网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Which of the following will help protect an operating system from vulnerability?()

  • A、Download free anti-virus programs from the Internet.
  • B、Perform updates from the manufacturers website regularly.
  • C、Using the operating systems email program only to open attachments.
  • D、Monitoring what is displayed on the screen.

参考答案

更多 “Which of the following will help protect an operating system from vulnerability?()A、Download free anti-virus programs from the Internet.B、Perform updates from the manufacturers website regularly.C、Using the operating systems email program only to open attachments.D、Monitoring what is displayed on the screen.” 相关考题
考题 A system administrator detects thousands of open idle connections from the same source.Which problem can arise from this type of attack?() A. It enables an attacker to perform an IP sweep of devices.B. It enables a hacker to know which operating system the system is running.C. It can overflow the session table to its limit, which can result in rejection of legitimate traffic.D. It creates a ping of death and can cause the entire network to be infected with a virus.

考题 Which of the following is a way to protect server operating systems from a short term contractor?() A. Biometric devicesB. Limited logon hoursC. MantrapsD. Rack doors

考题 An administrator receives reports from users in an office that their 802.11g wireless connectivityhas been problematic since the installation of the new wireless phone system.At which of the following frequencies are both systems operating at to cause this issue?()A.2.4GHzB.900MHzC.1.1GHzD.5GHz

考题 All electrical appliances aboard a vessel should be grounded to ______.A.prevent them from falling when the vessel rollsB.protect personnel from electrical shockC.increase their operating efficiencyD.prevent unauthorized personnel from operating them

考题 An administrator is troubleshooting a problem on an application server, but has not determined the cause of the problem and is not able to replicate the problem. Which of the following should the administrator do prior to escalating the issue?()A、Gather information from users.B、Reboot the server.C、Apply the latest service packs to the operating system.D、Perform a root cause analysis

考题 Which of the following are methods to automatically update the antivirus application?() (Select TWO).A、Establish rules in the email scheduling program to perform updates.B、Select Update Now from the program options.C、Use the Automatic Update feature built into the application.D、Use scripts.E、Use Windows Update.

考题 Which of the following is a way to protect server operating systems from a short term contractor?()A、Biometric devicesB、Limited logon hoursC、MantrapsD、Rack doors

考题 A storage specialist needs to automate some tasks triggered in the event of disaster recovery.  What is the best solution to accomplish this()A、using the DS GUI, step through Real Time Manager, Copy Services, Create custom scripts; actions and event conditions can be defined that triggerthe script; there is no need for a passwordB、create a shell script usingdscli commands; trigger the script from the operating system, and call the script using the -pwd option with the passwordC、create a password file; create a shell script using dscli commands; trigger the script from the operating systemD、create a password file; create a shell script usingdscli commands; trigger the script from the operating system; call the dscli script with the dscli -script  -pwdfile command

考题 SQ L*Loader is a utility that can perform which two tasks?()A、Load data from a disk, tape, or named pipes.B、Load data into an Oracle database using DML statements.C、Extract, reorganize, and insert data within an Oracle database.D、Load data from external files into tables in an Oracle database.E、Load data into an Oracle database using operating system commands.F、Load data directly from a non-Oracle database to an Oracle database.

考题 Which of the following is a valid source for Windows operating system updates?()A、SNAB、RISC、RASD、WSUS

考题 The company has two thousand servers located around the globe. Which of the following is the BEST method of patch management and deployment?()A、Set all servers to automatically download patches from the manufacturer’s website.B、Install an internal patch management system and deploy from the system.C、Install the patches on each server from a deployment disk.D、RDP into each server, manually download and install the patches.

考题 An administrator receives reports from users in an office that their 802.11g wireless connectivity has been problematic since the installation of the new wireless phone system. At which of the following frequencies are both systems operating at to cause this issue?()A、2.4GHzB、900MHzC、1.1GHzD、5GHz

考题 The latest SCSI adaptor card is purchased from a vendor. Drivers for the operating system cannot be obtained. The SCSI adapter card is added to an existing server. Upon booting, the operating system does not detect the card. Which of the following is the MOST likely cause of the problem?()A、 The SCSI card is not seated correctly.B、 The termination is incorrectly set on the SCSI card.C、 The SCSI card is not listed on the operating system HCL (Hardware Compatibility List).D、 Operating system patches were not updated before installing the card.

考题 Which of the following best describes the lock protection provided by DB2 for the current row of a cursor?()A、The cursor is only protected from updates and deletes by concurrent applications.B、The row is only protected from positioned updates and deletes that reference another cursor of the same application.C、The cursor is protected from positioned updates and deletes that reference another cursor of a different application.D、The row is protected from updates and deletes by the current application and from positioned updates and deletes that reference another cursor of the same application.

考题 After installing the base operating system and the Server bundle, a system administrator decides to remove several printer definitions that the system users will not need. Which of the following procedures is the best way for a system administrator to remove the extra printer definitions?()A、Select the SMIT option to remove software productsB、Reinstall the desired filesets using the "Force Overwrite" optionC、Delete the unnecessary entries from the /usr/lpp/printers directoryD、Use the ODM edit (odem) utility to revmoe the definition from the system's ODM database

考题 An administrator is looking for the "Open Restricted Shell Terminal" option on the HMC GUI. Under which panel is this option available?() A、HMC Management, but only from a local connectionB、Service Management, but only from a local connection.C、Systems Management, but only from a local connection.D、Systems Management, but only from a remote connection.

考题 A customer is running a number of non-IBM servers purchased two years ago and has settled on one of the new IBM xSeries servers as a migration path.  From the following options, which is the preferred migration path?()A、Copy the image of the non-IBM servers and copy that image to the IBM servers, then reboot the IBM servers.B、Copy the image from the non-IBM servers with RDM and install them with IBM Director to the new IBM servers. Reboot the IBM servers.C、Install a fresh operating system using ServerGuide, and then install the applications and copy the data from the old servers.D、Install a fresh operating system on the IBM servers and then run ServerGuide on the IBM servers to migrate the applications and data to the IBM servers.

考题 The system administrator has created a mksysb to attempt to clone to another system. Which of the following considerations is NOT true?()A、When using a mksysb to clone a system that has had device driver updates applied, the target system does not need to be updated with device driver Updates to match the source systems level, as the mksysb will have the needed drivers.B、CHRP architecture systems cloned form non-CHRP architecture systems with Updates applied may fail to boot due to incompatibilities between the updated kernel in the mksysb image and the base level devices.chrp.base.rte fileset installed during the cloning process.C、If the source and target system kernels are different (for example, rs6k and rspc), one MUST boot from CD-ROM installation media, at the same operating system level as the mksysb being restored.D、The RECOVER_DEVCIES option allows the choice to recover the customized ODM attributes from the mksysb(for example, network addressing, static routes, tty settings, and multi-port adapter cards). The target devices must be in The same location as the source machine, or the install will fail and the device wil not be defined.

考题 You have been recently hired as a database administrator. Your senior manager asks you to study the production database server and submit a report on the settings done by the previous DBA.  While observing the server settings, you find that the following parameter has been set in the parameter file of the database:  REMOTE_OS_AUTHENT = TRUE  What could have been the reason to set this parameter as TRUE?()A、to enable operating system authentication for a remote clientB、to restrict the scope of administration to identical operating systemsC、to allow the start up and shut down of the database from a remote clientD、to enable the administration of the operating system from a remote clientE、to disable the administration of the operating system from a remote client

考题 You work as a database administrator for Supportcenter.cn. You are using Recovery Manager (RMAN) for backup and recovery of your database. You executed the delete command in RMAN to delete a backup of a tablespace. Which statement is true in this scenario?()A、The backup status will be marked expired in RMAN recovery catalog.B、The backup status will be marked deleted in RMAN recovery catalog after you execute the crosscheck command.C、The backup will be deleted physically from the OS (Operating system)and the backup information is removed from the recovery cataloglD、The backup status will be marked deleted and you must delete the backup file manually from the OS (Operating system).E、The backup status will be marked deleted and you must delete the backup file manually from the OS (Operating system), if you are not using Oracle Managed Files (OMF).

考题 Which of the following BEST describes the initial process of setting up a new operating system from a CD-ROM? ()A、Format a partition, install device drivers, and install the operating system.B、Create a partition, format the partition, and install the operating system.C、Install the operating system, create a partition, and install device drivers.D、Install the operating system, install device drivers, and create a partition.

考题 单选题Which of the following will help protect an operating system from vulnerability?()A Download free anti-virus programs from the Internet.B Perform updates from the manufacturers website regularly.C Using the operating systems email program only to open attachments.D Monitoring what is displayed on the screen.

考题 单选题Which of the following is a way to protect server operating systems from a short term contractor?()A  Biometric devicesB  Limited logon hoursC  MantrapsD  Rack doors

考题 单选题A system administrator detects thousands of open idle connections from the same source.Which problem can arise from this type of attack?()A It enables an attacker to perform an IP sweep of devices.B It enables a hacker to know which operating system the system is running.C It can overflow the session table to its limit, which can result in rejection of legitimate traffic.D It creates a ping of death and can cause the entire network to be infected with a virus.

考题 单选题You work as a database administrator for Supportcenter.cn. You are using Recovery Manager (RMAN) for backup and recovery of your database. You executed the delete command in RMAN to delete a backup of a tablespace. Which statement is true in this scenario?()A The backup status will be marked expired in RMAN recovery catalog.B The backup status will be marked deleted in RMAN recovery catalog after you execute the crosscheck command.C The backup will be deleted physically from the OS (Operating system)and the backup information is removed from the recovery cataloglD The backup status will be marked deleted and you must delete the backup file manually from the OS (Operating system).E The backup status will be marked deleted and you must delete the backup file manually from the OS (Operating system), if you are not using Oracle Managed Files (OMF).

考题 多选题Which of the following are methods to automatically update the antivirus application?() (Select TWO).AEstablish rules in the email scheduling program to perform updates.BSelect Update Now from the program options.CUse the Automatic Update feature built into the application.DUse scripts.EUse Windows Update.

考题 单选题Which of the following best describes the lock protection provided by DB2 for the current row of a cursor?()A The cursor is only protected from updates and deletes by concurrent applications.B The row is only protected from positioned updates and deletes that reference another cursor of the same application.C The cursor is protected from positioned updates and deletes that reference another cursor of a different application.D The row is protected from updates and deletes by the current application and from positioned updates and deletes that reference another cursor of the same application.