[Free] 2019(Nov) EnsurePass Oracle 1z0-820 Dumps with VCE and PDF 81-90

Get Full Version of the Exam

Question No.81

Select the two statements that correctly describe the operation of NWAM.

  1. If a location is explicitly enabled, it remains active until explicitly changed.

  2. Wireless security keys can be configured by using the nwammgr command.

  3. NWAM stores profile information in /etc/ipadm/ipadm.conf and /etc/dladm/datalink.conf.

  4. Multiple locations may be automatically activated in systems with multiple network interface cards.

  5. Interface NCU Properties quot;floatquot; and are automatically attached to the highest priority Link NCU Property.

  6. If the DefaultFixed NCP is enabled, persistent configuration, stored in /etc/ipadm.conf and

/etc/dladm/datalink.conf is used.

Correct Answer: AD


A: Conditional and system locations can be manually activated, which means that the location remains active until explicitly disabled.

D: A location comprises certain elements of a network configuration, for example a name service and firewall settings, that are applied together, when required. You can create multiple locations for various uses. For example, one location can be used when you are connected at the office by using the company intranet. Another location can be used at home when you are connected to the public Internet by using a wireless access point. Locations can be activated manually or automatically, according to environmental conditions, such as the IP address that is obtained by a network connection.



Oracle Solaris Administration: Network Interfaces and NetworkVirtualization, Activating and Deactivating Profiles

Oracle Solaris Administration: Network Interfaces and NetworkVirtualization, Creating and Managing Locations

Question No.82

You are setting up a local IPS package repository on your Oracle Solaris11 server: solaris.example.com.

You want to point the existing local IPS publisher to the new local IPS repository located in /repo. These are the stops that you have followed:

  1. Download and rsync the contents of the Oracle Solaris11 repository ISO image to the /repo directory.

  2. Configure the repository server service properties. The svcprop command display, the IPS related properties:

pkg/inst_root astring/repo pkg/readonly Boolean true

The 1s command displays the contents of the /repo directory:


Pkg5.repository publisher

The svcs publisher command shows the svc: /application/pkg/server: default service is online. The pkg publisher command shows the svc: /application/pkg/server: default service is online. The pkg publisher command still displays:



Which steps needs to be performed to set the local IPS publisher to the local IPS repository/repo?

  1. Issue the pkgrepo refresh -s command to refresh the repository.

  2. Restart the svc:/application/pkg/server:default service.

  3. pkg set-publisher command to set the new repository location.

  4. Issue the pkgrepo rebuild command to rebuild the repository.

  5. Issue the pkgrepo set command to set the new repository location.

Correct Answer: C


Set the Publisher Origin To the File Repository URI To enable client systems to get packages from your local file repository, you need to reset the origin for the solaris publisher. Execute the following command on each client:


# pkg set-publisher -G #39;*#39; -M #39;*#39; -g /net/host1/export/repoSolaris11/ solaris


Oracle Solaris 11 Information Library, Set the Publisher Origin To the File Repository URI

Question No.83

View the Exhibit to inspect the boot environment Information displayed within a non global zone on your system. Which two options describe the solaris-1 boot environment?


  1. The solaris-1 boot environment is not bootable.

  2. The solaris-1 boot environment is incomplete.

  3. The solaris-1 boot environment was created automatically when the non global zone was created.

  4. The solaris-1 boot environment was created in the non-global zone using the beadm create command.

  5. The solaris-1 boot environment is associated with a non active global zone boot environment.

Correct Answer: AD


A: The – of the Active Column indicates that this boot environment is inactive, and hence not bootable.


The values for the Active column are as follows: R – Active on reboot.

N – Active now.

NR – Active now and active on reboot. quot;-quot; – Inactive.

quot;!quot; – Unbootable boot environments in a non-global zone are represented by an exclamation point.

D: beadm create

Creates a new boot environment name, beName.

Note: beadm list

Lists information about the existing boot environment, which is beName, or lists information for all boot environments if beName is not provided.

Note: Using beadm Utility (Tasks)

You can use the beadm utility to create and manage snapshots and clones of your boot environments.

Note the following distinctions relevant to boot environment administration:

A snapshot is a read-only image of a dataset or boot environment at a given point in time. A snapshot is not bootable.

A boot environment is a bootable Oracle Solaris environment, consisting of a root dataset and, optionally, other datasets mounted underneath it. Exactly one boot environment can be active at a time.

A clone of a boot environment is created by copying another boot environment. A clone is bootable.


Creating and Administering Oracle Solaris 11 Boot Environments

Question No.84

You have been tasked with creating a dedicated virtual network between two local zones within a single system. In order to isolate the network traffic from other zones on that system. To accomplish this, you will create .

  1. An ether stub

  2. A virtual router

  3. A virtual switch

  4. A virtual bridge.

  5. A virtual network interface

  6. Nothing because a virtual switch is automatically created then the virtual network interfaces are created.

Correct Answer: A


Etherstubs are pseudo ethernet NICs which are managed by the system administrator. You can create VNICs over etherstubs instead of over physical links. VNICs over an etherstub become independent of the physical NICs in the system. With etherstubs, you can construct a private virtual network that is isolated both from the other virtual networks in the system and from the external network. For example, you want to create a network environment whose access is limited only to your company developers than to the network at large. Etherstubs can be used to create such an environment.


Oracle Solaris 11 introduces a new and powerful network stack architecture which includes:


Networking virtualization with virtual network interface cards (VNICs) and virtual switching (etherstubs)


Tight integration with zones


Network resource management – efficient and easy to manage integrated quality of service (QoS) to enforce bandwidth limit on VNICs and traffic flows We will be examini


Oracle Solaris Administration: Network Interfaces and Network Virtualization, Configuring Components of Network Virtualization in Oracle Solaris

Question No.85

Identify two correct statements about the Distribution Constructor. (Choose two.)

  1. Customs scripts can be used to modify the resulting ISO image created.

  2. An Image Packaging System (IPS) software repository server is required during installation from an ISO image.

  3. Manifest files contain the specifications for the contents and parameters of the ISO images to be created.

  4. ISO images can be created that dual boot, supporting both x86 and SPARC architectures with a single image.

  5. ISO images for installation of a variety of Oracle Solaris versions and hardware architectures can be created by a single installation server.

Correct Answer: AC

Question No.86

View the Exhibit. You executed the command on the Automated Installer (AJ) install server. Select the three options that describe the information in the Exhibit. (Choose three.)


  1. It shows the Al manifests and SC profiles that have been added to the sll-sparc install service.

  2. it will be used to install two zones, zonel and zone2, as part of the Automated Installation.

  3. zmanifest is used to configure zone parameters such as language, locale, time zone, terminal, users, and the root password for the zone administrator.

  4. The z1 profile and z2profile contain all of the instructions for creating the zone (zonecfg). The information used in this file is in a zonecfg export format

  5. The z1 profile and z2profile contain information to configure zone parameters such as language, locale, time zone, terminal, users, and the root password for the zone administrator.

Correct Answer: BCD

Question No.87

New features wore added to ZFS in Oracle Solaris11. Your justification to upgrade from Solaris10 to oracle Solaris11 is that it will be possible to take advantage of the enhancements that were made to ZFS. Identify the three ZFS functions and features that are included in Oracle Solaris 11, but not in Solaris 10.

  1. Encrypted ZFS datasets

  2. Ability for ZFS to detect and remove redundant data from the tile system

  3. Shadow Data Migration

  4. Ability to split a mirrored ZFS storage pool

  5. Ability to use ZFS on the boot drive and boot to a ZFS root file system.

  6. elimination of the swap file system when using ZFS on the root disk

Correct Answer: ABE


A: ZFS encryption was introduced in ZFS Pool Version Number 30, Solaris Nevada b149. Filesystem encryption since Solaris 11 Express

B: Deduplication was introduced in ZFS Pool Version Number 21, Solaris Nevada b128. E: Booting From a ZFS Root File System

Both SPARC based and x86 based systems use the new style of booting with a boot archive,

which is a file system image that contains the files required for booting. When a system is booted from a ZFS root file system, the path names of both the boot archive and the kernel file are resolved in the root file system that is selected for booting.


Oracle Solaris ZFS Administration Guide, Booting From a ZFS Root File System

Question No.88

When you issue the quot;gzip: zommand not foundquot; message is displayed. You need to install the gzip utility on your system. Which command would you use to check if the gzip utility is available from the default publisher for installation?

  1. pkg info|grep gzip

  2. pkg list SUNWgzip

  3. pkg contents gzip

  4. pkg search gzip

Correct Answer: D Explanation: Searching for Packages

Use the pkg search command to search for packages whose data matches the specified pattern.

Like the pkg contents command, the pkg search command examines the contents of packages. While the pkg contents command returns the contents, the pkg search command returns the names of packages that match the query.

pkg search

search [-HIaflpr] [-o attribute …] [-s repo_uri] query Search for matches to the query, and display the results. Which tokens are indexed are action-dependent, but may include content hashes and pathnames.


pkg is the retrieval client for the image packaging system. With a valid configuration, pkg can be invoked to create locations for packages to be installed, called #39;images#39;, and install packages into those images. Packages are published by publishers, who may make their packages available at one or more repositories. pkg, then, retrieves packages from a publisher#39;s repository and installs them into an image.

Question No.89

Which three Installation option allow for a quot;hands freequot; and quot;unattended#39;quot; Installation of the Solaris 11 environment?

  1. Jumpstart

  2. LiveCD

  3. A text Installation over the network

  4. An Automated Installation performed on an x86 client

  5. An Automated Installation using media from a local DVD or USB drive

  6. An Automated Installation using a networked repository

Correct Answer: DEF


Oracle Solaris 11 uses Automated Installer (AI) for unattended installations.

Unattended installations are possible by placing the contents of the AI Image media (or ISO image contents from a download) on an AI server.


Differences between Oracle Solaris 10 and 11 for System Administrators http://www.oracle.com/technetwork/server-storage/solaris11/overview/solaris-matrix- 1549264.html

Question No.90

After installing the OS, you boot the system and notice that the syslogd daemon is not accepting messages from remote systems. Which two options should you select to modify the syslogd daemon configuration so that it accepts messages from remote systems?

  1. svccfg -s svc:/system/system -log setprop start/exec= quot;syslogd -tquot; Restart the syslogd daemon.

  2. Set the following parameter in the /etc/syslogd.conf file: LOG_FROM_REMOTE= YES Restart the syslogd daemon.

  3. svcadm enable svc:/system/system -log/config/log_from_remote Restart the syslogd daemon.

  4. svccfg -s svc:/system/system-log setprop config/log_from_remote=true Restart the syslogd daemon.

  5. Set the following parameter in the /etc/default/syslogd file: LOG_FROM_REMOTE=YES Restart the syslogd daemon.

Correct Answer: BD


B: The /etc/default/syslogd file contains the following default parameter settings. See FILES.


Specifies whether remote messages are logged. LOG_FROM_REMOTE=NO is equivalent to the

-t command-line option. The default value for LOG_FROM_REMOTE is YES.

Get Full Version of the Exam
1z0-820 Dumps
1z0-820 VCE and PDF