网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which of the following files should an administrator modify to configure dynamic caching?()
A

dynacache.xml

B

cachespec.xml

C

dynacache.conf

D

cachemon.xml

E

cachespec.conf


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which of the following files should an administrator modify to configure dynamic caching?()A dynacache.xmlB cachespec.xmlC dynacache.confD cachemon.xmlE cachespec.conf” 相关考题
考题 An administrator is experiencing availability issues on a Linux server. The administrator decides tocheck the server for an IP address conflict on the server. Which of the following commands should the administrator use?()A.tracerouteB.tracertC.ifconfigD.ipconfig

考题 A system administrator needs to backup datavg which contains a database that pre-allocates files by padding them with nulls, similar to treating them as sparse files. In order to effectively backup and be able to restore the datavg files, which backup method should be used?()A.savevgB.tarC.cpioD.mksysb

考题 A user cannot access files on /deps/it directory, the administrator verifies permissions are set rw-------for the directory.  Which of the following actions need to be performed to only grant read access to the user on the IT directory?()A、 Set folder permissions to 760.B、 Set folder permissions to 770.C、 Set folder permissions to modify.D、 Set folder permissions to full control.

考题 An administrator notes that after a recent power outage, some open files were corrupted on one affected file server. Which of the following items should the administrator consider to determine the cause of this corruption?()A、The server's memoryB、The server's RAID controller batteryC、The server's processorD、The server's NIC teaming configuration

考题 Before performing a mksysb system backup, which of the following procedures should a system administrator perform to avoid backing up certain user files?()A、Add the list of files to /etc/exclude.rootvg.B、Modify the image.data file and add the files to be excluded form the backup.C、Modify the bosinst.data file and specify which files are to be excluded from the backup.D、Specify the files to be excluded on the command line when executing the mksysb command.

考题 A user reports that each day some files are deleted from the department share. The administrator needs to find who deleted these files.  Which of the following actions should the administrator perform?()A、 Enable audit object access and specify files and folders to monitor using Task Manager.B、 Enable audit policy change and specify files and folders to monitor using Windows Explorer.C、 Enable audit object access and specify files and folders to monitor using Windows Explorer.D、 Open Performance Monitor and monitor folder activity.

考题 An administrator creates a new directory then shares it on the Windows server. The administrator sets the permissions for everyone to "Modify" but users report they are unable to create or delete documents. Which of the following is the cause?()A、The administrator forgot to change the share permissionsB、The users were not part of the “Everyone” built in groupC、The administrator shared the files but not the folderD、“Modify” only allows users to change existing documents

考题 An administrator does not have console access to a Windows Server. Which of the following command line utilities should the administrator use to reboot the system remotely?()A、rebootB、pkillC、shutdownD、kill

考题 An administrator needs to connect servers to the Fiber Channel SAN. Which of the following should the administrator install in the servers to allow this connection?()A、RiserB、HBAC、SCSI cardD、SAS card

考题 An administrator notes that after a recent power outage, some open files were corrupted on oneaffected file server. Which of the following items should the administrator consider to determine the cause of this corruption?()A、 The servers memoryB、 The servers RAID controller batteryC、 The servers processorD、 The servers NIC teaming configuration

考题 An administrator is getting reports that a file server is responding slowly. Which of the following steps should the administrator take FIRST?()A、Remove unnecessary files on the server to free up hard disk space.B、Defragment the server’s hard disks.C、Compare monitoring results with the server baseline.D、Add additional memory to reduce paging.

考题 A server administrator implements a solution that should fix an issue. Which of the following should the administrator do NEXT in the troubleshooting process?()A、Notify users impacted by the problemB、Verify full system functionalityC、Document the actions and outcomesD、Identify the scope of the problem

考题 An administrator is experiencing availability issues on a Linux server. The administrator decides tocheck the server for an IP address conflict on the server. Which of the following commands should the administrator use?()A、tracerouteB、tracertC、ifconfigD、ipconfig

考题 Which of the following commands should Karen, a technician, use to examine and restoreprotected system files?()A、SFCB、RECOVERC、REPLACED、COPY

考题 An administrator is investigating an incident where an unauthorized user gained access to a servera nd modified HR files.The administrator has a tested theory as to how the user accomplished this.Which of the following actions should the administrator take NEXT?()A、Perform a root cause analysis.B、Implement a change to the servers.C、Establish a plan of action to resolve the issue.D、Question users prior to implementing the solution.

考题 An administrator receives an error when attempting to execute a WebSphere Commerce command and decides to take the following steps to troubleshoot the problem:   Check to see if the request was processed by the WebSphere plug-in but was never received by the WebSphere Application Server  Check for Java errors from EJBs and servlets  Trace WebSphere Commerce Server subsystems and commands  Which of the following files should the administrator check to accomplish these steps?()A、error.logB、trace.logC、http_plugin.logD、servlet.logE、SystemOut.log

考题 An  administrator  notices  the  /  filesystem  is  98%  full.   Which  of  the  following  files  commonly  grow  rapidly()A、/var/adm/wtmpB、/etc/security/failedloginC、/smit.scriptD、/proc

考题 Which of the following files should an administrator modify to configure dynamic caching?()A、dynacache.xmlB、cachespec.xmlC、dynacache.confD、cachemon.xmlE、cachespec.conf

考题 Which of the following roles can use the Organization Administration Console to create and modify users in their organization?()A、Buyer AdministratorB、Site AdministratorC、SellerD、Seller AdministratorE、Store Administrator

考题 单选题Which of the following files should an administrator modify to configure dynamic caching?()A dynacache.xmlB cachespec.xmlC dynacache.confD cachemon.xmlE cachespec.conf

考题 多选题Which of the following roles can use the Organization Administration Console to create and modify users in their organization?()ABuyer AdministratorBSite AdministratorCSellerDSeller AdministratorEStore Administrator

考题 单选题Before performing a mksysb system backup, which of the following procedures should a system administrator perform to avoid backing up certain user files?()A Add the list of files to /etc/exclude.rootvg.B Modify the image.data file and add the files to be excluded form the backup.C Modify the bosinst.data file and specify which files are to be excluded from the backup.D Specify the files to be excluded on the command line when executing the mksysb command.

考题 单选题A system administrator needs to backup datavg which contains a database that pre-allocates files by padding them with nulls, similar to treating them as sparse files. In order to effectively backup and be able to restore the datavg files, which backup method should be used?()A savevgB tarC cpioD mksysb

考题 单选题A user reports that each day some files are deleted from the department share. The administrator needs to find who deleted these files.  Which of the following actions should the administrator perform?()A  Enable audit object access and specify files and folders to monitor using Task Manager.B  Enable audit policy change and specify files and folders to monitor using Windows Explorer.C  Enable audit object access and specify files and folders to monitor using Windows Explorer.D  Open Performance Monitor and monitor folder activity.

考题 多选题An administrator receives an error when attempting to execute a WebSphere Commerce command and decides to take the following steps to troubleshoot the problem:   Check to see if the request was processed by the WebSphere plug-in but was never received by the WebSphere Application Server  Check for Java errors from EJBs and servlets  Trace WebSphere Commerce Server subsystems and commands  Which of the following files should the administrator check to accomplish these steps?()Aerror.logBtrace.logChttp_plugin.logDservlet.logESystemOut.log

考题 单选题An administrator creates a new directory then shares it on the Windows server. The administrator sets the permissions for everyone to "Modify" but users report they are unable to create or delete documents. Which of the following is the cause?()A The administrator forgot to change the share permissionsB The users were not part of the “Everyone” built in groupC The administrator shared the files but not the folderD “Modify” only allows users to change existing documents

考题 单选题An administrator notes that after a recent power outage, some open files were corrupted on one affected file server. Which of the following items should the administrator consider to determine the cause of this corruption?()A The server's memoryB The server's RAID controller batteryC The server's processorD The server's NIC teaming configuration

考题 单选题An administrator notes that after a recent power outage, some open files were corrupted on oneaffected file server. Which of the following items should the administrator consider to determine the cause of this corruption?()A  The servers memoryB  The servers RAID controller batteryC  The servers processorD  The servers NIC teaming configuration