单选题After the LED display is flashing 888 and the system is rebooted, which of the following commands should be used to gather dump information?()Asnap Berrpt Ckdb Dtrace

单选题
After the LED display is flashing 888 and the system is rebooted, which of the following commands should be used to gather dump information?()
A

snap 

B

errpt 

C

kdb 

D

trace


参考解析

解析: 暂无解析

相关考题:

单选题When a user tries to log into the system, the following error occurs:  "3004-004. You must "exec" login from the lowest login Shell". Which of the following procedures should be performed next to determine the cause of the problem?()A Reboot the system. B Increase the number of ptys. C Increase number of licenses. D Run df -k to check for full filesystems.

单选题Which of the following outputs will best indicate if a system is CPU bound?()A %idle  10% B %usr + %sys  80% C %sys + %wio  80% D %wio + %idle  80%

单选题All of the following types of statistics are reported by the iostat command tool EXCEPT:().A Free memoryB CPU statistics C Disk statistics D Terminal statistics

单选题Which of the following kdb commands is used to obtain a stack trace from a dump? ()A trb B his C f D trace

单选题A customer needs to remove an unnecessary, but active paging space called paging00 on an AIX 5L system.  Which of the following procedures should be used to properly remove the paging space with the least amount of disruption?()ARemove the paging space with the rmps command. BDisable the paging space with the chps command, swapoff /dev/paging00, and remove the paging00 logical volume with the rmps command. CReboot the system and disable the paging space with the rmps command. DDisable the paging space with the chps command, swapoff /dev/paging00, reboot the system, remove the paging00 logical volume with the rmps command.

单选题Which file is NOT controlled by the alog command?()A conslog B nimlog C bosinstlog D errlog

单选题Which of the following is TRUE about the ping  -f command?()A It is useful for diagnosing data dependent problems by filling the packet with the byte pattern following the f in the command line. B It is useful for flooding from slow character based terminals since it only displays a dot . for each packet sent in fast mode. C It is useful for flooding from slow character based terminals since it only displays a dot .       for each packet sent and a backspace on returned in fast mode. D The command can only be run by root.