多选题You want to shutdown a running Mysql Server cleanly. Which three commands that are valid on either Windows or Linux will achieve this?()AShell> mysqladmin –u root –p shutdownBShell> nmc mysql shutdownCMysql> STOP PROCESS mysqldDShell> /etc/init.d/mysql stopEShell> service mysql safe_exitFShell> pkill –u mysql mysqld_safeGShell> net stop mysql

多选题
You want to shutdown a running Mysql Server cleanly. Which three commands that are valid on either Windows or Linux will achieve this?()
A

Shell> mysqladmin –u root –p shutdown

B

Shell> nmc mysql shutdown

C

Mysql> STOP PROCESS mysqld

D

Shell> /etc/init.d/mysql stop

E

Shell> service mysql safe_exit

F

Shell> pkill –u mysql mysqld_safe

G

Shell> net stop mysql


参考解析

解析: 暂无解析

相关考题:

You are the network administrator for Ezonexam. You are planning to upgrade 35 Windows NT Server 4.0 computers to Windows 2000 Server. You want to accomplish the upgrades by using a distribution server. The Windows NT Server 4.0 computers support a tight production schedule that requires them to be online from 8:00 A.M. to midnight, seven days a week. You schedule the upgrade to run during non-business hours. Because of the limited amount of time the upgrades must be performed as quickly as possible.You want to complete the upgrades before production begins in the morning.What should you do?A.Perform. an unattended installation by running the winnt32 command and the /cmdcons switch.B.Perform. an unattended installation by running the winnt32 command and specify the use of a .txt file and a uniqueness database file.C.Perform. an unattended installation by running the winnt command and specify the use of a .txt file and a uniqueness database file.D.Perform. an unattended installation by using a Winnt.sif file with a commands section that initiates the Update.exe command in quiet mode.

You want to debug the Windows Communication Foundation (WCF) client and server interaction through message and application tracing.You need to correlate traces generated on the client and the server. Which XML segment should you add to the system.diagnostics configuration element in the client and server application configuration file?()A.B.C.D.

You have forgotten the root user account password. You decide to reset the password and execute the following:Shell> /etc/init.d/mysql stopShell> /etc/init.d/mysql start – skip-grant tablesWhich additional argument makes this operation safer?()A.–skip-networking, to prohibit access from remote locationsB.–reset-grant-tables, to start the server with only the mysql database accessibleC.–read-only,to set all data to read-only except for super usersD.–old-passwords, to start Mysql to use the old password format while running without the grant tables

You are having problems with connections from a specific host (192.168.1.15) not closing down correctly.You want to find the state of the threads from that host check for long-running queries. Which statement will accomplish this?()A.AB.BC.CD.D

You are the administrator of your company's network. The network is configured as shown in the exhibit.You want to install Windows 2000 Professional on 10 non-PXE-compliant computers that are on the marketing segment of your network. You start one of the computers by using a RIS boot disk. However, you cannot connect to the RIS server.You verify that the existing client computers on the network can connect to network servers, including the RIS server. The network router does not support BOOTP, so existing client computers use manually configured TCP/IP addresses. You want to enable the computers to connect to the RIS server.What should you do?A.Add a computer running DHCP Relay Agent to the marketing segment.B.Add a computer running the network monitor driver to the marketing segment.C.Move the Windows 2000 Server computer running WINS to the marketing segment.D.Move the Windows 2000 Server computer running Active Directory to the marketing segment.

You are the administrator for your company's network. The network is configured as shown in the exhibit.You want to install Windows 2000 Professional on 20 new PXE-compliant computers on the marketing segment of your network. The new computers do not have operating systems installed.You create a RIS image. You load the image onto the RIS server. You then start the new computers.You find that the new computers cannot connect to the RIS server. You verify that the new computers cannot connect to the RIS server. You verify that the existing client computers in the network can connect to the network servers, including the RIS server. You want to enable the new computers to connect to the RIS server.What should you do?A.Add a Windows 2000 Server computer running WINS to the network.B.Add a Windows 2000 Server computer running DHCP to the network.C.Add the domain Everyone group to the RIS OS image security settings.D.Place the new computers on the same segment as the RIS server.

You are configuring an LDAP authentication server, and you want to configure role-mapping rules based on group membership. When you attempt to search for groups in the server catalog, no groups appear.Assuming the LDAP server is reachable and functioning properly, in the admin GUI. Which two parts of the configuration should you verify are correct?()A. Finding user entriesB. Authentication requiredC. LDAP Server TypeD. Determining group membership

You work as an administrator at ABC.com.The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed. ABC.com has a server, named ABC-SR13, which is configured as the primary DNS server in the ABC.com domain. ABC.com has another server, named ABC-SR14, which makes use of ABCSR13 for DNS queries.You want to make sure that running nslookup.exe from ABC-SR14 produces a result that shows the proper name of the default server.  Which of the following actions should you take?()A、You should consider creating a reverse lookup zone on ABC-SR14.B、You should consider creating a forward lookup zone on ABC-SR14.C、You should consider creating a reverse lookup zone on ABC-SR13.D、You should consider creating a forward lookup zone on ABC-SR13.

You have two NTP servers 10.1.1.1  10.1.1.2 and want to configure a router to use 10.1.1.2 as its NTP server before falling back to 10.1.1.1. Which command will you use?

A customer needs to test the failover capabilities of their cluster. Which of the following AIX commands, whenissued from the command line, will simulate a node crash and cause the cluster resource group running onthat server to fail over to another node?()A、clstopB、halt -qC、shutdown -FD、stopsrc -s cluster

You are attempting to secure a MySQL server by using SSL encryption. On starting MySQL, you get this error: 130123 10:38:02 [ERROR] mysqld: unknown option '—ssl' What is the cause of the error?()A、The — ssl level was not specifiedB、The server was not started with the – enable–ssl-plugin optionC、— ssl is not a valid server optionD、The mysqld binary was not compiled with SSL supportE、The server's SSL certificate was invalid

You work as a database administrator for Certkiller .com. In your organization, you have four databases, Certkiller DB01, Certkiller DB02, Certkiller DB03, and Certkiller DB04, which are located in Berlin, Frankfurt,Rammstein, and Munich respectively, and which were created using Database Configuration Assistant (DBCA).  You want to perform administrative tasks on these databases that include startup and shutdown, taking regular backups, and so on, fromFrankfurtusing Oracle tools. Which Oracle file would you enable to perform this task?()A、Control fileB、Password fileC、Parameter fileD、Online redo log fileE、Listener controller fileF、Server parameter file

You want to use WLST to view metrics for a running domain. Which command should you issue to navigate through the Mbean hierarchy containing the metrics?()A、runtime ()  B、runtimeMbeanServer ()C、connectRuntime ()D、beginRuntime ()E、serverRuntime ()

You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance which contains a database. Now your company CIO assigns a task to you. You have to check the performance of the SQL Server 2008 instance. You have to find out which common language runtime (CLR) queries takes the longest-running time.  So in the options below, which dynamic management view should you choose to use?()  A、sys.dm_os_wait_stats B、sys.dm_exec_requests C、sys.dm_exec_sessions D、sys.dm_exec_query_stats

Your network includes a TS Gateway server named TSG1. TSG1 has installed a self- signed servercertificate that it uses for SSL communications. You want to use a computer running ISA Server as an SSL endpoint for TS Gateway connections. Which of the following steps must you take to ensure that ISA Server can communicate with TS Gateway?()A、Enable HTTPS-HTTP bridging between ISA Server and TS Gateway.B、Open TCP port 443 on the computer running ISA Server.C、Export the SSL certificate of ISA Server to TS Gateway.D、Export the SSL certificate of TS Gateway to ISA Server.

问答题You have two NTP servers 10.1.1.1  10.1.1.2 and want to configure a router to use 10.1.1.2 as its NTP server before falling back to 10.1.1.1. Which command will you use?

多选题A Mysql instance is running on a dedicated server. Developers access the server from the same network subnet. Users access the database through an application that is running on a separate server in a DMZ. Which two will optimize the security of this setup?()ADisabling connections from named pipes or socket files (depending on the operating system of the server)BEnabling and using SSL for connections to the Mysql databaseCInstalling Mysql on the application server, and running the database and application on the same serverDStarting the server with – bind- address=0.0.0.0 specifiedERunning the server with – skip-networking specifiedFLimiting logins to originate from the application server or the server's subnet'

多选题You want to shutdown a running Mysql Server cleanly. Which three commands that are valid on either Windows or Linux will achieve this?()AShell> mysqladmin –u root –p shutdownBShell> nmc mysql shutdownCMysql> STOP PROCESS mysqldDShell> /etc/init.d/mysql stopEShell> service mysql safe_exitFShell> pkill –u mysql mysqld_safeGShell> net stop mysql

单选题You have forgotten the root user account password. You decide to reset the password and execute the following: Shell> /etc/init.d/mysql stop Shell> /etc/init.d/mysql start – skip-grant tables Which additional argument makes this operation safer?()A–skip-networking, to prohibit access from remote locationsB–reset-grant-tables, to start the server with only the mysql database accessibleC–read-only,to set all data to read-only except for super usersD–old-passwords, to start Mysql to use the old password format while running without the grant tables

单选题There is more than one way to set the server to detect and affect long running operations automatically. What is the best choice of you want to reduce the impact of long running operations on other users without aborting the long running operations?()ADefine user profiles and set the CPU_PER_CALL limit. BDefine a SWITCH_TIME for a plan in the Resource Manager. CCreate a batch job that checks V$SESSION_LONGOPS;the batch job alters the session priority of the long running operations. DCreate a user defined event in the Oracle Enterprise Manager, which monitors V$SESSION_LONGOPS.

单选题You are the network administrator for In particular you administer a Windows 2003 server named TestKing3. TestKing3 functions as an application server and runs IIS. You discover that one of the IIS sites on TestKing3 is corrupted. You need to recover the IIS site settings. You want to achieve this goal by using the minimum amount of administrative effort. What should you do?()ARestore the IIS configuration settings by running the iisweb.vbs /create command.BOpen IIS Manager, and restore a previous version of the site.CRestore the IIS configuration settings by running the iisback.vbs /restore command.DRestore the IIS configuration settings by running the iisback.vbs /backup command.

单选题You want to use WLST to view metrics for a running domain. Which command should you issue to navigate through the Mbean hierarchy containing the metrics?()Aruntime ()  BruntimeMbeanServer ()CconnectRuntime ()DbeginRuntime ()EserverRuntime ()

多选题You are configuring an LDAP authentication server, and you want to configure role-mapping rules based on group membership. When you attempt to search for groups in the server catalog, no groups appear.Assuming the LDAP server is reachable and functioning properly, in the admin GUI. Which two parts of the configuration should you verify are correct?()AFinding user entriesBAuthentication requiredCLDAP Server TypeDDetermining group membership

单选题You use—login-path to access a MySQL server on a Linux installation. Which statement is true about the – login-path option that is created by using mysql_config_editor?()AAll system users have access to the MySQL server via—login path localBlogin-path can be used only for MySQL servers running on a local machineClogin-path allows you to provide login credentials without passing clear text passwords on the command lineDWhen using – login-path to connect to a remote MySQL server, the remote server version must be 5.6 or later

单选题You have 2 NTP servers in your network - 10.1.1.1 and 10.1.1.2. You want to configurationure a Ciscorouter to use 10.1.1.2 as its NTP server before falling back to 10.1.1.1. Which commands will you use toconfigurationure the router?()Antp server 10.1.1.1 ntp server 10.1.1.2Bntp server 10.1.1.1 ntp server 10.1.1.2 primaryCntp server 10.1.1.1 ntp server 10.1.1.2 preferDntp server 10.1.1.1 fallback ntp server 10.1.1.2

多选题You work as a database administrator for Supportcenter.cn. You want to administer your database servers, which are running on different host machines, using the Web-enabled grid control interface. You have configured the agent on the host machines. You have started the Oracle Database 10g Grid Control utility on your machine. Which two additional components would you configure to achieve this objective?()AApplication Server ControlBOracle Management ServiceCOracle Enterprise Manager RepositoryDOracle Enterprise Manager Database Control

单选题You have forgotten the root user account password. You decide to reset the password and execute the following: Shell> /etc/init.d/mysql stop Shell> /etc/init.d/mysql start – skip-grant tables Which additional argument makes this operation safer?()A–skip-networking, to prohibit access from remote locationsB–reset-grant-tables, to start the server with only the mysql database accessibleC–read-only,to set all data to read-only except for super usersD–old-passwords, to start Mysql to use the old password format while running without the grant tables

单选题You have table 'apps','userdata' on server that uses MyISAM storage engine. You want to transfer this data to server but use InnoDB engine instead. You execute the following commands: ServerB commands: Shell> mysqldump –u root –h server –no-data apps userdata | mysql –u root –p apps Shell> mysql –u root –p –h server –e 'ALTER TABLE 'apps','userdata' ENGINE=InnoDB;' Shell> mysqldump –u root –p –h server –no-create-info –order-by-primary apps userdata | mysql –u root –p apps What effect does the – order-by-primary argument have on the mysqldump command?()AIt exports tables with the most indexes first to assist with import speedsBIt ensures that unique indexes have no conflicts when the data is dumpedCIt orders by primary key to assist in speeding up importing to InnoDB tablesDIt must be specified so index data is dumped correctly when –on-create-info is used