网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
The J-Web application can install the JUNOS software from which two locations?()
- A、SDX
- B、local PC
- C、BSD shell
- D、remote host
参考答案
更多 “The J-Web application can install the JUNOS software from which two locations?()A、SDXB、local PCC、BSD shellD、remote host” 相关考题
考题
Because Web servers are platform. and application(71),they can send or request data from legacy or external application including database.All replies,once converted into(72)mark up language,can then be transmitted to a(73).Used in this way,Intranets can(74)lower desktop support costs,easy links with legacy application and databases and,(75)all。ease of use.(74)A.coupledB.dependentC.independentD.related
考题
The J-Web application can install the JUNOS software from which two locations?()
A. SDXB. local PCC. BSD shellD. remote host
考题
Which of the following protocols can be found at the application layer?()
A.TelnetB.TCPC.SNMPD.UDP
考题
A client has a temporary deployment of a new static application that needs to run for a short period of time and is not going to change.How can this deployment be achieved with a minimum of effort and time?()A.Run a system WPAR and deploy the application.B.Create a new LPAR and deploy the application.C.Create an application WPAR to deploy the application.D.Create an LPAR hosted by a VIO server and deploy the application.
考题
Because Web servers are platform. and application (71) ,they can send or request data fromlegacy or external application including database.All replies,once converted into (72) arkup language,can then be transmitted to a (73) .Used in this way,Intranets can (74) lower desktop support costs,easy links with legacy application and databases and, (75) all,ease of use.(62)A.coupledB.dependentC.independentD.related
考题
How does the Extended Get Digit String step differ from the Get Digit String? ()A、It can be used in conjunction with another step. B、It allows the application programmer into another section of the application. C、Most of the Extended Get Digit String variables can be changed while the application is running. D、It allows the entry of a Boolean expression for the Interruptible and Clear DTMF Buffer on Retry fields.
考题
What application can be used in place of xhost? Please enter only the name without path. Answer:()
考题
During a planning meeting, Company.com indicates that they intend to make a relational Database highly available. The application has a pre-requisite that a kernel extension be loaded from /etc/inittab. How would this be managed in an HACMP environment?() A、 It can be started with a crontab entry.B、 It can be created as an Application Server.C、 It can be added to a resource group as a dependency.D、 It cannot be done because HACMP provides no method to order application start/stop scripts.
考题
What does it mean for a variable in the Application Editor to be defined as a parameter?()A、The variable can be used to pass data to and from subflows. B、The value for that variable can be supplied via Application Configuration in Application Administration. C、The value for that variable is defined by the calling application. D、The variable can be used in conditional steps. E、The variable can be used to pass data to and from VoiceXML applications.
考题
Which of the following protocols can be found at the application layer?()A、TelnetB、TCPC、SNMPD、UDP
考题
A technician installed a new application on a Windows XP desktop. When the technician tries to launch the application it crashes. Which of the following can the technician use to troubleshoot the application?()A、System logsB、Security logsC、Application logsD、Application installation logs
考题
Application A holds an Update lock on a single row and application B is trying to read that row. If both applications are using isolation level UR, which of the following will occur?()A、Application B will read the row.B、Applications A and B will cause a deadlock situation.C、Application B will wait until application A releases the Update lock.D、Application A will be terminated so that application B can read the row.
考题
During initial cluster planning session, a requirement is mandated that application monitoring will Be used to monitor the production database and three application servers. Since all the application servers rely on the database being active, only one resource group has been planned to manage the starting/stopping of the cluster resources. How ill the initial design impact the use of application monitoring?() A、 Only one application server per resource group can be monitored.B、 Process monitoring is part of RSCT and requires no special scripts.C、 Any application can be monitored as long as it has an application server.D、 Having all application servers in one resource group improves recovery time.
考题
Company.com has installed HACMP and is configuring a three-node cluster. One of the Applications uses the AIX hostname as a key for authorization to execute on the specific computer. The application vendor was contacted and consented to having multiple copies of the application but required that only one application be active at any one point in time. How can the AIX host name dependency be managed in an HACMP environment.() A、 It cannot be managed because the application will not work properly with HACMP.B、 The application start and stop script for the application can manage the hostname.C、 HACMP will require customization to correctly manage a change in the hostname since it is tied to the primary network adapter.D、 HACMP will have to be restarted if the hostname is changed. This can be done with customization in the node_up and node_down event scripts.
考题
To enhance the availability of an application running under HACMP, a decision was made to use The application monitoring facility. The application consists of several components and can take several minutes to initialize. The components use socket communication and can be initialized in any order as long as it is a serial order. The customer’s concern is that if the application stop and start scripts are used during application monitoring recovery,it may take an extraordinary length of time to reset all of the application components. What can be done to ensure the best recover time?() A、 Use a process monitor that restarts the named processes in the original start order.B、 Use the defined application start and stop scripts to control the application if there is a failure.C、 Use multiple application monitors for this resource group to enable the monitoring of the specific components of the resource group.D、 Use application cleanup and restart scripts designed to determine the state of the various components of the application and start only the parts required.
考题
An administrator is evaluating an application for application monitoring. What command should be Used to determine if the application can be monitored with a process monitor?() A、 pa auxB、 ps -elC、 ps -efD、 ps -pl
考题
Which two of the following are the imposed restrictions to production redeployment in WebLogic Server ?()A、 Can’t cahnge application’s deployment targetsB、 Can’t cahnge application’s security modelC、 Can’t cahnge application’s node managerD、 Can’t cahnge application’s persistent store settings
考题
You are designing a strategy to install the new scheduling application. Which two actions should you perform?()A、Assign the scheduling application package to the Instructor OU.B、Publish the scheduling application package to the Instructor OU.C、Ensure that the scheduling application can install across slow WAN links.D、Prevent the scheduling application from installing across slow WAN links.
考题
单选题An administrator is configuring an application monitor. Upon encountering an unrecoverable error the administrator does not want the resource group to failover. How can the application monitor be configured toachieve this?()A
Configure the application monitor with a restart count of 0B
Configure the application monitor with a monitor mode of NotifyC
Configure the application monitor with a notify method of MonitorD
Configure the application monitor with a failure action of Notify
考题
多选题How does the Extended Get Digit String step differ from the Get Digit String? ()AIt can be used in conjunction with another step.BIt allows the application programmer into another section of the application.CMost of the Extended Get Digit String variables can be changed while the application is running.DIt allows the entry of a Boolean expression for the Interruptible and Clear DTMF Buffer on Retry fields.
考题
单选题A client has a temporary deployment of a new static application that needs to run for a short period of time and is not going to change. How can this deployment be achieved with a minimum of effort and time?()A
Run a system WPAR and deploy the application.B
Create a new LPAR and deploy the application.C
Create an application WPAR to deploy the application.D
Create an LPAR hosted by a VIO server and deploy the application.
考题
单选题A technician installed a new application on a Windows XP desktop. When the technician tries to launch the application it crashes. Which of the following can the technician use to troubleshoot the application?()A
System logsB
Security logsC
Application logsD
Application installation logs
考题
单选题What does it mean for a variable in the Application Editor to be defined as a parameter?()A
The variable can be used to pass data to and from subflows. B
The value for that variable can be supplied via Application Configuration in Application Administration. C
The value for that variable is defined by the calling application. D
The variable can be used in conditional steps. E
The variable can be used to pass data to and from VoiceXML applications.
考题
多选题The J-Web application can install the JUNOS software from which two locations?()ASDXBlocal PCCBSD shellDremote host
考题
单选题An administrator is evaluating an application for application monitoring. What command should be Used to determine if the application can be monitored with a process monitor?()A
pa auxB
ps -elC
ps -efD
ps -pl
考题
单选题Company.com has installed HACMP and is configuring a three-node cluster. One of the Applications uses the AIX hostname as a key for authorization to execute on the specific computer. The application vendor was contacted and consented to having multiple copies of the application but required that only one application be active at any one point in time. How can the AIX host name dependency be managed in an HACMP environment.()A
It cannot be managed because the application will not work properly with HACMP.B
The application start and stop script for the application can manage the hostname.C
HACMP will require customization to correctly manage a change in the hostname since it is tied to the primary network adapter.D
HACMP will have to be restarted if the hostname is changed. This can be done with customization in the node_up and node_down event scripts.
考题
单选题During a planning meeting, Company.com indicates that they intend to make a relational Database highly available. The application has a pre-requisite that a kernel extension be loaded from /etc/inittab. How would this be managed in an HACMP environment?()A
It can be started with a crontab entry.B
It can be created as an Application Server.C
It can be added to a resource group as a dependency.D
It cannot be done because HACMP provides no method to order application start/stop scripts.
考题
单选题During initial cluster planning session, a requirement is mandated that application monitoring will Be used to monitor the production database and three application servers. Since all the application servers rely on the database being active, only one resource group has been planned to manage the starting/stopping of the cluster resources. How ill the initial design impact the use of application monitoring?()A
Only one application server per resource group can be monitored.B
Process monitoring is part of RSCT and requires no special scripts.C
Any application can be monitored as long as it has an application server.D
Having all application servers in one resource group improves recovery time.
热门标签
最新试卷