[Free] 2018(Jan) EnsurePass Testinsides Oracle 1z0-822 Dumps with VCE and PDF 1-10

By | January 25, 2018

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan Oracle Official New Released 1z0-822
100% Free Download! 100% Pass Guaranteed!

Oracle Solaris 11 Advanced System Administration

Question No: 1

You need to make a permanent modification to a machine#39;s naming service. You need to change naming service from files to LDAP. Which two alternative methods would accomplish this task?

  1. Modify the existing /etc/nsswitch.conf file and execute:

    # nscfg import -f name-service/switch

  2. Modify the existing /etc/nsswitch-conf file and execute:

    # netcfg import name-service/switch

    # svcadm refresh name-service/switch

  3. Modify the existing /etc/nsswitch.conf file and execute:

    # svcadm restart milestone/self-assembly

  4. Use the netcfg command to modify the location profile for the DefaultFixad network configuration profile.

  5. Use the svccfg command to set config/* properties in the name-service/switch service:

# svcadm refresh name-service/switch

# svcadm restart name-service/switch

Answer: A,D Explanation: A:

  • nscfg

    • import, export name service configurations

  • subcommand import

    import [-fvq] FMRI

    If none of the SMF repository properties for the specified FMRI are currently populated, import the legacy configuration files associated with the specified FMRI into the SMF repository.

  • Example: Importing DNS Client Configuration

    The following command imports the DNS client configuration, stored in resolv.conf, into the SMF repository.

    # nscfg import svc:/network/dns/client:default

  • svcadm- manipulate service instances D: netcfg

  • create and modify network configuration profiles

    The netcfg utility manipulates system network configuration profiles. netcfg can be invoked

    interactively, with an individual subcommand, or by specifying a command file that contains a series of subcommands.

    / netcfg location properties include:

    / nameservices: enum value list: files | dns | nis | ldap

    Specifies the name services that should be configured, such as DNS, NIS, and LDAP.


    Not B: netcfg has no subcommand import.


    • Each workstation has a nsswitch.conf file in its /etc directory. Each line of that file identifies a particular type of network information, such as host, password, and group, followed by one or more sources, such as NIS tables, NIS maps, the DNS hosts table, or local /etc, where the client is to look for that information.

    • The Solaris platform provides the following naming services.

    / DNS, the Domain Name System

    / /etc files, the original UNIX naming system

    / NIS, the Network Information Service

    / NIS , the Network Information Service Plus

    / LDAP, the Lightweight Directory Access Protocol

    Question No: 2

    You added an interface to the IPMP group ipmp0 with the following commands:

    # ipadm create-ip net4

    # ipadm add-ipmp -i net4 ipmp0

    Which statement regarding the newly added interface is correct?

    1. Link state failure detection will not occur.

    2. Probe-based failure detection will not occur.

    3. Without a data IP address, it cannot become active.

    4. These changes will be lost when the system is booted.

    Answer: B

    Question No: 3

    What is the purpose of the Service Management Facility (SMF) profiles?

    1. an XML file that describes current services and the instances

    2. allows the customization of services and instances

    3. stores configuration information about each service instance

    4. used to start and stop processes or services

    Answer: B

    Explanation: Profiles are, in many ways, similar to manifests in that they use the same XML DTD. However, instead of providing information about a service, its dependencies, and methods, a profile is used to provide customization of a service or an instance of a service. Customizations include whether an instance of a service should be enabled or disabled and any modifications to service configuration properties.


    Not A: Manifests (not profiles) are used to describe services and instances of a service, including any property groups and properties they might have.

    Question No: 4

    Which three statements describe Solaris 11 boot environments (BEs)?

    1. A full backup of your OS image is provided.

    2. Packages can be installed and uninstalled in an inactive BE.

    3. The OS can be upgraded in an active BE while the system is live without impacting production.

    4. A new BE can be created from the snapshot of an existing BE.

    5. A BE can become active without rebooting the system.

    6. An active BE can be unmounted and upgraded without impacting production.

    Answer: A,C,D Explanation:

    The beadm utility enables you to create a new boot environment based on an existing snapshot.


    • You can manage the boot environments on your system either by using the beadm command or by using the Package Manager.

    • A boot environment is a bootable instance of the Oracle Solaris operating system image plus any other application software packages installed into that image. System administrators can maintain multiple boot environments on their systems, and each boot environment can have different software versions installed.

    Question No: 5

    You are the primary administrator for a set of Oracle Solaris 11 servers. You noticed some changes to configuration files. Yon are concerned that someone may have unauthorized access and that an authorized user may be abusing the access privilege. You want to track users of these systems to determine what tasks each user performs. Select the best way to gather this information.

    1. Solaris auditing

    2. the system/event service

    3. the system-logging service

    4. Basic Audit Reporting Tool

    5. System Extended Accounting

    Answer: A

    Explanation: Solaris auditing keeps a record of how the system is being used. The audit service includes tools to assist with the analysis of the auditing data.


    not C: Basic Audit Reporting Tool

    BART is a file tracking tool that operates entirely at the file system level. Using BART gives

    you the ability to quickly, easily, and reliably gather information about the components of the software stack that is installed on deployed systems. Using BART can greatly reduce the costs of administering a network of systems by simplifying time-consuming administrative tasks.


    * The audit service makes the following possible:

    Monitoring security-relevant events that take place on the host Recording the events in a network-wide audit trail

    Detecting misuse or unauthorized activity

    Reviewing patterns of access and the access histories of individuals and objects Discovering attempts to bypass the protection mechanisms

    Discovering extended use of privilege that occurs when a user changes identity

    * Auditing is the collecting of data about the use of system resources. The audit data provides a record of security-related system events. This data can then be used to assign responsibility for actions that take place on a host. Successful auditing starts with two security features: identification and authentication. At each login, after a user supplies a user name and password, a unique audit session ID is generated and associated with the user#39;s process. The audit session ID is inherited by every process that is started during the login session. Even if a user changes identity within a single session, all user actions are tracked with the same audit session ID.

    Question No: 6

    You are creating a new SMF service named newservice. You perform the following steps:

    ->Create the XML manifest file to define the service.

    ->Create a script to be used to start and stop the service and set the execute permissions on this script.

    What is the next step that you must perform to install this service?

    1. Enable the service

    2. Export the service

    3. Import the service.

    4. Create a snapshot of the service to be stored in the repository.

    Answer: C

    Explanation: Refer to step 3 below.

    After a typical software installation, there can be a half dozen or more processes that need to be started and stopped during system startup and shutdown. In addition, these processes may depend on each other and may need to be monitored and restarted if they fail. For each process, these are the logical steps that need to be done to incorporate these as services in SMF:

    1. Create a service manifest file.

    2. Create a methods script file to define the start, stop, and restart methods for the service. 3.Validate and import the service manifest using svccfg(1M).

    4.Enable or start the service using svcadm(1M). 5.Verify the service is running using svcs(1).

    Question No: 7

    Given the following commands and output:

    Ensurepass 2018 PDF and VCE

    Which statement summarizes this sequence of commands?

    1. The BE solaris in the Global zone is the same BE that is listed in the third command.

    2. The BE solaris-1 is activated to boot when the ozone zone is rebooted.

    3. The BE solaris-1 was created when the BE solaris-2 was created.

    4. The BE ozone2 is a BE of a zone with the zone name ozone2.

    Answer: A Explanation: Incorrect:

    Not B: You cannot activate an unbootable BE in a nested BE. Not D: The zone is named ozone (not ozone2).


    • beadm supports the concept of a nested BE, specifically, as it pertains to BEs for non- global zones.

    • beadm list [-a | -ds] [-H] [beName]

    Lists information about the existing boot environment named beName, or lists information for all boot environments if beName is not provided. The Active field indicates whether the boot environment is active now, represented by N; active on reboot, represented by R; or both, represented by NR. Unbootable BEs inside of a nested BE are represented by an exclamation point (!)

    Question No: 8

    Examine the following command:

    ipadm create-addr -T static -a net0/v6 Which two statements are true?

    1. The interface is plumbed.

    2. The interface is marked down.

    3. The netmask value is ffffffc0.

    4. The link local IPv6 address fe80::112 is created.

    5. Multicast datagrams are not enabled on this interface.

    Answer: A,C

    Question No: 9

    Which vmstat field output indicates the effort the system is making to find memory for future processes?

    1. re

    2. sr

    3. free

    4. fr

    Answer: A Explanation: re page reclaims.

    The information is given in units per second.


    * vmstat reports virtual memory statistics regarding kernel thread, virtual memory, disk, trap, and CPU activity.


    Not B: sr, pages scanned by clock algorithm Not C: free

    size of the free list (Kbytes)

    Not D: fr kilobytes freed

    Question No: 10

    Which two statements describe the capabilities of the Distribution Constructor?

    1. ISO images for use with the Automated Installer (AI) can be created.

    2. Bootable USB images can be created for SPARC and x86 architectures.

    3. A single installation server can be used to create ISO images, for SPARC and x86 architectures.

    4. Checkpoints are used to pause the build, thereby allowing the running of a script to modify the resulting ISO image.

    5. A single installation server can be used to create ISO images for Solaris 10 and Solaris

    11.0 operating systems.

    Answer: A,D

    Explanation: A: Oracle Solaris Image Types include:

    x86 or SPARC ISO Image for Automated Installations – The Oracle Solaris release includes the automated installer tool. The automated installer (AI) is used to automate the

    installation of the Oracle Solaris OS on one or more SPARC and x86 systems over a network.


    • You can also create custom scripts to modify your installation image. Then, you can add checkpoints to the manifest file to run these custom scripts.

    • You can use the options provided in the distro_const command to stop and restart the build process at various stages in the image-generation process, in order to check and debug the image that is being built. This process of stopping and restarting during the build process is called checkpointing. Checkpointing is optional. Default checkpoints are specified in each manifest file.


      Not B: Only for x86, not for SPARC-

      Oracle Solaris x86 LiveCD – You can create an x86 ISO image that is comparable to the LiveCD image that#39;s distributed as an Oracle Solaris release. You can also modify the content of this ISO image by adding or removing packages. You can revise the default settings for the resulting booted environment to create a custom ISO image or USB image.

      Note: The distribution constructor creates images based on settings specified in XML files, called manifest files. The manifest files contain specifications for the contents and parameters for the ISO images that you create using the distribution constructor. The distribution-constructor package provides sample manifests that can be used to create a custom x86 Live Media ISO, an x86 or SPARC Automated Install ISO image, or an x86 or SPARC text installation ISO image.

      The elements in each manifest file provide preset, default values that will create the type of ISO image you need. You can manually edit these preset elements in a manifest file to customize the resulting image. In addition, you can create custom scripts to further modify your image. Then, reference the new scripts in the manifest file.

      100% Ensurepass Free Download!
      Download Free Demo:1z0-822 Demo PDF
      100% Ensurepass Free Guaranteed!
      1z0-822 Dumps

      EnsurePass ExamCollection Testking
      Lowest Price Guarantee Yes No No
      Up-to-Dated Yes No No
      Real Questions Yes No No
      Explanation Yes No No
      PDF VCE Yes No No
      Free VCE Simulator Yes No No
      Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.