网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
A client has been unable to fix corruption of system files and does not have a backup or an Automated System Recovery (ASR) disk. Which of the following is the BEST action to take next? ()
A

Copy the missing file from another computer and reboot.

B

Execute a Windows repair from the Windows setup media.

C

Boot into the Recovery Console and execute FIXBOOT.

D

Reboot and press the F2 key when prompted.


参考答案

参考解析
解析: 暂无解析
更多 “单选题A client has been unable to fix corruption of system files and does not have a backup or an Automated System Recovery (ASR) disk. Which of the following is the BEST action to take next? ()A Copy the missing file from another computer and reboot.B Execute a Windows repair from the Windows setup media.C Boot into the Recovery Console and execute FIXBOOT.D Reboot and press the F2 key when prompted.” 相关考题
考题 A "trusted" client needs to communicate with a server that has been configured to use CLIENT authentication. Which of the following will be used to verify passwords?() A.User ID/password fileB.Communications layerC.Client applicationsD.Operating system

考题 A system administrator has just applied an update to an AIX system to correct a problem, The APAR number is IX49035 and was shipped as part of the PTF number U437542. After applying the APAR fix, the administrator wants to ensure that the fix is applied before informing the system users of the corrected problem. Which of the following commands should the system administrator run to verify that the APAR fix has been applied to the system?()A.lslpp -f IX49035B.lslpp -fB U437542C.instfix -f IX49035D.instfix -ik IX49035

考题 The boot .net.tcp.client fileset is broken. Which of the following procedures must be performed to fix the problem?() A.Reinstall with the Force Overwrite optionB.Update the fileset at a lower levelC.Install the update in the commit stateD.Reboot the system to fix the broken filelist

考题 A System p administrator needs to document system changes that have occurred recently. The company has a policy of making all possible changes via the smit interface.  Which of the following files would show the commands that have been performed from within smit and their resulting output()A、/smit.logB、/smit.scriptC、/var/log/smit.logD、/.history

考题 On a Cisco Aironet 802.11 a/b/g wireless LAN client adapter,the status LED and activity LED are alternating on and off. What does this indicate?()A、The client card has failed.B、The client card is not associated to the network.C、The driver has been installed incorrectly.D、The client card has awakened from power-save mode.

考题 A customer reports they are unable to connect to any computers outside of the office and they are unable to connect to the Internet. When the technician runs ipconfig, the customer gets the following output: IP address169.254.2.4 Subnet Mask.255.255.0.0 Default Gateway. Which of the following could be causing the issue?()A、The subnet mask is not correctly configured.B、The DNS client has not been configured on the computer.C、The DHCP client is unable to obtain an IP address from the DHCP server.D、The default gateway is not specified

考题 A client has been unable to fix corruption of system files and does not have a backup or an Automated System Recovery (ASR) disk. Which of the following is the BEST action to take next? ()A、Copy the missing file from another computer and reboot.B、Execute a Windows repair from the Windows setup media.C、Boot into the Recovery Console and execute FIXBOOT.D、Reboot and press the F2 key when prompted.

考题 A client has a need to look at and add many image files but has no need to change them. Which of the following media types would BEST meet the client’s needs?()A、CD-RWB、DiskC、FlashD、WORM

考题 A "trusted" client needs to communicate with a server that has been configured to use CLIENT authentication. Which of the following will be used to verify passwords?()A、User ID/password fileB、Communications layerC、Client applicationsD、Operating system

考题 The boot .net.tcp.client fileset is broken. Which of the following procedures must be performed to fix the problem?()A、Reinstall with the Force Overwrite optionB、Update the fileset at a lower levelC、Install the update in the commit stateD、Reboot the system to fix the broken filelist

考题 A snapshot of the /export/project file system has been taken. Prior to backing up the file system, you need to check to see if certain files are on the snapshot. The snapshot needs to be mounted to check for these files.  Which command will mount the snapshot? ()A、 mount -F ufs -o ro /dev/fssnap/0 /checkB、 mount -F ufs -o rw /dev/fssnap/0 /checkC、 mount -F ufs -o ro /export/project /checkD、 mount -F ufs -o rw /export/project /check

考题 You have a single Active Directory directory service domain. You use a Group Policy object (GPO) to apply security settings to your client computers. You configure the startup type for system services settings in a new GPO, and you link the GPO to an organizational unit (OU).  You discover that the startup type for system services on one of the client computers has not been updated. You need to ensure that the Group Policy settings are applied to the client computer. What should you do?()A、  Restart the client computer.B、 Instruct the user to log off and then log on to the client computer.C、 On the client computer, run the Gpupdate.exe command with the /Force parameter.D、 On the client computer, run the Gpupdate.exe command with the /Target:computer parameter.

考题 Your company has an Active Directory forest. The company has servers that run Windows Server   2008 R2 and client computers that run Windows 7. The domain uses a set of GPO administrative  templates that have been approved to support regulatory compliance requirements.   Your partner company has an Active Directory forest that contains a single domain. The company has  servers that run Windows Server 2008 R2 and client computers that run Windows 7.   You need to configure your partner companys domain to use the approved set of administrative  templates.   What should you do()A、Use the Group Policy Management Console (GPMC) utility to back up the GPO to a file. In each site,  import the GPO to the default domain policy.B、Copy the ADMX files from your companys PDC emulator to the PolicyDefinitions folder on the partner  companys PDC emulator.C、Copy the ADML files from your companys PDC emulator to the PolicyDefinitions folder on thepartner  companys PDC emulator.D、Download the conf.adm, system.adm, wuau.adm, and inetres.adm files from the Microsoft Updates  Web site. Copy the ADM files to the PolicyDefinitions folder on the partner companys PDC emulator.

考题 Maria has been set up as an assistant to the administrator. Users of your network are complaining that Maria has been opening their files and editing them. She needs to perform backups and installations of programs, and setting up of printers.   How do you fix the problem with the minimum amount of effort, yet allowing her to accomplish the assigned tasks? ()A、Remove her Administrator privilege and give her Power Users and Backup Operators.B、Leave her as Administrator and make deny on Users’ files.C、Remove her administrator privileges and assign her Server Operators.D、Remove her administrator privileges and assign her Power Users and Replicator. E、Tell her that she isn’t allowed to tamper with other users files.

考题 A system administrator has just applied an update to an AIX system to correct a problem, The APAR number is IX49035 and was shipped as part of the PTF number U437542. After applying the APAR fix, the administrator wants to ensure that the fix is applied before informing the system users of the corrected problem. Which of the following commands should the system administrator run to verify that the APAR fix has been applied to the system?()A、lslpp -f IX49035B、lslpp -fB U437542C、instfix -f IX49035D、instfix -ik IX49035

考题 An administrator was notified that a resource group has failed over from the home node, Node1 to a standbynode, Node2 and that Node1 had been powered off. Upon restarting Node1 the administrator checked the AIXerror log and the cluster.log Which of the following is most likely the cause of the failover?()A、AIX was shut downB、A fatal corruption occurred in the gsclvmd daemonC、The topsvcs daemon was stopped by the system resource controllerD、The grpsvcs process was stopped by the system resource controller

考题 单选题A "trusted" client needs to communicate with a server that has been configured to use CLIENT authentication. Which of the following will be used to verify passwords?()A User ID/password fileB Communications layerC Client applicationsD Operating system

考题 单选题Purging air from a hydraulic system is necessary when()A adding small amounts of oil to the systemB the system has been overheatedC the system has been drained and then filled with new oilD the system has been idle for a long period of time

考题 单选题Refer to the exhibit. A Cisco Aironet Wireless LAN Client Adapter has been installed and configured through the ADU on the PC. The Aironet System Tray Utility (ASTU) has been enabled during the installation and the icon appears in the system tray area in the lower right of the desktop. What is thesignificance of the icon?()A It indicates that the radio of the client adapter is disabledB It indicates that the client adapter is not associated to an access point or another clientC It indicates that the client adapter is associated to an access point or another client, but the user is not EAP authenticatedD It indicates that the client adapter is associated to an access point or another client, that the user is authenticated if the client adapter is configured for EAP authentication, and that the signal strength is excellent or goodE It indicates that the client adapter is associated to an access point or another client, that the user is authenticated if the client adapter is configured for EAP authentication, and that the signal strength is fairF It indicates that the client adapter is associated to an access point or another client, that the user is authenticated if the client adapter is configured for EAP authentication, and that the signal strength is poor

考题 单选题Refer to the exhibit. A Cisco Aironet Wireless LAN Client Adapter has been installed and configured  through the ADU on the PC. The Aironet System Tray Utility (ASTU) has been enabled during the  installation and the icon appears in the system tray area in the lower right of the desktop. What is the  significance of the icon?()A  It indicates that the radio of the client adapter is disabled.B  It indicates that the client adapter is not associated to an access point or another client. C  It indicates that the client adapter is associated to an access point or another client, but the user is not  EAP authenticated.D  It indicates that the client adapter is associated to an access point or another client, that the user is  authenticated if the client adapter is configured for EAP authentication, and that the signal strength is  excellent or good.E  It indicates that the client adapter is associated to an access point or another client, that the user is  authenticated if the client adapter is configured for EAP authentication, and that the signal strength is fair.F  It indicates that the client adapter is associated to an access point or another client, that the user is  authenticated if the client adapter is configured for EAP authentication, and that the signal strength is poor.

考题 填空题What has been done by the heating system supplier?____ has been asked to find out the cause of the accident.

考题 单选题A System p administrator needs to document system changes that have occurred recently. The company has a policy of making all possible changes via the smit interface.  Which of the following files would show the commands that have been performed from within smit and their resulting output()A /smit.logB /smit.scriptC /var/log/smit.logD /.history

考题 单选题Two data files have been deleted at the operating system level by accident. Your database is running in ARCHIVELOG mode and online backups are taken nightly. One of the data files that has been deleted belongs to the USERS tablespace on the other belongs to the SYSTEM tablespace. How can you recover from this situation?()A Shut down the database, restore the two data files and then start up the database. B Take the system and users tablespace offline, restore the two data files, recover the two datafiles, and then bring the SYSTEM and USERS tablespaces online. C Shut down the database, restore the two data files, start up the database in MOUNT mode, recover the two data files, and then alter the database open. D Take the SYSTEM and USERS tablespaces offline, recover the two datafiles and then bring the SYSTEM and USERS tablespaces online.

考题 单选题Your company has an Active Directory forest. The company has servers that run Windows Server  2008 R2 and client computers that run Windows 7. The domain uses a set of GPO administrative  templates that have been approved to support regulatory compliance requirements.     Your partner company has an Active Directory forest that contains a single domain. The company  has servers that run Windows Server 2008 R2 and client computers that run Windows 7.     You need to configure your partner company’s domain to use the approved set of administrative  templates.   What should you do()A Use the Group Policy Management Console (GPMC) utility to back up the GPO to a file. In each site, import the GPB Copy the ADMX files from your company’s PDC emulator to the PolicyDefinitions folder on the partner company’s PDCC Copy the ADML files from your company’s PDC emulator to the PolicyDefinitions folder on the partner company’s PDC D Download the conf.adm, system.adm, wuau.adm, and inetres.adm files from the Microsoft Updates Web site. 

考题 多选题You execute the following Recovery Manager (RMAN) commands in he following order:   BACKUP VALIDATE DATABAE RECOVER CORRUPTION LIST;   Which two tasks are performed by these commands?()ARepair the corrupted blocks. If any. In the backup createdBPopulate VSCOPV_CORRUPTION with names of files that have corrupted blocksCBack up the database after checking whether array of the files have corrupted blocksDDiscover any corrupt blocks that are viewable with the VSDATABASE_BI-OCK_CORBUPTION viewERepair all corrupted blocks that have been logged in the VSDATABASE_BLOCK_ CORRUPTION

考题 单选题On a Cisco Aironet 802.11 a/b/g wireless LAN client adapter,the status LED and activity LED are alternating on and off. What does this indicate?()A The client card has failed.B The client card is not associated to the network.C The driver has been installed incorrectly.D The client card has awakened from power-save mode.

考题 单选题A customer reports they are unable to connect to any computers outside of the office and they are unable to connect to the Internet. When the technician runs ipconfig, the customer gets the following output: IP address169.254.2.4 Subnet Mask.255.255.0.0 Default Gateway. Which of the following could be causing the issue?()A The subnet mask is not correctly configured.B The DNS client has not been configured on the computer.C The DHCP client is unable to obtain an IP address from the DHCP server.D The default gateway is not specified

考题 单选题While several baseball teams have tried to supplant the Yankees as the dominant team in baseball, their inability has been unable to win even half as many World Series as the Yankees have won in the past one hundred years.A their inability has been unableB the inability they possess has not been ableC having been unableD they were unableE they have been unable