Which network protocol is responsible for routing packets from one network to another?
A. TCP
B. UDP
C. IP
D. ICMP
E. Ethernet
Correct Answer: C
The Internet Protocol (IP) is the principal communications protocol in the Internet protocol suite for relaying datagrams across network boundaries. Its routing function enables internetworking, and essentially establishes the Internet.
Question 152:
How should you permanently restrict the non-global zone testzone so that it does not use more than 20 CPU shares while it is running?
A. While configuring the zone, add this entry:add rct1set name = capped.cpu-sharesadd value (priv = privileged, limit = 20, action = none)endexit
B. While configuring the zone, add this entry: add rct1set name= zone.cpu-sharesadd value (priv=privileged, limit=20, action=none)endexitfrom command line, enter: # dispadmin - d FSS
C. From the command line enter: #prct1 -n zone.cpu-shares - r - v 20 - i zone testzone
D. From the command line, enter:#prct1 - n zone.cpu-shares - v 80 - r - i zone global
Correct Answer: C
The prctl utility allows the examination and modification of the resource controls associated with an active process, task, or project on the system. It allows access to the basic and privileged limits and the current usage on the specified entity.
How to Change the zone.cpu-shares Value in a Zone Dynamically This procedure can be used in the global zone or in a non-global zone. For more information about roles, see Configuring and Using RBAC (Task Map) in System Administration Guide: Security Services. # prctl -n zone.cpu-shares -r -v value -i zone zonename idtype is either the zonename or the zoneid. value is the new value.
Note: project.cpu-shares Number of CPU shares granted to a project for use with the fair share scheduler
Question 153:
In a fresh installation of Oracle Solaris 11, default datalinks are named with a genetic naming convention, and they increment as you add interfaces. What is the default name?
A. eth#
B. net#
C. el000g#
D. lo#
E. nic#
Correct Answer: B
When you install this Oracle Solaris release on a system for the first time, Oracle Solaris automatically
provides generic link names for all the system's physical network devices. This name assignment uses the
net# naming convention, where the # is the instance number. This instance number increments for each
device, for example, net0, net1, net2, and so on.
Note:
Network configuration in Oracle Solaris 11 includes
* Generic datalink name assignment ?Generic names are automatically assigned to datalinks using the net0, net1, netN naming convention, depending on the total number of network devices that are on the system
Question 154:
Which option displays the result of running the zfs list command?
A. Option A
B. Option B
C. Option C
D. Option D
Correct Answer: B
The zfs list command provides an extensible mechanism for viewing and querying dataset information.
You can list basic dataset information by using the zfs list command with no options. This command displays the names of all datasets on the system and the values of their used, available, referenced, and mountpoint properties. For more information about these properties, see Introducing ZFS Properties.
For example:
# zfs list NAME USED AVAIL REFER MOUNTPOINT pool 476K 16.5G 21K /pool pool/clone 18K 16.5G 18K /pool/clone pool/home 296K 16.5G 19K /pool/home pool/home/marks 277K 16.5G 277K /pool/home/marks pool/home/marks@snap 0 - 277K pool/test 18K 16.5G 18K /test
Question 155:
Which network protocol provides connectionless, packet-oriented communication between applications?
A. TCP
B. UDP
C. IP
D. ICMP
E. NFS
F. IPSec
Correct Answer: B
The User Datagram Protocol (UDP) is one of the core members of the Internet Protocol Suite, the set of network protocols used for the Internet. With UDP, computer applications can send messages, in this case referred to as datagrams, to other hosts on an Internet Protocol (IP) network without requiring prior communications to set up special transmission channels or data paths. Compared to TCP, UDP is a simpler message-based connectionless protocol.
Question 156:
User1 is attempting to run the following command:
cp bigfile verybig
The system displays the following errer:
cp: cannot create verybig: Disc quota exceeded
Your initial troubleshooting shows that the df -h command indicates the account is at 100% capacity. What command would you use to determine how much disk space the user has available?
A. zfs get quota rpool/export/home/user1
B. zfs userused@user1
C. zfs quota=1M /rpool/export/home/user1
D. df -h | grep user1
Correct Answer: A
ZFS quotas can be set and displayed by using the zfs set and zfs get commands. In the following example, a quota of 10 Gbytes is set on tank/home/bonwick.
# zfs set quota=10G tank/home/bonwick # zfs get quota tank/home/bonwick NAME PROPERTY VALUE SOURCE tank/home/bonwick quota 10.0G local
Question 157:
You are using AI to install a new system. You have added to following information to the AI manifest:
Which statement is true with regard to the zone.cfg?
A. The zone.cfg file is text file in a zonecfg export format.
B. The zone.cfg file is an AI manifest that specifies how the zone is to be installed.
C. The zone.cfg file is an xml file in a form suitable for use as a command file for the zonecfg command.
D. The zone.cfg file is an SC profile with keywords that are specific for configuring a as part of the installation process.
E. It is am xml configuration file from the /etc/zone directory. It will be used as a profile for the zone. It specifies the zonename, zonepath, and other zonecfg parameters.
When issuing the zonestat 2 1h is command, the following information is displayed:
Which two options accurately describe the statistics contained in the output?
A. dbzone is using 0.21% of the total CPU resource available in the zone's processor set.
B. dbzone is using 0.21% of the global zone's total CPU.
C. dbzone is using 5.48% of the total physical memory that has been allocated to the zone.
D. dbzone is using 2.37% of the global zone's total virtual memory.
E. The network is being utilized 100% with no physical bandwidth remaining.
Correct Answer: AC
A: %PART
The amount of cpu used as a percentage of the total cpu in a processor-set to which the zone is bound. A
zone can only have processes bound to multiple processor sets if it is the global zone, or if psrset(1m)
psets are used. If multiple binding are found for a zone, it's %PART is the fraction used of all bound psets.
For [total] and [system], %PART is the percent used of all cpus on the system.
Note: The zonestat utility reports on the cpu, memory, and resource control utilization of the currently running zones. Each zone's utilization is reported both as a percentage of system resources and the zone's configured limits. The zonestat utility prints a series of interval reports at the specified interval. It optionally also prints one or more summary reports at a specified interval.
Question 159:
Identify the correct description of an IPS image.
A. An ISO image of the Solaris media DVD
B. An IPS repository
C. A depot location or source where Solaris packages can be installed from
D. A location where packages can be installed, for example, your Solaris instance
Correct Answer: D
An image is a location where packages can be installed. An image can be one of three types:
*
Full images are capable of providing a complete system.
*
Partial images are linked to a full image (the parent image), but do not provide a complete system on their own.
*
User images contain only relocatable packages.
Question 160:
You are asked to determine user jack's default login directory. Which command would provide you with useful information?
A. cat /etc/passwd | grep jack
B. cat /etc/group | grep jack
C. cat /etc/shadow | grep jack
D. cat /etc/default/passwd | grep jack
Correct Answer: A
The /etc/passwd contains one entry per line for each user (or user account) of the system. All fields are separated by a colon (:) symbol. Total seven fields as follows.
1.
Username: It is used when user logs in. It should be between 1 and 32 characters in length.
2.
Password: An x character indicates that encrypted password is stored in /etc/shadow file.
3.
User ID (UID): Each user must be assigned a user ID (UID). UID 0 (zero) is reserved for root and UIDs 1-99 are reserved for other predefined accounts. Further UID 100-999 are reserved by system for administrative and system accounts/groups.
4.
Group ID (GID): The primary group ID (stored in /etc/group file)
5.
User ID Info: The comment field. It allow you to add extra information about the users such as user's full name, phone number etc. This field use by finger command.
6.
Home directory: The absolute path to the directory the user will be in when they log in. If this directory does not exists then users directory becomes /
7.
Command/shell: The absolute path of a command or shell (/bin/bash). Typically, this is a shell. Please note that it does not have to be a shell.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Oracle exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 1Z0-821 exam preparations and Oracle certification application, do not hesitate to visit our Vcedump.com to find your solutions here.