网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which system administration command you can use to update Id.so.cache after the installation of new shared libraries?()
A
Idconfig
B
Idd
C
libpath
D
newlibs
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which system administration command you can use to update Id.so.cache after the installation of new shared libraries?()A IdconfigB IddC libpathD newlibs” 相关考题
考题
It is a kind of online service system, on which you can publish and exchange information with others who also are the members of the system.On which you can paste your articles and answer the questions asked by the members of the system and you can also look for help here.It isA.BBSB.WWWC.E-mailD.TELNET
考题
Which CLI command do you use to determine which files are cleanup candidates?()
A. request system storage cleanup candidatesB. request system services storage candidatesC. request system services candidate cleanupD. request system storage cleanup dry-run
考题
Which command do you use to display the status of an antivirus database update?()
A. show security utm anti-virus statusB. show security anti-virus database statusC. show security utm anti-virus databaseD. show security utm anti-virus update
考题
Which command do you use to display the messages seen during the last system boot?()
A. show system boot-messagesB. show chassis messagesC. show file system boot-messagesD. show boot-log messages
考题
You are asked to free up disk space so you can update your version of the Junos OS.Which two commands display the files that will be removed?()
A. user@router request system storage cleanupB. user@router show system storageC. user@router request system storage cleanup dry-runD. user@router show system storage detail
考题
Which of the following answer choices are correct characteristics of named access list?()
A. You can delete individual statements in a named access listB. Named access lists require a numbered range from 1000 to 1099.C. Named access lists must be specified as standard or extended.D. You can use the ip access-list command to create named access lists.E. You cannot delete individual statements in a named access list.F. You can use the ip name-group command to apply named access lists.
考题
Which of the following answer choices are correct characteristics of named access list?()A、You can delete individual statements in a named access listB、Named access lists require a numbered range from 1000 to 1099.C、Named access lists must be specified as standard or extended.D、You can use the ip access-list command to create named access lists.E、You cannot delete individual statements in a named access list.F、You can use the ip name-group command to apply named access lists.
考题
A system administrator has successfully backed up the VIOS software and is ready to perform a VIOS software update. Which command will the administrator use to update the software from a CD? ()A、 smit update_allB、 geninstall -d /dev/cd0 allC、 installp -acgX -d /dev/cd0 allD、 updateios -dev /dev/cd0 -accept -install
考题
You need to restore some files from a file system. The file system was backed up from a snapshot. Which command will correctly restore these files?()A、 fssnap -iB、 fssnap -rC、 ufsrestore -iD、 snaprestore -i
考题
Which command can you use to determine the cisco ios feature set on a cisco router?()A、show versionB、dir flash:include iosC、show environmentD、show diagE、show inventory
考题
Which system administration command you can use to update Id.so.cache after the installation of new shared libraries?()A、 IdconfigB、 IddC、 libpathD、 newlibs
考题
Which command can a system administrator use to verify that a tape is in backup format and is readable by the system?()A、tarB、tctlC、tcopyD、restore
考题
A customer wants to update their system with the latest drivers. Which tools would you suggest of the following?()A、Bootable Media CreatorB、Advanced Settings UtilityC、Update Express System Pack InstallerD、ServerGuide Scripting Toolkit
考题
You are the administrator of your company's network. You are preparing to deploy 20 new Windows 2000 Professional computers on your network. You want to be able to recover from disk failures and corrupt system files on the new computers. You want to configure the computers to automatically update their system configuration and emergency repair files on a scheduled bases. What should you do?()A、Use the at command to schedule a weekly job to back up the boot partition.B、Use the at command to schedule a weekly job to run the system file checker.C、Use Windows backup to schedule a backup of the System State Data.D、Use Windows backup to schedule a backup of the system partition and the boot partition.
考题
Your company uses Windows Update to download and install security updates on client computers. When Microsoft releases a security update, you have the following requirements: Establish which client computers require the security update. Identify what changes will occur as a result of the security update. Identify which applications might be affected by the security update. You need to select the appropriate tool to detect application-compatibility issues. What should you do?()A、Use the Inventory Collector.B、Use the Setup Analysis Tool.C、Use the Update Compatibility Evaluator.D、Use the Windows Compatibility Evaluator.
考题
You are planning to upgrade Internet Explorer. You have the following requirements: Create a report that identifies which computers are successfully upgraded. Do not install additional software on the client computers. You need to design a deployment method that meets the requirements. What should you do?()A、Use Internet Explorer Administration Kit (IEAK) and Group Policy.B、Use Microsoft System Center Configuration Manager.C、Use Windows Server Update Services (WSUS).D、Use Microsoft System Center Essentials.
考题
单选题You need to restore some files from a file system. The file system was backed up from a snapshot. Which command will correctly restore these files?()A
fssnap -iB
fssnap -rC
ufsrestore -iD
snaprestore -i
考题
单选题Which command do you use to display the status of an antivirus database update?()A
show security utm anti-virus statusB
show security anti-virus database statusC
show security utm anti-virus databaseD
show security utm anti-virus update
考题
单选题Which command can you use to determine the cisco ios feature set on a cisco router?()A
show versionB
dir flash:include iosC
show environmentD
show diagE
show inventory
考题
多选题You are asked to free up disk space so you can update your version of the Junos OS.Which two commands display the files that will be removed?()Auser@router request system storage cleanupBuser@router show system storageCuser@router request system storage cleanup dry-runDuser@router show system storage detail
考题
单选题Which command do you use to show active alarms?()A
show hardware stateB
show system alarmsC
show chassis stateD
show services alarms
考题
单选题Which command do you use to display the messages seen during the last system boot?()A
show system boot-messagesB
show chassis messagesC
show file system boot-messagesD
show boot-log messages
考题
单选题One of the users in the PROD database, Adams, complains that his update on the table, TRANS, is taking an unusually long time to complete. You find that the table gets locked by another database user before Adams starts his transactions, and you are unable to contact the user holding the table lock. As Adams is updating some crucial rows in the table, he should get the highest priority. Which method would you use to overcome this problem?()A
execute the command, ALTER SESSION KILL .., to kill the blocking sessionB
execute the DBMS_SESSION.KILL_SESSION procedure to kill the blocking sessionC
execute the command, ALTER SYSTEM KILL SESSION .., to kill the blocking sessionD
execute the command, ALTER SESSION UNLOCK .., to release the lock for the blocking sessionE
execute the command, ALTER SYSTEM UNLOCK SESSION .., to release the lock for the blocking session
考题
单选题Which CLI command do you use to determine which files are cleanup candidates?()A
request system storage cleanup candidatesB
request system services storage candidatesC
request system services candidate cleanupD
request system storage cleanup dry-run
考题
单选题You are the network administrator for All network servers run Windows Server 2003. You install Software Update Services (SUS) on one server. You configure the following settings: 1. Do not use a proxy server for Internet access. 2. Synchronize directly from the Microsoft Windows Update servers. 3. Automatically approve new versions of previously approved updates. 4. Save updates in a local folder. You perform a manual synchronization. Now you need to back up the critical information that is related to your installation of SUS. What should you do?()A
First, use the Backup utility to back up the System State data. Then, use the IIS administration tool to back up the default Web site.B
First, use the IIS administration tool to back up the default Web site. Then, use the Backup utility to back up the System State data.C
First, use the IIS administration tool to back up the IIS metabase. Then, use the Backup utility to back up the IIS metabase file, the default Web site, and the content storage location.D
First, use the Backup utility to back up the IIS metabase file, the default Web site, and the content storage location. Then, use the IIS administration tool to back up the IIS metabase.
考题
单选题Which CLI command do you use to determine which files are cleanup candidates?()A
request system storage cleanup candidatesB
request sytem services storage candidatesC
request system services candidate cleanupD
request system storage cleanup dry-run
考题
单选题A system administrator has successfully backed up the VIOS software and is ready to perform a VIOS software update. Which command will the administrator use to update the software from a CD? ()A
smit update_allB
geninstall -d /dev/cd0 allC
installp -acgX -d /dev/cd0 allD
updateios -dev /dev/cd0 -accept -install
热门标签
最新试卷