These items associated with Oracle company widely-used by simply an incredible number of the individuals for many people a many years. Your Oracle certification these are known as the particular famous associated with credibility plus acceptance. It is assumed that for you to establish yourself in the business, you have to have more then one documentation with the Pass4sure 1Z0-821. To secure a Oracle, you have to devote a long time plus do efforts. One of the biggest limitations associated with passing the particular Oracle Solaris 11 System Administrator 1Z0-821 test is how to get started on. In general, get yourself ready for the particular Oracle 1Z0-821 documentation test ought to complete a in-depth plans. Map for doing it documentation offers you the correct place to start which method will assist you to clear up the issue quickly.

2016 Oct 1Z0-821 testing engine

Q141. - (Topic 1) 

You are the administrator for a group of shell script developers. They use vi,and have 

asked you to make their scripts automatically executable when they save their files. 

How can this be accomplished? 

A. Enter set –o vi on the command line,or include it in each user's startup script. 

B. Enter umask –s on the command line,or include it in each user's startup script. 

C. Enter umask 000 on the command line,or include it in each user's startup script. 

D. Enter umask 777 on the command line,or include it in each user's startup script. 

E. It is not possible to automatically set the execute bit on with the umask setting,or vi option. 

F. Enter umask 766 the command line,or include it in the global startup script for the default shell. 

Answer:

Explanation: 

Unlike DOS,which uses the file extension to determine if a file is executable or not,UNIX 

relies on file permissions. 

The value assigned by umask is subtracted from the default. 

User's file creation mask. umask sets an environment variable which automatically sets file 

permissions on newly created files. i.e. it will set the shell process's file creation mask to 

mode. 

umask 000 would grant full permissions. 

Note: 777 full permissions 


Q142. - (Topic 1) 

Which two SMF milestones can be specified at boot time? 

A. none 

B. network 

C. all 

D. config 

E. unconfig 

F. devices 

Answer: A,C 

Explanation: 

The milestones that can be specified at boot time are 

none single-user multi-user multi-user-server all 


Q143. - (Topic 1) 

View the Exhibit and review the file system information displayed from a remote server. 

You are configuring a new server. This new server has the following storage pool configured: 

This new server also has the following file systems configured: 

When you are finished building this new server,the pool1/data dataset must be an exact duplicate of note server. What is the correct procedure to create the pool1/data dataset on this new server? 

A. zfs create –o mountpoint=/data –o refquota=1g pool1/data 

B. zfs set mountpoint=none pool1zfs create pool1/data 

C. zfs set mountpoint=none pool1zfs create –o mountpoint=/data –o quota=1g pool1/data 

D. zfs create quota=1g pool1/data 

E. zfs create mountpoint=/data pool1/data 

F. zfs set quota=1g pool1/data 

Answer:


Q144. - (Topic 1) 

Your server has a ZFS storage pool that is configured as follows: 

The following partition scheme is used for every disk drive in pool1: 

Which two are true regarding the ZFS storage pool? 

A. The data on c3t3d0 is duplicated on c3t4do. 

B. The data is striped across disks c3t3d0 and c3t4do and mirrored across vdevs mirror-0 and mirror-1. 

C. The storage pool is 146 GB total size (rounded to the nearest GB). 

D. The storage pool is 584 G8 total size (rounded to the nearest GB). 

E. The storage pool is 292 GB total size (rounded to the nearest GB). 

Answer: A,E 


Q145. - (Topic 2) 

New features wore added to ZFS in Oracle Solaris11. Your justification to upgrade from Solaris10 to oracle Solaris11 is that it will be possible to take advantage of the enhancements that were made to ZFS. 

Identify the three ZFS functions and features that are included in Oracle Solaris 11,but not in Solaris 10. 

A. Encrypted ZFS datasets 

B. Ability for ZFS to detect and remove redundant data from the tile system 

C. Shadow Data Migration 

D. Ability to split a mirrored ZFS storage pool 

E. Ability to use ZFS on the boot drive and boot to a ZFS root file system. 

F. elimination of the swap file system when using ZFS on the root disk 

Answer: A,B,E 

Explanation: 

A: ZFS encryption was introduced in ZFS Pool Version Number 30,Solaris Nevada b149. Filesystem encryption since Solaris 11 Express 

B: Deduplication was introduced in ZFS Pool Version Number 21,Solaris Nevada b128. 

E: Booting From a ZFS Root File System Both SPARC based and x86 based systems use the new style of booting with a boot archive,which is a file system image that contains the files required for booting. When a system is booted from a ZFS root file system,the path names of both the boot archive and the kernel file are resolved in the root file system that is selected for booting. 


Latest 1Z0-821 training:

Q146. - (Topic 1) 

In a fresh installation of Oracle Solaris 11,default datalinks are named with a genetic naming convention,and they increment as you add interfaces. What is the default name? 

A. eth# 

B. net# 

C. el000g# 

D. lo# 

E. nic# 

Answer:

Explanation: 

When you install this Oracle Solaris release on a system for the first time,Oracle Solaris 

automatically provides generic link names for all the system's physical network devices. 

This name assignment uses the net# naming convention,where the # is the instance 

number. This instance number increments for each device,for example,net0,net1,net2,and 

so on. 

Note: 

Network configuration in Oracle Solaris 11 includes 

* Generic datalink name assignment – Generic names are automatically assigned to datalinks using the net0,net1,netN naming convention,depending on the total number of network devices that are on the system 


Q147. - (Topic 2) 

The core dump configuration for your system is: 

A user is running a process in the global zone and the process crashes. The process information is: 

User1 2663 2618 0 17:46:42 pts/2 0:00 /usr/bin/bash 

The server host name is: zeus 

What will the per-process core file be named? 

A. core.bash.2663.global 

B. core.bash.2663.zeus 

C. /var/core/core.bash.2663 

D. /var/core/core.bash.2663.global 

Answer:

Explanation: 

Note the first line: 

global core file pattern: /globalcore/core.%f.%p 

The program name is bash 

The runtime process ID is 2663 

Note: By default,the global core dump is disabled. You need to use the.coreadm.command 

with the.-e global.option to enable it. The.-g.option causes the command to append the 

program name(%f).and the runtime process ID.(%p).to the core file name. 


Q148. - (Topic 2) 

User1 is attempting to run the following command: 

cp bigfile verybig 

The system displays the following errer: 

cp: cannot create verybig: Disc quota exceeded 

Your initial troubleshooting shows that the df -h command indicates the account is at 100% capacity. What command would you use to determine how much disk space the user has available? 

A. zfs get quota rpool/export/home/user1 

B. zfs userused@user1 

C. zfs quota=1M /rpool/export/home/user1 

D. df –h | grep user1 

Answer:

Explanation: 

ZFS quotas can be set and displayed by using the zfs set and zfs get commands. In the following example,a quota of 10 Gbytes is set on tank/home/bonwick. 

# zfs set quota=10G tank/home/bonwick # zfs get quota tank/home/bonwick NAME PROPERTY VALUE SOURCE tank/home/bonwick quota 10.0G local 


Q149. - (Topic 1) 

View the following information for a software package: 

Which command would you use to display this information for a software package that is not currently installed on your system? 

A. pkg list gzip 

B. pkg info -r gzip 

C. pkg search –1 gzip 

D. pkg verify –v gzip 

E. pkg contents gzip 

Answer:

Explanation: 

By default,the pkg info command only lists information about installed packages on the system; however,we can use a similar command to look up information about uninstalled packages,as shown in here: Example: Listing Information About an Uninstalled Package # pkg info -r php-52 Name: web/php-52 Summary: PHP Server 5.2 

Description: PHP Server 5.2 

Category: Development/PHP 

State: Not Installed 

Publisher: solaris 

Version: 5.2.17 

Build Release: 5.11 

Branch: 0.175.0.0.0.1.530 

Packaging Date: Wed Oct 12 14:01:41 2011 

Size: 44.47 MB 

FMRI: pkg://solaris/web/php-52@5.2.17,5.11-0.175.0.0.0.1.530:20111012T140141Z 

Note: pkg info command displays information about packages in a human-readable form. 

Multiple FMRI patterns may be specified; with no patterns, 

display information on all installed packages in the image. 

With -l,use the data available from locally installed packages. 

This is the default. 

With -r,retrieve the data from the repositories of the image's 

configured publishers. Note that you must specify one or more 

package patterns in this case. 


Q150. - (Topic 2) 

Select the two statements that correctly describe the operation of NWAM. 

A. If a location is explicitly enabled,it remains active until explicitly changed. 

B. Wireless security keys can be configured by using the nwammgr command. 

C. NWAM stores profile information in /etc/ipadm/ipadm.conf and /etc/dladm/datalink.conf. 

D. Multiple locations may be automatically activated in systems with multiple network interface cards. 

E. Interface NCU Properties "float" and are automatically attached to the highest priority Link NCU Property. 

F. If the DefaultFixed NCP is enabled,persistent configuration,stored in /etc/ipadm.conf and /etc/dladm/datalink.conf is used. 

Answer: A,D 

Explanation: 

A: Conditional and system locations can be manually activated,which means that the location remains active until explicitly disabled. 

D: A location comprises certain elements of a network configuration,for example a name service and firewall settings,that are applied together,when required. You can create multiple locations for various uses. For example,one location can be used when you are connected at the office by using the company intranet. Another location can be used at home when you are connected to the public Internet by using a wireless access point. Locations can be activated manually or automatically,according to environmental conditions,such as the IP address that is obtained by a network connection.