Download Upgrade to Oracle Solaris 11 System Administrator.1z0-820.TestKing.2018-12-10.75q.vcex

Vendor: Oracle
Exam Code: 1z0-820
Exam Name: Upgrade to Oracle Solaris 11 System Administrator
Date: Dec 10, 2018
File Size: 2 MB
Downloads: 1

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

ProfExam Discount

Demo Questions

Question 1
You need to update an OS image on a client. The pkg publishers command displays the wrong publisher with the wrong update: 
PUBLISHER        TYPE        STATUS    URI 
Solaris         origin         online        http://pkg.oracle.com/solaris/release
The update is available on the updated publisher: 
PUBLISHER        TYPE        STATUS    URI 
Solaris         origin        online        http://sysA.example.com
Select the option that describes the procedure used to update the OS image on the system from the updated publisher.
  1. Copy the repository from the ISO image onto the local client. 
    Configure the repository on the client by using the svccfg - s command so that the Solaris publisher is connected to the new repository. 
    Refresh the application/pkg/server service. 
    Issue the pkgrepo refresh command to refresh the repository catalog
  2. Configure the publisher on the client using the svcfg - s command so that the Solaris publisher is connected to the repository at http://sysA.example.com 
    Refresh the application/pkg/server service. 
    Issue the pkgrepo refresh command to repository catalog
  3. Use the pkg set-publisher command to change the URL of the publisher Solaris to http://sysA.example.com. 
    Issue the pkg update command to update the OS image.
  4. Add the new publisher http://sysA.example.com Solaris 
    Use the pkg set-publisher command to set the publisher search order and place http://sysA.example.com of http://pkg.oracle.com/solaris/release
    Issue the pkg publisher command to view the publishers. 
    Set the new publisher to sticky. 
    Issue the pkg update command to update the OS image.
Correct answer: C
Explanation:
You can use the pkg set-publisher command to change a publisher URI. Changing a Publisher Origin URI To change the origin URI for a publisher, add the new URI and remove the old URI. Use the -g option to add a new origin URI. Use the -G option to remove the old origin URI. # pkg set-publisher -g http://pkg.example.com/support \-G http://pkg.example.com/release example.comNote: You can use either the install or update subcommand to update a package.The install subcommand installs the package if the package is not already installed in the image. If you want to be sure to update only packages that are already installed, and not install any new packages, then use the update subcommand. Reference: Oracle Solaris 11 Express Image Packaging System Guide, Managing Package Publishers
You can use the pkg set-publisher command to change a publisher URI. 
Changing a Publisher Origin URI 
To change the origin URI for a publisher, add the new URI and remove the old URI. Use the -g option to add a new origin URI. Use the -G option to remove the old origin URI. 
# pkg set-publisher -g http://pkg.example.com/support \
-G http://pkg.example.com/release example.com
Note: You can use either the install or update subcommand to update a package.
The install subcommand installs the package if the package is not already installed in the image. If you want to be sure to update only packages that are already installed, and not install any new packages, then use the update subcommand. 
Reference: Oracle Solaris 11 Express Image Packaging System Guide, Managing Package Publishers
Question 2
Alice is a user account used by Alice on a Solaris 11 system. 
sadmin is a role account on the same system. 
Your task is to add the command /usr/sbin/cryptoadm to the Network management profile, so that Alice can execute it, while assuming the sadmin role. 
Select the three activities necessary to accomplish this. 
  1. To the file /etc/security/prof_attr, add the line: 
    Network Management: solaris:cmd:RO::/usr/sbin/cryptoadm:euid=0
  2. To the file /etc/security/auth_attr, add the line: 
    Network Management: solaris:cmd:RO::/usr/sbin/cryptoadm:euid=0
  3. To the file /etc/security/exec_attr.d/local-entriies, add the line: 
    Network Management: solaris:cmd:RO::/usr/sbin/cryptoadm:euid=0
  4. Run the roles alice to ensure that alice may assume the role sadmin.
  5. Run the command profiles sadmin to ensure that the role sadmin includes the network Management profile.
  6. Run the command profiles alice to ensure that the Alice has permissions to access the Network management profile.
  7. Run the command profiles “Network management” to ensure that the Network management profile includes the sadmin role.
Correct answer: CDG
Explanation:
C: /etc/security/exec_attr is a local database  that  specifies     the  execution  attributes  associated  with  profiles.  The      exec_attr file can be used with other sources for  execution      profiles,  including  the  exec_attr NIS map and NIS+ table. A profile is a logical grouping of authorizations  and  com-      mands  that  is  interpreted  by  a  profile shell to form a      secure execution environment. Incorrect answers: A: etc/security/prof_attr is a local source for execution profile names, descriptions, and other attributes of execution profiles. The prof_attr file can be used with other profile sources, including the prof_attr NIS map. B: /etc/security/auth_attr is a local source for authorization names and descriptions. The auth_attr file can be used with other authorization sources, including the auth_attr NIS map and NIS+ table. An authorization is a right assigned to users that is checked by certain privileged programs to determine whether users can execute restricted functionality. Reference: man exec_attr
C: /etc/security/exec_attr is a local database  that  specifies
     the  execution  attributes  associated  with  profiles.  The 
     exec_attr file can be used with other sources for  execution 
     profiles,  including  the  exec_attr NIS map and NIS+ table. 
A profile is a logical grouping of authorizations  and  com- 
     mands  that  is  interpreted  by  a  profile shell to form a 
     secure execution environment. 
Incorrect answers: 
A: etc/security/prof_attr is a local source for execution profile names, descriptions, and other attributes of execution profiles. The prof_attr file can be used with other profile sources, including the prof_attr NIS map. 
B: /etc/security/auth_attr is a local source for authorization names and descriptions. The auth_attr file can be used with other authorization sources, including the auth_attr NIS map and NIS+ table. 
An authorization is a right assigned to users that is checked by certain privileged programs to determine whether users can execute restricted functionality. 
Reference: man exec_attr
Question 3
Select the two statements that correctly describe the operation of NWAM.
  1. If a location is explicitly enabled, it remains active until explicitly changed.
  2. Wireless security keys can be configured by using the nwammgr command.
  3. NWAM stores profile information in /etc/ipadm/ipadm.conf and /etc/dladm/datalink.conf.
  4. Multiple locations may be automatically activated in systems with multiple network interface cards.
  5. Interface NCU Properties "float" and are automatically attached to the highest priority Link NCU Property.
  6. If the DefaultFixed NCP is enabled, persistent configuration, stored in /etc/ipadm.conf and /etc/dladm/datalink.conf is used.
Correct answer: AD
Explanation:
A: Conditional and system locations can be manually activated, which means that the location remains active until explicitly disabled.D: A location comprises certain elements of a network configuration, for example a name service and firewall settings, that are applied together, when required. You can create multiple locations for various uses. For example, one location can be used when you are connected at the office by using the company intranet. Another location can be used at home when you are connected to the public Internet by using a wireless access point. Locations can be activated manually or automatically, according to environmental conditions, such as the IP address that is obtained by a network connection.   Incorrect answers:Note: The Network Auto-Magic (NWAM) feature simplifies basic network configuration by automatically addressing basic Ethernet and WiFi configurations, such as connecting to your wired or wireless network at startup and displaying notifications about the status of your currently active network connection from the desktop. NWAM is also designed to simplify some of the more complex networking tasks, such as the creation and management of system-wide network profiles, for example, the configuration of name services, IP Filter and IP Security (IPsec). Reference: Oracle Solaris Administration: Network Interfaces and NetworkVirtualization, Activating and Deactivating ProfilesReference: Oracle Solaris Administration: Network Interfaces and NetworkVirtualization,Creating and Managing Locations
A: Conditional and system locations can be manually activated, which means that the location remains active until explicitly disabled.
D: A location comprises certain elements of a network configuration, for example a name service and firewall settings, that are applied together, when required. You can create multiple locations for various uses. For example, one location can be used when you are connected at the office by using the company intranet. Another location can be used at home when you are connected to the public Internet by using a wireless access point. Locations can be activated manually or automatically, according to environmental conditions, such as the IP address that is obtained by a network connection. 
  
Incorrect answers:
Note: The Network Auto-Magic (NWAM) feature simplifies basic network configuration by automatically addressing basic Ethernet and WiFi configurations, such as connecting to your wired or wireless network at startup and displaying notifications about the status of your currently active network connection from the desktop. 
NWAM is also designed to simplify some of the more complex networking tasks, such as the creation and management of system-wide network profiles, for example, the configuration of name services, IP Filter and IP Security (IPsec). 
Reference: Oracle Solaris Administration: Network Interfaces and NetworkVirtualization, Activating and Deactivating Profiles
Reference: Oracle Solaris Administration: Network Interfaces and NetworkVirtualization,Creating and Managing Locations
Question 4
Consider the following rule file for use with the Basic Audit Reporting Tool (BART). 
CHECK all 
IGNORE dirmtime 
/etc/security 
/etc/notices 
IGNORE contents 
/export/home 
IGNORE mtime size contents 
/var 
CHECK 
You are using BART to detect inappropriate changes to the file system. 
Identify the two correct statements describing the attributes recorded.
  1. /var/dhcp Attribute: size uid gid mode acl
  2. /etc/hosts Attributes: size uid gid mode acl intime dest
  3. /var/spool/mqueue Attribute: size uid gid mode acl dirmtime
  4. /etc/security/exec_attr Attribute: size uid mode acl mtime devnode
  5. /export/home/kate/.profile Attributes: uid gid mode acl dirmtime
  6. /export/home/rick/.profile Attributes: size uid gid mode acl mtime contents
Correct answer: DF
Explanation:
D: According to line /etc/securityF: According to line /export/homeNot E: According to line IGNORE dirmtimeNote: In default mode, the bart compare command, as shown in the following example, checks all the files installed on the system, with the exception of modified directory timestamps (dirmtime):CHECK all IGNORE    dirmtime Note 2: The Basic Audit Reporting Tool (BART) feature of Oracle Solaris enables you to comprehensively validate systems by performing file-level checks of a system over time. By creating BART manifests, you can easily and reliably gather information about the components of the software stack that is installed on deployed systems. BART is a useful tool for integrity management on one system or on a network of systems. Reference: Oracle Solaris Administration: Security Services, BART Manifests, Rules Files, and Reports (Reference)
D: According to line /etc/security
F: According to line /export/home
Not E: According to line IGNORE dirmtime
Note: In default mode, the bart compare command, as shown in the following example, checks all the files installed on the system, with the exception of modified directory timestamps (dirmtime):
CHECK all 
IGNORE    dirmtime 
Note 2: The Basic Audit Reporting Tool (BART) feature of Oracle Solaris enables you to comprehensively validate systems by performing file-level checks of a system over time. By creating BART manifests, you can easily and reliably gather information about the components of the software stack that is installed on deployed systems. 
BART is a useful tool for integrity management on one system or on a network of systems. 
Reference: Oracle Solaris Administration: Security Services, BART Manifests, Rules Files, and Reports (Reference)
Question 5
The ZFS configuration on your server is: 
Pool1         6.67G        31K    /pool 
Pool1/data    31K        31K    /data 
Select the three commands that you would use to 1. Create, 2. List, and 3. Delete  a snapshot of the /data file system.
  1. zfs snapshot pool1/data@now
  2. zfs create snapshot pool1/data@now
  3. zfs list -t snapshot
  4. zfs list -t snapshot pool1/data
  5. zfs destroy pool1/data@now
  6. zfs destroy snapshot pool1/data@now
Correct answer: ADE
Explanation:
A: Snapshots are created by using the zfs snapshot command, which takes as its only argument the name of the snapshot to create.D: You can list snapshots as follows:# zfs list -t snapshot E: Snapshots are destroyed by using the zfs destroy command. For example:# zfs destroy tank/home/ahrens@now
A: Snapshots are created by using the zfs snapshot command, which takes as its only argument the name of the snapshot to create.
D: You can list snapshots as follows:
# zfs list -t snapshot 
E: Snapshots are destroyed by using the zfs destroy command. For example:
# zfs destroy tank/home/ahrens@now
Question 6
Which three Installation option allow for a "hands free" and "unattended'" Installation of the Solaris 11 environment?
  1. Jumpstart
  2. LiveCD
  3. A text Installation over the network
  4. An Automated Installation performed on an x86 client
  5. An Automated Installation using media from a local DVD or USB drive
  6. An Automated Installation using a networked repository
Correct answer: DEF
Explanation:
Oracle Solaris 11 uses Automated Installer (AI) for unattended installations. Unattended installations are possible by placing the contents of the AI Image media (or ISO image contents from a download) on an AI server. Incorrect answers:A: Jumpstart used for Solaris 10.B: LiveCD is used for hands-on installation.Reference: Differences between Oracle Solaris 10 and 11 for System Administratorshttp://www.oracle.com/technetwork/server-storage/solaris11/overview/solaris-matrix-1549264.html
Oracle Solaris 11 uses Automated Installer (AI) for unattended installations. 
Unattended installations are possible by placing the contents of the AI Image media (or ISO image contents from a download) on an AI server. 
Incorrect answers:
A: Jumpstart used for Solaris 10.
B: LiveCD is used for hands-on installation.
Reference: Differences between Oracle Solaris 10 and 11 for System Administrators
http://www.oracle.com/technetwork/server-storage/solaris11/overview/solaris-matrix-1549264.html
Question 7
You have been tasked with creating a dedicated virtual network between two local zones within a single system. In order to isolate the network traffic from other zones on that system. 
To accomplish this, you will create__________.
  1. An ether stub
  2. A virtual router
  3. A virtual switch
  4. A virtual bridge.
  5. A virtual network interface
  6. Nothing because a virtual switch is automatically created then the virtual network interfaces are created.
Correct answer: A
Explanation:
Etherstubs are pseudo ethernet NICs which are managed by the system administrator. You can create VNICs over etherstubs instead of over physical links. VNICs over an etherstub become independent of the physical NICs in the system. With etherstubs, you can construct a private virtual network that is isolated both from the other virtual networks in the system and from the external network. For example, you want to create a network environment whose access is limited only to your company developers than to the network at large. Etherstubs can be used to create such an environment. Note: Oracle Solaris 11 introduces a new and powerful network stack architecture which includes:* Networking virtualization with virtual network interface cards (VNICs) and virtual switching (etherstubs) * Tight integration with zones * Network resource management - efficient and easy to manage integrated quality of service (QoS) to enforce bandwidth limit on VNICs and traffic flows We will be examini Reference: Oracle Solaris Administration: Network Interfaces and Network Virtualization, Configuring Components of Network Virtualization in Oracle Solaris
Etherstubs are pseudo ethernet NICs which are managed by the system administrator. You can create VNICs over etherstubs instead of over physical links. VNICs over an etherstub become independent of the physical NICs in the system. With etherstubs, you can construct a private virtual network that is isolated both from the other virtual networks in the system and from the external network. For example, you want to create a network environment whose access is limited only to your company developers than to the network at large. Etherstubs can be used to create such an environment. 
Note: Oracle Solaris 11 introduces a new and powerful network stack architecture which includes:
* Networking virtualization with virtual network interface cards (VNICs) and virtual switching (etherstubs) 
* Tight integration with zones 
* Network resource management - efficient and easy to manage integrated quality of service (QoS) to enforce bandwidth limit on VNICs and traffic flows We will be examini 
Reference: Oracle Solaris Administration: Network Interfaces and Network Virtualization, Configuring Components of Network Virtualization in Oracle Solaris
Question 8
Which three options describe the purpose of the zonep2vchk command?
  1. Used on a Solaris 10 global zone to access the system for problems before migrating that system to a Solaris 10 branded zone.
  2. Used to access a Solaris 10 global zone for problems before migrating that zone to a Solaris 11 global zone
  3. Used to create zonecfg template for a Solaris 10 global zone that that will be migrated to a solaris10 branded zone.
  4. Used to migrate an Oracle Solaris 11 global zone to a non-global zone.
  5. Used to migrate a Solaris 10 global zone to a non-global zone on the same server; the non-global zone can then be migrated to a Solaris 11 server as a Solaris10 branded zone.
Correct answer: CDE
Explanation:
zonep2vchk - check a global zone's configuration for physical to virtual migration into non-global zone The zonep2vchk utility is used to evaluate a global zone's configuration before the process of physical-to-virtual (p2v) migration into a non-global zone. The p2v process involves archiving a global zone (source), and then installing a non-global zone (target) using that archive zonep2vchk serves two functions. First, it can be used to report issues on the source which might prevent a successful p2v migration. Second, it can output a template zonecfg, which can be used to assist in configuring the non-global zone target. zonep2vchk can be executed on a Solaris 10 or later global zone. To execute on Solaris 10, copy the zonep2vchkutility to the Solaris 10 source global zone. When run on Solaris 10, a target release of S11 can be specified, which will check for p2v into a Solaris 10 Branded zone. Reference: man zonep2vchk
zonep2vchk 
- check a global zone's configuration for physical to virtual migration into non-global zone 
The zonep2vchk utility is used to evaluate a global zone's configuration before the process of physical-to-virtual (p2v) migration into a non-global zone. 
The p2v process involves archiving a global zone (source), and then installing a non-global zone (target) using that archive 
zonep2vchk serves two functions. First, it can be used to report issues on the source which might prevent a successful p2v migration. Second, it can output a template zonecfg, which can be used to assist in configuring the non-global zone target. 
zonep2vchk can be executed on a Solaris 10 or later global zone. To execute on Solaris 10, copy the zonep2vchkutility to the Solaris 10 source global zone. 
When run on Solaris 10, a target release of S11 can be specified, which will check for p2v into a Solaris 10 Branded zone. 
Reference: man zonep2vchk
Question 9
Your are troubleshooting network throughput on your server. 
To confirm that the load balancing among aggregated links is functioning properly, you want to examine the traffic statistics on the links comprising the aggregation. 
The correct command is ___________. 
  1. dlstat - aggr
  2. dlstat show-aggr
  3. dlstat show-link -r
  4. dlstat show-link -aggr
  5. dlstat show-phys -aggr
Correct answer: B
Explanation:
dlstat show-aggr [-r | -t] [-i interval] [-p] [ -o field[,...]] [-u R|K|M|G|T|P] [link] Display per-port statistics for an aggregation. Incorrect answers:dlstat show-link [-r [-F] | -t] [-i interval] [-a] [-p] [ -o field[,...]] [-u R|K|M|G|T|P] [link] Display statistics for a link.
dlstat show-aggr [-r | -t] [-i interval] [-p] [ -o field[,...]] [-u R|K|M|G|T|P] [link] 
Display per-port statistics for an aggregation. 
Incorrect answers:
dlstat show-link [-r [-F] | -t] [-i interval] [-a] [-p] [ -o field[,...]] [-u R|K|M|G|T|P] [link] 
Display statistics for a link.
Question 10
You have set up the task.max-lwps resource control on your Solaris 11 system. 
Which option describes how to configure the system so that syslogd notifies you when the resources control threshold value for the task.max-lwps resource has 
been exceeded?
  1. Use the rctladm command to enable the global action on the task.max-lwpa resource control.
  2. Modify the /etc/syslog.conf file to activate system logging of all violations of task.max-lwps and then refresh then svc: /system/system-log:default service.
  3. Activate system logging of all violations of task.max-lwpp in the /etc/rctldm.conf file and then execute the rctladm-u command.
  4. Use the prct1 command to set the logging of all resource control violations at the time the task.max-lwps resource control is being setup.
  5. Use the setrct1 command to set the logging of all resource control violations for the task.max-lwps resource control.
Correct answer: A
Explanation:
rctladm - display  and/or  modify  global  state  of  system      resource controls The following command activates system logging of all viola-      tions of task.max-lwps.      # rctladm -e syslog task.max-lwps      # Reference: man rctladm
rctladm - display  and/or  modify  global  state  of  system 
     resource controls 
The following command activates system logging of all viola- 
     tions of task.max-lwps. 
     # rctladm -e syslog task.max-lwps 
     # 
Reference: man rctladm
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!