网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
The snmpinfo command can be sued to obtain information about the current state of a running  cluster. Which of the following will provide an administrator with a complete list of information from the cluster MIB?()
A

 snmpinfo -m get -o /usr/es/sbin/cluster/hacmp.defs -v cluster

B

 snmpinfo -m dump -o /usr/es/sbin/cluster/hacmp.defs -v cluster

C

 snmpinfo -m get -o /usr/es/sbin/cluser/hacmp.defs -v clusterState.0

D

 snmpinfo -m dump -o /usr/es/sbin/cluster/hacmp.defs -v clusterState.0


参考答案

参考解析
解析: 暂无解析
更多 “单选题The snmpinfo command can be sued to obtain information about the current state of a running  cluster. Which of the following will provide an administrator with a complete list of information from the cluster MIB?()A  snmpinfo -m get -o /usr/es/sbin/cluster/hacmp.defs -v clusterB  snmpinfo -m dump -o /usr/es/sbin/cluster/hacmp.defs -v clusterC  snmpinfo -m get -o /usr/es/sbin/cluser/hacmp.defs -v clusterState.0D  snmpinfo -m dump -o /usr/es/sbin/cluster/hacmp.defs -v clusterState.0” 相关考题
考题 By default, which command can be used to display information about packets that have been logged with the syslog firewall filter action?() A. show logB. show firewallC. show log messagesD. show firewall log

考题 The following command is sued Show tech-support chassis x bmc y. Which c0mp0nent in chassis x will have its information shown?() A、all subcomponentsB、IOM yC、compute node yD、mezzanine adapter z in compute node y

考题 Which three statements are true about Cisco IOS Firewall?()A、It can be configured to block Java traffic.B、It can be configured to detect and prevent SYN-flooding denial-of-service (DoS) network attacks.C、It can only examine network layer and transport layer information.D、It can only examine transport layer and application layer information.E、The inspection rules can be used to set timeout values for specified protocols.F、The ip inspect cbac-name command must be configured in global configuration mode.

考题 What information is displayed by the command cat/proc/dma?()A、 whether DMA is enabledB、 which DMA channels are in useC、 which DMA mode is in useD、 general information about DMA on the machine

考题 Which of the following kdb subcommands should be entered to obtain information about a serial port?()A、 ttyB、 statC、 traceD、 stream

考题 Which of the following commands should be used to obtain information about the software packages available on the installation media?()A、 lsattrB、 inutocC、 installpD、 lsresource

考题 The snmpinfo command can be sued to obtain information about the current state of a running  cluster. Which of the following will provide an administrator with a complete list of information from the cluster MIB?()  A、 snmpinfo -m get -o /usr/es/sbin/cluster/hacmp.defs -v clusterB、 snmpinfo -m dump -o /usr/es/sbin/cluster/hacmp.defs -v clusterC、 snmpinfo -m get -o /usr/es/sbin/cluser/hacmp.defs -v clusterState.0D、 snmpinfo -m dump -o /usr/es/sbin/cluster/hacmp.defs -v clusterState.0

考题 A customer has raised a question about a recently installed LPAR. What command would the administrator run to obtain information about the processor entitlement?()A、lscfg -vpsB、prtconf -cC、lparstat -iD、lsdev -C -c processor

考题 What command can an administrator use to get summary performance information about the hypervisor?()A、 vmstat -HB、 mpstat -sC、 lparstat -hD、 sar -p HYPER

考题 Which of the following commands should be used to obtain information about the installed software?()A、 smit systemB、 smit installpC、 smit licensesD、 smit list_software

考题 Which of the following commands can be used to obtain information about filesets on the system that are later than the current maintenance level?()A、 lslpp -IB、 uname -rC、 oslevel -gD、 rpcinfo -p

考题 Which of the following commands can be used to obtain information about the installed software?()A、 lslpp -LB、 uname -sC、 oslevel -qD、 installp -p

考题 You issued the following command: ALTER DATABASE ENABLE BLOCK CHANGE TRACKING;  What will be the result of issuing this command?()A、 The block change tracking feature is enabled, and the information about the system change number is written in the change tracking file.B、 The block change tracking feature is enabled, and the information about the log sequence number is written in the change tracking file.C、 The block change tracking feature is enabled, and the information about the blocks that are changed since the last backup is written in the change tracking file.D、 The block change tracking feature is enabled, and the information about the locations of the datafiles and the online redo log files are written in the change tracking file.

考题 Where can you obtain information about full database backup set created using RMAN, if the control file was used as the repository?()A、V$BACKUPSETB、RC_DATABASEC、V$BACKUP_SETD、RC_BACKUP_SET

考题 Anyone who knows just the host name and the listener name can have full control over the listener. They can stop the listener and also obtain detailed information about the listener, database, and the configuration of the application. How would you avoid this scenario?()A、lock the listenerB、hide the listenerC、create multiple listenersD、run listener on a remote clientE、set a password for the listenerF、store listener.ora in a non-default location

考题 多选题Which three statements are true about Cisco IOS Firewall?()AIt can be configured to block Java traffic.BIt can be configured to detect and prevent SYN-flooding denial-of-service (DoS) network attacks.CIt can only examine network layer and transport layer information.DIt can only examine transport layer and application layer information.EThe inspection rules can be used to set timeout values for specified protocols.FThe ip inspect cbac-name command must be configured in global configuration mode.

考题 单选题What command can an administrator use to get summary performance information about the hypervisor?()A  vmstat -HB  mpstat -sC  lparstat -hD  sar -p HYPER

考题 单选题The snmpinfo command can be sued to obtain information about the current state of a running  cluster. Which of the following will provide an administrator with a complete list of information from the cluster MIB?()A  snmpinfo -m get -o /usr/es/sbin/cluster/hacmp.defs -v clusterB  snmpinfo -m dump -o /usr/es/sbin/cluster/hacmp.defs -v clusterC  snmpinfo -m get -o /usr/es/sbin/cluser/hacmp.defs -v clusterState.0D  snmpinfo -m dump -o /usr/es/sbin/cluster/hacmp.defs -v clusterState.0

考题 单选题Which of the following commands should be used to obtain information about the installed software?()A  smit systemB  smit installpC  smit licensesD  smit list_software

考题 多选题Which two statements regarding the FLASHBACK_TRANSACTION_QUERY view are correct?()AYou can find information about only active transactions from the viewBYou can find information about read only transactions from the viewCYou require the SELECT ANY TRANSACTION system privilege to access the viewDYou can find information about both active and committed transactions from the viewEYou require the SELECT ON FLASHBACK_TRANSACTION_QUERY object privilege to access the view

考题 单选题You issued the following command: ALTER DATABASE ENABLE BLOCK CHANGE TRACKING;  What will be the result of issuing this command?()A  The block change tracking feature is enabled, and the information about the system change number is written in the change tracking file.B  The block change tracking feature is enabled, and the information about the log sequence number is written in the change tracking file.C  The block change tracking feature is enabled, and the information about the blocks that are changed since the last backup is written in the change tracking file.D  The block change tracking feature is enabled, and the information about the locations of the datafiles and the online redo log files are written in the change tracking file.

考题 单选题Anyone who knows just the host name and the listener name can have full control over the listener. They can stop the listener and also obtain detailed information about the listener, database, and the configuration of the application. How would you avoid this scenario?()A lock the listenerB hide the listenerC create multiple listenersD run listener on a remote clientE set a password for the listenerF store listener.ora in a non-default location

考题 单选题Which of the following commands can be used to obtain information about the installed software?()A  lslpp -LB  uname -sC  oslevel -qD  installp -p

考题 单选题Which of the following commands can be used to obtain information about filesets on the system that are later than the current maintenance level?()A  lslpp -IB  uname -rC  oslevel -gD  rpcinfo -p

考题 单选题By default, which command can be used to display information about packets that have been logged with the syslog firewall filter action?()A show logB show firewallC show log messagesD show firewall log

考题 单选题Which of the following kdb subcommands should be entered to obtain information about a serial port?()A  ttyB  statC  traceD  stream

考题 单选题RMAN automatically propagate information about the database structure, archived redo logs, backup sets, and data file copies into the recovery catalog from the target database’s control file. This information can also be propagated to the catalog manually by using the ()command.A LISTB SWITCHC VALIDATED CONFIGUREE RESYNC CATALOGF UPGRADE CATALOG

考题 单选题Where can you obtain information about full database backup set created using RMAN, if the control file was used as the repository?()A V$BACKUPSETB RC_DATABASEC V$BACKUP_SETD RC_BACKUP_SET