Want to know Exambible 1Z0-821 Exam practice test features? Want to lear more about Oracle Oracle Solaris 11 System Administrator certification experience? Study Refined Oracle 1Z0-821 answers to Rebirth 1Z0-821 questions at Exambible. Gat a success with an absolute guarantee to pass Oracle 1Z0-821 (Oracle Solaris 11 System Administrator) test on your first attempt.

2017 Feb 1Z0-821 practice exam

Q21. - (Topic 2) 

You have connected a new printer at a fixed IP address. 

It appears to work correctly most of the time,but at other times does not respond 

You suspect that the assigned address may not be unique within the network. 

What command will be useful to confirm this? 

A. arp 

B. netstat 

C. ipadm show-if 

D. dladm show-addr 

E. ipadm show-addr 

Answer:

Explanation: 

'ipadm show-addr' displays all the configured addresses on the system. 

Example: # ipadm show-addr ADDROBJ TYPE STATE ADDR lo0/v4 static ok 127.0.0.1/8 lo0/v6 static ok ::1/128 


Q22. - (Topic 2) 

Review the zonestat command: 

zonestate - q physical - memory -R high -z -p -p “zones” 10 24h 60m 

Select the option that correctly describes the information that is displayed by this command. 

A. It is a sample of dbzone’s physical memory usage taken every hour over a 24-hour period.Only the top 10 samplings of peak memory usage are displayed. All other utilization data is eliminated. 

B. It is a sample of dbzone’s CPU,virtual memory,and networking utilization.Physical memory is executed from the report.The sampling is taken every 10 minutes over a 24-hour period and peak utilization id displayed each hour. 

C. It is a sample of dbzone’s CPU,virtual memory,and networking utilization.Physical memory is executed from the report.The sampling is taken every 10 minutes over a 24-hour period and displayed each hour. 

D. It is a sample of dbzone’s physical memory usage taken every 10 seconds and 24-hour period.Only peak virtual memory usage and CPU utilization are displayed each hour.All other Utilization data is eliminated. 

E. It is a sample of dbzone’s physical memory usage taken every 10 seconds and 24-hour period.Only peak memory usage is displayed each hour.All other utilization data is eliminated. 

Answer:

Explanation: 

*

 (Not A,B,C): interval (here 10 seconds): Specifies the length in seconds to pause between each interval report. 

*

 duration (here 24 h) 

* -R report[,report] (here high) Print a summary report. 

High Print a summary report detailing the highest usage of each resource and zone during any interval of the.zonestat.utility invocation. 

Note: The zonestat utility reports on the cpu,memory,and resource control utilization of the currently running zones. Each zone's utilization is reported both as a percentage of system resources and the zone's configured limits. 

The zonestat utility prints a series of interval reports at the specified interval. It optionally also prints one or more summary reports at a specified interval. 

The default output is a summary of cpu,physical,and virtual memory utilization. The -r option can be used to choose detailed output for specific resources. 


Q23. - (Topic 2) 

You are installing the Oracle Solaris 11 Operating System by using the Text Installer. Which two options describe the features associated with the Text Installer? 

A. It can be used to install only SPARC systems. 

B. It installs gnome as the default user environment on a system capable of displaying a graphical environment. 

C. You can choose whether root is a role or user account. 

D. You can do both automatic and manual configuration of the network. 

E. You can select how to configure the remaining network interfaces. 


Q24. - (Topic 2) 

When you issue the “gzip: zommand not found” message is displayed. You need to install the gzip utility on your system. 

Which command would you use to check if the gzip utility is available from the default publisher for installation? 

A. pkg info|grep gzip 

B. pkg list SUNWgzip 

C. pkg contents gzip 

D. pkg search gzip 

Answer:

Explanation: 

Searching for Packages Use the pkg search command to search for packages whose data matches the specified pattern. 

Like the.pkg contents.command,the.pkg search.command examines the contents of packages. While the.pkg contents.command returns the contents,the.pkg search.command returns the names of packages that match the query. 

pkg search search [-HIaflpr] [-o attribute ...] [-s repo_uri] query Search for matches to the query,and display the results. Which tokens are indexed are action-dependent,but may include content hashes and pathnames. 

Note: pkg is the retrieval client for the image packaging system. With a valid configuration,pkg can be invoked to create locations for packages to be installed,called 'images',and install packages into those images. Packages are published by publishers,who may make their packages available at one or more repositories. pkg, then,retrieves packages from a publisher's repository and installs them into an image. 


Q25. - (Topic 2) 

The storage pool configuration on your server is: 

You back up the /pool1/data file system,creating a snapshot and copying that snapshot to tape 

(/dev/rmt/0). You perform a full backup on Sunday night and Incremental backups on Monday through Saturday night at 11:00 pm. Each incremental backup will copy only the data that has been modified since the Sunday backup was started. 

On Thursday,at 10:00 am,you had a disk failure. You replaced the disk drive (c4t0d0). You created pool (pool1) on that disk. 

Which option would you select to restore the data in the /pool1/data file system? 

A. zfs create pool1/dataLoad the Monday tape and enter:zfs recv pool1/data < /dev/rmt/0Load the Wednesday tape and enter:zfs recv –F pool1/data < /dev/rmt/0 

B. Load the Sunday tape and restore the Sunday snapshot:zfs recv pooll/data < /dev/rmt/0zfs rollback pool1/data@monLoad the Wednesday tape and restore the Wednesday snapshot:zfs recv –i pooll/data < /dev/rmt/0zfs rollback pool1/data@wed 

C. zfs create pooll/dataLoad the Wednesday tape and enter:zfs recv -F pool1/data < /dev/rmt/0 

D. Load the Sunday tape and enter:zfs recv pool1/data < /dev/rmt/0Load the Wednesday tape and enter:* commands missing* 

Answer:

Explanation: 

First the full backup must be restored. This would be the Sunday backup. 

Then the last incremental backup must be restored. This would be the Wednesday backup. 

Before restoring the Wednesday incremental file system snapshot,the most recent 

snapshot must first be rolled back. 

By exclusion D) would be best answer even though it is incomplete. 


Improve 1Z0-821 test questions:

Q26. - (Topic 2) 

User jack logs in to host solar in and issues the following command: 

jack@solaris:-$ ls .ssh id_dsa id_dsa.pub id_rsa id_rsa.pub known_hosts authorized_keys Which two are true? 

A. The id_rsa file contains the private key for rhosts-based host authentication. 

B. The id_dsa.pub file contains the Digital Signature Algorithm public key for the user jack. 

C. The id_rsa.pub file contains the Rivest Shamir Adelman public key for the host solaris. 

D. The authorized_keys file contains the private keys of remote users authorized to access jack’s account on solaris. 

E. The known_hosts file contains the verified public keys of remote hosts known to be trusted. 

Answer: A,E 

Explanation: 

A: You will see two files starting with id_rsa. id_rsa is the private key and id_rsa.pub is public key. 

E: The .ssh/known_hosts file 

In order to use public-key secure connection with other hosts (ssh,scp,sftp) there is a special directory,~/.ssh/,where passphrases and public keys are stored. Normally you wouldn't need to know the gory details,but from time to time a host will change its public key and then you have difficulty using ssh or scp with that host,and have to edit a file named known_hosts. If you try to ssh to another computer,but get an error message that warns about a changed or incorrect public key,then it is probably just a case of that host changing its public key. (It is possible,though usually not the case,that malicious hacking is involved.) Unless you actually suspect hacker involvement,you can edit the file ~/.ssh/known_hosts using your usual text editor (vi,emacs,nedit,or pico) and delete any line with the name of that host. 

Then when you try to ssh that host again,it will be like the first time ever; ssh will ask you if you want to accept a new public key,you type the whole word yes,and everything will proceed normally from there. 

Here is what a typical ~/.ssh/known_hosts file might contain. Note that newton is represented on two different lines: 

newton 1024 35 153438062610297067329638677441205712613292203533062535600064224677647442 245028855505387934431717435134842994423656065076260604296084868001730665 553662299156116414854701274715680961503198280525759778667306417179500370 189017139564144825610347509023078143132936185076849630461827976942220442 313116255293297021841 ucsub 1024 37 132170811640421742212085598383135714069016332111955003414250071326834884 018721183646445780180633494496866895830879394309011412231102757022090299 732775466435482517698989962531081214859205054227533597152962802400251809 883548442498002326460312850336779152617243800769119880843882425555806081 435017335194477605333 simpson 1024 41 840896920592494584403453622735282634536002054701576247765078766974814128 393752943151071629834843909016027026612791643752972116459602750267266908 365259665072736159491719667576217171370458928680504368847255632477925660 234893185547218857655484574619075125368470792976275806263534208879722192 77539015703446529603 newton,128.138.249.8 ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAIEA0d7Aoure0toNJ+YMYi61QP2ka8m5x5ZQlT7obP8C K3eropfqsMPPY6uiyIh9vpiFX2r1LHcbx139+vG6HOtVvuS8+IfMDtawm3WQvRuOopz3vVy 5GtMwtaOgehsXoT930Ryev1bH5myPtWKlipITsOd2sX9k3tvjrmme4KCGGss= 


Q27. - (Topic 1) 

You are asked to determine user jack’s default login directory. Which command would provide you with useful information? 

A. cat /etc/passwd | grep jack 

B. cat /etc/group | grep jack 

C. cat /etc/shadow | grep jack 

D. cat /etc/default/passwd | grep jack 

Answer:

Explanation: 

The /etc/passwd contains one entry per line for each user (or user account) of the system. All fields are separated by a colon (:) symbol. Total seven fields as follows. 

1.

 Username: It is used when user logs in. It should be between 1 and 32 characters in length. 

2.

 Password: An x character indicates that encrypted password is stored in /etc/shadow file. 

3.

 User ID (UID): Each user must be assigned a user ID (UID). UID 0 (zero) is reserved for root and UIDs 1-99 are reserved for other predefined accounts. Further UID 100-999 are reserved by system for administrative and system accounts/groups. 

4.

 Group ID (GID): The primary group ID (stored in /etc/group file) 

5.

 User ID Info: The comment field. It allow you to add extra information about the users such as user's full name,phone number etc. This field use by finger command. 

6.

 Home directory: The absolute path to the directory the user will be in when they log in. If this directory does not exists then users directory becomes / 

7.

 Command/shell: The absolute path of a command or shell (/bin/bash). Typically,this is a shell. Please note that it does not have to be a shell. 


Q28. - (Topic 1) 

You log in to the system as user1,then switch user to root by using the su - command. After 

entering the correct password,yon enter the following commands: 

whoami;who am i;id 

Which option correctly represents the output? 

A. Option A 

B. Option B 

C. Option C 

D. Option D 

Answer:

Explanation: 

*

 The whoami utility displays your effective user ID as a name. 

Here this would be root. 

*

 who am i 

The command who shows who is logged on. 

Here this would be: 

user1 console Dec 30 20:20 

*

 The id utility displays the user and group names and numeric IDs,of the 

calling process,to the standard output. If the real and effective IDs 

are different,both are displayed,otherwise only the real ID is dis-

played. 

Here this would be: 

uid=0(root) gid=0(root) 

Note: 

Each UNIX proces has 3 UIDs associated to it. Superuser privilege is UID=0. 

Real UID 

This is the UID of the user/process that created THIS process. It can be changed only if the running process has EUID=0. 

Effective UID 

This UID is used to evaluate privileges of the process to perform a particular action. EUID can be change either to RUID,or SUID if EUID!=0. If EUID=0,it can be changed to anything. 

Saved UID 

If the binary image file,that was launched has a Set-UID bit on,SUID will be the UID of the owner of the file. Otherwise,SUID will be the RUID. 


Q29. - (Topic 2) 

Before booting testzone,a non-global zone,you want to connect to the zone's console so that you can watch the boot process. 

Choose the command used xo connect to testzone's console. 

A. zoneadm – C testzone 

B. zoneadm – console testzone 

C. zlogin – z testzone console 

D. zlogin – z testzone – C 

E. zlogin – C testzone 

F. zoneadm – z testzone – C 

Answer:


Q30. - (Topic 2) 

United States of America export laws include restrictions on cryptography. 

Identify the two methods with which these restrictions are accommodated in the Oracle Solaris 11 Cryptographic Framework. 

A. Corporations must utilize signed X.509 v3 certificates. 

B. A third-party provider object must be signed with a certificate issued by Oracle. 

C. Loadable kernel software modules must register using the Cryptographic Framework SPI. 

D. Third-party providers must utilize X.509 v3 certificates signed by trusted Root Certification Authorities. 

E. Systems destined for embargoed countries utilize loadable kernel software modules that restrict encryption to 64 bit keys. 

Answer: B,C 

Explanation: 

B: Binary Signatures for Third-Party Software The elfsign command provides a means to sign providers to be used with the Oracle Solaris Cryptographic Framework. Typically,this command is run by the developer of a provider. 

The elfsign command has subcommands to request a certificate from Sun and to sign binaries. Another subcommand verifies the signature. Unsigned binaries cannot be used by the Oracle Solaris Cryptographic Framework. To sign one or more providers requires the certificate from Sun and the private key that was used to request the certificate. 

C: Export law in the United States requires that the use of open cryptographic interfaces be restricted. The Oracle Solaris Cryptographic Framework satisfies the current law by requiring that kernel cryptographic providers and PKCS #11 cryptographic providers be signed.