网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
An application writes to a log file in the /logs filesystem that is full. After the log file is deleted, 'df' still shows the filesystem as 100% full. What is the likely cause of the problem and what will resolve it?()
A

The deleted file is still open by the application.The system must be rebooted before'df' will show the reduction in the filesystem.

B

The deleted file is still open by the application.The application must be stoppedbefore 'df' will show the reduction in the filesystem.

C

The filesystem is still marked as full in the /etc/fs.status file.The system must be rebooted before 'df' will show the reduction in the filesystem.

D

The filesystem is still marked as full in the /etc/fs.status file.The application must be stopped before 'df' will show the reduction in the filesystem.


参考答案

参考解析
解析: 暂无解析
更多 “单选题An application writes to a log file in the /logs filesystem that is full. After the log file is deleted, 'df' still shows the filesystem as 100% full. What is the likely cause of the problem and what will resolve it?()A The deleted file is still open by the application.The system must be rebooted before'df' will show the reduction in the filesystem.B The deleted file is still open by the application.The application must be stoppedbefore 'df' will show the reduction in the filesystem.C The filesystem is still marked as full in the /etc/fs.status file.The system must be rebooted before 'df' will show the reduction in the filesystem.D The filesystem is still marked as full in the /etc/fs.status file.The application must be stopped before 'df' will show the reduction in the filesystem.” 相关考题
考题 You are using replication and the binary log files on your master server consume a lot of disk space. Which two steps should you perform to safely remove some of the older binary log files?() A.Use the command PURGE BINARY LOGS and specify a binary log file name or a date and time to remove unused filesB.Execute the PURGE BINARY LOGE NOT USED commandC.Remove all of the binary log files that have a modification date earlier than todayD.Edit the .index file to remove the files you want to deleteE.Ensure that none of the attached slaves are using any of the binary logs you want to delete

考题 An application writes to a log file in the /logs filesystem that is full. After the log file is deleted, 'df' still shows the filesystem as 100% full. What is the likely cause of the problem and what will resolve it?()A、The deleted file is still open by the application.The system must be rebooted before'df' will show the reduction in the filesystem.B、The deleted file is still open by the application.The application must be stoppedbefore 'df' will show the reduction in the filesystem.C、The filesystem is still marked as full in the /etc/fs.status file.The system must be rebooted before 'df' will show the reduction in the filesystem.D、The filesystem is still marked as full in the /etc/fs.status file.The application must be stopped before 'df' will show the reduction in the filesystem.

考题 After installing WebSphere Commerce,the WebSphere Application Server fails to start.  Which log file will help determine if WebSphere Application Server was installed correctly?()A、WAS_installdir/logs/log.txt B、WC_installdir/logs/install_date_time.log C、WAS_installdir/logs/WC_instance_name/SystemOut.log D、WC_installdir/instances/instance_name/xml/instance_name.xml E、WAS_installdir/logs/serverStatus.log

考题 How can a JFS2 filesystem be added to a volume group that has insufficient space to host a log LV?() A、Create the filesystem with an inline log.B、Create the filesystem referring to the jfs2log in rootvg.C、Create the filesystem and format the logical volume with ’logform’.D、Create the filesystem’s underlying logical volume with an inline log.

考题 A system administrator has determined that the /development filesystem needs to be changed from JFS to JFS2 to take advantage of the new capabilites available in JFS2. What is the method to convert the /development filesystem from type JFS to JFS2?()A、Umount the /development filesystem and remount it using the following command: mount -t jfs2 /developmentB、Edit the /etc/filesystems file to change the type paramter to "jfs2" and change the log parameter to "jfs2log"C、Backup the /development filesystem data, delete the JFS /development filesystem, create the new JFS2 /development filsystem, and restore the data to the /development filesystemD、Backup the /development filesystem data, change the /development filesystem using the following command,chfs -t type=jfs2 /development.then, restore the data to the /development filesystem

考题 The Log Writer (LGWR) process reads information from the ()and writes it to the online logs.A、large poolB、shared poolC、data buffer cacheD、redo log bufferE、data dictionary cache

考题 In your database, the Log Writer (LGWR) process is unable to write to a member of a current redo log group due to read/write failure. Which two effects would you see in your database?()A、The database instance aborts.B、The database operation temporarily halts till the member becomes available.C、Writing proceeds as normal. LGWR writes to the available members of a group and ignores the unavailable members.D、The member would be marked as STALE and an error message would be written to the alert log file and LGWR trace file.E、The status of the group changes to INACTIVE and an error message would be written to the alert log file and LGWR trace file.

考题 Which background process reads the redo log buffer and writes it to a file?()A、ARCnB、DBWnC、CKPTD、LGWRE、PMONF、SMON

考题 Which statement is true about FLUSH LOGS command?()A、It requires the RELOAD, FILE, and DROP privilegesB、It closes and reopens all log filesC、It closes and sends binary log files to slave serversD、It flushes dirty pages in the buffer pool to the REDO logs

考题 When performing a database duplication, which duplicate database parameter would you set to ensure that the online redo logs are created in the correct location?()  A、 log_file_name_convertB、 convert_log_file_nameC、 file_name_convert_logD、 redo_log_file_name_convertE、 logfile_convert_directory

考题 Your network consists of a single Active Directory domain. You have 10 Web servers run Windows Server 2003 Service Pack 2 (SP2). You need to archive all of the application event logs for all the Web servers. The archived logs must contain all information from the original logs. What should you do? ()A、Connect to each Web Server by using Event Viewer. Save the Application logs as the CSV file type.B、Connect to each Web Server by using Event Viewer. Save the Application logs as the Event Log file type.C、On each Web server, open the Security Configuration and Analysis snap-in, analyze the computer, and then export the settings.D、Run Security Configuration Wizard for each Web Server. Save the data to an .inf file.

考题 You are planning the migration of an existing application to Windows Azure.  The application includes a trace listener that produces log files.   The log files must be transferred to the Windows Azure Storage service each day with the minimum amount of effort.   You need to recommend an approach for transferring the log files.  What should you recommend?()A、 Perform on-demand transfers of custom error logs.B、 Perform on-demand transfers of Windows Azure logs.C、 Configure scheduled transfers of custom error logs.D、 Configure scheduled transfers of Windows event logs.

考题 You are the network administrator for TestKing.com. A Windows Server 2003 computer named TestKing6 functions as a file server. Drive C on TestKing6 is running low on free disk space. You need to ensure that an event is written to the application log on Drive C when 10 percent of the available free space on the server remains. What should you do?()A、Open Event Viewer and expand the application log. Select New Log View.B、Open Computer Management and expand Storage. Right-clickDisk Management, and then select Rescan Disks.C、Open Performance and expand Performance Logs and Alerts. Right-click Counter Logs, and then select New Log Settings.D、Open Performance and expand Performance Logs and Alerts. Right-click Alerts, and then select New Alert Settings.

考题 You configured automatic archive logging for the database. On the next startup the database runs for a while, but then hangs. After checking the alert log, you determine that all the online redo logs need archiving.  Which step was skipped when you set up automatic archive log?()A、LOG_ARCHIVE_DEST was not set in the parameter file.B、LOG_ARCHIVE_START was not set in the parameter file.C、alter database archivelog; was not executed in MOUNT mode.D、LOG_ARCHIVE_MAX processes were not set in the parameter file.

考题 单选题After installing WebSphere Commerce,the WebSphere Application Server fails to start.  Which log file will help determine if WebSphere Application Server was installed correctly?()A WAS_installdir/logs/log.txt B WC_installdir/logs/install_date_time.log C WAS_installdir/logs/WC_instance_name/SystemOut.log D WC_installdir/instances/instance_name/xml/instance_name.xml E WAS_installdir/logs/serverStatus.log

考题 多选题You are using replication and the binary log files on your master server consume a lot of disk space. Which two steps should you perform to safely remove some of the older binary log files?()AUse the command PURGE BINARY LOGS and specify a binary log file name or a date and time to remove unused filesBExecute the PURGE BINARY LOGE NOT USED commandCRemove all of the binary log files that have a modification date earlier than todayDEdit the .index file to remove the files you want to deleteEEnsure that none of the attached slaves are using any of the binary logs you want to delete

考题 单选题You are working as a DBA on Oracle Database 9i. You plan to upgrade your 9i database to Oracle 10g. To be familiar with the new database technology, you decide to install Oracle Database 10g on your workstation at home. You create a general purpose database.   After the installation, you make the following changes in your initialization parameter file:LOG_ARCHIVE_DEST_1=’LOCATION=USE_DB_RECOVERY_FILE_DEST’   DB_RECOVERY_FILE_DEST =    ’LOCATION=d:/product/10.1.0/flash_recovery_area’  DB_RECOVERY_FILE_DEST_SIZE=10g   Where are the archived redo logs stored for your database?()A  The archived redo logs are stored in an operating system-dependent location.B  The archived redo logs are stored in the location specified by LOG_ARCHIVE_DEST_1.C  The archived redo logs are stored in the location specified by DB_RECOVERY_FILE_DEST.D  The archived redo logs are stored in the locations specified by both LOG_ARCHIVE_DEST_1 and  DB_RECOVERY_FILE_DEST.

考题 单选题You are designing a plan to migrate an application to Windows Azure.  The application generates log files in a proprietary format.  You need to recommend an approach for retaining the existing log file format.  What should you recommend?()A  Configure Windows Azure Diagnostics to transfer event logs.B  Configure Windows Azure Diagnostics to transfer directories.C  Configure Windows AzureDiagnostics to transfer performance counters.D  Configure Windows Azure Diagnostics to transfer basic Windows Azure logs.

考题 单选题The system administrator has determined that a new JFS log needs to be created on a different disk, in order to decrease an I/O bottleneck. Which of the following steps are the most correct?()A  mklv -t jfslog -y LVname VGname 1 PVname logform /dev/LVname  chfs -a log=/dev/LVname /filesystemname m ount and unmount filesystemB  mklv -t jfslog -y LVname VGname PVname unmount filesystem vi /etc/filesystems, change entry for lv to point filesystem to new JFS log mount filesystemC  mklvcopy -a jfslog -y LVname VGname 1 PVname  chfs -a log=/dev/LVname /filesystemname  unmount and mount file systemD  mklvcopy  -t jfslog -y LVname VGname 1 PVname  logform /dev/LVname  vi /etc/filesystems, change entry for lv to point filesystem to new JFS log  unmount and mount filesystem

考题 单选题You are the network administrator for TestKing. The network contains a Windows Server 2003 computer named Testking1. You back up the data folders on Testking1 by using the following schedule: 1. Normal backup every Monday. 2. Incremental backups every Tuesday, Wednesday, Thursday, and Friday. After the backup on Friday is completed, a user accidentally deletes a file from a data folder on Server1. The user reports that he modified the file in the past week, but he does not know which day he modified the file. You do not know when the file was last backed up. You need to restore the latest copy of the file as quickly as possible. What should you do?()A Open the backup log for each day. Begin by opening the log for Monday, and then work forward through the logs for each day of the week. In each log, search for a backup of the file. Restore the first backup that you find.B Open the backup log for each day. Begin by opening the log for Tuesday, and then work forward through the logs for each day of the week. In each log, search for a backup of the file. Restore the first backup that you find.C Open the backup log for each day. Begin by opening the log for Friday, and then work backward through the logs for each day of the week. In each log, search for a backup of the file. Restore the first backup that you find.D Restore the file from the Monday, Tuesday, Wednesday, Thursday, and Friday backups, in that order.E Restore the file from the Monday backup, and then from the Friday backup.

考题 单选题The Log Writer (LGWR) process reads information from the ()and writes it to the online logs.A large poolB shared poolC data buffer cacheD redo log bufferE data dictionary cache

考题 单选题When you are allowing RMAN to backup your archived redo log files,how does RMAN know which archived redo logs to back up from your archive log destination?()A RMAN keeps a list of archive logs in a text file.B The DBA must manually tell RMAN which archive logs to backup.C RMAN has access to target control file and/or catalog information.D RMAN looks at the ARCHIVE_LOG_DEST parameter of your target database and backs up all archive logs found.

考题 单选题Which statement is true about FLUSH LOGS command?()A It requires the RELOAD, FILE, and DROP privilegesB It closes and reopens all log filesC It closes and sends binary log files to slave serversD It flushes dirty pages in the buffer pool to the REDO logs

考题 单选题When performing a database duplication, which duplicate database parameter would you set to ensure that the online redo logs are created in the correct location?()A  log_file_name_convertB  convert_log_file_nameC  file_name_convert_logD  redo_log_file_name_convertE  logfile_convert_directory

考题 多选题In WebLogic 10.3.6 and 12c, transaction logs can optionally write to a JDBC store instead of a file store on the file system. Identify the three benefits as a result of this capability.()Asimplified disaster recovery architecture and effortsBbetter performance than writing logs to a file storeCcommon storage of transaction logs with application dataDcommon replication of transaction logs with application dataEhigher transaction throughput

考题 单选题Which background process reads the redo log buffer and writes it to a file?()A ARCnB DBWnC CKPTD LGWRE PMONF SMON

考题 单选题You are planning the migration of an existing application to Windows Azure.  The application includes a trace listener that produces log files.   The log files must be transferred to the Windows Azure Storage service each day with the minimum amount of effort.   You need to recommend an approach for transferring the log files.  What should you recommend?()A  Perform on-demand transfers of custom error logs.B  Perform on-demand transfers of Windows Azure logs.C  Configure scheduled transfers of custom error logs.D  Configure scheduled transfers of Windows event logs.