1Z0-821 | A Review Of Download 1Z0-821 braindumps


Q71. - (Topic 2) 

You need to update an OS image on a client. The pkg publishers command displays the wrong publisher with the wrong update: PUBLISHERTYPESTATUSURI Solaris origin onlinehttp://pkg.oracle.com/solaris/release 

The update is available on the updated publisher: 

PUBLISHERTYPESTATUSURI 

Solaris originonlinehttp://sysA.example.com 

Select the option that describes the procedure used to update the OS image on the system from the updated publisher. 

A. Copy the repository from the ISO image onto the local client.Configure the repository on the client by using the svccfg - s command so that the Solaris publisher is connected to the new repository.Refresh the application/pkg/server service.Issue the pkgrepo refresh command to refresh the repository catalog 

B. Configure the publisher on the client using the svcfg - s command so that the Solaris publisher is connected to the repository at http://sysA.example.comRefresh the application/pkg/server service.Issue the pkgrepo refresh command to repository catalog 

C. Use the pkg set-publisher command to change the URL of the publisher Solaris to http://sysA.example.com.Issue the pkg update command to update the OS image. 

D. Add the new publisher http://sysA.example.com SolarisUse the pkg set-publisher command to set the publisher search order and place http://sysA.example.com of http://pkg.oracle.com/solaris/releaseIssue the pkg publisher command to view the publishers.Set the new publisher to sticky.Issue the pkg update command to update the OS image. 

Answer:

Explanation: 

You can use the pkg set-publisher command to change a publisher URI. 

Changing a Publisher Origin URI 

To change the origin URI for a publisher,add the new URI and remove the old URI. Use the 

-g option to add a new origin URI. Use the -G option to remove the old origin URI. 

# pkg set-publisher -g http://pkg.example.com/support  

-G http://pkg.example.com/release example.com 

Note: You can use either the install or update subcommand to update a package. 

The install subcommand installs the package if the package is not already installed in the 

image. If you want to be sure to update only packages that are already installed,and not 

install any new packages,then use the update subcommand. 

Q72. - (Topic 2) 

You have a process called bigscript,and you need to know the PID number for this process. 

Which command will provide that information? 

A. pkill bigscript 

B. ps bigscript 

C. pgrep bigscript 

D. prstat bigscript 

Answer:

Explanation: 

Pgrep takes a process name and return a PID. 

Note: pgrep looks through the currently running processes and lists the process IDs which matches the selection criteria to stdout. All the criteria have to match. For example, pgrep -u root sshdwill only list the processes called sshd AND owned by root. 

Incorrec answers: 

ps bigscript: You can’t pass a name to ps,it interprets it as arguments. 

Q73. - (Topic 2) 

You wish to troubleshoot some issues that you are having on the system. You want to monitor the /var/adm/messages file in real time. Which command would you use to do this? 

A. head 

B. tail 

C. cat 

D. file 

E. test 

Answer:

Explanation: 

tail is a program on Unix and Unix-like systems used to display the last few lines of a text file or piped data. 

By default,tail will print the last 10 lines of its input to the standard output. With command line options the number of lines printed and the printing units (lines,blocks or bytes) may be changed. The following example shows the last 20 lines of filename: tail -n 20 filename 

Q74. - (Topic 2) 

View the Exhibit to inspect the boot environment Information displayed within a non global zone on your system. 

Which two options describe the solaris-1 boot environment? 

A. The solaris-1 boot environment is not bootable. 

B. The solaris-1 boot environment is incomplete. 

C. The solaris-1 boot environment was created automatically when the non global zone was created. 

D. The solaris-1 boot environment was created in the non-global zone using the beadm create command. 

E. The solaris-1 boot environment is associated with a non active global zone boot environment. 

Answer: A,D 

Explanation: 

A: The – of the Active Column indicates that this boot environment is inactive,and hence not bootable. 

Note: The values for the Active column are as follows: R – Active on reboot. 

N – Active now. 

NR – Active now and active on reboot. 

“-” – Inactive. 

“!” – Unbootable boot environments in a non-global zone are represented by an exclamation point. 

D: beadm create 

Creates a new boot environment name,beName..

Note: beadm list 

Lists information about the existing boot environment,which is.be Name,or lists information 

for all boot environments if.be Name.is not provided..

Note: Using beadm Utility (Tasks) 

You can use the beadm utility to create and manage snapshots and clones of your boot 

environments. 

Note the following distinctions relevant to boot environment administration: 

*

 A snapshot is a read-only image of a dataset or boot environment at a given point in time. A snapshot is not bootable. 

*

 A boot environment is a bootable Oracle Solaris environment,consisting of a root dataset and,optionally,other datasets mounted underneath it. Exactly one boot environment can be active at a time. 

*

 A clone of a boot environment is created by copying another boot environment. A clone is bootable. 

Q75. - (Topic 2) 

Which modification needs to be made to the Service Management Facility before you publish a new package to the IPS repository? 

A. The pkg.depotd must be disabled. 

B. The pkg/readonly property for the application/pkg/server service must be set to false. 

C. The Pkg/writabie_root property for the application/Pkg/server service must be set to true. 

D. The pkg/image.root property for the application/pkg/server service must be set to the location of the repository. 

Answer:

Explanation: 

pkg/image_root 

(astring) The path to the image whose file information will be used as a cache for file data. 

Q76. - (Topic 1) 

Oracle Solaris 11 kernel encounters a fatal error,and it results in a system panic. 

What type of file does this generate? 

A. a.out 

B. objdump 

C. core dump 

D. tape dump 

E. crash dump 

Answer:

Explanation: 

A kernel panic is a type of error that occurs when the core (kernel) of an operating system receives an instruction in an unexpected format or when it fails to handle properly. A kernel panic can also follow when the operating system can’t recover from a different type of error. A kernel panic can be caused by damaged or incompatible software or,more rarely,damaged or incompatible hardware. 

When a server kernel panics it abruptly halts all normal system operations. Usually,a kernel process named panic() outputs an error message to the console and stores debugging information in nonvolitile memory to be written to a crash log file upon restarting the computer. Saving the memory contents of the core and associated debugging information is called a “core dump.” 

Q77. - (Topic 2) 

On server A,you enter the following command to add a static route to serverA route -p add -host 192.168.1.101 192.168.1.101 -static 

What is the purpose of this command? 

A. to temporarily bypass IP Filter rules 

B. to specify an IPMP target IP address to in.mpathd 

C. to specify routing to an adjacent network when in.rdisc is not used 

D. to specify routing to an adjacent network when in.routed is not used 

E. to ensure the IP address for serverB is not flushed from the ARP cache 

F. to optimize link aggregation using a direct connection between two systems 

Answer:

Explanation: 

Note: # route -p add -host destination-IP gateway-IP -static where.destination-IP.and.gateway-IP.are IPv4 addresses of the host to be used as a target..

For example,you would type the following to specify the target system 192.168.10.137,which is on the same subnet as the interfaces in IPMP group itops0: 

$ route -p add -host 192.168.10.137 192.168.10.137 -static This new route will be automatically configured every time the system is restarted. If you want to define only a temporary route to a target system for probe-based failure detection,then do not use the -p option. 

Q78. - (Topic 1) 

Select two correct statements about the authentication services available in Oracle Solaris 

11. 

A. Pluggable Authentication Modules (PAM) is used to control the operation of services such console logins and ftp. 

B. The Secure Shell can be configured to allow logins across a network to remote servers without transmitting passwords across the network. 

C. Secure Remote Procedure Calls (Secure RPC) provides a mechanism to encrypt data on any IP Socket connection. 

D. Pluggable Authentication Modules (PAM) is used to implement the Secure Shell in Oracle Solaris 11. 

E. Simple Authentication and Security Layer (SASL) provides a mechanism to authenticate and encrypt access to local file system data. 

Answer: A,E 

Explanation: 

A: Pluggable Authentication Modules (PAM) are an integral part of the authentication mechanism for the Solaris. PAM provides system administrators with the ability and flexibility to choose any authentication service available on a system to perform end-user authentication. 

By using PAM,applications can perform authentication regardless of what authentication method is defined by the system administrator for the given client. 

PAM enables system administrators to deploy the appropriate authentication mechanism for each service throughout the network. System administrators can also select one or multiple authentication technologies without modifying applications or utilities. PAM insulates application developers from evolutionary improvements to authentication technologies,while at the same time allowing deployed applications to use those improvements. 

PAM employs run-time pluggable modules to provide authentication for system entry services. 

E: The Simple Authentication and Security Layer (SASL) is a method for adding authentication support to connection-based protocols. Simple Authentication and Security Layer (SASL) is a framework for authentication and data security in Internet protocols. It decouples authentication mechanisms from application protocols,in theory allowing any authentication mechanism supported by SASL to be used in any application protocol that uses SASL. Authentication mechanisms can also support proxy authorization,a facility allowing one user to assume the identity of another. They can also provide a data security layer offering data integrity and data confidentiality services. DIGEST-MD5 provides an example of mechanisms which can provide a data-security layer. Application protocols that support SASL typically also support Transport Layer Security (TLS) to complement the services offered by SASL. 

Q79. - (Topic 1) 

Which three of the components could be used in a ZFS storage pool, but are not recommended configurations? 

A. A file on a UFS file system 

B. A Veritas Volume Manager (VxVM) volume 

C. A LUN In a hardware RAID array 

D. A disk slice from an SMI labeled disk 

E. A Solaris Volume Manager (SVM) volume 

F. An EFI labeled disk 

Answer: A,B,E 

Explanation: 

A: ZFS also allows you to use UFS files as virtual devices in your storage pool. This feature is aimed primarily at testing and enabling simple experimentation,not for production use. The reason is that any use of files relies on the underlying file system for consistency. If you create a ZFS pool backed by files on a UFS file system,then you are implicitly relying on UFS to guarantee correctness and synchronous semantics. However,files can be quite useful when you are first trying out ZFS or experimenting with more complicated layouts when not enough physical devices are present. All files must be specified as complete paths and must be at least 64 Mbytes in size. 

B,E: You can construct logical devices for ZFS using volumes presented by software-based volume managers,such as Solaris Volume Manager (SVM) or Veritas Volume Manager (VxVM). However,these configurations are not recommended. While ZFS functions properly on such devices,less-than-optimal performance might be the result. 

Q80. - (Topic 1) 

Your server has a ZFS storage pool that is configured as follows: 

The server has two spare 146-GB disk drives: c3t5d0 c3t6d0 

You need to add more space to the pool1 storage pool. Which command would add more mirrored storage to the pool1 storage pool? 

A. zpool add pool1 mirror c3t5d0 c3t6d0 

B. zpool attach pool1 mirror c3t5d0 c3t6d0 

C. zpool attach pool1 c3r3d0 c3r5d0; zpool attach pool1 c3r4d0 c3r6d0 

D. zpool add pool1 c3r3d0 c3r5d0; zpool add pool1 c3r4d0 c3r6d0 

Answer: