leads4pass 1Z0-820 exam dumps (already updated) are here for your study. leads4pass provides a real 1Z0-820 exam study guide, real Oracle certification 1Z0-820 exam study guide that helps you to study for the 1Z0-820 exam easily.
We provide the latest 1Z0-820 exam dumps (133 Q&A) https://www.leads4pass.com/1z0-820.html (PDF or VCE format) study guide for you to pass.
Pass Guarantee 1Z0-820 Exam By Taking New 1Z0-820 Exam Dumps Practice Questions
Sample questions of the 1Z0-820 free dumps
Question 1:
Which modification needs to be made to the Service Management Facility before you publish a new package to the IPS repository?
A. The pkg. depot must be disabled.
B. The pkg/read-only property for the application/pkg/server service must be set to false
C. The pkg/writable_root property for the application/pkg/server service must be set to true.
D. The pkg/image_root property for the application/pkg/server service must be set to the location of the repository.
Correct Answer: D
Explanation: pkg/image_root
(string) The path to the image whose file information will be used as a cache for file data.
Reference: man pkg. depot
Question 2:
You run the command distant show-link -r.
Select the two correct statements regarding the information displayed in the INTRS column.
A. No value is listed for virtual network interfaces.
B. A value of 0 is listed for virtual interfaces and ether stubs.
C. The number of Interrupts is listed, which indicates network efficiency.
D. A number equal to the number of transmitted Ethernet frames is listed for physical links.
E. The number of packets that were interrupted by a collision is listed, which may indicate hardware problems.
Correct Answer: CE
Explanation: In this output, the statistics for interrupt (INTRS) are significant. Low interrupt numbers indicate greater efficiency in performance. If the interrupt numbers are high, then you might need to add more resources to the specific link.
Example: # dlstat -r -I 1 LINK IPKTS RBYTES INTRS POLLS CH50
e1000g0 101.91K 32.86M 87.56K 14.35K 3.70K 205 5
nxge1 9.61M 14.47G 5.79M 3.82M 379.98K 85.66K 1.64K
vnic1 8 336 0 0 0 0 0
e1000g0 0 0 0 0 0 0 0
nxge1 82.13K 123.69M 50.00K 32.13K 3.17K 724 24
vnic1 0 0 0 0 0 0 0
Note: distant show-link [-r [-F] | -t] [-i interval] [-a] [-p] [ -o field[,…]] [-u R|K|M|G|T|P] [link] Display statistics for
a link.
-r
Display receive-side statistics only. Includes bytes and packets received, hardware and software drops,
and so forth.
List of supported RX fields:
link
Tuesday
bytes
pets
intros
polls
hydrops: Hardware drops
drops: software drops (owing to bandwidth enforcement) ch<10: number of packet chains of length < 10
ch10-50: number of packet chains of length between 10 and 50 ch>50: number of packet chains of length
> 50
Reference: man distant
Question 3:
You want to deploy Oracle Solans 11 with the Automated Installer (Al). You need to make sure that your server and network meet the requirements for using Al Choose the three options that describe the requirements for using Al. (Choose three.)
A. You must set up DHCP. The DHCP server and Al install server can be the same machine or two different machines.
B. You can create only one manifest per install service. If you need more than one manifest, create multiple install services.
C. The minimum requirement to operate as an Al install server is 1 GB of memory.
D. If two client machines have different architectures and need to be installed with the same version of the Oracle Solaris 11 OS( then create two Al manifests and a single install service.
E. Load the install/installed package on the Al server.
Correct Answer: ADE
Question 4:
The resource control in your zone is:
roll
name: zone.CPU-shares
value: (pnv=phvJleged,limit=20,aclion=none)
When you boot the zone, this message is displayed:
WARNING: The zone.cpu-shares rctl is set but FSS is not the default scheduling class for this zone. FSS
will be used for processes in the zone but to get the full benefit of FSS, it should be the default scheduling
class.
Which option will resolve this issue?
A. in the global zone, run this command to change the process scheduler for the global zone dispadmin -d FSS
B. in the non-global zone, run this command to change the process scheduler for this specific zone: dispadmin -d FSS
C. Change the zone resource control to: value: (priv=privileged,limit=20,action=none, default)
D. Use svccfg to modify the general/scheduler property in the svc:/system/zones: default service: svccfg -s system/zones: default editprop general/scheduler=FSS
Correct Answer: D
Question 5:
You are setting up an automated installer (AI) install server and issuing the following command:
installed create-service -n prod_ai -s /repo/prod_ai.iso \
-I 192.168.1.100 -c 5 -d /export/repo
Which four options describe the install server that you have configured?
A. The service name is prod_ai.
B. DHCP base IP address is 192.168.1.100
C. The initial IP address for the install clients will be 192.168.1.100. This IP address is temporary. After the client is booted, it will use IP addresses in the following range: 192.168.1.101-105.
D. Five IP addresses are allocated for DHCP clients, starting with 192.168.1.100.
E. The Install server will support up to five clients.
F. The AI net image ISO file is located in /repo/prod and the net image ISO will be unpacked in /export/ repo.
G. The AI net image ISO file is located in /repo/repo and is named /repo/prod/_ai.iso.
Correct Answer: ABDF
Explanation: A: -n
Uses this install service name instead of the default
service name.
B: -i
Sets up a new DHCP server. The IP addresses,
starting from dhcp_address_start, are set up.
D: -c
Sets up a total number of IP addresses in the
DHCP table equal to the value of the
count_of_ipaddr. The first IP address is the
value of dhcp_ip_start that is provided by the
-I option.
F: -s
Specifies the location of the AI ISO image to use for
setting up the install service.
Required: Specifies the location to set up the net image.
Reference: man installed
Question 6:
You have already generated a 256-bit AES raw key and named the keystore file /mykey. You need to use the key to create an encrypted file system.
Which command should you use to create a ZFS encrypted file system named pool1/encrypt using the / mykey keystore?
A. zfs create – o encryption = /mykey pool1/encrypt
B. zfs create – o encryption = 256-ccm – o key source = raw, file : ///my key pool1/encrypt
C. zfs create – o encryption = AES key source = /mykey pool1/encrypt
D. zfs create – o encryption = on key store = /mykey pool1/encrypt
Correct Answer: B
Explanation: Example: Encrypting a ZFS File System by Using a Raw Key
In the following example, an aes-256-ccm encryption key is generated by using the petrol command and is
written to a file, /cindykey.file.
# pktool genkey keystore=file outkey=/cindykey.file keytype=aes keylen=256 Then, the /cindykey.file is
specified when the tank/home/Cindy file system is created.
# zfs create -o encryption=aes-256-ccm -o keysource=raw,file:///cindykey.file tank/home/Cindy
Reference: Oracle Solaris ZFS Administration Guide, Examples of Encrypting ZFS File Systems
Question 7:
Which three statements are true for the Oracle Solans 111mage Packaging System (IPS)? (Choose three.)
A. a local repository should be stored on a 2FS file system.
B. Network access to an IPS repository is provided to client systems using NFS.
C. Network access to an IPS repository is provided to client systems using NFS and HTTP.
D. The distribution constructor can get packages from a local IPS to build an installation image.
E. A mirror repository contains all of the metadata and content for software packages.
F. Clients access a mirror repository to obtain a publisher\’s catalog and software packages.
Correct Answer: DEF
Question 8:
New features wore added to ZFS in Oracle Solaris11. Your justification to upgrade from Solaris10 to oracle Solaris11 is that it will be possible to take advantage of the enhancements that were made to ZFS.
Identify the three ZFS functions and features that are included in Oracle Solaris 11, but not in Solaris 10.
A. Encrypted ZFS datasets
B. Ability for ZFS to detect and remove redundant data from the tile system
C. Shadow Data Migration
D. Ability to split a mirrored ZFS storage pool
E. Ability to use ZFS on the boot drive and boot to a ZFS root file system.
F. elimination of the swap file system when using ZFS on the root disk
Correct Answer: ABE
Explanation: A: ZFS encryption was introduced in ZFS Pool Version Number 30, Solaris Nevada b149.
Filesystem encryption since Solaris 11 Express
B: Deduplication was introduced in ZFS Pool Version Number 21, Solaris Nevada b128.
E: Booting From a ZFS Root File System Both SPARC-based and x86-based systems use the new style of booting with a boot archive, which is a file system image that contains the files required for booting. When a system is booted from a ZFS root file system, the path names of both the boot archive and the kernel file are resolved in the root file system that is selected for booting.
Reference: Oracle Solaris ZFS Administration Guide, Booting From a ZFS Root File System
Question 9:
Which three Installation options allow for a “hands-free” and “unattended\'” Installation of the Solaris 11 environment?
A. Jumpstart
B. LiveCD
C. A text Installation over the network
D. An Automated Installation performed on an x86 client
E. An Automated Installation using media from a local DVD or USB drive
F. An Automated Installation using a networked repository
Correct Answer: DEF
Explanation: Oracle Solaris 11 uses Automated Installer (AI) for unattended installations.
Unattended installations are possible by placing the contents of the AI Image media (or ISO image contents from a download) on an AI server.
Reference: Differences between Oracle Solaris 10 and 11 for System Administrators http:// www.oracle.com/technetwork/server-storage/solaris11/overview/solaris-matrix- 1549264.html
Question 10:
View the Exhibit and review the pool and ZFS configuration information from your system.
Sample questions of the 1Z0-820 q10Sample questions of the 1Z0-820 q10
Identify the correct procedure for breaking the /prod_data mirror, removing c4t0d0 and c4t2d0, and making the data on c4t0d0 and c4t2d0 accessible under the dev_data mount point.
A. zpool split pool1 pool2 c4t0d0 c4t2d0 zpool import pool2 zfs set mount point = /dev_data pool2/prod_data
B. zpool detach pool1 pool2 zpool attach pool2 zfs set mountpoint=/dev_data pool2/prod_data
C. zpool split pool1/prod_data -n pool2/dev_data zfs set mount point = /dev_data pool2/prod_data
D. zpool split pool1 pool2 c4t0d0 c4t2d0 zpool import pool2
Correct Answer: D
Explanation: In this Solaris release, you can use the pool split command to split a mirrored storage pool, which detaches a disk or disks in the original mirrored pool to create another identical pool. After the split operation, import the new pool.
Reference: Oracle Solaris ZFS Administration Guide, Creating a New Pool By Splitting a Mirrored ZFS Storage Pool
Question 11:
View the Exhibit
To simplify the administration of a network, the decision was made to use bridging rather than routing Your
the network includes three Oracle Solaris 11 systems,
en-tiny cib uiiuyo yiuviumy reuunuaiu pauiways.
You previously created the bridges on each system with the following commands:
SystemA#dladmcreate-bridge-1 net -1 net2 bridge
SystemB # dladm create-bridge -1 netl -1 net2 bndgeB
SystemC # dladm create-bridge -1 netl -1 net2 bndgeC
You notice that network performance is less than expected, and packets between networks X and Z are
being forwarded by bridge A and bridge B, rather than being forwarded directly by budget.
Select the solution
A. SystemC # dladm modify-bndge -p stp bridges
B. SystemA # dladm modify-bridge -p stp bridge SystemB # dladm modify-bridge -p stp budget SystemC # dladm modify-bridge -p stp bridges
C. SystemC # dladm modify-bridge -p trill bridges
D. SystemA # dladm modify-bridge -p trill bridge SystemB # dladm modify-bridge -p trill budget SystemC # dladm modify-bridge -p trill budget
E. SystemC # ipadm set-prop -p forwarding=on bridges
F. SystemC # dladm set-link prop -p promiscuous=on bridges
Correct Answer: E
Question 12:
You have been asked to troubleshoot the initial configuration of a virtual network connecting two local zones with the outside world.
View the exhibit.
The command dladm create-vnic -1 vswitch192.168.1 vnic1 fails with the error dladm: invalid link name `vswitch192.168.1\’ What is the reason for this error?
A. The name vswitch192.168.1 is not legal.
B. The zone must be specified with dladm create-vnic -z zone3 vnic1.
C. The virtual interface must be specified with dladm create-vnic -z zone3 vnic1.
D. The virtual interface must be created with ipadm create-vnic -1 switch192.168.1.
E. The virtual switch must be created first with dladm create -etherstub vswitch192.168.1.
Correct Answer: E
Explanation: There is no data link named vswitch192.168.
We need to create an etherstub first.
See the Note and example below for details.
Note: Create a VNIC in the system\’s global zone.
# dladm create-vnic -l data-link vnic-name
data-link is the name of the interface where the VNIC is to be configured.
-l link, –link=link
link can be a physical link or an other stub.
vnic-name is the name that you want to give the VNIC.
For example, to create a VNIC named vnic0 on interface e1000g0, you would type the following:
# dladm create-vnic -l e1000g0 vnic0
Example: Creating a Virtual Network Without a Physical NIC
First, create an etherstub with the name stub1:
# dladm create-etherstub stub1
Create two VNICs with the names hello0 and test1 on the etherstub. This operation implicitly creates a virtual
switch connecting hello0 and test1. # dladm create-vnic -l stub1 hello0 # dladm create-vnic -l stub1 test1 Reference: man dladm
Question 13:
You have set up the task. max-was resource control on your Solaris 11 system.
Which option describes how to configure the system so that syslogd notifies you when the resources control the threshold value for the task? max-lips resource has been exceeded?
A. Use the rctladm command to enable the global action on the task.max-lwpa resource control.
B. Modify the /etc/syslog.conf file to activate system logging of all violations of the task.max- lwps and then refresh then svc: /system/system-log: default service.
C. Activate system logging of all violations of task.max-lwpp in the /etc/rctldm.conf file and then execute the rctladm-u command.
D. Use the prct1 command to set the logging of all resource control violations at the time the task. max was resource control is being set up.
E. Use the setrct1 command to set the logging of all resource control violations for the task.max-was resource control.
Correct Answer: A
Explanation: rctladm – display and/or modify the global state of system resource controls The following command activates system logging of all violations of the task. max-lips. # rctladm -e syslog task.max-lips
# Reference: man rctladm
Question 14:
You are using Wireshark or snoop to observe network traffic, by using the observability node /dev/net/budget. The bridge was created with: dladm create-bridge -1 net -1 net2 bridge
The captured packets are those__________.
A. sent, prior to VLAN tag modifications
B. received, after VLAN tag modifications
C. received, prior to VLAN tag modifications
D. sent and received, after VLAN tag modifications
Correct Answer: A
Question 15:
Identify three options that describe the new Oracle Solaris 11 zone features.
A. There are boot environments for zones.
B. Administrators can delegate common administration tasks by using RBAC.
C. Oracle Solaris 11 supports Solaris 8, 9, and 10 branded zones.
D. You can migrate a physical Solaris 10 system and its non-global zones to a solaris10 branded zone running on an Oracle Solaris 11 system.
E. It is possible to change the host ID of a zone.
Correct Answer: ABD
Explanation: A: The beam utility includes support for creating and administering non-global zone boot environments. Note: A boot environment is a bootable instance of the Oracle Solaris operating system image plus any other application software packages installed into that image. System administrators can maintain multiple boot environments on their systems, and each boot environment can have different software versions installed.
B: Role-based access control (RBAC) is a security feature for controlling user access to tasks that would normally be restricted to the root role. By applying security attributes to processes and to users, RBAC can divide up superuser capabilities among several administrators.
leads4pass 1Z0-820 exam dumps are the best 1Z0-820 exam study guide, download the latest 1Z0-820 exam dumps at https://www.leads4pass.com/1z0-820.html (PDF or VCE format) and easily pass Oracle 1Z0-820 exam.
If you are looking online for a reliable and real 1Z0-820 exam study guide, then leads4pass is the place for you.