Question 19

Which three options accurately describe Oracle Solaris 11 zones?

Correct Answer:ADF
A: Zones can use Oracle Solaris 11 products and features such as the following: Oracle Solaris ZFS encryption
Network virtualization and QoS CIFS and NFS
C: Non-global zones cannot modify the system clock by default, but each zone can have a separate time zone setting.
F (not E): The Oracle Solaris Zones partitioning technology is used to virtualize operating system services and provide an isolated and secure environment for running applications. A zone is a virtualized operating system environment created within a single instance of the Oracle Solaris operating system.

Question 20

Identify three differences between the shutdown and init commands.

Correct Answer:ABE

Question 21

You run the command dlstat show-link -r.
Select the two correct statements regarding the information displayed in the INTRS column.

Correct Answer:CE
In this output, the statistics for interrupt (INTRS) are significant. Low interrupt numbers indicate greater efficiency in performance. If the interrupt numbers are high, then you might need to add more resources to the specific link.
Example:
# dlstat -r -i 1
LINK IPKTS RBYTES INTRS POLLS CH<10>50 e1000g0 101.91K 32.86M 87.56K 14.35K 3.70K 205 5
nxge1 9.61M 14.47G 5.79M 3.82M 379.98K 85.66K 1.64K vnic1 8 336 0 0 0 0 0
e1000g0 0 0 0 0 0 0 0
nxge1 82.13K 123.69M 50.00K 32.13K 3.17K 724 24
vnic1 0 0 0 0 0 0 0
Note: dlstat show-link [-r [-F] | -t] [-i interval] [-a] [-p] [ -o field[, ...]] [-u R|K|M|G|T|P] [link] Display statistics for a link.
-r
Display receive-side statistics only. Includes bytes and packets received, hardware and software drops, and so forth.
List of supported RX fields: link
iusedby
ibytes ipkts intrs polls
hdrops: hardware drops
sdrops: software drops (owing to bandwidth enforcement) ch<10>ch10-50: number of packet chains of length between 10 and 50 ch>50: number of packet chains of length > 50

Question 22

You are the administrator for a group of shell script developers. They use vi, and have asked you to make their scripts automatically executable when they save their files.
How can this be accomplished?

Correct Answer:E
Unlike DOS, which uses the file extension to determine if a file is executable or not, UNIX relies on file permissions.
The value assigned by umask is subtracted from the default.
User's file creation mask. umask sets an environment variable which automatically sets file permissions on newly created files. i.e. it will set the shell process's file creation mask to mode.
umask 000 would grant full permissions. Note: 777 full permissions

Question 23

Which operation will fail if the DNS configuration is incorrect?

Correct Answer:E
www.oracle.com would have to be resolved to an IP name by the domain name service.

Question 24

The su command by default makes an entry into the log file for every su command attempt. The following is a single line from the file:
SU 12/18 23:20 + pts/1 user1-root What does the + sign represent?

Correct Answer:B
The sulog file, /var/adm/sulog, is a log containing all attempts (whether successful or not) of the su command. An entry is added to the sulog file every time the su command is executed. The fields in sulog are: date, time, successful (+) or unsuccessful (-), port, user executing the su command, and user being switched to. In the preceding example, all su attempts were successful, except for the attempt on 2/23 at 20:51, when user pete unsuccessfully attempted to su to user root.
Look for entries where an unauthorized user has used the command inappropriately. The following entry shows a successful (indicated by +) su from user userid to root.
SU 03/31 12:52 + pts/0 -root

START 1Z0-821 EXAM