网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
How can an operator temporarily gain access to the command line while in a smit session, without losing the current smit session?()
A

F2 key

B

F6 key

C

F8 key

D

F9 key


参考答案

参考解析
解析: 暂无解析
更多 “单选题How can an operator temporarily gain access to the command line while in a smit session, without losing the current smit session?()A F2 keyB F6 keyC F8 keyD F9 key” 相关考题
考题 How can I ________ the information room?A.find out the way toB.be aware of the direction toC.gain access toD.be led to

考题 How can an operator temporarily gain access to the command line while in a smit session, without losing the current smit session?() A. F2 keyB. F6 keyC. F8 keyD. F9 key

考题 After executing the "show host" command, which of the information below would you see?() A. The IP addresses of workstations allowed gain access to the router via an access listB. Permanent name-to-address mappings created using the ip host command.C. Temporary and permanent DNS entries.D. The names of the routers created using the hostname command.E. The length of time of users logged into the router, as well as the duration

考题 Which of the following answer choices are correct characteristics of named access list?() A. You can delete individual statements in a named access listB. Named access lists require a numbered range from 1000 to 1099.C. Named access lists must be specified as standard or extended.D. You can use the ip access-list command to create named access lists.E. You cannot delete individual statements in a named access list.F. You can use the ip name-group command to apply named access lists.

考题 What can be done to secure the virtual terminal interfaces on a router?() A. Administratively shut down the interface.B. Physically secure the interface.C. Create an access list and apply it to the virtual terminal interfaces with the access-group command.D. Configure a virtual terminal password and login process.E. Enter an access list and apply it to the virtual terminal interfaces using the access-class command.

考题 What command can be used toglobally disable the requirement that a translation rulemust exist beforepackets can pass through the firewall?() A、 nat  0B、 nonat-controlC、 access-listD、 none of the above

考题 Which of the following technologies can be used to remotely gain access to a server console?()A、PS/2 KVMB、LDAPC、VNCD、Remote desktopE、VPN

考题 How many ARFCNs can an operator use if allocated 15 MHz uplink and 15 MHz downlink (minus one for guardband)? ()A、14 ARFCNsB、15 ARFCNsC、29 ARFCNsD、75 ARFCNsE、74 ARFCNs

考题 The Company security administrator wants to prevent VLAN hopping on the network.  What is one  method that can be used to do this?  ()A、 Attacks are prevented by utilizing the port-security feature.B、 An end station attempts to gain access to all VLANs by transmitting Ethernet frames in the  802.1q encapsulation.C、 Configuring an interface with the switchport mode dynamic command will prevent VLAN  hopping.D、 An end station attempts to redirect VLAN traffic by transmitting Ethernet frames in the 802.1q  encapsulation.E、 Configuring an interface with the "switchport mode access" command will prevent VLAN  hopping.

考题 Which can be done to secure the virtual terminal interfaces on a router?()A、Administratively shut down the interfaces.B、Physically secure the interfaces.C、Configure a virtual terminal password and login process.D、Enter an access list and apply it to the terminal interfaces using the access-class command.E、Create an access list and apply it to the terminal interfaces using the access-group command

考题 Which can be done to secure the virtual terminal interfaces on a router?()A、Administratively shut down the interfaces.B、Physically secure the interfaces.C、Configure a virtual terminal password and login process.D、Enter an access list and apply it to the terminal interfaces using the access-class command.E、Create an access list and apply it to the terminal interfaces using the access-group command.

考题 After executing the "show host" command, which of the information below would you see?()A、The IP addresses of workstations allowed gain access to the router via an access listB、Permanent name-to-address mappings created using the ip host command.C、Temporary and permanent DNS entries.D、The names of the routers created using the hostname command.E、The length of time of users logged into the router, as well as the duration

考题 The operator needs to execute a long-running shell script. How can the script be executed so the operator does not have to wait until it is complete to access the command prompt?()A、./script.kshB、nohup ./script.kshC、run -b ./script.kshD、./script.ksh nohup.out

考题 An operator just completed a repair to a disk subsystem that contains a disk heartbeat. Before returning the system back into production mode, there is a requirement to verify the disk heartbeat is functioning.  How should the operator determine if the disk heartbeat network functioning?()   A、 Use the clinfo command to monitor the disk heartbeatB、 Use the mail command to check for messages form HACMPC、 Use the dhbread command to verify the disk heartbeat linkD、 Use the clstat command to verify the appropriate network connections are available

考题 How can an operator list all its history of commands in one step?()A、Run c -l 0?from the command line.Run ?c -l 0?from the command line.B、Invoke SMIT for the shell environment.C、Run the SC + H?combination at the command prompt.Run the ?SC + H?combination at the command prompt.D、Use a rep?command with its UID against the /var/log/history_cmds file.Use a ?rep?command with its UID against the /var/log/history_cmds file.

考题 How can an operator temporarily gain access to the command line while in a smit session, without losing the current smit session?()A、F2 keyB、F6 keyC、F8 keyD、F9 key

考题 Operator needs to remove all leading comments # from shell.script file. Which of the following vi sub-command can achieve this?()A、:r/^#//gB、:1,$ s/^#//gC、:sed s/^#//gD、:sub s/^#//g

考题 You issued the following command to mount the DATA disk group in restricted mode:   ALTER DISKGROUP data MOUNT RESTRICT;   What is the implication of this command?()A、 The client RDBMS instance can access the file as a read-only file.B、 A new disk cannot be added to a disk group.C、 A disk in a disk group can be taken offline.D、 The client RDBMS instance cannot access the files in the disk group.

考题 多选题Which of the following technologies can be used to remotely gain access to a server console?()APS/2 KVMBLDAPCVNCDRemote desktopEVPN

考题 单选题Operator needs to remove all leading comments # from shell.script file. Which of the following vi sub-command can achieve this?()A :r/^#//gB :1,$ s/^#//gC :sed s/^#//gD :sub s/^#//g

考题 单选题The operator needs to execute a long-running shell script. How can the script be executed so the operator does not have to wait until it is complete to access the command prompt?()A ./script.kshB nohup ./script.kshC run -b ./script.kshD ./script.ksh nohup.out

考题 多选题You wish to increase the security of all of the routers within your network. What can be done to secure the virtual terminal interfaces on a router?()AAdministratively shut down the interface.BPhysically secure the interface.CCreate an access list and apply it to the virtual terminal interfaces with the access-group command.DConfigure a virtual terminal password and login process.EEnter an access list and apply it to the virtual terminal interfaces using the access-class command.

考题 单选题An operator just completed a repair to a disk subsystem that contains a disk heartbeat. Before returning the system back into production mode, there is a requirement to verify the disk heartbeat is functioning.  How should the operator determine if the disk heartbeat network functioning?()A  Use the clinfo command to monitor the disk heartbeatB  Use the mail command to check for messages form HACMPC  Use the dhbread command to verify the disk heartbeat linkD  Use the clstat command to verify the appropriate network connections are available

考题 单选题What command can be used toglobally disable the requirement that a translation rulemust exist beforepackets can pass through the firewall?()A  nat  0B  nonat-controlC  access-listD  none of the above

考题 单选题You issued the following command to mount the DATA disk group in restricted mode:   ALTER DISKGROUP data MOUNT RESTRICT;   What is the implication of this command?()A  The client RDBMS instance can access the file as a read-only file.B  A new disk cannot be added to a disk group.C  A disk in a disk group can be taken offline.D  The client RDBMS instance cannot access the files in the disk group.

考题 单选题When you are troubleshooting an ACL issue on a router,which command can help you to verify which interfaces are affected by the ACL?()A show ip access-listB show access-listC list ip interfaceD show interfaceE show ip interface

考题 单选题An administrator is supporting an AIX 6.1 LPAR remotely and needs a tape operator to plug a cable into an Ethernet adapter. The tape operator does not have POWER6 595 knowledge.  What can the administrator do to assist the tape operator to locate the correct adapter?()A Advise the tape operator to review the hardware service guide.B Use the diag command to set the Ethernet adapter slot LED to flash.C Advise the tape operator to check the WWN stickers of all Ethernet adapter in the I/O drawers.D Create a login account for tape operator on the HMC and advise the tape operator to locate the adapter using the GUI step by step.

考题 多选题Which of the following answer choices are correct characteristics of named access list?()AYou can delete individual statements in a named access listBNamed access lists require a numbered range from 1000 to 1099.CNamed access lists must be specified as standard or extended.DYou can use the ip access-list command to create named access lists.EYou cannot delete individual statements in a named access list.FYou can use the ip name-group command to apply named access lists.