单选题How can a directory named /dirl be excluded during a restore of files backed up by name with the backup command()ABy using the restore -x option followed by /dirlBBy adding an entry in the /etc/restore.exclude fileCBy using the restore -i option to enter interactive mode and executing the command:delete /dirlDBy using the restore -i option when running restore to specify a text file containing ’/dirl1 as one of the lines in it
单选题
How can a directory named /dirl be excluded during a restore of files backed up by name with the backup command()
A
By using the restore -x option followed by /dirl
B
By adding an entry in the /etc/restore.exclude file
C
By using the restore -i option to enter interactive mode and executing the command:delete /dirl
D
By using the restore -i option when running restore to specify a text file containing ’/dirl1 as one of the lines in it
参考解析
解析:
暂无解析
相关考题:
Given that the current directory is empty, and that the user has read and write permissions, and the following:Which statement is true?() A.Compilation fails.B.The file system has a new empty directory named dir.C.The file system has a new empty directory named newDir.D.The file system has a directory named dir, containing a file f1.txt.E.The file system has a directory named newDir, containing a file f1.txt.
During a planning meeting, Company.com indicates that they intend to make a relational Database highly available. The application has a pre-requisite that a kernel extension be loaded from /etc/inittab. How would this be managed in an HACMP environment?() A、 It can be started with a crontab entry.B、 It can be created as an Application Server.C、 It can be added to a resource group as a dependency.D、 It cannot be done because HACMP provides no method to order application start/stop scripts.
How can a directory named /dirl be excluded during a restore of files backed up by name with the backup command()A、By using the restore -x option followed by /dirlB、By adding an entry in the /etc/restore.exclude fileC、By using the restore -i option to enter interactive mode and executing the command:delete /dirlD、By using the restore -i option when running restore to specify a text file containing ’/dirl1 as one of the lines in it
How can the command-line Coherence application in Windows and UNIX be started ?()A、 navigate to the $COHERENCE_HOME directory and type bin/coherence.cmd (Windows) or ./bin/coherence.sh (UNIX)B、 navigate to the $COHERENCE_HOME directory and type coherence.cmd (Windows) or bin/coherence.sh (UNIX)C、 navigate to the $COHERENCE_HOME directory and type bin/coherence.cmd (Windows) or coherence.sh (UNIX) D、 All of the above
Given the security constraint in a DD:// 101. 102. 103.Foo 104./Bar/Baz/* 105.POST 106. 107. 108.DEVELOPER 109. 110. And given that "MANAGER" is a valid role-name,which four are true for this security constraint?()A、MANAGER can do a GET on resources in the /Bar/Baz directory.B、MANAGER can do a POST on any resource in the /Bar/Baz directory.C、MANAGER can do a TRACE on any resource in the /Bar/Baz directory.D、DEVELOPER can do a GET on resources in the /Bar/Baz directory.E、DEVELOPER can do only a POST on resources in the /Bar/Baz directory.F、DEVELOPER can do a TRACE on any resource in the /Bar/Baz directory.
When planning for VoWLAN capacity during a site survey, how many simultaneous calls can beestimated per 5 GHz channel?()A、7B、14C、20D、30
How can a directory named /dir1 be excluded during a restore of files backed up by name with the backup command?()A、By using the restore -x option followed by /dir1B、By adding an entry in the /etc/restore.exclude fileC、By using the restore -i option to enter interactive mode and executing the command:delete /dir1D、By using the restore -i option when running restore to specify a text file containing ’/dir1’ as one of the lines in it.
How can a directory be excluded from a mksysb backup of the following?()A、Put an entry in the /etc/exclude.rootvg fileB、Put an entry in the /etc/mksysb.exclude fileC、Remove the directory’s entry from the mksysb /image.data fileD、Remove the directory’s entry from the /var/adm/ras/bosinst.data file
How can a directory be excluded from a mksysb backup()A、Put an entry in the /etc/exclude.rootvg file.B、Put an entry in the /etc/mksysb.exclude file.C、Remove the directory’s entry from the mksysb /image.data file.D、Remove the directory’s entry from the /var/adm/ras/bosinst.data file.
System, machine, and user policies can be configured though AccessAdmin. How are changes synchronized with the AccessAgent?()A、written by the Administrators on the INI filesB、propagated only with the Active Directory network serviceC、propagated to the clients on the next Administrator accessD、propagated to clients the next time AccessAgent synchronizes with the IMS Server
Your network consists of a single Active Directory domain named contoso.com. All servers run Windows Server 2003 Service Pack 2 (SP2).You plan to deploy a new DNS zone named adatum.com. You need to ensure that only computers in the contoso.com domain can update host records in the new DNS zone. What should you do?()A、Create a new Active Directory forest named adatum.com. B、Create a new Active Directory-integrated zone named adatum.com. C、Create a new standard primary zone named adatum.com. Disable round robin. D、Create a new standard primary zone named adatum.com. Disable netmask ordering.
You install a read-only domain controller (RODC) named RODC1. You need to ensure that a user named User1 can administer RODC1. The solution must minimize the number of permissions assigned to User1. Which tool should you use()A、Active Directory Administrative CenterB、Active Directory Users and ComputersC、DsaddD、Dsmgmt
You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003. A member server named TestKing17 hosts several shared folders. Users report that they receive an error message when they try to connect to the shared folders. The error message states: "No more connections can be made to this remote computer at this time because there are already as many connections as the computer can accept." How should you solve the problem?()A、Add an additional network adapter to TestKing17. Configure a network bridge between the new network adapter and the original network adapter.B、Purchase additional per-seat licenses for TestKing17. In Control Panel on TestKing17, run the Licensing application. Add the additional licenses to TestKing17.C、Disable quota management on TestKing17.D、In Active Directory Sites and Services, select the site that contains TestKing17. Add an additional Active Directory connection object to the domain controller for the site.
You work as a network administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed.The ABC.com network contains a network attached printer named HPNet01.You share HPNet01 from a server named ABC_SR02 and publish the printer in Active Directory. How would you ensure that members of a group named PrinterAdmin can manage HPNet01?()A、You should enable Branch Office Direct Printing.B、You should configure the Printer defaults.C、You should share HPNet01 from a domain controller.D、You should configure the Security settings.
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 has the Active Directory Federation Services (AD FS) role installed. You have an application named App1 that is configured to use Server1 for AD FS authentication. You deploy a new server named Server2. Server2 is configured as an AD FS 2.0 server. You need to ensure that App1 can use Server2 for authentication. What should you do on Server2()A、Add an attribute store.B、Create a relying party trust.C、Create a claims provider trust.D、Create a relaying provider trust.
单选题Your network contains an Active Directory domain named contoso.com. The network has DirectAccess deployed.You deploy a new server named Server1 that hosts a management application.You need to ensure that Server1 can initiate connections to DirectAccess client computers.Which settings should you modify from the DirectAccess Setup console?()AApplication ServersBDirectAccess ServerCInfrastructure ServersDRemote Clients
单选题Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper- V server role installed. The domain contains a virtual machine named VM1. A developer wants to attach a debugger to VM1. You need to ensure that the developer can connect to VM1 by using a named pipe. Which virtual machine setting should you configure?()ANetwork AdapterBBIOSCProcessorDCOM 1
多选题You have a single Active Directory directory service forest named contoso.com. You create baseline security settings for a group of computers, and you store the settings in a database. You deploy thebaseline security settings. You need to confirm that the security settings on one of the computers are applied correctly. What are two possible commands that you can run to achieve this goal?()AseceditBgpupdateCnetdomDscwcmd
单选题How can the command-line Coherence application in Windows and UNIX be started ?()A navigate to the $COHERENCE_HOME directory and type bin/coherence.cmd (Windows) or ./bin/coherence.sh (UNIX)B navigate to the $COHERENCE_HOME directory and type coherence.cmd (Windows) or bin/coherence.sh (UNIX)C navigate to the $COHERENCE_HOME directory and type bin/coherence.cmd (Windows) or coherence.sh (UNIX) D All of the above
多选题Given the security constraint in a DD:// 101. 102. 103.Foo 104./Bar/Baz/* 105.POST 106. 107. 108.DEVELOPER 109. 110. And given that "MANAGER" is a valid role-name,which four are true for this security constraint?()AMANAGER can do a GET on resources in the /Bar/Baz directory.BMANAGER can do a POST on any resource in the /Bar/Baz directory.CMANAGER can do a TRACE on any resource in the /Bar/Baz directory.DDEVELOPER can do a GET on resources in the /Bar/Baz directory.EDEVELOPER can do only a POST on resources in the /Bar/Baz directory.FDEVELOPER can do a TRACE on any resource in the /Bar/Baz directory.
单选题How can a directory named /dir1 be excluded during a restore of files backed up by name with the backup command?()ABy using the restore -x option followed by /dir1BBy adding an entry in the /etc/restore.exclude fileCBy using the restore -i option to enter interactive mode and executing the command:delete /dir1DBy using the restore -i option when running restore to specify a text file containing ’/dir1’ as one of the lines in it.
单选题Your network consists of a single Active Directory domain named contoso.com. The functional level of the domain is Windows Server 2003. You need to schedule a task to find all user accounts whose passwords have remained unchanged during the past 60 days. Which tool should the scheduled task run? ()ADsget.exeBDsquery.exeCActive Directory Usersand ComputersDFind.exe
多选题Which two statements are true regarding the usage of the SQL*Loader utility()AYou can load data into multiple tables during the same load session.BYou can load data from multiple files to a table during the same load session.CYou cannot perform selective data loading based on the values available in the records.DYou can use an export file generated by the EXPDP utility as an input data file to load the data.EYou can load data only if the input file is available on the disk and tape but not in a named pipes.
单选题When planning for VoWLAN capacity during a site survey, how many simultaneous calls can beestimated per 5 GHz channel?()A7B14C20D30
多选题10. class MakeFile { 11. public static void main(String[] args) { 12. try { 13. File directory = new File(”d”); 14. File file = new File(directory,”f”); 15. if(!file.exists()) { 16. file.createNewFile(); 17. } 18. } catch (IOException e) { 19. e.printStackTrace 20. } 21. } 22. } The current directory does NOT contain a directory named “d.” Which three are true?()ALine 16 is never executed.BAn exception is thrown at runtime.CLine 13 creates a File object named “d”.DLine 14 creates a File object named “f‟.ELine 13 creates a directory named “d” in the file system.FLine 16 creates a directory named “d” and a file “f” within it in the file system.GLine 14 creates a file named f inside of the directory named “d” in the file system.
单选题A system administrator has filesystems that should not be mounted during system startup. How can the system administrator prevent the /data filesystem from being mounted during subsequent boots?()Amount -no /dataBchfs -A no /dataCmount -t nfs /dataDchfs -a type=nfs /data