Get Full Version of the Exam
http://www.EnsurePass.com/1z0-820.html
Question No.121
In an effort to reduce storage space on your server, you would like to eliminate duplicate copies of data in your server#39;s ZFS file systems. How do you specify that pool1/data should not contain duplicate data blocks (redundant data) on write operations?
-
zfs create – o compression=on pool1/data
-
zpool create -o deduplication =on pool1; zfs create pool1/data
-
zfs create – o deduplication=on pool1; zfs create pool1/data
-
zfs create – o dedupratio=2 pool1/data
-
zfs create – o dedup=on pool1/data
Correct Answer: E
Explanation:
ZFS Deduplication Property
Solaris Express Community Edition, build 129: In this Solaris release, you can use the deduplication property to remove redundant data from your ZFS file systems. If a file system has the dedup property enabled, duplicate data blocks are removed synchronously. The result is that only unique data is stored and common components are shared between files.
You can enable this property as follows:
# zfs set dedup=on tank/home
Question No.122
You have already generated a 256-bit AES raw key and named the keystore file /mykey. You need to use the key to create an encrypted file system. Which command should you use to create a ZFS encrypted file system named pool1/encrypt using the /mykey keystore?
-
zfs create – o encryption = /mykey pool1/encrypt
-
zfs create – o encryption = 256-ccm – o keysource = raw, file : ///my key pool1/encrypt
-
zfs create – o encryption = AES keysource = /mykey pool1/encrypt
-
zfs create – o encryption = on keystore = /mykey pool1/encrypt
Correct Answer: B Explanation: Example:
Encrypting a ZFS File System by Using a Raw Key
In the following example, an aes-256-ccm encryption key is generated by using the pktool command and is written to a file, /cindykey.file.
# pktool genkey keystore=file outkey=/cindykey.file keytype=aes keylen=256 Then, the
/cindykey.file is specified when the tank/home/cindy file system is created.
# zfs create -o encryption=aes-256-ccm -o keysource=raw,file:///cindykey.file tank/home/cindys Reference:
Oracle Solaris ZFS Administration Guide, Examples of Encrypting ZFS File Systems
Question No.123
You want to deploy oracle Solaris 11 with the automated installer (AI). You need to make sure that your server and network meet the requirements for using AI. Choose the three options that describe; the requirements for using AI.
-
You can create only one manifest per install service. If you need more than one manifest, create multiple install services.
-
If two client machines have different architectures and need to be installed with the same version of the Oracle Solaris 11 OS, then create two AI manifests and a single Install service.
-
You need a separate install service for each different client architecture that you plan to install, and for each different version of the Oracle Solaris 11 OS that you plan to install on client systems.
-
If two client machines have different architectures and need to be installed with different versions of the Oracle Solaris 11 OS, then create two AI manifests and two install services.
-
The install server needs to be able to access an Oracle Solaris Image Packaging System (IPS) software package repository; the clients do not.
-
The install server can be either an x86 machine or a SPARC machine.
Correct Answer: BEF
Explanation:
B:
You can create custom AI manifests for particular clients. Create a custom XML AI manifest file. This method is best suited to an environment where few systems require custom provisioning. Most systems to be installed have identical or similar hardware and will be provisioned identically. Write a script that dynamically creates an AI manifest for each client at installation time. Use this method to create a custom installation for each client, based on client characteristics discovered at installation time.
E:
AI Server Software Requirements include Software package repository
Ensure that the install server can access an IPS software package repository. AI requires the install/installadm package.
F:
Install Server Requirements
Any system that meets these requirements can be used as an AI install server, including laptops, desktops, virtual machines, and enterprise servers. The install server can be either an x86 machine or a SPARC machine. An x86 install server can install both SPARC and x86 clients, and a SPARC install server can install both SPARC and x86 clients.
Note:
To install clients over the network, AI requires a separate system to be an install server. On the install server, create an AI install service to provide a net image and instructions for installing the
Oracle Solaris 11 OS on different clients.
Question No.124
You have a Solaris 10 system with a host name of sysA and it uses LDAP as a naming service. You have created a flash archive of sysA and you want to migrate this system to an Oracle Solaris 11 server as a solarislO branded zone The zone status on the Oracle Solaris 11 server is: zonel 0incomplete/zone/zone1solaris10 excl
Select the option that will force the non-global zone to prompt you for a host name and name service the first time it is booted.
-
Use zonecfg to change the zonename before booting the system for the first time.
-
Use the -u option with the zoneadm -z zonel 0 attach command.
-
Use the -u option with the zoneadm -z zonel 0 install command.
-
Remove the sysidcfg file from the lt;zonepathgt;/root directory before booting the non- global zone.
Correct Answer: C
Question No.125
Identify three options that describe the new Oracle Solaris 11 zone features.
-
There are boot environments for zones.
-
Administrators can delegate common administration tasks by using RBAC.
-
Oracle Solaris 11 supports Solaris 8, 9, and 10 branded zones.
-
You can migrate a physical Solaris 10 system and its non-global zones to a solaris10 branded zone running on an Oracle Solaris 11 system.
-
It is possible to change the host ID of a zone.
Correct Answer: ABD
Explanation:
A: The beadm utility includes support for creating and administering non- global zone boot environments.
Note:
A boot environment is a bootable instance of the Oracle Solaris operating system image plus any other application software packages installed into that image. System administrators can maintain multiple boot environments on their systems, and each boot environment can have different software versions installed.
B: Role-based access control (RBAC) is a security feature for controlling user access to tasks that would normally be restricted to the root role. By applying security attributes to processes and to users, RBAC can divide up superuser capabilities among several administrators.
Question No.126
View the Exhibit and review the zpool and ZFS configuration information from your system.
Identify the correct procedure for breaking the /prod_data mirror, removing c4t0d0 and c4t2d0, and making the data on c4t0d0and c4t2d0 accessible under the dev_data mount point.
-
zpool split pool1 pool2 c4t0d0 c4t2d0 zpool import pool2
zfs set mountpoint = /dev_data pool2/prod_data
-
zpool detach pool1 pool2 zpool attach pool2
zfs set mountpoint=/dev_data pool2/prod_data
-
zpool split pool1/prod_data -n pool2/dev_data zfs set mountpoint = /dev_data pool2/prod_data
-
zpool split pool1 pool2 c4t0d0 c4t2d0 zpool import pool2
Correct Answer: D
Explanation:
In this Solaris release, you can use the zpool split command to split a mirrored storage pool, which detaches a disk or disks in the original mirrored pool to create another identical pool. After the split operation, import the new pool.
Reference:
Oracle Solaris ZFS Administration Guide, Creating a New Pool By Splitting a Mirrored ZFS Storage Pool
Question No.127
You need to migrate a UFS file system named /production_ufs to a ZFS file system named
/production_ufs. The /production_ufs file system cannot be taken down or be out of production during the migration, and the current /production_ufs file system must remain active until the
/ptoduction_zfs file system is copied and ready. Which method allows you to meet both requirements?
-
Copy live data from /production_ufs to /production_zfs while /production_ufs is in use.
-
When the copy is complete, /production_zfs will contain an up-to date copy of /production_ufs
-
Create a snapshot of the UFS file system. Create the new ZFS file system.
Use cpio to copy data from the snapshot to the new ZFS file system.
-
Create a new Boot Environment. Create the ZFS file system.
Use lucreate -m to copy data from the Current UFS file system to the new ZFS file system.
-
Mirror the existing UFS file system by using SVM. After both submissions are in sync, migrate one of the submissions to a ZFS file System by using Live Upgrade.
-
Create the new ZFS file system by using zfs create import to import data from the existing UFS file system into the new ZFS file system
-
Create the new zfs file system by using the zfs create -o shadow.
Correct Answer: E
Explanation:
Migrating Data With ZFS Shadow Migration ZFS shadow migration is a tool you can use to migrate data from an existing file system to a new file system. A shadow file system is created that pulls data from the original source as necessary.
You can use the shadow migration feature to migrate file systems as follows:
A local or remote ZFS file system to a target ZFS file system A local or remote UFS file system to a target ZFS file system
Shadow migration is a process that pulls the data to be migrated:
Create an empty ZFS file system.
Set the shadow property on an empty ZFS file system, which is the target (or shadow) file system, to point to the file system to be migrated.
For example:
# zfs create -o shadow=nfs://system/export/home/ufsdata users/home/shadow2 Data from file system to be migrated is copied over to the shadow file system.
Reference:
Transitioning From Oracle Solaris 10 to Oracle Solaris 11, Migrating Data With ZFS Shadow Migration
Question No.128
You need to set up an Oracle Solaris 11 host as an iSCSI target so that the host#39;s disk can be accessed over a storage network. The disk device is c3t4d0. Which six options describe the steps that need to be taken on this host to enable an iSCSI target?
-
Create a ZFS file system named iscsi/target.
-
Create a zpool named iscsi with disk device c3t4d0
-
Create zfs volume named iscsi/target.
-
Use the stmfadm command to create a LUN using /dev/zvol/rdsk/iscsi/target.
-
Use the stmfadm command to create a LUN using iscsi/target.
-
Use the stmfadm command to make the LUN viewable.
-
Use the stmfadm command to make the volume viewable.
-
Enable the svc:/network/iscsi/target:default Service.
-
Use the itadm command to create the iSCSI target.
Correct Answer: BCDFHI
Explanation:
How to Create an iSCSI LUN?
The following steps are completed on the system that is providing the storage device. 1.Create a ZFS storage pool.
Example: target# zpool create sanpool mirror c2t3d0 c2t4d0 (C)
-
Create a ZFS volume to be used as a SCSI LUN. (D)
-
Create a LUN for the ZFS volume. Example:
target# stmfadm create-lu /dev/zvol/rdsk/sanpool/vol1 Logical unit created: 600144F0B5418B0000004DDAC7C10001
-
Confirm that the LUN has been created.
Example
target# stmfadm list-lu
LU Name: 600144F0B5418B0000004DDAC7C10001
(F) 5. Add the LUN view.
This command makes the LUN accessible to all systems.
target# stmfadm add-view 600144F0B5418B0000004DDAC7C10001 How to Create the iSCSI Target
This procedure assumes that you are logged in to the local system will contains the iSCSI target.
Note:
The stmfadm command manages SCSI LUNs. Rather than setting a special iSCSI property on the ZFS volume, create the volume and use stmfadm to create the LUN.
(H)
-
Enable the iSCSI target service.
target# svcadm enable -r svc:/network/iscsi/target:default
(I)
-
Create the iSCSI target. target# itadm create-target
Reference:
Oracle Solaris Administration: Devices and File Systems, Configuring iSCSI Devices With COMSTAR
Question No.129
Identify the two security features incorporated in the Oracle Solaris 11 Cryptographic Framework.
-
Layer 5 IP address encryptions
-
Internet protocol security
-
Diffie-Kerberos coaxial key encryption
-
Signed cryptographic plugins (providers)
-
Kernel support for signed antivirus plugins
Correct Answer: DE
Explanation:
The framework enables providers of cryptographic services to have their services used by many consumers in the Oracle Solaris operating system. Another name for providers is plugins. The framework allows three types of plugins:
User-level plugins – Shared objects that provide services by using PKCS #11 libraries, such as pkcs11_softtoken.so.1.
Kernel-level plugins – Kernel modules that provide implementations of cryptographic algorithms in software, such as AES.
Many of the algorithms in the framework are optimized for x86 with the SSE2 instruction set and for SPARC hardware.
Hardware plugins – Device drivers and their associated hardware accelerators. The Niagara chips, the ncp and n2cp device drivers, are one example. A hardware accelerator offloads expensive cryptographic functions from the operating system. The Sun Crypto Accelerator 6000 board is
one example.
Reference:
Oracle Solaris Cryptographic Framework http://docs.oracle.com/cd/E19963-01/html/821-1456/scf-10.html
Question No.130
View the Exhibit and review the file system configuration. Identify the correct procedure to create a file system with the same properties as the file system displayed in the exhibit.
-
zfs create -o mountpoint=/data2, compression=on pool1/data2
-
zfs create -o mountpoint=/data2 -o compression=on pool1/data2
-
zfs clone -o mountpoint=/data2, compression=on pool1/data@now pool1/data2
-
zfs clone -o mountpoint=/data2 -o compression=on pool1/data@now pool1/data2
-
zfs create -o mountpoint=/data2 -o compression=on pool1/data@now pool1/data2
Correct Answer: E