单选题After factory-defaults have been loaded, which two syslog files will be present in the configuration?()Asystem and chassisdBsyslog-messages and NVRAMCmessages and interactive-commandsDauthorization and events

单选题
After factory-defaults have been loaded, which two syslog files will be present in the configuration?()
A

system and chassisd

B

syslog-messages and NVRAM

C

messages and interactive-commands

D

authorization and events


参考解析

解析: 暂无解析

相关考题:

You have enabled backup optimization for the RMAN environment.Identify two criteria on which RMAN will skip the file, if it has already been backed up.() A. The data file backup is done with multiple channelsB. The data files is in the read-write mode after being backed up in the read only modeC. The backup was taken after the data files was taken offline-normal or is in the read only modeD. The data file backup complies with the back retention policy and the backup duplexing feature

You have enabled backup optimization for the RMAN environment. Identify two criteria on which RMAN will skip the file, if it has already been backed up.() (Choose two.) A. The data file backup is done with multiple channelsB. The data files is in the read-write mode after being backed up in the read only modeC. The backup was taken after the data files was taken offline-normal or is in the read only modeD. The data file backup complies with the back retention policy and the backup duplexing feature

After factory-defaults have been loaded, which two syslog files will be present in the configuration?() A.system and chassisdB.syslog-messages and NVRAMC.messages and interactive-commandsD.authorization and events

Which three statements about Syslog utilization are true?() A.Utilizing Syslog improves network performance.B.The Syslog server automatically notifies the network administrator of network problems.C.A Syslog server provides the storage space necessary to store log files without using router disk space.D.There are more Syslog messages available within Cisco IOS than there are comparable SNMP trap messages.E.Enabling Syslog on a router automatically enables NTP for accurate time stamping。F.A Syslog server helps in aggregation of logs and alerts.

Which three statements about Syslog utilization are true?()A、Utilizing Syslog improves network performance.B、The Syslog server automatically notifies the network administrator of network problems.C、A Syslog server provides the storage space necessary to store log files without using router disk space.D、There are more Syslog messages available within Cisco IOS than there are comparable SNMP trap messages.E、Enabling Syslog on a router automatically enables NTP for accurate time stamping。F、A Syslog server helps in aggregation of logs and alerts.

After factory-defaults have been loaded, which two syslog files will be present in the configuration?()A、system and chassisdB、syslog-messages and NVRAMC、messages and interactive-commandsD、authorization and events

A corrupted file system is now repaired and back in use. Some, but not all of the files within the file  systems have been deleted. The only backup of this file system is a month-old tar archive. This archive will need to be restored as root.  Which two statements correctly describe the effects of the restore operation?()A、 Files found in the file system that are also on tape will NOT be overwritten.B、 The missing files, present on the backup tape, are restored to the file system with the data as it was when the backup was taken.C、 The access times are preserved by tar and will reflect the time when a user last accessed the data.D、 The modification time on the files restored by tar will be preserved and will reflect the time the file was last modified before the backup, NOT the time of the restore operation.

You have enabled backup optimization for the RMAN environment. Identify two criteria on which RMAN will skip the file, if it has already been backed up.() (Choose two.)A、The data file backup is done with multiple channelsB、The data files is in the read-write mode after being backed up in the read only modeC、The backup was taken after the data files was taken offline-normal or is in the read only modeD、The data file backup complies with the back retention policy and the backup duplexing feature

Which two locations can be configured as a source for the IOS image in the boot system command?()A、RAMB、NVRAMC、flash memoryD、HTTP serverE、TFTP serverF、Telnet server

A patch has been applied to the operating system.  After rebooting, the system is hung.  Which of the following commands should have been performed to prevent the system from hanging?()A、 lppchk, bosboot B、 lslpp -l, oslevel C、 installp -C, lppchk D、 bosboot, synclvodm

At system install, the /etc/syslog.conf file specifies that messages be logged for which facilities?()A、communicationsB、kernelC、securityD、none

System configurations on the HMC have been backed up correctly. After a restore, the partitions are defined with different characteristics than the running systems. What is the most probable cause of this problem?()A、The LPAR Configuration backup is corruptB、The LPAR Configuration has been altered using DLPARC、The LPAR Configuration backup was performed on a different HMCD、The LPAR Configuration has been altered through the Advanced System Management Interface (ASMI) on the server after the backup was performed

You execute the following Recovery Manager (RMAN) commands in he following order:   BACKUP VALIDATE DATABAE RECOVER CORRUPTION LIST;   Which two tasks are performed by these commands?()  A、 Repair the corrupted blocks. If any. In the backup createdB、 Populate VSCOPV_CORRUPTION with names of files that have corrupted blocksC、 Back up the database after checking whether array of the files have corrupted blocksD、 Discover any corrupt blocks that are viewable with the VSDATABASE_BI-OCK_CORBUPTION viewE、 Repair all corrupted blocks that have been logged in the VSDATABASE_BLOCK_ CORRUPTION

You have a durable subscriber, and the subscriber is down or not reachable when the message is  produced. Which two options regarding the expiry of these messages are true?()A、after the subscriber is unavailable for 10 minutesB、when the subscriber is availableC、after the subscriber is unavailable for after an hourD、are available until the specified time elapsesE、are expired instantly

You have enabled backup optimization for the RMAN environment. Identify two criteria on which RMAN will skip the file, if it has already been backed up.()A、 The data file backup is done with multiple channelsB、 The data files is in the read-write mode after being backed up in the read only modeC、 The backup was taken after the data files was taken offline-normal or is in the read only modeD、 The data file backup complies with the back retention policy and the backup duplexing fe ture

You decided to use Direct NFS configuration in a non-RAC Oracle installation and created the oranfstab file in /etc. Which two statements are true regarding this oranfstab file?())  A、 Its entries are specific to a single database.B、 It contains file systems that have been mounted by Direct NFS.C、 It is globally available to all Oracle 11g databases on the machine.D、 It contains file systems that have been mounted by the kernel NFS system.

The loss of which two types of files may require a recovery with the RESETLOGS option?()A、 control filesB、 password fileC、 archived log filesD、 system-critical data files for which all the redo entries are presentE、 non-system-critical data files for which all the redo entries are present

Two data files have been deleted at the operating system level by accident. Your database is running in ARCHIVELOG mode and online backups are taken nightly. One of the data files that has been deleted belongs to the USERS tablespace on the other belongs to the SYSTEM tablespace. How can you recover from this situation?()A、Shut down the database, restore the two data files and then start up the database. B、Take the system and users tablespace offline, restore the two data files, recover the two datafiles, and then bring the SYSTEM and USERS tablespaces online. C、Shut down the database, restore the two data files, start up the database in MOUNT mode, recover the two data files, and then alter the database open. D、Take the SYSTEM and USERS tablespaces offline, recover the two datafiles and then bring the SYSTEM and USERS tablespaces online.

单选题Two data files have been deleted at the operating system level by accident. Your database is running in ARCHIVELOG mode and online backups are taken nightly. One of the data files that has been deleted belongs to the USERS tablespace on the other belongs to the SYSTEM tablespace. How can you recover from this situation?()AShut down the database, restore the two data files and then start up the database. BTake the system and users tablespace offline, restore the two data files, recover the two datafiles, and then bring the SYSTEM and USERS tablespaces online. CShut down the database, restore the two data files, start up the database in MOUNT mode, recover the two data files, and then alter the database open. DTake the SYSTEM and USERS tablespaces offline, recover the two datafiles and then bring the SYSTEM and USERS tablespaces online.

单选题System configurations on the HMC have been backed up correctly. After a restore, the partitions are defined with different characteristics than the running systems. What is the most probable cause of this problem?()AThe LPAR Configuration backup is corruptBThe LPAR Configuration has been altered using DLPARCThe LPAR Configuration backup was performed on a different HMCDThe LPAR Configuration has been altered through the Advanced System Management Interface (ASMI) on the server after the backup was performed

多选题The loss of which two types of files may require a recovery with the RESETLOGS option?()Acontrol filesBpassword fileCarchived log filesDsystem-critical data files for which all the redo entries are presentEnon-system-critical data files for which all the redo entries are present

单选题A system administrator had a disk failure on an HMC. The disk was replaced and the HMC was loaded from the Product Recovery CD. The system administrator had performed a backup to DVD of the HMC data before the system failed. After restoring the backup files, it was noticed that no profile files were restored. What is the most likely cause of this problem?()AThe profile data was not initialized after restoring the backup CDBThe profile data was not backed up before doing the Critical Console Data backupCA Critical Console Data backup was performed which backs up user data, but not profile dataDA Save Upgrade data was done instead of a backup Critical Console Data and the profile files were not included

多选题A corrupted file system is now repaired and back in use. Some, but not all of the files within the file  systems have been deleted. The only backup of this file system is a month-old tar archive. This archive will need to be restored as root.  Which two statements correctly describe the effects of the restore operation?()AFiles found in the file system that are also on tape will NOT be overwritten.BThe missing files, present on the backup tape, are restored to the file system with the data as it was when the backup was taken.CThe access times are preserved by tar and will reflect the time when a user last accessed the data.DThe modification time on the files restored by tar will be preserved and will reflect the time the file was last modified before the backup, NOT the time of the restore operation.

单选题In addition to writing information to a trace file, the Cisco CRS System sends standard event logging messages to a syslog server through which service?()ASNMP TrapBAlarm  CCDP  DWin32

单选题A patch has been applied to the operating system.  After rebooting, the system is hung.  Which of the following commands should have been performed to prevent the system from hanging?()A lppchk, bosboot B lslpp -l, oslevel C installp -C, lppchk D bosboot, synclvodm

单选题Which RMAN command is used to verify the status of a backup or copy, and also updates the repository when files have been deleted using operating system commands?()ACHANGEBRESYNCCCATALOGDCROSSCHECK

单选题At system install, the /etc/syslog.conf file specifies that messages be logged for which facilities?()AcommunicationsBkernelCsecurityDnone