Proper study guides for Renovate Oracle Oracle Solaris 11 System Administrator certified begins with Oracle 1Z0-821 preparation products which designed to deliver the Refined 1Z0-821 questions by making you pass the 1Z0-821 test at your first time. Try the free 1Z0-821 demo right now.

2016 Aug 1Z0-821 test question

Q91. - (Topic 2) 

Consider the following rule file for use with the Basic Audit Reporting Tool (BART). 

CHECK all 

IGNORE dirmtime 

/etc/security 

/etc/notices 

IGNORE contents 

/export/home 

IGNORE mtime size contents 

/var 

CHECK 

You are using BART to detect inappropriate changes to the file system. 

Identify the two correct statements describing the attributes recorded. 

A. /var/dhcp Attribute: size uid gid mode acl 

B. /etc/hosts Attributes: size uid gid mode acl intime dest 

C. /var/spool/mqueue Attribute: size uid gid mode acl dirmtime 

D. /etc/security/exec_attr Attribute: size uid mode acl mtime devnode 

E. /export/home/kate/.profile Attributes: uid gid mode acl dirmtime 

F. /export/home/rick/.profile Attributes: size uid gid mode acl mtime contents 

Answer: D,F 

Explanation: 

D: According to line /etc/security 

F: According to line /export/home Not E: According to line IGNORE dirmtime Note: In default mode,the bart compare command,as shown in the following example,checks all the files installed on the system,with the exception of modified directory timestamps (dirmtime): 

CHECK all IGNORE dirmtime 

Note 2: The Basic Audit Reporting Tool (BART) feature of Oracle Solaris enables you to comprehensively validate systems by performing file-level checks of a system over time. By creating BART manifests,you can easily and reliably gather information about the components of the software stack that is installed on deployed systems. 

BART is a useful tool for integrity management on one system or on a network of systems. 


Q92. - (Topic 2) 

Review the boot environment information displayed on your system: 

Which two options accurately describe the newBE boot environment? 

A. It cannot be destroyed. 

B. It cannot be activated. 

C. It cannot be renamed. 

D. You can create a snapshot of it. 

E. It is activated but unbootable. 

F. It has been deleted and will be removed at the next reboot. 

Answer: B,C 

Explanation: 

If the boot environment is unbootable,it is marked with an exclamation point (!) in the Active 

column in the beadm list output. 

The beadm command restricts actions on unbootable boot environments as follows: 

You cannot activate an unbootable boot environment. (B) 

You cannot destroy a boot environment that is both unbootable and marked as active on 

reboot. 

You cannot create a snapshot of an unbootable boot environment. 

You cannot use an unbootable boot environment or boot environment snapshot with the -e 

option of beadm create. 

You cannot rename an unbootable boot environment. (C) 


Q93. - (Topic 2) 

Which two are implemented using the Internet Control Message Protocol (ICMP)? 

A. ping 

B. DHCP 

C. HTTP 

D. telnet 

E. syslog 

F. traceroute 

Answer: A,F 

Explanation: 

The Internet Control Message Protocol (ICMP) is one of the core protocols of the Internet Protocol Suite. ICMP differs from transport protocols such as TCP and UDP in that it is not typically used to exchange data between systems,nor is it regularly employed by end-user network applications (with the exception of some diagnostic tools like ping and traceroute). 


Q94. - (Topic 2) 

Which two options are valid methods of installing a solaris10 branded zone on a system running Oracle Solaris 11? 

A. Use the V2V process to migrate an existing Solaris 8 or 9 non-global zone from a Solaris 10 system to a solaris10 branded zone. 

B. Use the V2V process to migrate an existing Solaris 10 non-global whole root zone from a Solaris 10 system to a solaris10 branded whole root zone. 

C. Install a solaris10 branded zone directly from the Oracle Solaris 10 media. 

D. Migrate an existing 64-bit Solaris 10 system to a solaris10 branded non-global zone using the P2V process. 

E. Use the V2V process to migrate an existing Solaris 10 non-global sparse root zone from a Solaris 10 system to a solaris10 branded sparse root zone. 

Answer: B,C 

Explanation: 

B: How to Migrate an Existing native Non-Global Zone 

Use the V2V process to migrate an existing zone on your Solaris 10 system to a solaris10 brand zone on a system running the Oracle Solaris 11 release. 

C: How to Install the solaris10 Branded Zone 

A configured solaris10 branded zone is installed by using the zoneadm command with the install subcommand. 


Q95. - (Topic 1) 

Which command would you use from the bash shell to determine the total amount of physical memory installed in your Solaris system (x86 and SPARC)? 

A. uname –a 

B. prtconf | grep –i memory 

C. sysdef | grep –i memory 

D. vmstat 

E. prtdiag | grep –i memory 

Answer: B 

Explanation: 

The prtconf command prints the system configuration informa-tion. The output includes the total amount of memory,and the configuration of system peripherals formatted as a dev-ice tree. 

If a device path is specified on the command line for those command options that can take a device path,prtconf will only display information for that device node. 


1Z0-821  free practice exam

Update 1Z0-821 exam engine:

Q96. - (Topic 1) 

How are operating system updates distributed in the Oracle Solaris 11 environment? 

A. Updates are only available to customers with an active support contract. The updates are distributed through the My Oracle Support web portal and installed in a central location. All software packages are then updated manually from the command line using the smpatch command. 

B. Patches are download from http: //support.oracle.com either automatically or manually. All software packages are then updated manually from the command line using the smpatch or patchadd commands. 

C. Software updates are published as packages to a repository. All software packages are then updated manually from the command line using the pkg command. 

D. Software updates,published as packages to an OS image. All software packages are then updated manually from the command line using the pkg command. 

Answer: C 

Explanation: 

*

 Updating all of the packages on your installed system – To update all of the packages on your system that have available updates,use the pkg update command,as follows: 

# pkg update Running this command updates packages that you might not otherwise consider updating,for example,kernel components and other low-level system packages. 

*

 Adding or updating individual packages – To add individual software packages,use the pkg install command. Any dependent packages are also updated at the same time. 

*

 install package updates that deliver fixes– A pkg update operation might include bug fixes,so the operation is similar to applying a specific patch or patches in previous Oracle Solaris releases. 

Note: The IPS interfaces first check for updates for currently installed packages before retrieving them via the network. By default,interfaces check repository catalogs in the following locations: 

*

 The default installation repository at pkg.oracle.com/solaris/release. 

*

 The support repository in My Oracle Support. This repository is restricted to users with Oracle Solaris 11 Express support contracts,and it contains packages with the latest bug fixes. For this reason,a support contract must be purchased for production deployments. 


Q97. - (Topic 2) 

You are attempting to troubleshoot an event that should have made an entry into the messages log. This event happened about two weeks ago. Which file should you look at first? 

A. /var/adm/messages 

B. /var/adm/messages.0 

C. /var /adm/messagas.1 

D. /var/adm/messages.2 

E. /var/adm/messages.3 

Answer: A 

Explanation: 

The /var/adm/messages is the file to which all the messages printed on the console are logged to by the Operating System. This helps to track back check the console messages to troubleshoot any issues on the system. 

Syslog daemon also writes to this /var/adm/messages file. 

The /var/adm/messages file monitored and managed by newsyslog and its configuration file is /usr/lib/newsyslog. 

This script runs as the roots cron job everyday,checks the /var/adm/messages file and copies/moves it to /var/adm/messages.0,1,2,3,4,5,6,7. In other words,it does the Log Rotation for the /var/adm/messages. In an event the /var file system is running out of space,these files needs to checked and can be removed (not the actual /var/adm/messages itself) to free up space on the file system. However,care has to be taken,if you decide to empty the /var/adm/messages itself for any reason. This process is called Truncation. 

SOLARIS SYSTEM ADMIN TIPS,/var/adm/messages 


Q98. - (Topic 1) 

You have a user that needs to use the cron tool to schedule some repetitive tasks. When the user enters the crontab –e command in a terminal window,the following error appears: 

crontab: you are not authorized to use cron. Sorry 

In order to troubleshoot this issue,in what directory would you start your invest 

A. /etc/cron.d 

B. /var/spool/cron 

C. /var/spool/cron/crontable 

D. /var/spool/cron/atjobs 

Answer: A 

Explanation: 

crontab: you are not authorized to use cron. Sorry. 

This message means that either the user is not listed in the cron.allow file (if the file 

exists),or the user is listed in the cron.deny file. 

You can control access to the crontab command by using two files in the /etc/cron.d 

directory: cron.deny and cron.allow. These files permit only specified users to perform 

crontab command tasks such as creating,editing,displaying,or removing their own crontab 

files. 

The cron.deny and cron.allow files consist of a list of user names,one user name per line. 


Q99. - (Topic 1) 

You have a ticket from a new user on the system,indicating that he cannot log in to his account. The information in the ticket gives you both the username and password. The ticket also shows that the account was set up three days ago. 

As root,you switch users to this account with the following command: 

su – newuser 

You do not get an error message. 

You then run 1s -1a and see the following files: 

local1.cshrc local1.login local1.profile .bash_history .bashrc .profile 

As root,you grep the /etc/passwd file and the /etc/shadow file for this username,with these results: 

/etc/passwd contains newuser:x:60012:10:/home/newuser:/usr/bin/bash 

/etc/shadow contains newuser:UP: : : : :10: : 

As root,what is your next logical step? 

A. Usermod –f 0 

B. passwd newuser 

C. mkdir /home/newuser 

D. useradd –D 

Answer: B 

Explanation: 

The content of the /etc/shadow document indicates that the newuser account has no 

password. 

We need to add a password. 

The passwd utility is used to update user's authentication token(s). 

D: Here the user account already exist. There is no need to create it. 

When invoked without the -D option,the useradd command creates a new user account using the values specified on the command line plus the default values from the system. Depending on command line options,the useradd command will update system files and 

may also create the new user's home directory and copy initial files. 


Q100. - (Topic 2) 

Which three statements accurately describe the Automated Installation (AI) client? 

A. If the AI client does not match any criteria to use a custom manifest or script,the default manifest is used. 

B. If the AI client does not match any criteria to use a custom manifest or script,the automated installation aborts. 

C. Any manifest or script in a service can be designated to be the default for that service. 

D. Only the default.xml file is used as the default AT client manifest. 

E. If a client system does not use any SC profile,then an interactive tool opens on that client at first boot after that client installation to complete the configuration of that client. 

F. If a client system does not use any SC profile,then the install server will use the default SC profile. 

Answer: A,D,E 

Explanation: 

A: Each client uses one and only one AI manifest to complete its installation. The AI manifest is selected for a client according to the following algorithm: 

* If no custom AI manifests are defined for this install service,the default AI manifest is used. The default AI manifest is not associated with any client criteria etc. 

D: When you create a new install service,install_service_image_path/auto_install/manifest/default.xml is the initial default AI manifest for that install service. 

E: Each client can use any number of system configuration profiles. If a client system does not use any configuration profile,then an interactive tool opens on that client at first boot after that client installation to complete the configuration of that client.