You will get the actual comprehensive description whenever you encounter difficulties on your [productsort] study. Examcollection provide you the actual [productsort] Oracle Solaris 10 System Administrator Certified Professional Exam, Part II key points legibly in the [productsort] puts. These types of significantly saving your own expenditures to get familiar with the actual Oracle courses.

2021 Aug 1Z0-878 download

Q1. RAG DROP 

Click the exhibit button 

Answer: 


Q2. When your Solaris system is booted, a startup script initializes the rpcbind service. Which script is it? 

A. /etc/rcS.d/S30network 

B. /lib/svc/method/rpc-bind 

C. /lib/svc/method/net-physical 

D. svc:/network/rpc/bind:default 

Answer: B 


Q3. Based on the business needs of the company, highly available data are very important. However, the cost of a fully mirrored data configuration is beyond the current financial resources of the company. Which RAID configuration should be used to hold the company's data? 

A. RAID 0 

B. RAID 1 

C. RAID 5 

D. RAID 0+1 

E. RAID 1+0 

Answer: C 


Q4. Given the line taken from the syslogd daemon configuration file: mail.debug /var/adm/messages 

What is the result of implementing this entry? 

A. Assuming a remote loghost is configured, the mail.debug messages are logged locally and remotely. 

B. The mail.debug messages are logged locally in the /var/adm/messages file, regardless of any loghost alias. 

C. The mail.debug messages are logged remotely if a remote host is configured in the /etc/inet/hosts file. 

D. The mail.debug messages are not logged at all because the /var/adm/messages file is for kernel messages only. 

Answer: B 


Q5. SystemA has a file system named /data/dbase that is being shared. systemB needs to mount that file system so that users on systemB can access the data remotely on systemA. The information in the /data/dbase file system is confidential and access to that data must be restricted so that only user1 and user2 can access the data from systemB. 

Which answer describes a method to protect the data on systemA so that only specific users on system can access that data? 

A. Share the file system on systemA as follows: share -F nfs -o rw=systemB /data/dbase. On systemB, mount the file system as follows: mount -F nfs -o hard,rw=user1,user2 systemA:/data/dbase /data 

B. Share the file system on systemA as follows: share -F nfs -o rw=systemB:user1,user2 /data/dbase 

C. On systemA, protect the /data/dbase directory using conventional UNIX permissions so that only user1 and user2 can access the data. 

D. On systemA, protect the /data/dbase directory using conventional UNIX permissions so that only user1 and user2 can access the data. Then, share the file system on systemA as follows: 

Answer: D 


1Z0-878  pdf exam

Regenerate 1Z0-878 simulations:

Q6. You are installing a SPARC system using a custom jumpstart installation. You want to automate the installation as much as possible and would like to avoid answering questions normally presented during the system identification phase of the installation. You choose to perform a Custom JumpStart installation. 

Which answers describe system identification information that can be obtained from the identification service provided by the boot-server? (Choose three.) 

A. Hostname 

B. Domain name 

C. Root password 

D. Software group selection 

E. Disk partitioning and file system specifications 

Answer: A,B,C 


Q7. Which two processes and daemons are executed by the /usr/lib/netsvc/yp/ypstart script on an NIS slave server? (Choose two.) 

A. ypbind 

B. ypinit 

C. ypserv 

D. ypxfrd 

Answer: A,C 


Q8. Your x86-based system has a ZFS file system named /files on the c0d1 drive. You want to rename this file system, so that every time the system boots, it is automatically mounted under the name /data. Which answer describes how to change the ZFS file system name from /files to /data? 

A. zfs set mountpoint=/data data 

B. zfs destroy files;zfs create /data 

C. zfs destroy -f files; zpool create data c0d1 

D. Create a directory named /data, then change /files to /data in the /etc/vfstab file. 

Answer: A 


Q9. A Solaris 10 OS is configured to log to the /var/adm/messages file using syslog. Which two statements are correct? (Choose two.) 

A. The logadm utility automatically rotates the /var/adm/messages file. 

B. The tail -f /var/adm/messages command can be used to monitor the /var/adm/messages file in real time. 

C. The syslog facility automatically trims the /var/adm/messages file, deleting messages that are more than twenty-four hours old. 

D. The /var/adm/messages file is a DBF formatted binary file. The Solaris Management Console Log Viewer GUI is the only way to monitor the /var/adm/messages file in realtime. 

E. The /var/adm/messages file only contains the severity of the message. The facility of the message must be interpreted using the process name and ID contained in the message. 

Answer: A,B 


Q10. You have a spare disk on your x86-based Solaris system, c1t0d0, and you would like to create a ZFS file system on it. Given the following requirements: 

Which command(s) would you use to setup the ZFS file system? 

A. zpool create data c1t0d0 

B. zpool create data c1t0d0; zfs create data/data 

C. zpool create data data c1t0d0; make an entry in the /etc/vfstab file 

D. zpool create data c1t0; zfs create data/data; newfs /dev/rdsk/data/data; make entry in the /etc/vfstab file 

Answer: A