单选题A system administrator can create logical volumes and then add file systems to them, or create the file system directly. What is an advantage of the two-step approach instead of the one-step approach?()AThe number of bytes per inode can be specified.BPlacement of the filesystem on the disk can be specified.CThe jfslog can be specified on creation of the filesystem.DEither a JFS or JFS2 filesystem can be created on the logical volume.
单选题
A system administrator can create logical volumes and then add file systems to them, or create the file system directly. What is an advantage of the two-step approach instead of the one-step approach?()
A
The number of bytes per inode can be specified.
B
Placement of the filesystem on the disk can be specified.
C
The jfslog can be specified on creation of the filesystem.
D
Either a JFS or JFS2 filesystem can be created on the logical volume.
参考解析
解析:
暂无解析
相关考题:
The ‘fsck -p /dev/lv00’command returned thefollowing message: Not a recognized filesystem type What is the likely cause of the problem and how should it be resolved?() A.The file system superblock is dirty. It can be replaced from the VGDAB.The logical volume superblock is dirty. It can be replaced from the VGDAC.The file system superblock is dirty. It can be replaced from the secondary copyD.The logical volume superblock is dirty. It can be replaced from the secondary copy
All of the following statements accurately describe process for administering file systems EXCEPT:() A.A logical volume must exist prior to running the crfs command to create a file systemB.A file system must be unmounted before it can be removedC.Defining a file system imposes a structure on a logical volumeD.Removing a file system using rmfs automatically removes the underling logical volume
Which of the following statements is TRUE about mounting a file system?() A.A file system cannot be mounted on a directory containing data.B.Mounting a file system on a mount point containing data will delete the data.C.Mounting a file system on a amount point containing data will make the data temporarily inaccessible.D.A systems administrator must manually create an empty directory prior to mounting an AIX JFS.
A storage specialist needs to automate some tasks triggered in the event of disaster recovery. What is the best solution to accomplish this()A、using the DS GUI, step through Real Time Manager, Copy Services, Create custom scripts; actions and event conditions can be defined that triggerthe script; there is no need for a passwordB、create a shell script usingdscli commands; trigger the script from the operating system, and call the script using the -pwd option with the passwordC、create a password file; create a shell script using dscli commands; trigger the script from the operating systemD、create a password file; create a shell script usingdscli commands; trigger the script from the operating system; call the dscli script with the dscli -script -pwdfile command
Which two statements are true about the rescue configuration file?()A、It gets updated automatically when you commit.B、You need to create it by issuing request system configuration rescue save.C、It is rollback file number 50 and you can recover it by issuing rollback 50.D、You can load it by entering rollback rescue.
You are the administrator of ExamSheet's network. The software department is preparing to rewrite an accounting application so that it will run on Windows 2000 Professional computers. All of the computers in the software department currently use Windows 98. You plan to configure the computers in the software department so that users can use both Windows 98 and Windows 2000 Professional during the project. You want to ensure that users in the software department can access all of the files on their computers while using operating system. What should you do?()A、Create and format an NTFS volume. Install Windows 2000 Professional on the volume. Create a primary partition in the remaining disk space and format the volume using the FAT32 file system.Reinstall Windows 98 on the new primary partition. B、Create and format an NTFS volume. Install Windows 2000 Professional on the volume. Create an extended partition in the remaining disk space and format the volume using the FAT32 file system. Reinstall Windows 98 on the new extended partition. C、Create and format and extended partition. Create a logical drive within the extended partition and format the drive with the FAT32 file system. Install Windows 2000 Professional on the new partition. D、Create and format an extended partition. Create a logical drive within the extended partition and format the drive with the NTFS file system. Install Windows 2000 Professional on the new partition.
Which of the following statements are FALSE concerning the defragfs command?()A、 The defragfs command should not be run against file systems and logical volumes that contain mostly transitory information, such as /tmp.B、 The defragfs command should not be run on a large JFS2 file system when running on a 32-bit kernel.C、 The defragfs command can improve file system performance by increasing the file system’s contiguous free space.D、 The defragfs command can only be run against file systems that are mounted with read-write permissions.
The ‘fsck -p /dev/lv00’ command returned the following message:Not a recognized filesystem type. What is the likely cause of the problem and how should it be resolved?()A、The file system superblock is dirty. It can be replaced from the VGDAB、The logical volume superblock is dirty. It can be replaced from the VGDAC、The file system superblock is dirty. It can be replaced from the secondary copyD、The logical volume superblock is dirty. It can be replaced from the secondary copy
All of the following statements accurately describe process for administering file systems EXCEPT:()A、A logical volume must exist prior to running the crfs command to create a file systemB、A file system must be unmounted before it can be removedC、Defining a file system imposes a structure on a logical volumeD、Removing a file system using rmfs automatically removes the underling logical volume
A system contains multiple hot-swap stand-alone disks with a large number of JFS2 file systems. Which feature of JFS2 can be used to improve reliability, availability and serviceability (RAS) if a disk failure occurs?()A、Inline loggingB、Dynamic inode allocationC、Linear directory organizationD、Online filesystem defragmentation
The Chief Information Officer (CIO) is preparing a briefing about the reliability of their server environment. There is a need to create a report about which systems had unplanned system outages and how often they occurred. What IBM Director tool can be used to create the report?()A、Capacity ManagerB、Process Management toolC、System Availability toolD、System Reporting tool
A system administrator can create logical volumes and then add file systems to them, or create the file system directly. What is an advantage of the two-step approach instead of the one-step approach?()A、The number of bytes per inode can be specified.B、Placement of the filesystem on the disk can be specified.C、The jfslog can be specified on creation of the filesystem.D、Either a JFS or JFS2 filesystem can be created on the logical volume.
An administrator can create logical volumes and then add file systems to them, or create the file system directly. What is an dvantage of the two-step approach instead of the one-step approach()A、The number of bytes per inode can be specified.B、Placement of the filesystem on the disk can be specified.C、The jfslog can be specified on creation of the filesystem.D、Either a JFS or JFS2 filesystem can be created on the logical volume.
The data file belonging to the SYSTEM tablespace is corrupted and no backup of the file is available. How do you recover the data file?()A、The data file cannot be recovered.B、The date file can be restored from the SYSTEM auto backup.C、Take thetablespaceoffline,drop,kand re-create it.D、Recovery Manager (RMAN) is used to recover the data file.E、The ALTER DATABSE CREATE DATAFILE..commandis used to recover the data file.
You need to ensure that you can recover system configuration and data if your computer hard disk fails. What should you do? ()A、Create a system restore point.B、Create a backup of all file categories.C、Create a Complete PC Backup and Restore image.D、Perform an Automated System Recovery (ASR) backup.
You are developing an application to create a new file on the local file system.You need to define specific security settings for the file. You must deny the file inheritance of any default security settings during creation.What should you do?()A、Create the file by using a new FileStream object by passing the FileSecurity object as a parameter to the FileStream constructor.B、Create a new FileSecurity object.C、Apply the permissions by using the File class.D、Create a new FileSystem Access Rule object for each permission that you need,and add each rule to the FileSecurity object.E、Create a new FileSystem Audit Rule object and add it to the FileSecurity object.
Company.com needs to add a new file system to an existing volume group that is being made Highly available by HACMP? What is the best procedure that minimizes down time of the applications?() A、 Use C-SPOC to add the file system while the cluster is running.B、 Add the file system,and them perform the exportvg and importvg on the required nodes.C、 Stop the cluster,add the new file system, and synchronize the cluster then restart HACMP.D、 Break the reservation locks on the disk drives while the cluster is active and add the file system.
单选题An administrator can create logical volumes and then add file systems to them, or create the file system directly. What is an dvantage of the two-step approach instead of the one-step approach()AThe number of bytes per inode can be specified.BPlacement of the filesystem on the disk can be specified.CThe jfslog can be specified on creation of the filesystem.DEither a JFS or JFS2 filesystem can be created on the logical volume.
单选题You are the administrator of ExamSheet's network. The software department is preparing to rewrite an accounting application so that it will run on Windows 2000 Professional computers. All of the computers in the software department currently use Windows 98. You plan to configure the computers in the software department so that users can use both Windows 98 and Windows 2000 Professional during the project. You want to ensure that users in the software department can access all of the files on their computers while using operating system. What should you do?()ACreate and format an NTFS volume. Install Windows 2000 Professional on the volume. Create a primary partition in the remaining disk space and format the volume using the FAT32 file system.Reinstall Windows 98 on the new primary partition. BCreate and format an NTFS volume. Install Windows 2000 Professional on the volume. Create an extended partition in the remaining disk space and format the volume using the FAT32 file system. Reinstall Windows 98 on the new extended partition. CCreate and format and extended partition. Create a logical drive within the extended partition and format the drive with the FAT32 file system. Install Windows 2000 Professional on the new partition. DCreate and format an extended partition. Create a logical drive within the extended partition and format the drive with the NTFS file system. Install Windows 2000 Professional on the new partition.
多选题Which two statements are true about the rescue configuration file?()AIt gets updated automatically when you commit.BYou need to create it by issuing request system configuration rescue save.CIt is rollback file number 50 and you can recover it by issuing rollback 50.DYou can load it by entering rollback rescue.
单选题A system administrator can create logical volumes and then add file systems to them, or create the file system directly. What is an advantage of the two-step approach instead of the one-step approach?()AThe number of bytes per inode can be specified.BPlacement of the filesystem on the disk can be specified.CThe jfslog can be specified on creation of the filesystem.DEither a JFS or JFS2 filesystem can be created on the logical volume.
单选题Which of the following statements is TRUE about mounting a file system?()AA file system cannot be mounted on a directory containing data.BMounting a file system on a mount point containing data will delete the data.CMounting a file system on a amount point containing data will make the data temporarily inaccessible.DA systems administrator must manually create an empty directory prior to mounting an AIX JFS.
单选题The ‘fsck -p /dev/lv00’command returned thefollowing message: Not a recognized filesystem type What is the likely cause of the problem and how should it be resolved?()AThe file system superblock is dirty. It can be replaced from the VGDABThe logical volume superblock is dirty. It can be replaced from the VGDACThe file system superblock is dirty. It can be replaced from the secondary copyDThe logical volume superblock is dirty. It can be replaced from the secondary copy
单选题The data file belonging to the SYSTEM tablespace is corrupted and no backup of the file is available. How do you recover the data file?()AThe data file cannot be recovered.BThe date file can be restored from the SYSTEM auto backup.CTake thetablespaceoffline,drop,kand re-create it.DRecovery Manager (RMAN) is used to recover the data file.EThe ALTER DATABSE CREATE DATAFILE..commandis used to recover the data file.
单选题Company.com needs to add a new file system to an existing volume group that is being made Highly available by HACMP? What is the best procedure that minimizes down time of the applications?()A Use C-SPOC to add the file system while the cluster is running.B Add the file system,and them perform the exportvg and importvg on the required nodes.C Stop the cluster,add the new file system, and synchronize the cluster then restart HACMP.D Break the reservation locks on the disk drives while the cluster is active and add the file system.
单选题Which of the following statements are FALSE concerning the defragfs command?()A The defragfs command should not be run against file systems and logical volumes that contain mostly transitory information, such as /tmp.B The defragfs command should not be run on a large JFS2 file system when running on a 32-bit kernel.C The defragfs command can improve file system performance by increasing the file system’s contiguous free space.D The defragfs command can only be run against file systems that are mounted with read-write permissions.
单选题All of the following statements accurately describe process for administering file systems EXCEPT:()AA logical volume must exist prior to running the crfs command to create a file systemBA file system must be unmounted before it can be removedCDefining a file system imposes a structure on a logical volumeDRemoving a file system using rmfs automatically removes the underling logical volume
单选题A system contains multiple hot-swap stand-alone disks with a large number of JFS2 file systems. Which feature of JFS2 can be used to improve reliability, availability and serviceability (RAS) if a disk failure occurs?()AInline loggingBDynamic inode allocationCLinear directory organizationDOnline filesystem defragmentation