When it comes to job development, anyone that wants to get expert inside IT planet realizes the significance regarding certification. Holding a Oracle Oracle certification is often a dream from the IT aspirants. Oracle 1Z0-821 certification test examines the proficiency of the individual to troubleshoot the internet during operates. Exambible.com gives you the Oracle Oracle exam education course which is appropriate for the Oracle exam preparation. Our Oracle 1Z0-821 exercise questions and answers are generally conducted by the IT professionals. Your 1Z0-821 exam dumps are the quick strategy in implementation together with high productivity.
2016 Nov 1Z0-821 free question
Q131. - (Topic 1)
Which two options are accurate regarding the non-global zone console?
A. Access the non-global zone console by using the zlogin –c command.
B. Access the non-global zone console by using the zlogin –1 command.
C. Disconnect from the non-global zone console by using the ~. keys.
D. Disconnect from the non-global zone console by using the #. keys.
A: How to Log In to the Zone Console Use the zlogin command with the -C option and the name of the zone,for example,my-zone. global# zlogin -C my-zone
C: To disconnect from a non-global zone,use one of the following methods.
To exit the zone non-virtual console: zonename# exit
To disconnect from a zone virtual console,use the tilde (~) character and a period: zonename# ~.
Q132. - (Topic 2)
You need to install the gzip software package on your system. Which command would you use to find the software package in the configured repository?
A. pkg search gzip
B. pkg info gzip
C. pkg contents gzip
D. pkginfo gzip
E. yum list gzip
Use the pkg search command to search for packages whose data matches the specified pattern. Like the pkg contents command,the pkg search command examines the contents of packages. While the pkg contents command returns the contents,the pkg search command returns the names of packages that match the query.
Q133. - (Topic 2)
alice is a user account used by Alice on a Solaris 11 system. sadmin is a role account on the same system.
Your task is to add the command /usr/sbin/cryptoadm to the Network management profile,so that Alice can execute it,while assuming the sadmin role.
Select the three activities necessary to accomplish this.
A. To the file /etc/security/prof_attr,add the line: Network Management: solaris:cmd:RO::/usr/sbin/cryptoadm:euid=0
B. To the file /etc/security/auth_attr,add the line:Network Management: solaris:cmd:RO::/usr/sbin/cryptoadm:euid=0
C. To the file /etc/security/exec_attr.d/local-entriies,add the line:Network Management: solaris:cmd:RO::/usr/sbin/cryptoadm:euid=0
D. Run the roles alice to ensure that alice may assume the role sadmin.
E. Run the command profiles sadmin to ensure that the role sadmin includes the network Management profile.
F. Run the command profiles alice to ensure that the Alice has permissions to access the Network management profile.
G. Run the command profiles “Network management” to ensure that the Network management profile includes the sadmin role.
C: /etc/security/exec_attr is a local database that specifies the execution attributes associated with profiles. The exec_attr file can be used with other sources for execution profiles,including the exec_attr NIS map and NIS+ table.
A profile is a logical grouping of authorizations and com-mands that is interpreted by a profile shell to form a secure execution environment.
Q134. - (Topic 1)
Select two correct statements about the authentication services available in Oracle Solaris
A. Pluggable Authentication Modules (PAM) is used to control the operation of services such console logins and ftp.
B. The Secure Shell can be configured to allow logins across a network to remote servers without transmitting passwords across the network.
C. Secure Remote Procedure Calls (Secure RPC) provides a mechanism to encrypt data on any IP Socket connection.
D. Pluggable Authentication Modules (PAM) is used to implement the Secure Shell in Oracle Solaris 11.
E. Simple Authentication and Security Layer (SASL) provides a mechanism to authenticate and encrypt access to local file system data.
A: Pluggable Authentication Modules (PAM) are an integral part of the authentication mechanism for the Solaris. PAM provides system administrators with the ability and flexibility to choose any authentication service available on a system to perform end-user authentication.
By using PAM,applications can perform authentication regardless of what authentication method is defined by the system administrator for the given client.
PAM enables system administrators to deploy the appropriate authentication mechanism for each service throughout the network. System administrators can also select one or multiple authentication technologies without modifying applications or utilities. PAM insulates application developers from evolutionary improvements to authentication technologies,while at the same time allowing deployed applications to use those improvements.
PAM employs run-time pluggable modules to provide authentication for system entry services.
E: The Simple Authentication and Security Layer (SASL) is a method for adding authentication support to connection-based protocols. Simple Authentication and Security Layer (SASL) is a framework for authentication and data security in Internet protocols. It decouples authentication mechanisms from application protocols,in theory allowing any authentication mechanism supported by SASL to be used in any application protocol that uses SASL. Authentication mechanisms can also support proxy authorization,a facility allowing one user to assume the identity of another. They can also provide a data security layer offering data integrity and data confidentiality services. DIGEST-MD5 provides an example of mechanisms which can provide a data-security layer. Application protocols that support SASL typically also support Transport Layer Security (TLS) to complement the services offered by SASL.
Q135. - (Topic 2)
You are configuring NFS on a server. Select the two statements that are true.
A. Resources listed in /etc/dfs/dfstab are automatically shared on boot up.
B. A directory cannot be shared if a subdirectory below it is already shared.
C. Renaming a share created with the zfs set share command is not supported.
D. NFS and SMB protocols cannot be used simultaneously to share the same directory.
A: ZFS can automatically share file systems by setting the sharenfs property. Using this property,you do not have to modify the /etc/dfs/dfstab file when a new file system is shared. The sharenfs property is a comma-separated list of options to pass to the share command. The value on is an alias for the default share options,which provides read/write permissions to anyone. The value off indicates that the file system is not managed by ZFS and can be shared through traditional means,such as the /etc/dfs/dfstab file. All file systems whose sharenfs property is not off are shared during boot.
Most up-to-date 1Z0-821 rapidshare:
Q136. - (Topic 1)
Your server has one zone named dbzone (hat has been configured,but not yet installed). Which command would you use to view all the options that were used to configure this zone?
A. zoneadm list –icv dbzone
B. zones tat –c summary dbzone
C. zonecfg –z dbzone info
D. zonecfg –icv dbzone info
zonecfg info Display information about the current configuration. If resource-type is specified,displays only information about resources of the relevant type. If any property-name value pairs are specified,displays only information about resources meeting the given criteria. In the resource scope,any arguments are ignored,and info displays information about the resource which is currently being added or modified.
Note: zonecfg –z zonename. Specify the name of a zone. Zone names are case sensitive. Zone names must begin with an alphanumeric character and can contain alphanumeric characters,the underscore (_) the hyphen (-),and the dot (.). The name global and all names beginning with SUNW are reserved and cannot be used.
A: The zoneadm utility is used to administer system zones. A zone is an application
container that is maintained by the operating system runtime.
Display the name of the current zones,or the specified zone if indicated.
B: No such command.
D: no such options zonecfg –icv
Q137. - (Topic 1)
file1 and file2 are text files.
dir1 and dir2 are directories.
Which two commands will be successful?
A. cp dir1 dir1
B. cp dir1 file1
C. cp file? dir1
D. cp file. dir1
E. cp file% dir2
F. cp file1 file2 dir1
C: Here the wildcard character ? is used (Matches any single character).
file1 and file2 will be copied into dir1
F: the two files file1 and file2 are copied into directoy dir1.
Note: cp - copy files and directories
Copy SOURCE to DEST,or multiple SOURCE(s) to DIRECTORY.
Cp has three principal modes of operation. These modes are inferred from the type and count of arguments presented to the program upon invocation.
When the program has two arguments of path names to files,the program copies the contents of the first file to the second file,creating the second file if necessary.
When the program has one or more arguments of path names of files and following those an argument of a path to a directory,then the program copies each source file to the destination directory,creating any files not already existing.
When the program's arguments are the path names to two directories,cp copies all files in the source directory to the destination directory,creating any files or directories needed. This mode of operation requires an additional option flag,typically r,to indicate the recursive copying of directories. If the destination directory already exists,the source is copied into the destination,while a new directory is created if the destination does not exist.
Q138. - (Topic 2)
What is the output of the following command,if executed using the default shell for the root role account of a standard Live CD Install of Oracle Solaris 11?
D. the PID for the current shell
Single quotes are most strict. They prevent even variable expansion. Double quotes prevent wildcard expansion but allow variable expansion. For example: #!/bin/sh echo $SHELL echo "$SHELL" echo '$SHELL' This will print: /usr/bin/bash /usr/bin/bash $SHELL
Q139. - (Topic 1)
User jack,whose account is configured to use the korn shell,logs in and examines the value of his PATH environment variable:
What will happen,and why?
A. He will get a "file not found" error,because the current directory is not in his seaech path.
B. He will get a "file not found" error,because his home directory is not in his search path.
C. The useradd script will execute,because jack is in the same directory that the script is located in.
D. The command /user/sbin/useradd will execute,because it is the last match in the search path.
E. The command /user/sbin/useradd will execute,because it is the first match in the search path.
Q140. - (Topic 1)
To assist in examining and debugging running processes,Solaris 11 has a utility that returns pro arguments and the names and values of environment variables.
What is the name of this utility?
The pargs utility examines a target process or process core file and prints arguments,environment variables and values,or the process auxiliary vector.