网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which command do you use to manually remove antivirus patterns?()
A

request security utm anti-virus juniper-express-engine pattern-delete

B

request security utm anti-virus juniper-express-engine pattern-reload

C

request security utm anti-virus juniper-express-engine pattern-remove

D

delete security utm anti-virus juniper-express-engine antivirus-pattern


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which command do you use to manually remove antivirus patterns?()A request security utm anti-virus juniper-express-engine pattern-deleteB request security utm anti-virus juniper-express-engine pattern-reloadC request security utm anti-virus juniper-express-engine pattern-removeD delete security utm anti-virus juniper-express-engine antivirus-pattern” 相关考题
考题 Which antivirus solution integrated on branch SRX Series devices do you use to ensure maximum virus coverage for network traffic?() A. express AVB. full AVC. desktop AVD. ICAP

考题 Which command do you use to display the status of an antivirus database update?() A. show security utm anti-virus statusB. show security anti-virus database statusC. show security utm anti-virus databaseD. show security utm anti-virus update

考题 You want to create a Host Checker policy that looks for a specific antivirus product that is running on your client machines, but the predefined antivirus options do not include the antivirus product version that you use.Which feature should you verify the antivirus product is up to date?()A. Enhanced Endpoint SecurityB. DP signaturesC. Antivirus licensingD. Endpoint Security Assessment Plug-in

考题 Which command do you use to go from the shell prompt to the CLI prompt?() A. run cliB. cliC. start cliD. edit

考题 Which of the following should the technician do FIRST when replacing a motherboard?()A、Use a benchmarking toolB、Use anti-static wrist bandC、Remove the CPUD、Remove the power supply

考题 You want to create a Host Checker policy that looks for a specific antivirus product that is running on your client machines, but the predefined antivirus options do not include the antivirus product version that you use.Which feature should you verify the antivirus product is up to date?()A、Enhanced Endpoint SecurityB、DP signaturesC、Antivirus licensingD、Endpoint Security Assessment Plug-in

考题 Which command do you use to generate a report of database incarnations?()  A、 list incarnation of databaseB、 report incarnation of databaseC、 list database incarnationD、 database incarnation listE、 report database incarnation

考题 A technician is attempting to remove a number of viruses from an infected system. The antivirus software in use is fully updated and has detected the viruses. However, a message stating that the file is in use appears when the technician tries to quarantine or delete the infected files. Which of the following can be done to resolve this issue?()A、Change the permissions on the file.B、End the running process.C、Run the antivirus scan again.D、Use the command line to delete the file.

考题 After a successful recovery, the system administrator wishes to remove the fileset bos.net.tcp.server and all dependent software. After running an lslpp command, it is verified that the fileset is in the BROKEN state. What is the correct method for deinstallation?()A、Use installp -u command with -g to remove the fileset and all dependent software.B、Use installp -c command to commit fileset; use installp command with -g to remove the fileset and all dependent software.C、Use installp -C command to perform cleanup of fileset; use install command with -g to remove the fileset and all dependent software.D、Use installp -a command to apply fileset; use installp command with -g to remove the fileset and all dependent software.

考题 Your database runs in NOARCHIVELOG mode, and is backed up every night using RMAN scripts. However, last night your assistant DBA performed a manual operating system backup, instead of running the scripts. Today your database crashed and you now want to use the backups from last night. What do you need todo?()A、You need to perform the restore and recover operations manually, because the backup was made manually. B、First you need to resynchronize the catalog with the control file, and then you can use RMAN to recover the database. C、First you need to add the backup to the catalog using the CATALOG command, and then you can use RMAN to recover the database. D、You can just use RMAN and recover the database, because RMAN automatically updates the catalog with the backup information. 

考题 You are using replication and the binary log files on your master server consume a lot of disk space. Which two steps should you perform to safely remove some of the older binary log files?()A、Use the command PURGE BINARY LOGS and specify a binary log file name or a date and time to remove unused filesB、Execute the PURGE BINARY LOGE NOT USED commandC、Remove all of the binary log files that have a modification date earlier than todayD、Edit the .index file to remove the files you want to deleteE、Ensure that none of the attached slaves are using any of the binary logs you want to delete

考题 You want to drop the TBS1 tablespace from your database.  You also want to delete the corresponding data files automatically, and not have to do it manually.  What should you do?()A、Use the DROP DATAFILE command.B、Use the DROP TABLESPACE command.C、Ensure that all database files are Oracle Managed Files before using the DROP TABLESPACE command.D、Ensure that the DB_FILE_CREATE_DEST initialization parameter is set before using the DROP TABLESPACE command.

考题 You have lost all your database control files. To recover them, you are going to use the results of the alter database backup controlfile to trace command. Your datafiles and your online redo logs are all intact.  Which of the following is true regarding your recovery?()  A、 You will need to open the database with the resetlogs command.B、 All you need to do is execute the trace file from SQL*Plus and it will perform the recovery for you.C、 You will use the resetlogs version of the create controlfile command.D、 You will use the noresetlogs version of the create controlfile command.E、 You will use the trace file to create a backup control file, and then you will recover the database with the recover database using backup controlfile command

考题 After you install a new update, an application on the computer fails to run. You need to remove the update.  What should you do?()A、Use the Software Explorer window.B、Use the Add or Remove Programs window.C、Restore hidden updates.D、Use the Installed updates list on the Windows Update window.

考题 单选题Which antivirus solution integrated on branch SRX Series devices do you use to ensure maximum virus coverage for network traffic?()A express AVB full AVC desktop AVD ICAP

考题 单选题Which command do you use to create a recovery-catalog schema? ()A create recovery catalog B create catalogC build catalog D catalog create E mount catalog 

考题 单选题Which command do you use to display the status of an antivirus database update?()A show security utm anti-virus statusB show security anti-virus database statusC show security utm anti-virus databaseD show security utm anti-virus update

考题 单选题Which command do you use to manually remove antivirus patterns?()A request security utm anti-virus juniper-express-engine pattern-deleteB request security utm anti-virus juniper-express-engine pattern-reloadC request security utm anti-virus juniper-express-engine pattern-removeD delete security utm anti-virus juniper-express-engine antivirus-pattern

考题 单选题Which command do you use to show active alarms?()A show hardware stateB show system alarmsC show chassis stateD show services alarms

考题 单选题A technician is attempting to remove a number of viruses from an infected system. The antivirus software in use is fully updated and has detected the viruses. However, a message stating that the file is in use appears when the technician tries to quarantine or delete the infected files. Which of the following can be done to resolve this issue?()A Change the permissions on the file.B End the running process.C Run the antivirus scan again.D Use the command line to delete the file.

考题 单选题Which command do you use to go from the shell prompt to the CLI prompt?()A run cliB cliC start cliD edit

考题 单选题You want to create a Host Checker policy that looks for a specific antivirus product that is running on your client machines, but the predefined antivirus options do not include the antivirus product version that you use.Which feature should you verify the antivirus product is up to date?()A Enhanced Endpoint SecurityB DP signaturesC Antivirus licensingD Endpoint Security Assessment Plug-in

考题 单选题Which command do you use to navigate to [edit interfaces]?()A cd interfacesB dir edit interfacesC edit interfacesD interfaces

考题 单选题Which command do you use to identify the meaning of a syslog message?()A help log messagesB man log messagesC man syslogD help syslog

考题 单选题Your database runs in NOARCHIVELOG mode, and is backed up every night using RMAN scripts. However, last night your assistant DBA performed a manual operating system backup, instead of running the scripts. Today your database crashed and you now want to use the backups from last night. What do you need todo?()A You need to perform the restore and recover operations manually, because the backup was made manually. B First you need to resynchronize the catalog with the control file, and then you can use RMAN to recover the database. C First you need to add the backup to the catalog using the CATALOG command, and then you can use RMAN to recover the database. D You can just use RMAN and recover the database, because RMAN automatically updates the catalog with the backup information. 

考题 单选题Which CLI command do you use to determine which files are cleanup candidates?()A request system storage cleanup candidatesB request system services storage candidatesC request system services candidate cleanupD request system storage cleanup dry-run

考题 单选题You have lost all your database control files. To recover them, you are going to use the results of the alter database backup controlfile to trace command. Your datafiles and your online redo logs are all intact.  Which of the following is true regarding your recovery?()A  You will need to open the database with the resetlogs command.B  All you need to do is execute the trace file from SQL*Plus and it will perform the recovery for you.C  You will use the resetlogs version of the create controlfile command.D  You will use the noresetlogs version of the create controlfile command.E  You will use the trace file to create a backup control file, and then you will recover the database with the recover database using backup controlfile command

考题 单选题Which command do you use to generate a report of database incarnations?()A  list incarnation of databaseB  report incarnation of databaseC  list database incarnationD  database incarnation listE  report database incarnation