网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
In which file can the administrator view the detailed results of the overnight cluster automatic verification?()
A
clutils.log
B
cluster.log
C
clverify.log
D
autoverify.log
参考答案
参考解析
解析:
暂无解析
更多 “单选题In which file can the administrator view the detailed results of the overnight cluster automatic verification?()A clutils.logB cluster.logC clverify.logD autoverify.log” 相关考题
考题
In which file can the administrator view the detailed results of the overnight cluster automatic verification?()A、clutils.logB、cluster.logC、clverify.logD、autoverify.log
考题
An administrator has written a script to check that the contents of an application configuration file are identicalon all cluster nodes. The script has also been associated with a user defined custom verification method. Theadministrator would like the contents of this file to be checked and verified automatically on a daily basis.How can this be achieved?()A、By using a job scheduler such as cronB、By enabling automatic cluster verificationC、By including the script name in the file /usr/es/sbin/cluster/etc/clverify.rcD、By including the custom method name in the file /usr/es/sbin/cluster/etc/rc.authomethods
考题
A network administrator would like to view detailed interface status, properties, statistics, errors,and CoS packet counters.Which operational command will display this information?()A、show interfaces extensiveB、show interfacesC、show configuration interfacesD、show interface status
考题
Which two of these methods will allow a CUE administrator to view the output of the CUE message log file?()A、syslog server B、GUI interface C、CLI D、text editorE、TFTP server
考题
An administrator runs clstat on a cluster node and receives the following response: ’Can not get Cluster Information.’ Which of the following daemons may need to be started in order to correct this problem?()A、 topsvcsB、 clinfoESC、 snmpinfoD、 clsmuxpdES
考题
An administrator will be performing a PowerHA upgrade on a cluster from version 5.3 to version 5.5. Which ofthe following tasks will verify a successful migration?()A、Use the clstat command and verify the cluster is in a stable stateB、After each node is upgraded, run a verification and synchronizationC、After all nodes are upgraded, run a verification and synchronizationD、Take a snapshot of each node and verify the configuration is the same
考题
A cluster administrator wants to create a snapshot backup of the cluster. Which smit menu can be used to dothis?()A、Extended ConfigurationB、System Management (C-SPOC)C、Problem Determination ToolsD、Initialization and Standard Configuration
考题
When an emulated error notification method is complete, an administrator can view the error log By typing the errpt command to be sure the emulation took place. To verify that the error log entry is the result of the emulated event,the log entry resource name is set to EMULATOR,or which of the following?() A、 A user defined Resource NameB、 A cluster defined Resource NameC、 An error daemon specific Resource NameD、 A Resource Name generated by Automatic Error Notification
考题
How can the administrator use file ’a’ containing ’-El sys0’ to view the attributes of a device()? A、lsdev -fv aB、lsattr -f aC、lsattr`cat a`D、lsdev -Cccat a
考题
A cluster administrator has decided to add a cluster verification to the weekly maintenance scripts That are run from corn. When a cluster verification is performed,which of the following will require a custom verification method?() A、 HACMP ODM object classesB、 HACMP Error NotificationC、 HACMP Topology ResourcesD、 HACMP Application Server Start/Stop scripts
考题
Company.com has decided to use the FUBAR Application Server to host their web application. Unfortunately, the FUBAR Application Server uses the server machine’s file system for its JNDI namespace. Every JNDI lookup performed in the web application is translated into a file 1/0 operation, which results in very poor performance. Which J2EE pattern can help with this performance issue?()A、 Transfer ObjectB、 Service LocatorC、 Intercepting FilterD、 Model-View-Controller
考题
While selecting files during an interactive restore with ufsrestore, you are interrupted by a junior administrator before you can complete the file selection process and start the restore. After answering the administrator’s question, you realize that you have forgotten which files you had already selected for the restore. How can you determine which files are already marked for extraction and restore? ()A、 You can use the ls subcommand of ufsrestore.B、 You can use the add subcommand of ufsrestore.C、 You can use the select subcommand of ufsrestore.D、 You can view the selected files as they are marked with a plus sign (+) in the list that is permanently displayed in the upper half of the interactive ufsrestore screen view.
考题
Which result or results do these actions produce?()A、Users in both departments can access their files from the network.B、Users in the accounting department can view the legal department’s documents.C、Users in the legal department cannot view the accounting department’s documents.D、Company managers can access and modify both departments’ files.
考题
单选题An administrator has written a script to check that the contents of an application configuration file are identicalon all cluster nodes. The script has also been associated with a user defined custom verification method. Theadministrator would like the contents of this file to be checked and verified automatically on a daily basis.How can this be achieved?()A
By using a job scheduler such as cronB
By enabling automatic cluster verificationC
By including the script name in the file /usr/es/sbin/cluster/etc/clverify.rcD
By including the custom method name in the file /usr/es/sbin/cluster/etc/rc.authomethods
考题
单选题An administrator will be performing a PowerHA upgrade on a cluster from version 5.3 to version 5.5. Which ofthe following tasks will verify a successful migration?()A
Use the clstat command and verify the cluster is in a stable stateB
After each node is upgraded, run a verification and synchronizationC
After all nodes are upgraded, run a verification and synchronizationD
Take a snapshot of each node and verify the configuration is the same
考题
单选题An administrator runs clstat on a cluster node and receives the following response: ’Can not get Cluster Information.’ Which of the following daemons may need to be started in order to correct this problem?()A
topsvcsB
clinfoESC
snmpinfoD
clsmuxpdES
考题
单选题A cluster administrator has decided to add a cluster verification to the weekly maintenance scripts That are run from corn. When a cluster verification is performed,which of the following will require a custom verification method?()A
HACMP ODM object classesB
HACMP Error NotificationC
HACMP Topology ResourcesD
HACMP Application Server Start/Stop scripts
考题
单选题Which of the following practices can encourage students to read an article critically?A
Evaluating its point of view.B
Finding out the facts.C
Finding detailed information.D
Doing translation exercises.
考题
单选题In which file can the administrator view the detailed results of the overnight cluster automatic verification?()A
clutils.logB
cluster.logC
clverify.logD
autoverify.log
考题
单选题Company.com performs a cluster verification on a regular basis. Cluster verification is successfulbut the cluster sometimes fails to start the applications during a fallover. Investigation of the issue has revealed that the non-shared component of the application configuration information is not being kept up to date on the secondary nodes. What can be used to help resolve this issue?()A
A pre-eventB
Error notificationC
Application monitoringD
Custom verification methods
考题
单选题A network administrator would like to view detailed interface status, properties, statistics, errors,and CoS packet counters.Which operational command will display this information?()A
show interfaces extensiveB
show interfacesC
show configuration interfacesD
show interface status
考题
单选题How can the administrator use file ’a’ containing ’-El sys0’ to view the attributes of a device()?A
lsdev -fv aB
lsattr -f aC
lsattr`cat a`D
lsdev -Cccat a
考题
单选题A system administrator suspects that there were problems with the AIX installation on a pSeries server. Which of the following commands can be used, with the appropriate flags, to view the BOS installation output files?()A
alogB
errptC
lscfgD
installp
考题
多选题Which two of these methods will allow a CUE administrator to view the output of the CUE message log file?()Asyslog serverBGUI interfaceCCLIDtext editorETFTP server
考题
单选题A cluster administrator wants to create a snapshot backup of the cluster. Which smit menu can be used to dothis?()A
Extended ConfigurationB
System Management (C-SPOC)C
Problem Determination ToolsD
Initialization and Standard Configuration
考题
单选题Company.com has decided to use the FUBAR Application Server to host their web application. Unfortunately, the FUBAR Application Server uses the server machine’s file system for its JNDI namespace. Every JNDI lookup performed in the web application is translated into a file 1/0 operation, which results in very poor performance. Which J2EE pattern can help with this performance issue?()A
Transfer ObjectB
Service LocatorC
Intercepting FilterD
Model-View-Controller
考题
单选题While selecting files during an interactive restore with ufsrestore, you are interrupted by a junior administrator before you can complete the file selection process and start the restore. After answering the administrator’s question, you realize that you have forgotten which files you had already selected for the restore. How can you determine which files are already marked for extraction and restore? ()A
You can use the ls subcommand of ufsrestore.B
You can use the add subcommand of ufsrestore.C
You can use the select subcommand of ufsrestore.D
You can view the selected files as they are marked with a plus sign (+) in the list that is permanently displayed in the upper half of the interactive ufsrestore screen view.
考题
单选题When an emulated error notification method is complete, an administrator can view the error log By typing the errpt command to be sure the emulation took place. To verify that the error log entry is the result of the emulated event,the log entry resource name is set to EMULATOR,or which of the following?()A
A user defined Resource NameB
A cluster defined Resource NameC
An error daemon specific Resource NameD
A Resource Name generated by Automatic Error Notification
热门标签
最新试卷