[Free] 2018(Jan) EnsurePass Testinsides Oracle 1z0-878 Dumps with VCE and PDF 121-130

By | January 25, 2018

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan Oracle Official New Released 1z0-878
100% Free Download! 100% Pass Guaranteed!

Oracle Solaris 10 System Administrator Certified Professional Exam, Part II

Question No: 121 – (Topic 1)

When the Name Service Cache Daemon (nscd) is running, and the hosts cache is enabled, what is the result of manually modifying the

/etc/inet/hosts file?

  1. The nscd is restarted automatically.

  2. The hosts cache is immediately updated to reflect the change.

  3. The nscd exits and the message error code 1 is sent to sysiogd.

  4. The hosts cache is invalidated upon the next call to the nscd daemon.

Answer: D

Question No: 122 – (Topic 1)

You are trying to isolate a DNS lookup problem. You suspect it is a bad entry in the Name

Service switch file, so you are going to try a test query of the Name Service. Which command will directly reference the Name Service switch file and verify that the Dretum?actions are properly placed?

  1. nslookup

  2. getent

  3. ypcat

  4. ldaplist

Answer: B

Question No: 123 – (Topic 1)

A user is having LDAP client problems. The profile with which the client was configured was updated over night. From the error messages it would appear that the daemon on the client responsible for updating the profile might NOT have started.

Which daemon on the client is responsible for updating the profile?

  1. ldap_client

  2. ldap_update

  3. ldap_profile

  4. ldap_cachemgr

Answer: D

Topic 2, Volume B

Question No: 124 – (Topic 2)

If the automounter is used, which client file no longer needs to be updated to allow the automatic mounting of NFS resources upon reboot of the client?

  1. /etc/vfstab

  2. /etc/default/fs

  3. /etc/dfs/dfstab

  4. /etc/dfs/fstypes

  5. /etc/dfs/sharetab

Answer: A

Question No: 125 – (Topic 2)

You run an IT department and are responsible for purchasing hardware. Certain data that you have housed in a series of traditional disk slices are critical and must not be lost due to disk failure. The amount of data is large (720 gigabytes) and is read and written to frequently. The performance for both read and write operations needs improvement. You have plenty of money in your budget.

Which two approaches will meet your business needs? (Choose two.)

  1. secure the data using RAID 0

  2. secure the data using RAID 1

  3. secure the data using RAID 5

  4. secure the data using RAID 0 1

  5. secure the data using RAID 1 0

Answer: D,E

Question No: 126 – (Topic 2)

You must set up three users to administer the artwork department. These users will be launching several applications with the EUID of department administrator. Using the RBAC mechanism, what is the sequence of events to execute this process?

  1. create entries for the applications in the RBAC profile database, associate a role with the new profile entry, and give the three users access to the role

  2. update the $HOME/.rbac_privs file for each user to point to applications in question and amend the user attribute database to use the admin EUID with these applications

  3. create entries for the applications in the RBAC policy attributes database, associate a profile with the new policy entry, associate a role with this profile, and give the three users access to the role

  4. create entries for the applications in the RBAC execution attributes database, associate a profile with the new execution entry, associate a role with this profile, and give the three users access to the role

Answer: D

Question No: 127 – (Topic 2)

Which two commands list all the authorizations assigned to user john? (Choose two.)

  1. auths john

  2. su john -c auths

  3. grep -w john /etc/user_attr

  4. grep john /etc/security/auth_attr

  5. grep -w john /etc/security/auth_attr

Answer: A,B

Question No: 128 – (Topic 2)

A Solaris 10 OS is configured to log to the /var/adm/messages file using syslog. Which two statements are correct? (Choose two.)

  1. The logadm utility automatically rotates the /var/adm/messages file.

  2. The tail -f /var/adm/messages command can be used to monitor the /var/adm/messages file in real time.

  3. The syslog facility automatically trims the /var/adm/messages file, deleting messages that are more than twenty-four hours old.

  4. The /var/adm/messages file is a DBF formatted binary file. The Solaris Management Console Log Viewer GUI is the only way to monitor the /var/adm/messages file in realtime.

  5. The /var/adm/messages file only contains the severity of the message. The facility of the message must be interpreted using the process name and ID contained in the message.

Answer: A,B

Question No: 129 – (Topic 2)

What are three outcomes of executing the

# svcadm restart system/name-service-cache command? (Choose three.)

  1. The host reboots.

  2. The nscd daemon restarts.

  3. /etc/nscd.conf is reread.

  4. The ypbind daemon restarts.

  5. The local host#39;s cache of the name services is cleared out.

Answer: B,C,E

Question No: 130 – (Topic 2)

Which two statements are true about the relationship between NIS master servers and NIS slave servers? (Choose two.)

  1. Only one master server can be configured, but it can support multiple slave servers and clients.

  2. Load balancing capabilities within NIS can be achieved by configuring at least one slave server on each subnet.

  3. Clients cannot bind across subnets, therefore you must provide a slave server on each subnet bound to a master server.

  4. There can be an unlimited number of slave servers and clients on a subnet, but there must be a master server on each subnet.

Answer: A,B

100% Ensurepass Free Download!
Download Free Demo:1z0-878 Demo PDF
100% Ensurepass Free Guaranteed!
1z0-878 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.