We offers . "Oracle Solaris 11 System Administrator", also known as 1Z0-821 exam, is a Oracle Certification. This set of posts, Passing the 1Z0-821 exam with , will help you answer those questions. The covers all the knowledge points of the real exam. 100% real and revised by experts!

Free 1Z0-821 Demo Online For Microsoft Certifitcation:

NEW QUESTION 1
You are asked to determine user jack’s default login directory. Which command would provide you with useful information?

  • A. cat /etc/passwd | grep jack
  • B. cat /etc/group | grep jack
  • C. cat /etc/shadow | grep jack
  • D. cat /etc/default/passwd | grep jack

Answer: A

Explanation: The /etc/passwd contains one entry per line for each user (or user account) of the system. All fields are separated by a colon (:) symbol. Total seven fields as follows.
1. Username: It is used when user logs in. It should be between 1 and 32 characters in length.
2. Password: An x character indicates that encrypted password is stored in /etc/shadow file.
3. User ID (UID): Each user must be assigned a user ID (UID). UID 0 (zero) is reserved for root and UIDs 1-99 are reserved for other predefined accounts. Further UID 100-999 are reserved by system for administrative and system accounts/groups.
4. Group ID (GID): The primary group ID (stored in /etc/group file)
5. User ID Info: The comment field. It allow you to add extra information about the users such as user's full name, phone number etc. This field use by finger command.
6. Home directory: The absolute path to the directory the user will be in when they log in. If this directory does not exists then users directory becomes /
7. Command/shell: The absolute path of a command or shell (/bin/bash). Typically, this is a shell. Please note that it does not have to be a shell.

NEW QUESTION 2
Which three options describe the purpose of the zonep2vchk command?

  • A. Used on a Solaris 10 global zone to access the system for problems before migrating that system to a Solaris 10 branded zone.
  • B. Used to access a Solaris 10 global zone for problems before migrating that zone to a Solaris 11 global zone
  • C. Used to create zonecfg template for a Solaris 10 global zone that that will be migrated to a solaris10 branded zone.
  • D. Used to migrate an Oracle Solaris 11 global zone to a non-global zone.
  • E. Used to migrate a Solaris 10 global zone to a non-global zone on the same server; the non-global zone can then be migrated to a Solaris 11 server as a Solaris10 branded zone.

Answer: CDE

Explanation: zonep2vchk
- check a global zone's configuration for physical to virtual migration into non-global zone
The zonep2vchk utility is used to evaluate a global zone's configuration before the process of physical-to-virtual (p2v) migration into a non-global zone.
The p2v process involves archiving a global zone (source), and then installing a non-global zone (target) using that archive
Zonep2vchk serves two functions. First, it can be used to report issues on the source which might prevent a successful p2v migration. Second, it can output a template zonecfg, which can be used to assist in configuring the non-global zone target.
Zonep2vchk can be executed on a Solaris 10 or later global zone. To execute on Solaris 10, copy the zonep2vchkutility to the Solaris 10 source global zone.
When run on Solaris 10, a target release of S11 can be specified, which will check
for p2v into a Solaris 10 Branded zone.

NEW QUESTION 3
After installing the OS, you boot the system and notice that the syslogd daemon is not
accepting messages from remote systems.
Which two options should you select to modify the syslogd daemon configuration so that it accepts messages from remote systems?

  • A. svccfg -s svc:/system/system -log setprop start/exec= “syslogd -t”Restart the syslogd daemon.
  • B. Set the following parameter in the /etc/syslogd.conf file: LOG_FROM_REMOTE= YESRestart the syslogd daemon.
  • C. svcadm enable svc:/system/system -log/config/log_from_remoteRestart the syslogd daemon.
  • D. svccfg -s svc:/system/system-log setprop config/log_from_remote=trueRestart the syslogd daemon.
  • E. Set the following parameter in the /etc/default/syslogd file: LOG_FROM_REMOTE=YESRestart the syslogd daemon.

Answer: BD

Explanation: B: The /etc/default/syslogd file contains the following default parameter settings. See FILES.
LOG_FROM_REMOTE
Specifies whether remote messages are logged. LOG_FROM_REMOTE=NO is equivalent to the -t command-line option. The default value for LOG_FROM_REMOTE is YES.

NEW QUESTION 4
Which two statements are true when updating Solaris 11 from one Support Respository Update (SRU) to another SRU by using the pkg update command?

  • A. By default, the pkg update command automatically creates a backup Boot Environment whenever the kernel is affected by the update.
  • B. By default, the pkg update command automatically creates a new Boot Environment whenever the kernel is affected by the update.
  • C. The pkg update command can only be used to update to a newer SRU.
  • D. The pkg update command can be used to update to a newer or older SRU.
  • E. By default, the pkg update command always updates Solaris 11 to the first SRU that was released after the Current SRU.
  • F. The pkg update command can only be performed while running in the single-user milestone.

Answer: BC

NEW QUESTION 5
______ serves as the interface between the SMF repository and the user to ensure that a consistent, picture of the repository is presented to the user.

  • A. repository.db
  • B. service manifest
  • C. svc.startd
  • D. svc.configd

Answer: D

Explanation: SVC.CONFIGD is the repository daemon responsible for maintaining /etc/svc/repository.db. The repository.db must come clean during this integrity check otherwise it is a "no go" for usual boot sequence to run level 3. The repository may get corrupted due to various hardware issues, software bugs, disk write failures, etc.
Note: When svc.configd(1M), the Solaris Repository Daemon, is started, it does an integrity check of the smf(5) repository, stored in /etc/svc/repository.db. This integrity check can fail due to a disk failure, the database file being corrupted either due to a hardware bug, a software bug, or an accidental overwrite. If the integrity check fails, svc.configd will write a message to the console.

NEW QUESTION 6
You need to connect two nonglobal zones using a private virtual network. Identify the network resources required in the global zone to accomplish this.

  • A. an etherstub and two virtual network interfaces
  • B. a virtual bridge
  • C. two virtual network interfaces.
  • D. two etherstubs

Answer: A

NEW QUESTION 7
The COMSTAR framework provides support for the iSCSI protocol. Select three options that correctly describe the COMSTAR framework.

  • A. iSCSI devices can be used as dump devices.
  • B. SCSI commands are carried over IP networks and enable you to mount disk devices from across the network onto your local system.
  • C. Large amounts of data can be transferred over an IP network with very little network degradation.
  • D. COMSTAR allows you to convert any Solaris11 host into a SCSI target device that can be accessed over a storage network.
  • E. One IP port can handle multiple ISCSI target devices.

Answer: BDE

Explanation: B: By carrying SCSI commands over IP networks, the iSCSI protocol enables you to access block devices from across the network as if they were connected to the local system. COMSTAR provides an easier way to manage these iSCSI target devices.
D: Common Multiprotocol SCSI TARget, or COMSTAR, a software framework that enables you to convert any Oracle Solaris 11 host into a SCSI target device that can be accessed over a storage network by initiator hosts.
E: One IP port can handle multiple iSCSI target devices.

NEW QUESTION 8
You have installed the SMF notification framework to monitor services. Which command is used to set up the notifications for a particular service?

  • A. svccfg
  • B. svcadm
  • C. setnotify
  • D. smtp-notify

Answer: A

Explanation: How to Set Up Email Notification of SMF Transition Events
This procedure causes the system to generate an email notification each time one of the services or a selected service has a change in state. You can choose to use either SMTP or SNMP. Normally, you would only select SNMP if you already have SNMP configured for some other reason.
By default, SNMP traps are sent on maintenance transitions. If you use SNMP for monitoring, you can configure additional traps for other state transitions.
1. Become an administrator or assume a role that includes the Service Management rights profile.'
2. Set notification parameters. Example 1:
The following command creates a notification that sends email when transactions go into the maintenance state.
# /usr/sbin/svccfg setnotify -g maintenance mailto:sysadmins@example.com
Example 2:
The following command creates a notification that sends email when the switch service goes into the online state.
# /usr/sbin/svccfg -s svc:/system/name-service/switch:default setnotify to-online mailto:sysadmins@example.com
Note: The svccfg command manipulates data in the service configuration repository. svccfg can be invoked interactively, with an individual subcommand, or by specifying a command file that contains a series of subcommands.
Changes made to an existing service in the repository typically do not take effect for that service until the next time the service instance is refreshed.

NEW QUESTION 9
User1 is attempting to assist user2 with terminating user2's process 1234. User1 entered the following: kill -9 1234
Why does the process continue to run?

  • A. You can kill a process only if you are root.
  • B. You can kill only a process that you own.
  • C. You can kill the process only with the pkill command.
  • D. You need to kill the process with a stronger kill signal.

Answer: B

Explanation: Kill -9
Kill (terminates without cleanup)
Only works if issued by process owner or super user (root) The program cannot respond to this signal; it must terminate
Note: Unix provides security mechanisms to prevent unauthorized users from killing other processes. Essentially, for a process to send a signal to another, the owner of the signaling process must be the same as the owner of the receiving process or be the superuser.

NEW QUESTION 10
You have a ticket from a new user on the system, indicating that he cannot log in to his account. The information in the ticket gives you both the username and password. The ticket also shows that the account was set up three days ago.
As root, you switch users to this account with the following command: su – newuser
You do not get an error message.
You then run 1s -1a and see the following files:
local1.cshrc local1.login local1.profile .bash_history .bashrc .profile
As root, you grep the /etc/passwd file and the /etc/shadow file for this username, with these results:
/etc/passwd contains newuser:x:60012:10:/home/newuser:/usr/bin/bash
/etc/shadow contains newuser:UP: : : : :10: : As root, what is your next logical step?

  • A. Usermod –f 0
  • B. passwd newuser
  • C. mkdir /home/newuser
  • D. useradd –D

Answer: B

Explanation: The content of the /etc/shadow document indicates that the newuser account has no password.
We need to add a password.
The passwd utility is used to update user's authentication token(s). D: Here the user account already exist. There is no need to create it.
When invoked without the -D option, the useradd command creates a new user account using the values specified on the command line plus the default values from the system. Depending on command line options, the useradd command will update system files and may also create the new user's home directory and copy initial files.

NEW QUESTION 11
Which three files must be edited in order to set up logging of all failed login attempts?

  • A. /var/adm/authlog
  • B. /etc/syslog.conf
  • C. /etc/default/login
  • D. /var/adm/loginlog

Answer: ABC

Explanation: How to Monitor All Failed Login Attempts
This procedure captures in a syslog file all failed login attempts. Assume the Primary Administrator role, or become superuser.
1. Assume the Primary Administrator role, or become superuser.
2. (C) Set up the /etc/default/login file with the desired values for SYSLOG and SYSLOG_FAILED_LOGINS
3. (A) Create a file with the correct permissions to hold the logging information. Create the authlog file in the /var/adm directory.
4. (B) Edit the syslog.conf file to log failed password attempts.

NEW QUESTION 12
The following image properties are displayed on your system:
1Z0-821 dumps exhibit
Which two options describe the boot environment policy property that is currently set for this image?

  • A. All package operations are performed in a new BE set as active on the next boot.
  • B. Do not create a new B
  • C. The install, update, uninstall, or revert operation is not performed if a new BE is required.
  • D. If a BE is created, do not set it as the active BE on the next boot
  • E. A reboot is required for all package operations
  • F. A reboot is not required after a package operation.
  • G. For package operations that require a reboot, this policy creates a new BE set as active on the next boot.

Answer: DF

Explanation: Image properties described below.
* be-policy
Specifies when a boot environment is created during packaging operations. The following values are allowed:
/ default
Apply the default BE creation policy: create-backup.
/ always-new (D, F)
Require a reboot for all package operations (D) by performing them in a new BE set as active on the next boot (F). A backup BE is not created unless explicitly requested.
This policy is the safest, but is more strict than most sites need since no packages can be added without a reboot.

NEW QUESTION 13
Consider the following rule file for use with the Basic Audit Reporting Tool (BART).
CHECK all IGNORE dirmtime
/etc/security
/etc/notices IGNORE contents
/export/home
IGNORE mtime size contents
/var CHECK
You are using BART to detect inappropriate changes to the file system. Identify the two correct statements describing the attributes recorded.

  • A. /var/dhcp Attribute: size uid gid mode acl
  • B. /etc/hosts Attributes: size uid gid mode acl intime dest
  • C. /var/spool/mqueue Attribute: size uid gid mode acl dirmtime
  • D. /etc/security/exec_attr Attribute: size uid mode acl mtime devnode
  • E. /export/home/kate/.profile Attributes: uid gid mode acl dirmtime
  • F. /export/home/rick/.profile Attributes: size uid gid mode acl mtime contents

Answer: DF

Explanation: D: According to line /etc/security F: According to line /export/home
Not E: According to line IGNORE dirmtime
Note: In default mode, the bart compare command, as shown in the following example, checks all the files installed on the system, with the exception of modified directory timestamps (dirmtime):
CHECK all IGNORE dirmtime
Note 2: The Basic Audit Reporting Tool (BART) feature of Oracle Solaris enables you to comprehensively validate systems by performing file-level checks of a system over time. By creating BART manifests, you can easily and reliably gather information about the components of the software stack that is installed on deployed systems.
BART is a useful tool for integrity management on one system or on a network of systems.

NEW QUESTION 14
You have edited /etc/profile to include the lines: dennis_says=hello
export dennie_says
You have also edited /etc/skel/local.profile to include the line: dennis_says=world
You now create a new user account brian, and specify use of the bash shell. When brian logs in and enters
Echo $dennis_says
What will he see, and why?

  • A. world, because the local.profile entry will be executed last
  • B. hello, because the global /etc/profile entry overrides the local.profile entry
  • C. hello, because the local.profile entry is not automatically sourced on login
  • D. hello, because the value specified in local.profile was not exported
  • E. nothing, because the variable was not exported in local.profile

Answer: A

Explanation: The $HOME/.profile file is an initialization file that is executed after the /etc/profile when logging in to the Bourne or Korn shell. The file contains user preferences for variable settings. If the ENV variable is set to .kshrc, the .kshrc file executes every time a new shell
begins execution. The $HOME/.profile is copied from the /etc/skel/local.profile file by the Administration Tool when creating a new account.
Note: /etc/skel/local.profile
Per-system configuration file for sh/ksh/ksh93/bash login sessions, installed for new users

NEW QUESTION 15
user1, while in his home directory, is attempting to run the following command in his home directory: cp bigfile verybig
The system displays the following error:
cp: cannot create verybig: Disc quota exceeded
Your initial troubleshooting shows that the df -h command indicates he is at 100% capacity. What command would you use to increase the disk space available to the user?

  • A. zfs get quota rpool/export/home/user1
  • B. zfs userused@user1
  • C. zfs quota=none /rpool/export/home/user1
  • D. df -h | grep user1
  • E. zfs set quota=none /rpool/export/home/user1

Answer: E

Explanation: ZFS quotas can be set and displayed by using the zfs set and zfs get commands. We can remove the quota restriction by setting to quota to none.

NEW QUESTION 16
Examine this command and its output:
# zoneadm list Global
zone2
Which two outcomes can be deduced from this output?

  • A. There is exactly one nonglobal zone installed.
  • B. There is one nonglobal zone running.
  • C. There is at least one oneglobal zone configured.
  • D. There is one nonglobal zone that is not configured.
  • E. There is one nonglobal zone that is not running.
  • F. The is one nonglobal zone that is not installed.
  • G. There is exactly one nonglobal zone configured.

Answer: BC

NEW QUESTION 17
You are setting up an automated installer (AI) install server and issue the following command:
installadm create-service -n prod_ai -s /repo/prod_ai.iso
-i 192.168.1.100 -c 5 -d /export/repo
Which four options describe the install server that you have configured?

  • A. The service name is prod_ai.
  • B. DHCP base IP address is 192.168.1.100
  • C. The initial IP address for the install clients will be 192.168.1.100. This IP address is temporar
  • D. After the client is booted, it will use IP addresses in the following range: 192.168.1.101-105.
  • E. Five IP addresses are allocated for DHCP clients, starting with 192.168.1.100.
  • F. The Install server will support up to five clients.
  • G. The AI net image ISO file is located in /repo/prod and the net image ISO will be unpacked in /export/repo.
  • H. The AI net image ISO file is located in /repo/repo and is named /repo/prod/_ai.iso.

Answer: ABDF

Explanation: A: -n <svcname>
Uses this install service name instead of default service name.
B: -i <dhcp_ip_start>
Sets up a new DHCP server. The IP addresses, starting from dhcp_address_start, are set up.
D: -c <count_of_ipaddr>
Sets up a total number of IP addresses in the DHCP table equal to the value of the count_of_ipaddr. The first IP address is the value of dhcp_ip_start that is provided by the -i option.
F: -s <srcimage>
Specifies location of AI ISO image to use for setting up the install service.
<targetdir>
Required: Specifies location to set up net image.

NEW QUESTION 18
Which three statements are true concerning Image Packaging System (IPS) incorporation package?

  • A. Installing an incorporation package does not install any other packages.
  • B. Every feature or tool has a separate IPS incorporation.
  • C. They constrain the versions of packages they incorporate.
  • D. They are a content management tool and not a version management tool.
  • E. Their dependencies are always of TYPE-REQUIRE.
  • F. They are defined by their manifest

Answer: ACE

P.S. Certstest now are offering 100% pass ensure 1Z0-821 dumps! All 1Z0-821 exam questions have been updated with correct answers: https://www.certstest.com/dumps/1Z0-821/ (243 New Questions)