单选题Which of the following files should be used to alter the order of which DNS servers get queried first?()A/etc/hostsB/etc/inetd.confC/etc/netsvc.confD/etc/resolv.conf

单选题
Which of the following files should be used to alter the order of which DNS servers get queried first?()
A

/etc/hosts

B

/etc/inetd.conf

C

/etc/netsvc.conf

D

/etc/resolv.conf


参考解析

解析: 暂无解析

相关考题:

A user copied files from a CD and now the files can only be opened as read-only. Which of the following utilities can be used to allow the user the ability to edit the files?() A.EDITB.CHMODC.ATTRIBD.CONVERT

Which of the following protocols should be used to monitor network performance?() A.SNTPB.SMTPC.HTTPD.SNMP

A system administrator needs to backup datavg which contains a database that pre-allocates files by padding them with nulls, similar to treating them as sparse files. In order to effectively backup and be able to restore the datavg files, which backup method should be used?()A.savevgB.tarC.cpioD.mksysb

Which of the following commands should be used to alter the routing table on a running system without affecting the ODM settings?()A、inetdB、routeC、cfgmgrD、chdev

A user copied files from a CD and now the files can only be opened as read-only. Which of the following utilities can be used to allow the user the ability to edit the files?()A、EDITB、CHMODC、ATTRIBD、CONVERT

Which of the following commands would be used to verify the integrity of critical system files?()A、verifyB、nslookupC、sfcD、chkdsk

Which of the following tools is used to consolidate files and folders on a local drive?()A、CHKDSKB、DEFRAGC、DISK CLEANUPD、Computer Management

Which of the following should be used to check a serial port for functionality?()A、Loopback plugB、Toner probeC、MultimeterD、Cable tester

Which of the following commands should Karen, a technician, use to examine and restoreprotected system files?()A、SFCB、RECOVERC、REPLACED、COPY

Which of the following commands would be used to display hidden files?()A、dir /?B、dir /dC、dir /aD、dir /s

Which of the following would be used to monitor unauthorized access to data files?()A、Performance Log and AlertsB、Event ViewerC、Security Configuration and AnalysisD、IP Security Monitor

Which of the following commands should be used to show DNS information?()A、 traceB、 netstatC、 ifconfigD、 nslookup

Which of the following tools should be used to report current network status and is often used to check the reliability of a network?()A、 netpmonB、 netstatC、 nfsstatD、 vmstat

Which of the following commands should be used to delete an entry from the /etc/inittab?()A、xitabB、rmitabC、chitabD、delitab

Which of the following commands should be used to determine which disk of a system is experiencing a disk I/O performance problem?()A、 filemonB、 istatC、 vmstatD、 iostat

Which of the following commands should be used to report statistics on network protocols used by the system?()A、 lsattrB、 pstatC、 netstatD、 ifconfig

Which of the following choices identifies a database component that will be used for multiplexing control files?()A、V$CONTROLFILE B、V$DATABASE C、init.ora D、DBA FILES

You are trying to alter the initial segment size given to a table in a dictionary-managed tablespace. Which of the following keywords would be used as part of this process?()A、DROP TABLE B、ALTER TABLE C、RESIZE D、COALESCE

Which of the following files should be used to alter the order of which DNS servers get queried first?()A、/etc/hostsB、/etc/inetd.confC、/etc/netsvc.confD、/etc/resolv.conf

单选题Which of the following tools should be used to report current network status and is often used to check the reliability of a network?()A netpmonB netstatC nfsstatD vmstat

单选题A system administrator needs to backup datavg which contains a database that pre-allocates files by padding them with nulls, similar to treating them as sparse files. In order to effectively backup and be able to restore the datavg files, which backup method should be used?()AsavevgBtarCcpioDmksysb

单选题Which of the following best describes a full backup? ()AAll datafiles of a database BAll datafiles, archive logs, and control files CAll datafiles and control files DAll the used blocks in a datafile