1Z0-877 | how many questions of 1Z0-877 vce?


Q11. Given/var/svc/log/network-ssh:default.log: 

[ Jan 26 16:54:28 Leaving maintenance because clear requested. ] 

[ Jan 26 16:54:28 Enabled. ] 

[ Jan 26 16:54:28 executing start method ("/lib/svc/method/sshd start") ] 

Could not load host key: /etc/ssh/ssh_host_rsa_key 

Could not load host key: /etc/ssh/ssh_host_dsa_key 

Disabling protocol version 2. Could not load hostkey or GSS-API mechanisms 

sshd: no hostkeys available -- exiting. 

[ Jan 26 16:54:28 Method "start" exited with status 1 ] 

Which two statements are true? (Choose two.) 

A. Users will not be able to use ssh to log into this system. 

B. The root user must generate a public/private key pair to allow the ssh service to start. 

C. The #svcadm clear ssh command will fix this problem. 

D. For the ssh service, svcs will currently show this: online 16:54:28 svc:/network/ssh:default 

E. There are host key files in /etc/ssh. 

Answer: A,B 

Q12. When modifying the Solaris boot behavior on an x86-based server, the modification can be permanent or temporary. Which describes the procedure used to change the boot behavior temporarily, for a single boot cycle, until the next time that the system is booted? 

A. Edit the bootenv.rc file with the temporary boot command. 

B. Use the kernel command to set the temporary boot command. C. Use the eeprom command to set the temporary boot command. D. Modify the boot_archive file with the temporary boot command. E. Use the bootadm command to set the temporary boot command. 

Answer:

Q13. While listing the contents of a directory on a Solaris system, some files are attributed to a user ID number, rather than to a user name. What caused this? 

A. The user originally owning the files was deleted. 

B. A non-privileged user issued a chown command and changed the owner of a file to a non- existent user. 

C. You are NOT allowed to access the password file. completed.

D. The user owning the files has a user name that equals the user ID. 

Answer:

Q14. A user is attempting an ftp connection to a server. A check of the server show the ftp service is online. Which file should you check on the ftp server to see if this user is allowed to use ftp? 

A. /etc/ftpd/ftpusers 

B. /etc/default/ftpusers 

C. /etc/ftpd/ftp.deny 

D. /etc/ftpusers 

Answer:

Q15. You are installing a software application onto your server. The software installation notes specify that the Solaris 10 OS must have patch 104945-02 applied.  You have downloaded the patch into your /home directory and the ls command lists it as follows:  104945-02.zip You are ready to install the patches. Which answer describes the correct procedure for installing the patch? 

A. cp the patch to /var/tmp cd /var/tmp patchadd -p 104945-02 

B. /usr/bin/unzip ~/104945-02.zip patchadd 104945-02.zip 

C. /usr/bin/unzip ~/104945-02.zip cp the patch to /var/tmp cd /var/tmp;patchadd 104945-02 

D. cp the patch to /var/tmp; cd /var/tmp /usr/bin/unzip 104945-02.zippatchadd 104945-02 

Answer:

Q16. Most files in the Solaris OS make use of data blocks. Which two do NOT use data blocks for storage? (Choose two.) 

A. Hard link 

B. Directory 

C. Device file 

D. Symbolic link 

Answer: A,C 

Q17. A colleague has been assigned the task of exporting a ZFS pool and importing it on another system. Your colleague has noticed that other ZFS pools have been exported with the same name and asks you how find the unique identification for the pool before it is exported. Which command should your colleague use? 

A. zfs get all 

B. zpool get all 

C. zpool get guid mpool 

D. zfs get creation mpool 

Answer:

Q18. As the Solaris OS administrator in your department, you have been asked to upgrade a SPARC- based server currently running Solaris 8 OS to the latest Solaris 10 OS release. This server is 

critical to the department's productivity, so this upgrade must be done with minimal downtime and must allow for rollback to the previous version. 

Which installation method should you use? 

A. Live Upgrade 

B. WAN boot installation 

C. Custom JumpStart 

D. Flash Archive 

Answer:

Q19. A corrupted file system is now repaired and back in use. Some, but not all of the files within the file systems have been deleted. The only backup of this file system is a month-old tar archive. This archive will need to be restored as root. Which two statements correctly describe the effects of the restore operation? (Choose two.) 

A. Files found in the file system that are also on tape will NOT be overwritten. 

B. The missing files, present on the backup tape, are restored to the file system with the data as it was when the backup was taken. 

C. The access times are preserved by tar and will reflect the time when a user last accessed the data. 

D. The modification time on the files restored by tar will be preserved and will reflect the time the file was last modified before the backup, NOT the time of the restore operation. 

Answer: B,D 

Q20. To investigate the login problems experienced by user fred, you use su to assume the identity for fred. 

Which command can you use to verify that you have actually assumed the identity for fred? 

A. /usr/bin/id 

B. /usr/bin/finger 

C. /usr/bin/last 

D. /usr/bin/who 

Answer: