1Z0-821 | A Review Of High quality 1Z0-821 exam dumps


Q121. - (Topic 2) 

You upgraded your server to Oracle Solaris 11 and you imported zpool (pool1) that was created in Solaris 10. You need to create an encrypted ZFS file system in pool1,but first you need to make sure that your server supports ZFS encryption. 

Which four statements are true for support of ZFS encryption? 

A. The encrypted file system must have been created in Oracle Solaris11. To encrypt a ZFS file system from a previous version of Solaris,upgrade the zpool and create a new encrypted ZFS file system into the encrypted ZFS file system. 

B. If you plan to create an encrypted file system in an existing zpool,the zpool must be upgraded to ZFS version 30. 

C. ZFS encryption is integrated with the ZFS command set and no additional packages need to be installed. 

D. ZFS encryption requires that the ZFS Dataset Encryption package be installed. 

E. If you plan to create an encrypted file system in an existing zpool,the pool must be upgraded to ZFS version 21,minimum. 

F. Encryption is supported at the pool or dataset (file system) level. 

G. Encryption is supported at the pool level only for every file system in the pool will be encrypted. 

H. You cannot create an encrypted file system in a zpool that was created prior to oracle Solaris11. Create a new zpool in Solaris11,create an encrypted ZFS file system in the new zpool,and move or copy the data from the existing file system into the new encrypted file system. 

Answer: A,B,C,F 

Explanation: 

A (not H): You can use your existing storage pools as long as they are upgraded. You have 

the flexibility of encrypting specific file systems. 

B(not E): Can I enable encryption on an existing pool? 

Yes,the pool must be upgraded to pool version 30 to allow encrypted ZFS file systems and 

volumes. 

C(not D): ZFS encryption is integrated with the ZFS command set. Like other ZFS 

operations,encryption operations such as key changes and rekey are performed online. 

F (not G): Encryption is the process in which data is encoded for privacy and a key is 

needed by the data owner to access the encoded data. You can set an encryption policy 

when a ZFS dataset is created,but the policy cannot be changed. 

Q122. - (Topic 2) 

You are going to use the- Automated installer (AI) to install a non global zone named zone1. You have created a custom manifest for the non-global zone and named it zone1manifest Which command will you use to add this custom manifest to the s11-sparc install service and associate this custom manifest with the non-global zone? 

A. installadm create-profile -n s11-sparc -f /tmp/zone1manifest.xml - c 

B. installadm create-manifest -n s11-sparc -f /tmp/zone1manifest.xml -m 

C. installadm create-client -n s11-sparc -f /tmp/zone1manifest.xml -m zone1manifest -c zonename= “zone1” 

D. installadm create-service - n s11-sparc -f /tmp/zone1manifest.xml -m zone1manifest - c zonename=”zone1” 

Answer:

Explanation: 

installadm add-manifest 

Associates manifests with a specific install service,thus making the manifests available on the network,independently from creating a service. When publishing a non-default manifest, it is required to associate criteria either via criteria entered on the command line (-c) or via a criteria XML file (-C). 

Q123. - (Topic 2) 

What is the output of the following command,if executed using the default shell for the root role account of a standard Live CD Install of Oracle Solaris 11? 

echo '$SHELL' 

A. /usr/bin/bash 

B. /usr/bin/ksh 

C. $SHELL 

D. the PID for the current shell 

Answer:

Explanation: 

Single quotes are most strict. They prevent even variable expansion. Double quotes prevent wildcard expansion but allow variable expansion. For example: #!/bin/sh echo $SHELL echo "$SHELL" echo '$SHELL' This will print: /usr/bin/bash /usr/bin/bash $SHELL 

Q124. - (Topic 1) 

User1 is attempting to assist user2 with terminating user2's process 1234. 

User1 entered the following: kill -9 1234 

Why does the process continue to run? 

A. You can kill a process only if you are root. 

B. You can kill only a process that you own. 

C. You can kill the process only with the pkill command. 

D. You need to kill the process with a stronger kill signal. 

Answer:

Explanation: 

Kill -9 

Kill (terminates without cleanup) 

Only works if issued by process owner or super user (root) 

The program cannot respond to this signal; it must terminate 

Note: Unix provides security mechanisms to prevent unauthorized users from killing other processes. Essentially,for a process to send a signal to another,the owner of the signaling process must be the same as the owner of the receiving process or be the superuser. 

Q125. - (Topic 1) 

The OpenBoot firmware controls the operation of the system before the operating system is loaded. 

Which four tasks are directly controlled by the OpenBoot firmware? 

A. Provides a list of boot entries from which to choose 

B. Allows hardware to identify itself and load its own plug-in device driver 

C. Loads the boot loader from the configured boot device 

D. Performs basic hardware testing 

E. Installs the console 

F. Reads and executes the boot archive 

G. Extract and executes the kernel image 

Answer: A,B,C,D 

Explanation: 

OpenBoot firmware is executed immediately after you turn on your system. The primary tasks of OpenBoot firmware are to: 

*

 Test and initialize the system hardware (D) 

*

 Determine the hardware configuration (D) *Boot the operating system from either a mass storage device or from a network *Provide interactive debugging facilities for testing hardware and software 

*

 Plug-in Device Drivers (B) 

Most common tasks that you perform using OpenBoot 

*

 Booting Your System 

The most important function of OpenBoot firmware is to boot the system. 

Note: If auto-boot? is true,the system will boot from either the default boot device or from 

the diagnostic boot device depending on whether OpenBoot is in diagnostic mode. (C) 

Some notable features of OpenBoot firmware. 

Q126. - (Topic 1) 

A user jack,using a bash shell,requests a directory listing as follows: 

Which three statements are correct? 

A. The pattern dir? will expand to dira dirb dirc. 

B. The pattern dir*a will expand to diraa. 

C. The pattern dir*a will expand to dira diraa. 

D. The pattern dir*b? will expand to dirabc. 

E. The pattern dir*b? will expand to dirb dirabc. 

Answer: A,C,D 

Explanation: 

A: dir followed by a single letter. 

C: dir followed by any characters ending with a. 

D: dir followed by any characters,then character b,then one single character. 

only dirabc matches 

Q127. - (Topic 2) 

You are logged in to a Solaris 11 system as user jack. You issue the following sequence of 

commands: 

Identify two correct statements. 

A. You have the effective privilege of the account root. 

B. Your GID is 10. 

C. Your home directory is /root. 

D. You are running the shell specified for the account root. 

E. Your UID is 1. 

Answer: A,B 

Explanation: 

Oracle Solaris provides predefined rights profiles. These profiles,listed in the /etc/security/prof_attr,can be assigned by the root role to any account. The root role is assigned all privileges and all authorizations,so can perform all tasks,just as root can when root is a user. 

To perform administrative functions,you open a terminal and switch the user to root. In that terminal,you can then perform all administrative functions. 

$ su - root Password: Type root password # When you exit the shell,root capabilities are no longer in effect. 

Q128. - (Topic 2) 

Given the following output of the zpool status command: 

Identify the correct statement regarding pool1’s configuration. 

A. Data written to pool1 will be stripped across four disk components. 

B. The rsdz1-0 and c3t640 components are submirrors of pool1. 

C. Data will only be stripped across the three disks in rsidz configuration. 

D. The configuration is a bug in Solaris 11; it cannot be created by an administrator. 

Answer:

Q129. - (Topic 2) 

You are installing the Oracle Solaris 11 Operating System by using the Text Installer. Which two options describe the features associated with the Text Installer? 

A. It can be used to install only SPARC systems. 

B. It installs gnome as the default user environment on a system capable of displaying a graphical environment. 

C. You can choose whether root is a role or user account. 

D. You can do both automatic and manual configuration of the network. 

E. You can select how to configure the remaining network interfaces. 

Q130. - (Topic 2) 

A user on the system has started a process,but it needs to be terminated. 

The process ID was determined as follows: 

pgrep userprogram 

l5317 

The user attempted to terminate the program as follows: 

pkill 15317 

This command runs without an error message,and the process continues to run. 

What is the issue? 

A. You need to run the pkill command with the process name. 

B. You need to switch to super user to kill the process. 

C. You need to run the ps command to get more information. 

D. You need to run the prstat command to get more information. 

Answer:

Explanation: 

You can use the pgrep and pkill commands to identify and stop command processes that you no longer want to run. These commands are useful when you mistakenly start a process that takes a long time to run. 

To terminate a process: 

Type pgrep to find out the PID(s) for the process(es). 

Type pkill followed by the PID(s). 

You can kill any process that you own. Superuser can kill any process in the system except for those processes with process IDs of 0,1,2,3,and 4. Killing these processes most likely will crash the system.