网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

An application writes to a log file in the /logs filesystem that is full. After the log file is deleted, 'df' still shows the filesystem as 100% full. What is the likely cause of the problem and what will resolve it?()

  • A、The deleted file is still open by the application.The system must be rebooted before'df' will show the reduction in the filesystem.
  • B、The deleted file is still open by the application.The application must be stoppedbefore 'df' will show the reduction in the filesystem.
  • C、The filesystem is still marked as full in the /etc/fs.status file.The system must be rebooted before 'df' will show the reduction in the filesystem.
  • D、The filesystem is still marked as full in the /etc/fs.status file.The application must be stopped before 'df' will show the reduction in the filesystem.

参考答案

更多 “ An application writes to a log file in the /logs filesystem that is full. After the log file is deleted, 'df' still shows the filesystem as 100% full. What is the likely cause of the problem and what will resolve it?()A、The deleted file is still open by the application.The system must be rebooted before'df' will show the reduction in the filesystem.B、The deleted file is still open by the application.The application must be stoppedbefore 'df' will show the reduction in the filesystem.C、The filesystem is still marked as full in the /etc/fs.status file.The system must be rebooted before 'df' will show the reduction in the filesystem.D、The filesystem is still marked as full in the /etc/fs.status file.The application must be stopped before 'df' will show the reduction in the filesystem.” 相关考题
考题 Full Atomicity, Consistency, Isolation, Durability (ACID) compliance is a necessity for a new application, which heavily reads and writes data.This requires the following config file options: Sync_binlog=1 Innodb_flush_log_at_trx_commit=1 Innodb_doublewrite=1 However, this configuration is expected to introduce disk I/O overhead.What three changes will reduce disk I/O overheads?()A.Use of soft links for database directories on the same physical diskB.Use of delay_key_write=ON for batch index updateC.Allocation of RAM to the buffer pool such that more of the data can fit in RAMD.Placement of InnoDB log files and datadir on separate physical disksE.Use of separate directories on the same physical disk for log files and data files

考题 You are analyzing the components of the redo log mechanisms in your Oracle database. Which of the following purposes does the CKPT process serve?()A、Writes buffers to disk B、Writes current redo log number to datafile headers C、Writes redo log information to disk D、Reads information into memory for users

考题 A TCP/IP application is transferring files from a personal machine to a remote machine.  The application writes 32 kilobytes of data at a time to the socket, but has not issued a system call to set the window size.  Which of the following procedures should be performed on the personal machine to increase the throughput of the application?()A、 Increase the size of thewallB、 Increase the size of sb_maxC、 Increase the size of tcp_recvspaceD、 Increase the size of tcp_sendspace

考题 After installing WebSphere Commerce,the WebSphere Application Server fails to start.  Which log file will help determine if WebSphere Application Server was installed correctly?()A、WAS_installdir/logs/log.txt B、WC_installdir/logs/install_date_time.log C、WAS_installdir/logs/WC_instance_name/SystemOut.log D、WC_installdir/instances/instance_name/xml/instance_name.xml E、WAS_installdir/logs/serverStatus.log

考题 As part of fallover testing of a corporate database server, client application connectivity must be  verified. Which of the following would best verify the application functionality?()  A、 Perform a ping client verification test.B、 Review the number of active application processes.C、 Perform successful reads and writes to the application.D、 Run netstat -an to verify client connections to the listening ports.

考题 The Log Writer (LGWR) process reads information from the ()and writes it to the online logs.A、large poolB、shared poolC、data buffer cacheD、redo log bufferE、data dictionary cache

考题 Which two statements about the background process of the database writer are true()A、It is possible to have multiple database writers in an Oracle instance.B、It writes dirty buffers, if any, to data files whenever a checkpoint occurs.C、It writes dirty buffers, if any, to data files whenever a transaction commits.D、It writes dirty buffers, if any, to data files before the log writer (LGWR) writes

考题 Which background process reads the redo log buffer and writes it to a file?()A、ARCnB、DBWnC、CKPTD、LGWRE、PMONF、SMON

考题 Which two statements about the background process of thedatabase writerare true() A、It is possible to have multiple database writers in an Oracle instance.B、It writes dirty buffers, if any, to data files whenever a checkpoint occurs.C、It writes dirty buffers, if any, to data files whenever a transaction commits.D、It writes dirty buffers, if any, to data files before the log writer (LGWR) writes.

考题 The online redo log group configuration for your database is as follows: What will happen if the online redo log file ’ora02/oradata/redo02b.log’is corrupted while working on the database?() A、 The database will hang.B、 The database will be crashed.C、 The database will be shut down.D、 The LGWR process writes redo log entries to the other redo log member of the Group2 group

考题 You are installing an application on a computer that runs Windows Server 2008. During installation, the application will nedd to install new attributes and classes to the Active Directory database. You need to ensure that you can install the application. What should you do()A、Change the functional level of the forest to WIndows Server 2008.B、Log on by using an account that has Server Operator rights.C、Log on by using an account that has Schema Administrator rights and the appropriate rights to install the application.D、Log on by using an account that has the Enterprise Administrator  rights and the appropriate rights to install the application.

考题 You are installing an application on a computer that runs Windows Server 2008 R2.   During installation, the application will need to add new attributes and classes to the Active Directory  database.   You need to ensure that you can install the application.   What should you do()A、Change the functional level of the forest to Windows Server 2008 R2.B、Log on by using an account that has Server Operator rights.C、Log on by using an account that has Schema Administrator rights and the appropriate rights to install  the application.D、Log on by using an account that has the Enterprise Administrator rights and the appropriate rights to  install the application.

考题 You are installing an application on a computer that runs Windows Server 2008 R2. During  installation, the application will need to add new attributes and classes to the Active Directory  database.     You need to ensure that you can install the application.     What should you do()A、Change the functional level of the forest to Windows Server 2008 R2.B、Log on by using an account that has Server Operator rights.C、Log on by using an account that has Schema Administrator rights and the appropriate rights to install the applicatioD、Log on by using an account that has the Enterprise Administrator rights and the appropriate rights to install the app

考题 You have 15 computers that run Windows 7. You need to implement a monitoring solution that meets thefollowing requirements. Sends an e-mail notification when an application error is logged in the event log  Runs a script to restart the computer if an application error occurs between 17:00 and 07:00 Minimizes the administrative effort required to monitor applications. What should you do?()A、On all the computers, configure a custom view. Configure a custom task for the application error events.B、On a computer, configure a custom view to display the application errors. Configure a custom task forthe application error events.C、On a central computer, configure an event subscription. On all of the computers, configure a customtask in the Forwarded Events log.D、On all the computers, configure an event subscription to a central computer. On the central computer,configure a custom task in the Forwarded Events log.

考题 单选题After installing WebSphere Commerce,the WebSphere Application Server fails to start.  Which log file will help determine if WebSphere Application Server was installed correctly?()A WAS_installdir/logs/log.txt B WC_installdir/logs/install_date_time.log C WAS_installdir/logs/WC_instance_name/SystemOut.log D WC_installdir/instances/instance_name/xml/instance_name.xml E WAS_installdir/logs/serverStatus.log

考题 单选题As part of fallover testing of a corporate database server, client application connectivity must be  verified. Which of the following would best verify the application functionality?()A  Perform a ping client verification test.B  Review the number of active application processes.C  Perform successful reads and writes to the application.D  Run netstat -an to verify client connections to the listening ports.

考题 多选题Full Atomicity, Consistency, Isolation, Durability (ACID) compliance is a necessity for a new application, which heavily reads and writes data. This requires the following config file options: Sync_binlog=1 Innodb_flush_log_at_trx_commit=1 Innodb_doublewrite=1 However, this configuration is expected to introduce disk I/O overhead. What three changes will reduce disk I/O overheads?()AUse of soft links for database directories on the same physical diskBUse of delay_key_write=ON for batch index updateCAllocation of RAM to the buffer pool such that more of the data can fit in RAMDPlacement of InnoDB log files and datadir on separate physical disksEUse of separate directories on the same physical disk for log files and data files

考题 单选题The online redo log group configuration for your database is as follows: What will happen if the online redo log file ’ora02/oradata/redo02b.log’is corrupted while working on the database?()A  The database will hang.B  The database will be crashed.C  The database will be shut down.D  The LGWR process writes redo log entries to the other redo log member of the Group2 group

考题 多选题Which two statements about the background process of thedatabase writerare true()AIt is possible to have multiple database writers in an Oracle instance.BIt writes dirty buffers, if any, to data files whenever a checkpoint occurs.CIt writes dirty buffers, if any, to data files whenever a transaction commits.DIt writes dirty buffers, if any, to data files before the log writer (LGWR) writes.

考题 单选题The Log Writer (LGWR) process reads information from the ()and writes it to the online logs.A large poolB shared poolC data buffer cacheD redo log bufferE data dictionary cache

考题 多选题Which two statements about the background process of the database writer are true()AIt is possible to have multiple database writers in an Oracle instance.BIt writes dirty buffers, if any, to data files whenever a checkpoint occurs.CIt writes dirty buffers, if any, to data files whenever a transaction commits.DIt writes dirty buffers, if any, to data files before the log writer (LGWR) writes

考题 单选题You discover that the schema changes that were recently made to your SQL Server 2005 database have caused your Web site to stop functioning. It is unclear who made the changes. TestKing.com now mandates that all changes to the database schema be tracked. You need to implement a mechanism that will track schema changes in your database.  What should you do?()A Implement a stored procedure that writes data about schema changes to a log table.B Implement DDL AFTER triggers that write user and schema information to a log table.C Implement a DML INSTEAD OF trigger that writes data about schema changes to a log table.D Implement a DML AFTER trigger that writes data about schema changes to a log table.

考题 单选题You have a computer that runs Windows XP Professional. You attempt to install an application by using a Windows Installer package name app1. msi. The application installation fails. You plan to install the application again. You need to create an application installation log for the application setup. What should you do?()A At the command prompt, run msiexec /log app1. msi /passive. B At the command prompt, run msiexec /log app1. log /package app1. msi. C From the Local Security Policy, enable auditing for object access, and then run app1. msi.D From the Event Viewer, increase the size of the application log, and then run app1. msi. 

考题 单选题A TCP/IP application is transferring files from a personal machine to a remote machine.  The application writes 32 kilobytes of data at a time to the socket, but has not issued a system call to set the window size.  Which of the following procedures should be performed on the personal machine to increase the throughput of the application?()A  Increase the size of thewallB  Increase the size of sb_maxC  Increase the size of tcp_recvspaceD  Increase the size of tcp_sendspace

考题 单选题Which background process reads the redo log buffer and writes it to a file?()A ARCnB DBWnC CKPTD LGWRE PMONF SMON

考题 单选题You network contains an Exchange Server 2010 Mailbox server.You install and configure a third-party antivirus application on the server.You discover that a mailbox database named DB1 does not mount.You attempt to mount the mailbox database and receive an error message starting that the file named E01.log cannot be found.You need to mount DB1.The solution must prevent the antivirus application from causing the same error. What should you do?()A Disable the antivirus application.Restore E01.log from the most recent backup.Run the mount-database DB1 commandB Disable the antivirus application.Restore DB1 from the most recent backup.Run the mount-database DB1 commandC Exclude the transaction log folder from the antivirus application scans.Restore E01.log from the antivirus quarentine.Run the mount-database DB1 commandD Exclude the transaction log folder from the antivirus application scans.Restore DB1 from the most recent backup.Run the mount-database DB1 command

考题 单选题An application writes to a log file in the /logs filesystem that is full. After the log file is deleted, 'df' still shows the filesystem as 100% full. What is the likely cause of the problem and what will resolve it?()A The deleted file is still open by the application.The system must be rebooted before'df' will show the reduction in the filesystem.B The deleted file is still open by the application.The application must be stoppedbefore 'df' will show the reduction in the filesystem.C The filesystem is still marked as full in the /etc/fs.status file.The system must be rebooted before 'df' will show the reduction in the filesystem.D The filesystem is still marked as full in the /etc/fs.status file.The application must be stopped before 'df' will show the reduction in the filesystem.