网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

A system contains multiple hot-swap stand-alone disks with a large number of JFS2 file systems. Which feature of JFS2 can be used to improve reliability, availability and serviceability (RAS) if a disk failure occurs?()

  • A、Inline logging
  • B、Dynamic inode allocation
  • C、Linear directory organization
  • D、Online filesystem defragmentation

参考答案

更多 “A system contains multiple hot-swap stand-alone disks with a large number of JFS2 file systems. Which feature of JFS2 can be used to improve reliability, availability and serviceability (RAS) if a disk failure occurs?()A、Inline loggingB、Dynamic inode allocationC、Linear directory organizationD、Online filesystem defragmentation” 相关考题
考题 , the brains of a computer, it contains the ALU, the clock, many registers, the bus interface, and circuitry that makes these pans work together.A.I/O deviceB.CPUC.MemoryD.Operating system

考题 Which two statements about the SQL Management Base (SMB) are true?() A. It contains only SQL profiles generated by SQL Tuning Advisor.B. It stores plans generated by the optimizer using a stored outline.C. It is part of the data dictionary and stored in the SYSAUX tablespace.D. It is part of the data dictionary and stored in the SYSTEM tablespace.E. It contains the statement log, the plan history, plan baselines, and SQL profiles.

考题 You executed this command to create a password file:$ orapwd file = orapworcl entries = 10 ignorecase = NWhich two statements are true about the password file?() A. It will permit the use of uppercase passwords for database users who have been granted the SYSOPER role.B. It contains username and passwords of database users who are members of the OSOPER operating system group.C. It contains usernames and passwords of database users who are members of the OSDBA operating system group.D. It will permit the use of lowercase passwords for database users who have granted the SYSDBA role.E. It will not permit the use of mixed case passwords for the database users who have been granted the SYSDBA role.

考题 A complete computer system contains(74)。A.arithmetic unit, control unit and memoryB.input/output devices and mainframeC.mainframe. and programs of utilityD.hardware system and software system

考题 Which log contains information about service restarts, system errors, warnings, and requests to check server connectivity? () A. Events logB. System logC. User Access logD. Admin Access log

考题 What is a "system high" security policy?什么是一个“系统高”的安全策略?()A、A system where all users are cleared to view the most highly classified data on the system.系统上的所有用户被许可查看最高级别的数据B、A system that contains only data of one security classification.只包含一个安全级别的数据C、A system with data that contains only data of the highest security classification.只包含最高安全级别的数据D、A system that uses a Multi-Level Security Policy to separate the highly classified data from the other data residing on the system.使用多级安全策略去划分高级别数据和其他数据。

考题 Which of the following logs contains information on overall performance and events not related to user authentication?()A、SecurityB、AuditC、ApplicationD、System

考题 Which of the following locations contains the System Restore option in Windows XP?()A、Control Panel Administrative tools.B、Control Panel Security Center.C、System Properties, Start up and Recovery.D、Help and support from the Start menu.

考题 Which of the following files contains the settings for the system’s DNS domain name and DNS servers?()A、/etc/hostsB、/etc/resolv.confC、/etc/netsvc.confD、/etc/named.boot

考题 Which log contains information about service restarts, system errors, warnings, and requests to check server connectivity? ()A、Events logB、System logC、User Access logD、Admin Access log

考题 A file system has been corrupted and needs to be restored.  Which file contains the ufsdump levels for this file system? ()A、 /etc/backupB、 /etc/ufsdumpC、 /etc/dumpdatesD、 /etc/fsdumpdates

考题 Your network contains an Active Directory domain named contoso.com. The domain contains five  domain controllers. You add a logoff script to an existing Group Policy object (GPO). You need to verify that each  domain controller successfully replicates the updated group policy.     Which two objects should you verify on each domain controller()A、/servername/SYSVOL/contoso.com/Policies/{GUID}/gpt.iniB、//servername/SYSVOL/contoso.com/Policies/{GUID}/machine/registry.polC、the uSNChanged value for the CN={GUID},CN=Policies,CN=System,DC=contoso,DC=com containerD、the versionNumber value for the CN={GUID},CN=Policies,CN=System,DC=contoso,DC=com container

考题 Your network contains a virtualization environment that includes the following: - 10 hosts that run VMware ESX Server 4.0 - Microsoft System Center Virtual Machine Manager - 50 Hyper-V hosts that run Windows Server 2008 R2 Each virtualization host contains a minimum of 15 virtual machines (VMs). You need to recommend a solution to apply updates to all of the offline VMs hosted on the Hyper- V hosts. What should you include in the recommendation?()A、System Center Virtual Machine Manager virtual-to-virtual machine (V2V) conversionB、VMM Self-service PortalC、Virtual Machine Servicing Tool (VMST)D、Authorization ManagerE、Microsoft Enterprise Desktop Virtualization (MED-V) Workspace PackagerF、Microsoft Application Virtualization (App-V) SequencerG、Active Directory Rights Management Services (AD RMS)H、Microsoft System Center Operations ManagerI、System Center Virtual Machine Manager physical-to-virtual machine (P2V) conversionJ、Microsoft System Center Data Protection Manager

考题 You are creating an ASP.NET Web site. The site contains pages that are available to anonymous users. The site also contains a page named Premium.aspx that provides premium content to only members of a group named Subscribers. You need to modify the web.config file to ensure that Premium.aspx can be accessed by only members of the Subscribers group. Which configuration should you use?()A、location path="Premium.aspx" system.web authorization allow users="Subscribers"/            deny users="*"/ /authorization /system.web /location B、location path="Premium.aspx" system.web authorization allow roles="Subscribers"/             deny users="*"/ /authorization /system.web /location C、location path="Premium.aspx" system.web authorization allow roles="Subscribers"/             deny users="?"/ /authorization /system.web /location D、location path="Premium.aspx" system.web authorization deny users="*"/ allow roles="Subscribers"/ /authorization /system.web /location

考题 单选题To make audit information more productive, the DBA executes the following command before startingan audit operation:  SQL ALTER SYSTEM SET AUDIT_TRAIL=DB,EXTENDED SCOPE=SPFILE;  Which statement is true regarding the audit record generated when auditing starts after restarting thedatabase()A It contains only the plan for the SQL statement executed by the user.B It contains the SQL text executed by the user and the bind variables used with it.C It contains the plan and statistics associated with the SQL statement executed by the user.D It contains the plan for the SQL statement executed by the user and the bind variables used with it.

考题 多选题Which two statements about the SQL Management Base (SMB) are true?()AIt contains only SQL profiles generated by SQL Tuning Advisor.BIt stores plans generated by the optimizer using a stored outline.CIt is part of the data dictionary and stored in the SYSAUX tablespace.DIt is part of the data dictionary and stored in the SYSTEM tablespace.EIt contains the statement log, the plan history, plan baselines, and SQL profiles.

考题 单选题Which log contains information about service restarts, system errors, warnings, and requests to check server connectivity? ()A Events logB System logC User Access logD Admin Access log

考题 单选题Your network consists of a single Active Directory domain. The network contains 20 file servers that run Windows Server 2008 R2. Each file server contains two volumes. One volume contains the operating system. The other volume contains all data files.    You need to plan a recovery strategy that meets the following requirements: èAllows the operating system to be restored èAllows the data files to be restored èEnsures business continuity   èMinimizes the amount of time to restore the server What should you include in your plan?()A Windows Deployment Services (WDS)B Windows Automated Installation Kit (Windows AIK) and folder redirectionC the Multipath I/O feature and Volume Shadow CopiesD the Windows Server Backup feature and System Image Recovery

考题 多选题Which two statements about the SQL Management Base (SMB) are true? ()(Choose two.)AIt contains only SQL profiles generated by SQL Tuning Advisor.BIt stores plans generated by the optimizer using a stored outline.CIt is part of the data dictionary and stored in the SYSAUX tablespace.DIt is part of the data dictionary and stored in the SYSTEM tablespace.EIt contains the statement log, the plan history, plan baselines, and SQL profiles.

考题 单选题You are the network administrator for The network contains a Windows Server 2003 computer named Print1 that functions as a print server. Print1 contains a printer named MarketingPrinter. Users report that print jobs they submit to the MarketingPrinter take a long time to print. You immediately examine Print1 and conclude that the server is performing at acceptable levels. You need to identify the problem. What should your next step be?()A Use Task Manager to monitor processor and memory performance.B Use Windows Explorer to monitor the size of the Windows/System32/Spool/prtprocs folder.C Use System Monitor to view the Print Queue/Jobs counter.D Use System Monitor to view the Print Queue/Enumerate Network Printer Calls couner.

考题 单选题Which of the following locations contains the System Restore option in Windows XP?()A Control Panel Administrative tools.B Control Panel Security Center.C System Properties, Start up and Recovery.D Help and support from the Start menu.

考题 单选题Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 R2 and has the Hyper- V server role installed. You need to log the amount of system resources used by each virtual machine. What should you do?()A From Windows PowerShell,run the Enable-VMRe5ourceMetering cmdletB From Windows System Resource Manager,enable AccountingC From Windows System Resource Manager,add a resource allocation policyD From Windows PowerShell,run the Measure-VM cmdlet

考题 单选题To make audit information more productive, the DBA executes the following command before starting an auditoperation: SQL ALTER SYSTEM SET AUDIT_TRAIL=DB,EXTENDED SCOPE=SPFILE; Which statement is true regarding the audit record generated when auditing starts after restarting Thedatabase()A It contains only the plan for the SQL statement executed by the user.B It contains the SQL text executed by the user and the bind variables used with it.C It contains the plan and statistics associated with the SQL statement executed by the user.D It contains the plan for the SQL statement executed by the user and the bind variables used with it

考题 单选题A file system has been corrupted and needs to be restored.  Which file contains the ufsdump levels for this file system? ()A  /etc/backupB  /etc/ufsdumpC  /etc/dumpdatesD  /etc/fsdumpdates

考题 单选题A liquid sight flow indicator in a refrigeration system is examined and gas bubbles are noted in motion with the fluid flowThis means ().A the system is fully chargedB there is air leaking in from the condenserC ice crystals are forming in the refrigerantD the system contains less than a full charge of refrigerant

考题 单选题You are a network administrator for your company. The network contains a Windows Server 2003 computer named Print1 that functions as a print server. Print1 contains a printer named MarketingPrinter. Users report that print jobs they submit to the MarketingPrinter take a long time to print. You immediately examine Print1 and conclude that the server is performing at acceptable levels. You need to identify the problem. What should your next step be? ()A Use Task Manager to monitor processor and memory performance.B Use Windows Explorer to monitor the size of the Windows/System32/Spool/prtprocs folder.C Use System Monitor to view the Print Queue/Jobs counter.D Use System Monitor to view the Print Queue/Enumerate Network Printer Calls counter.

考题 单选题Which of the following files contains the settings for the system’s DNS domain name and DNS servers?()A /etc/hostsB /etc/resolv.confC /etc/netsvc.confD /etc/named.boot

考题 单选题The main distribution duct in an air conditioning system which contains the cooling coils and filters is called the()A manifoldB condenserC chamberD plenum