Our Oracle 1Z0-821 exam demos include two versions: Pdf(printable version) as well as Test Motor(software version). They are very convenient as well as helpful in your case to make full preparation for the 1Z0-821 actual exam. Our Pdf or Testing engine preparation materials associated with Oracle Oracle certification exam contain everything which is precise and logical that you just need from the exam. You can freely download the particular Pdf files and analyze engine on your PC after obtain. Make full use of the particular comprehensive Oracle Oracle practice questions which are tested by our certified authorities before publishing as well as pass your 1Z0-821 exam properly at 1st attempt.
2016 Sep 1Z0-821 study guide
Q11. - (Topic 2)
You are using AI to install a new system. You have added to following information to the AI manifest:
<configuration type= “zone” name= “dbzone”
source = “http://sysA.example.com/zone_cfg/zone.cfg”/>
Which statement is true with regard to the zone.cfg?
A. The zone.cfg file is text file in a zonecfg export format.
B. The zone.cfg file is an AI manifest that specifies how the zone is to be installed.
C. The zone.cfg file is an xml file in a form suitable for use as a command file for the zonecfg command.
D. The zone.cfg file is an SC profile with keywords that are specific for configuring a as part of the installation process.
E. It is am xml configuration file from the /etc/zone directory. It will be used as a profile for the zone. It specifies the zonename,zonepath,and other zonecfg parameters.
Answer: B Explanation:
The configuration element supports non-global zone configurations. When installing a
global zone system,the zone configurations specified in the AI manifest are used to install
non-global zones onto the system after the global zone has been installed
The configuration element has the following attributes:
The type of configuration to install. The only type supported by AI is zone.
A name given to the configuration. This name must be unique across all configuration
elements in an AI manifest. For configurations of type zone,this name is also used as the
zonename for he zone.
The location from which AI downloads the configuration file for this configuration element.
The value can be an HTTP or FILE URI specification. For configurations of type zone,this
value should point to a zone configuration file as produced from the zonecfg export
Q12. - (Topic 2)
You create a flash archive of the Solaris 10 global zone on the serves named sysA. The archive name is s10-system.flar,and it is stored on a remote server named backup_server.
On sysA,you create a Solaris 10 branded zone named s10-zone.
You want to use the flash archive,located On" /net/bactup_servers/10-system.flar,to install the Operating system in the s10-zone zone.
Which command do you choose to install the s10-system.flar archive in the Solaris 10 branded zone (s10-zone)?
A. zoneadm -z s10 -zone install - a /net/backup_server/s10-system.flar -u
B. zonecfg -z s10 -zone install - a /net/backup_server/s10-system.flar -u
C. zoneadm - z s10 -zone clone - s /net/backup_server/s10-system.flar
D. zone cfg - a s10-zone create - t SUNWsolaris10\</net/backup_server/s10-system.flar
E. zonecfg -z s10-zone install -f /net/backup/backup_server/s10-system.flar
The zoneadm command is the primary tool used to install and administer non-global zones. Operations using the zoneadm command must be run from the global zone on the target system.
How to Install the solaris10 Branded Zone A configured solaris10 branded zone is installed by using the zoneadm command with the install subcommand.
Example: global# zoneadm -z s10-zone install -a /net/machine_name/s10-system.flar –u
Q13. - (Topic 2)
United States of America export laws include restrictions on cryptography.
Identify the two methods with which these restrictions are accommodated in the Oracle Solaris 11 Cryptographic Framework.
A. Corporations must utilize signed X.509 v3 certificates.
B. A third-party provider object must be signed with a certificate issued by Oracle.
C. Loadable kernel software modules must register using the Cryptographic Framework SPI.
D. Third-party providers must utilize X.509 v3 certificates signed by trusted Root Certification Authorities.
E. Systems destined for embargoed countries utilize loadable kernel software modules that restrict encryption to 64 bit keys.
B: Binary Signatures for Third-Party Software The elfsign command provides a means to sign providers to be used with the Oracle Solaris Cryptographic Framework. Typically,this command is run by the developer of a provider.
The elfsign command has subcommands to request a certificate from Sun and to sign binaries. Another subcommand verifies the signature. Unsigned binaries cannot be used by the Oracle Solaris Cryptographic Framework. To sign one or more providers requires the certificate from Sun and the private key that was used to request the certificate.
C: Export law in the United States requires that the use of open cryptographic interfaces be restricted. The Oracle Solaris Cryptographic Framework satisfies the current law by requiring that kernel cryptographic providers and PKCS #11 cryptographic providers be signed.
Q14. - (Topic 2)
This iron is displayed on the desktop of a laptop computer,which is running Oracle Solaris
Which two statements describe the Information conveyed by this Icon?
A. NWAM is disabled.
B. NWAM is automatically configuring the network.
C. The wireless network card is manually configured and operational.
D. The wireless network card is manually configured but not operational.
E. The wireless network card is automatically configured and operational.
F. The wireless network card is automatically configured but not operational.
B: The Network Status notification icon is only displayed on the desktop if you are using NWAM to automatically configure your network.
C: All online (Wireless)
Indicates all manually enabled connections in the enabled network profile are online and
that the required number of connections in the enabled profile group (if such a group exists)
are online. The required number is the same as those described for the All online (Wired)
Note that at least one online connection is wireless.
Q15. - (Topic 2)
You are going to create live zones on you server. Disk space is critical on this server so you need to reduce the amount of disk space required for these zones. Much of the data required for each of these zones is identical,so you want to eliminate the duplicate copies of data and store only data that is unique to each zone.
Which two options provide a solution for eliminating the duplicate copies of data that is common between all of these zones?
A. Create the zones by using sparse root zones.
B. Set the dedup property to on and the dedupratio to at least 1.5 for the zpool.Create a separate ZFS file system for each zone in the zpool.
C. Put all of the zones in the same ZFS file system and set the dedupratio property for the ZFS file system to at least 1.5.
D. Put all of the zones in the same ZFS file system and set the dedup property for the file system to on.
E. Put each zone in a separate ZFS file system within the same zpool. Set the dedup property to on for each ZFS file system.
n Oracle Solaris 11,you can use the deduplication (dedup) property to remove redundant data from your ZFS file systems. If a file system has the dedup property enabled,duplicate data blocks are removed synchronously. The result is that only unique data is stored,and common components are shared between files.
Improve 1Z0-821 book:
Q16. - (Topic 2)
In an effort to reduce storage space on your server,you would like to eliminate duplicate copies of data in your server’s ZFS file systems.
How do you specify that pool1/data should not contain duplicate data blocks (redundant data) on write operations?
A. zfs create - o compression=on pool1/data
B. zpool create -o deduplication =on pool1; zfs create pool1/data
C. zfs create - o deduplication=on pool1; zfs create pool1/data
D. zfs create - o dedupratio=2 pool1/data
E. zfs create - o dedup=on pool1/data
ZFS Deduplication Property Solaris Express Community Edition,build 129: In this Solaris release,you can use the deduplication property to remove redundant data from your ZFS file systems. If a file system has the dedup property enabled,duplicate data blocks are removed synchronously. The result is that only unique data is stored and common components are shared between files.
You can enable this property as follows:
# zfs set dedup=on tank/home
Q17. - (Topic 2)
You created a new zpool. Now you need to migrate the existing ZFS file system from pool1/prod to pool2/prod.
You have these requirements:
Users must have access to the data during the migration,so you cannot shutdown the file system while the migration takes place.
Because you want to copy the data as quickly as possible,you need to increase the server resources devoted to the ZFS migration.
Which method would you use to modify the ZFS shadow migration daemon defaults to increase the concurrency and overall speed of migration?
A. Svccfg - s filesystem/shadowd:defaultsetprop config_params/shadow_threads=integer: 16endsvcadm refresh filesystem/shadowd: default
B. Specify the -b <blocksize> option with the zfs create command and increase the value of <blocksize>
C. Use the -o -volblocksize=<blocksize>option with the zfs create command and increase the value of the default <blocksize>.
D. Svccfg -s filesystem/zfs: defaultsetprop config_params/shadow_threads = integer: 16endsvcadm refresh filesystem/zfs:default
shadowd is a daemon that provides background worker threads to migrate data for a shadow migration. A shadow migration gradually moves data from a source file system into a new “shadow” file system. Users can access and change their data within the shadow file system while migration is occurring.
The shadowd service is managed by the service management facility,smf(5). Administrative actions on this service,such as enabling,disabling,or requesting restart,can be performed using svcadm(1M). The service's status can be queried using the svcs(1) command.
The svccfg(1M) command can be used to manage the following parameter related to shadowd:
Note: Oracle Solaris 11: In this release,you can migrate data from an old file system to a new file system while simultaneously allowing access and modification of the new file system during the migration process.
Setting the shadow property on a new ZFS file system triggers the migration of the older data. The shadow property can be set to migrate data from the local system or a remote system with either of the following values:
Q18. - (Topic 1)
You are currently working in both your home directory and the system directory /tmp. You are switch back and forth with full path names. Which pair of cd commands will provide you with a shortcut to switch between these two locations?
A. cd ~ and cd –
B. cd and cd.
C. cd ~ and cd
D. cd * and cd . .
In the Bourne Again,C,Korn,TC,and Z shells,the tilde (~) is used as a shortcut for
specifying your home directory.
It's the command-line equivalent of the back button (takes you to the previous directory you
To make certain that you are in your home directory,type the cd (change directory)
command. This command moves you to your home (default) directory.
Q19. - (Topic 2)
In a default standalone installation of Oracle Solaris 11,what is the default minimum length in characters of a user password,and where is the minimum password length defined?
A. Default minimum length is 8,and is defined in /etc/default/password.
B. Default minimum length is 6,and is defined in /etc/default/password.
C. Default minimum length is 8,and is defined in /etc/shadow.
D. Default minimum length is 6,and is defined in /etc/shadow.
E. Default minimum length is 8,and is defined in /usr/sadm/defadduser.
F. Default minimum length is 6,and is defined in /usr/sadm/defadduser.
By default,the passwd command assumes a minimum length of six characters. You can use the PASSLENGTH default in the /etc/defaults/passwd files to change that by setting the minimum number of characters that a user's password must contain to some other number.
Q20. - (Topic 2)
Review the zonestat command:
zonestate - q physical - memory -R high -z -p -p “zones” 10 24h 60m
Select the option that correctly describes the information that is displayed by this command.
A. It is a sample of dbzone’s physical memory usage taken every hour over a 24-hour period.Only the top 10 samplings of peak memory usage are displayed. All other utilization data is eliminated.
B. It is a sample of dbzone’s CPU,virtual memory,and networking utilization.Physical memory is executed from the report.The sampling is taken every 10 minutes over a 24-hour period and peak utilization id displayed each hour.
C. It is a sample of dbzone’s CPU,virtual memory,and networking utilization.Physical memory is executed from the report.The sampling is taken every 10 minutes over a 24-hour period and displayed each hour.
D. It is a sample of dbzone’s physical memory usage taken every 10 seconds and 24-hour period.Only peak virtual memory usage and CPU utilization are displayed each hour.All other Utilization data is eliminated.
E. It is a sample of dbzone’s physical memory usage taken every 10 seconds and 24-hour period.Only peak memory usage is displayed each hour.All other utilization data is eliminated.
(Not A,B,C): interval (here 10 seconds): Specifies the length in seconds to pause between each interval report.
duration (here 24 h)
* -R report[,report] (here high) Print a summary report.
High Print a summary report detailing the highest usage of each resource and zone during any interval of the.zonestat.utility invocation.
Note: The zonestat utility reports on the cpu,memory,and resource control utilization of the currently running zones. Each zone's utilization is reported both as a percentage of system resources and the zone's configured limits.
The zonestat utility prints a series of interval reports at the specified interval. It optionally also prints one or more summary reports at a specified interval.
The default output is a summary of cpu,physical,and virtual memory utilization. The -r option can be used to choose detailed output for specific resources.