complete,the file is installed as the user's crontab file. If a username is given,the specified user's crontab file is edited,rather than the current user's crontab file; this can only be done by a user with the solaris.jobs.admin authorization. The environment variable EDITOR determines which editor is invoked with the -e option. The default editor is ed(1). All crontab jobs should be submitted using crontab. Do not add jobs by just editing the crontab file,because cron is not aware of changes made this way. 


Q15. - (Topic 1) 

You need to install the solaris-desktop group package. Which command would you use to list the set of packages included in that software group? 

A. pkg search 

B. pkg info 

C. pkginfo 

D. pkg contents 

Answer: A 

Explanation: 

Use the pkg search command to search for packages whose data matches the specified pattern. 

Like the pkg contents command,the pkg search command examines the contents of packages. While the pkg contents command returns the contents,the pkg search command returns the names of packages that match the query. 


certifyforall.com

Improve 1Z0-821 free download:

Q16. - (Topic 2) 

user1,while in his home directory,is attempting to run the following command in his home directory: cp bigfile verybig 

The system displays the following error: 

cp: cannot create verybig: Disc quota exceeded 

Your initial troubleshooting shows that the df -h command indicates he is at 100% capacity. What command would you use to increase the disk space available to the user? 

A. zfs get quota rpool/export/home/user1 

B. zfs userused@user1 

C. zfs quota=none /rpool/export/home/user1 

D. df -h | grep user1 

E. zfs set quota=none /rpool/export/home/user1 

Answer: E 

Explanation: 

ZFS quotas can be set and displayed by using the zfs set and zfs get commands. We can remove the quota restriction by setting to quota to none. 


Q17. - (Topic 1) 

The /usr/bin/p7zip file that is part of the p7zip package has been overwritten. This server is critical to production and cannot be rebooted. Identify the command that would restore the file without requiring a reboot. 

A. pkg verify p7zip 

B. pkg fix p7sip 

C. pkg rebuild-index p7zip 

D. pkg revert p7zip 

E. pkg uninstsll p7zip 

F. pkg install p7zip 

G. pkg install --no-backup-be p7sip 

H. pkg refresh p7zip 

Answer: D 

Explanation: 

Use the pkg revert command to restore files to their as-delivered condition. 


Q18. - (Topic 1) 

A user jack,using a korn shell,requests a directory listing as follows: 

jack@solaris:/export/home/jack $ 1s 

File filea Filea fileb Fileb filec Filec 

Which two statements are correct? 

A. The pattern [?i]*a will expand to filea Filea. 

B. The pattern [fF]*a? will expand to [fF] *a?. 

C. The pattern [gfe] * will expand to file filea fileb filec. 

D. The pattern [g-e] * will expand to file filea fileb filec. 

E. The pattern [fF] [a-zA-z] i*e will expand to file. 

Answer: A,C 

Explanation: 

A: starting with one single character,second character must be letter i,any characters,ending with letter a. 

C: starting with letter e,f,or g,followed by anything. 


Q19. - (Topic 2) 

Which three options describe the purpose of the zonep2vchk command? 

A. Used on a Solaris 10 global zone to access the system for problems before migrating that system to a Solaris 10 branded zone. 

B. Used to access a Solaris 10 global zone for problems before migrating that zone to a Solaris 11 global zone 

C. Used to create zonecfg template for a Solaris 10 global zone that that will be migrated to a solaris10 branded zone. 

D. Used to migrate an Oracle Solaris 11 global zone to a non-global zone. 

E. Used to migrate a Solaris 10 global zone to a non-global zone on the same server; the non-global zone can then be migrated to a Solaris 11 server as a Solaris10 branded zone. 

Answer: C,D,E 

Explanation: 

zonep2vchk 

-check a global zone's configuration for physical to virtual migration into non-global zone 

The.zonep2vchk.utility is used to evaluate a global zone's configuration before the process of physical-to-virtual (p2v) migration into a non-global zone. The p2v process involves archiving a global zone (source),and then installing a non-global zone (target) using that archive Zonep2vchk.serves two functions. First,it can be used to report issues on the source which might prevent a successful.p2v.migration. Second,it can output a template.zonecfg,which can be used to assist in configuring the non-global zone target. Zonep2vchk.can be executed on a Solaris 10 or later global zone. To execute on Solaris 10,copy the.zonep2vchkutility to the Solaris 10 source global zone. When run on Solaris 10,a target release of.S11.can be specified,which will check for.p2v.into a Solaris 10 Branded zone. 


Q20. - (Topic 1) 

View the exhibit to inspect the file system configuration on your server. 

View the Exhibit to inspect the file system configuration on your server. 

Your department's backup policy is to perform a full backup to a remote system disk on 

Saturday. 

On Sunday through Friday, you are to perform a differential backup to the same remote system disk: 

. The server file systems must remain available at all times and can never be taken offline. 

. The backup must not only provide for the recovery of the most recent version of a file, but must also allow recovery of previous versions of a file created since Saturday's full backup. 

Following your company policy, which option describes a valid procedure for backing up the /data file system to a remote disk named /remote/backup? 

A. Option A 

B. Option B 

C. Option C 

D. Option D