单选题An administrator must verify all filesets are completely installed before an upgrade. Which of the following commands will perform this task()AIslpp -vBIppchk -vCinstallp -vDinstfix -v
单选题
An administrator must verify all filesets are completely installed before an upgrade. Which of the following commands will perform this task()
A
Islpp -v
B
Ippchk -v
C
installp -v
D
instfix -v
参考解析
解析:
暂无解析
相关考题:
After a server has been installed into a rack, an administrator must ensure which of the following?() A. Warm air flow is permitted through the front bezelB. The system is labeled so that it can be identifiedC. Verify the change control process can be implementedD. Determine the correct power requirements
What must an administrator do to prevent new telnet users from connecting to the system?() A.rmdev -l /dev/ptsB.touch /etc/nologinC.chdev -l sys0 -a nologinD.chuser -a login=false ALL
When rejecting applied an dependent updates on an AIX 5L system, which of the following procedures is most appropriate to follow?() A.Use the install PREVIEW option to view a list of all updates that will be rejectedB.Use the lslpp -d command to view the dependent filesets that will be rejectedC.Select the SMIT option to Verify Software Requisites and Installations first to generate a list of all applied updates.D.Select the SMIT option to List the Maintenance Level of a Software Product to double check the update level that should be removed
Refer to the exhibit. The Route.com company is running EIGRP between all the r outers. Currently, if one of the LAN links (LAN1 or LAN2) at the headquarters flaps (goes up and down), the HQRTR1 and HQ - RTR2 routers will experience high CPU usage and have a long EIGRP convergence time. As the new network administrator, you are asked to investigate this situation and determine if there is a quick way to resolve this issue. Which is the most important thing that you can quickly verify first to resolve this issue?()A. Verify that the bandwidth setting on all WAN links is correct.B. Verify that the HQ - RTR1 and HQ - RTR2 routers are configured to send only a default route to all the spoke routers.C. Verify that the HQ - RTR1 and HQ - RTR2 routers are configured for EIGRP Nonstop Forwarding.D. Verify that all the spoke routers are co nfigured for autosummarization.E. Verify that all the spoke routers are configured as EIGRP stub.
When rejecting applied an dependent updates on an AIX 5L system, which of the following procedures is most appropriate to follow?()A、Use the install PREVIEW option to view a list of all updates that will be rejectedB、Use the lslpp -d command to view the dependent filesets that will be rejectedC、Select the SMIT option to Verify Software Requisites and Installations first to generate a list of all applied updates.D、Select the SMIT option to List the Maintenance Level of a Software Product to double check the update level that should be removed
After a server has been installed into a rack, an administrator must ensure which of the following?()A、Warm air flow is permitted through the front bezelB、The system is labeled so that it can be identifiedC、Verify the change control process can be implementedD、Determine the correct power requirements
An administrator is overseeing the backup process and tapes utilized by a former employee.Which of the following is the BEST way for the administrator to proceed?()A、Utilize differential backups.B、Verify the tape drives are functional.C、Verify that the backups are functional.D、Utilize incremental backups.
An administrator will replace five current servers. Which of the following is the MOST important to review before installing new servers?()A、Verify uninterruptible power supply (UPS) loadB、Verify if server consumes 220VC、Verify CPU loadD、Verify if server consumes 110V
An administrator has a server that must be upgraded from AIX 5.2 to AIX 5.3. The administrator also needs to use the 64-bit kernel with JFS2 filesystems in rootvg. All critical data resides in a non-rootvg volume group. Which of the following types of install could the administrator use to accomplish this()A、Migration InstallationB、Update.AII InstallationC、Preservation InstallationD、New and Complete Overwrite Installation
An administrator is installing a C compiler on a system. According to the compiler’s documentation, the AIX fileset bos.adt.libm must be installed prior to the installation of the compiler. Which of the following commands would verify installation of the prerequisite fileset()A、installpB、instfixC、IppchkD、Islpp
An administrator uses C-SPOC to change the user password for all nodes that belong to a Resource group. The administrator must perform this operation on a node that is:() A、 included in the resource group.B、 currently managing the resource group.C、 not part of an application resource group.D、 included in a cluster_admin resource group.
A System p administrator has been instructed to verify that all filesets have all required requisitesand are completely installed. Which of the following commands will provide this information()A、lslppB、lppchkC、geninstallD、installp
An administrator will be performing a PowerHA upgrade on a cluster from version 5.3 to version 5.5. Which ofthe following tasks will verify a successful migration?()A、Use the clstat command and verify the cluster is in a stable stateB、After each node is upgraded, run a verification and synchronizationC、After all nodes are upgraded, run a verification and synchronizationD、Take a snapshot of each node and verify the configuration is the same
What must an administrator do to prevent new telnet users from connecting to the system?()A、rmdev -l /dev/ptsB、touch /etc/nologinC、chdev -l sys0 -a nologinD、chuser -a login=false ALL
The Cluster Administrator wants to use disk heartbeats as a non-IP network. What Volume Group consideration must be accounted for prior to configuring disk heartbeats?() A、 The Volume Group major number must be the same on all nodes.B、 The Shared Volume Group must be created with the Big VG format.C、 The Volume Group must be created as Enhanced Concurrent Capable.D、 The "t factor" must be doubled to create the reserved area for disk hearbeats.
An administrator has a server that must be upgraded from AIX 5.2 to AIX 5.3. The administrator also needs to use the 64-bit kernel with JFS2 filesystems in rootvg. All critical data resides in a non-rootvg volume group. Which of the following types of install could the administrator use to accomplish this?()A、Migration InstallationB、Update_All InstallationC、Preservation InstallationD、New and Complete Overwrite Installation
A system administrator is installing a C compiler on a system. According to the compiler’s documenation, the AIX fileset bos.adt.lib must be installed prior to installation of the compiler. Which command would the system administrator use to verify installation of the bos.adt.lib fileset?()A、installpB、instfixC、lsallqD、lslpp
An administrator has a two-node PowerHA cluster in a mutual takeover configuration. He needs to updatefrom 5.5 service pack 1 to 5.5 service pack 2. Which of the following actions will perform the updates with norisk of disruption to applications running in the cluster?()A、Unmanage resource groups on all nodes, update the cluster filesets, start cluster services on all nodes,ensure cluster services stabilizeB、Update the cluster filesets on all nodes. Run ’refresh -s clstrmgrES’ on one node, wait for the cluster tostabilize, repeat for all other nodesC、Unmanage resource groups on one node, update the cluster filesets, start cluster services. Wait for thecluster to stabilize and repeat for all other nodes.D、Bring resource groups (RGs) online on all nodes concurrently, bring RGs offline on one node, update thecluster filesets, bring RGs online, repeat for all other nodes
An administrator just completed an AIX installation but suspects that not all filesets installed completely. Which of the following commands would verify that all filesets are completely installed?()A、installp -EB、lslpp -EC、lppchk -cD、instfix -c
ou are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional.Two of the servers on the network contain highly confidential documents. The company’s written security policy states that all network connections with these servers must be encrypted by using an IPSec policy.You place the two servers in an organizational unit (OU) named SecureServers. You configure a Group Policy object (GPO) that requires encryption for all connections. You assign the GPO to the SecureServers OU. You need to verify that users are connecting to the two servers by using encrypted connections. What should you do?()A、Run the net view command.B、Run the gpresult command.C、Use the IP Security Monitor console.D、Use the IPSec Policy Management console.
单选题A system administrator just completed an AIX installation but suspects that not all filesets installed completely. Which command should be run to verify that all filesets are completely installed?()AinstallpBlslppClppchkDoslevel
单选题You are the network administrator for The network consists of a single Active Directory domain All network servers run Windows Server 2003. One member server hosts a folder named F:/TestKingData. Thousands of users constantly request and updates files in F:/TestKingData. You use the Backup utility to perform an incremental backup of F:/TestKingData on magnetic tape. The backup completes normally, but you see an error indicator illuminated on the tape server. You need to verify that you can restore F:/TestKingData from the backup tape. The verification process must not affect existing files. What should you do?()AIn the Backup utility, use the Restore and Manage Media tab to select the original tape media. Ensure that files will be restored to their original location. Start the restoration and verify that all files are restored successfully.BIn the Backup utility, use the Restore and Manage Media tab to select the original tape media. Ensure that files will be restored to a new location. Start the restoration and verify that all files are restored successfully.CIn the Backup utility, select the Verify data after the backup completes option. Use the original backup tape to perform another incremental backup. Ensure that all files are verifies successfully.DIn the Backup utility, select the Verify data after the backup completes option. Use a new backup tape to perform another incremental backup. When the verification phase of the backup begins, replace the new tape with the original tape. Ensure that all files are verified successfully.
单选题A system administrator has been instructed to verify that all filesets have all required requisites and are completely installed. Which command will provide this information?()AlslppBlppchkCinstfixDinstallp
单选题You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named DB1 in the instance. On DB1, quite few logged operations are performed. Now according to the requirement of the company CIO, you must validate that the database can be restored to a specific point in time. So what action should you perform to achieve this goal? ()AYou should verify that the simple recovery model is used by the database.BYou should verify that the full recovery model is used by the database.CYou should verify that the checksum page verify option is used by the database. DYou should verify that the bulk-logged recovery model is used by the database.
单选题An administrator uses C-SPOC to change the user password for all nodes that belong to a Resource group. The administrator must perform this operation on a node that is:()A included in the resource group.B currently managing the resource group.C not part of an application resource group.D included in a cluster_admin resource group.
单选题An administrator will replace five current servers. Which of the following is the MOST important to review before installing new servers?()A Verify uninterruptible power supply (UPS) loadB Verify if server consumes 220VC Verify CPU loadD Verify if server consumes 110V
多选题You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003.The network contains a Web server named Server1 that runs IIS 6.0 and hosts a secure Web site. The Web site is accessible from the intranet, as well as from the Internet. All users must authenticate when they connect to Server1. All users on the Internet must use a secure protocol to connect to the Web site. Users on the intranet do not need to use a secure protocol.You need verify that all users are using a secure protocol to connect to Server1 from the Internet. What are two possible ways to achieve this goal?()AMonitor the events in the application log on Server1.BMonitor the events in the security log on Server1.CMonitor the Web server connections on Server1 by using a performance log.DMonitor network traffic to Server1 by using Network Monitor.EMonitor the IIS logs on Server1.