单选题Which system administration command you can use to update Id.so.cache after the installation of new shared libraries?()A IdconfigB IddC libpathD newlibs

单选题
Which system administration command you can use to update Id.so.cache after the installation of new shared libraries?()
A

 Idconfig

B

 Idd

C

 libpath

D

 newlibs


参考解析

解析: 暂无解析

相关考题:

It is a kind of online service system, on which you can publish and exchange information with others who also are the members of the system.On which you can paste your articles and answer the questions asked by the members of the system and you can also look for help here.It isA.BBSB.WWWC.E-mailD.TELNET

Which CLI command do you use to determine which files are cleanup candidates?() A. request system storage cleanup candidatesB. request system services storage candidatesC. request system services candidate cleanupD. request system storage cleanup dry-run

Which command do you use to display the status of an antivirus database update?() A. show security utm anti-virus statusB. show security anti-virus database statusC. show security utm anti-virus databaseD. show security utm anti-virus update

Which command do you use to display the messages seen during the last system boot?() A. show system boot-messagesB. show chassis messagesC. show file system boot-messagesD. show boot-log messages

You are asked to free up disk space so you can update your version of the Junos OS.Which two commands display the files that will be removed?() A. user@router request system storage cleanupB. user@router show system storageC. user@router request system storage cleanup dry-runD. user@router show system storage detail

Which of the following answer choices are correct characteristics of named access list?() A. You can delete individual statements in a named access listB. Named access lists require a numbered range from 1000 to 1099.C. Named access lists must be specified as standard or extended.D. You can use the ip access-list command to create named access lists.E. You cannot delete individual statements in a named access list.F. You can use the ip name-group command to apply named access lists.

Which of the following answer choices are correct characteristics of named access list?()A、You can delete individual statements in a named access listB、Named access lists require a numbered range from 1000 to 1099.C、Named access lists must be specified as standard or extended.D、You can use the ip access-list command to create named access lists.E、You cannot delete individual statements in a named access list.F、You can use the ip name-group command to apply named access lists.

A system administrator has successfully backed up the VIOS software and is ready to perform a VIOS software update. Which command will the administrator use to update the software from a CD? ()A、 smit update_allB、 geninstall -d /dev/cd0 allC、 installp -acgX -d /dev/cd0 allD、 updateios -dev /dev/cd0 -accept -install

You need to restore some files from a file system. The file system was backed up from a snapshot.  Which command will correctly restore these files?()A、 fssnap -iB、 fssnap -rC、 ufsrestore -iD、 snaprestore -i

Which command can you use to determine the cisco ios feature set on a cisco router?()A、show versionB、dir flash:include iosC、show environmentD、show diagE、show inventory

Which system administration command you can use to update Id.so.cache after the installation of new shared libraries?()A、 IdconfigB、 IddC、 libpathD、 newlibs

Which command can a system administrator use to verify that a tape is in backup format and is readable by the system?()A、tarB、tctlC、tcopyD、restore

A customer wants to update their system with the latest drivers. Which tools would you suggest of the following?()A、Bootable Media CreatorB、Advanced Settings UtilityC、Update Express System Pack InstallerD、ServerGuide Scripting Toolkit

You are the administrator of your company's network. You are preparing to deploy 20 new Windows 2000 Professional computers on your network. You want to be able to recover from disk failures and corrupt system files on the new computers. You want to configure the computers to automatically update their system configuration and emergency repair files on a scheduled bases.   What should you do?()A、Use the at command to schedule a weekly job to back up the boot partition.B、Use the at command to schedule a weekly job to run the system file checker.C、Use Windows backup to schedule a backup of the System State Data.D、Use Windows backup to schedule a backup of the system partition and the boot partition.

Your company uses Windows Update to download and install security updates on client computers. When Microsoft releases a security update, you have the following requirements:   Establish which client computers require the security update.   Identify what changes will occur as a result of the security update.  Identify which applications might be affected by the security update.    You need to select the appropriate tool to detect application-compatibility issues.   What should you do?()A、Use the Inventory Collector.B、Use the Setup Analysis Tool.C、Use the Update Compatibility Evaluator.D、Use the Windows Compatibility Evaluator.

You are planning to upgrade Internet Explorer.   You have the following requirements:   Create a report that identifies which computers are successfully upgraded. Do not install additional software on the client computers.   You need to design a deployment method that meets the requirements.   What should you do?()A、Use Internet Explorer Administration Kit (IEAK) and Group Policy.B、Use Microsoft System Center Configuration Manager.C、Use Windows Server Update Services (WSUS).D、Use Microsoft System Center Essentials.

单选题You need to restore some files from a file system. The file system was backed up from a snapshot.  Which command will correctly restore these files?()A fssnap -iB fssnap -rC ufsrestore -iD snaprestore -i

单选题Which command do you use to display the status of an antivirus database update?()Ashow security utm anti-virus statusBshow security anti-virus database statusCshow security utm anti-virus databaseDshow security utm anti-virus update

单选题Which command can you use to determine the cisco ios feature set on a cisco router?()Ashow versionBdir flash:include iosCshow environmentDshow diagEshow inventory

多选题You are asked to free up disk space so you can update your version of the Junos OS.Which two commands display the files that will be removed?()Auser@router request system storage cleanupBuser@router show system storageCuser@router request system storage cleanup dry-runDuser@router show system storage detail

单选题Which command do you use to show active alarms?()Ashow hardware stateBshow system alarmsCshow chassis stateDshow services alarms

单选题Which command do you use to display the messages seen during the last system boot?()Ashow system boot-messagesBshow chassis messagesCshow file system boot-messagesDshow boot-log messages

单选题One of the users in the PROD database, Adams, complains that his update on the table, TRANS, is taking an unusually long time to complete. You find that the table gets locked by another database user before Adams starts his transactions, and you are unable to contact the user holding the table lock. As Adams is updating some crucial rows in the table, he should get the highest priority. Which method would you use to overcome this problem?()Aexecute the command, ALTER SESSION KILL .., to kill the blocking sessionBexecute the DBMS_SESSION.KILL_SESSION procedure to kill the blocking sessionCexecute the command, ALTER SYSTEM KILL SESSION .., to kill the blocking sessionDexecute the command, ALTER SESSION UNLOCK .., to release the lock for the blocking sessionEexecute the command, ALTER SYSTEM UNLOCK SESSION .., to release the lock for the blocking session

单选题Which CLI command do you use to determine which files are cleanup candidates?()Arequest system storage cleanup candidatesBrequest system services storage candidatesCrequest system services candidate cleanupDrequest system storage cleanup dry-run

单选题You are the network administrator for All network servers run Windows Server 2003. You install Software Update Services (SUS) on one server. You configure the following settings: 1. Do not use a proxy server for Internet access. 2. Synchronize directly from the Microsoft Windows Update servers. 3. Automatically approve new versions of previously approved updates. 4. Save updates in a local folder. You perform a manual synchronization. Now you need to back up the critical information that is related to your installation of SUS. What should you do?()AFirst, use the Backup utility to back up the System State data. Then, use the IIS administration tool to back up the default Web site.BFirst, use the IIS administration tool to back up the default Web site. Then, use the Backup utility to back up the System State data.CFirst, use the IIS administration tool to back up the IIS metabase. Then, use the Backup utility to back up the IIS metabase file, the default Web site, and the content storage location.DFirst, use the Backup utility to back up the IIS metabase file, the default Web site, and the content storage location. Then, use the IIS administration tool to back up the IIS metabase.

单选题Which CLI command do you use to determine which files are cleanup candidates?()Arequest system storage cleanup candidatesBrequest sytem services storage candidatesCrequest system services candidate cleanupDrequest system storage cleanup dry-run

单选题A system administrator has successfully backed up the VIOS software and is ready to perform a VIOS software update. Which command will the administrator use to update the software from a CD? ()A smit update_allB geninstall -d /dev/cd0 allC installp -acgX -d /dev/cd0 allD updateios -dev /dev/cd0 -accept -install