网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which of the following actions will enable 64-bit applications on a system with 32-bit kernel()
A
Use smit load64bit to enable the 64-bit applications.
B
Re-install all applications with 64-bit versions.
C
Re-install the OS with 64-bit kernel enabled.
D
Change the kernel to 64bit, reboot, and then use the following command: chdev -l sys0 -a applications=64_bit
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which of the following actions will enable 64-bit applications on a system with 32-bit kernel()A Use smit load64bit to enable the 64-bit applications.B Re-install all applications with 64-bit versions.C Re-install the OS with 64-bit kernel enabled.D Change the kernel to 64bit, reboot, and then use the following command: chdev -l sys0 -a applications=64_bit” 相关考题
考题
Which of the following should be used to restrict access to a wireless network?()
A. Port forwardingB. Enable SSID broadcastC. Wireless encryptionD. Enable DMZ
考题
Which of the following should a technician do FIRST in the BIOS to set up drive encryption?()
A. Enable eSATA supportB. Run built-in diagnosticsC. Enable TPMD. Enable virtualization support
考题
Which of the following actions may cause a trigger to be fired?()
A.DROPB.ALTERC.DELETED.ROLLBACK
考题
Which of the following should be used to restrict access to a wireless network?()A、Port forwardingB、Enable SSID broadcastC、Wireless encryptionD、Enable DMZ
考题
Which of the following actions will enable 64-bit applications on a system with 32-bit kernel()A、Use "smit load64bit" to enable the 64-bit applications.B、Re-install all applications with 64-bit versions.C、Re-install the OS with 64-bit kernel enabled.D、Change the kernel to 64bit, reboot, and then use the following command: chdev -l sys0 -a "applications=64_bit"
考题
Which of the following actions may cause a trigger to be fired?()A、DROPB、ALTERC、DELETED、ROLLBACK
考题
A user reports that each day some files are deleted from the department share. The administrator needs to find who deleted these files. Which of the following actions should the administrator perform?()A、 Enable audit object access and specify files and folders to monitor using Task Manager.B、 Enable audit policy change and specify files and folders to monitor using Windows Explorer.C、 Enable audit object access and specify files and folders to monitor using Windows Explorer.D、 Open Performance Monitor and monitor folder activity.
考题
Which of the following technologies allows a single physical processor to do the work of multiple processors?()A、Symmetric multi-processingB、MulticoreC、64-bit processingD、Hyper-V
考题
Which of the following would be the BEST way to restrict access to the WAP from certain clients?()A、Disable DHCP serverB、Enable WEP encryptionC、Disable SSID broadcastD、Enable MAC filtering
考题
Which of the following operating system types will allow a user to utilize 16GB of RAM if installed on a PC workstation?()A、8-bitB、16-bitC、32-bitD、64-bit
考题
Which of the following describes the random access memory limitations with Vista 64-bit operating system?()A、2GBB、4GBC、8GBD、128GB
考题
Which of the following operating systems can Hyper-V run on?()A、64-bit Linux Enterprise EditionB、64-bit Windows Server 2008C、32-bit Windows Server 2008D、64-bit Windows Server 2003
考题
Which of the following technologies is specifically designed to increase server virtualization performance?()A、 Multicore processingB、 VTC、 64-bit processingD、 Hyperthreading
考题
Which of the following wireless security techniques is the MOST secure?()A、Enable Wired Equivalent PrivacyB、Disable SSID broadcastC、Enable Wi-Fi Protected AccessD、Enable MAC filtering
考题
When installing a new scanner, Windows XP does not automatically recognize the scanner. Which of the following actions should be taken?()A、Use the Scanners and Cameras Wizard to add the device.B、Enable the scanner in the BIOS.C、Add new printer Wizard.D、Ensure the scanner is not locked.
考题
Which of the following actions will enable 64-bit applications on a system with a 32-bit kernel?()A、change the kernel to 64bit, reboot, and then use the following command:chdev -l sys0 -a applications=64_bitB、Re-install the OS with 64-bit kernel enabledC、Re-install all applications with 64-bit versionsD、Use smit to enable the 64-bit applications
考题
A system administrator is doing an AIX 5L New and Complete Overwrite installation on a system with a 64-bit processor using the default settings. Which of the following will be the resulting installed environment?()A、Only the 32-bit kernel will be installed and enabledB、Only the 64-bit kernel will be installed and enabledC、Both the 32-bit and 64-bit kernel will be installed and the 32-bit kernel will be enabledD、Both the 32-bit and 64-bit kernel will be installed and the 64-bit kernel will be enabled
考题
In order to enable remote administration of users and tablespaces on an Oracle database, which of the following types of files must exist in the database?()A、Password file B、Initialization file C、Datafile D、Control file E、Nothing - SYSDBA privileges are not required for these actions
考题
You need to design a strategy to increase security for the client computers in the finance department. Which two actions should you perform?()A、Enable automatic certificate enrollmentB、Enforce smart card logonsC、Enable Encrypting File System (EFS) for offline filesD、Enable a screen saver password
考题
单选题In order to enable remote administration of users and tablespaces on an Oracle database, which of the following types of files must exist in the database?()A
Password file B
Initialization file C
Datafile D
Control file E
Nothing - SYSDBA privileges are not required for these actions
考题
单选题A user reports that each day some files are deleted from the department share. The administrator needs to find who deleted these files. Which of the following actions should the administrator perform?()A
Enable audit object access and specify files and folders to monitor using Task Manager.B
Enable audit policy change and specify files and folders to monitor using Windows Explorer.C
Enable audit object access and specify files and folders to monitor using Windows Explorer.D
Open Performance Monitor and monitor folder activity.
考题
多选题You want to enable resumable space allocation at the instance level. Which two actions would enable resumable space allocation at the instance level?()Aissuing the ALTER SYSTEM ENABLE RESUMABLE;statementBissuing the ALTER SESSION ENABLE RESUMABLE;statementCmodifying the RESUMABLE_TIMEOUT initialization parameter to a nonzero valueDissuing the ALTER SYSTEM SET RESUMABLE_TIMEOUT=;statement
考题
单选题Which of the following technologies is specifically designed to increase server virtualization performance?()A
Multicore processingB
VTC
64-bit processingD
Hyperthreading
考题
单选题Which one of the following commands can be used to enable AAA authentication to determine if a user canaccess the privilege command level?()A
aaa authentication enable method defaultB
aaa authentication enable defaultC
aaa authentication enable levelD
aaa authentication enable default local
考题
单选题Which of the following technologies allows a single physical processor to do the work of multiple processors?()A
Symmetric multi-processingB
MulticoreC
64-bit processingD
Hyper-V
考题
单选题Which of the following actions will enable 64-bit applications on a system with a 32-bit kernel?()A
change the kernel to 64bit, reboot, and then use the following command:chdev -l sys0 -a applications=64_bitB
Re-install the OS with 64-bit kernel enabledC
Re-install all applications with 64-bit versionsD
Use smit to enable the 64-bit applications
热门标签
最新试卷