1Z0-821 | how many questions of 1Z0-821 braindumps?


Q1. - (Topic 2) 

Which three statements accurately describe the Automated Installation (AI) client? 

A. If the AI client does not match any criteria to use a custom manifest or script,the default manifest is used. 

B. If the AI client does not match any criteria to use a custom manifest or script,the automated installation aborts. 

C. Any manifest or script in a service can be designated to be the default for that service. 

D. Only the default.xml file is used as the default AT client manifest. 

E. If a client system does not use any SC profile,then an interactive tool opens on that client at first boot after that client installation to complete the configuration of that client. 

F. If a client system does not use any SC profile,then the install server will use the default SC profile. 

Answer: A,D,E 

Explanation: 

A: Each client uses one and only one AI manifest to complete its installation. The AI manifest is selected for a client according to the following algorithm: 

* If no custom AI manifests are defined for this install service,the default AI manifest is used. The default AI manifest is not associated with any client criteria etc. 

D: When you create a new install service,install_service_image_path/auto_install/manifest/default.xml is the initial default AI manifest for that install service. 

E: Each client can use any number of system configuration profiles. If a client system does not use any configuration profile,then an interactive tool opens on that client at first boot after that client installation to complete the configuration of that client. 

Q2. - (Topic 2) 

You have been tasked with creating a dedicated virtual network between two local zones within a single system,in order to isolate the network traffic from other zones on that system. 

To accomplish this,you will create_____. 

A. an ether stub 

B. virtual router 

C. a virtual bridge 

D. a virtual network interface 

E. nothing,because a virtual switch is automatically created when the virtual network interfaces are created 

Answer:

Explanation: 

First create a virtual switch,then create a virtual network interface. 

Q3. - (Topic 2) 

Your mentor suggests using the dladm rename-link command to rename the network datalinks. 

What are the two advantages of following this advice? 

A. It can clarify which network interface has what purpose. 

B. It can simplify specifying the network interface with the dladm modify-aggr command. 

C. It can simplify specifying the network interface with the dladm modify-bridge command. 

D. It can simplify IP filter rule changes if the network interface is replaced with a different type. 

E. It can prevent accidental deletion of the network interface with the dladm delete-phys command. 

F. It can prevent accidental deletion of the network interface configuration with the ipadm delete-addr command. 

Answer: A,E 

Explanation: 

A: To rename the bge0 link to mgmt0,enter the following command: 

# dladm rename-link bge0 mgmt0 

E: Consider that the bge0 device,whose link was named mgmt0 as shown in the previous example,needs to be replaced with a ce0 device because of a hardware failure. The bge0 NIC is physically removed,and replaced with a new ce0 NIC. To associate the newly added ce0 device with the mgmt0 configuration previously associated with bge0,enter the following command: 

# dladm rename-link ce0 mgmt0 

Note: How to Rename a Datalink 

Use this procedure if you want to change a datalink name to a customized name. For example,some of the datalinks in upgraded system might have retained legacy hardware-based names and you want to change these names to generic ones. 

Note: dladm rename-link [-R root-dir] link new-link Rename link to new-link. This is used to give a link a meaningful name,or to associate existing link configuration such as link properties of a removed device with a new device. 

Q4. - (Topic 2) 

View the Exhibit and review the zpool and ZFS configuration information from your system. 

Identify the correct procedure for breaking the /prod_data mirror,removing c4t0d0 and c4t2d0,and making the data on c4t0d0and c4t2d0 accessible under the dev_data mount point. 

A. zpool split pool1 pool2 c4t0d0 c4t2d0zpool import pool2zfs set mountpoint = /dev_data pool2/prod_data 

B. zpool detach pool1 pool2zpool attach pool2zfs set mountpoint=/dev_data pool2/prod_data 

C. zpool split pool1/prod_data -n pool2/dev_datazfs set mountpoint = /dev_data pool2/prod_data 

D. zpool split pool1 pool2 c4t0d0 c4t2d0zpool import pool2 

Answer:

Explanation: 

In this Solaris release,you can use the.zpool split.command to split a mirrored storage pool,which detaches a disk or disks in the original mirrored pool to create another identical pool. After the split operation,import the new pool. 

Q5. - (Topic 2) 

Which network protocol is responsible for routing packets from one network to another? 

A. TCP 

B. UDP 

C. IP 

D. ICMP 

E. Ethernet 

Answer:

Explanation: 

The Internet Protocol (IP) is the principal communications protocol in the Internet protocol suite for relaying datagrams across network boundaries. Its routing function enables internetworking,and essentially establishes the Internet. 

Q6. - (Topic 2) 

You want to deploy Oracle Solaris 11 with the Automated Installer (AI). You need to make sure that your server and network meet the requirements for using AI. 

Choose the three options that describe the requirements for using AI. 

A. You can create only one manifest per install service. If you need more than one manifest create multiple install services. 

B. If two client machines have different architectures and need to be installed with the same version of the Oracle Solaris 11 OS,then create two AI manifests and a single install service. 

C. You need a separate install service for each different client architecture that you plan to install,and for each different version of the Oracle Solaris 11 OS that you plan to install on client systems. 

D. If two client machines have different architectures and need to be installed with different versions of the Oracle Solaris 11 OS,then create two AI manifests and two install services. 

E. The install server needs to be able to access an Oracle Solaris Image Packaging System (IPS) software package repository; the clients do not. 

F. The install server can be either an x86 machine or a SPARC machine. 

Answer: B,E,F 

Explanation: 

B (not A,not D,Not C): If two client machines need to be installed with the same version of the Oracle Solaris 11 OS but need to be installed differently in other ways,then create two AI manifests for the AI install service. The different AI manifests can specify different packages to install or a different slice as the install target,for example. Note: An AI manifest provides installation instructions. The AI manifest specifies one or more IPS package repositories where the client retrieves the packages needed to complete the installation. The AI manifest also includes the names of additional packages to install and information such as target installation device and partition information. 

F: The install server can be either an x86 machine or a SPARC machine. 

Q7. - (Topic 2) 

You are configuring NFS on a server. Select the two statements that are true. 

A. Resources listed in /etc/dfs/dfstab are automatically shared on boot up. 

B. A directory cannot be shared if a subdirectory below it is already shared. 

C. Renaming a share created with the zfs set share command is not supported. 

D. NFS and SMB protocols cannot be used simultaneously to share the same directory. 

Answer: A,C 

Explanation: 

A: ZFS can automatically share file systems by setting the sharenfs property. Using this property,you do not have to modify the /etc/dfs/dfstab file when a new file system is shared. The sharenfs property is a comma-separated list of options to pass to the share command. The value on is an alias for the default share options,which provides read/write permissions to anyone. The value off indicates that the file system is not managed by ZFS and can be shared through traditional means,such as the /etc/dfs/dfstab file. All file systems whose sharenfs property is not off are shared during boot. 

Q8. - (Topic 2) 

alice is a user account used by Alice on a Solaris 11 system. sadmin is a role account on the same system. 

Your task is to add the command /usr/sbin/cryptoadm to the Network management profile,so that Alice can execute it,while assuming the sadmin role. 

Select the three activities necessary to accomplish this. 

A. To the file /etc/security/prof_attr,add the line: Network Management: solaris:cmd:RO::/usr/sbin/cryptoadm:euid=0 

B. To the file /etc/security/auth_attr,add the line:Network Management: solaris:cmd:RO::/usr/sbin/cryptoadm:euid=0 

C. To the file /etc/security/exec_attr.d/local-entriies,add the line:Network Management: solaris:cmd:RO::/usr/sbin/cryptoadm:euid=0 

D. Run the roles alice to ensure that alice may assume the role sadmin. 

E. Run the command profiles sadmin to ensure that the role sadmin includes the network Management profile. 

F. Run the command profiles alice to ensure that the Alice has permissions to access the Network management profile. 

G. Run the command profiles “Network management” to ensure that the Network management profile includes the sadmin role. 

Answer: C,D,G 

Explanation: 

C: /etc/security/exec_attr is a local database that specifies the execution attributes associated with profiles. The exec_attr file can be used with other sources for execution profiles,including the exec_attr NIS map and NIS+ table. 

A profile is a logical grouping of authorizations and com-mands that is interpreted by a profile shell to form a secure execution environment. 

Q9. - (Topic 2) 

Consider the following rule file for use with the Basic Audit Reporting Tool (BART). 

CHECK all 

IGNORE dirmtime 

/etc/security 

/etc/notices 

IGNORE contents 

/export/home 

IGNORE mtime size contents 

/var 

CHECK 

You are using BART to detect inappropriate changes to the file system. 

Identify the two correct statements describing the attributes recorded. 

A. /var/dhcp Attribute: size uid gid mode acl 

B. /etc/hosts Attributes: size uid gid mode acl intime dest 

C. /var/spool/mqueue Attribute: size uid gid mode acl dirmtime 

D. /etc/security/exec_attr Attribute: size uid mode acl mtime devnode 

E. /export/home/kate/.profile Attributes: uid gid mode acl dirmtime 

F. /export/home/rick/.profile Attributes: size uid gid mode acl mtime contents 

Answer: D,F 

Explanation: 

D: According to line /etc/security 

F: According to line /export/home Not E: According to line IGNORE dirmtime Note: In default mode,the bart compare command,as shown in the following example,checks all the files installed on the system,with the exception of modified directory timestamps (dirmtime): 

CHECK all IGNORE dirmtime 

Note 2: The Basic Audit Reporting Tool (BART) feature of Oracle Solaris enables you to comprehensively validate systems by performing file-level checks of a system over time. By creating BART manifests,you can easily and reliably gather information about the components of the software stack that is installed on deployed systems. 

BART is a useful tool for integrity management on one system or on a network of systems. 

Q10. - (Topic 1) 

In a fresh installation of Oracle Solaris 11,default datalinks are named with a genetic naming convention,and they increment as you add interfaces. What is the default name? 

A. eth# 

B. net# 

C. el000g# 

D. lo# 

E. nic# 

Answer:

Explanation: 

When you install this Oracle Solaris release on a system for the first time,Oracle Solaris 

automatically provides generic link names for all the system's physical network devices. 

This name assignment uses the net# naming convention,where the # is the instance 

number. This instance number increments for each device,for example,net0,net1,net2,and 

so on. 

Note: 

Network configuration in Oracle Solaris 11 includes 

* Generic datalink name assignment – Generic names are automatically assigned to datalinks using the net0,net1,netN naming convention,depending on the total number of network devices that are on the system