网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
In which file can the administrator view the detailed results of the overnight cluster automatic verification?()
A

clutils.log

B

cluster.log

C

clverify.log

D

autoverify.log


参考答案

参考解析
解析: 暂无解析
更多 “单选题In which file can the administrator view the detailed results of the overnight cluster automatic verification?()A clutils.logB cluster.logC clverify.logD autoverify.log” 相关考题
考题 In which file can the administrator view the detailed results of the overnight cluster automatic verification?()A、clutils.logB、cluster.logC、clverify.logD、autoverify.log

考题 An administrator has written a script to check that the contents of an application configuration file are identicalon all cluster nodes. The script has also been associated with a user defined custom verification method. Theadministrator would like the contents of this file to be checked and verified automatically on a daily basis.How can this be achieved?()A、By using a job scheduler such as cronB、By enabling automatic cluster verificationC、By including the script name in the file /usr/es/sbin/cluster/etc/clverify.rcD、By including the custom method name in the file /usr/es/sbin/cluster/etc/rc.authomethods

考题 A network administrator would like to view detailed interface status, properties, statistics, errors,and CoS packet counters.Which operational command will display this information?()A、show interfaces extensiveB、show interfacesC、show configuration interfacesD、show interface status

考题 Which two of these methods will allow a CUE administrator to view the output of the CUE message log file?()A、syslog server B、GUI interface C、CLI D、text editorE、TFTP server

考题 An administrator runs clstat on a cluster node and receives the following response: ’Can not get  Cluster Information.’ Which of the following daemons may need to be started in order to correct this problem?()A、 topsvcsB、 clinfoESC、 snmpinfoD、 clsmuxpdES

考题 An administrator will be performing a PowerHA upgrade on a cluster from version 5.3 to version 5.5. Which ofthe following tasks will verify a successful migration?()A、Use the clstat command and verify the cluster is in a stable stateB、After each node is upgraded, run a verification and synchronizationC、After all nodes are upgraded, run a verification and synchronizationD、Take a snapshot of each node and verify the configuration is the same

考题 A cluster administrator wants to create a snapshot backup of the cluster. Which smit menu can be used to dothis?()A、Extended ConfigurationB、System Management (C-SPOC)C、Problem Determination ToolsD、Initialization and Standard Configuration

考题 When an emulated error notification method is complete, an administrator can view the error log  By typing the errpt command to be sure the emulation took place.  To verify that the error log entry is the result of the emulated event,the log entry resource name is set to EMULATOR,or which of the following?()  A、 A user defined Resource NameB、 A cluster defined Resource NameC、 An error daemon specific Resource NameD、 A Resource Name generated by Automatic Error Notification

考题 How can the administrator use file ’a’ containing ’-El sys0’ to view the attributes of a device()?  A、lsdev -fv aB、lsattr -f aC、lsattr`cat a`D、lsdev -Cccat a

考题 A cluster administrator has decided to add a cluster verification to the weekly maintenance scripts  That are run from corn.  When a cluster verification is performed,which of the following will require a custom verification method?()  A、 HACMP ODM object classesB、 HACMP Error NotificationC、 HACMP Topology  ResourcesD、 HACMP Application Server Start/Stop scripts

考题 Company.com has decided to use the FUBAR Application Server to host their web application. Unfortunately, the FUBAR Application Server uses the server machine’s file system for its JNDI namespace. Every JNDI lookup performed in the web application is translated into a file 1/0 operation, which results in very poor performance.  Which J2EE pattern can help with this performance issue?()A、 Transfer ObjectB、 Service LocatorC、 Intercepting FilterD、 Model-View-Controller

考题 While selecting files during an interactive restore with ufsrestore, you are interrupted by a junior  administrator before you can complete the file selection process and start the restore. After answering the administrator’s question, you realize that you have forgotten which files you had already selected for the restore.  How can you determine which files are already marked for extraction and restore? ()A、 You can use the ls subcommand of ufsrestore.B、 You can use the add subcommand of ufsrestore.C、 You can use the select subcommand of ufsrestore.D、 You can view the selected files as they are marked with a plus sign (+) in the list that is permanently displayed in the upper half of the interactive ufsrestore screen view.

考题 Which result or results do these actions produce?()A、Users in both departments can access their files from the network.B、Users in the accounting department can view the legal department’s documents.C、Users in the legal department cannot view the accounting department’s documents.D、Company managers can access and modify both departments’ files.

考题 单选题An administrator has written a script to check that the contents of an application configuration file are identicalon all cluster nodes. The script has also been associated with a user defined custom verification method. Theadministrator would like the contents of this file to be checked and verified automatically on a daily basis.How can this be achieved?()A By using a job scheduler such as cronB By enabling automatic cluster verificationC By including the script name in the file /usr/es/sbin/cluster/etc/clverify.rcD By including the custom method name in the file /usr/es/sbin/cluster/etc/rc.authomethods

考题 单选题An administrator will be performing a PowerHA upgrade on a cluster from version 5.3 to version 5.5. Which ofthe following tasks will verify a successful migration?()A Use the clstat command and verify the cluster is in a stable stateB After each node is upgraded, run a verification and synchronizationC After all nodes are upgraded, run a verification and synchronizationD Take a snapshot of each node and verify the configuration is the same

考题 单选题An administrator runs clstat on a cluster node and receives the following response: ’Can not get  Cluster Information.’ Which of the following daemons may need to be started in order to correct this problem?()A  topsvcsB  clinfoESC  snmpinfoD  clsmuxpdES

考题 单选题A cluster administrator has decided to add a cluster verification to the weekly maintenance scripts  That are run from corn.  When a cluster verification is performed,which of the following will require a custom verification method?()A  HACMP ODM object classesB  HACMP Error NotificationC  HACMP Topology  ResourcesD  HACMP Application Server Start/Stop scripts

考题 单选题Which of the following practices can encourage students to read an article critically?A Evaluating its point of view.B Finding out the facts.C Finding detailed information.D Doing translation exercises.

考题 单选题In which file can the administrator view the detailed results of the overnight cluster automatic verification?()A clutils.logB cluster.logC clverify.logD autoverify.log

考题 单选题Company.com performs a cluster verification on a regular basis. Cluster verification is successfulbut the cluster sometimes fails to start the applications during a fallover. Investigation of the issue has revealed that the non-shared component of the application configuration information is not being kept up to date on the secondary nodes.  What can be used to help resolve this issue?()A  A pre-eventB  Error notificationC  Application monitoringD  Custom verification methods

考题 单选题A network administrator would like to view detailed interface status, properties, statistics, errors,and CoS packet counters.Which operational command will display this information?()A show interfaces extensiveB show interfacesC show configuration interfacesD show interface status

考题 单选题How can the administrator use file ’a’ containing ’-El sys0’ to view the attributes of a device()?A lsdev -fv aB lsattr -f aC lsattr`cat a`D lsdev -Cccat a

考题 单选题A system administrator suspects that there were problems with the AIX installation on a pSeries server. Which of the following commands can be used, with the appropriate flags, to view the BOS installation output files?()A alogB errptC lscfgD installp

考题 多选题Which two of these methods will allow a CUE administrator to view the output of the CUE message log file?()Asyslog serverBGUI interfaceCCLIDtext editorETFTP server

考题 单选题A cluster administrator wants to create a snapshot backup of the cluster. Which smit menu can be used to dothis?()A Extended ConfigurationB System Management (C-SPOC)C Problem Determination ToolsD Initialization and Standard Configuration

考题 单选题Company.com has decided to use the FUBAR Application Server to host their web application. Unfortunately, the FUBAR Application Server uses the server machine’s file system for its JNDI namespace. Every JNDI lookup performed in the web application is translated into a file 1/0 operation, which results in very poor performance.  Which J2EE pattern can help with this performance issue?()A  Transfer ObjectB  Service LocatorC  Intercepting FilterD  Model-View-Controller

考题 单选题While selecting files during an interactive restore with ufsrestore, you are interrupted by a junior  administrator before you can complete the file selection process and start the restore. After answering the administrator’s question, you realize that you have forgotten which files you had already selected for the restore.  How can you determine which files are already marked for extraction and restore? ()A  You can use the ls subcommand of ufsrestore.B  You can use the add subcommand of ufsrestore.C  You can use the select subcommand of ufsrestore.D  You can view the selected files as they are marked with a plus sign (+) in the list that is permanently displayed in the upper half of the interactive ufsrestore screen view.

考题 单选题When an emulated error notification method is complete, an administrator can view the error log  By typing the errpt command to be sure the emulation took place.  To verify that the error log entry is the result of the emulated event,the log entry resource name is set to EMULATOR,or which of the following?()A  A user defined Resource NameB  A cluster defined Resource NameC  An error daemon specific Resource NameD  A Resource Name generated by Automatic Error Notification