网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which procedure should be used to configure the system to prevent all users from using the ’at’ command()?
A
Create a /var/adm/cron/at.allow file with no entries
B
Create a /var/adm/cron/at.deny file with ’*’ as the only entry
C
Create a /var/adm/at/at.deny file with ’ALL’ as the only entry
D
Create a /var/adm/at/at.allow file with ’NONE’ as the only entry
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which procedure should be used to configure the system to prevent all users from using the ’at’ command()?A Create a /var/adm/cron/at.allow file with no entriesB Create a /var/adm/cron/at.deny file with ’*’ as the only entryC Create a /var/adm/at/at.deny file with ’ALL’ as the only entryD Create a /var/adm/at/at.allow file with ’NONE’ as the only entry” 相关考题
考题
Which smit fastpath should be used to configure Link Aggregation on a server?()
A.tcpipB.linkAggC.failoverD.etherchannel
考题
Which of the following tools can be used to configure the IBM System Storage DS8000? ()
A. IBM Systems DirectorB. Unisphere Management SuiteC. IBM System Storage Productivity Center (SSPC)D. IBM Standalone Solutions Configuration Tool (SSCT)
考题
Which of the following is TRUE about the ate program?()A、When running ate for the first time it will prompt for all the required information and configure all the required devicesB、The program is used by cu to communicate to a remote systemC、The program is used for remote communications between the host and a remote system using a modem or null modem via a tty portD、The program ate calls cu to communicate with the remote system
考题
Which of the following commands should be used to view and change the network filesystem tuning parameters available on the system?()A、 noB、 nfsoC、 vmtuneD、 exportfs
考题
You need to ensure that the stored procedure that inserts new loan requests can access data in tables that are stored in another database on the same SQL Server instance. Which two actions should you perform?()A、Ensure that the stored procedure and the tables are owned by users that are associated with the same SQL Server login.B、Ensure that the stored procedure and the tables are owned by the same database user.C、Ensure that the stored procedure and the tables use the same database schema.D、Configure the multiuser database option on both databases.E、Configure the cross-database ownership chaining option on both databases.
考题
A customer has security concerns about classified local data being compromised if the laptop isstolen. The customers laptop has Windows 2000 utilizing the FAT16 file system. Which of the following actions should be taken?()A、Upgrade the operating system to Windows XP Home.B、Have the customer convert to NTFS and enable data encryption.C、Tell the customer that a laptop should not be used for classified data.D、Configure the wireless adapter to only connect to secure networks.
考题
Which of the following commands should be used to observe the number of system calls per second? ()A、 sar B、 iostat C、 svmon D、 vmstat
考题
A system administrator has been asked to install an APAR but wants to be able to easily remove it. Which install option should be used?()A、applyB、cleanupC、commitD、reject
考题
Which smit fastpath should be used to configure Link Aggregation on a server?()A、tcpipB、linkAggC、failoverD、etherchannel
考题
Which of the following WLM commands should be used to monitor performance on a system running wlm?()A、 wlmcntrlB、 wlmstatC、 wlmcheckD、 wlmassign
考题
After the LED display is flashing 888 and the system is rebooted, which of the following commands should be used to gather dump information?()A、snap B、errpt C、kdb D、trace
考题
A system administrator needs to configure dump devices for the system. Which command would be used to estimate the size required for a dump device?()A、lsdevB、chdevC、sysdumpdevD、sysdumpstart
考题
Which procedure should be used to configure the system to prevent all users from using the ’at’ command()? A、Create a /var/adm/cron/at.allow file with no entriesB、Create a /var/adm/cron/at.deny file with ’*’ as the only entryC、Create a /var/adm/at/at.deny file with ’ALL’ as the only entryD、Create a /var/adm/at/at.allow file with ’NONE’ as the only entry
考题
Which of the following commands should be used to determine which disk of a system is experiencing a disk I/O performance problem?()A、 filemonB、 istatC、 vmstatD、 iostat
考题
Which of the following commands should be used to report statistics on network protocols used by the system?()A、 lsattrB、 pstatC、 netstatD、 ifconfig
考题
Which of the following commands should be used to display a system routing table?()A、 route B、 netstat C、 iptrace D、 traceroute
考题
单选题Which of the following commands should be used to determine which disk of a system is experiencing a disk I/O performance problem?()A
filemonB
istatC
vmstatD
iostat
考题
单选题You work as an application developer at CER-Tech.com. Cert-Tech.com uses Visual studio.NET 2005 as its Application Development platform.You are developing a .NET Framework 2.0 application used to store a type-safe list of names and e-mail addresses. The list will be populated all at ones from the sorted data which means you will not always need to perform insertion or deletion operations on the data. You are required to choose a data structure that optimizes memory use and has good performance.What should you do?()A
The System.Collections.Generic.SortedList class should be used B
The System.Collections.HashTable class should be usedC
The System.Collections.Generic.SortedDictionary class should be used D
The System.Collections.SortedList class should be used
考题
单选题You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a report which is often executed during business time. There is a stored procedure that is used as the data source for the report. You get a report from users saying that they receive the data returned by the report but the data is inconsistent. As the technical support, you check and find that phantom reads cause this problem. You must make sure that consistent data is returned by the report while not affecting other users. So what action should you perform to achieve this goal?()A
You should configure the database for Read Committed Snapshot isolation. B
You should modify the stored procedure to use the Snapshot isolation level C
You should configure the database for Auto Update Statistics asynchronously D
You should modify the stored procedure to use the Repeatable Read isolation level
考题
单选题Which of the following commands should be used to report statistics on network protocols used by the system?()A
lsattrB
pstatC
netstatD
ifconfig
考题
单选题Which of the following tools can be used to configure the IBM System Storage DS8000? ()A
IBM Systems DirectorB
Unisphere Management SuiteC
IBM System Storage Productivity Center (SSPC)D
IBM Standalone Solutions Configuration Tool (SSCT)
考题
多选题While troubleshooting a video problem on an application server, the system administrator has determined that the video firmware should be updated. Which of the following sources should be used to locate an appropriate update for this hardware?()AThird-party manufacturerBVideo chipset manufacturerCServer manufacturerDOperating system manufacturerEShareware file sharing site
考题
单选题Which of the following commands should be used to view and change the network filesystem tuning parameters available on the system?()A
noB
nfsoC
vmtuneD
exportfs
考题
单选题Which of the following commands should be used to display a system routing table?()A
route B
netstat C
iptrace D
traceroute
考题
单选题You have abandoned ship in tropical waters. Which procedure(s) should be used during a prolonged period in a raft?().A
Wet clothes during the day to decrease perspirationB
Get plenty of restC
Keep the entrance curtains openD
All of the above
热门标签
最新试卷