网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Before performing a mksysb system backup, which of the following procedures should a system administrator perform to avoid backing up certain user files?()
A

Add the list of files to /etc/exclude.rootvg.

B

Modify the image.data file and add the files to be excluded form the backup.

C

Modify the bosinst.data file and specify which files are to be excluded from the backup.

D

Specify the files to be excluded on the command line when executing the mksysb command.


参考答案

参考解析
解析: 暂无解析
更多 “单选题Before performing a mksysb system backup, which of the following procedures should a system administrator perform to avoid backing up certain user files?()A Add the list of files to /etc/exclude.rootvg.B Modify the image.data file and add the files to be excluded form the backup.C Modify the bosinst.data file and specify which files are to be excluded from the backup.D Specify the files to be excluded on the command line when executing the mksysb command.” 相关考题
考题 After performing a copy backup of a file server, the archive bit on the backed up files will be which of the following?() A. DeletedB. UnchangedC. SetD. Copied

考题 Before performing a mksysb system backup, which of the following procedures should a system administrator perform to avoid backing up certain user files?() A.Add the list of files to /etc/exclude.rootvg.B.Modify the image.data file and add the files to be excluded form the backup.C.Modify the bosinst.data file and specify which files are to be excluded from the backup.D.Specify the files to be excluded on the command line when executing the mksysb command.

考题 A system administrator needs to backup datavg which contains a database that pre-allocates files by padding them with nulls, similar to treating them as sparse files. In order to effectively backup and be able to restore the datavg files, which backup method should be used?()A.savevgB.tarC.cpioD.mksysb

考题 A system administrator needs to backup datavg which contains a database that pre-allocates files by padding them with nulls, similar to treating them as sparse files. In order to effectively backup and be able to restore the datavg files, which backup method should be used?()A、savevgB、tarC、cpioD、mksysb

考题 Before performing a mksysb system backup, which of the following procedures should a system administrator perform to avoid backing up certain user files?()A、Add the list of files to /etc/exclude.rootvg.B、Modify the image.data file and add the files to be excluded form the backup.C、Modify the bosinst.data file and specify which files are to be excluded from the backup.D、Specify the files to be excluded on the command line when executing the mksysb command.

考题 Which of the following files should be edited to disable remote machines from performing a "finger" on a system?()A、/etc/security/userB、/etc/servicesC、/etc/inetd.confD、/etc/hosts.equiv

考题 A corrupted file system is now repaired and back in use. Some, but not all of the files within the file  systems have been deleted. The only backup of this file system is a month-old tar archive. This archive will need to be restored as root.  Which two statements correctly describe the effects of the restore operation?()A、 Files found in the file system that are also on tape will NOT be overwritten.B、 The missing files, present on the backup tape, are restored to the file system with the data as it was when the backup was taken.C、 The access times are preserved by tar and will reflect the time when a user last accessed the data.D、 The modification time on the files restored by tar will be preserved and will reflect the time the file was last modified before the backup, NOT the time of the restore operation.

考题 You want to use Windows 2000 backup to perform a weekly backup of the user data on a Windows 2000 Professional computer. You want to ensure that the registry, boot files and COM plus objects are also backed up. What should you do?()A、Configure the Windows backup to backup the system partition.B、Configure the Windows backup to backup the System State Data.C、Create a script written in MS Visual Basic scripting addition language to run rdisk.exe/s before the back up starts.D、Create a batch file to run rdisk.exe/s before the backup starts.

考题 Which of the following access levels allows a user to perform normal day to day work with their own files but does not allow them to change system files or computer performance?()A、AdministratorB、UserC、GuestD、Power user

考题 After performing a copy backup of a file server, the archive bit on the backed up files will be which of the following?()A、 DeletedB、 UnchangedC、 SetD、 Copied

考题 A system administrator has an existing mksysb image, but would like to modify the image.data file on the mksysb before installing it on a system. Which of the following procedures is most appropriate to perform?()A、Create a new image.data file and recreate the mksysb image.B、Use the dd command to replace the image.data file on the mksysb tape.C、Use the tctl command to palce the new image.data file on the mksysb tape.D、Place the new image.data file on a diskette that will be road during the installation of the mksysb.

考题 A system administrator had a disk failure on an HMC. The disk was replaced and the HMC was loaded from the Product Recovery CD. The system administrator had performed a backup to DVD of the HMC data before the system failed. After restoring the backup files, it was noticed that no profile files were restored. What is the most likely cause of this problem?()A、The profile data was not initialized after restoring the backup CDB、The profile data was not backed up before doing the Critical Console Data backupC、A Critical Console Data backup was performed which backs up user data, but not profile dataD、A Save Upgrade data was done instead of a backup Critical Console Data and the profile files were not included

考题 Which files are managed through the use of the file collection "HACMP_Files"?()A、The PowerHA Global ODM.B、System networking files including /etc/hosts, /etc/inetd.conf and /etc/servicesC、Security files including /etc/passwd, /etc/security/passwd, /etc/group and/etc/security/groupD、User configurable files including Application server start and stop scripts, custom pre and post notificationevents and application monitoring scripts

考题 A System p administrator needs to set the default password length for all users to six characters.  Which of the following files needs to be edited to accomplish this ()A、/etc/security/limitsB、/etc/security/mkuser.sysC、/etc/security/privD、/etc/security/user

考题 The user base of a three-node cluster has increased. In order to add clustered users to all nodes, which of the following steps should be performed?()  A、 On one of the nodes,add the users via C-SPOC ’Add a User to the Cluster’smit menu.B、 Use C-SPOC to synchronize the password files between cluster nodes.C、 On all of the nodes,add the users to the /etc/passwd and system security files,and then synchronize the cluster.D、 On one of the nodes,add the users to the /tec/passwd and system security files,add home directories,and use cron to automate the movement of system security files between nodes.

考题 You need to back up the existing data on a computer before you install a new application. You also need to ensure that you are able to recover individual user files that are replaced or deleted during the installation.  What should you do?()A、Create a System Restore point.B、Perform an Automated System Recovery (ASR) backup and restore.C、In the Backup and Restore Center window, click the Back up files button.D、In the Backup and Restore Center window, click the Back up computer button.

考题 单选题Your data recovery strategy must meet the following requirements: Back up all data files and folders in C:///Data.  Restore individual files and folders in C:///Data.  Ensure that data is backed up to and restored from external media.  What should you do?()A Use the Previous Versions feature to restore the files and folders.B Use the System Restore feature to perform backup and restore operations.C Use the NTBackup utility to back up and restore individual files and folders.D Use the Backup and Restore Center to back up and restore files.

考题 单选题A system administrator needs to backup datavg which contains a database that pre-allocates files by padding them with nulls, similar to treating them as sparse files. In order to effectively backup and be able to restore the datavg files, which backup method should be used?()A savevgB tarC cpioD mksysb

考题 单选题After performing a copy backup of a file server, the archive bit on the backed up files will be which of the following?()A DeletedB UnchangedC SetD Copied

考题 单选题A system administrator has an existing mksysb image, but would like to modify the image.data file on the mksysb before installing it on a system. Which of the following procedures is most appropriate to perform?()A Create a new image.data file and recreate the mksysb image.B Use the dd command to replace the image.data file on the mksysb tape.C Use the tctl command to palce the new image.data file on the mksysb tape.D Place the new image.data file on a diskette that will be road during the installation of the mksysb.

考题 单选题A system administrator had a disk failure on an HMC. The disk was replaced and the HMC was loaded from the Product Recovery CD. The system administrator had performed a backup to DVD of the HMC data before the system failed. After restoring the backup files, it was noticed that no profile files were restored. What is the most likely cause of this problem?()A The profile data was not initialized after restoring the backup CDB The profile data was not backed up before doing the Critical Console Data backupC A Critical Console Data backup was performed which backs up user data, but not profile dataD A Save Upgrade data was done instead of a backup Critical Console Data and the profile files were not included

考题 多选题A corrupted file system is now repaired and back in use. Some, but not all of the files within the file  systems have been deleted. The only backup of this file system is a month-old tar archive. This archive will need to be restored as root.  Which two statements correctly describe the effects of the restore operation?()AFiles found in the file system that are also on tape will NOT be overwritten.BThe missing files, present on the backup tape, are restored to the file system with the data as it was when the backup was taken.CThe access times are preserved by tar and will reflect the time when a user last accessed the data.DThe modification time on the files restored by tar will be preserved and will reflect the time the file was last modified before the backup, NOT the time of the restore operation.

考题 单选题You want to use Windows 2000 backup to perform a weekly backup of the user data on a Windows 2000 Professional computer. You want to ensure that the registry, boot files and COM plus objects are also backed up. What should you do?()A Configure the Windows backup to backup the system partition.B Configure the Windows backup to backup the System State Data.C Create a script written in MS Visual Basic scripting addition language to run rdisk.exe/s before the back up starts.D Create a batch file to run rdisk.exe/s before the backup starts.

考题 单选题Which of the following files should be edited to disable remote machines from performing a "finger" on a system?()A /etc/security/userB /etc/servicesC /etc/inetd.confD /etc/hosts.equiv

考题 单选题After performing a copy backup of a file server, the archive bit on the backed up files will be which of the following?()A  DeletedB  UnchangedC  SetD  Copied

考题 单选题Which of the following access levels allows a user to perform normal day to day work with their own files but does not allow them to change system files or computer performance?()A AdministratorB UserC GuestD Power user

考题 单选题The user base of a three-node cluster has increased. In order to add clustered users to all nodes, which of the following steps should be performed?()A  On one of the nodes,add the users via C-SPOC ’Add a User to the Cluster’smit menu.B  Use C-SPOC to synchronize the password files between cluster nodes.C  On all of the nodes,add the users to the /etc/passwd and system security files,and then synchronize the cluster.D  On one of the nodes,add the users to the /tec/passwd and system security files,add home directories,and use cron to automate the movement of system security files between nodes.

考题 单选题Before performing a mksysb system backup, which of the following procedures should a system administrator perform to avoid backing up certain user files?()A Add the list of files to /etc/exclude.rootvg.B Modify the image.data file and add the files to be excluded form the backup.C Modify the bosinst.data file and specify which files are to be excluded from the backup.D Specify the files to be excluded on the command line when executing the mksysb command.