网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
Which two statements regarding system logging on a Juniper enterprise router are correct?()
A

The system log has a proprietary format.

B

System logs must be sent to a remote device.

C

New system logs can be created and archived.

D

Most software processes create their own logs.


参考答案

参考解析
解析: 暂无解析
更多 “多选题Which two statements regarding system logging on a Juniper enterprise router are correct?()AThe system log has a proprietary format.BSystem logs must be sent to a remote device.CNew system logs can be created and archived.DMost software processes create their own logs.” 相关考题
考题 Which two statements regarding the Flashback Table feature are correct?() A. Flashback Table can be performed on system tables.B. Flashback Table operation does not shrink the segments.C. Flashback Table uses log mining to extract SQL_REDO and SQL_UNDO statements.D. Flashback Table operation acquires exclusive data manipulation language (DML) locks.

考题 Which CLI command is used to upgrade a Juniper router?() A.load packageB.load override terminalC.request system software addD.request system software upgrade

考题 A server is having problems booting into the operating system. Which of the following can provide important information to begin to troubleshoot the cause?() A. System logsB. Firmware updatesC. POST messagesD. Application logs

考题 Which three statements about the secure domain router are true?()A、The logical router can span across chassis.B、The fabric and system controller module are shared by all logical routers.C、Each logical router has a distinct fabric and system controller moduleD、The logical router can share a route processorE、The logical router cannot share a route processor

考题 A server is having problems booting into the operating system. Which of the following can provide important information to begin to troubleshoot the cause?()A、System logsB、Firmware updatesC、POST messagesD、Application logs

考题 Which two commands allow you to return to a previous version of software on the device?()A、request system software addB、request system software downgradeC、request system software replaceD、request system software rollback

考题 Which CLI command is used to upgrade a Juniper router?()A、load packageB、load override terminalC、request system software addD、request system software upgrade

考题 Which two statements regarding system logging on a Juniper enterprise router are correct?()A、The system log has a proprietary format.B、System logs must be sent to a remote device.C、New system logs can be created and archived.D、Most software processes create their own logs.

考题 A server is having problems booting into the operating system.  Which of the following can provide important information to begin to trouble shoot the cause?()A、 System logsB、 Firmware updatesC、 POST messagesD、 Application logs

考题 Which TWO of the following tasks of system maintenance can be improved by using Remote Deployment Manager?()A、DeploymentB、Software maintenanceC、Driver updatesD、DisposalE、Software inventory

考题 Which of the following commands can be used to review the system error logs?()A、 errpt -aB、 errpt -lC、 errdemon -lD、 syslogd -r

考题 Which of the following statements best describes error logging?()A、Syslogd creates error log entries in the system error log. B、The default error log is stored in /var/adm/ras/error.log. C、All entries in the error log are related to software problems. D、Error logging is automatically enabled during system initialization.

考题 When an operator is trying to log off the system displays this message: you have running jobs?? What does this mean?()A、One or more processes are running in the background, preventing log off.B、One or more processes are paused, requiring operator input prior to logging off.C、At least one process is running in the background and it will keep running after the operator logs offD、At least one process is running in the background using nohup and it will terminate when the operator logs off

考题 Which two statements are true about the rescue configuration file?()A、It must include a root passwordB、It is roll back file number 50, and you can recover it by issuing rollback 50C、It is created by issuing request system configuration rescue saveD、It is updated automatically when you commit

考题 Which statements are true regarding system-partitioned tables?()  A、 Only a single partitioning key column can be specified.B、 All DML statements must use partition-extended syntax.C、 The same physical attributes must be specified for each partition.D、 Unique local indexes cannot be created on a system-partitioned table.E、 Traditional partition pruning and partitionwise joins are not supported on these tables.

考题 Your organization has 20 servers that run Windows Server 2003 Service Pack 2 (SP2). You need to monitor all 20 servers for a period of 24 hours by using the same performance counters. You must achieve this goal by using the least amount of administrative effort. What should you do first? ()A、In System Monitor, add counters.B、In System Monitor, create a Taskpad.C、In Performance Logs and Alerts, create a trace log.D、In Performance Logs and Alerts, create a counter log.

考题 多选题Which two statements are correct about database transportation?() (Choose two.)AThe source and target platforms must be the sameBRedo logs, control files and temp files are also transportedCThe transported database must have the same database identifier (DBID) as the source database and cannot be changedDThe COMPATIBLE parameter must be set to 10.0.0.0 or higher and the database must be opened in readonly mode before being transportedERecovery Manager (RMAN) is used to convert the necessary data files of the database if the target platform is different and has different endian format

考题 多选题You are asked to free up disk space so you can update your version of the Junos OS.Which two commands display the files that will be removed?()Auser@router request system storage cleanupBuser@router show system storageCuser@router request system storage cleanup dry-runDuser@router show system storage detail

考题 多选题Which two statements are true about the rescue configuration file?()AIt must include a root passwordBIt is roll back file number 50, and you can recover it by issuing rollback 50CIt is created by issuing request system configuration rescue saveDIt is updated automatically when you commit

考题 多选题Which two statements are correct regarding the Oracle Flashback Drop feature? ()ARecycle bin exists for the tables only in non-SYSTEM, locally managed tablespaces.BYou can flash back a dropped table provided row movement has been enabled on the table.CIf you drop an index before dropping its associated table, then the recovery of the index is not supported when you flash back the dropped table.DWhen you execute the DROP TABLESPACE? INCLUDING CONTENTS command, the objects in the tablespace are places in the recycle bin.EWhen a dropped table is moved to the recycle bin, only the table is renamed to a system-generated name; its associated objects and constraints are not renamed.FIf you drop a table that is protected by the recycle bin, then associated bitmap-joined indexes and materialized view logs are also stored in the recycle bin.

考题 多选题Which two commands allow you to return to a previous version of software on the device?()Arequest system software addBrequest system software downgradeCrequest system software replaceDrequest system software rollback

考题 多选题Which two statements regarding the Flashback Table feature are correct?()AFlashback Table can be performed on system tables.BFlashback Table operation does not shrink the segments.CFlashback Table uses log mining to extract SQL_REDO and SQL_UNDO statements.DFlashback Table operation acquires exclusive data manipulation language (DML) locks.

考题 多选题Which are valid statements about Cisco Virtual Interface Card (VIC)? ()AThe Cisco VIC can create an unlimited number of Virtual NICsBThe number of vNICs on the Cisco VIC that can be created is determined by the number of chassis uplinksCvNICs are created using software on the host operating systemDThe host operating system sees a vNIC as a physical PCIe deviceEThe host operating system sees a vNIC as a sub-interface of a primary NICFThe Cisco VIC can create 1024 vNICs

考题 多选题Which two statements regarding system logging on a Juniper enterprise router are correct?()AThe system log has a proprietary format.BSystem logs must be sent to a remote device.CNew system logs can be created and archived.DMost software processes create their own logs.

考题 多选题Which three statements about the secure domain router are true?()AThe logical router can span across chassis.BThe fabric and system controller module are shared by all logical routers.CEach logical router has a distinct fabric and system controller moduleDThe logical router can share a route processorEThe logical router cannot share a route processor

考题 多选题Which statements are true regarding system-partitioned tables?()AOnly a single partitioning key column can be specified.BAll DML statements must use partition-extended syntax.CThe same physical attributes must be specified for each partition.DUnique local indexes cannot be created on a system-partitioned table.ETraditional partition pruning and partitionwise joins are not supported on these tables.

考题 单选题Which of the following statements best describes error logging?()A Syslogd creates error log entries in the system error log. B The default error log is stored in /var/adm/ras/error.log. C All entries in the error log are related to software problems. D Error logging is automatically enabled during system initialization.

考题 多选题You are working on an Oracle Database 10g database. You enabled the Flashback Database feature. Which two statements regarding flashback logs are true? ()AFlashback logs are not archived.BFlashback logs are maintained in redo log files.CFlashback logs are maintained in the Flash Recovery Area.DFlashback logs are used to maintain Flashback Database related errors.EFlashback logs need to be cleared manually after you disable Flashback Database.