Act now and download your Oracle 1Z0-879 test today! Do not waste time for the worthless Oracle 1Z0-879 tutorials. Download Leading Oracle Oracle Solaris 10 System Administrator Certified Professional Upgrade Exam exam with real questions and answers and begin to learn Oracle 1Z0-879 with a classic professional.
2016 Aug 1Z0-879 Study Guide Questions:
Q91. SystemA has a file system named /data/dbase that is being shared. systemB needs to mount that file system so that users on systemB can access the data remotely on systemA. The information in the /data/dbase file system is confidential and access to that data must be restricted so that only user1 and user2 can access the data from systemB.
Which answer describes a method to protect the data on systemA so that only specific users on
system can access that data?
A. Share the file system on systemA as follows: share -F nfs -o rw=systemB /data/dbase. On
systemB, mount the file system as follows: mount -F nfs -o hard,rw=user1,user2 \\
B. Share the file system on systemA as follows: share -F nfs -o rw=systemB:user1,user2
C. On systemA, protect the /data/dbase directory using conventional UNIX permissions so that
only user1 and user2 can access the data.
D. On systemA, protect the /data/dbase directory using conventional UNIX permissions so that only user1 and user2 can access the data. Then, share the file system on systemA as follows:
Q92. A NIS map update fails to propagate to slave servers on the network.
What are three ways to update the slave servers? (Choose three.)
A. on every slave server, execute ypinit -s <master>
B. on the master server, execute cd /var/yp; /usr/ccs/bin/make
C. on the master server, execute /usr/lib/netsvc/yp/ypxfr <mapname>
D. on every slave server, execute /usr/lib/netsvc/yp/ypxfr <mapname>
E. on only one of the slave servers, execute cd /var/yp; /usr/ccs/bin/make
F. on only one of the slave servers, execute /usr/lib/netsvc/yp/ypxfr <mapname>
Which two statements are true? (Choose two.)
A. The PID of cron is 156.
B. The process cron has the privileged user id.
C. Running pkill -KILL `pgrep cron` kills cron.
D. The process cron is logging to /var/spool/cron/atjobs.
E. The process cron is using /var/cron/log as the working directory.
Abreast of the times 1Z0-879 practice question:
Q94. Which two are valid host names in /etc/inet/hosts? (Choose two.)
C. twenty one a
Q95. You add SCSI disks to the main server and execute the appropriate commands to attach the disks. Now you need to check the physical paths where the address can be found.
Which directory contains the physical paths?
Q96. You have an x86-based server with two SATA drives. Each drive has an installation of x86 Solaris and both drives are identical. The system currently boots from the first SATA disk drive, but, after modifying the /etc/vfstab file on the boot drive, the first SATA drive will not boot. You want to boot the system from the second SATA disk drive, but it won boot. want to boot the system from the second SATA disk drive, but it won boot. What do you need to do to get the system booted?
A. Select the second SATA drive in the GRUB menu during bootup; boot to the second drive; once booted to the second drive, mount and copy the /etc/vfstab file to the boot disk.
B. Edit the boot string in the GRUB menu to boot from the second SATA drive; once booted to the second drive, mount and fix the /etc/vfstab file on the boot disk.
C. Install a bootblock onto the second SATA drive; select the second drive during bootup; once booted to the second drive, mount and fix the /etc/vfstab file on the boot disk.
D. Boot from DVD to get into a single user shell; mount and fix the /etc/vfstab file on the boot drive.
100% Guarantee 1Z0-879 :
Q97. You are logged in as the root user and you use the following command:
Which two statements are true about this command? (Choose two.)
A. You need to manually stop the snoop command.
B. You hear an audible click for each packet that is detected.
C. You see one line of output for each packet on the network.
D. The snoop command exits automatically after 30 minutes.
E. You see the full contents of every packet, formatted appropriately.
Q98. The systems on your network use only the command line to log in. A recent security review requires you to track the number of failed logins after three unsuccessful attempts have been made. You create the /var/adm/loginlog file. To complete this task you must edit the file that contains the line SYSLOG_FAILED_LOGINS=5.
Which file contains this line?
Q99. You want to set up a centralized server for sysiog messages while also limiting the type of messages sent to that server as follows:
A) All security related sysiog events should be forwarded to the bigbrother server.
B) All of the auth messages should be forwarded to the bigbrother server.
C) All messages above the notice level should be forwarded to the bigbrother server. Do not forward any user messages.
Which line needs to be added to the syslog configuration file to make this change effective?
A. auth.*;* .notice;user.crit @bigbrother
B. auth.debug;*.not ice;user.none @bigbrother
C. auth.debug;*.warning;user.none @bigbrother
D. *.emerg;*.alert;*.crit;*.warning;auth.* @bigbrother
Q100. You have been asked to configure a system to use iSCSI, which command would you use to manage a iSCSI client?