单选题Using the C-SPOC utilities, an administrator has created a new volume group and filesytems. Theadministrator performs an Isvg -I command on the volume group and notices that the log logical volume created in C-SPOC is closed/syncd and loglv01 has been created and is in use.  What step was required in order for the logfile created by C-SPOC to be used.()A Perform the C-SPOC logform utility option prior to creating any filesystems.B Manually perform a logform outside of C-SPOC prior to creating any filesystems.C Run a logredo command and select log logical volume created in C-SPOC as the preferred jfslog.D Use C-SPOC to delete and recreate the log logical volume,set the perform logform option to true.

单选题
Using the C-SPOC utilities, an administrator has created a new volume group and filesytems. Theadministrator performs an Isvg -I command on the volume group and notices that the log logical volume created in C-SPOC is closed/syncd and loglv01 has been created and is in use.  What step was required in order for the logfile created by C-SPOC to be used.()
A

 Perform the C-SPOC logform utility option prior to creating any filesystems.

B

 Manually perform a logform outside of C-SPOC prior to creating any filesystems.

C

 Run a logredo command and select log logical volume created in C-SPOC as the preferred jfslog.

D

 Use C-SPOC to delete and recreate the log logical volume,set the perform logform option to true.


参考解析

解析: 暂无解析

相关考题:

A new HACMP maintenance level has recently been released. An administrator is creating a  project plan that is required for applying the updates for a three-node production cluster.  To minimize downtime,what is the best way to accomplish the updates on all cluster nodes?()  A、 Perform a graceful takeover one node at a time and apply the updates.B、 Perform the updates on all nodes simultaneously using C-SPOC utilities.C、 Perform the updates on node at a time with the cluster software active.D、 Perform a graceful stop of all cluster nodes and apply updates to all nodes.

An administrator has just imported a shred Volume Group that had been created on another  system in the cluster. In order for the shred volume to be used in the cluster, what is the most important step for the administrator to take first?()   A、 Change the quorum required to false.B、 Change the Volume Group auto vary on to yes, and then vary off the Volume Group.C、 Change the auto vary on value of the Volume Group to no, and then vary off the volume group.D、 Set the Volume Group major number to the same value that the Volume Group had on the system on which it was created.

A section of the building has been having intermittent connectivity problems lately. An action plan and solution has been created. Which of the following steps would an administrator perform NEXT?()A、Document the solution and process.B、Establish the most probable cause.C、Implement and test the solution.D、Identify additional symptoms and problems

A server has had a drive fail in its storage RAID set.  The administrator swaps the drive with a replacement and the RAID set does not automatically start to rebuild the replaced drive.  Which ofthe following utilities would MOST likely be used to initialize the rebuilding of the replace mentdrive?()A、Net useB、Array managementC、FdiskD、Disk Management Plug-in

An administrator does not have console access to a Windows Server. Which of the following command line utilities should the administrator use to reboot the system remotely?()A、rebootB、pkillC、shutdownD、kill

A network administrator of a company has many branch locations each using a subnet mask of 255.255.255.224. Which of the following dynamic routing protocols should be used?()A、IPv6B、RIPC、IGRPD、RIPv2

Which of the following utilities will a technician use to determine how many partitions a hard drive has?()A、Administrator ToolsB、Disk ManagementC、Device ManagerD、Computer Management

An administrator has replaced a faulty drive in a server using software RAID. The drive needs to now be partitioned before being added back to the array. Which of the following tools should the administrator use to accomplish this?()A、chkdskB、mountC、fsckD、diskpart

A system administrator has been instructed to attach storage in their client LPARs, in a Power 770, with fibre channel adapters using N_port ID virtualization (NPIV). Which of the following partitions has the minimum requirements to utilize virtual fibre channel?()A、LPAR-A with 1Gb FC HBA and SAN connectionB、LPAR-B with 2Gb FC HBA and SAN connectionC、LPAR-C with 4Gb FC HBA and SAN connectionD、LPAR-D with 8Gb FC HBA and SAN connection

A system administrator receives a new server and has booted the system for the first time. The administrator has set up the terminals and users. The user start to log on. Root is logged in on the console. When additional users start to log in, an error is displayed stating that All available login sessions are in use. Which of the following steps should be followed to resolve this problem?()A、Permissions on /etc/security were changed in error; do a chmod 755 on /etc/security directory.B、Increase the number of licenses; using smit chaili censeC、Change the Maximum number of PROCESSES allowed per user variable; using smit chgsys.D、Change User can logi field from false to true: using smit chuser.

Using the C-SPOC utilities, an administrator has created a new volume group and filesytems. Theadministrator performs an Isvg -I command on the volume group and notices that the log logical volume created in C-SPOC is closed/syncd and loglv01 has been created and is in use.  What step was required in order for the logfile created by C-SPOC to be used.()  A、 Perform the C-SPOC logform utility option prior to creating any filesystems.B、 Manually perform a logform outside of C-SPOC prior to creating any filesystems.C、 Run a logredo command and select log logical volume created in C-SPOC as the preferred jfslog.D、 Use C-SPOC to delete and recreate the log logical volume,set the perform logform option to true.

A new application has been added to a system which needs to automatically be started at system startup. The system administrator has decided to accomplish this by using the /etc/inittab file. Which command would be used to accomplish this in a supported manner?()A、viB、mkitabC、telinitD、startsrc

You are installing an application on a computer that runs Windows Server 2008 R2.   During installation, the application will need to add new attributes and classes to the Active Directory  database.   You need to ensure that you can install the application.   What should you do()A、Change the functional level of the forest to Windows Server 2008 R2.B、Log on by using an account that has Server Operator rights.C、Log on by using an account that has Schema Administrator rights and the appropriate rights to install  the application.D、Log on by using an account that has the Enterprise Administrator rights and the appropriate rights to  install the application.

You are installing an application on a computer that runs Windows Server 2008 R2. During  installation, the application will need to add new attributes and classes to the Active Directory  database.     You need to ensure that you can install the application.     What should you do()A、Change the functional level of the forest to Windows Server 2008 R2.B、Log on by using an account that has Server Operator rights.C、Log on by using an account that has Schema Administrator rights and the appropriate rights to install the applicatioD、Log on by using an account that has the Enterprise Administrator rights and the appropriate rights to install the app

多选题Your database in running in the ARCHIVELOG mode. You issue the following command to back up datafile 2 in your database.   RMAN COPY DATAFILE 2 TO ’D:///ORACLE/ORA90/MYNEWDB/DA2.DBF’;   Which two statements are true regarding the backup created using this command?()AThe copy of the datafile created is stored in the RMAN repository.BThe copy of the datafile created can be viewed using the LIST BACKUP command.CThe copy of the datafile created using this COPY command can be placed only on the disk.DThe copy of the datafile created is similar to the backup of the file created using the BACKUP command.EThe copy of the datafile created can be used for recovering the database using the user-managed recovery method.

单选题A System p administrator has created a customized security profile using AIX Security Expert.  Which of the following commands will apply this to a system()Aaixpert -f mysec.xmlBaixpert -a mysec.xmlCchsec -f mysec.xmlDchsec -a mysec.xml

多选题Which three scenarios are true about Domains?()ADomains can be created using the Configuration Wizard.BDomains can be created using WLST.CDomain configuration files are located in the WebLogic home directory.DDomains can be created based on a domain template.

单选题An administrator has just imported a shred Volume Group that had been created on another  system in the cluster. In order for the shred volume to be used in the cluster, what is the most important step for the administrator to take first?()A Change the quorum required to false.B Change the Volume Group auto vary on to yes, and then vary off the Volume Group.C Change the auto vary on value of the Volume Group to no, and then vary off the volume group.D Set the Volume Group major number to the same value that the Volume Group had on the system on which it was created.

单选题Which statement is true when Automatic Workload Repository (AWR) baselines are created using baseline templates?()AAWR baselines are always created as repeating baselines.BAWR baselines can be created on the basis of two time values.CAWR baselines are always created with infinite expiration duration.DAWR baselines are always created using the Automatic Workload Repository (AWR) retention period as expirationduration.

单选题You work as the exchange administrator at company.com.the company.com network contains an exchange server 2010 organization.company.com has its headquarters in london where you are located.during the course of the day you receive notification from management to view the number of mailboxes on the servers that exceeds 1 gb in size.what should you do?()Ayou should consider having the properties of the mailbox database viewed using the exchange management console (emc).Byou should consider running the get-mailbox cmdlet using the exchange management shell.Cyou should consider running the get-mail box statistics cmdlet using the exchange management shell.Dyou should consider having a send- and a recipient filter created using the exchange management console (emc).

多选题An administrator account is granted the CREATE SESSION and SET CONTAINER system privileges. A multitenant container database (CDB) instant has the following parameter set: THREADED_EXECUTION = FALSE Which four statements are true about this administrator establishing connections to root in a CDB that has been opened in read only mode?()AYou can conned as a common user by using the connect statement.BYou can connect as a local user by using the connect statement.CYou can connect by using easy connect.DYou can connect by using OS authentication.EYou can connect by using a Net Service name.FYou can connect as a local user by using the SET CONTAINER statement.

单选题You are employed as the Exchange administrator at Company.com.The Company.com network contains an Exchange 2010 Organization.Company.com has its headquarters in Stockholm where you are located.During the course of the week you receive an instruction from the CIO to make sure those messages in the Inbox folder of a Company.com employee named Kara Lang is moved to a custom folder when it reaches 50 days. What should you do?()AYou should consider having a new mail folder created using Microsoft Office Outlook. Thereafter a journal rule should e created.BYou should consider having a new mail folder created using Microsoft Office Outlook.Thereafter the Managed Content Settings wizard should be run from the Inbox manage default folder.CYou should consider having a managed custom folder created. Thereafter a transport rule should be created.DYou should consider having a managed custom folder created.Thereafter the Managed Content Settings wizard should be run from the Inbox managed default folder.

单选题You are a Database Administrator with TXGlobal. You use a password file to establish remote connections to the HR database on the server located at the home office. Currently, two active remote sessions exist to this database. These sessions were established using the SYSDBA privilege from the remote machines. You accidentally deleted the password file. What will be the consequence of this action?()A Both the sessions will be killed, and no new sessions will be created using the SYSDBA or SYSOPER privilege.B Both the sessions will remain active, but no new sessions will be created using the SYSDBA or SYSOPER privilege.CBoth the sessions will be killed, but new sessions will be created using the SYSDBA or SYSOPER privilege when the database restarts.D The database will crash, and no new sessions will be created using the SYSDBA or SYSOPER privilege when the database restarts.

单选题A network administrator of a company has many branch locations each using a subnet mask of 255.255.255.224. Which of the following dynamic routing protocols should be used?()AIPv6BRIPCIGRPDRIPv2

单选题A new HACMP maintenance level has recently been released. An administrator is creating a  project plan that is required for applying the updates for a three-node production cluster.  To minimize downtime,what is the best way to accomplish the updates on all cluster nodes?()A Perform a graceful takeover one node at a time and apply the updates.B Perform the updates on all nodes simultaneously using C-SPOC utilities.C Perform the updates on node at a time with the cluster software active.D Perform a graceful stop of all cluster nodes and apply updates to all nodes.

单选题A client is having problems connecting remotely after replacing a router. An administrator has just created an action plan. Which of the following is the NEXT step the administrator should perform to resolve this issue?()AImplement and test the solution.BDetermine if escalation is necessary.CIdentify the affected areas of the network.DIdentify the results and effects of the solution