1Z0-879 | 10 Tips For Most up-to-date 1Z0-879 exam


Q1. The security policy of your company dictates that root logins are only allowed on the console of a system. Which variable should be set? 

A. CONSOLE=/dev/console in /etc/default/login 

B. CONSOLE=yes in /etc/default/su 

C. CONSOLE=yes in /etc/default/login 

D. CONSOLE=/dev/console in /etc/default/su 

Answer:

Q2. A new colleague asks what the purpose of the boot_archive file is on a Solaris SPARC system. Which answer best describes the boot_archive file? 

A. To load a file system image and the kernel 

B. Reads a file system specific boot block 

C. Reads the bootfs property 

D. Loads the multiboot program 

Answer:

Q3. You have added an additional internal drive to your x86-based desktop system, and you want to get the Solaris 10 OS to recognize it. Which two procedures will allow the OS to be able to recognize the new device? (Choose two). 

A. Boot the system then execute # touch /reconfigure, and then reboot the system. Confirm that you can see the new drive by executing # format. 

B. Boot the system and enter the # reconfigure command. Confirm that you can see the new drive by executing # format. 

C. Boot the system and enter the # devfsadm -v command. Confirm that you can see the new drive by executing # format. 

D. From the system menu, select the "Add new hardware" icon. Confirm that you can see the new drive by executing # format. 

Answer: A,C 

Q4. You need to perform hardware maintenance and have many users logged on. Which command do you use to give users a five-minute warning that the system is to be halted? 

A. shutdown -g300 -i0 

B. init 5 

C. poweroff 

D. shutdown -g5 -i0 

E. halt 

Answer:

Q5. The system administrator assigned a profile entry with sufficient rights to execute the snoop(1m) command. The user comes back and complains that it does NOT work. The system administrator wants the command to work automatically for the user. Which two can be causes after verifying that the RBAC database entries are correct? (Choose two.) 

A. The user should prefix the command line with pfexec. 

B. The user needs to execute the su root command before the user can execute any of the profile commands. 

C. The user needs to log out and log in again to run with the new shell. 

D. The user needs to be assigned a profile shell. 

Answer: C,D 

Q6. A colleague has been assigned the task of exporting a ZFS pool and importing it on another system. Your colleague has noticed that other ZFS pools have been exported with the same name and asks you how find the unique identification for the pool before it is exported. Which command should your colleague use? 

A. zfs get all 

B. zpool get all 

C. zpool get guid mpool 

D. zfs get creation mpool 

Answer:

Q7. You are installing the Solaris 10 OS on a server and, in an effort to increase security on your server, you want to disable as many network services as possible while still leaving ssh enabled as a network-listening service. Which method is used to disable these unnecessary services before the first reboot? 

A. Run the netservices limited command. 

B. Run aset -l high after the installation, but before a reboot. 

C. Install the reduced network support software group during the installation of the OS. 

D. Answer NO to enabling network services for remote clients during the installation of the OS. 

Answer:

Q8. At boot up, this service calls the startup scripts which are used to configure each network interface with an IP address and other required network information.  Which service is it? 

A. svc:/network/service:default 

B. svc:/network/physical:default 

C. svc:/network/ifconfig:default 

D. svc:/network/inetd:default 

Answer:

Q9. You run an IT department and are responsible for purchasing hardware within a given budget. You are aware that 70 gigabytes of data housed in a series of traditional disk slices is becoming critical to the business. 

You decide to mirror the data, but have concerns about write performance. You can purchase the disk space to mirror the data. 

What configuration enhancement will achieve the best write performance? 

A. arranging for the mirror to consist of just two disks 

B. using RAID 5 to hold the data in each half of the mirror 

C. striping the data across the disks in each half of the mirror 

D. concatenating the data across the disks in each half of the mirror 

Answer:

Q10. Your password can be captured by snoop when you are trying remotely to log in to a default installation of the Solaris 10 OS. 

Which two commands can be used to avoid this issue? (Choose two.) 

A. ssh 

B. sendmail 

C. telnet 

D. rlogin 

E. ftp 

Answer: A,D