1Z0-876 - Oracle Solaris Certified Associate Exam

Go back to Oracle

Exam FAQ

How many questions are there on the 1Z0-876 exam? How long is the 1Z0-876 exam? How much does the 1Z0-876 exam cost? What is the best way to study for the 1Z0-876 exam?

Example Questions

Jane has stored files in a compressed tar archive. She extracts the data with the following command: $ zcat keyfiles.tar.Z | tar tvf - Examine the command line. What is the purpose of the - option passed to the tar command? Val is using the du command to gather information about data stored in her home directory. $ du -sk * | sort -n | tail > file2 Which answer correctly describes the output of this command line? Tina has executed the following command: $ affiliate.sh >/dev/null 2>1 Choose the statement that is true concerning this command. Jane likes using the Korn shell, because one of the metacharacter's used by this shell will change directory to the previous directory. Choose the metacharacter that is designed to change the user's location in the file system to the previous directory. Val has invoked the following command, to gather information about the data stored in her home directory. $ du -sk * | sort -n | tail > file2 Which answer is correct concerning this command line? Choose the command that will display a list of process signals. Wally created a new file named coursebook. The umask was set to the Solaris 10 default when the file was created. Wally used the following command to change the files permissions: $ chmod g+w ./coursebook Which octal mode with the chmod command can Wally use to set these same permissions? Frank is writing a ksh script. How does he indicate the beginning and end of a block of statements in a case statement? Wally wants to quickly create a file that stores some information about a upcoming meeting. Wally is on the phone with his customer and doesn't want to interrupt the conversation to find a pen or pencil. Choose the command sequence that Wally might use on his system to store this information. Wally wants to list all files in his current directory. Choose the command that will list all the files only in Wally's current directory. Which permission bit is required on a directory in order to list the files and directories that reside in the directory? Frank executes the following single command line: $ ln /export/home/frank/audio_books/enders_game /export/home/frank/bookdata Choose the files that would result from executing this command. Which answer describes the access control lists used with the Solaris 10 file system? A user is creating an archive using the zip utility. The user executes the following sequence of commands. $ zip -rm archive.zip /data/dir1 $ zip -rm archive.zip /product/dir1 $ zip -rm archive.zip /data/dir2 What will be the result of running this sequence of commands? You own a file that is part of a web development project. This file is shared by the group permission among the members of the web development group called webdev. The world permissions for the file are set to read only for security reasons. You wish to give write access on the file for a contractor not in the webdev group. You do not have root access. Which method describes how you can grant write permissions to the contractor's user ID? Jane is about to edit a file with the vi editor. She executes the following command: $ vi ./customer_sat.txt Choose the vi editor mode that Jane will be using when the file is opened. Wally created the following aliases. printall='pr * | lpr' pa=printall Choose the answer that best describes what the result will be when Wally uses the pa alias. You have a directory that contains only text files. You wish to compress all of these files. Which command can be used to compress these text files? Val wants to backup her home directory to a tape device. Choose the command she might use to create the backup. Wally is using a Korn shell. He uses the escape key followed by the backslash key for file name completion in this shell. Which of the following commands did Wally use to configure file name completion? Wally is trying to execute commands from his host trisol on a remote host called urbank A. Urbanka has been configured with a .rhosts file. Choose the command that will NOT use the .rhost authentication. Frank has been sent a file named Interns.jar. He would like to examine the contents of the file without extracting the file. Choose the command that will allow him to examine the file. Wally is searching for the PID of the syslog process on his system. He uses the following command: $ pgrep syslogd Choose the answer that describes the outcome of this command. Wally has just edited a file with the vi editor, he saves the new file with the name newdata. The following is a listing of that file: -rw-r----- 1 wally other 111286 May 27 19:10 newdata Based on the information provided, what is the value of the umask setting? Frank is the administrator of the site where you work. You notice Frank issues the following command: # kill -HUP `cat /usr/local/apache2/logs/httpd.pid` Choose the answer that best describes what this command will do. Wally notices that the system seems to be running slower, and he wants to run a command to determine which process might be using the most system resources. Choose the command he might use for this purpose. Wally is logged into a system and is searching in a file using the following command. $ grep -i "$LOGNAME" weekly-reports.txt What is Wally searching for in this file? Frank is trying to remove all files from a directory. The result of the rm command is shown: $ rm * rm: remove new_car_data (yes/no)? Choose the command that might allow Frank to use the rm command without being prompted for each file. Jane is trying to configure the swat utility. The software and man pages are located in the /usr/sfw directory. When Jane attempts to use the man command the following message appears: $ man swat No manual entry for swat. Choose the command that Jane can execute to display the man page. Val wants to change the permissions on a file to remove access for all user that are not in the file's group. She also wants the group permissions to allow the file to have read and write access. Val can currently read and write the file. Which octal mode with the chmod command will set those permissions? Wally has a file with data about various coffee plants, the data is stored in a file named plants, the file is in the coffee directory of Wally's home directory. He wants to find the number of entries that are NOT the plant "Gallienii" or "gallienii". Choose the command that Wally might use to extract the information from the file. Jim has moved around the file system. He wants to return to his home directory. Which command short cut will take Jim back to his home directory? Jim wants to alias the grep command to the string search. Choose the command that Jim should add to his . kshrc file to accomplish this alias. Val has gathered information about the data stored in her home directory using the following command line. $ du -sk * | sort -n | tail > file2 Which answer correctly describes what happens when the command is invoked? Which command is used at the beginning of each terminal session to identify oneself to the system? This command is invoked by the system when a connection is first established, after the previous user has terminated the login shell by issuing the exit command. Which grep program is used to search for literal strings and does not interrupt regular expressions? What are the minimum number of characters that a regular user must use when creating a password? A user named Frank issues the following command: % cal 9 1752 Choose the answer that best describes the number 9 as used in this command line. You have created a tar archive of a source code directory. You now want to compress the file using the gzip utility. Choose the command that you could use to compress the file. You have a file that contains a list of parts in a single column. You need to append the text string .ex2009 to each entry. You will use the vi editor and the last line mode to append this text to each entry. Which command will add the text correctly? You own a file that is part of a web development project. This file is shared by the group permission among the members of the web development group called webdev. The world permissions for the file are set to read only for security reasons. You wish to deny write access to the file for two members of the webdev group, but allow write access for the rest of the webdev group. You do not have root access. Which method can be used to configure this access? Jim has a compressed text file named saved.zip Jim used the following command to create the file: zip -r saved plants adding: plants (deflated 94%) Jim wants to list the contents of the plants file, but not extract it. Which command will NOT list the contents of the file plants? You have a default install of Solaris 10 on your desktop system. You are user tim. Examine the following command and output. $ ls -l project465.odt -rw-r--r-- 1 tim tim 394 Apr 9 15:29 project465.odt You need to allow another user access to write the file. You do not have access to the root account. Which command can be used to grant write access to the file? Consider the following command: $ cal 9 1752 The cal command is followed by which one of the following choices? You have a parts list, and you need to search it for all parts that contain the string V1 or the string R3. You decide to use a grep utility to search the file. Which grep command will you use? Jane executes the following command: $ alais search='grep -i >The > is defined by setting which shell variable? Which positional parameter holds the value of the number of positional parameters? Jim is considering using a different shell. One of the shell features that Jim would like to use is the tilde (~) metacharacter, used to move to the user's home directory. Choose the shell that does NOT support the tilde (~) metacharacter. You have received a file called data.tar.Z Which command will cause the file to be uncompressed and the tar file extracted, while keeping the original file unchanged? Tina has executed the following command: $ affiliate.sh 2>>/var/log/worklog Choose the statement that is true concerning this command.