网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
A system contains multiple hot-swap stand-alone disks with a large number of JFS2 file systems. Which feature of JFS2 can be used to improve reliability, availability and serviceability (RAS) if a disk failure occurs?()
A

Inline logging

B

Dynamic inode allocation

C

Linear directory organization

D

Online filesystem defragmentation


参考答案

参考解析
解析: 暂无解析
更多 “单选题A system contains multiple hot-swap stand-alone disks with a large number of JFS2 file systems. Which feature of JFS2 can be used to improve reliability, availability and serviceability (RAS) if a disk failure occurs?()A Inline loggingB Dynamic inode allocationC Linear directory organizationD Online filesystem defragmentation” 相关考题
考题 Which hardware storage option, when set up with redundant disks, offers the least stability,availability, and reliability for Mysql data?() A.RAID 5B.iSCSIC.SAN (Storage Area Network)D.NFS (Networked File System)

考题 Which of the following statements is mot correct about mirroring?() A.Mirroring, with the write-verify option turned on, can be used to increase performance.B.Mirroring is a better choice that disk-striping, for large sequential-access file system when one is looking for performance.C.Mirroring, with a parallel-scheduling policy, may improve I/O read-operation performance.D.Mirroring, with maximum inter-disk allocation policy, is used to enhance availability.

考题 A high availability solution must be designed for a single file server.  Data must be replicated between the disks to ensure a failure of one disk does not bring down the server.  Which of thefollowing meets these requirements?()A、RAID 1B、RAID 0C、Active/passive clusterD、Disk-to-disk

考题 Which of the following commands can be used to show all disks configured on the system?()A、lsdev -C diskB、lsdev -P diskC、lsdev -Cc diskD、lsdev -Pc disk

考题 Which of the following is NOT a security feature relating to user accounts?()A、Some commands can be password protected requiring logged in customers to re-enter their password.B、A user account can be disabled automatically, after a specified number of invalid login attempts.C、An account can have multiple valid passwords at the same time, any of which can be used to access the account.D、The password policy feature can allow the system to require passwords to include a minimum number of numeric characters.E、Logged in customers can be logged off of the system after a specified period of inactivity.

考题 Which of the following statements are FALSE concerning the defragfs command?()A、 The defragfs command should not be run against file systems and logical volumes that contain mostly transitory information, such as /tmp.B、 The defragfs command should not be run on a large JFS2 file system when running on a 32-bit kernel.C、 The defragfs command can improve file system performance by increasing the file system’s contiguous free space.D、 The defragfs command can only be run against file systems that are mounted with read-write permissions.

考题 A system contains multiple hot-swap stand-alone disks with a large number of JFS2 file systems. Which feature of JFS2 can be used to improve reliability, availability and serviceability (RAS) if a disk failure occurs?()A、Inline loggingB、Dynamic inode allocationC、Linear directory organizationD、Online filesystem defragmentation

考题 An Enhanced Journeyed File System that is in a shred non-concurrent Volume Group is growing  at an unexpected rate. It is the administrator’s task to enlarge the filesystem without interrupting service.  What method should be sued to achieve this goal?()  A、 Use HACMP C-SPOC to increase the size of the JFS2 filesystem.B、 Use the smitty jfs2 fastpath to increase the size of the JFS2 filesystem.C、 Use HACMP C-SPOC to increase the size of the JFS2 filesystem and inline JFS2 logs.D、 Use mklvcopy hdisk# 2 jfs2lvname to increase the size of the JFS2 filesystem,then use splitlvcopy jfs2lvname 1 -y newjfs2lvname hdisk# to present the increased JFS2 filesystem to HACMP.

考题 A system administrator can create logical volumes and then add file systems to them, or create the file system directly. What is an advantage of the two-step approach instead of the one-step approach?()A、The number of bytes per inode can be specified.B、Placement of the filesystem on the disk can be specified.C、The jfslog can be specified on creation of the filesystem.D、Either a JFS or JFS2 filesystem can be created on the logical volume.

考题 Under  which  of  the  following  circumstances  must  a  JFS  filesystem  be  used  instead  of  a  JFS2   filesystem()A、filesystem will contain 100GB filesB、filesystem resides on a 32-bit systemC、filesystem contains a large number of small filesD、filesystem compression is required

考题 A System p distribution customer is very concerned about Reliability, Availability and  Serviceability (RAS). They are planning to install several p6 servers in their facilities and want to be able to move an LPAR from one System p to another.  Which of the following would accomplish this()A、System p servers using similar SAN storageB、System p servers must share an HMCC、System p servers must have the same level HMCD、System p servers with VIOS

考题 When is it appropriate to use a JFS filesystem instead of a JFS2 filesystem?()A、When the filesystem will contain 100GB files.B、When the filesystem resides on a 32-bit system.C、When the filesystem contains a large number of small files.D、When filesystem compression is required due to limited disk space.

考题 Which of the following statements is mot correct about mirroring?()A、Mirroring, with the write-verify option turned on, can be used to increase performance.B、Mirroring is a better choice that disk-striping, for large sequential-access file system when one is looking for performance.C、Mirroring, with a parallel-scheduling policy, may improve I/O read-operation performance.D、Mirroring, with maximum inter-disk allocation policy, is used to enhance availability.

考题 An  administrator  can  create  logical  volumes  and  then  add  file  systems  to  them,  or  create  the  file  system directly.  What is an dvantage of the two-step approach instead of the one-step approach()A、The number of bytes per inode can be specified.B、Placement of the filesystem on the disk can be specified.C、The jfslog can be specified on creation of the filesystem.D、Either a JFS or JFS2 filesystem can be created on the logical volume.

考题 Which two are the uses of the ASM metadata backup and restore (AMBR) feature?()A、 It can be used to back up all data on ASM disks.B、 It can be used to recover the damaged ASM disk group along with the data.C、 It can be used to gather information about a preexisting ASM disk group with disk paths,disk name,failure groups,attributes templates,and alias directory structure.D、 It can be used to re-create the ASM disk group with its attributes.

考题 Which hardware storage option, when set up with redundant disks, offers the least stability,availability, and reliability for Mysql data?()A、RAID 5B、iSCSIC、SAN (Storage Area Network)D、NFS (Networked File System)

考题 单选题An  administrator  can  create  logical  volumes  and  then  add  file  systems  to  them,  or  create  the  file  system directly.  What is an dvantage of the two-step approach instead of the one-step approach()A The number of bytes per inode can be specified.B Placement of the filesystem on the disk can be specified.C The jfslog can be specified on creation of the filesystem.D Either a JFS or JFS2 filesystem can be created on the logical volume.

考题 单选题Which of the following is NOT a security feature relating to user accounts?()A Some commands can be password protected requiring logged in customers to re-enter their password.B A user account can be disabled automatically, after a specified number of invalid login attempts.C An account can have multiple valid passwords at the same time, any of which can be used to access the account.D The password policy feature can allow the system to require passwords to include a minimum number of numeric characters.E Logged in customers can be logged off of the system after a specified period of inactivity.

考题 多选题Which two are the uses of the ASM metadata backup and restore (AMBR) feature?()AIt can be used to back up all data on ASM disks.BIt can be used to recover the damaged ASM disk group along with the data.CIt can be used to gather information about a preexisting ASM disk group with disk paths,disk name,failure groups,attributes templates,and alias directory structure.DIt can be used to re-create the ASM disk group with its attributes.

考题 单选题Which of the following commands can be used to show all disks configured on the system?()A lsdev -C diskB lsdev -P diskC lsdev -Cc diskD lsdev -Pc disk

考题 单选题A system administrator can create logical volumes and then add file systems to them, or create the file system directly. What is an advantage of the two-step approach instead of the one-step approach?()A The number of bytes per inode can be specified.B Placement of the filesystem on the disk can be specified.C The jfslog can be specified on creation of the filesystem.D Either a JFS or JFS2 filesystem can be created on the logical volume.

考题 单选题Which of the following statements is mot correct about mirroring?()A Mirroring, with the write-verify option turned on, can be used to increase performance.B Mirroring is a better choice that disk-striping, for large sequential-access file system when one is looking for performance.C Mirroring, with a parallel-scheduling policy, may improve I/O read-operation performance.D Mirroring, with maximum inter-disk allocation policy, is used to enhance availability.

考题 单选题Under  which  of  the  following  circumstances  must  a  JFS  filesystem  be  used  instead  of  a  JFS2   filesystem()A filesystem will contain 100GB filesB filesystem resides on a 32-bit systemC filesystem contains a large number of small filesD filesystem compression is required

考题 单选题A high availability solution must be designed for a single file server.  Data must be replicated between the disks to ensure a failure of one disk does not bring down the server.  Which of thefollowing meets these requirements?()A RAID 1B RAID 0C Active/passive clusterD Disk-to-disk

考题 单选题Which hardware storage option, when set up with redundant disks, offers the least stability,availability, and reliability for Mysql data?()A RAID 5B iSCSIC SAN (Storage Area Network)D NFS (Networked File System)

考题 单选题When is it appropriate to use a JFS filesystem instead of a JFS2 filesystem?()A When the filesystem will contain 100GB files.B When the filesystem resides on a 32-bit system.C When the filesystem contains a large number of small files.D When filesystem compression is required due to limited disk space.

考题 单选题Which of the following statements are FALSE concerning the defragfs command?()A  The defragfs command should not be run against file systems and logical volumes that contain mostly transitory information, such as /tmp.B  The defragfs command should not be run on a large JFS2 file system when running on a 32-bit kernel.C  The defragfs command can improve file system performance by increasing the file system’s contiguous free space.D  The defragfs command can only be run against file systems that are mounted with read-write permissions.