网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which of the following files should an administrator modify to configure dynamic caching?()
A
dynacache.xml
B
cachespec.xml
C
dynacache.conf
D
cachemon.xml
E
cachespec.conf
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which of the following files should an administrator modify to configure dynamic caching?()A dynacache.xmlB cachespec.xmlC dynacache.confD cachemon.xmlE cachespec.conf” 相关考题
考题
An administrator is experiencing availability issues on a Linux server. The administrator decides tocheck the server for an IP address conflict on the server. Which of the following commands should the administrator use?()A.tracerouteB.tracertC.ifconfigD.ipconfig
考题
A system administrator needs to backup datavg which contains a database that pre-allocates files by padding them with nulls, similar to treating them as sparse files. In order to effectively backup and be able to restore the datavg files, which backup method should be used?()A.savevgB.tarC.cpioD.mksysb
考题
A user cannot access files on /deps/it directory, the administrator verifies permissions are set rw-------for the directory. Which of the following actions need to be performed to only grant read access to the user on the IT directory?()A、 Set folder permissions to 760.B、 Set folder permissions to 770.C、 Set folder permissions to modify.D、 Set folder permissions to full control.
考题
An administrator notes that after a recent power outage, some open files were corrupted on one affected file server. Which of the following items should the administrator consider to determine the cause of this corruption?()A、The server's memoryB、The server's RAID controller batteryC、The server's processorD、The server's NIC teaming configuration
考题
Before performing a mksysb system backup, which of the following procedures should a system administrator perform to avoid backing up certain user files?()A、Add the list of files to /etc/exclude.rootvg.B、Modify the image.data file and add the files to be excluded form the backup.C、Modify the bosinst.data file and specify which files are to be excluded from the backup.D、Specify the files to be excluded on the command line when executing the mksysb command.
考题
A user reports that each day some files are deleted from the department share. The administrator needs to find who deleted these files. Which of the following actions should the administrator perform?()A、 Enable audit object access and specify files and folders to monitor using Task Manager.B、 Enable audit policy change and specify files and folders to monitor using Windows Explorer.C、 Enable audit object access and specify files and folders to monitor using Windows Explorer.D、 Open Performance Monitor and monitor folder activity.
考题
An administrator creates a new directory then shares it on the Windows server. The administrator sets the permissions for everyone to "Modify" but users report they are unable to create or delete documents. Which of the following is the cause?()A、The administrator forgot to change the share permissionsB、The users were not part of the “Everyone” built in groupC、The administrator shared the files but not the folderD、“Modify” only allows users to change existing documents
考题
An administrator does not have console access to a Windows Server. Which of the following command line utilities should the administrator use to reboot the system remotely?()A、rebootB、pkillC、shutdownD、kill
考题
An administrator needs to connect servers to the Fiber Channel SAN. Which of the following should the administrator install in the servers to allow this connection?()A、RiserB、HBAC、SCSI cardD、SAS card
考题
An administrator notes that after a recent power outage, some open files were corrupted on oneaffected file server. Which of the following items should the administrator consider to determine the cause of this corruption?()A、 The servers memoryB、 The servers RAID controller batteryC、 The servers processorD、 The servers NIC teaming configuration
考题
An administrator is getting reports that a file server is responding slowly. Which of the following steps should the administrator take FIRST?()A、Remove unnecessary files on the server to free up hard disk space.B、Defragment the server’s hard disks.C、Compare monitoring results with the server baseline.D、Add additional memory to reduce paging.
考题
A server administrator implements a solution that should fix an issue. Which of the following should the administrator do NEXT in the troubleshooting process?()A、Notify users impacted by the problemB、Verify full system functionalityC、Document the actions and outcomesD、Identify the scope of the problem
考题
An administrator is experiencing availability issues on a Linux server. The administrator decides tocheck the server for an IP address conflict on the server. Which of the following commands should the administrator use?()A、tracerouteB、tracertC、ifconfigD、ipconfig
考题
Which of the following commands should Karen, a technician, use to examine and restoreprotected system files?()A、SFCB、RECOVERC、REPLACED、COPY
考题
An administrator is investigating an incident where an unauthorized user gained access to a servera nd modified HR files.The administrator has a tested theory as to how the user accomplished this.Which of the following actions should the administrator take NEXT?()A、Perform a root cause analysis.B、Implement a change to the servers.C、Establish a plan of action to resolve the issue.D、Question users prior to implementing the solution.
考题
An administrator receives an error when attempting to execute a WebSphere Commerce command and decides to take the following steps to troubleshoot the problem: Check to see if the request was processed by the WebSphere plug-in but was never received by the WebSphere Application Server Check for Java errors from EJBs and servlets Trace WebSphere Commerce Server subsystems and commands Which of the following files should the administrator check to accomplish these steps?()A、error.logB、trace.logC、http_plugin.logD、servlet.logE、SystemOut.log
考题
An administrator notices the / filesystem is 98% full. Which of the following files commonly grow rapidly()A、/var/adm/wtmpB、/etc/security/failedloginC、/smit.scriptD、/proc
考题
Which of the following files should an administrator modify to configure dynamic caching?()A、dynacache.xmlB、cachespec.xmlC、dynacache.confD、cachemon.xmlE、cachespec.conf
考题
Which of the following roles can use the Organization Administration Console to create and modify users in their organization?()A、Buyer AdministratorB、Site AdministratorC、SellerD、Seller AdministratorE、Store Administrator
考题
单选题Which of the following files should an administrator modify to configure dynamic caching?()A
dynacache.xmlB
cachespec.xmlC
dynacache.confD
cachemon.xmlE
cachespec.conf
考题
多选题Which of the following roles can use the Organization Administration Console to create and modify users in their organization?()ABuyer AdministratorBSite AdministratorCSellerDSeller AdministratorEStore Administrator
考题
单选题Before performing a mksysb system backup, which of the following procedures should a system administrator perform to avoid backing up certain user files?()A
Add the list of files to /etc/exclude.rootvg.B
Modify the image.data file and add the files to be excluded form the backup.C
Modify the bosinst.data file and specify which files are to be excluded from the backup.D
Specify the files to be excluded on the command line when executing the mksysb command.
考题
单选题A system administrator needs to backup datavg which contains a database that pre-allocates files by padding them with nulls, similar to treating them as sparse files. In order to effectively backup and be able to restore the datavg files, which backup method should be used?()A
savevgB
tarC
cpioD
mksysb
考题
单选题A user reports that each day some files are deleted from the department share. The administrator needs to find who deleted these files. Which of the following actions should the administrator perform?()A
Enable audit object access and specify files and folders to monitor using Task Manager.B
Enable audit policy change and specify files and folders to monitor using Windows Explorer.C
Enable audit object access and specify files and folders to monitor using Windows Explorer.D
Open Performance Monitor and monitor folder activity.
考题
多选题An administrator receives an error when attempting to execute a WebSphere Commerce command and decides to take the following steps to troubleshoot the problem: Check to see if the request was processed by the WebSphere plug-in but was never received by the WebSphere Application Server Check for Java errors from EJBs and servlets Trace WebSphere Commerce Server subsystems and commands Which of the following files should the administrator check to accomplish these steps?()Aerror.logBtrace.logChttp_plugin.logDservlet.logESystemOut.log
考题
单选题An administrator creates a new directory then shares it on the Windows server. The administrator sets the permissions for everyone to "Modify" but users report they are unable to create or delete documents. Which of the following is the cause?()A
The administrator forgot to change the share permissionsB
The users were not part of the “Everyone” built in groupC
The administrator shared the files but not the folderD
“Modify” only allows users to change existing documents
考题
单选题An administrator notes that after a recent power outage, some open files were corrupted on one affected file server. Which of the following items should the administrator consider to determine the cause of this corruption?()A
The server's memoryB
The server's RAID controller batteryC
The server's processorD
The server's NIC teaming configuration
考题
单选题An administrator notes that after a recent power outage, some open files were corrupted on oneaffected file server. Which of the following items should the administrator consider to determine the cause of this corruption?()A
The servers memoryB
The servers RAID controller batteryC
The servers processorD
The servers NIC teaming configuration
热门标签
最新试卷