[Free] 2018(Mar) EnsurePass Passguide Oracle 1z0-821 Dumps with VCE and PDF 31-40

Ensurepass.com : Ensure you pass the IT Exams
2018 Mar Oracle Official New Released 1z0-821
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/1z0-821.html

Oracle Solaris 11 System Administration

Question No: 31 – (Topic 1)

You log in to the system as user1,then switch user to root by using the su – command. After entering the correct password,yon enter the following commands:

whoami;who am i;id

Which option correctly represents the output?

Ensurepass 2018 PDF and VCE

  1. Option A

  2. Option B

  3. Option C

  4. Option D

Answer: B Explanation:

  • The whoami utility displays your effective user ID as a name. Here this would be root.

  • who am i

    The command who shows who is logged on. Here this would be:

    user1 console Dec 30 20:20

  • The id utility displays the user and group names and numeric IDs,of the calling process,to the standard output. If the real and effective IDs

    are different,both are displayed,otherwise only the real ID is dis- played.

    Here this would be: uid=0(root) gid=0(root)

    Note:

    Each UNIX proces has 3 UIDs associated to it. Superuser privilege is UID=0.

    Real UID

    —-

    This is the UID of the user/process that created THIS process. It can be changed only if the running process has EUID=0.

    Effective UID

    ——-

    This UID is used to evaluate privileges of the process to perform a particular action. EUID can be change either to RUID,or SUID if EUID!=0. If EUID=0,it can be changed to anything.

    Saved UID

    —–

    If the binary image file,that was launched has a Set-UID bit on,SUID will be the UID of the owner of the file. Otherwise,SUID will be the RUID.

    Question No: 32 – (Topic 1)

    When speakingtoan Oracle Support Engineer,you are asked to verify the version of the Solaris 11 build currently running on your system.

    Which command would display the Solaris 11 build version currently running on your system?

    1. pkg info all

    2. cat /etc/release

    3. cat /etc/update

    4. prtconf | grep -i update

    5. pkg info entire

    Answer: B Explanation:

    Which Solaris release you are running on your system can be determined using the following command:

    cat /etc/release

    This will tell you which release you are running and when it was released. The more recent your system,the more info is contained in this file.

    Example:

    # cat /etc/release

    Oracle Solaris 10 8/11 s10s_u10wos_17b SPARC

    Copyright (c) 1983,2011,Oracle and/or its affiliates. All rights reserved. Assembled 23 August 2011

    Question No: 33 – (Topic 1)

    You are asked to determine user jack’s default login directory. Which command would provide you with useful information?

    1. cat /etc/passwd | grep jack

    2. cat /etc/group | grep jack

    3. cat /etc/shadow | grep jack

    4. cat /etc/default/passwd | grep jack

      Answer: A Explanation:

      The /etc/passwd contains one entry per line for each user (or user account) of the system. All fields are separated by a colon (:) symbol. Total seven fields as follows.

      1. Username: It is used when user logs in. It should be between 1 and 32 characters in length.

      2. Password: An x character indicates that encrypted password is stored in /etc/shadow file.

      3. User ID (UID): Each user must be assigned a user ID (UID). UID 0 (zero) is reserved for root and UIDs 1-99 are reserved for other predefined accounts. Further UID 100-999 are reserved by system for administrative and system accounts/groups.

      4. Group ID (GID): The primary group ID (stored in /etc/group file)

      5. User ID Info: The comment field. It allow you to add extra information about the users such as user#39;s full name,phone number etc. This field use by finger command.

      6. Home directory: The absolute path to the directory the user will be in when they log in. If this directory does not exists then users directory becomes /

      7. Command/shell: The absolute path of a command or shell (/bin/bash). Typically,this is a shell. Please note that it does not have to be a shell.

        Question No: 34 – (Topic 1)

        The following line is from /etc/shadow in a default Solaris 11 Installation:

        jack: $5$9JFrt54$7JdwmO.F11Zt/ jFeeOhDmnw93LG7Gwd3Nd/cwCcNWFFg:0:15:30:3::: Which two are true?

        1. Passwords for account jack must be a minimum of 15 characters long.

        2. The password for account jack has expired.

        3. The password for account jack has 5 characters.

        4. A history of 3 prior passwords for the account jack is kept to inhibit password reuse.

        5. The minimum lifetime for a password for account jack is 15 days.

    Answer: B,E Explanation:

    From the content of the /etc/shadow file we get:

  • username: jack

  • encrypted password: $5$9JFrt54$7JdwmO.F11Zt/ jFeeOhDmnw93LG7Gwd3Nd/cwCcNWFFg

  • Last password change (lastchanged): Days since Jan 1,1970 that password was last changed: 0

  • Minimum: The minimum number of days required between password changes i.e. the number of days left before the user is allowed to change his/her password: 15

    Maximum: The maximum number of days the password is valid (after that user is forced to change his/her password): 30 Warn : The number of days before password is to expire that user is warned that his/her password must be changed: 3

  • Inactive : The number of days after password expires that account is disabled

  • Expire : days since Jan 1,1970 that account is disabled i.e. an absolute date specifying when the login may no longer be used

    Question No: 35 – (Topic 1)

    User jack logs in to host solaris and then attempts to log in to host oracle using ssh. He receives the following error message:

    The authenticity of host oracle (192.168.1.22) can#39;t be established. RSA key fingerprint is 3B:23:a5:6d:ad:a5:76:83:9c:c3:c4:55:a5:18:98:a6

    Are you sure you want to continue connecting (yes/no)?

    Which two are true?

    1. The public host key supplied by solaria is not known to the host oracle.

    2. The error would not occur if the RSA key fingerprint shown in the error message was added to the /etc/ssh/known_hosts file on solaris.

    3. The private host key supplied by oracle is not known to solaris.

    4. If jack answers yes,the RSA public key for the host oracle will be added to the known_hosts file for the user jack.

    5. The public host key supplied by oracle is not known to the host solaris.

    Answer: B,D Explanation:

    The fingerprints are used to guard against man in the middle attacks. Since ssh logins usually work over the internet (an insecure connection),someone could hijack your connection. When you try to log into yourmachine.com,he could get quot;in the middlequot; and return your challenge as if he was yourmachine.com. That way,he could get hold of your login password.

    To make this attack harder,ssh stores the fingerprint of the server#39;s public key on the first connection attempt. You will see a prompt like:

    The authenticity of host #39;eisen (137.43.366.64)#39; can#39;t be established. RSA key fingerprint is cf:55:30:31:7f:f0:c4:a0:9a:02:1d:1c:41:cf:63:cf. Are you sure you want to continue connecting (yes/no)

    When you enter yes,ssh will add the fingerprint to your known_hosts file. you will see Code:

    Warning: Permanently added #39;eisen,137.43.366.64#39; (RSA) to the list of known hosts.

    The next time you login,ssh will check whether the host key has changed. A changing host key usually indicates a man in the middle attack,and ssh refuses to connect.

    Question No: 36 – (Topic 1)

    To assist in examining and debugging running processes,Solaris 11 has a utility that returns pro arguments and the names and values of environment variables.

    What is the name of this utility?

    1. ppgsz

    2. pargs

    3. pmap

    4. pgrep

    Answer: B Explanation:

    The pargs utility examines a target process or process core file and prints arguments,environment variables and values,or the process auxiliary vector.

    Question No: 37 – (Topic 1)

    Which two are true about accounts,groups,and roles in the Solaris user database?

    1. All Solaris user accounts must have a unique UID number.

    2. A Solaris account name may be any alphanumeric string,and can have a maximum length of 8 characters.

    3. Account UID numbers 0-09 are system-reserved.

    4. The GID for an account determines the default group ownership of new files created by that account.

    5. The groups that an account is a member of are determined by the entries in the

    /etc/group file.

    Answer: A,B Explanation:

    A: Solaris uses a UID (User ID) to identify each user account. The UID is a unique number assigned to each user. It is usually assigned by the operating system when the account is created.

    B: In Solaris the account name can include any alphanumeric string (and . _ -). The maximum length is 8 characters.

    Question No: 38 – (Topic 1)

    You have a ZFS file system named /dbase/oral and you want to guarantee that 10 GB of storage space is available to that dataset for all data,snapshots,and clones.

    Which option would you choose?

    1. zfs set refreservation=10g dbase/oral

    2. zfs set quota=10g dbase/oral

    3. zfs set refquota=10g dbase/oral

    4. zfs set reservation=10g dbase/oral

    Answer: D Explanation:

    A ZFS reservation is an allocation of disk space from the pool that is guaranteed to be available to a dataset. As such,you cannot reserve disk space for a dataset if that space is not currently available in the pool. The total amount of all outstanding,unconsumed reservations cannot exceed the amount of unused disk space in the pool. ZFS reservations can be set and displayed by using the zfs set and zfs get commands. For example:

    # zfs set reservation=5G tank/home/bill

    # zfs get reservation tank/home/bill NAME PROPERTY VALUE SOURCE

    tank/home/bill reservation 5G local

    Question No: 39 – (Topic 1)

    You created an IP address for interface not.3 with the following command,which executed successfully:

    ipadm create-addr -T static -a 192.168.0.100/24 net3/v4 You then ran:

    ipadm show-if

    The result indicated that the interface was down. You then ran:

    ipadm delete-addr net3/v4

    ipadm create-addr -T static -a 192.168.0.101/24 net3/v4 ipadm show-if

    The last command indicated that the interface was up.

    Why did it work with the second address specified,but not the first?

    1. The 192.168.0.100 address is reserved for broadcast messages.

    2. Another device exists on the network,using the 192.168.0.100 address.

    3. The network interface card does not support the address 192.168.0.100.

    4. The address 192.168.0.100 is at a boundary and may not be configured in Oracle Solaris 11.

    5. 192.168.0.100 is a DHCP address and may not be statically configured in Oracle Solaris 11.

    Answer: B Explanation:

    The first IP address is already in use.

    Question No: 40 – (Topic 1)

    You are planning group names for a new system. You decide to use a numbering convention that includes the year and month the project began,to form the group number and name for work associated with that project.

    So,for example,a project targeted to begin in January,2013 would have the number (name): 201301(Pr20l301)

    What are the two problems with your plan?

    1. Group names may not contain a numeric character

    2. Group names may be no longer than 7 characters.

    3. Group numbers should not be larger than 60000.

    4. Group names should be all lowercase.

    Answer: C,D Explanation:

    C: The Group ID (GID) field contains the group#39;s numerical ID. GIDs can be assigned whole numbers between 100 and 60000.

    D: Group names contain only lowercase characters and numbers.

    100% Ensurepass Free Download!
    Download Free Demo:1z0-821 Demo PDF
    100% Ensurepass Free Guaranteed!
    1z0-821 Dumps

    EnsurePass ExamCollection Testking
    Lowest Price Guarantee Yes No No
    Up-to-Dated Yes No No
    Real Questions Yes No No
    Explanation Yes No No
    PDF VCE Yes No No
    Free VCE Simulator Yes No No
    Instant Download Yes No No

  • Leave a Reply

    Your email address will not be published. Required fields are marked *

    This site uses Akismet to reduce spam. Learn how your comment data is processed.