1Z0-821 | 10 Tips For Updated 1Z0-821 pdf


Q11. - (Topic 2) 

You run the command dlstat show-link -r. 

Select the two correct statements regarding the information displayed in the INTRS column. 

A. No value is listed for virtual network interfaces. 

B. A value of 0 is listed for virtual interfaces and ether stubs. 

C. The number of Interrupts is listed,which indicates network efficiency. 

D. A number equal to the number of transmitted Ethernet frames is listed for physical links. 

E. The number of packets that were interrupted by a collision is listed,which may indicate hardware problems. 

Answer: C,E 

Explanation: 

In this output,the statistics for interrupt (INTRS) are significant. Low interrupt numbers indicate greater efficiency in performance. If the interrupt numbers are high,then you might need to add more resources to the specific link. 

Example: # dlstat -r -i 1 LINK IPKTS RBYTES INTRS POLLS CH<10 CH10-50 CH>50 e1000g0 101.91K 32.86M 87.56K 14.35K 3.70K 205 5 nxge1 9.61M 14.47G 5.79M 3.82M 379.98K 85.66K 1.64K vnic1 8 336 0 0 0 0 0 e1000g0 0 0 0 0 0 0 0 nxge1 82.13K 123.69M 50.00K 32.13K 3.17K 724 24 vnic1 0 0 0 0 0 0 0 

Note: dlstat show-link [-r [-F] | -t] [-i interval] [-a] [-p] [ -o field[,...]] [-u R|K|M|G|T|P] [link] Display statistics for a link. 

-r Display receive-side statistics only. Includes bytes and packets received,hardware and software drops,and so forth. 

List of supported RX fields: 

link iusedby ibytes ipkts intrs polls hdrops: hardware drops sdrops: software drops (owing to bandwidth enforcement) ch<10: number of packet chains of length < 10 ch10-50: number of packet chains of length between 10 and 50 ch>50: number of packet chains of length > 50 

Q12. - (Topic 1) 

You want the system to generate an email notification each time one of the services has changed its state. Which option would send an email message to the system administrator whenever a service changes to the maintenance state? 

A. Use the setsc command in ALOM to enable the mail alerts to be sent to a specified email address whenever the fault management facility detects a service change to the maintenance state. 

B. Make an entry in the /etc/syslog.conf file to instruct syslogd to send an email alert when it receives a message from the SMF facility that a service has changed to the maintenance state. 

C. Use the svccfg setnotify command to create a notification and send an email when a service enters the maintenance state. 

D. Use the scvadm command to enable the notification service. Set the –g maintenance option on the netnotify service to send an email when a service enters the maintenance state. 

Answer:

Explanation: 

This procedure causes the system to generate an email notification each time one of the services or a selected service has a change in state. You can choose to use either SMTP or SNMP. Normally,you would only select SNMP if you already have SNMP configured for some other reason. 

By default,SNMP traps are sent on maintenance transitions. If you use SNMP for monitoring,you can configure additional traps for other state transitions. 

1.

 Become an administrator or assume a role that includes the Service Management rights profile. 

2.

 Set notification parameters. 

Example: The following command creates a notification that sends email when transactions go into the maintenance state 

# /usr/sbin/svccfg setnotify -g maintenance mailto:sysadmins@example.com 

Q13. - (Topic 2) 

A change in your company’s security policy now requires an audit trial of all administrators assuming the sysadm role,capturing: 

There are two command necessary to accomplish this change. One is a rolemod command. What is the other? 

A. auditconfig set policy=argv 

B. auditconfig -setpolicy +argv 

C. auditconfig -setflags lo,ex sysadm 

D. auditconfig set flags=lo,ex sysadm 

Answer:

Explanation: 

Audit Significant Events in Addition to Login/Logout (see step 2 below) 

Use this procedure to audit administrative commands,attempts to invade the system,and 

other significant events as specified by your site security policy. 

For all users and roles,add the AUE_PFEXEC audit event to their preselection mask. 

# usermod -K audit_flags=lo,ps:no username 

# rolemod -K audit_flags=lo,ps:no rolename 

# auditconfig -setpolicy +argv 

3- Record the environment in which audited commands are executed. 

# auditconfig -setpolicy +arge 

Note: [-t] -setpolicy [+|-]policy_flag[,policy_flag ...] 

Set the kernel audit policy. A policy policy_flag is literal strings that denotes an audit policy. 

A prefix of + adds the policies specified to the current audit policies. A prefix of - removes 

the policies specified from the current audit policies. No policies can be set from a local 

zone unless the perzone policy is first set from the global zone. 

Q14. - (Topic 1) 

You need to make sure that all of the software packages on your server are up to date. Without installing any updates,which two commands would display .my software updates that are available in the default Oracle repository? 

A. pkg list -u 

B. pkg verify –u ‘*’ 

C. pkg search –u 

D. pkg info –r ‘*’ 

E. pkg install –nv 

F. pkg update –nv ‘*’ 

Answer: A,D 

Explanation: 

A: the pgk list command display a list of packages in the current image,including state and other information. By default,package variants for a different architecture or zone type are excluded. 

D: pkginfo displays information about software packages that are installed on the system (with the first synopsis,with -l) or that reside on a particular device or directory (with the second synopsis,with -r). 

Without options,pkginfo lists the primary category,package instance,and the names of all completely installed and partially installed packages. It displays one line for each package selected. 

With -r,retrieve the data from the repositories of the image's configured publishers. Note that you must specify one or more package patterns in this case. 

Q15. - (Topic 1) 

Which two accurately identify features of a Solaris 10 branded zone? 

A. executes in a Solaris 10 global zone 

B. is created by importing a Solaris 10 flash archive 

C. enables Linux binary applications to run unmodified 

D. provides a complete runtime environment for Solaris 9 applications 

E. allows a Solaris 10 global zone to be migrated into a Solaris 10 non-global zone on a Solaris 11 system 

Answer: B,E 

Explanation: 

B: It can be created by importing a Solaris 10 flash archive. 

You can use the Oracle Solaris Flash archiving tools to create an image of an installed 

system that can be migrated into a zone. 

The system can be fully configured with all of the software that will be run in the zone before the image is created. This image is then used by the installer when the zone is installed. 

Note: You can use alternate methods for creating the archive. The installer can accept the following archive formats: 

*

 cpio archives 

*

 gzip compressed cpio archives 

*

 bzip2 compressed cpio archives 

*

 pax archives created with the -x xustar (XUSTAR) format . ufsdump level zero (full) backups 

Note: 

Branded zones that run an environment different that the OS release on the system 

*

 The lx branded zone introduced in the Solaris 10 8/07 release provides a Linux environment for your applications and runs on x86 and x64 machines on the Oracle Solaris 10 OS. 

*

 The solaris8 and solaris9 branded zones enable you to migrate an Oracle Solaris 8 or Oracle Solaris 9 system to an Oracle Solaris 8 or Oracle Solaris 9 Container on a host running the Oracle Solaris 10 8/07 Operating System or later Oracle Solaris 10 release. 

*

 The Oracle Solaris 10 Container brand is available in OpenSolaris build 127. These branded zones host Oracle Solaris 10 user environments. 

Note: One of the powerful features of Solaris 11 is the ability to run a Solaris 10 environment in a zone. Solaris 10 allows you to run Solaris 8 and 9 environments in zones,but only on SPARC. 

Q16. - (Topic 2) 

You are attempting to troubleshoot an event that should have made an entry into the messages log. This event happened about two weeks ago. Which file should you look at first? 

A. /var/adm/messages 

B. /var/adm/messages.0 

C. /var /adm/messagas.1 

D. /var/adm/messages.2 

E. /var/adm/messages.3 

Answer:

Explanation: 

The /var/adm/messages is the file to which all the messages printed on the console are logged to by the Operating System. This helps to track back check the console messages to troubleshoot any issues on the system. 

Syslog daemon also writes to this /var/adm/messages file. 

The /var/adm/messages file monitored and managed by newsyslog and its configuration file is /usr/lib/newsyslog. 

This script runs as the roots cron job everyday,checks the /var/adm/messages file and copies/moves it to /var/adm/messages.0,1,2,3,4,5,6,7. In other words,it does the Log Rotation for the /var/adm/messages. In an event the /var file system is running out of space,these files needs to checked and can be removed (not the actual /var/adm/messages itself) to free up space on the file system. However,care has to be taken,if you decide to empty the /var/adm/messages itself for any reason. This process is called Truncation. 

SOLARIS SYSTEM ADMIN TIPS,/var/adm/messages 

Q17. - (Topic 2) 

You have completed configuring a zone named dbzone on your Solaris 11 server. The configuration is as following: 

The global zone displays the following network information: 

The zone has never been booted. Which three options correctly describe this zone? 

A. It is a sparse root zone. 

B. It is a whole root zone. 

C. It is an immutable zone. 

D. It is a native zone. 

E. The zone shares the network interface with the host. 

F. The zone uses a virtual network interface. 

G. The hostid is the same as the global zone. 

H. The IP address of the zone is 10.0.2.18. 

Answer: C,E,G 

Explanation: 

C: Immutable Zones provide read-only file system profiles for solaris non-global zones. 

Note that ip-type: exclusive: 

Starting with OpenSolaris build 37 and Oracle Solaris 10 8/07,a default zone can be 

configured as an "exclusive-IP zone" which gives it exclusive access to the NIC(s) that the 

zone has been assigned. Applications in such a zone can communicate directly with the 

NIC(s) available to the zone. 

Note on zones: 

After installing Oracle Solaris on a system,but before creating any zones,all processes run 

in the global zone. After you create a zone,it has processes that are associated with that 

zone and no other zone. Any process created by a process in a non-global zone is also 

associated with that non-global zone. 

Any zone which is not the global zone is called a non-global zone. Most people call non-

global zones simply "zones." Some people call them "local zones" but this is discouraged. 

The default native zone file system model on Oracle Solaris 10 is called "sparse-root." This 

model emphasizes efficiency and security at the cost of some configuration flexibility. 

Sparse-root zones optimize physical memory and disk space usage by sharing some 

directories,like /usr and /lib. Sparse-root zones have their own private file areas for 

directories like /etc and /var. Whole-root zones increase configuration flexibility but increase 

resource usage. They do not use shared file systems for /usr,/lib,and a few others. 

There is no supported way to convert an existing sparse-root zone to a whole-root zone. 

Creating a new zone is required. 

Q18. - (Topic 1) 

User brian changes the permissions for db_data this command: 

chmod 4755 db_data 

What is true? 

A. db_data now has permissions rwsr-xr-x and can be deleted only by user brian. 

B. db_data now has permissions rwsr-xr-x and,if executed,will inn with the permissions of user brian. 

C. db_data now has permissions rwxr-sr-x and can be deleted only by members of the group owning it. 

D. The permissions for db_data cannot be determined,because the permissions prior to the change have not been specified. 

E. db_data must be an ordinary file,because special permissions cannot be set on a directory. 

Answer:

Explanation: 

Use the chmod command to change permissions for a file or directory. You must be the 

owner of a file or directory,or have root access,to change its permissions. 

Here we do not know if brian owns db_data. 

Note: 

Permission 

7 full 

6 read and write 

5 read and execute 

4 read only 

3 write and execute 

2 write only 

1 execute only 

0 none 

0 --- no permission 

1 --x execute 

2 -w- write 

3 -wx write and execute 

4 r-- read 

5 r-x read and execute 

6 rw- read and write 

7 rwx read,write and execut 

Solaris: Solaris Advanced User's Guide 

Q19. - (Topic 1) 

To confirm the IP address and netmask have been correctly configured on the network interfaces which command should you use? 

A. ipdilm show-if 

B. ipadm show-nic 

C. ipadm show-addr 

D. ipadm show-ifconfig 

E. ipadm show-addripadm show-mask 

Answer:

Explanation: 

Show address information,either for the given addrobj or all the address objects configured on the specified interface,including the address objects that are only in the persistent configuration. 

State can be: disabled,down,duplicate,inaccessible,ok,tentative 

Example: # ipadm show-addr ADDROBJ TYPE STATE ADDR lo0/v4 static ok 127.0.0.1/8 lo0/v6 static ok ::1/128 

Q20. - (Topic 2) 

You display the IP interface information with ipmpstat -i. 

Which two characteristics are indicated by characters that may be included in the FLAGS column? 

A. default route 

B. IP forwarding enabled IS 

C. allocated to global zone 

D. unusable due to being inactive 

E. nominated to send/receive IPv4 multicast for its IPMP group 

Answer: D,E 

Explanation: 

FLAGS Indicates the status of each underlying interface,which can be one or any combination of the following: 

(D)

 d indicates that the interface is down and therefore unusable. 

 (E)

 M indicates that the interface is designated by the system to send and receive IPv6 multicast traffic for the IPMP group. 

Note: 

i indicates that the INACTIVE flag is set for the interface. Therefore,the interface is not 

used to send or receive data traffic. 

s indicates that the interface is configured to be a standby interface. 

m indicates that the interface is designated by the system to send and receive IPv4 

multicast traffic for the IPMP group. 

b indicates that the interface is designated by the system to receive broadcast traffic for the 

IPMP group. 

h indicates that the interface shares a duplicate physical hardware address with another 

interface and has been taken offline. The h flag indicates that the interface is unusable.