Applicants associated with 1Z0-879 will be attaining together with most recent technology associated with Oracle items in addition to using its answers so because of this this contenders tend to be confirmed together with very good careers. Successful 1Z0-879 contenders will be attaining some sort of to blame representative during the Oracle company in different one of the career fields (could possibly be during the gross sales area or in the details technologies area). For the reason that profitable 1Z0-879 contenders come to be some sort of to blame representative during the company, they will acquire honor from your enterprise as well as will be attaining qualifications with telling you concerning the most recent Oracle technology and its particular methods to their very own peers.
2016 Sep 1Z0-879 free question
Which two statements are true ? (Choose two.)
A. The PID of cron is 156.
B. The process cron has the privileged user id.
C. Running pkill -KILL `pgrep cron` kills cron.
D. The process cron is logging to /var/spool/cron/atjobs.
E. The process cron is using /var/cron/log as the working directory.
Q232. Which two statements are true about the /etc/syslog. conffile? (Choose two).
A. Only one action is allowed per line.
B. Wildcard characters (*) are NOT allowed.
C. The loghost variable must be defined in this file.
D. Only one selector, facility, level, is allowed per line.
E. The file must contain only tabs as white space characters.
Q233. There is a problem on a SPARC-based system that has several permanent, customized device aliases. The system's use of these aliases needs to be temporarily disabled, so that when the problem is cleared, they can be enabled without having to redefine them. Which sequence of OBP commands will temporarily disable the customized device aliases defined on the system?
C. setenv use-nvramrc? Falsereset
D. setenv use-nvramrc?=falsereset
Q234. You type the command:
# rolemod -A solaris.grant -P "Network Admin" operator
What is the result?
A. The existing role account named operator is assigned the authorization named solaris. grant
and the profile named Network Admin.
B. A new role account named operator is created and is assigned the authorization named solaris. grant and the profile named Network Admin.
C. The existing regular user account named operator is assigned the authorization named
solaris. grant and the profile named Network Admin.
D. A new regular user account named operator is created and assigned the authorization named solaris. grant and the profile named Network Admin.
Q235. Given the default coreadm settings in the local zone and the following configuration for the global zone:
# coreadm global core file pattern: /var/core/core.%f.%p global core file content: all init core file pattern: core.%f.%p init core file content: default global core dumps: enabled per-process core dumps: enabled global setid core dumps: disabled per-process setid core dumps: disabled
global core dump logging: enabled
This configuration will cause two core files to be generated and saved when a process in the local zone terminates abnormally.
Where are the two core files saved? (Choose two.)
A. in the process current working directory as core
B. in the local zone as core.%f.%p in /var/core
C. in the global zone as core.%f.%p in /var/core
D. in the process current working directory as core.%f.%p
Up to the immediate present 1Z0-879 study guide:
Q236. You have a spare disk on your x86-based Solaris system, c1t0d0, and you would like to create a ZFS file system on it. Given the following requirements:
ZFS storage pool named data.
ZFS file system named data (located in the data pool).
Mount the /data file system so that it is mounted and ready for use after each system boot.
Which command(s) would you use to setup the ZFS file system?
A. zpool create data c1t0d0
B. zpool create data c1t0; zfs create data/data; newfs /dev/rdsk/data/data; make entry in the /etc/vfstab file
C. zpool create data c1t0d0; zfs create data/data
D. zpool create data data c1t0d0; make an entry in the /etc/vfstab file
Q237. A junior system administrator is setting up Solaris Volume Manager software on a new system for the first time. The administrator continually gets an error when attempting to create the state database replicas. The administrator has emailed you the following command and its output:
# metadb -a /dev/dsk/c0t2d0s0
metadb: newsunbox: there are no existing databases
Which command should you have the system administrator run?
A. metadb -a /dev/rdsk/c0t2d0s0
B. metainit -f /dev/dsk/c0t2d0s0
C. metadb -n -a /dev/dsk/c0t2d0s0
D. metadb -a -f /dev/dsk/c0t2d0s0
E. metainit db 1 /dev/dsk/c0t2d0s0
Q238. A group of systems has been installed using jumpstart and Secure By Default has been set to limited. You have been asked to enable the ftp service, which command would you use?
A. svccfg -s ftp config/local_only = false
B. inetadm -e ftp
C. netservices open
D. /etc/init.d/ftp start
Q239. Your company has hired a new Java technology programmer, and the IT manager wants you to create a user account, user5, on the development server for this new employee. Account creation must abide by the following departmental rules:
Which two command-line entries will create this new account? (Choose two.)
A. useradd -d /export/home/user5 -m -g javap -G javad -s /bin/ksh user5
B. useradd -d /export/home/user5 -m -s /bin/ksh -g javap -G javad user5
C. useradd -d /export/home/user5 -m -s /bin/ksh -g javad -G javap user5
D. useradd -m -d /export/home/user5 -s /bin/ksh -g javad -G javap user5
E. useradd -d /export/home/user5 -m -s /sbin/ksh -g javap -G javad user5
Q240. You receive a HelpDesk ticket from a user that is unable to access the host server6. bigcorp. com from their workstation. The user's workstation is named ciient4.bigcorp.com .The user has issued a ping command and sends you the output:
% ping server6.bigcorp.com
ping: unknown host server6.bigcorp.com
Big Corp has recently transitioned from using DNS. Big Corp now uses LDAP exclusively and has decomissioned all of their internal DNS servers. With the exception of the primary LDAP server, no client has access to a DNS server.
The client4 .bigcorp.com was reconfigured to be an LDAP client, as were all other hosts in the department.
A check of the contents of the /etc/inet/hosts file on client 4 .bigcorp.com reveals that it does NOT contain an entry for server6.bigcorp.com.
You discover that all of the other systems in the department can access server6. bigcorp. com, even though they do NOT contain an
/etc/inet/hosts entry for server6 . bigcorp. com.
You run the nsiookup command on client 4 .bigcorp.com and get this:
# nsiookup server6.bigcorp.com
;; connection timed out; no servers could be reached
When running ldapsearch from client4 . bigcorp. com, it returns the correct IP address for server6 . big. corp. com.
Which file on client 4.bigcorp.com is misconfigured and must be modified to correct the user's issue?
A. the /etc/ipnodes file
B. the /etc/ldap. conf file
C. the /etc/resolv.conf file
D. the /etc/nsswitch.conf file