Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: geek65

1z0-820 Upgrade to Oracle Solaris 11 System Administrator Questions and Answers

Questions 4

Select two statements that correctly describe the capabilities of the Distribution Constructor.

Options:

A.

ISO images for use with the Automated Installer (AI) can be created.

B.

Bootable USB images can be created for SPARC and x86 architectures.

C.

A single installation server can be used to create ISO images for SPARC and x86 architectures.

D.

Checkpoints can be used to pause the build, allowing scripts to run that modify the resulting ISO Image.

E.

A single Installation server can be used to create ISO images for Solaris 10 and Solaris11 operating systems.

Buy Now
Questions 5

You are troubleshooting the Oracle Solaris11 Automated Installer (AI), which is not connecting with the IPS software repository.

Which three steps will help determine the cause of DNS name resolution failure?

Options:

A.

Verify the contents of /etc/resolve.conf.

B.

Run netstat -nr to verify the routing to the DNS server.

C.

Ping the IP address of the IPS server to verify connectivity.

D.

On the installation server, verify that the menu.1st file for the client points to a valid boot arc hive.

E.

Run df -k to verify that the boot directory containing the boot archive is loopback mounted under /etc/netboot.

F.

Run the command /sbin/dhcpinfo DNSserv to ensure that the DHCP server providing the DNS server information.

Buy Now
Questions 6

Your server hangs intermittently and you believe it may be due to either faulty hardware or a driver. The support technician has told you to generate a live core dump of all memory pages for further analysis Your dump configuration is:

Dump content: kernel pages

Dump device: /dev/zvol/dsk/rpool/dump (dedicated)

Savecore directory: /var/crash

Savecore enabled: yes

Save compressed: on

You don't have enough space on the current dump device, so you need to store the dump on /dev/zvol/dsk/pool2/dump

Which option would you select to change the dump location for the next core dump and capture the content of all memory pages as requested by the support technician?

Options:

A.

dumpadm -d /dev/zvol/dsk/pool2/dump

B.

dumpadm -d /dev/zvol/dsk/pool2/dump -c all

C.

dumpadm -d /dev/zvol/dsk/pool2/dump -c curproc

D.

dumpadm -s /dev/zvol/dsk/pool2/dump -c all

E.

dumpadm -s /dev/zvol/dsk/pool2/dump

Buy Now
Questions 7

After installing the OS, you boot the system and notice that the syslogd daemon is not accepting messages from remote systems.

Which two options should you select to modify the syslogd daemon configuration so that it accepts syslog messages from remote systems? (Choose two.)

Options:

A.

svccfg -ssvc/system/system-log setprop start/exec="syslogd -t" Restart the syslogd daemon

B.

Set the following parameter in the /etc/syslogd.conf file: LOG_FROM_REMOTE=YES

Restart the syslogd daemon

C.

svcadm enable svc:/system/system-log/config/log_from_remote

Restart the syslogd daemon.

D.

svccfg -s svc /system/system-loq setprop config/log_from_remote=true

Restart the syslogd daemon.

E.

Set the following parameter in the /etc/default/syslogd file: LOG_FROM_REMOTE=YES

Restart the syslogd daemon

Buy Now
Questions 8

You want the system to generate core files when an application crashes, but you want only root to be able to view the core files. The current core configuration is:

global core file pattern: /var/core/core %f.%p

global core file content: default

init core file pattern: /var/core/pprocess/core.%f.%pp

init core file content: default

global core dumps: enabled

per—process core dumps: enabled

global setid core dumps disabled

per-process setid core dumps: disabled

global core dump logging disabled

Select the option that describes the change that needs to be made to the core dump configuration to meet this requirement.

Options:

A.

coreadm —d process

B.

coreadm -i /var/core/core.%f %p

C.

coreadm—d global

D.

coreadm -d process -d global -e global-setid -e proc-setid

E.

Make this change to the /etc/coreadm.conf file: per-process core dumps: disabled

Buy Now
Questions 9

The following information is displayed about the compress/zjp software package, which Is currently installed on this system:

NAME (PUBLISHER)VERSIONIFO

Compress/zip3.1.2-0.175.0.0.0.0.537if-

NAMEVERSIONDATECOMMENT

Compress/zip3.109 Dec 2011 04:50:38 ESTNone

Which statement describes the information that is displayed tor the compress/zip software package?

Options:

A.

This package cannot be removed.

B.

This package can be updated to a new version when the new version of the package becomes available.

C.

This package cannot be updated.

D.

This package can be updated to version 3.1.3 but not 3.2.

E.

This package cannot be downgraded to version 3.1.1.

Buy Now
Questions 10

Which command should you choose to display the current parameters for the FSS scheduler?

Options:

A.

dispadmin - c FSS

B.

prionctl -c FSS

C.

dispadmin -c FSS -g

D.

priocntl -c FSS -g

Buy Now
Questions 11

You want to deploy oracle Solaris 11 with the automated installer (AI). You need to make sure that your server and network meet the requirements for using AI.

Choose the three options that describe; the requirements for using AI.

Options:

A.

You can create only one manifest per install service. If you need more than one manifest, create multiple install services.

B.

If two client machines have different architectures and need to be installed with the same version of the Oracle Solaris 11 OS, then create two AI manifests and a single Install service.

C.

You need a separate install service for each different client architecture that you plan to install, and for each different version of the Oracle Solaris 11 OS that you plan to install on client systems.

D.

If two client machines have different architectures and need to be installed with different versions of the Oracle Solaris 11 OS, then create two AI manifests and two install services.

E.

The install server needs to be able to access an Oracle Solaris Image Packaging System (IPS) software package repository; the clients do not.

F.

The install server can be either an x86 machine or a SPARC machine.

Buy Now
Questions 12

You upgraded your server to Oracle Solaris 11 and you imported zpool (pool1) that was created in Solaris 10. You need to create an encrypted ZFS file system in pool1, but first you need to make sure that your server supports ZFS encryption.

Which four statements are true for support of ZFS encryption?

Options:

A.

The encrypted file system must have been created in Oracle Solaris11. To encrypt a ZFS file system from a previous version of Solaris, upgrade the zpool and create a new encrypted ZFS file system into the encrypted ZFS file system.

B.

If you plan to create an encrypted file system in an existing zpool, the zpool must be upgraded to ZFS version 30.

C.

ZFS encryption is integrated with the ZFS command set and no additional packages need to be installed.

D.

ZFS encryption requires that the ZFS Dataset Encryption package be installed.

E.

If you plan to create an encrypted file system in an existing zpool, the pool must be upgraded to ZFS version 21, minimum.

F.

Encryption is supported at the pool or dataset (file system) level.

G.

Encryption is supported at the pool level only for every file system in the pool will be encrypted.

Buy Now
Questions 13

You have been tasked with creating a dedicated virtual network between two local zones within a single system. In order to isolate the network traffic from other zones on that system.

To accomplish this, you will create__________.

Options:

A.

An ether stub

B.

A virtual router

C.

A virtual switch

D.

A virtual bridge.

E.

A virtual network interface

F.

Nothing because a virtual switch is automatically created then the virtual network interfaces are created.

Buy Now
Questions 14

alice is a user account used by Alice on a Solaris 11 system.

sadmin is a role account on the same system.

Your task is to add the command /usr/sbin/cryptoadm to the Network management profile, so that Alice can execute it, while assuming the sadmin role.

Select the three activities necessary to accomplish this.

Options:

A.

To the file /etc/security/prof_attr, add the line:

Network Management: solaris:cmd:RO::/usr/sbin/cryptoadm:euid=0

B.

To the file /etc/security/auth_attr, add the line:

Network Management: solaris:cmd:RO::/usr/sbin/cryptoadm:euid=0

C.

To the file /etc/security/exec_attr.d/local-entriies, add the line:

Network Management: solaris:cmd:RO::/usr/sbin/cryptoadm:euid=0

D.

Run the roles alice to ensure that alice may assume the role sadmin.

E.

Run the command profiles sadmin to ensure that the role sadmin includes the network Management profile.

F.

Run the command profiles alice to ensure that the Alice has permissions to access the Network management profile.

G.

Run the command profiles “Network management” to ensure that the Network management profile includes the sadmin role.

Buy Now
Questions 15

View the Exhibit

The file came from your Automated Installer (Al) Install server.

The file is_______.

Options:

A.

an Al SC profile for non-global zones

B.

the default Al config file for non-global zones

C.

the default Al manifest for non-global zones

D.

a custom Al manifest

Buy Now
Questions 16

You have a Solaris 10 system with a host name of sysA and it uses LDAP as a naming service. You have created a flash archive of sysA and you want to migrate this system to an Oracle Solaris 11 server as a solarislO branded zone The zone status on the Oracle Solaris 11 server is:

-zonel 0incomplete/zone/zone1solaris10 excl

Select the option that will force the non-global zone to prompt you for a host name and name service the first time it is booted.

Options:

A.

Use zonecfg to change the zonename before booting the system for the first time.

B.

Use the -u option with the zoneadm -z zonel 0 attach command.

C.

Use the -u option with the zoneadm -z zonel 0 install command.

D.

Remove the sysidcfg file from the /root directory before booting the non-global zone.

Buy Now
Questions 17

Review the zonestat command:

zonestate - q physical - memory -R high -z -p -p “zones” 10 24h 60m

Select the option that correctly describes the information that is displayed by this command.

Options:

A.

It is a sample of dbzone’s physical memory usage taken every hour over a 24-hour period.

Only the top 10 samplings of peak memory usage are displayed.

All other utilization data is eliminated.

B.

It is a sample of dbzone’s CPU, virtual memory, and networking utilization.

Physical memory is executed from the report.

The sampling is taken every 10 minutes over a 24-hour period and peak utilization id displayed each hour.

C.

It is a sample of dbzone’s CPU, virtual memory, and networking utilization.

Physical memory is executed from the report.

The sampling is taken every 10 minutes over a 24-hour period and displayed each hour.

D.

It is a sample of dbzone’s physical memory usage taken every 10 seconds and 24-hour period.

Only peak virtual memory usage and CPU utilization are displayed each hour.

All other Utilization data is eliminated.

E.

It is a sample of dbzone’s physical memory usage taken every 10 seconds and 24-hour period.

Only peak memory usage is displayed each hour.

All other utilization data is eliminated.

Buy Now
Questions 18

Review the output from a ZFS file system:

NAMEPROPERTYVALUESOURCE

pool1/encryptencryptionaes-256-ccmlocal pool1/encryptkeysourceraw,file///mykeylocal

You need to recreate the pooM/encrypt file system exactly as it is listed above Which two commands can you use to recreate the pooM/encrypt file system?

(Choose two.)

Options:

A.

pktool genkey keystone=file outkey=/mykey keytype=aes keylen=256

B.

genkey pktool keystore=file outkey=/mykey keytype=aes keylen=256

C.

zfs create -o encryption=aes-256-ccm -o keysource=raw,file://mykey pooll/encrypt

D.

zfs create -o encryption=aes-256-ccm -o keysource=raw,file:///mykey pooM/encrypt

E.

zfs create -o encryption=aes-256-ccm -o keysource=raw,file:///mykey source=local pooll/encrypt

Buy Now
Questions 19

You are using this rule file with the Basic Audit Reporting Tool (BART) to detect inappropriate file system changes.

CHECK all IGNORE dirmtime

/etc/acct /etc/security /etc/notices IGNORE contents

/export/home/alice IGNORE mtime size contents

A/ar CHECK

/var/tmp IGNORE all

Identify the two correct statements describing the attributes recorded. (Choose two.)

Options:

A.

/var/spool/cron/crontabs Attributes: size uid gid mode acl

B.

/var/spool/croa'crontabs Attnbutes: size uid gid mode acl dirmtime

C.

/export/home/lesley/.bash_history Attributes: uid gid mode acl

D.

/export/home/sandra/.bash_history Attributes: uid gid mode dest

E.

/etc/security/prof_attr.d Attributes: uid gid mode acl dirmtime

F.

/etc/security/prof_attr.d Attributes: size uid gid mode acl devnode

Buy Now
Exam Code: 1z0-820
Exam Name: Upgrade to Oracle Solaris 11 System Administrator
Last Update: Jun 15, 2025
Questions: 133
1z0-820 pdf

1z0-820 PDF

$29.75  $84.99
1z0-820 Engine

1z0-820 Testing Engine

$35  $99.99
1z0-820 PDF + Engine

1z0-820 PDF + Testing Engine

$47.25  $134.99