[Free] 2018(Jan) EnsurePass Testinsides Oracle 1z0-879 Dumps with VCE and PDF 311-320

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan Oracle Official New Released 1z0-879
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/1z0-879.html

Oracle Solaris 10 System

Question No: 311 – (Topic 4)

Given this line in the /etc/syslog. conf file:

*.debug @loghost

Which messages are forwarded to loghost?

  1. all messages

  2. all messages of severity debug

  3. all messages NOT matched by other lines

  4. all messages of severity debug NOT matched by other lines

Answer: A

Question No: 312 – (Topic 4)

The adminuser already has the following authorizations:

Solaris.admin.usermgr.pswd, Solaris.system.shutdown, Solaris.admin.fsmgr.write

To add the ability to purge log files, you need to add Solaris. admin. logsvc. purge to the list of authorizations for adminuser. Which command would you use to perform this task?

  1. rolemod -A Solaris.admin.logsvc.purge,Solaris.admin.usermgr.pswd, Solaris.system.shutdown,Solaris.admin.fsmgr.write adminuser

  2. rolemod -A solaris.admin.fsmgr.write adminuser

  3. usermod -A solaris.admin.fsmgr.write adminuser

  4. rolemod -P Solaris.admin.logsvc.purge,Solaris.admin.usermgr.pswd, Solaris.system.shutdown,Solaris.admin.fsmgr.write adminuser

Answer: A

Question No: 313 – (Topic 4)

You have just added new authorizations to the adminuser role. Which of the following procedures is used to verify that the new authorizations have been successfully added to the role?

  1. AS root, type: auths adminuser

  2. View the /etc/user_attrfile.

  3. Log into the role and type: roles

  4. AS root, type: roles adminuser

Answer: A

Question No: 314 – (Topic 4)

Which two commands list the profiles assigned to user fred? (Choose two)

  1. profiles fred

  2. profiles -1 fred

  3. profiles -list fred

  4. grep -w fred /etc/security/prof_attr

  5. grep -w fred /etc/securfity/po1icy.conf

Answer: A,B

Question No: 315 – (Topic 4)

You want to set up a centralized server for sysiog messages while also limiting the type of messages sent to that server as follows:

  1. All security related sysiog events should be forwarded to the bigbrother server.

  2. All of the auth messages should be forwarded to the bigbrother server.

  3. All messages above the notice level should be forwarded to the bigbrother server. Do not forward any user messages.

Which line needs to be added to the syslog configuration file to make this change effective?

  1. auth.*;* .notice;user.crit @bigbrother

  2. auth.debug;*.not ice;user.none @bigbrother

  3. auth.debug;*.warning;user.none @bigbrother

  4. *.emerg;*.alert;*.crit;*.warning;auth.* @bigbrother

Answer: C

Question No: 316 – (Topic 4)

The root (/) file system exists on d10, which is a mirror that contains submirrors dii and di2.

Which two are true if submirror d12 is taken offline? (Choose two.)

  1. The d10 mirror is in read-only mode.

  2. The d12 submirror is in read-only mode.

  3. The other submirror, d11, can also be taken offline if needed.

  4. Data redundancy is still provided due to the remaining d11 submirror.

  5. Any writes to the mirror are tracked in a dirty region log, so that d12 can be resynchronized when it is brought back online.

Answer: B,E

Question No: 317 – (Topic 4)

Under the Solaris Volume Manager software, which RAID configuration is valid for the volume containing the / (root) file system?

  1. RAID 0, consisting of drives c0t0d0 and c0t1d0

  2. RAID 1, consisting of drives c0t0d0 and c0t1d0

  3. RAID 5, consisting of drives c0t0d0, c0t1d0, and c0t2d0

  4. RAID 0 1, consisting of drives c0t0d0, c0t1d0, dt0d0, and c1d1d0

Answer: B

Question No: 318 – (Topic 4)

A user requires three file systems of the same size. The user requires the file systems to be able to remain online after a single disk failure. The user is NOT concerned about read or writes performance. The user has provided a disk array with 10 drives in it. The user requires the maximum amount of usable space from this array.

Which configuration satisfies all of the user#39;s requirements?

  1. three RAID-5 volumes of three drives each with one drive being used as a hot spare

  2. three RAID-0 volumes of three drives each with one drive being used as a hot spare

  3. three soft partitions created on a single RAID-1 volume consisting of all 10 drives

  4. three soft partitions created on a single RAID-5 volume consisting of all 10 drives

Answer: D

Question No: 319 – (Topic 4)

What are two beneficial features of soft partitions? (Choose two.)

  1. They allow a single large volume to be subdivided into more than eight segments.

  2. They improve throughput by scattering access across multiple physical volumes.

  3. They allow multiple physical volumes to be combined into a single logical volume.

  4. They allow the file system to grow as the underlying volume size increases without moving or destroying the data already stored on it.

  5. They allow a file system to grow beyond the limits of the underlying physical volume.

  6. They provide a more reliable method for storing data and improving availability.

Answer: A,D

Question No: 320 – (Topic 4)

When creating a slice for your database replicas, how much space should be allocated to the slice?

  1. 4 Mbytes in size for each replica that it will store.

  2. 8 Mbytes in size for each replica that it will store.

  3. 8 Kbytes in size for each replica that it will store.

  4. 4 Kbytes in size for each replica that it will store.

Answer: A

100% Ensurepass Free Download!
Download Free Demo:1z0-879 Demo PDF
100% Ensurepass Free Guaranteed!
1z0-879 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.