网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

A system administrator can create logical volumes and then add file systems to them, or create the file system directly. What is an advantage of the two-step approach instead of the one-step approach?()

  • A、The number of bytes per inode can be specified.
  • B、Placement of the filesystem on the disk can be specified.
  • C、The jfslog can be specified on creation of the filesystem.
  • D、Either a JFS or JFS2 filesystem can be created on the logical volume.

参考答案

更多 “A system administrator can create logical volumes and then add file systems to them, or create the file system directly. What is an advantage of the two-step approach instead of the one-step approach?()A、The number of bytes per inode can be specified.B、Placement of the filesystem on the disk can be specified.C、The jfslog can be specified on creation of the filesystem.D、Either a JFS or JFS2 filesystem can be created on the logical volume.” 相关考题
考题 The ‘fsck -p /dev/lv00’command returned thefollowing message: Not a recognized filesystem type What is the likely cause of the problem and how should it be resolved?() A.The file system superblock is dirty. It can be replaced from the VGDAB.The logical volume superblock is dirty. It can be replaced from the VGDAC.The file system superblock is dirty. It can be replaced from the secondary copyD.The logical volume superblock is dirty. It can be replaced from the secondary copy

考题 All of the following statements accurately describe process for administering file systems EXCEPT:() A.A logical volume must exist prior to running the crfs command to create a file systemB.A file system must be unmounted before it can be removedC.Defining a file system imposes a structure on a logical volumeD.Removing a file system using rmfs automatically removes the underling logical volume

考题 Which of the following statements is TRUE about mounting a file system?() A.A file system cannot be mounted on a directory containing data.B.Mounting a file system on a mount point containing data will delete the data.C.Mounting a file system on a amount point containing data will make the data temporarily inaccessible.D.A systems administrator must manually create an empty directory prior to mounting an AIX JFS.

考题 Which are valid statements about Cisco Virtual Interface Card (VIC)? ()A、 The Cisco VIC can create an unlimited number of Virtual NICsB、 The number of vNICs on the Cisco VIC that can be created is determined by the number of chassis uplinksC、 vNICs are created using software on the host operating systemD、 The host operating system sees a vNIC as a physical PCIe deviceE、 The host operating system sees a vNIC as a sub-interface of a primary NICF、 The Cisco VIC can create 1024 vNICs

考题 A storage specialist needs to automate some tasks triggered in the event of disaster recovery.  What is the best solution to accomplish this()A、using the DS GUI, step through Real Time Manager, Copy Services, Create custom scripts; actions and event conditions can be defined that triggerthe script; there is no need for a passwordB、create a shell script usingdscli commands; trigger the script from the operating system, and call the script using the -pwd option with the passwordC、create a password file; create a shell script using dscli commands; trigger the script from the operating systemD、create a password file; create a shell script usingdscli commands; trigger the script from the operating system; call the dscli script with the dscli -script  -pwdfile command

考题 What command should a system administrator run after using an editor to create the /etc/tunables/nextboot file?()A、ksh -n nextbootB、tunsave -a -f nextbootC、tuncheck -r -f nextbootD、diff $(vmtune) /etc/tunables/nextboot

考题 Which two statements are true about the rescue configuration file?()A、It gets updated automatically when you commit.B、You need to create it by issuing request system configuration rescue save.C、It is rollback file number 50 and you can recover it by issuing rollback 50.D、You can load it by entering rollback rescue.

考题 You are the administrator of ExamSheet's network.  The software department is preparing to rewrite an accounting application so that it will run on  Windows 2000 Professional computers. All of the computers in the software department currently use Windows 98. You plan to configure the computers in the software department so that users can use both Windows 98 and Windows 2000 Professional during the project. You want to ensure that users in the software department can access all of the files on their computers while using operating system.  What should you do?()A、Create and format an NTFS volume. Install Windows 2000 Professional on the volume. Create a primary partition in the remaining disk space and format the volume using the FAT32 file system.Reinstall Windows 98 on the new primary partition. B、Create and format an NTFS volume. Install Windows 2000 Professional on the volume. Create an extended partition in the remaining disk space and format the volume using the FAT32 file system. Reinstall Windows 98 on the new extended partition. C、Create and format and extended partition. Create a logical drive within the extended partition and format the drive with the FAT32 file system. Install Windows 2000 Professional on the new partition. D、Create and format an extended partition. Create a logical drive within the extended partition and format the drive with the NTFS file system. Install Windows 2000 Professional on the new partition.

考题 Which of the following statements are FALSE concerning the defragfs command?()A、 The defragfs command should not be run against file systems and logical volumes that contain mostly transitory information, such as /tmp.B、 The defragfs command should not be run on a large JFS2 file system when running on a 32-bit kernel.C、 The defragfs command can improve file system performance by increasing the file system’s contiguous free space.D、 The defragfs command can only be run against file systems that are mounted with read-write permissions.

考题 The ‘fsck -p /dev/lv00’ command returned the following message:Not a recognized filesystem type. What is the likely cause of the problem and how should it be resolved?()A、The file system superblock is dirty. It can be replaced from the VGDAB、The logical volume superblock is dirty. It can be replaced from the VGDAC、The file system superblock is dirty. It can be replaced from the secondary copyD、The logical volume superblock is dirty. It can be replaced from the secondary copy

考题 All of the following statements accurately describe process for administering file systems EXCEPT:()A、A logical volume must exist prior to running the crfs command to create a file systemB、A file system must be unmounted before it can be removedC、Defining a file system imposes a structure on a logical volumeD、Removing a file system using rmfs automatically removes the underling logical volume

考题 A system contains multiple hot-swap stand-alone disks with a large number of JFS2 file systems. Which feature of JFS2 can be used to improve reliability, availability and serviceability (RAS) if a disk failure occurs?()A、Inline loggingB、Dynamic inode allocationC、Linear directory organizationD、Online filesystem defragmentation

考题 The Chief Information Officer (CIO) is preparing a briefing about the reliability of their server environment.  There is a need to create a report about which systems had unplanned system outages and how often they occurred.  What IBM Director tool can be used to create the report?()A、Capacity ManagerB、Process Management toolC、System Availability toolD、System Reporting tool

考题 Where can a system administrator find information regarding configured physical volumes, volume groups, and logical volumes besides the Volume Group Descriptor Area (VGDA)?()A、/etc/filesystemsB、/etc/environmentC、Object Data Manager (ODM)D、Logical Volume Control Block (LVCB)

考题 An  administrator  can  create  logical  volumes  and  then  add  file  systems  to  them,  or  create  the  file  system directly.  What is an dvantage of the two-step approach instead of the one-step approach()A、The number of bytes per inode can be specified.B、Placement of the filesystem on the disk can be specified.C、The jfslog can be specified on creation of the filesystem.D、Either a JFS or JFS2 filesystem can be created on the logical volume.

考题 The data file belonging to the SYSTEM tablespace is corrupted and no backup of the file is available. How do you recover the data file?()A、The data file cannot be recovered.B、The date file can be restored from the SYSTEM auto backup.C、Take thetablespaceoffline,drop,kand re-create it.D、Recovery Manager (RMAN) is used to recover the data file.E、The ALTER DATABSE CREATE DATAFILE..commandis used to recover the data file.

考题 You are an administrator in a company that has Windows 2000 Professional systems. Your users have been installing unsupported USB drivers on to their systems causing them to lock up and fail. You want to insure that only drivers that are in the HAL can be installed. What must be done?()A、Ignore - Install all files, regardless of file signatureB、Warn - Display a message before installing an unsigned fileC、Block - Prevent installation of unsigned filesD、Apply setting as system default

考题 You need to ensure that you can recover system configuration and data if your computer hard disk fails.  What should you do? ()A、Create a system restore point.B、Create a backup of all file categories.C、Create a Complete PC Backup and Restore image.D、Perform an Automated System Recovery (ASR) backup.

考题 You are developing an application to create a new file on the local file system.You need to define specific security settings for the file. You must deny the file inheritance of any default security settings during creation.What should you do?()A、Create the file by using a new FileStream object by passing the FileSecurity object as a parameter to the FileStream constructor.B、Create a new FileSecurity object.C、Apply the permissions by using the File class.D、Create a new FileSystem Access Rule object for each permission that you need,and add each rule to the FileSecurity object.E、Create a new FileSystem Audit Rule object and add it to the FileSecurity object.

考题 Company.com needs to add a new file system to an existing volume group that is being made  Highly available by HACMP? What is the best procedure that minimizes down time of the applications?()  A、 Use C-SPOC to add the file system while the cluster is running.B、 Add the file system,and them perform the exportvg and importvg on the required nodes.C、 Stop the cluster,add the new file system, and synchronize the cluster then restart HACMP.D、 Break the reservation locks on the disk drives while the cluster is active and add the file system.

考题 单选题An  administrator  can  create  logical  volumes  and  then  add  file  systems  to  them,  or  create  the  file  system directly.  What is an dvantage of the two-step approach instead of the one-step approach()A The number of bytes per inode can be specified.B Placement of the filesystem on the disk can be specified.C The jfslog can be specified on creation of the filesystem.D Either a JFS or JFS2 filesystem can be created on the logical volume.

考题 单选题You are the administrator of ExamSheet's network.  The software department is preparing to rewrite an accounting application so that it will run on  Windows 2000 Professional computers. All of the computers in the software department currently use Windows 98. You plan to configure the computers in the software department so that users can use both Windows 98 and Windows 2000 Professional during the project. You want to ensure that users in the software department can access all of the files on their computers while using operating system.  What should you do?()A Create and format an NTFS volume. Install Windows 2000 Professional on the volume. Create a primary partition in the remaining disk space and format the volume using the FAT32 file system.Reinstall Windows 98 on the new primary partition. B Create and format an NTFS volume. Install Windows 2000 Professional on the volume. Create an extended partition in the remaining disk space and format the volume using the FAT32 file system. Reinstall Windows 98 on the new extended partition. C Create and format and extended partition. Create a logical drive within the extended partition and format the drive with the FAT32 file system. Install Windows 2000 Professional on the new partition. D Create and format an extended partition. Create a logical drive within the extended partition and format the drive with the NTFS file system. Install Windows 2000 Professional on the new partition.

考题 多选题Which two statements are true about the rescue configuration file?()AIt gets updated automatically when you commit.BYou need to create it by issuing request system configuration rescue save.CIt is rollback file number 50 and you can recover it by issuing rollback 50.DYou can load it by entering rollback rescue.

考题 单选题A system administrator can create logical volumes and then add file systems to them, or create the file system directly. What is an advantage of the two-step approach instead of the one-step approach?()A The number of bytes per inode can be specified.B Placement of the filesystem on the disk can be specified.C The jfslog can be specified on creation of the filesystem.D Either a JFS or JFS2 filesystem can be created on the logical volume.

考题 单选题Company.com needs to add a new file system to an existing volume group that is being made  Highly available by HACMP? What is the best procedure that minimizes down time of the applications?()A  Use C-SPOC to add the file system while the cluster is running.B  Add the file system,and them perform the exportvg and importvg on the required nodes.C  Stop the cluster,add the new file system, and synchronize the cluster then restart HACMP.D  Break the reservation locks on the disk drives while the cluster is active and add the file system.

考题 单选题Which of the following statements are FALSE concerning the defragfs command?()A  The defragfs command should not be run against file systems and logical volumes that contain mostly transitory information, such as /tmp.B  The defragfs command should not be run on a large JFS2 file system when running on a 32-bit kernel.C  The defragfs command can improve file system performance by increasing the file system’s contiguous free space.D  The defragfs command can only be run against file systems that are mounted with read-write permissions.

考题 单选题All of the following statements accurately describe process for administering file systems EXCEPT:()A A logical volume must exist prior to running the crfs command to create a file systemB A file system must be unmounted before it can be removedC Defining a file system imposes a structure on a logical volumeD Removing a file system using rmfs automatically removes the underling logical volume