网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which of the following files should be used to alter the order of which DNS servers get queried first?()
A

/etc/hosts

B

/etc/inetd.conf

C

/etc/netsvc.conf

D

/etc/resolv.conf


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which of the following files should be used to alter the order of which DNS servers get queried first?()A /etc/hostsB /etc/inetd.confC /etc/netsvc.confD /etc/resolv.conf” 相关考题
考题 A user copied files from a CD and now the files can only be opened as read-only. Which of the following utilities can be used to allow the user the ability to edit the files?() A.EDITB.CHMODC.ATTRIBD.CONVERT

考题 Which of the following protocols should be used to monitor network performance?() A.SNTPB.SMTPC.HTTPD.SNMP

考题 A system administrator needs to backup datavg which contains a database that pre-allocates files by padding them with nulls, similar to treating them as sparse files. In order to effectively backup and be able to restore the datavg files, which backup method should be used?()A.savevgB.tarC.cpioD.mksysb

考题 Which of the following commands should be used to alter the routing table on a running system without affecting the ODM settings?()A、inetdB、routeC、cfgmgrD、chdev

考题 A user copied files from a CD and now the files can only be opened as read-only. Which of the following utilities can be used to allow the user the ability to edit the files?()A、EDITB、CHMODC、ATTRIBD、CONVERT

考题 Which of the following commands would be used to verify the integrity of critical system files?()A、verifyB、nslookupC、sfcD、chkdsk

考题 Which of the following tools is used to consolidate files and folders on a local drive?()A、CHKDSKB、DEFRAGC、DISK CLEANUPD、Computer Management

考题 Which of the following should be used to check a serial port for functionality?()A、Loopback plugB、Toner probeC、MultimeterD、Cable tester

考题 Which of the following commands should Karen, a technician, use to examine and restoreprotected system files?()A、SFCB、RECOVERC、REPLACED、COPY

考题 Which of the following commands would be used to display hidden files?()A、dir /?B、dir /dC、dir /aD、dir /s

考题 Which of the following would be used to monitor unauthorized access to data files?()A、Performance Log and AlertsB、Event ViewerC、Security Configuration and AnalysisD、IP Security Monitor

考题 Which of the following commands should be used to show DNS information?()A、 traceB、 netstatC、 ifconfigD、 nslookup

考题 Which of the following tools should be used to report current network status and is often used to check the reliability of a network?()A、 netpmonB、 netstatC、 nfsstatD、 vmstat

考题 Which of the following commands should be used to delete an entry from the /etc/inittab?()A、xitabB、rmitabC、chitabD、delitab

考题 Which of the following commands should be used to determine which disk of a system is experiencing a disk I/O performance problem?()A、 filemonB、 istatC、 vmstatD、 iostat

考题 Which of the following commands should be used to report statistics on network protocols used by the system?()A、 lsattrB、 pstatC、 netstatD、 ifconfig

考题 Which of the following choices identifies a database component that will be used for multiplexing control files?()A、V$CONTROLFILE B、V$DATABASE C、init.ora D、DBA FILES

考题 You are trying to alter the initial segment size given to a table in a dictionary-managed tablespace. Which of the following keywords would be used as part of this process?()A、DROP TABLE B、ALTER TABLE C、RESIZE D、COALESCE

考题 Which of the following files should be used to alter the order of which DNS servers get queried first?()A、/etc/hostsB、/etc/inetd.confC、/etc/netsvc.confD、/etc/resolv.conf

考题 单选题Which of the following tools should be used to report current network status and is often used to check the reliability of a network?()A  netpmonB  netstatC  nfsstatD  vmstat

考题 单选题A system administrator needs to backup datavg which contains a database that pre-allocates files by padding them with nulls, similar to treating them as sparse files. In order to effectively backup and be able to restore the datavg files, which backup method should be used?()A savevgB tarC cpioD mksysb

考题 单选题Which of the following best describes a full backup? ()A All datafiles of a database B All datafiles, archive logs, and control files C All datafiles and control files D All the used blocks in a datafile