Your success in Oracle 1Z0-879 is our sole target and we develop all our 1Z0-879 braindumps in a way that facilitates the attainment of this target. Not only is our 1Z0-879 study material the best you can find, it is also the most detailed and the most updated. 1Z0-879 Practice Exams for Oracle 1Z0-879 are written to the highest standards of technical accuracy.

♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for Oracle 1Z0-879 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 1Z0-879 Exam Dumps (PDF & VCE):
Available on:

Q271. The client-server model describes the communication process between two computers or programs. Which two statements are true about a client in the client server model? 

(Choose two.) 

A. A client machine provides no services. 

B. A client process is a standalone process. 

C. A client machine can provide services to other client applications. 

D. A client process runs continuously, awaiting requests from other programs. 

E. The client is a host or process that uses services from another host or program. 

Answer: C,E 

Q272. You want to implement ZFS on your server, but before attempting to use the ZFS software, you must first verify that your server meets the minimum requirements.  Which answers describe the hardware and software requirements that your server must meet before ZFS can be implemented? (Choose three) 

A. The minimum disk size is 128 Mbytes. 

B. A storage pool requires a minimum of 64 Mbytes. 

C. 1GB of RAM is recommended. 

D. The minimum disk size is 1GB. 

E. A storage pool requires a minimum of 128 Mbytes. 

Answer: A,B,C 

Q273. A system administrator found the following message in the /var/adm/messages file: 

Jan 26 14:44:29 host genunix: [ID 936769 kern.notice] pm0 is /pseudo/pm@0 

Which statement is true? 

A. The message was logged by the kernel. 

B. The message was created by the logger command: 

logger -t genunix -p kern.notice "pm0 is /pseudo/pm@0". 

C. The message was created by the logger command: 

logger "genunix: [ID 936769 kern.notice] pm0 is /pseudo/pm@0". 

D. The message was created by the logger command: 

logger -t genunix -p kern.notice "[ID 936769 kern.notice] pm0 is /pseudo/pm@0". 


Q274. Your Solaris x86-based server has two boot drives. You want to add an entry to the GRUB main menu, so that during the boot process, you can select to boot the server from either of the disk drives. How would you add a new entry to the GRUB main menu to allow the operator to select which drive to boot from? 

A. Edit the bootenv.rc file and enter a value for the altbootpath parameter. 

B. Use the kernel command to edit the boot entries in the GRUB main menu. 

C. Edit the menu.lst file and add an entry for the second boot disk to the GRUB main menu. 

D. When the GRUB menu appears during the boot process, type edit the GRUB menu and enter the command to boot from the alternate disk drive. 

E. Press the space bar when the GRUB menu is visible during the boot process to edit the list of commands and enter the command to boot to the alternate disk drive. 


Q275. Which three can be described with the name SUNW.i86pc? (Choose three.) 

A. a processor type which can use PXE boot 

B. a file system type created during PXE boot 

C. a DHCP client class used during PXE boot 

D. a vendor client class used during PXE boot 

E. a macro defined in DHCP used for PXE boot 

F. a Solaris OS package installed during PXE boot 

Answer: C,D,E 

Q276. While selecting files during an interactive restore with ufsrestore, you are interrupted by a junior administrator before you can complete the file selection process and start the restore. After answering the administrator's question, you realize that you have forgotten which files you had already selected for the restore. How can you determine which files are already marked for extraction and restore? 

A. You can use the ls subcommand of ufsrestore. 

B. You can use the add subcommand of ufsrestore. 

C. You can use the select subcommand of ufsrestore. 

D. You can view the selected files as they are marked with a plus sign (+) in the list that is permanently displayed in the upper half of the interactive ufsrestore screen view. 


Q277. systemA has a file system that is being shared as follows: 

— /data/dbase rw "" 

systemB mounts that file system as follows: 

/data on systemA:/data/dbaseN remote/read/write/setuid/devices/xa11r/dev=4c00002 

On systemB, whenever root tries to create or copy a file to the /data directory, root receives the following error: cannot create. Which answer describes a solution to this problem? 

A. On system A, give root write privileges to the /data/dbase directory. 

B. On systemA, Share /data/dbase as follows: 

share —F nfs —o root=systemB /data/dbase 

C. On systemA, Share /data/dbase as follows: 

share —F nfs —o rw=systemB /data/dbase 

D. On systemB, mount the remote file system as follows: 

mount —F nfs —o rw systemA:/data/dbase /data 


Q278. During system installation, the root password is NOT specified in the sysidcfg file. What action does the JumpStart client take? 

A. The password is left blank. 

B. The client prompts the user for the password. 

C. The client gets the password from the boot server. D. The client gets the password from the install server. E. The client gets the password from the name service. 


Q279. A system will not boot after modification to a critical file on the root file system on /dev/dsk/c0t0d0s0. The system has been booted to the appropriate level to allow access to the disk where the root file system is located and to set the terminal type. Which two commands should you run to make the file system available for edit? (Choose two.) 

A. fsck /dev/rdsk/c0t0d0s0 

B. mount /dev/dsk/c0t0d0s0 / 

C. mount /dev/dsk/c0t0d0s0 /a 

D. fsck /devices/rdsk/c0t0d0s0 

Answer: A,C 

Q280. The root (/) file system exists on d10, which is a mirror that contains submirrors dii and di2. 

Which two are true if submirror d12 is taken offline? (Choose two.) 

A. The d10 mirror is in read-only mode. 

B. The d12 submirror is in read-only mode. 

C. The other submirror, d11, can also be taken offline if needed. 

D. Data redundancy is still provided due to the remaining d11 submirror. 

E. Any writes to the mirror are tracked in a dirty region log, so that d12 can be resynchronized when it is brought back online. 

Answer: B,E