1Z0-821 | The Renew Guide To 1Z0-821 examcollection


Q131. - (Topic 1) 

Oracle Solaris 11 limits access to the system with usernames and passwords 

The usernames are held in ___________,and the passwords are held in ___________. 

Select the correct pair. 

A. /etc/security/policy.conf /etc/passwd 

B. /etc/passwd /etc/shadow 

C. /etc/security /etc/passwd 

D. /etc/shadow /etc/passwd 

Answer:

Explanation: 

The /etc/passwd file contains basic user attributes. This is an ASCII file that contains an entry for each user. Each entry defines the basic attributes applied to a user. 

/etc/shadow file stores actual password in encrypted format for user's account with additional properties related to user password i.e. it stores secure user account information. All fields are separated by a colon (:) symbol. It contains one entry per line for each user listed in /etc/passwd file. 

Q132. - (Topic 1) 

You created an IP address for interface not.3 with the following command,which executed 

successfully: 

ipadm create-addr –T static –a 192.168.0.100/24 net3/v4 

You then ran: 

ipadm show–if 

The result indicated that the interface was down. 

You then ran: 

ipadm delete-addr net3/v4 

ipadm create-addr –T static –a 192.168.0.101/24 net3/v4 

ipadm show-if 

The last command indicated that the interface was up. 

Why did it work with the second address specified,but not the first? 

A. The 192.168.0.100 address is reserved for broadcast messages. 

B. Another device exists on the network,using the 192.168.0.100 address. 

C. The network interface card does not support the address 192.168.0.100. 

D. The address 192.168.0.100 is at a boundary and may not be configured in Oracle Solaris 11. 

E. 192.168.0.100 is a DHCP address and may not be statically configured in Oracle Solaris 

11. 

Answer:

Explanation: 

The first IP address is already in use. 

Q133. - (Topic 2) 

The current ZFS configuration on server is: 

You need to backup the /data file system while the file system is active. 

Select the option that creates a full backup of the /data file system and stores the backup on server in the pool named backup. 

A. Mount -F nfs system: /backup / mntzfs snapshot pool/data@monday>/mnt/Monday 

B. Mount -F nfs systemB: /backup/mntzfs snapshot pool1/data@Mondayzfs clone pool1/data@monday/mnt/Monday 

C. Zfs send pool1/data@Monday | ssh system zfs recv backup/monday 

D. Zfs snapshot pool1/data@Monday | ssh system zfs recv backup/monday 

Answer:

Explanation: 

Example (assuming there exists a snapshot ‘tank/test@1). 

Full backup 

Now let’s do a full initial backup from the ‘tank/test@1 snapshot: 

# zfs send tank/test@1 | zfs receive tank/testback 

Q134. - (Topic 2) 

Which two are implemented using the Internet Control Message Protocol (ICMP)? 

A. ping 

B. DHCP 

C. HTTP 

D. telnet 

E. syslog 

F. traceroute 

Answer: A,F 

Explanation: 

The Internet Control Message Protocol (ICMP) is one of the core protocols of the Internet Protocol Suite. ICMP differs from transport protocols such as TCP and UDP in that it is not typically used to exchange data between systems,nor is it regularly employed by end-user network applications (with the exception of some diagnostic tools like ping and traceroute). 

Q135. - (Topic 1) 

View the Exhibit to see the information taken from the installation log file. 

Based on the information presented in the Exhibit,which two options describe the state of the system when the server is booted for the first time after the installation is complete? 

A. NWAM will be used to configure the network interface. 

B. The network/physical service is offline. 

C. You cannot log in from the console as root. You must first log in as a user and then su to 

root account. 

D. The root user can log in from the console login. 

E. You will be prompted to configure the network interface after the initial login. 

Answer: B,D 

Q136. - (Topic 1) 

The su command by default makes an entry into the log file for every su command attempt. The following is a single line from the file: 

SU 12/18 23:20 + pts/1 user1-root 

What does the + sign represent? 

A. unsuccessful attempt 

B. successful attempt 

C. The attempt was from a pseudo terminal,and not the console. 

D. The attempt was from a user that is in the adm group,same as root. 

E. Time zone is not set. 

Answer:

Explanation: 

The sulog file,/var/adm/sulog,is a log containing all attempts (whether successful or not) of the su command. An entry is added to the sulog file every time the su command is executed. The fields in sulog are: date,time,successful (+) or unsuccessful (-),port,user executing the su command,and user being switched to. In the preceding example,all su attempts were successful,except for the attempt on 2/23 at 20:51,when user pete unsuccessfully attempted to su to user root. 

Look for entries where an unauthorized user has used the command inappropriately. The following entry shows a successful (indicated by +) su from user userid to root. 

SU 03/31 12:52 + pts/0 <userid>-root 

Q137. - (Topic 1) 

A datalink can best be described as______. 

A. a driver for a Network Interface Card 

B. the software connecting the Internet Layer and the Physical Layer 

C. a device that provides Classless Inter-Domain Routing 

D. a logical object used for IP Multipathing 

Answer:

Explanation: 

The command dladm is used to configure data-link interfaces in Sun Solaris. A configured data-link is represented in the system as interface that can be used for TCP/IP. Each data-link relies on either a single network device or an link aggregation device to send & recieve packets. 

Network interfaces provide the connection between the system and the network. These interfaces are configured over data links,which in turn correspond to instances of hardware devices in the system. 

In the current model of the network stack,interfaces and links on the software layer build on the devices in the hardware layer. More specifically,a hardware device instance in the hardware layer has a corresponding link on the data-link layer and a configured interface on the interface layer. This one-to-one relationship among the network device,its data link,and the IP interface is illustrated in the figure that follows. 

Network Stack Showing Network Devices,Links,and Interfaces: 

Q138. - (Topic 1) 

You have installed software updates to a new boot environment (BE) and have activated that the booting to the new BE,you notice system errors. You want to boot to the last known good configuration. 

Which option would you use on a SPARC system to boot to the currentBE boot environment? 

A. boot –L currentBE 

B. boot –Z rpool/ROOT/currentBE 

C. boot –a Enter the currentBE dataset name when prompted. 

D. boot rpool/ROOT/currentBE 

E. boot –m currentBE 

F. beadm activate currentBE 

Answer:

Explanation: 

You can change an inactive boot environment into an active boot environment. Only one boot environment can be active at a time. The newly activated boot environment becomes the default environment upon reboot. 

How to Activate an Existing Boot Environment 

1. Use the following command to activate an existing,inactive boot environment: beadm activate beName 

beName is a variable for the name of the boot environment to be activated. 

Note the following specifications. 

beadm activate beName activates a boot environment by setting the bootable pool property,bootfs,to the value of the ROOT dataset of the boot environment that is being activated. 

beadm activate sets the newly activated boot environment as the default in the menu.lst file. 

2. Reboot. 

The newly activated boot environment is now the default on the x86 GRUB menu or 

SPARC boot menu. 

Q139. - (Topic 1) 

You attempted to reboot a system via the init command,however the system did not perform boot sequence into the Oracle Solaris Operating Environment. You are presented with a prompt from the OpenBoot PROM. Which command would you enter,to boot the system from the default device? 

A. boot -net install 

B. boot 

C. boot –default 

D. boot –s0 

Answer:

Explanation: 

Boot With this form,boot loads and executes the program specified by the default bootarguments from the default boot device 

Note: boot has the following general format: boot [device-specifier] [arguments] where device-specifier and arguments are optional.