网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

When using a mksysb and base media to clone a system, which of the following will cause the installation to fail()

  • A、mksysb made on a single processor machine but is being installed on a multiple processor machine, no editing of the image.data file
  • B、mksysb made on machine with mirrored rootvg and new machine only has one disk in rootvg, no editing of the image.data file
  • C、mksysb made on a machine with 32GB of RAM but being installed on a machine with only 8GB of RAM
  • D、mksysb made on a machine with virtual Ethernet adapter but being installed on a machine which only has a physical Ethernet adapter

参考答案

更多 “When using a mksysb and base media to clone a system, which of the following will cause the installation to fail()A、mksysb made on a single processor machine but is being installed on a multiple processor machine, no editing of the image.data fileB、mksysb made on machine with mirrored rootvg and new machine only has one disk in rootvg, no editing of the image.data fileC、mksysb made on a machine with 32GB of RAM but being installed on a machine with only 8GB of RAMD、mksysb made on a machine with virtual Ethernet adapter but being installed on a machine which only has a physical Ethernet adapter” 相关考题
考题 Which two scenarios are NOT safe to replace a StringBuffer object with a StringBuilder object?() A.When using versions of Java technology earlier than 5.0.B.When sharing a StringBuffer among multiple threads.C.When using the java.io class StringBufferInputStream.D.When you plan to reuse the StringBuffer to build more than one string.

考题 When should you create a role? () A. To simplify the process of creating new users using the CREATE USER xxx IDENTIFIED by yyy statement.B. To grant a group of related privileges to a user.C. When the number of people using the database is very high.D. To simplify the process of granting and revoking privileges.E. To simplify profile maintenance for a user who is constantly traveling.

考题 In securing a towing cable,consideration must be given to letting go in an emergency.The possible whip of towlines when released can be overcome by ______.A.increasing the shaft RPM prior to releaseB.using a pelican hook for quick releaseC.using preventersD.using a short chain for the lead through the stern chock

考题 Which statement concerning the lashings of containers with solid bar or wire rope lashings is TRUE ________.A.Stack weights should be less when using a solid bar lashing as compared to a wire lashingB.Stack heights may be increased when using a solid bar lashingC.Stack heights should be reduced when using a solid bar lashingD.Solid bars should be used for lashing the first tier only,with wire lashings on the higher tier(s)

考题 When using slings,cargo handlers should take all the following precautions except ______.A.Ensure that slings are securely fastened around the loadB.Avoid careless winch operations,especially when handling fragile cargoC.Exercise care when using hooks,crowbars,and similar toolsD.Keep the loads as close to the rail or deck as possible

考题 When should traffic shaping be implemented on Frame Relay PVCs?()A、When you want to drop excess traffic above the CIRB、When there is a speed mismatch between the central site and the remote siteC、When using Frame Relay SVCsD、When over-subscribing the central site linkE、When LLQ is implemented on the Frame Relay PVCF、When Multilink PPP LFI is implemented on the Frame Relay PVC

考题 When NIC teaming is used, how are Loops avoided in a virtual switch?()A、By using active / passive teaming with spanning tree on the active IinkB、By using active / passive teaming with onIy the active Iink in useC、By using active / activate teaming with VM utilizing both uplink ports

考题 What two situations could require the use of multiple routing protocols? ()A、when all equipment is manufactured by CiscoB、when there are multiple paths to destination networksC、because having multiple routing protocols confuses hackersD、when migrating from an older Interior Gateway Protocol (IGP) to a new IGPE、when using UNIX host - based routersF、when smaller broadcast domains are desired

考题 When you are designing a Web application, which options define how rich text displays in a browser?()A、"Using HTML"B、"Using Java Applet"C、"Using AJAX Control"D、"Using Best Fit for OS"

考题 Whichtwo scenarios are NOT safe to replace a StringBuffer object with a StringBuilder object?()A、When using versions of Java technology earlier than 5.0.B、When sharing a StringBuffer among multiple threads.C、When using the java.io class StringBufferInputStream.D、When you plan to reuse the StringBuffer to build more than one string.E、Enitiation of separate design processes to the separation of users

考题 Which statement about data center access layer design modes is correct?()A、The access layer is the first oversubscription point in a data center design.B、When using a Layer 2 loop-free design, VLANs are extended into the aggregation layer.C、When using a Layer 2 looped design, VLANs are not extended into the aggregation layer.D、When using a Layer 3 design,stateful services requiring Layer 2 connectivity are provisioned from the aggregation layer.E、The data center access layer provides the physical-level connections to the server resources and only operates at Layer 3.

考题 How is NIC teaming configured when port channels are not in use in a Cisco Nexus 1000V?()A、active / active using spanning treeB、active / activeC、active / passive using spanning treeD、active / passive

考题 When does an MDisk become managed by an IBM Storwize V7000?()A、when a volume is created using thatMDiskB、when theMDisk is first imported into the clusterC、when the LUN is first presented to theStorwize V7000D、when theMDisk is assigned to a storage pool

考题 When defining resources for a concurrent resource group, which of the following is NOT  supported?()   A、 Application Servers using diskB、 Definition of Multiple IP aliasesC、 Volume Groups using raw logical volumesD、 Volume Groups supporting concurrent access

考题 Which two scenarios are NOT safe to replace a StringBuffer object with a StringBuilder object?()A、When using versions of Java technology earlier than 5.0.B、When sharing a StringBuffer among multiple threads.C、When using the java.io class StringBufferInputStream.D、When you plan to reuse the StringBuffer to build more than one string.

考题 In which situation would you use static database registration for a listener()A、when multiple databases are to be registered with the listenerB、when DBAs need to connect remotely to start up the database instanceC、when users need to connect the database instance using the host naming methodD、when the database instance that is to be registered with the listener is configured in shared server mode

考题 In which situation would you use the Oracle Shared Server configuration?()A、when performing export and import using Oracle Data PumpB、when performing backup and recovery operations using Oracle Recovery ManagerC、when performing batch processing and bulk loading operation in a data warehouse environment D、in an online transaction processing (OLTP) system where large number of client sessions are idle most of the time

考题 In which of the following scenarios is a tablespace recovery required?()A、 when recovering a lost read-only tablespace from a read-only tablespace backupB、 when recovering a lost read-only tablespace from a read-write tablespace backup when the database is running in  ARCHIVELOG modeC、 when recovering a lost read-only tablespace from a read-write tablespace backup when the database is running in  NOARCHIVELOG mode and the changes in the online redo log files have been overwrittenD、 when recovering a lost read-only tablespace from a read-only tablespace backup using the backup of the control file, the control file was created using the ALTER DATABASE BACKUP CONTROLFILE TO TRACE statement, and this statement was issued when the tablespace was read-only

考题 单选题When NIC teaming is used ,how are loops avoided in a virtual switch?()A By using active / passive teaming with spanning tree on the active linkB By using active / passive teaming with only the active link in useC By using active / active teaming with VM utilizing both uplink ports

考题 单选题When should a fire be ventilated?()A When attacking the fire directlyB When using a steam smothering systemC When using the fixed CO2 systemD All of the above

考题 单选题When using the term limber system one is referring to a().A Cleaning systemB Drainage systemC Strengthening systemD Weight reduction system

考题 填空题Why should you follow the directions carefully when using the machine?To use the washing machine ____.

考题 单选题When using the monitor traffic command on Junos devices, which UNIX-based utility is accessed?()A snoopB tcpdumpC monitorD tail

考题 单选题Which statement concerning the lashings of containers with solid bar or wire rope lashings is TRUE? ()A Stack weights should be less when using a solid bar lashing as compared to a wire lashingB Stack heights may be increased when using a solid bar lashingC Stack heights should be reduced when using a solid bar lashingD Solid bars should be used for lashing the first tier only,with wire lashings on the higher tier(s)

考题 单选题What is a valid option when using the ping command?()A packet lossB packet sizeC CRCD TCP port

考题 单选题In a Junos Pulse Access Control Service active/active clustered environment, which statement is true about VIPs?()A VIP is not required when using only agentless access for all endpoint platforms.B VIP is not required when using Junos Pulse or Odyssey Access Client for all endpoint platforms.C VIP is not required when using Junos Pulse and agentless access for all endpoint platforms.D VIP is not required when using Odyssey Access Client and agentless access for all endpoint platforms.

考题 单选题Which statement about data center access layer design modes is correct?()A  The access layer is the first oversubscription point in a data center design.B  When using a Layer 2 loop-free design, VLANs are extended into the aggregation layer.C  When using a Layer 2 looped design, VLANs are not extended into the aggregation layer.D  When using a Layer 3 design, stateful services requiring Layer 2 connectivity are provisionedfrom the aggregation layer.E  The data center access layer provides the physical-level connections to the server resourcesand only operates at Layer 3.

考题 单选题When using slings,cargo handlers should take all the following precautions except().A Ensure that slings are securely fastened around the loadB Avoid careless winch operations,especially when handling fragile cargoC Exercise care when using hooks,crowbars,and similar toolsD Keep the loads as close to the rail or deck as possible