网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
The snmpinfo command can be sued to obtain information about the current state of a running cluster. Which of the following will provide an administrator with a complete list of information from the cluster MIB?()
A
snmpinfo -m get -o /usr/es/sbin/cluster/hacmp.defs -v cluster
B
snmpinfo -m dump -o /usr/es/sbin/cluster/hacmp.defs -v cluster
C
snmpinfo -m get -o /usr/es/sbin/cluser/hacmp.defs -v clusterState.0
D
snmpinfo -m dump -o /usr/es/sbin/cluster/hacmp.defs -v clusterState.0
参考答案
参考解析
解析:
暂无解析
更多 “单选题The snmpinfo command can be sued to obtain information about the current state of a running cluster. Which of the following will provide an administrator with a complete list of information from the cluster MIB?()A snmpinfo -m get -o /usr/es/sbin/cluster/hacmp.defs -v clusterB snmpinfo -m dump -o /usr/es/sbin/cluster/hacmp.defs -v clusterC snmpinfo -m get -o /usr/es/sbin/cluser/hacmp.defs -v clusterState.0D snmpinfo -m dump -o /usr/es/sbin/cluster/hacmp.defs -v clusterState.0” 相关考题
考题
By default, which command can be used to display information about packets that have been logged with the syslog firewall filter action?()
A. show logB. show firewallC. show log messagesD. show firewall log
考题
The following command is sued Show tech-support chassis x bmc y. Which c0mp0nent in chassis x will have its information shown?() A、all subcomponentsB、IOM yC、compute node yD、mezzanine adapter z in compute node y
考题
Which three statements are true about Cisco IOS Firewall?()A、It can be configured to block Java traffic.B、It can be configured to detect and prevent SYN-flooding denial-of-service (DoS) network attacks.C、It can only examine network layer and transport layer information.D、It can only examine transport layer and application layer information.E、The inspection rules can be used to set timeout values for specified protocols.F、The ip inspect cbac-name command must be configured in global configuration mode.
考题
What information is displayed by the command cat/proc/dma?()A、 whether DMA is enabledB、 which DMA channels are in useC、 which DMA mode is in useD、 general information about DMA on the machine
考题
Which of the following kdb subcommands should be entered to obtain information about a serial port?()A、 ttyB、 statC、 traceD、 stream
考题
Which of the following commands should be used to obtain information about the software packages available on the installation media?()A、 lsattrB、 inutocC、 installpD、 lsresource
考题
The snmpinfo command can be sued to obtain information about the current state of a running cluster. Which of the following will provide an administrator with a complete list of information from the cluster MIB?() A、 snmpinfo -m get -o /usr/es/sbin/cluster/hacmp.defs -v clusterB、 snmpinfo -m dump -o /usr/es/sbin/cluster/hacmp.defs -v clusterC、 snmpinfo -m get -o /usr/es/sbin/cluser/hacmp.defs -v clusterState.0D、 snmpinfo -m dump -o /usr/es/sbin/cluster/hacmp.defs -v clusterState.0
考题
A customer has raised a question about a recently installed LPAR. What command would the administrator run to obtain information about the processor entitlement?()A、lscfg -vpsB、prtconf -cC、lparstat -iD、lsdev -C -c processor
考题
What command can an administrator use to get summary performance information about the hypervisor?()A、 vmstat -HB、 mpstat -sC、 lparstat -hD、 sar -p HYPER
考题
Which of the following commands should be used to obtain information about the installed software?()A、 smit systemB、 smit installpC、 smit licensesD、 smit list_software
考题
Which of the following commands can be used to obtain information about filesets on the system that are later than the current maintenance level?()A、 lslpp -IB、 uname -rC、 oslevel -gD、 rpcinfo -p
考题
Which of the following commands can be used to obtain information about the installed software?()A、 lslpp -LB、 uname -sC、 oslevel -qD、 installp -p
考题
You issued the following command: ALTER DATABASE ENABLE BLOCK CHANGE TRACKING; What will be the result of issuing this command?()A、 The block change tracking feature is enabled, and the information about the system change number is written in the change tracking file.B、 The block change tracking feature is enabled, and the information about the log sequence number is written in the change tracking file.C、 The block change tracking feature is enabled, and the information about the blocks that are changed since the last backup is written in the change tracking file.D、 The block change tracking feature is enabled, and the information about the locations of the datafiles and the online redo log files are written in the change tracking file.
考题
Where can you obtain information about full database backup set created using RMAN, if the control file was used as the repository?()A、V$BACKUPSETB、RC_DATABASEC、V$BACKUP_SETD、RC_BACKUP_SET
考题
Anyone who knows just the host name and the listener name can have full control over the listener. They can stop the listener and also obtain detailed information about the listener, database, and the configuration of the application. How would you avoid this scenario?()A、lock the listenerB、hide the listenerC、create multiple listenersD、run listener on a remote clientE、set a password for the listenerF、store listener.ora in a non-default location
考题
多选题Which three statements are true about Cisco IOS Firewall?()AIt can be configured to block Java traffic.BIt can be configured to detect and prevent SYN-flooding denial-of-service (DoS) network attacks.CIt can only examine network layer and transport layer information.DIt can only examine transport layer and application layer information.EThe inspection rules can be used to set timeout values for specified protocols.FThe ip inspect cbac-name command must be configured in global configuration mode.
考题
单选题What command can an administrator use to get summary performance information about the hypervisor?()A
vmstat -HB
mpstat -sC
lparstat -hD
sar -p HYPER
考题
单选题The snmpinfo command can be sued to obtain information about the current state of a running cluster. Which of the following will provide an administrator with a complete list of information from the cluster MIB?()A
snmpinfo -m get -o /usr/es/sbin/cluster/hacmp.defs -v clusterB
snmpinfo -m dump -o /usr/es/sbin/cluster/hacmp.defs -v clusterC
snmpinfo -m get -o /usr/es/sbin/cluser/hacmp.defs -v clusterState.0D
snmpinfo -m dump -o /usr/es/sbin/cluster/hacmp.defs -v clusterState.0
考题
单选题Which of the following commands should be used to obtain information about the installed software?()A
smit systemB
smit installpC
smit licensesD
smit list_software
考题
多选题Which two statements regarding the FLASHBACK_TRANSACTION_QUERY view are correct?()AYou can find information about only active transactions from the viewBYou can find information about read only transactions from the viewCYou require the SELECT ANY TRANSACTION system privilege to access the viewDYou can find information about both active and committed transactions from the viewEYou require the SELECT ON FLASHBACK_TRANSACTION_QUERY object privilege to access the view
考题
单选题You issued the following command: ALTER DATABASE ENABLE BLOCK CHANGE TRACKING; What will be the result of issuing this command?()A
The block change tracking feature is enabled, and the information about the system change number is written in the change tracking file.B
The block change tracking feature is enabled, and the information about the log sequence number is written in the change tracking file.C
The block change tracking feature is enabled, and the information about the blocks that are changed since the last backup is written in the change tracking file.D
The block change tracking feature is enabled, and the information about the locations of the datafiles and the online redo log files are written in the change tracking file.
考题
单选题Anyone who knows just the host name and the listener name can have full control over the listener. They can stop the listener and also obtain detailed information about the listener, database, and the configuration of the application. How would you avoid this scenario?()A
lock the listenerB
hide the listenerC
create multiple listenersD
run listener on a remote clientE
set a password for the listenerF
store listener.ora in a non-default location
考题
单选题Which of the following commands can be used to obtain information about the installed software?()A
lslpp -LB
uname -sC
oslevel -qD
installp -p
考题
单选题Which of the following commands can be used to obtain information about filesets on the system that are later than the current maintenance level?()A
lslpp -IB
uname -rC
oslevel -gD
rpcinfo -p
考题
单选题By default, which command can be used to display information about packets that have been logged with the syslog firewall filter action?()A
show logB
show firewallC
show log messagesD
show firewall log
考题
单选题Which of the following kdb subcommands should be entered to obtain information about a serial port?()A
ttyB
statC
traceD
stream
考题
单选题RMAN automatically propagate information about the database structure, archived redo logs, backup sets, and data file copies into the recovery catalog from the target database’s control file. This information can also be propagated to the catalog manually by using the ()command.A
LISTB
SWITCHC
VALIDATED
CONFIGUREE
RESYNC CATALOGF
UPGRADE CATALOG
考题
单选题Where can you obtain information about full database backup set created using RMAN, if the control file was used as the repository?()A
V$BACKUPSETB
RC_DATABASEC
V$BACKUP_SETD
RC_BACKUP_SET
热门标签
最新试卷