1Z0-879 | The Secret of Oracle 1Z0-879 dumps


Q271. You want to monitor a failed login after five unsuccessful attempts. Which file contains this information? 

A. /var/adm/lastlog 

B. /var/adm/loginlog 

C. /var/adm/sulog 

D. /var/adm/failedloginlog 

Answer:

Q272. Given: 

usermod -R role2 user1 

Which two statements are true? (Choose two.) 

A. The user1 user gets assigned role2. 

B. The user1 user loses all previous roles. 

C. If role2 is a plain user, it becomes a role. 

D. If the user1 user is a role, it becomes a plain user. 

E. The user1 user gets all authorizations from role2. 

Answer: A,B 

Q273. Given: 

What is the result? 

A. A new fssnap image of the /export/home file system is created. 

B. Detailed information about the /export/home snapshot is displayed. C. An existing fssnap image of /export/home for read only is mounted. D. The /export/home snapshot is used as input to the fssnap command. 

Answer:

Q274. Commands can be listed in multiple profiles with different attributes. Additionally, the system takes the default profiles into account. 

Which description matches the algorithm the Solaris system uses to determine the attributes of an executable? 

A. The system searches the profiles in order, starting with the default profiles from /etc/security/policy .conf, the profiles in user_attr(4), followed by All, if NOT already specified. 

B. The system searches the profiles in order, starting with the profiles in user_attr(4), then the default profiles from /etc/security/policy .conf, followed by All, if NOT already specified. 

C. The order of the profiles listed is irrelevant. The system applies the best match, ignoring possible earlier wild card matches, preferring profiles from user_attr(4)- 

D. The order of the profiles listed is irrelevant. The system applies the best match, ignoring possible earlier wild card matches. 

E. The order of the profiles listed is irrelevant. The system applies the best match, ignoring possible earlier wild card matches, preferring the default profile from /etc/security/policy. conf. 

Answer:

Q275. You type the command: 

# rolemod -A solaris.grant -P "Network Admin" operator 

What is the result? 

A. The existing role account named operator is assigned the authorization named solaris. grant 

and the profile named Network Admin. 

B. A new role account named operator is created and is assigned the authorization named solaris. grant and the profile named Network Admin. 

C. The existing regular user account named operator is assigned the authorization named 

solaris. grant and the profile named Network Admin. 

D. A new regular user account named operator is created and assigned the authorization named solaris. grant and the profile named Network Admin. 

Answer:

Q276. This option, when used with the ifconfig command, makes the kernel communicate to the network interface and sets up the streams needed by IP to use the device. Which option is it? 

A. start B. plumb C. anycast 

D. broadcast 

Answer:

Q277. Given this line from the name service configuration file: 

hosts:nis [NOTFOUND=return] files 

Which two statements correctly describe the behavior of the name service switch? 

(Choose two.) 

A. If NIS were unavailable, the attempt to locate a host's IP address would be abandoned. 

B. If NIS were unavailable, the attempt to locate the host's address would be continued within the local file (/etc/inet/hosts). 

 (Choose two.)C. If NIS were available, but a host IP address was NOT in the NIS map, the attempt to locate the host's address would be abandoned. 

D. If NIS were available, but a host IP address was NOT in the NIS tables, the attempt to locate the host's address would be continued by searching for it in the local file (/etc/inet/hosts). 

Answer: B,C 

Q278. You have been assigned a task to create in new profile file for the jumpstart server. Which profile keyword packages that will be installed on the client? 

A. install_type 

B. cluster 

C. system_type 

D. partitioning 

Answer:

Q279. You have completed configuring the WAN Boot server and have registered the client on the server. You are now ready to boot the client and begin the WAN Boot installation. Which command is used to initiate the WAN Boot installation from the client? (Choose two.) 

A. boot net -install 

B. boot net -wanboot 

C. boot net -F wanboot -install 

D. boot cdrom -o prompt -F wanboot -install 

Answer: A,D 

Q280. You have a stable and mature system that is running out of disk space in the /var file system. You want to avoid the creation of unix.X and vmcore.X files. By default, the system will transfer crash dump information following a panic into unix.X and vmcore.X files when the system reboots. Which command disables this default behavior? 

A. dumpadm -n 

B. dumpadm -y 

C. dumpadm -s 

D. dumpadm -c 

Answer: