网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which command must be run to log a hardware repair entry in the errorlog?()
A

diag

B

cfgmgr

C

errlog

D

errlogger


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which command must be run to log a hardware repair entry in the errorlog?()A diagB cfgmgrC errlogD errlogger” 相关考题
考题 View the Exhibit to examine the error during the database startup.You open an RMAN session for the database instance. To repair the failure, you executed the following as the first command in the RMAN session:RMAN REPAIR FAILURE;Which statement describes the consequence of the command?()A. The command performs the recovery and closes the failures.B. The command only displays the advice and the RMAN script required for repair.C. The command produces an error because the ADVISE FAILURE command has not been executed before the REPAIR FAILURE command.D. The command executes the RMAN script to repair the failure and removes the entry from the Automatic Diagnostic Repository (ADR).

考题 Which command must be run to log a hardware repair entry in the errorlog?() A.diagB.cfgmgrC.errlogD.errlogger

考题 The man page for command shows the following syntax: The man page for command shows the following syntax: command [ -a | -b ] Which of the following statements is true regarding this entry?() A. Either the -a or flag -b may be used, but not both.B. If the flag -a is used then the flag -b also must be used.C. One of the -a or -b flags must be used, but not both at the same time.D. Both the flags may be used together, but neither are mandatory.

考题 A user in your company network needs to encrypt a folder that is on her Windows 2000 Professional computer. Her computer has two drives: Drive C and Drive D. The folder that needs to be encrypted is located on Drive D. When the user attempts to encrypt the folder, no option for encryption can be found in the folder properties. What should you do to enable the user to encrypt the folder? ()A、Log on to her computer as an administrator, and then run the cipher/e command.B、Instruct the user to run the chipper/e command.C、Log on to her computer as an administrator, and then run the Secedit/enforce command.D、Instruct the user to run the Secedit/enforce command.E、Log on to her computer as an administrator, and then run the Convert d:/FS:NTFS command.

考题 A system’s backups are failing. Error log analysis indicates that there is either a hardware or media problem. Which command is used to determine if there is a hardware problem with the tape drive?()A、diagB、lscfgC、lsdevD、cfgmgr

考题 A system administrator decides to review the system error log after installing new hardware. Which of the following is the correct command to use?()A、errptB、syslogC、prtdiagD、errlogger

考题 Which command must be run after an administrator has made changes to /etc/services to activate the changes?()A、/etc/rc.tcpipB、refresh -s inetdC、startsrc -s inetdD、startsrc -g tcpip

考题 Which command must be run to log a hardware repair entry in the errorlog?()A、diagB、cfgmgrC、errlogD、errlogger

考题 How can an operator list all its history of commands in one step?()A、Run c -l 0?from the command line.Run ?c -l 0?from the command line.B、Invoke SMIT for the shell environment.C、Run the SC + H?combination at the command prompt.Run the ?SC + H?combination at the command prompt.D、Use a rep?command with its UID against the /var/log/history_cmds file.Use a ?rep?command with its UID against the /var/log/history_cmds file.

考题 The man page for command shows the following syntax: The man page for command shows the following syntax: command [ -a | -b ] Which of the following statements is true regarding this entry?()A、Either the -a or flag -b may be used, but not both.B、If the flag -a is used then the flag -b also must be used.C、One of the -a or -b flags must be used, but not both at the same time.D、Both the flags may be used together, but neither are mandatory.

考题 When an emulated error notification method is complete, an administrator can view the error log  By typing the errpt command to be sure the emulation took place.  To verify that the error log entry is the result of the emulated event,the log entry resource name is set to EMULATOR,or which of the following?()  A、 A user defined Resource NameB、 A cluster defined Resource NameC、 An error daemon specific Resource NameD、 A Resource Name generated by Automatic Error Notification

考题 Which configuration command removes all log filters currently configured on the ERX Edge Router?()A、 no log hereB、 no log fieldsC、 no log filtersD、 no log severity

考题 You plan to execute the following command to perform a Flashback Database operation in your database:   SQL FLASHBACK DATABASE TO TIMESTAMP (SYSDATE -5/24);   Which two statements are true about this?()A、 The database must have multiplexed redo log filesB、 The database must be in the MOUNT state to execute the commandC、 The database must be in the NOMOUNT state to execute the commandD、 The database must be opened in RESTRICTED mode before this operationE、 The database must be opened with the RESETLOGS option after the flashback operation

考题 Your company has an Active Directory domain. You install a new domain controller in the domain. Twenty users report that they are unable to log on to the domain. You need to register the SRV records. Which command should you run on the new domain controller()A、Run the netsh interface reset command.B、Run the ipconfig /flushdns command.C、Run the dnscmd /EnlistDirectoryPartition command.D、Run the sc stop netlogon command followed by the sc start netlogon command.

考题 You are preparing the supporting network infrastructure for the upgrade to Exchange Server 2003. You want to accomplish this upgrade by using the minimum amount of administrative effort.Which two actions should you perform?()A、Run the setup.exe /domainprep command on a domain controller in the prod.testking.com domainB、Run the setup.exe /domainprep command on a domain controller in the app.testking.com domainC、Run the setup-exe /domainprep command on a domain controller in the testking.com domainD、Log on to the domain by using a user account that is a member of the Domain Admins groupE、Log on to the domain by using a user account that is a member of the Schema Admins group

考题 Your computer runs Microsoft Windows XP Professional. The computer also runs 20 third-party applications. You plan to upgrade your computer to Microsoft Windows Vista.  The functionality of the existing 20 applications must be maintained even after you upgrade your computer.  You need to ascertain whether the hardware and software on the Windows XP Professional computer will support the upgrade.  What should you do?()A、Run the mbsacli.exe command.B、Run the winnt32.exe /checkupgradeonly command.C、Run the Microsoft Windows Vista Upgrade Advisor application.D、Compare the Microsoft Windows XP Professional system hardware against the Microsoft Windows Vista Hardware Compatibility List (HCL).

考题 单选题When an emulated error notification method is complete, an administrator can view the error log  By typing the errpt command to be sure the emulation took place.  To verify that the error log entry is the result of the emulated event,the log entry resource name is set to EMULATOR,or which of the following?()A  A user defined Resource NameB  A cluster defined Resource NameC  An error daemon specific Resource NameD  A Resource Name generated by Automatic Error Notification

考题 单选题Which configuration command removes all log filters currently configured on the ERX Edge Router?()A  no log hereB  no log fieldsC  no log filtersD  no log severity

考题 单选题Which of the following would provide a technician with a performance reference point to refer backto after hardware repair?()A BaselineB Network mapC Wire schemeD Asset management

考题 单选题You created a custom menu for the Order Entry application. The shipping administrator has requested an additional submenu containing four items to invoke various reports. Which command type must you use to identify the parent menu item as a submenu? ()A Menu B Plus C MacroD PL/SQL

考题 单选题You have a computer that runs Windows 7. You need to identify which hardware is required to create a system repair disc.  Which hardware should you identify?()A CD/DVD burnerB floppy diskC tape driveD USB disk

考题 单选题Records which must be retained on board after report of casualty to a vessel include the().A tour reportsB hull reportsC machinery repair record bookD deck equipment log

考题 单选题Which command is used to retrieve the serial numbers of a Juniper device?()A show versionB show chassis hardwareC show hardware detailD view hardware database

考题 多选题A user is successfully authenticating to the network but is unable to access protected resources behind a ScreenOS enforcer. You log in to the ScreenOS enforcer and issue the command get auth table infranet and you do not see the user listed.Which two event log settings on the Junos Pulse Access Control Service must you enable to troubleshootthis issue?()AConnection RequestsBSystem ErrorsCEnforcer EventsDEnforcer Command Trace

考题 单选题When oily ballast has been pumped overboard,an entry must be made in the().A Oil Record BookB Official LogbookC deck rough logD engine rough log

考题 单选题Hardware locks, keypads on entry doors, badge readers, and biometric readers are all examplesof which of the following security types?()A PhysicalB LogicalC SoftwareD Authentication

考题 单选题In writing up the log book at the end of your watch,you make an error.which of the following is the way to correct the error().A Carefully and neatly erase the entry and rewrite it correctlyB Remove this page of the log book and rewrite all entries on a clean pageC Blot out the error completely and rewrite the entry correctlyD Cross out the error with a single line and rewrite the entry correctly

考题 单选题Which command shows the event and traceoptions file for chassis clusters?()A show log chassisdB show log clusterdC show log jsrpdD show log messages