An administrator attempts to create a link of /etc/db_conf to the target directory /db/v9.7/install/config. The following n?command failed toAn administrator attempts to create a link of /etc/db_conf to the target directory /db/v9.7/install/config. The following ?n?command failed to create the link.ln/db/v9.7/install/config /etc/db_conf. Which option should be used when re-running the command to resolve the problem?()A、-s flag to create a soft linkB、-n flag to force create a hard linkC、-N flag to force create a hard linkD、-S flag to force create a soft link

An administrator attempts to create a link of /etc/db_conf to the target directory /db/v9.7/install/config. The following n?command failed toAn administrator attempts to create a link of /etc/db_conf to the target directory /db/v9.7/install/config. The following ?n?command failed to create the link.ln/db/v9.7/install/config /etc/db_conf. Which option should be used when re-running the command to resolve the problem?()

  • A、-s flag to create a soft link
  • B、-n flag to force create a hard link
  • C、-N flag to force create a hard link
  • D、-S flag to force create a soft link

相关考题:

An administrator attempts a traceroute but receives a "Destination Unreadable" message. Which protocol is responsible for that message?() A. RARPB. RUDPC. ICMPD. SNMP

An administrator attempts a traceroute but receives a "Destination Unreadable" messagE.Which protocol is responsible for that message?() A.RARPB.RUDPC.ICMPD.SNMP

After creating a WebSphere Commerce instance, an administrator attempts to log on to the WebSphere Commerce Administration Console.  The browser reports a "500 Internal Server Error".  What could cause this to occur?()A、The web server was not startedB、The Payments Engine was not startedC、The WebSphere Commerce Payments instance was not startedD、The WebSphere Commerce application server was not startedE、The Configuration Manager service was not started

An administrator has implemented the following LPARs on a Power 570 with 32 GB memory with 512 MB remaining for allocation: LPAR 1 memory : min = 10 GB des = 15 GB max = 24 GB  LPAR 2memory : min = 10 GB des = 15 GB max = 24 GB The administrator receives a request to add 2 GB to LPAR 1. The only way to do this is by moving memory from LPAR 2 to LPAR 1. The administrator attempts to move the memory, but the operation fails. The administrator can  however allocate 512 MB that is free to LPAR 1 on the 570.  What is the most likely cause of this failure when dynamically moving memory?()A、 Maxperm% is set too low on LPAR 2B、 Insufficient paging space on LPAR 1C、 Service IBM.DRM is unavailable on LPAR 1D、 Insufficient pinnable memory frames available on LPAR 2

The Company security administrator wants to prevent VLAN hopping on the network.  What is one  method that can be used to do this?  ()A、 Attacks are prevented by utilizing the port-security feature.B、 An end station attempts to gain access to all VLANs by transmitting Ethernet frames in the  802.1q encapsulation.C、 Configuring an interface with the switchport mode dynamic command will prevent VLAN  hopping.D、 An end station attempts to redirect VLAN traffic by transmitting Ethernet frames in the 802.1q  encapsulation.E、 Configuring an interface with the "switchport mode access" command will prevent VLAN  hopping.

A system administrator installed a new switch using a script to configure it. IP connectivity was tested using pings to SwitchB. Later attempts to access NewSwitch using Telnet from SwitchA failed. Which statement is true?()A、Executing password recovery is required.B、The virtual terminal lines are misconfigured.C、Use Telnet to connect to RouterA and then to NewSwitch to correct the error.D、Power cycle of NewSwitch will return it to a default configuration.

An administrator attempts a traceroute but receives a "Destination Unreadable" message. Which protocol is responsible for that message?()A、RARPB、RUDPC、ICMPD、SNMP

The Company security administrator is concerned with layer 2 network attacks.  Which two  statements about these attacks are true? ()A、 ARP spoofing attacks are attempts to redirect traffic to an attacking host by encapsulating a  false 802.1Q header on a frame and causing traffic to be delivered to the wrong VLAN.B、 ARP spoofing attacks are attempts to redirect traffic to an attacking host by sending an ARP  message with a forged identity to a transmitting host.C、 MAC address flooding is an attempt to force a switch to send all information out every port byoverloading the MAC address table.D、 ARP spoofing attacks are attempts to redirect traffic to an attacking host by sending an ARP  packet that contains the forged address of the next hop router.E、 MAC address flooding is an attempt to redirect traffic to a single port by associating that port  with all MAC addresses in the VLAN.

An administrator attempts to install the latest security patches for an older server. When the administrator runs the patch installer, the install fails. The administrator tries again, and the installer fails again.  Which of the following is the MOST likely reason for this?()A、 The administrator improperly configured the virtual memory settings on the server.B、 The administrator is using incorrect patch switches for the install.C、 The administrator is trying to install security patches for software that is not installed.D、 The administrator is trying to install patches that require hard drive encryption on the server.

An administrator attempts to open a web page and sees the following error: 'Error 404: Page not found'. The administrator then uses the ping command and finds that the default gateway cannot be pinged. At which of the following layers does the problem MOST likely reside?()A、Layer 1B、Layer 4C、Layer 5D、Layer 7

An administrator adds a new SATA hard drive into a functional server and attempts to boot the server. The server will no longer boot into the operating system. The administrator checks all the connections and reboots the server. The server still will not load the operating system.  Which of the following is the MOST probable cause?()A、The BIOS is set with the wrong boot order.B、The jumpers have not been set on the hard drive.C、The hard drive is not compatible with the system board.D、The boot.ini file needs to be modified.

A System p administrator is investigating a possible security breech and wants to review  information about failed login attempts to the system.  Which of the following commands will show this()A、fwtmp  /etc/security/failedloginB、cat /etc/security/failedloginC、whoD、alog -f /etc/security/failedlogin -o

You deploy a Microsoft Exchange mobile messaging solution that uses Microsoft Windows Mobile 5.0 with Microsoft Messaging and Security Feature Pack.   The messaging infrastructure is configured to support the remote wipe feature.   When an administrator attempts to perform a remote wipe of a Windows Mobilebased device, the administrator receives a 401 error message.   You need to ensure that the administrator is authorized to perform remote wipes only.   What should you do?()A、Grant the administrator membership in the Domain Administrators group.B、Grant the administrator membership in the Exchange Administrators group.C、Add the new administrator account to the Discretionary Access Control List (DACL) of the Microsoft Exchange ActiveSync Administration folder.D、Select the Directory Security tab of the Exchange Server administration Web site, and then configure Read, Write, and Directory Browsing permissions.

单选题After creating a WebSphere Commerce instance, an administrator attempts to log on to the WebSphere Commerce Administration Console.  The browser reports a "500 Internal Server Error".  What could cause this to occur?()AThe web server was not startedBThe Payments Engine was not startedCThe WebSphere Commerce Payments instance was not startedDThe WebSphere Commerce application server was not startedEThe Configuration Manager service was not started

多选题To save time configuring some custom network facilities, a junior administrator in your company  attempts to copy some entries from the /etc/inetd.conf file on a Solaris 8 OS server into the /etc/inetd.conf on a Solaris 10 OS server. The junior administrator is unable to determine why services do not start.  Which two commands can you run on the Solaris 10 OS server to start the services?()Ainetconv -fBinetcfg -i /etc/inetd.confCinetcfg -o /etc/inetd.confDinetconv -f -i /etc/inetd.confEinetconv -forceimport -o /etc/inetd.conf

单选题An administrator attempts to add a new 100GB logical volume to the datavg volume group, which resides on hdisk1.  How can the administrator easily determine if there is enough space in datavg to create the logical volume()Alslg datavgBlspv datavgClsvg datavgDlslv hdisk1

单选题An administrator adds a new SATA hard drive into a functional server and attempts to boot the server. The server will no longer boot into the operating system. The administrator checks all the connections and reboots the server. The server still will not load the operating system.  Which of the following is the MOST probable cause?()AThe BIOS is set with the wrong boot order.BThe jumpers have not been set on the hard drive.CThe hard drive is not compatible with the system board.DThe boot.ini file needs to be modified.

单选题An administrator has implemented the following LPARs on a Power 570 with 32 GB memory with 512 MB remaining for allocation: LPAR 1 memory : min = 10 GB des = 15 GB max = 24 GB  LPAR 2memory : min = 10 GB des = 15 GB max = 24 GB The administrator receives a request to add 2 GB to LPAR 1. The only way to do this is by moving memory from LPAR 2 to LPAR 1. The administrator attempts to move the memory, but the operation fails. The administrator can  however allocate 512 MB that is free to LPAR 1 on the 570.  What is the most likely cause of this failure when dynamically moving memory?()A Maxperm% is set too low on LPAR 2B Insufficient paging space on LPAR 1C Service IBM.DRM is unavailable on LPAR 1D Insufficient pinnable memory frames available on LPAR 2

单选题An administrator attempts to create a link of /etc/db_conf to the target directory /db/v9.7/install/config. The following n?command failed toAn administrator attempts to create a link of /etc/db_conf to the target directory /db/v9.7/install/config. The following ?n?command failed to create the link.ln/db/v9.7/install/config /etc/db_conf. Which option should be used when re-running the command to resolve the problem?()A-s flag to create a soft linkB-n flag to force create a hard linkC-N flag to force create a hard linkD-S flag to force create a soft link

单选题An administrator attempts to install the latest security patches for an older server. When the administrator runs the patch installer, the install fails. The administrator tries again, and the installer fails again. Which of the following is the MOST likely reason for this?()AThe administrator improperly configured the virtual memory settings on the server.BThe administrator is using incorrect patch switches for the install.CThe administrator is trying to install security patches for software that is not installed.DThe administrator is trying to install patches that require hard drive encryption on the server.

单选题A user in your company network needs to encrypt a folder that is on her Windows 2000 Professional computer. Her computer has two drives: Drive C and Drive D. The folder that needs to be encrypted is located on Drive D. When the user attempts to encrypt the folder, no option for encryption can be found in the folder properties. What should you do to enable the user to encrypt the folder? ()ALog on to her computer as an administrator, and then run the cipher/e command.BInstruct the user to run the chipper/e command.CLog on to her computer as an administrator, and then run the Secedit/enforce command.DInstruct the user to run the Secedit/enforce command.ELog on to her computer as an administrator, and then run the Convert d:/FS:NTFS command.

单选题The merchant undertakes that no claim or allegation shall be made against any servant,agent or subcontractor of the carrier which()to impose upon any of them or any liability whatsoever in connection with the goods.Asupplies or attempts to supplyBimposes or attemptsCcomplies or attempts to complyDprovides or attempts to provide