Oracle 1z0-821 Exam Practice Questions (P. 2)
- Full Access (241 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #6
You have a ticket from a new user on the system, indicating that he cannot log in to his account. The information in the ticket gives you both the username and password. The ticket also shows that the account was set up three days ago.
As root, you switch users to this account with the following command: su newuser
You do not get an error message.
You then run 1s -1a and see the following files:
local1.cshrc local1.login local1.profile .bash_history .bashrc .profile
As root, you grep the /etc/passwd file and the /etc/shadow file for this username, with these results:
/etc/passwd contains newuser:x:60012:10:/home/newuser:/usr/bin/bash
/etc/shadow contains newuser:UP: : : : :10: :
As root, what is your next logical step?
As root, you switch users to this account with the following command: su newuser
You do not get an error message.
You then run 1s -1a and see the following files:
local1.cshrc local1.login local1.profile .bash_history .bashrc .profile
As root, you grep the /etc/passwd file and the /etc/shadow file for this username, with these results:
/etc/passwd contains newuser:x:60012:10:/home/newuser:/usr/bin/bash
/etc/shadow contains newuser:UP: : : : :10: :
As root, what is your next logical step?
- AUsermod –f 0
- Bpasswd newuser
- Cmkdir /home/newuser
- Duseradd –D
Correct Answer:
B
The content of the /etc/shadow document indicates that the newuser account has no password.
We need to add a password.
The passwd utility is used to update user's authentication token(s).
D: Here the user account already exist. There is no need to create it.
When invoked without the -D option, the useradd command creates a new user account using the values specified on the command line plus the default values from the system. Depending on command line options, the useradd command will update system files and may also create the new user's home directory and copy initial files.
B
The content of the /etc/shadow document indicates that the newuser account has no password.
We need to add a password.
The passwd utility is used to update user's authentication token(s).
D: Here the user account already exist. There is no need to create it.
When invoked without the -D option, the useradd command creates a new user account using the values specified on the command line plus the default values from the system. Depending on command line options, the useradd command will update system files and may also create the new user's home directory and copy initial files.
send
light_mode
delete
Question #7
You have a user that needs to use the cron tool to schedule some repetitive tasks. When the user enters the crontab e command in a terminal window, the following error appears: crontab: you are not authorized to use cron. Sorry
In order to troubleshoot this issue, in what directory would you start your invest
In order to troubleshoot this issue, in what directory would you start your invest
- A/etc/cron.d
- B/var/spool/cron
- C/var/spool/cron/crontable
- D/var/spool/cron/atjobs
Correct Answer:
A
crontab: you are not authorized to use cron. Sorry.
This message means that either the user is not listed in the cron.allow file (if the file exists), or the user is listed in the cron.deny file.
You can control access to the crontab command by using two files in the /etc/cron.d directory: cron.deny and cron.allow. These files permit only specified users to perform crontab command tasks such as creating, editing, displaying, or removing their own crontab files.
The cron.deny and cron.allow files consist of a list of user names, one user name per line.
A
crontab: you are not authorized to use cron. Sorry.
This message means that either the user is not listed in the cron.allow file (if the file exists), or the user is listed in the cron.deny file.
You can control access to the crontab command by using two files in the /etc/cron.d directory: cron.deny and cron.allow. These files permit only specified users to perform crontab command tasks such as creating, editing, displaying, or removing their own crontab files.
The cron.deny and cron.allow files consist of a list of user names, one user name per line.
send
light_mode
delete
Question #8
You are having an issue with the shutdown command. You wish to determine if the file is a script or an executable program. Which command would you use to determine this?
- Aod shutdown
- Bfile shutdown
- Ctest shutdown
- Dcksum shutdown
- Eattrib shutdown
Correct Answer:
B
The file command determines the file type file tests each argument in an attempt to classify it. There are three sets of tests, performed in this order: filesystem tests, magic tests, and language tests. The first test that succeeds causes the file type to be printed.
B
The file command determines the file type file tests each argument in an attempt to classify it. There are three sets of tests, performed in this order: filesystem tests, magic tests, and language tests. The first test that succeeds causes the file type to be printed.
send
light_mode
delete
Question #9
What determines which bits in an IP address represent the subnet, and which represent the host?
- ASubnet
- Bunicast
- Cnetmask
- Dmulticast
- Ebroadcast
Correct Answer:
C
A subnetwork, or subnet, is a logically visible subdivision of an IP network. The practice of dividing a network into two or more networks is called subnetting.
The routing prefix of an address is written in a form identical to that of the address itself. This is called the network mask, or netmask, of the address. For example, a specification of the most-significant 18 bits of an IPv4 address, 11111111.11111111.11000000.00000000, is written as 255.255.192.0.
C
A subnetwork, or subnet, is a logically visible subdivision of an IP network. The practice of dividing a network into two or more networks is called subnetting.
The routing prefix of an address is written in a form identical to that of the address itself. This is called the network mask, or netmask, of the address. For example, a specification of the most-significant 18 bits of an IPv4 address, 11111111.11111111.11000000.00000000, is written as 255.255.192.0.
send
light_mode
delete
Question #10
Which two accurately identify features of a Solaris 10 branded zone?
- Aexecutes in a Solaris 10 global zone
- Bis created by importing a Solaris 10 flash archive
- Cenables Linux binary applications to run unmodified
- Dprovides a complete runtime environment for Solaris 9 applications
- Eallows a Solaris 10 global zone to be migrated into a Solaris 10 non-global zone on a Solaris 11 system
Correct Answer:
BE
B: It can be created by importing a Solaris 10 flash archive.
You can use the Oracle Solaris Flash archiving tools to create an image of an installed system that can be migrated into a zone.
The system can be fully configured with all of the software that will be run in the zone before the image is created. This image is then used by the installer when the zone is installed.
Note: You can use alternate methods for creating the archive. The installer can accept the following archive formats:
* cpio archives
* gzip compressed cpio archives
* bzip2 compressed cpio archives
* pax archives created with the -x xustar (XUSTAR) format
ufsdump level zero (full) backups
Note:
Branded zones that run an environment different that the OS release on the system
* The lx branded zone introduced in the Solaris 10 8/07 release provides a Linux environment for your applications and runs on x86 and x64 machines on the
Oracle Solaris 10 OS.
* The solaris8 and solaris9 branded zones enable you to migrate an Oracle Solaris 8 or Oracle Solaris 9 system to an Oracle Solaris 8 or Oracle Solaris 9
Container on a host running the Oracle Solaris 10 8/07 Operating System or later Oracle Solaris 10 release.
* The Oracle Solaris 10 Container brand is available in OpenSolaris build 127. These branded zones host Oracle Solaris 10 user environments.
Note: One of the powerful features of Solaris 11 is the ability to run a Solaris 10 environment in a zone. Solaris 10 allows you to run Solaris 8 and 9 environments in zones, but only on SPARC.
BE
B: It can be created by importing a Solaris 10 flash archive.
You can use the Oracle Solaris Flash archiving tools to create an image of an installed system that can be migrated into a zone.
The system can be fully configured with all of the software that will be run in the zone before the image is created. This image is then used by the installer when the zone is installed.
Note: You can use alternate methods for creating the archive. The installer can accept the following archive formats:
* cpio archives
* gzip compressed cpio archives
* bzip2 compressed cpio archives
* pax archives created with the -x xustar (XUSTAR) format
ufsdump level zero (full) backups
Note:
Branded zones that run an environment different that the OS release on the system
* The lx branded zone introduced in the Solaris 10 8/07 release provides a Linux environment for your applications and runs on x86 and x64 machines on the
Oracle Solaris 10 OS.
* The solaris8 and solaris9 branded zones enable you to migrate an Oracle Solaris 8 or Oracle Solaris 9 system to an Oracle Solaris 8 or Oracle Solaris 9
Container on a host running the Oracle Solaris 10 8/07 Operating System or later Oracle Solaris 10 release.
* The Oracle Solaris 10 Container brand is available in OpenSolaris build 127. These branded zones host Oracle Solaris 10 user environments.
Note: One of the powerful features of Solaris 11 is the ability to run a Solaris 10 environment in a zone. Solaris 10 allows you to run Solaris 8 and 9 environments in zones, but only on SPARC.
send
light_mode
delete
All Pages