1Z0-877 | Best Quality Oracle 1Z0-877 vce


Q171. The /prod/inv file system needs to be unmounted so you can take it offline for maintenance. When you try and unmount it, you receive the following error message: 

umount: /prod/inv busy 

One or more users are still using it. 

Which command should you use to discover who is using the file system? 

A. who -q 

B. fuser -cu /prod/inv 

C. who /prod/inv 

D. fuser -ck /prod/inv 

Answer:

Q172. You are installing Solaris 10 OS on a SPARC-based system with a graphical monitor and keyboard, but the installation starts up in CLI mode. Assuming you have typed the correct installation command, what is the cause? 

A. You used the DVD. 

B. The monitor is monochrome. 

C. Solaris OS is a text-only installation. 

D. The system has less than 384 megabytes of RAM. 

E. The system has less than 128 megabytes of RAM. 

Answer:

Q173. Click the Exhibit button. 

Overnight, the root file system filled up to 100%.  The exhibit displays the state of the server before the root file system filled up. Which three directories should be checked for the files that caused the root file system to fill up so quickly? 

A. /dev 

B. /etc 

C. /usr 

D. /opt 

E. /system 

Answer: A,B,E 

Q174. A SPARC-based system does not boot and displays the message: "Timeout waiting for ARP/RARP packet" 

Which three actions are valid to check the boot environment of the system? (Choose three.) 

A. Check if the frame buffer is working properly. 

B. Check if the NVRAM alias net is set properly. 

C. Check if the NVRAM alias boot-file is set properly. 

D. Check if the PROM variable boot-device is set properly. 

E. Check if the PROM variable local-mac-address is set to true. 

Answer: B,D,E 

Q175. Given: # logins -x -l root, dev, test1 root 0 root 0 Super-User / /sbin/sh NP 082587 -1 -1 -1 dev 2000 bin 2 /usr/bin /sbin/sh LK 012504 -1 -1 -1 test1 1001 other 1 /export/home/test1 /bin/ksh PS 012505 -1 -1 -1 

Which two statements are true? (Choose two.) 

A. The root user does NOT have a password. 

B. The test1 user was created earlier than dev. 

C. The password for test1 has expired. 

D. The test1 user does NOT have a password. 

E. The dev user has a locked account. 

Answer: A,E 

Q176. After a power outage, a user's workstation in your department will no longer mount the user's home directory. You believe that the superblock in the /dev/dsk/c0t0d0s7 file system has become corrupt. Which command will display the alternative backup superblocks? 

A. fsck -sb /dev/dsk/c0t0d0s7 

B. newfs -sb /dev/dsk/c0t0d0s7 

C. fsck -N /dev/rdsk/c0t0d0s7 

D. newfs -N /dev/rdsk/c0t0d0s7 

Answer:

Q177. When setting up your server, you want these network services configured on the fresh installation of Solaris 10, before the first reboot: syslogd - limited to local connections  NFS server daemons  -disableddtlogin - limited to local connectionsfingerd - disabledssh - enabled Which method is used to configure these services? 

A. Run the netservices limited command. 

B. Install the Reduced Network Support software group during the installation of the OS. 

C. Install the Reduced Network Support software group during the installation of the OS. 

D. Boot to the multi-user milestone; Do NOT boot to the multi-user-server milestone. 

E. After the first boot, use the svcadm command to disable or enable each of these services. 

F. Answer NO to enabling network services for remote clients during the installation of the OS 

Answer:

Q178. You have been directed to install a server in a secure environment where all unnecessary network services must be disabled, except for sshd. During the installation of the Solaris OS, you setup the system to be Secure by Default. Which three describe how network services will be configured on the newly installed server? (Choose three.) 

A. SNMP - enabled for remote clients 

B. syslogd - limit to local connections 

C. rpcbind - limit to local connections 

D. sendmail - limit to local connections 

E. syslogd - enabled for remote clients 

F. rpcbind - enabled for remote clients 

Answer: B,C,D 

Q179. A corrupted file system is now repaired and back in use. Some, but not all of the files within the file systems have been deleted. The only backup of this file system is a month-old tar archive. This archive will need to be restored as root. Which two statements correctly describe the effects of the restore operation? (Choose two.) 

A. Files found in the file system that are also on tape will NOT be overwritten. 

B. The missing files, present on the backup tape, are restored to the file system with the data as it was when the backup was taken. 

C. The access times are preserved by tar and will reflect the time when a user last accessed the data. 

D. The modification time on the files restored by tar will be preserved and will reflect the time the file was last modified before the backup, NOT the time of the restore operation. 

Answer: B,D 

Q180. You want to monitor a failed login after five unsuccessful attempts. Which file contains this information? 

A. /var/adm/lastlog 

B. /var/adm/loginlog 

C. /var/adm/sulog 

D. /var/adm/failedloginlog 

Answer: