Possessing a 1Z0-821 record will probably be your information that you are being authorized. Countless Them professionals experience a Oracle as among the a good number of greatly regarded together with reputed accreditation accessible in the information know-how entire world. So if youre inconclusive, Oracle 1Z0-821 certification merits choosing a 2nd evaluate. Or even when you have undoubtedly thought to carry this one regarding, you are well on the right path a great quite beneficial together with pleasing credential.
2016 Sep 1Z0-821 testing engine
Q131. - (Topic 2)
Your server has a ZFS storage pool that is configured as follows:
The server has two spate 140-GB disk drives: c3t5d0 c3t6d0
Which command would add redundancy to the pool1 storage pool?
A. zpool attach pool1 c3t5d0 c3t6d0
B. zpool attach pool1 c3t3d0 c3c5d0; zpoo1 attach pool1 c3t4d0 c3t6d0
C. zpool mirror pool1 c3t5d0 c3t6d0
D. zpool add pool1 mirror c3t5d0 c3t6d0
E. zpool add raidz pool1 c3t5d0 c3t6d0
You can convert a non-redundant storage pool into a redundant storage pool by using the zpool attach command.
Note: zpool attach [-f] pool device new_device Attaches new_device to an existing zpool device. The existing device cannot be part of a raidz configuration. If device is not currently part of a mirrored configuration,device automatically transforms into a two-way mirror of device and new_device. If device is part of a two-way mirror,attaching new_device creates a three-way mirror,and so on. In either case,new_device begins to resilver immediately.
Q132. - (Topic 2)
Review the storage pool information:
Which statement describes the status of this storage pool?
A. It is a RAIDZ storage pool and can withstand a single disk failure; data will be striped at: disk components.
B. It is a double-parity RAIDZ storage pool and can withstand two disk failures; data will be striped across four disk components.
C. It is an improperly configured RAIDZ storage pool; data will be striped across four disk components,but only three drives are protected with redundancy.
D. It is an improperly configured RAIDZ storage pool; data will be striped across three disk components,but only three drives are protected with redundancy.
Device c3t6d0 is not included in the RAIDZ storage pool. The other three devices are included in the raidz pool. The data on these devices are protected.
Note: In addition to a mirrored storage pool configuration,ZFS provides a RAID-Z configuration with either single,double,or triple parity fault tolerance. Single-parity RAID-Z (raidz or raidz1) is similar to RAID-5. Double-parity RAID-Z (raidz2) is similar to RAID-6.
Q133. - (Topic 2)
Which two statements describe the COMSTAR framework available in Oracle Solaris 11?
A. It converts an Oracle Solaris 11 host into a SCSI target device that can be accessed over a storage network by Linux,Mac OS,or Windows client systems.
B. iSCSI targets cannot be configured as dump devices.
C. It provides support for iSCSI devices that use SLP.
D. It is used to connect to Fibre Channel or iSCSI Storage Area Network (SAN) environments.
E. It provides an upgrade and update path to convert your iSCSI LUNs from Solaris 10 systems.
A: You can configure Common Multiprotocol SCSI TARget,or COMSTAR,a software framework that enables you to convert any Oracle Solaris 11 host into a SCSI target device that can be accessed over a storage network by initiator hosts.
This means you can make storage devices on a system available to Linux,Mac OS,or Windows client systems as if they were local storage devices. Supported storage protocols are iSCSI,FC,iSER,and SRP.
B: iSCSI targets cannot be configured as dump devices.
Q134. - (Topic 2)
You notice that the /var/.dm/messages file has become very large. Typically,this is managed by a crontab entry. Which entry should be in the root's crontab file?
A. 10 3 * * * /usr/adm/messages
B. 10 3 * * * /usr/sbin/logadm
C. 10 3 * * * /usr/sbin/syslogrotate
D. 10 3 * * * /usi/sbin/logrotate
E. 10 3 * * * /usr/sbin/messages
This example shows how to display the default root crontab file.
# crontab -l #ident "@(#)root 1.19 98/07/06 SMI" /* SVr4.0 188.8.131.52 */ # # The root crontab should be used to perform accounting data collection. # # 10 3 * * * /usr/sbin/logadm 15 3 * * 0 /usr/lib/fs/nfs/nfsfind 30 3 * * * [ -x /usr/lib/gss/gsscred_clean ] && /usr/lib/gss/gsscred_clean #10 3 * * * /usr/lib/krb5/kprop_script ___slave_kdcs___
Q135. - (Topic 2)
You have Solaris 11 system with a host name of sysA and it uses LDAP as a naming service.
You have created a flash archive of sysA and you want to migrate this system to an Oracle Solaris11 server,Solaris10 branded zone.
The zone Status on the Oracle Solaris 11 server is:
Select the option that will force the non-global zone to prompt you for a host name and name service the first time it is booted.
A. Use zonecfg to change the zonename before booting the system for the first time
B. Use the - u option with the zoneadm - z zone10 attach command.
C. Use the -u option with the zoneadn -z zone10 install command.
D. Remove the sysidcfg file from the <zonepath>/root directory before booting the non-global zone.
Oracle Solaris 10 branded zones – Oracle Solaris 10 Zones provide an Oracle Solaris 10 environment on Oracle Solaris 11. You can migrate an Oracle Solaris 10 system or zone to a solaris10 zone on an Oracle Solaris 11 system in the following ways:
Create a zone archive and use the archive to create an s10zone on the Oracle Solaris 11
This option applies in the current scenario.
Example of command to Install the Oracle Solaris 10 non-global zone.
s11sysB# zoneadm -z s10zone install -u -a /pond/s10archive/s10.flar
Detach the zone from the Oracle Solaris 10 system and attach the zone on the Oracle
Solaris 11 zone. The zone is halted and detached from its current host. The zonepath is
moved to the target host,where it is attached.
install [-x nodataset] [brand-specific options]
A subcommand of the zoneadm.
Install the specified zone on the system. This subcommand automatically attempts to verify
first. It refuses to install if the verify step fails.
-u.uuid-match Unique identifier for a zone,as assigned by.libuuid(3LIB). If this option is present and the argument is a non-empty string,then the zone matching the UUID is selected instead of the one named by the.-z.option,if such a zone is present.
Latest 1Z0-821 simulations:
Q136. - (Topic 1)
The following line is from /etc/shadow in a default Solaris 11 Installation:
jack: $5$9JFrt54$7JdwmO.F11Zt/ jFeeOhDmnw93LG7Gwd3Nd/cwCcNWFFg:0:15:30:3:::
Which two are true?
A. Passwords for account jack must be a minimum of 15 characters long.
B. The password for account jack has expired.
C. The password for account jack has 5 characters.
D. A history of 3 prior passwords for the account jack is kept to inhibit password reuse.
E. The minimum lifetime for a password for account jack is 15 days.
From the content of the /etc/shadow file we get:
encrypted password: $5$9JFrt54$7JdwmO.F11Zt/ jFeeOhDmnw93LG7Gwd3Nd/cwCcNWFFg
Last password change (lastchanged): Days since Jan 1,1970 that password was last changed: 0
Minimum: The minimum number of days required between password changes i.e. the number of days left before the user is allowed to change his/her password: 15 Maximum: The maximum number of days the password is valid (after that user is forced to change his/her password): 30 Warn : The number of days before password is to expire that user is warned that his/her password must be changed: 3
Inactive : The number of days after password expires that account is disabled
Expire : days since Jan 1,1970 that account is disabled i.e. an absolute date specifying when the login may no longer be used
Q137. - (Topic 2)
You have been tasked with creating a dedicated virtual network between two local zones within a single system. In order to isolate the network traffic from other zones on that system.
To accomplish this,you will create__________.
A. An ether stub
B. A virtual router
C. A virtual switch
D. A virtual bridge.
E. A virtual network interface
F. Nothing because a virtual switch is automatically created then the virtual network interfaces are created.
Etherstubs are pseudo ethernet NICs which are managed by the system administrator. You can create VNICs over etherstubs instead of over physical links. VNICs over an etherstub become independent of the physical NICs in the system. With etherstubs,you can construct a private virtual network that is isolated both from the other virtual networks in the system and from the external network. For example,you want to create a network environment whose access is limited only to your company developers than to the network at large.
Etherstubs can be used to create such an environment.
Note: Oracle Solaris 11 introduces a new and powerful network stack architecture which includes:
Networking virtualization with virtual network interface cards (VNICs) and virtual switching (etherstubs)
Tight integration with zones
Network resource management - efficient and easy to manage integrated quality of service (QoS) to enforce bandwidth limit on VNICs and traffic flows We will be examini
Q138. - (Topic 1)
user1 has a disk quota of 0.5 MB. The user attempts to run the following command on a file called .bigfile that is 495 KB in size:
cp bigfile /tmp
Will the command execute successfully?
A. Yes. Quotas do not include any of the system files such as /tmp /swap.
B. Yes. The quota is set at the directory level,not the user level.
C. No. The command will fail because it will cause him to exceed his user quota.
D. No. A user cannot place files into the /tmp directory.
UFS quotas enable system administrators to control the size of file systems. Quotas limit the amount of disk space and the number of inodes,which roughly corresponds to the number of files,that individual users can acquire. For this reason,quotas are especially useful on the file systems where user home directories reside. As a rule,the public and /tmp file systems usually do not benefit significantly by establishing quotas.
Note: The cp command copies files and directories.
Q139. - (Topic 2)
Review the information taken from your server:
Which option describes the command used to create these snapshots of the root file system?
A. Option A
B. Option B
C. Option C
D. Option D
zfs snapshot [-r] [-o property=value] ... filesystem@snapname|volume@snapname Creates a snapshot with the given name. All previous modifications by successful system calls to the file system are part of the snapshot. See the “Snapshots” section for details.
-r Recursively create snapshots of all descendent datasets. Snapshots are taken atomically,so that all recursive snapshots correspond to the same moment in time.
Q140. - (Topic 2)
You need to update an OS image on a client. The pkg publishers command displays the wrong publisher with the wrong update: PUBLISHERTYPESTATUSURI Solaris origin onlinehttp://pkg.oracle.com/solaris/release
The update is available on the updated publisher:
Select the option that describes the procedure used to update the OS image on the system from the updated publisher.
A. Copy the repository from the ISO image onto the local client.Configure the repository on the client by using the svccfg - s command so that the Solaris publisher is connected to the new repository.Refresh the application/pkg/server service.Issue the pkgrepo refresh command to refresh the repository catalog
B. Configure the publisher on the client using the svcfg - s command so that the Solaris publisher is connected to the repository at http://sysA.example.comRefresh the application/pkg/server service.Issue the pkgrepo refresh command to repository catalog
C. Use the pkg set-publisher command to change the URL of the publisher Solaris to http://sysA.example.com.Issue the pkg update command to update the OS image.
D. Add the new publisher http://sysA.example.com SolarisUse the pkg set-publisher command to set the publisher search order and place http://sysA.example.com of http://pkg.oracle.com/solaris/releaseIssue the pkg publisher command to view the publishers.Set the new publisher to sticky.Issue the pkg update command to update the OS image.
You can use the pkg set-publisher command to change a publisher URI.
Changing a Publisher Origin URI
To change the origin URI for a publisher,add the new URI and remove the old URI. Use the
-g option to add a new origin URI. Use the -G option to remove the old origin URI.
# pkg set-publisher -g http://pkg.example.com/support \
-G http://pkg.example.com/release example.com
Note: You can use either the install or update subcommand to update a package.
The install subcommand installs the package if the package is not already installed in the
image. If you want to be sure to update only packages that are already installed,and not
install any new packages,then use the update subcommand.