网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
An administrator has received complaints from users that an application is not available while other applications run. This application resides on an NFS mounted filesystem. Which of the following commands should be run as a reasonable first step to handle this problem?()
A
df
B
showmount
C
exportfs
D
refresh -g nfs
参考答案
参考解析
解析:
暂无解析
更多 “单选题An administrator has received complaints from users that an application is not available while other applications run. This application resides on an NFS mounted filesystem. Which of the following commands should be run as a reasonable first step to handle this problem?()A dfB showmountC exportfsD refresh -g nfs” 相关考题
考题
An administrator is troubleshooting a problem on an application server, but has not determined the cause of the problem and is not able to replicate the problem. Which of the following should the administrator do prior to escalating the issue?()A、Gather information from users.B、Reboot the server.C、Apply the latest service packs to the operating system.D、Perform a root cause analysis
考题
An administrator is troubleshooting a problem on an application server, but has not determined the cause of the problem and is not able to replicate the problem. Which of the following should the administrator do prior to escalating the issue?()A、 Gather information from users.B、 Reboot the server.C、 Apply the latest service packs to the operating system.D、 Perform a root cause analysis.
考题
An administrator has received complaints from users that an application is not available while other applications run. This application resides on an NFS mounted filesystem. Which of the following commands should be run as a reasonable first step to handle this problem?()A、dfB、showmountC、exportfsD、refresh -g nfs
考题
An administrator receives an error when attempting to execute a WebSphere Commerce command and decides to take the following steps to troubleshoot the problem: Check to see if the request was processed by the WebSphere plug-in but was never received by the WebSphere Application Server Check for Java errors from EJBs and servlets Trace WebSphere Commerce Server subsystems and commands Which of the following files should the administrator check to accomplish these steps?()A、error.logB、trace.logC、http_plugin.logD、servlet.logE、SystemOut.log
考题
An administrator has received complaints from users that an application is not available while other applications run. This application resides on an NFS mounted filesystem. Which of the following commands should be run as a reasonable first step to handle this problem()A、dfB、showmountC、exportfsD、refresh -g nfs
考题
A System p administrator wants to NFS mount a filesystem from server "alpha" to server "bravo". Which of the following commands should be issued from "bravo" to determine which filesystems are being exported by server "alpha"()A、lsexport alphaB、showmount -e alphaC、exportfs -l alphaD、mount -e nfs alpha
考题
A system administrator has added a new port entry in /etc/services for a new application to be tested. Which of the following commands should be used to activate this port?()A、telinit -qB、refresh -s inetdC、startsrc -g servicesD、refresh -s portmap
考题
You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You manage a server that runs Windows Server 2008. The server hasTerminal Service Web Access (TS Web Access) installed. Several line-of-business applications areavailable on the server by using TS Web Access. You have a new application installed on the server. Youhave to make the application available through TS Web Access. In order to achieve this,What action should you perform?()A、In order to make the application available through TS Web Access, the data source for TS Web Accessshould be specified from the TS Web Access Web site.B、In order to make the application available through TS Web Access, the application should be added to the RemoteApp Programs list from TS RemoteApp Manager.C、In order to make the application available through TS Web Access, the users should be added to the TS Web Access Computers group from the Local Users and Groups snap-in.D、In order to make the application available through TS Web Access, the mstsc.exe command should be run and specify the /v parameter should be specified from the command prompt.
考题
You are an enterprise administrator for Cer-tech .com. The corporate network of the company consists ofan Active Directory domain. All the servers on the network run Windows Server 2008. The network runs aTerminal services role on a server to enable remote users to run commonly required applications from theirterminal. A Terminal Services application called App1 that runs on the server has suddenly stopped responding. Todiagnose the problem, you monitored the memory usage on the server for a week and discover that App1application has a memory leak. To resolve the problem, you first looked for a patch but that was not currently available. So you created a new resource-allocation policy in Microsoft Windows Server ResourceManager and configured a Process Matching Criteria named TrackMem for the application. Which of the following options would you choose to terminate the application when the application consumes more than half of the available memory on the server?()A、Configure the resource-allocation policy and set the maximum working set limit option to half theavailable memory on the server.B、Configure the resource-allocation policy and set the maximum committed memory option to half theavailable memory on the server.C、Set the new policy as a Profiling Policy.D、Set the new policy as a Managing Policy.
考题
You are the desktop administrator for your company. All users in the network have Windows XP Professional computers. Users in the research department have dual-processor computers. Users in the research department report that when they run 16-bit Windows programs, their computer performance becomes very slow. You use System Monitor to monitor the users’ computers. You discover that when the users are running their 16-bit applications, one processor shows a sustained utilization of more than 90 percent while the other processor only shows utilization of less than 10 percent. You need to improve application performance for the users in the research department. What should you do?()A、Configure each application to run in a separate memory space.B、Configure each application to run in AboveNormal priority class.C、For each application, set the compatibility mode to Windows 95. D、Configure processor affinity for each application to allow it to run on both processors.
考题
The system administrator has requested that all setuid/setgid bits be removed from executables in application filesystem. Which command will achieve this?()A、chmod -R o-s /applicationB、chmod -R ug-s /applicationC、chmod -R -s -o /applicationD、chmod -R -s -ug /application
考题
单选题Your network consists of a single Active Directory domain. All domain controllers run Windows Server 2008 R2. All client computers run Windows 7. All user accounts are stored in an organizational unit (OU) named Staff. All client computer accounts are stored in an OU named Clients. You plan to deploy a new application. You need to ensure that the application deployment meets the following requirements: èUsers must access the application from an icon on the Start menu. èThe application must be available to remote users when they are offline. What should you do?()A
Publish the application to users in the Staff OU.B
Publish the application to users in the Clients OU.C
Assign the application to computers in the Staff OU.D
Assign the application to computers in the Clients OU.
考题
多选题An administrator receives an error when attempting to execute a WebSphere Commerce command and decides to take the following steps to troubleshoot the problem: Check to see if the request was processed by the WebSphere plug-in but was never received by the WebSphere Application Server Check for Java errors from EJBs and servlets Trace WebSphere Commerce Server subsystems and commands Which of the following files should the administrator check to accomplish these steps?()Aerror.logBtrace.logChttp_plugin.logDservlet.logESystemOut.log
考题
单选题An administrator is looking to apply a new service pack for an OS on several systems that run business critical applications for a large international finance corporation. Which of the following should the administrator do FIRST?()A
Deploy the service pack to a single department within the corporation.B
Upgrade the system with requirements for that service pack.C
Deploy the service pack to a non-critical application server.D
Submit a change control for the service pack deployment.
考题
单选题A retail customer has a database application that is accessed by a large number of people through a web interface from multiple remote locations. Which questions will provide the information necessary to design the best performing storage solution of the following?()A
How many web servers will be connected to the database?B
How many concurrent applications will run against the database?C
How many concurrent users will be accessing the database?D
What are the types of transactions run against the database?
考题
单选题A system administrator has added a new port entry in /etc/services for a new application to be tested. Which of the following commands should be used to activate this port?()A
telinit -qB
refresh -s inetdC
startsrc -g servicesD
refresh -s portmap
考题
单选题An administrator has received complaints from users that an application is not available while other applications run. This application resides on an NFS mounted filesystem. Which of the following commands should be run as a reasonable first step to handle this problem()A
dfB
showmountC
exportfsD
refresh -g nfs
考题
单选题You are the desktop administrator for your company. All users in the network have Windows XP Professional computers. Users in the research department have dual-processor computers. Users in the research department report that when they run 16-bit Windows programs, their computer performance becomes very slow. You use System Monitor to monitor the users’ computers. You discover that when the users are running their 16-bit applications, one processor shows a sustained utilization of more than 90 percent while the other processor only shows utilization of less than 10 percent. You need to improve application performance for the users in the research department. What should you do?()A
Configure each application to run in a separate memory space.B
Configure each application to run in AboveNormal priority class.C
For each application, set the compatibility mode to Windows 95. D
Configure processor affinity for each application to allow it to run on both processors.
考题
单选题An administrator is in charge of a server that houses various applications. Which of the following BEST explains this server type?()A
Dedicated Application ServerB
File ServerC
Shared Application ServerD
Peer-to-Peer Application Server
考题
单选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You manage a server that runs Windows Server 2008. The server hasTerminal Service Web Access (TS Web Access) installed. Several line-of-business applications areavailable on the server by using TS Web Access. You have a new application installed on the server. Youhave to make the application available through TS Web Access. In order to achieve this,What action should you perform?()A
In order to make the application available through TS Web Access, the data source for TS Web Accessshould be specified from the TS Web Access Web site.B
In order to make the application available through TS Web Access, the application should be added to the RemoteApp Programs list from TS RemoteApp Manager.C
In order to make the application available through TS Web Access, the users should be added to the TS Web Access Computers group from the Local Users and Groups snap-in.D
In order to make the application available through TS Web Access, the mstsc.exe command should be run and specify the /v parameter should be specified from the command prompt.
考题
单选题A system administrator has filesystems that should not be mounted during system startup. How can the system administrator prevent the /data filesystem from being mounted during subsequent boots?()A
mount -no /dataB
chfs -A no /dataC
mount -t nfs /dataD
chfs -a type=nfs /data
考题
单选题You are developing an application that runs by using the credentials of the end user. Only users who are members of the Administrator group get permission to run the application. You write the following security code to protect sensitive data within the application.bool isAdmin=false; WindowsBuiltInRole role=WindowsBuiltInRole.Administrator; ...... if(!isAdmin) throw new Exception("User not permitted"); You need to add a code segment to this security code to ensure that the application throws an exception if a user is not a member of the Administrator group. Which code segment should you use?()A
AB
BC
CD
D
考题
单选题A System p administrator wants to NFS mount a filesystem from server "alpha" to server "bravo". Which of the following commands should be issued from "bravo" to determine which filesystems are being exported by server "alpha"()A
lsexport alphaB
showmount -e alphaC
exportfs -l alphaD
mount -e nfs alpha
考题
单选题An administrator is troubleshooting a problem on an application server, but has not determined the cause of the problem and is not able to replicate the problem. Which of the following should the administrator do prior to escalating the issue?()A
Gather information from users.B
Reboot the server.C
Apply the latest service packs to the operating system.D
Perform a root cause analysis.
考题
单选题An administrator is planning an upgrade of a major software package on an application server.The software has been identified, the project approved and the upgrade purchased. Which of the following steps should the administrator take NEXT?()A
Create a test environment for the new version.B
Determine system requirements for the upgrade.C
Request bids from other competing vendors in the product space.D
Document the upgrade.
考题
单选题The system administrator has requested that all setuid/setgid bits be removed from executables in application filesystem. Which command will achieve this?()A
chmod -R o-s /applicationB
chmod -R ug-s /applicationC
chmod -R -s -o /applicationD
chmod -R -s -ug /application
考题
单选题An administrator is troubleshooting a problem on an application server, but has not determined the cause of the problem and is not able to replicate the problem. Which of the following should the administrator do prior to escalating the issue?()A
Gather information from users.B
Reboot the server.C
Apply the latest service packs to the operating system.D
Perform a root cause analysis
热门标签
最新试卷