网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
A program is crashing and causing the computer to lockup. Which of the following is the BESTlocation for a technician to check for further information about the cause of the crash?()
A

Application log

B

File Replication log

C

System log

D

Security log


参考答案

参考解析
解析: 暂无解析
更多 “单选题A program is crashing and causing the computer to lockup. Which of the following is the BESTlocation for a technician to check for further information about the cause of the crash?()A Application logB File Replication logC System logD Security log” 相关考题
考题 Which log contains information about service restarts, system errors, warnings, and requests to check server connectivity? () A. Events logB. System logC. User Access logD. Admin Access log

考题 A user states that their web browser was recently updated and continuously crashes. Which of the following could the technician use to gather more information about the issue?() A. NTBACKUP logB. Advanced tab in the System applet in Control PanelC. Event LogD. Internet Options applet in Control Panel

考题 A user states that their work PC has become infected with a virus. Which of the following shouldthe technician do FIRST?() A. Perform an antivirus program scanB. Boot the machine into Safe ModeC. Remove the machine from the networkD. Check for system security patches

考题 Whatisthedefaultfilenameforthecomponenttracefile?() A.CiscoMIVR.logB.CiscoMADM.logC.CiscoMEDT.logD.CiscoMCVD.log

考题 日常故障处理时,在APG40中通过EventViewer,可以看到(). A.System logB.Security logC.Audit logD.Application log

考题 下面那个log文件是属于PONNBI北向系统的A、ponnbi_wrapper.logB、server.logC、security.logD、inventory.log

考题 A user states that their work PC has become infected with a virus. Which of the following shouldthe technician do FIRST?()A、Perform an antivirus program scanB、Boot the machine into Safe ModeC、Remove the machine from the networkD、Check for system security patches

考题 A user suspects that a recently installed program overwrote a Windows system file on the computer. Which of the following commands could be run to check and verify the system files?()A、system /vB、winnt /sC、sfc /scannowD、chkdsk /f

考题 In which file can the administrator view the detailed results of the overnight cluster automatic verification?()A、clutils.logB、cluster.logC、clverify.logD、autoverify.log

考题 A program configuration file on a shared computer changes each time the program is run, causing the program to fail. Which of the following steps could a technician take to help prevent this file from being changed?()A、Set the group’s folder permissions to deny.B、Use Event Viewer to monitor changes to the file.C、Store a backup copy of the file on a USB drive.D、Change the file attribute to read only.

考题 What is the default local location for syslog and trace files?()A、/logB、/home/logC、/var/logD、/etc/log

考题 APG的事件查看器(EVENTVIEWER)可以查看下述哪些事件?()A、System LogB、Application LogC、Security LogD、User Log

考题 A user states that their web browser was recently updated and continuously crashes. Which of the following could the technician use to gather more information about the issue?()A、NTBACKUP logB、Advanced tab in the System applet in Control PanelC、Event LogD、Internet Options applet in Control Panel

考题 A technician installed a new application on a Windows XP desktop. When the technician tries to launch the application it crashes. Which of the following can the technician use to troubleshoot the application?()A、System logsB、Security logsC、Application logsD、Application installation logs

考题 A program is crashing and causing the computer to lockup. Which of the following is the BESTlocation for a technician to check for further information about the cause of the crash?()A、Application logB、File Replication logC、System logD、Security log

考题 A technician is troubleshooting a user’s problem; important Windows services are not starting. In which of the following locations should the technician check to investigate when these services started or stopped?()A、Com+.logB、System LogC、Security LogD、Application Log

考题 A technician is troubleshooting a workstation that has the wrong time information. All workstations should be pointing to a central NTP server. Which of the following locations would the technician check to investigate error messages related to this issue?()A、IIS logB、Application logC、System logD、Security log

考题 An administrator receives an error when attempting to execute a WebSphere Commerce command and decides to take the following steps to troubleshoot the problem:   Check to see if the request was processed by the WebSphere plug-in but was never received by the WebSphere Application Server  Check for Java errors from EJBs and servlets  Trace WebSphere Commerce Server subsystems and commands  Which of the following files should the administrator check to accomplish these steps?()A、error.logB、trace.logC、http_plugin.logD、servlet.logE、SystemOut.log

考题 Which log contains information about service restarts, system errors, warnings, and requests to check server connectivity? ()A、Events logB、System logC、User Access logD、Admin Access log

考题 You are working on the Certkiller database.  What is the default name of the alert log file in this database?()A、alert_ Certkiller .logB、alertlog_ Certkiller .logC、alert_log_ Certkiller .logD、Certkiller _alert_log.logE、log_alert_: Certkiller .logF、trace_alert_ Certkiller .log

考题 You received the following error:   ORA-01578: ORACLE data block corrupted   (file # %s, block # %s)   Which file will you check to view additional information regarding the cause of this error?()A、the alert log file and the trace filesB、 the redo log filesC、 the control fileD、 the change tracking file

考题 单选题A program configuration file on a shared computer changes each time the program is run, causing the program to fail. Which of the following steps could a technician take to help prevent this file from being changed?()A Set the group’s folder permissions to deny.B Use Event Viewer to monitor changes to the file.C Store a backup copy of the file on a USB drive.D Change the file attribute to read only.

考题 单选题A user suspects that a recently installed program overwrote a Windows system file on the computer. Which of the following commands could be run to check and verify the system files?()A system /vB winnt /sC sfc /scannowD chkdsk /f

考题 单选题A customer’s computer crashes consistently when a specific application is launched. Thetechnician has looked at the computer and confirmed the cause of the crash. Which of thefollowing is the NEXT troubleshooting step the technician should take?()A Verify full system functionality.B Document the findings, actions, and outcomes.C Establish a plan of action to resolve the problem.D Question the user and identify changes the user has made to the system.

考题 单选题Which log contains information about service restarts, system errors, warnings, and requests to check server connectivity? ()A Events logB System logC User Access logD Admin Access log

考题 单选题What is the default local location for syslog and trace files?()A /logB /home/logC /var/logD /etc/log

考题 单选题You received the following error:   ORA-01578: ORACLE data block corrupted   (file # %s, block # %s)   Which file will you check to view additional information regarding the cause of this error?()A the alert log file and the trace filesB  the redo log filesC  the control fileD  the change tracking file