网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
A system administrator has edited the necessary files for setup of an AIX system to serve as a bootp server.  Which of the following commands is required to complete the activation?()
A

telinit -q

B

startsrc -s bootpd

C

refresh -s inetd


参考答案

参考解析
解析: 暂无解析
更多 “单选题A system administrator has edited the necessary files for setup of an AIX system to serve as a bootp server.  Which of the following commands is required to complete the activation?()A telinit -qB startsrc -s bootpdC refresh -s inetd” 相关考题
考题 You are a network administrator for Ezonexam.com's Windows 2000 network.Your network has 200 Windows 2000 Professional computers and 15 Windows 2000 Server computers.Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled. A user named Jack Bauer leaves the company. You grant her manager the Full Control NTFS permission to Jack's home folder. When the manager attempts to open any of the files, she receives the following error message: "Access is denied."What should you do?A.Use System File Checker (SFC) to decrypt the file.B.Log on the network as the Recovery Agent. Decrypt the files for the manager.C.Log on the network as the administrator. Use the cipher command to decrypt the files.D.Log on the network as a member of the Backup Operators group. Decrypt the files for the manager.

考题 A system administrator has just applied an update to an AIX system to correct a problem, The APAR number is IX49035 and was shipped as part of the PTF number U437542. After applying the APAR fix, the administrator wants to ensure that the fix is applied before informing the system users of the corrected problem. Which of the following commands should the system administrator run to verify that the APAR fix has been applied to the system?()A.lslpp -f IX49035B.lslpp -fB U437542C.instfix -f IX49035D.instfix -ik IX49035

考题 A system administrator has disabled USB ports after experiencing several virus outbreaks. A user needs to transfer several extremely large work related files from their home desktop computer to their work desktop computer. Which of the following will allow the user to transfer the needed files?()A、An IEEE-1394 deviceB、A NIC deviceC、An IrDA deviceD、A FDD device

考题 A system administrator has edited the necessary files for setup of an AIX system to serve as a bootp server.  Which of the following commands is required to complete the activation?()A、telinit -qB、startsrc -s bootpdC、refresh -s inetd

考题 A System p administrator needs to document system changes that have occurred recently. The company has a policy of making all possible changes via the smit interface.  Which of the following files would show the commands that have been performed from within smit and their resulting output()A、/smit.logB、/smit.scriptC、/var/log/smit.logD、/.history

考题 Which of the following files should be edited to disable remote machines from performing a "finger" on a system?()A、/etc/security/userB、/etc/servicesC、/etc/inetd.confD、/etc/hosts.equiv

考题 An administrator has added a new device to a system and wants to determine if it has been correctly added to the ODM database. Which command would the system administrator use?()A、odmgetB、odmaddC、odmshowD、odmcreate

考题 An administrator is planning an upgrade of a major software package on an application server.The software has been tested successfully in a test environment and it is ready to go into production. Which of the following steps should the administrator take next?()A、Identify necessary operating system updatesB、Implement the changeC、Document the changeD、Schedule system down time

考题 A System p administrator is attempting to restore some files from a backup tape. The restore failed. The system administrator suspects the block size of the tape drive is incorrect.  Which of the following commands can be used to determine the block size of the backup tape ()A、ddB、tarC、cpioD、restore

考题 A new application has been added to a system which needs to automatically be started at system startup. The system administrator has decided to accomplish this by using the /etc/inittab file. Which command would be used to accomplish this in a supported manner?()A、viB、mkitabC、telinitD、startsrc

考题 A System p administrator needs to set the default password length for all users to six characters.  Which of the following files needs to be edited to accomplish this ()A、/etc/security/limitsB、/etc/security/mkuser.sysC、/etc/security/privD、/etc/security/user

考题 A system administrator is attempting to restore some files from a backup tape. The restore failed. The system administrator suspects the block size of the tape drive is incorrect. Which of the following commands can be used to determine the block size of the backup tape?()A、ddB、tarC、cpioD、restore

考题 A system administrator is monitoring a system that has recently shown a decrease in performance. The administrator suspects there is an overload of traffic on a single Ethernet adapter. Which of the following commands is best to identify a possible overload of the Ethernet adapter?()A、pingB、iostatC、netstatD、ifconfig

考题 A system administrator has been asked to document the hardware configuration of a system. Which command can be used to assist in this task?()A、lscfgB、mkdevC、lslppD、cfgmgr

考题 A system administrator is monitoring a system that has recently shown a decrease in performance.The administrator suspects that the system may be low on memory and may be paging excessively.Which of the following commands is best to identify a possible paging problem?()A、iostatB、netstatC、psD、vmstat

考题 You are the network administrator for The network consists of a single Active Directory domain named testking.com. All domain controllers run Windows Server 2003. A member server named TestKing3 has IIS installed. TestKing3 hosts all content for company web sites. The server is backed up on magnetic tape once each month. To replace the web functionality of TestKing3, the company acquires a new computer. You configure the computer as a member server named TestKing4 and install IIS. You transfer all content from TestKing3 to TestKing4 and start the IIS service on TestKing4. You discover that TestKing4 is not configured with the IIS settings that were defined on TestKing3. You need to ensure that TestKing4 has the same IIS settings that were defined on TestKing3. What should you do?()A、Use the most recent backup tape of TestKing3 to restore the System State data on TestKing4.B、Use the most recent backup tape of TestKing3 to restore C:/windows/system32/inetsrv/History on TestKing4.C、Use IIS manager on TestKing3 to select the Save Configuration to Disk option. Edit the files to replace system-specific information. Use the edited files to restore the IIS metabase on TestKing4.D、Use IIS manager on TestKing3 to select the Backup/Restore Configuration option. Edit the files to replace system-specific information. Use the edited files to restore the IIS metabase on TestKing4.

考题 A system administrator has just applied an update to an AIX system to correct a problem, The APAR number is IX49035 and was shipped as part of the PTF number U437542. After applying the APAR fix, the administrator wants to ensure that the fix is applied before informing the system users of the corrected problem. Which of the following commands should the system administrator run to verify that the APAR fix has been applied to the system?()A、lslpp -f IX49035B、lslpp -fB U437542C、instfix -f IX49035D、instfix -ik IX49035

考题 单选题Purging air from a hydraulic system is necessary when()A adding small amounts of oil to the systemB the system has been overheatedC the system has been drained and then filled with new oilD the system has been idle for a long period of time

考题 单选题Which of the following files should be edited to disable remote machines from performing a "finger" on a system?()A /etc/security/userB /etc/servicesC /etc/inetd.confD /etc/hosts.equiv

考题 单选题Before performing a mksysb system backup, which of the following procedures should a system administrator perform to avoid backing up certain user files?()A Add the list of files to /etc/exclude.rootvg.B Modify the image.data file and add the files to be excluded form the backup.C Modify the bosinst.data file and specify which files are to be excluded from the backup.D Specify the files to be excluded on the command line when executing the mksysb command.

考题 单选题A system administrator has disabled USB ports after experiencing several virus outbreaks. A user needs to transfer several extremely large work related files from their home desktop computer to their work desktop computer. Which of the following will allow the user to transfer the needed files?()A An IEEE-1394 deviceB A NIC deviceC An IrDA deviceD A FDD device

考题 单选题A system administrator needs to backup datavg which contains a database that pre-allocates files by padding them with nulls, similar to treating them as sparse files. In order to effectively backup and be able to restore the datavg files, which backup method should be used?()A savevgB tarC cpioD mksysb

考题 单选题A System p administrator needs to set the default password length for all users to six characters.  Which of the following files needs to be edited to accomplish this ()A /etc/security/limitsB /etc/security/mkuser.sysC /etc/security/privD /etc/security/user

考题 单选题A System p administrator needs to document system changes that have occurred recently. The company has a policy of making all possible changes via the smit interface.  Which of the following files would show the commands that have been performed from within smit and their resulting output()A /smit.logB /smit.scriptC /var/log/smit.logD /.history

考题 单选题An administrator is planning an upgrade of a major software package on an application server. The software has been tested successfully in a test environment and it is ready to go into production.  Which of the following steps should the administrator take next?()A  Identify necessary operating system updatesB  Implement the changeC  Document the changeD  Schedule system down time

考题 单选题Your network has 200 Windows 2000 Professional computers and 15 Windows 2000 Server computers. Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled. A user named Tess King leaves the company. You grant her manager the Full Control NTFS permission to Tess's home folder. When the manager attempts to open any of the files, she receives the follo wing error message: "Access is denied." What should you do?()A Use System File Checker (SFC) to decrypt the file.B Log on the network as the Recovery Agent. Decrypt the files for the manager.C Log on the network as the administrator. Use theciphercommand to decrypt the files.D Log on the network as a member of the Backup Operators group. Decrypt the files for the manager.

考题 单选题A system administrator has filesystems that should not be mounted during system startup. How can the system administrator prevent the /data filesystem from being mounted during subsequent boots?()A mount -no /dataB chfs -A no /dataC mount -t nfs /dataD chfs -a type=nfs /data