Oracle 1z0-821 Exam Practice Questions (P. 5)
- Full Access (241 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #21
Your users are experiencing delay issues while using their main application that requires connections to remote hosts. You run the command uptime and get the flowing output:
1:07am up 346 day(s), 12:03, 4 users, load average: 0.02, 0.02, 0.01
Which command will be useful in your next step of troubleshooting?
1:07am up 346 day(s), 12:03, 4 users, load average: 0.02, 0.02, 0.01
Which command will be useful in your next step of troubleshooting?
- Aipadm
- Btraceroute
- Cdladm
- Dsnoop
- Earp
Correct Answer:
B
Test the remote connection with traceroute.
The Internet is a large and complex aggregation of network hardware, connected together by gateways. Tracking the route one's packets follow (or finding the miscreant gateway that's discarding your packets) can be difficult. traceroute utilizes the IP protocol `time to live' field and attempts to elicit an ICMP
TIME_EXCEEDED response from each gateway along the path to some host.
This program attempts to trace the route an IP packet would follow to some internet host by launching UDP probe packets with a small ttl (time to live) then listening for an ICMP "time exceeded" reply from a gateway.
B
Test the remote connection with traceroute.
The Internet is a large and complex aggregation of network hardware, connected together by gateways. Tracking the route one's packets follow (or finding the miscreant gateway that's discarding your packets) can be difficult. traceroute utilizes the IP protocol `time to live' field and attempts to elicit an ICMP
TIME_EXCEEDED response from each gateway along the path to some host.
This program attempts to trace the route an IP packet would follow to some internet host by launching UDP probe packets with a small ttl (time to live) then listening for an ICMP "time exceeded" reply from a gateway.
send
light_mode
delete
Question #22
When upgrading an existing system from Solaris 11 Express to Oracle Solaris 11, what happens to the datalink names?
- AThey follow the default naming convention for the newly installed version.
- BThey maintain their names.
- CThey are called eth#.
- DThey are called el00g#.
- EThey are left unnamed, to avoid conflicts, and need to be renamed after the installation process is complete.
Correct Answer:
A
Network configuration in Oracle Solaris 11 includes
* Generic datalink name assignment Generic names are automatically assigned to datalinks using the net0, net1, netN naming convention, depending on the total number of network devices that are on the system
Note: There is no upgrade path from Oracle Solaris 10 to Oracle Solaris 11. You must perform a fresh installation.
A
Network configuration in Oracle Solaris 11 includes
* Generic datalink name assignment Generic names are automatically assigned to datalinks using the net0, net1, netN naming convention, depending on the total number of network devices that are on the system
Note: There is no upgrade path from Oracle Solaris 10 to Oracle Solaris 11. You must perform a fresh installation.
send
light_mode
delete
Question #23
You have installed software updates to a new boot environment (BE) and have activated that the booting to the new BE, you notice system errors. You want to boot to the last known good configuration.
Which option would you use on a SPARC system to boot to the currentBE boot environment?
Which option would you use on a SPARC system to boot to the currentBE boot environment?
- Aboot –L currentBE
- Bboot –Z rpool/ROOT/currentBE
- Cboot –a Enter the currentBE dataset name when prompted.
- Dboot rpool/ROOT/currentBE
- Eboot –m currentBE
- Fbeadm activate currentBE
Correct Answer:
F
You can change an inactive boot environment into an active boot environment. Only one boot environment can be active at a time. The newly activated boot environment becomes the default environment upon reboot.
How to Activate an Existing Boot Environment
1. Use the following command to activate an existing, inactive boot environment: beadm activate beName beName is a variable for the name of the boot environment to be activated.
Note the following specifications.
beadm activate beName activates a boot environment by setting the bootable pool property, bootfs, to the value of the ROOT dataset of the boot environment that is being activated. beadm activate sets the newly activated boot environment as the default in the menu.lst file.
2. Reboot.
The newly activated boot environment is now the default on the x86 GRUB menu or SPARC boot menu.
F
You can change an inactive boot environment into an active boot environment. Only one boot environment can be active at a time. The newly activated boot environment becomes the default environment upon reboot.
How to Activate an Existing Boot Environment
1. Use the following command to activate an existing, inactive boot environment: beadm activate beName beName is a variable for the name of the boot environment to be activated.
Note the following specifications.
beadm activate beName activates a boot environment by setting the bootable pool property, bootfs, to the value of the ROOT dataset of the boot environment that is being activated. beadm activate sets the newly activated boot environment as the default in the menu.lst file.
2. Reboot.
The newly activated boot environment is now the default on the x86 GRUB menu or SPARC boot menu.
send
light_mode
delete
Question #24
Oracle Solaris 11 limits access to the system with usernames and passwords.
The usernames are held in ___________, and the passwords are held in ___________.
Select the correct pair.
The usernames are held in ___________, and the passwords are held in ___________.
Select the correct pair.
- A/etc/security/policy.conf /etc/passwd
- B/etc/passwd /etc/shadow
- C/etc/security /etc/passwd
- D/etc/shadow /etc/passwd
Correct Answer:
B
The /etc/passwd file contains basic user attributes. This is an ASCII file that contains an entry for each user. Each entry defines the basic attributes applied to a user.
/etc/shadow file stores actual password in encrypted format for user's account with additional properties related to user password i.e. it stores secure user account information. All fields are separated by a colon (:) symbol. It contains one entry per line for each user listed in /etc/passwd file.
B
The /etc/passwd file contains basic user attributes. This is an ASCII file that contains an entry for each user. Each entry defines the basic attributes applied to a user.
/etc/shadow file stores actual password in encrypted format for user's account with additional properties related to user password i.e. it stores secure user account information. All fields are separated by a colon (:) symbol. It contains one entry per line for each user listed in /etc/passwd file.
send
light_mode
delete
Question #25
_________ serves as the interface between the SMF repository and the user to ensure that a consistent, picture of the repository is presented to the user.
- Arepository.db
- Bservice manifest
- Csvc.startd
- Dsvc.configd
Correct Answer:
D
SVC.CONFIGD is the repository daemon responsible for maintaining /etc/svc/repository.db. The repository.db must come clean during this integrity check otherwise it is a "no go" for usual boot sequence to run level 3. The repository may get corrupted due to various hardware issues, software bugs, disk write failures, etc.
Note: When svc.configd(1M), the Solaris Repository Daemon, is started, it does an integrity check of the smf(5) repository, stored in /etc/svc/repository.db. This integrity check can fail due to a disk failure, the database file being corrupted either due to a hardware bug, a software bug, or an accidental overwrite. If the integrity check fails, svc.configd will write a message to the console.
D
SVC.CONFIGD is the repository daemon responsible for maintaining /etc/svc/repository.db. The repository.db must come clean during this integrity check otherwise it is a "no go" for usual boot sequence to run level 3. The repository may get corrupted due to various hardware issues, software bugs, disk write failures, etc.
Note: When svc.configd(1M), the Solaris Repository Daemon, is started, it does an integrity check of the smf(5) repository, stored in /etc/svc/repository.db. This integrity check can fail due to a disk failure, the database file being corrupted either due to a hardware bug, a software bug, or an accidental overwrite. If the integrity check fails, svc.configd will write a message to the console.
send
light_mode
delete
All Pages