网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which of the following actions will enable 64-bit applications on a system with  32-bit kernel()
A

Use smit load64bit to enable the 64-bit applications.

B

Re-install all applications with 64-bit versions.

C

Re-install the OS with 64-bit kernel enabled.

D

Change the kernel to 64bit, reboot, and then use the following command: chdev -l sys0 -a applications=64_bit


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which of the following actions will enable 64-bit applications on a system with  32-bit kernel()A Use smit load64bit to enable the 64-bit applications.B Re-install all applications with 64-bit versions.C Re-install the OS with 64-bit kernel enabled.D Change the kernel to 64bit, reboot, and then use the following command: chdev -l sys0 -a applications=64_bit” 相关考题
考题 Which of the following should be used to restrict access to a wireless network?() A. Port forwardingB. Enable SSID broadcastC. Wireless encryptionD. Enable DMZ

考题 Which of the following should a technician do FIRST in the BIOS to set up drive encryption?() A. Enable eSATA supportB. Run built-in diagnosticsC. Enable TPMD. Enable virtualization support

考题 Which of the following actions may cause a trigger to be fired?() A.DROPB.ALTERC.DELETED.ROLLBACK

考题 Which of the following should be used to restrict access to a wireless network?()A、Port forwardingB、Enable SSID broadcastC、Wireless encryptionD、Enable DMZ

考题 Which of the following actions will enable 64-bit applications on a system with  32-bit kernel()A、Use "smit load64bit" to enable the 64-bit applications.B、Re-install all applications with 64-bit versions.C、Re-install the OS with 64-bit kernel enabled.D、Change the kernel to 64bit, reboot, and then use the following command: chdev -l sys0 -a "applications=64_bit"

考题 Which of the following actions may cause a trigger to be fired?()A、DROPB、ALTERC、DELETED、ROLLBACK

考题 A user reports that each day some files are deleted from the department share. The administrator needs to find who deleted these files.  Which of the following actions should the administrator perform?()A、 Enable audit object access and specify files and folders to monitor using Task Manager.B、 Enable audit policy change and specify files and folders to monitor using Windows Explorer.C、 Enable audit object access and specify files and folders to monitor using Windows Explorer.D、 Open Performance Monitor and monitor folder activity.

考题 Which of the following technologies allows a single physical processor to do the work of multiple processors?()A、Symmetric multi-processingB、MulticoreC、64-bit processingD、Hyper-V

考题 Which of the following would be the BEST way to restrict access to the WAP from certain clients?()A、Disable DHCP serverB、Enable WEP encryptionC、Disable SSID broadcastD、Enable MAC filtering

考题 Which of the following operating system types will allow a user to utilize 16GB of RAM if installed on a PC workstation?()A、8-bitB、16-bitC、32-bitD、64-bit

考题 Which of the following describes the random access memory limitations with Vista 64-bit operating system?()A、2GBB、4GBC、8GBD、128GB

考题 Which of the following expansion slots is 64-bit?()A、 PCIxB、 PCIC、 ISAD、 PCIe

考题 Which of the following operating systems can Hyper-V run on?()A、64-bit Linux Enterprise EditionB、64-bit Windows Server 2008C、32-bit Windows Server 2008D、64-bit Windows Server 2003

考题 Which of the following technologies is specifically designed to increase server virtualization performance?()A、 Multicore processingB、 VTC、 64-bit processingD、 Hyperthreading

考题 Which of the following wireless security techniques is the MOST secure?()A、Enable Wired Equivalent PrivacyB、Disable SSID broadcastC、Enable Wi-Fi Protected AccessD、Enable MAC filtering

考题 When installing a new scanner, Windows XP does not automatically recognize the scanner. Which of the following actions should be taken?()A、Use the Scanners and Cameras Wizard to add the device.B、Enable the scanner in the BIOS.C、Add new printer Wizard.D、Ensure the scanner is not locked.

考题 Which of the following actions will enable 64-bit applications on a system with a 32-bit kernel?()A、change the kernel to 64bit, reboot, and then use the following command:chdev -l sys0 -a applications=64_bitB、Re-install the OS with 64-bit kernel enabledC、Re-install all applications with 64-bit versionsD、Use smit to enable the 64-bit applications

考题 A system administrator is doing an AIX 5L New and Complete Overwrite installation on a system with a 64-bit processor using the default settings. Which of the following will be the resulting installed environment?()A、Only the 32-bit kernel will be installed and enabledB、Only the 64-bit kernel will be installed and enabledC、Both the 32-bit and 64-bit kernel will be installed and the 32-bit kernel will be enabledD、Both the 32-bit and 64-bit kernel will be installed and the 64-bit kernel will be enabled

考题 In order to enable remote administration of users and tablespaces on an Oracle database, which of the following types of files must exist in the database?()A、Password file B、Initialization file C、Datafile D、Control file E、Nothing - SYSDBA privileges are not required for these actions

考题 You need to design a strategy to increase security for the client computers in the finance department. Which two actions should you perform?()A、Enable automatic certificate enrollmentB、Enforce smart card logonsC、Enable Encrypting File System (EFS) for offline filesD、Enable a screen saver password

考题 单选题In order to enable remote administration of users and tablespaces on an Oracle database, which of the following types of files must exist in the database?()A Password file B Initialization file C Datafile D Control file E Nothing - SYSDBA privileges are not required for these actions

考题 单选题Which of the following expansion slots is 64-bit?()A  PCIxB  PCIC  ISAD  PCIe

考题 单选题A user reports that each day some files are deleted from the department share. The administrator needs to find who deleted these files.  Which of the following actions should the administrator perform?()A  Enable audit object access and specify files and folders to monitor using Task Manager.B  Enable audit policy change and specify files and folders to monitor using Windows Explorer.C  Enable audit object access and specify files and folders to monitor using Windows Explorer.D  Open Performance Monitor and monitor folder activity.

考题 多选题You want to enable resumable space allocation at the instance level. Which two actions would enable resumable space allocation at the instance level?()Aissuing the ALTER SYSTEM ENABLE RESUMABLE;statementBissuing the ALTER SESSION ENABLE RESUMABLE;statementCmodifying the RESUMABLE_TIMEOUT initialization parameter to a nonzero valueDissuing the ALTER SYSTEM SET RESUMABLE_TIMEOUT=;statement

考题 单选题Which of the following technologies is specifically designed to increase server virtualization performance?()A  Multicore processingB  VTC  64-bit processingD  Hyperthreading

考题 单选题Which one of the following commands can be used to enable AAA authentication to determine if a user canaccess the privilege command level?()A aaa authentication enable method defaultB aaa authentication enable defaultC aaa authentication enable levelD aaa authentication enable default local

考题 单选题Which of the following technologies allows a single physical processor to do the work of multiple processors?()A  Symmetric multi-processingB  MulticoreC  64-bit processingD  Hyper-V

考题 单选题Which of the following actions will enable 64-bit applications on a system with a 32-bit kernel?()A change the kernel to 64bit, reboot, and then use the following command:chdev -l sys0 -a applications=64_bitB Re-install the OS with 64-bit kernel enabledC Re-install all applications with 64-bit versionsD Use smit to enable the 64-bit applications