Browsed by
Tag: 1Z0-820 dumps

Free Providing 1Z0-820 VCE Exam Study Guides With New Update Exam Questions

Free Providing 1Z0-820 VCE Exam Study Guides With New Update Exam Questions

Tens of thousands of competitors, pages of hard questions and unsatisfied exam preparation situations… Do not worried about all those annoying things! We, help you with your Oracle Partner Network 1Z0-820 Upgrade to Oracle Solaris 11 System Administrator exam. We will assist you clear the 1Z0-820 exam with Oracle Partner Network 1Z0-820 braindumps. We latest 1Z0-820 dumps are the most comprehensive ones.

Visit our site to get more 1Z0-820 Q and As: (133 QAs Dumps)
Question 1:

Which three events trigger the automated NWAM configuration? (Choose three.)

A. a DHCP lease is acquired.

B. a WLAN card is disconnected.

C. The DefaultFixed NCP is enabled.

D. An Ethernet cable is disconnected.

E. A failed interface card assigned to an IPMP group is replaced.

F. The dladm create-vnic command is executed to create a virtual network interface.

Correct Answer: ABD

Question 2:

alice is a user account used by Alice on a Solaris 11 system.

sadmin is a role account on the same system.

Your task is to add the command /usr/sbin/cryptoadm to the Network management profile, so that Alice can execute it, while assuming the sadmin role.

Select the three activities necessary to accomplish this.

A. To the file /etc/security/prof_attr, add the line: Network Management: solaris:cmd:RO::/usr/sbin/cryptoadm:euid=0

B. To the file /etc/security/auth_attr, add the line: Network Management: solaris:cmd:RO::/usr/sbin/cryptoadm:euid=0

C. To the file /etc/security/exec_attr.d/local-entriies, add the line: Network Management: solaris:cmd:RO::/usr/sbin/cryptoadm:euid=0

D. Run the roles alice to ensure that alice may assume the role sadmin.

E. Run the command profiles sadmin to ensure that the role sadmin includes the network Management profile.

F. Run the command profiles alice to ensure that the Alice has permissions to access the Network management profile.

G. Run the command profiles “Network management” to ensure that the Network management profile includes the sadmin role.

Correct Answer: CDG

Explanation: C: /etc/security/exec_attr is a local database that specifies the execution attributes associated with profiles. The exec_attr file can be used with other sources for execution profiles, including the exec_attr NIS map and NIS table.

A profile is a logical grouping of authorizations and com- mands that is interpreted by a profile shell to form a secure execution environment.

Reference: man exec_attr

Question 3:

Solaris 11 includes a redesigned software packaging model: the Image Packaging System.

Which three describe advantages of the Image Packaging System over the previous Solaris 10 SVR4 packaging model? (Choose three.)

A. eliminates patching of the software package

B. makes the patching process more efficient with less downtime

C. eliminates OS version upgrade

D. allows for the installation of the OS without a local DVD or installation server

E. allows the use of a repository mirror to speed up package operation

F. allows users to publish their own software package in a software repository

Correct Answer: AEF

Question 4:

You are troubleshooting the failure of a computer to mount an NFS file system hosted by a server (hostname mars) in the local area network.

Select the three commands that will enable you to identify the problem.

A. ping – s mars

B. cat /etc/vfstab

C. cat /etc/dfs/dfstab

D. sharemgr show -v

E. showmount -e mars

F. rpcinfo -s mars | egrep `nfs|mountd\’

Correct Answer: AEF

mount: mount-point /DS9 does not exist.

To solve the mount point error condition, check that the mount point exists on the client. Check the spelling of the mount point on the command line or in the /etc/vfstab file (B) on the client, or comment outthe entry and reboot the system.

Note: The /etc/vfstab file lists all the file systems to be automatically mounted at system boot time, with the exception of the /etc/mnttab and /var/run file systems.

E: showmount This command displays all clients that have remotely mounted file systems that are shared from an NFS server, or only the file systems that are mounted by clients, or the shared file systems with the client access information. The command syntax is:

showmount [ -ade ] [ hostname ]

where -a prints a list of all the remote mounts (each entry includes the client name and the directory), -d prints a list of the directories that are remotely mounted by clients, -e prints a list of the files shared (or exported), and hostname selects the NFS server to gather the information from. If hostname is not specified the local host is queried.

F: * mountd Daemon

This daemon handles file-system mount requests from remote systems and provides access control. The mountd daemon checks /etc/dfs/sharetab to determine which file systems are available for remote mounting and which systems are

allowed to do the remote mounting.

* Commands for Troubleshooting NFS Problems

These commands can be useful when troubleshooting NFS problems.

rpcinfo Command

This command generates information about the RPC service that is running on a system.

Reference: man showmount

Question 5:

Review the output from a ZFS file system:


pool1/encryptencryptionaes-256-ccmlocal pool1/encryptkeysourceraw,file///mykeylocal

You need to recreate the pooM/encrypt file system exactly as it is listed above Which two commands can you use to recreate the pooM/encrypt file system?

(Choose two.)

A. pktool genkey keystone=file outkey=/mykey keytype=aes keylen=256

B. genkey pktool keystore=file outkey=/mykey keytype=aes keylen=256

C. zfs create -o encryption=aes-256-ccm -o keysource=raw,file://mykey pooll/encrypt

D. zfs create -o encryption=aes-256-ccm -o keysource=raw,file:///mykey pooM/encrypt

E. zfs create -o encryption=aes-256-ccm -o keysource=raw,file:///mykey source=local pooll/encrypt

Correct Answer: BC

Visit our site to get more 1Z0-820 Q and As: (133 QAs Dumps)