Which four can the SMF notification framework be configured to monitor and report?
A. all service transition states
B. service dependencies that have stopped or faulted
C. service configuration modifications
D. legacy services that have not started
E. services that have been disabled
F. service fault management events
G. processes that have been killed
Correct Answer: AEFG
Note 1: State Transition Sets are defined as:
to
Set of all transitions that have as the final state of the transition.
form-
Set of all transitions that have as the initial state of the transition.
Set of all transitions that have as the initial state of the transitional.
Set of all transitions. (A)
Valid values of state are maintenance, offline (G), disabled (E), online and degraded. An example of a transitions set definition: maintenance, from-online, to-degraded.
F: In this context, events is a comma separated list of SMF state transition sets or a comma separated list of FMA (Fault Management Architecture) event classes. events cannot have a mix of SMF state transition sets and FMA event classes. For convenience, the tags problem- {diagnosed, updated, repaired, resolved} describe the lifecycle of a problem diagnosed by the FMA subsystem - from initial diagnosis to interim updates and finally problem closure.
Note 2:
SMF allows notification by using SNMP or SMTP of state transitions. It publishes Information Events for
state transitions which are consumed by notification daemons like snmp-notify(1M) and smtp-notify(1M).
SMF state transitions of disabled services do not generate notifications unless the final state for the
transition is disabled and there exist notification parameters for that transition. Notification is not be
generated for transitions that have the same initial and final state.
Question 32:
Subnets are created by using________.
A. subnet
B. netmask
C. unicast
D. broadcast
Correct Answer: B
The process of subnetting involves the separation of the network and subnet portion of an address from the host identifier. This is performed by a bitwise AND operation between the IP address and the (sub) network prefix. The result yields the network address or prefix, and the remainder is the host identifier.
The routing prefix of an address is written in a form identical to that of the address itself. This is called the network mask, or netmask, of the address. For example, a specification of the most-significant 18 bits of an IPv4 address, 11111111.11111111.11000000.00000000, is written as 255.255.192.0.
Question 33:
You need to set up a local package repository to serve 75 client systems. Multiple clients will being the package repository concurrently and you need to ensure that the local repository performs very well under this heavy load, especially during package intensive operations.
Which option would ensure the best performance of the repository during package- intensive rations by multiple clients?
A. Set up multipathing on the package repository server to distribute the network load multiple network interfaces.
B. Deploy a second instance of the package repository server to run as a read writable mirror.
C. Deploy a second instance of the package repository server to run as a read-only mirror.
D. Deploy a second instance of the package repository server to run as a clone of the primary repository server.
E. Deploy a package repository locally on each client.
Correct Answer: A
Question 34:
Which three statements accurately describe the Automated Installation (AI) client?
A. If the AI client does not match any criteria to use a custom manifest or script, the default manifest is used.
B. If the AI client does not match any criteria to use a custom manifest or script, the automated installation aborts.
C. Any manifest or script in a service can be designated to be the default for that service.
D. Only the default.xml file is used as the default AT client manifest.
E. If a client system does not use any SC profile, then an interactive tool opens on that client at first boot after that client installation to complete the configuration of that client.
F. If a client system does not use any SC profile, then the install server will use the default SC profile.
Correct Answer: ACE
Each client uses one and only one AI manifest to complete its installation. The AI manifest is selected for a client according to the following algorithm:
* If no custom AI manifests are defined for this install service, the default AI manifest is used. The default AI manifest is not associated with any client criteria etc.
Each client can use any number of system configuration profiles. If a client system does not use any configuration profile, then an interactive tool opens on that client at first boot after that client installation to complete the configuration of that client.
Question 35:
This iron is displayed on the desktop of a laptop computer, which is running Oracle Solaris 11.
Which two statements describe the Information conveyed by this Icon?
A. NWAM is disabled.
B. NWAM is automatically configuring the network.
C. The wireless network card is manually configured and operational.
D. The wireless network card is manually configured but not operational.
E. The wireless network card is automatically configured and operational.
F. The wireless network card is automatically configured but not operational.
Correct Answer: BC
B: The Network Status notification icon is only displayed on the desktop if you are using NWAM to
automatically configure your network.
C: All online (Wireless)
Indicates all manually enabled connections in the enabled network profile are online and that the required
number of connections in the enabled profile group (if such a group exists) are online. The required
number is the same as those described for the All online (Wired) status.
Note that at least one online connection is wireless.
Question 36:
Which three files must be edited in order to set up logging of all failed login attempts?
A. /var/adm/authlog
B. /etc/syslog.conf
C. /etc/default/login
D. /var/adm/loginlog
Correct Answer: ABC
How to Monitor All Failed Login Attempts
This procedure captures in a syslog file all failed login attempts.
Assume the Primary Administrator role, or become superuser.
1.
Assume the Primary Administrator role, or become superuser.
2.
(C) Set up the /etc/default/login file with the desired values for SYSLOG and SYSLOG_FAILED_LOGINS
3.
(A) Create a file with the correct permissions to hold the logging information. Create the authlog file in the /var/adm directory.
4.
(B) Edit the syslog.conf file to log failed password attempts.
Question 37:
You are attempting to edit your crontab file in the bash shell. Instead of getting your usual vi interface, you are presented with an unfamiliar interface. In order to have your editor of choice-vi- what command must you type after exiting the unfamiliar editor?
A. EDITOR=vi
B. crontab=vi
C. crontab ?e vi
D. env
Correct Answer: A
Set the EDITOR variable to vi.
Commands like `crontab -e` will use ed per default. If you'd like to use some better editor (like vi) you can use the environment variable EDITOR:
# EDITOR=vi; crontab -e will open the users crontab in vi. Of course you can set this variable permanently.
Incorrect answers
C: -e Edits a copy of the current user's crontab file, or creates an empty file to edit if crontab does not exist. When editing is complete, the file is installed as the user's crontab file. If a username is given, the specified user's crontab file is edited, rather than the current user's crontab file; this can only be done by a user with the solaris.jobs.admin authorization. The environment variable EDITOR determines which editor is invoked with the -e option. The default editor is ed(1). All crontab jobs should be submitted using crontab. Do not
add jobs by just editing the crontab file, because cron is not aware of changes made this way.
Question 38:
The following line is from /etc/shadow in a default Solaris 11 Installation:
Last password change (lastchanged): Days since Jan 1, 1970 that password was last changed: 0
*
Minimum: The minimum number of days required between password changes i.e. the number of days left before the user is allowed to change his/her password: 15 Maximum: The maximum number of days the password is valid (after that user is forced to change his/her password): 30 Warn : The number of days before password is to expire that user is warned that his/her password must be changed: 3
*
Inactive : The number of days after password expires that account is disabled
*
Expire : days since Jan 1, 1970 that account is disabled i.e. an absolute date specifying when the login may no longer be used
Question 39:
Which command would you use to determine which package group is installed on your system?
A. pkg list group/system/\*
B. pkg info
C. uname -a
D. cat /var/sadm/system/admin/CLUSTEP
Correct Answer: B
The pkg info command provides detailed information about a particular IPS package.
Note: The pkginfo command does the same for any SVR4 packages you may have installed on the same system.
pkg info example: $ pkg info p7zip Name: compress/p7zip Summary: The p7zip compression and archiving utility Description: P7zip is a unix port of the 7-Zip utility. It has support for numerous compression algorithms, including LZMA and LZMA2, as well as for various archive and compression file formats, including 7z, xz, bzip2, gzip, tar, zip (read-write) and cab, cpio, deb, lzh, rar, and rpm (read-only). Category: System/Core State: Installed Publisher: solaris Version: 9.20.1 Build Release: 5.11
Your server has one zone named dbzone (hat has been configured, but not yet installed). Which command would you use to view all the options that were used to configure this zone?
A. zoneadm list –icv dbzone
B. zones tat –c summary dbzone
C. zonecfg –z dbzone info
D. zonecfg –icv dbzone info
Correct Answer: C
zonecfg info Display information about the current configuration. If resource-type is specified, displays only information about resources of the relevant type. If any property-name value pairs are specified, displays only information about resources meeting the given criteria. In the resource scope, any arguments are ignored, and info displays information about the resource which is currently being added or modified.
Note: zonecfg -z zonename. Specify the name of a zone. Zone names are case sensitive. Zone names must begin with an alphanumeric character and can contain alphanumeric characters, the underscore (_) the hyphen (-), and the dot (.). The name global and all names beginning with SUNW are reserved and cannot be used.
Incorrect answer:
A: The zoneadm utility is used to administer system zones. A zone is an application container that is
maintained by the operating system runtime.
list option:
Display the name of the current zones, or the specified zone if indicated.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Oracle exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 1Z0-821 exam preparations and Oracle certification application, do not hesitate to visit our Vcedump.com to find your solutions here.