Examcollection offers free demo for 1Z0-821 exam. "Oracle Solaris 11 System Administrator", also known as 1Z0-821 exam, is a Oracle Certification. This set of posts, Passing the Oracle 1Z0-821 exam, will help you answer those questions. The 1Z0-821 Questions & Answers covers all the knowledge points of the real exam. 100% real Oracle 1Z0-821 exams and revised by experts!

♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for Oracle 1Z0-821 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 1Z0-821 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/1Z0-821-exam-dumps.html

Q51. - (Topic 2) 

On server A,you enter the following command to add a static route to serverA route -p add -host -static 

What is the purpose of this command? 

A. to temporarily bypass IP Filter rules 

B. to specify an IPMP target IP address to in.mpathd 

C. to specify routing to an adjacent network when in.rdisc is not used 

D. to specify routing to an adjacent network when in.routed is not used 

E. to ensure the IP address for serverB is not flushed from the ARP cache 

F. to optimize link aggregation using a direct connection between two systems 



Note: # route -p add -host destination-IP gateway-IP -static where.destination-IP.and.gateway-IP.are IPv4 addresses of the host to be used as a target..

For example,you would type the following to specify the target system,which is on the same subnet as the interfaces in IPMP group itops0: 

$ route -p add -host -static This new route will be automatically configured every time the system is restarted. If you want to define only a temporary route to a target system for probe-based failure detection,then do not use the -p option. 

Q52. - (Topic 2) 

Review the boot environment information displayed on your system: 

Which two options accurately describe the newBE boot environment? 

A. It cannot be destroyed. 

B. It cannot be activated. 

C. It cannot be renamed. 

D. You can create a snapshot of it. 

E. It is activated but unbootable. 

F. It has been deleted and will be removed at the next reboot. 

Answer: B,C 


If the boot environment is unbootable,it is marked with an exclamation point (!) in the Active 

column in the beadm list output. 

The beadm command restricts actions on unbootable boot environments as follows: 

You cannot activate an unbootable boot environment. (B) 

You cannot destroy a boot environment that is both unbootable and marked as active on 


You cannot create a snapshot of an unbootable boot environment. 

You cannot use an unbootable boot environment or boot environment snapshot with the -e 

option of beadm create. 

You cannot rename an unbootable boot environment. (C) 

Q53. - (Topic 2) 

Select two statements that correctly describe the capabilities of the Distribution Constructor. 

A. ISO images for use with the Automated Installer (AI) can be created. 

B. Bootable USB images can be created for SPARC and x86 architectures. 

C. A single installation server can be used to create ISO images for SPARC and x86 architectures. 

D. Checkpoints can be used to pause the build,allowing scripts to run that modify the resulting ISO Image. 

E. A single Installation server can be used to create ISO images for Solaris 10 and Solaris11 operating systems. 

Answer: A,D 


A: You can use the distribution constructor to create the following types of Oracle Solaris images: 


 (A) x86 or SPARC ISO Image for Automated Installations 


 Oracle Solaris x86 live CD image 


 x86 or SPARC Oracle Solaris text installer image 


 x86 Oracle Solaris Virtual Machine 

Note: You can use the distribution constructor to build custom Oracle Solaris images. Then,you can use the images to install the Oracle Solaris software on individual systems or multiple systems. You can,also,use the distribution constructor to create Virtual Machine (VM) images that run the Oracle Solaris operating system. 

D: Checkpointing Options You can use the options provided in the distro_const command to stop and restart the build process at various stages in the image-generation process,in order to check and debug the image that is being built. This process of stopping and restarting during the build process is called checkpointing. 

Q54. - (Topic 1) 

Choose three options that describe the features associated with a Live Media installation. 

A. does not allow the root user to log in to the system directly from the console (or any terminal) 

B. provides a "hands free" installation 

C. installs the desktop based packages 

D. can be used to install only x86 platforms 

E. installs the server-based set of packages only 

F. allows both automatic and manual configuration of the network 

G. installs both the server-based and desktop-based package 

Answer: B,C,D 


The graphical installer is officially known as the "Live Media." This means that Oracle Solaris can be booted into RAM,causing zero impact on your existing operating system. After it is loaded,you are free to experiment with Oracle Solaris to determine whether it is something you would like to install to your system. 

You can download Oracle Solaris 11 Live Media for x86,which is an approximately 800 MB image file,and use a DVD burner to create the disk,or you can use the ISO image directly in a virtual machine or through the Oracle Integrated Lights Out Manager (ILOM) Remote Console. 

The Live Media is not intended for long-term use. For example,any changes that you make to the system are lost when the system is shut down. Therefore,the next logical step is to install Oracle Solaris on the system,which the Live Media makes easy by placing an Install Oracle Solaris icon righton the desktop. But before we head down that road,let's step back a bit and consider the installation options. 

Note: The Live Media provides administrators with an opportunity to explore the Oracle Solaris 11 environment without installing it on a system. The system boots off the media directly allowing administrators to start the installer should they choose to install it to a system. 

Q55. - (Topic 1) 

Subnets are created by using________. 

A. subnet 

B. netmask 

C. unicast 

D. broadcast 



The process of subnetting involves the separation of the network and subnet portion of an address from the host identifier. This is performed by a bitwise AND operation between the IP address and the (sub)network prefix. The result yields the network address or prefix,and the remainder is the host identifier. 

The routing prefix of an address is written in a form identical to that of the address itself. This is called the network mask,or netmask,of the address. For example,a specification of the most-significant 18 bits of an IPv4 address,11111111.11111111.11000000.00000000,is written as 

Q56. - (Topic 2) 

Identify the two security features incorporated in the Oracle Solaris 11 Cryptographic Framework. 

A. Layer 5 IP address encryptions 

B. Internet protocol security 

C. Diffie-Kerberos coaxial key encryption 

D. Signed cryptographic plugins (providers) 

E. Kernel support for signed antivirus plugins 

Answer: D,E 


The framework enables providers of cryptographic services to have their services used by many consumers in the Oracle Solaris operating system. Another name for providers is plugins. The framework allows three types of plugins: 


 User-level plugins - Shared objects that provide services by using PKCS #11 libraries,such as pkcs11_softtoken.so.1. 


 Kernel-level plugins - Kernel modules that provide implementations of cryptographic algorithms in software,such as AES. 

Many of the algorithms in the framework are optimized for x86 with the SSE2 instruction set and for SPARC hardware. 


 Hardware plugins - Device drivers and their associated hardware accelerators. The Niagara chips,the ncp and n2cp device drivers,are one example. A hardware accelerator offloads expensive cryptographic functions from the operating system. The Sun Crypto Accelerator 6000 board is one example. 

Q57. - (Topic 2) 

You wish to edit your crontab file that is located in /var/spool/cron/crontab. What command must you enter to edit this file? 

A. crontab –e 

B. crontab –e /var/spool/cron/crontab 

C. crontab –r 

D. crontab –e /etc/default/cron 



The main tool for setting up cron jobs is the crontab command,though this is not available on every Unix variant. Typically under Solaris or Linux one would create a new crontab or edit an existing one,using the command; crontab -e 

Use the ls -l command to verify the contents of the/var/spool/cron/crontabs file. 

Q58. - (Topic 1) 

You have a ticket from a new user on the system,indicating that he cannot log in to his account. The information in the ticket gives you both the username and password. The ticket also shows that the account was set up three days ago. 

As root,you switch users to this account with the following command: 

su – newuser 

You do not get an error message. 

You then run 1s -1a and see the following files: 

local1.cshrc local1.login local1.profile .bash_history .bashrc .profile 

As root,you grep the /etc/passwd file and the /etc/shadow file for this username,with these results: 

/etc/passwd contains newuser:x:60012:10:/home/newuser:/usr/bin/bash 

/etc/shadow contains newuser:UP: : : : :10: : 

As root,what is your next logical step? 

A. Usermod –f 0 

B. passwd newuser 

C. mkdir /home/newuser 

D. useradd –D 



The content of the /etc/shadow document indicates that the newuser account has no 


We need to add a password. 

The passwd utility is used to update user's authentication token(s). 

D: Here the user account already exist. There is no need to create it. 

When invoked without the -D option,the useradd command creates a new user account using the values specified on the command line plus the default values from the system. Depending on command line options,the useradd command will update system files and 

may also create the new user's home directory and copy initial files. 

Q59. - (Topic 1) 

You need to make sure that all of the software packages on your server are up to date. Without installing any updates,which two commands would display .my software updates that are available in the default Oracle repository? 

A. pkg list -u 

B. pkg verify –u ‘*’ 

C. pkg search –u 

D. pkg info –r ‘*’ 

E. pkg install –nv 

F. pkg update –nv ‘*’ 

Answer: A,D 


A: the pgk list command display a list of packages in the current image,including state and other information. By default,package variants for a different architecture or zone type are excluded. 

D: pkginfo displays information about software packages that are installed on the system (with the first synopsis,with -l) or that reside on a particular device or directory (with the second synopsis,with -r). 

Without options,pkginfo lists the primary category,package instance,and the names of all completely installed and partially installed packages. It displays one line for each package selected. 

With -r,retrieve the data from the repositories of the image's configured publishers. Note that you must specify one or more package patterns in this case. 

Q60. - (Topic 2) 

alice is a user account used by Alice on a Solaris 11 system. sadmin is a role account on the same system. 

Your task is to add the command /usr/sbin/cryptoadm to the Network management profile,so that Alice can execute it,while assuming the sadmin role. 

Select the three activities necessary to accomplish this. 

A. To the file /etc/security/prof_attr,add the line: Network Management: solaris:cmd:RO::/usr/sbin/cryptoadm:euid=0 

B. To the file /etc/security/auth_attr,add the line:Network Management: solaris:cmd:RO::/usr/sbin/cryptoadm:euid=0 

C. To the file /etc/security/exec_attr.d/local-entriies,add the line:Network Management: solaris:cmd:RO::/usr/sbin/cryptoadm:euid=0 

D. Run the roles alice to ensure that alice may assume the role sadmin. 

E. Run the command profiles sadmin to ensure that the role sadmin includes the network Management profile. 

F. Run the command profiles alice to ensure that the Alice has permissions to access the Network management profile. 

G. Run the command profiles “Network management” to ensure that the Network management profile includes the sadmin role. 

Answer: C,D,G 


C: /etc/security/exec_attr is a local database that specifies the execution attributes associated with profiles. The exec_attr file can be used with other sources for execution profiles,including the exec_attr NIS map and NIS+ table. 

A profile is a logical grouping of authorizations and com-mands that is interpreted by a profile shell to form a secure execution environment.