[Free] 2018(Mar) EnsurePass Passguide Oracle 1z0-821 Dumps with VCE and PDF 51-60

Ensurepass.com : Ensure you pass the IT Exams
2018 Mar Oracle Official New Released 1z0-821
100% Free Download! 100% Pass Guaranteed!

Oracle Solaris 11 System Administration

Question No: 51 – (Topic 1)

You are the administrator for a group of shell script developers. They use vi,and have asked you to make their scripts automatically executable when they save their files.

How can this be accomplished?

  1. Enter set -o vi on the command line,or include it in each user#39;s startup script.

  2. Enter umask -s on the command line,or include it in each user#39;s startup script.

  3. Enter umask 000 on the command line,or include it in each user#39;s startup script.

  4. Enter umask 777 on the command line,or include it in each user#39;s startup script.

  5. It is not possible to automatically set the execute bit on with the umask setting,or vi option.

  6. Enter umask 766 the command line,or include it in the global startup script for the default shell.

Answer: E Explanation:

Unlike DOS,which uses the file extension to determine if a file is executable or not,UNIX relies on file permissions.

The value assigned by umask is subtracted from the default.

User#39;s file creation mask. umask sets an environment variable which automatically sets file permissions on newly created files. i.e. it will set the shell process#39;s file creation mask to mode.

umask 000 would grant full permissions. Note: 777 full permissions

Question No: 52 – (Topic 1)

Which command would you use to determine which package group is installed on your system?

  1. pkg list group/system/\*

  2. pkg info

  3. uname -a

  4. cat /var/sadm/system/admin/CLUSTEP

Answer: B Explanation:

The pkg info command provides detailed information about a particular IPS package.

Note: The pkginfo command does the same for any SVR4 packages you may have installed on the same system.

pkg info example:

$ pkg info p7zip Name: compress/p7zip

Summary: The p7zip compression and archiving utility

Description: P7zip is a unix port of the 7-Zip utility. It has support for numerous compression algorithms,including LZMA and LZMA2,as well as for various archive and compression file formats,including 7z,xz,bzip2,gzip,tar,zip (read-write) and cab,cpio,deb,lzh,rar,and rpm (read-only).

Category: System/Core State: Installed Publisher: solaris Version: 9.20.1

Build Release: 5.11


Packaging Date: Wed Oct 19 09:13:22 2011

Size: 6.73 MB

FMRI: pkg://solaris/compress/p7zip@9.20.1,5.11-

Question No: 53 – (Topic 1)

You attempted to reboot a system via the init command,however the system did not perform boot sequence into the Oracle Solaris Operating Environment. You are presented with a prompt from the OpenBoot PROM. Which command would you enter,to boot the system from the default device?

  1. boot -net install

  2. boot

  3. boot -default

  4. boot -s0

Answer: B Explanation: Boot

With this form,boot loads and executes the program specified by the default bootarguments from the default boot device

Note: boot has the following general format: boot [device-specifier] [arguments]

where device-specifier and arguments are optional.

Question No: 54 – (Topic 1)

A user account must be a member of a primary group,and may also be a member of one or more secondary groups. What is the maximum total number of groups that one user can concurrently belong to?

  1. 15

  2. 16

  3. 17

  4. 63

  5. 64

  6. 65

  7. The number of groups one user can concurrently belong to is unlimited in Solaris 11.

Answer: B Explanation:

Each user belongs to a group that is referred to as the user’s primary group. The GID number,located in the user’s account entry within the /etc/passwd file,specifies the user’s primary group.

Each user can also belong to up to 15 additional groups,known as secondary groups. In the /etc/group file,you can add users to group entries,thus establishing the user’s secondary group affiliations.

Note (4 PSARC/2009/542):

his project proposes changing the maximum value for NGROUPS_MAX from 32 to 1024 by changing the definition of NGROUPS_UMAX from 32 to 1024.

The use for a larger number of groups is described in CR 4088757, particular in the case of Samba servers and ADS clients; the Samba servers map every SID to a Unix group. Users with more than 32 groups SIDs are common. We#39;ve seen reports varying from quot;64 is enoughquot;,quot;128 is absolutely enoughquot; and quot;we#39;ve users with more 190 group SIDS).

NGROUPS_MAX as defined by different Unix versions are as follows (http://www.j3e.de/ngroups.html):

Linux Kernel gt;= 2.6.3 65536

Linux Kernel lt; 2.6.3 32 Tru64 / OSF/1 32

IBM AIX 5.2 64

IBM AIX 5.3 … 6.1 128

OpenBSD,NetBSD,FreeBSD,Darwin (Mac OS X) 16 Sun Solaris 7,8,9,10 16 (can vary from 0-32)

HP-UX 20

IRIX 16 (can vary from 0-32)

Plan 9 from Bell Labs 32

Minix 3 0 (Minix-vmd: 16)

QNX 6.4 8

Question No: 55 – (Topic 1)

What determines which bits in an IP address represent the subnet,and which represent the host?

  1. Subnet

  2. unicast

  3. netmask

  4. multicast

  5. broadcast

Answer: C Explanation:

A subnetwork,or subnet,is a logically visible subdivision of an IP network. The practice of dividing a network into two or more networks is called subnetting.

The routing prefix of an address is written in a form identical to that of the address itself. This is called the network mask,or netmask,of the address. For example,a specification of the most-significant 18 bits of an IPv4 address,11111111.11111111.11000000.00000000,is written as

Question No: 56 – (Topic 1)

Consider the following commands:

What is displayed when this sequence of commands is executed using the bash shell?

  1. Hello,world

  2. cat: cannot open file1: No such file or directory Hello,world

  3. cat: cannot open file1: No such file or directory

  4. bash: syntax error near unexpected token #39;| |#39;

  5. bash: syntax error broker pipe

Answer: B

Question No: 57 – (Topic 1)

View the Exhibit to see the information taken from the installation log file.

Based on the information presented in the Exhibit,which two options describe the state of the system when the server is booted for the first time after the installation is complete?

Ensurepass 2018 PDF and VCE

  1. NWAM will be used to configure the network interface.

  2. The network/physical service is offline.

  3. You cannot log in from the console as root. You must first log in as a user and then su to root account.

  4. The root user can log in from the console login.

  5. You will be prompted to configure the network interface after the initial login.

Answer: B,D

Question No: 58 – (Topic 1)

Which three of the components could be used in a ZFS storage pool, but are not recommended configurations?

  1. A file on a UFS file system

  2. A Veritas Volume Manager (VxVM) volume

  3. A LUN In a hardware RAID array

  4. A disk slice from an SMI labeled disk

  5. A Solaris Volume Manager (SVM) volume

  6. An EFI labeled disk

Answer: A,B,E Explanation:

A: ZFS also allows you to use UFS files as virtual devices in your storage pool. This feature is aimed primarily at testing and enabling simple experimentation,not for production use.

The reason is that any use of files relies on the underlying file system for consistency. If you create a ZFS pool backed by files on a UFS file system,then you are implicitly relying on UFS to guarantee correctness and synchronous semantics.

However,files can be quite useful when you are first trying out ZFS or experimenting with more complicated layouts when not enough physical devices are present. All files must be specified as complete paths and must be at least 64 Mbytes in size.

B,E: You can construct logical devices for ZFS using volumes presented by software-based volume managers,such as Solaris Volume Manager (SVM) or Veritas Volume Manager (VxVM). However,these configurations are not recommended. While ZFS functions properly on such devices,less-than-optimal performance might be the result.

Question No: 59 – (Topic 1)

You are logged in as root to a newly installed Solaris 11 system. You issue the command useradd -d,and then examine the /usr/sadm/defadduser file. This file includes the entry defshell=/bin/sh. Which shell will now be the default for the next account created?

  1. bash shell

  2. C shell

  3. korn shod

  4. bourne shell

Answer: A Explanation:

Oracle Solaris 11 introduces user environment and command-line argument changes that include the following:

  • Shell changes – The default shell,/bin/sh,is now linked to ksh93. The default user shell is the Bourne-again (bash) shell.

  • The legacy Bourne shell is available as /usr/sunos/bin/sh.

  • The legacy ksh88 is available as /usr/sunos/bin/ksh from the shell/ksh88 package.

  • Korn shell compatibility information is available in /usr/share/doc/ksh/COMPATIBILITY.

    Question No: 60 – (Topic 1)

    Subnets are created by using .

    1. subnet

    2. netmask

    3. unicast

    4. broadcast

    Answer: B Explanation:

    The process of subnetting involves the separation of the network and subnet portion of an address from the host identifier. This is performed by a bitwise AND operation between the IP address and the (sub)network prefix. The result yields the network address or prefix,and the remainder is the host identifier.

    The routing prefix of an address is written in a form identical to that of the address itself. This is called the network mask,or netmask,of the address. For example,a specification of the most-significant 18 bits of an IPv4 address,11111111.11111111.11000000.00000000,is written as

    100% Ensurepass Free Download!
    Download Free Demo:1z0-821 Demo PDF
    100% Ensurepass Free Guaranteed!
    1z0-821 Dumps

    EnsurePass ExamCollection Testking
    Lowest Price Guarantee Yes No No
    Up-to-Dated Yes No No
    Real Questions Yes No No
    Explanation Yes No No
    PDF VCE Yes No No
    Free VCE Simulator Yes No No
    Instant Download Yes No No

  • Leave a Reply

    Your email address will not be published. Required fields are marked *

    This site uses Akismet to reduce spam. Learn how your comment data is processed.