Special Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: get65

Oracle Updated 1z0-820 Exam Questions and Answers by antonia

Page: 3 / 4

Oracle 1z0-820 Exam Overview :

Exam Name: Upgrade to Oracle Solaris 11 System Administrator
Exam Code: 1z0-820 Dumps
Vendor: Oracle Certification: Oracle Solaris 11 System Administrator
Questions: 133 Q&A's Shared By: antonia
Question 12

You upgraded your server to Oracle bolans 11 and you imported a zpool(pooll) that was created in bolaris 10. You need to create an encrypted ZFS file system in pooll, but first you need to make sure that your server supports ZFS encryption.

Which four statements are true for support of ZFS encryption?

Options:

A.

The encrypted file system must have been created in Oracle Solaris 11. To encrypt a ZFS file system from a previous version of Solaris, upgrade

the zpool and create a new encrypted ZFS file system in that zpool Finally, move or copy the data from the existing ZFS file system into the new encrypted ZFS file system.

B.

if you plan to create an encrypted file system in an existing zpool, the zpool must be upgraded to ZFS version 30, minimum.

C.

ZFS encryption is integrated with the ZFS command set and no additional packages need to be installed.

D.

ZFS encryption requires that the ZFS Dataset Encryption package be installed.

E If you plan to create an encrypted file system in an existing zpool, the zpool must be upgraded to ZFS version 21, minimum. D f Encryption is supported at the pool or dataset (file system) level

E.

Encryption is supported at the pool level only and every file system in the pool will be encrypted.

F.

Encryption is supported at the pool level only and every file system in the pool will be encrypted.

G.

You cannot create an encrypted file system in a zpool that was created prior to Oracle Solaris 11.

Create a new zpool in Solaris 11, create an encrypted ZFS file system in the new zpool, and move or copy the data from the existing file system into the new encrypted file system.

Discussion
Question 13

A change in your company’s security policy now requires an audit trial of all administrators assuming the sysadm role, capturing:

  • Executed commands, including options
  • Logins and logouts

There are two command necessary to accomplish this change. One is a rolemod command. What is the other?

Options:

A.

auditconfig set policy=argv

B.

auditconfig -setpolicy +argv

C.

auditconfig -setflags lo, ex sysadm

D.

auditconfig set flags=lo, ex sysadm

Discussion
Rae
I tried using Cramkey dumps for my recent certification exam and I found them to be more accurate and up-to-date compared to other dumps I've seen. Passed the exam with wonderful score.
Rayyan Sep 14, 2024
I see your point. Thanks for sharing your thoughts. I might give it a try for my next certification exam.
Cecilia
Yes, I passed my certification exam using Cramkey Dumps.
Helena Sep 19, 2024
Great. Yes they are really effective
Carson
Yeah, definitely. I would definitely recommend Cramkey Dumps to anyone who is preparing for an exam.
Rufus Aug 20, 2024
Me too. They're a lifesaver!
Georgina
I used Cramkey Dumps to prepare for my recent exam and I have to say, they were a huge help.
Corey Oct 2, 2024
Really? How did they help you? I know these are the same questions appears in exam. I will give my try. But tell me if they also help in some training?
Question 14

In an effort to reduce storage space on your server, you would like to eliminate duplicate copies of data in your server’s ZFS file systems.

How do you specify that pool1/data should not contain duplicate data blocks (redundant data) on write operations?

Options:

A.

zfs create - o compression=on pool1/data

B.

zpool create -o deduplication =on pool1; zfs create pool1/data

C.

zfs create - o deduplication=on pool1; zfs create pool1/data

D.

zfs create - o dedupratio=2 pool1/data

E.

zfs create - o dedup=on pool1/data

Discussion
Question 15

Select the two correct descriptions of the configuration of a default installation of Oracle Solaris 11. (Choose two.)

Options:

A.

The root account no longer exists.

B.

Access to the root account is restricted by RBAC.

C.

The Solaris Management Console GUI (SMC) can be used to assign the root role to a user.

D.

telnet, ftp, and other services are disabled for network access, but root can log in by using SSH.

E.

Any logged in user, who knows the password for the root account, can modify the system configuration.

F.

usermod -R +root alice will allow user alice to assume the role of root to modify the system configuration.

Discussion
Page: 3 / 4

1z0-820
PDF

$36.75  $104.99

1z0-820 Testing Engine

$43.75  $124.99

1z0-820 PDF + Testing Engine

$57.75  $164.99