Company.com performs cluster verification every Sunday night with a corn job. The systems administrator reviews the /var/hacmp/clverify/clverify.log on Monday morning and notice that cluster verification posted a message about inconsistent filesystem names in one of the shared volume groups. What should the administrator do?() A、 Cause a fallover to occur on the resource group.B、 Export the volume groups and re-import them on all nodes.C、 Run an importvg -L command on all the nodes in the cluster.D、 Investiage recent changes to the shared volume group and use C-SPOC to correct inconsistencies.
Company.com performs cluster verification every Sunday night with a corn job. The systems administrator reviews the /var/hacmp/clverify/clverify.log on Monday morning and notice that cluster verification posted a message about inconsistent filesystem names in one of the shared volume groups. What should the administrator do?()
- A、 Cause a fallover to occur on the resource group.
- B、 Export the volume groups and re-import them on all nodes.
- C、 Run an importvg -L
command on all the nodes in the cluster. - D、 Investiage recent changes to the shared volume group and use C-SPOC to correct inconsistencies.
相关考题:
controls the operation of the computer and performs its data processing functions.A.CPUB.DiskC.MemoryD.I/O
Your organization decided to upgrade the existing Oracle 10g database to Oracle 11g database in a multiprocessor environment. At the end of the upgrade, you observe that the DBA executes the following script:SQL @utlrp.sqlWhat is the significance of executing this script?()A. It performs parallel recompilation of only the stored PL/SQL code.B. It performs sequential recompilation of only the stored PL/SQL code.C. It performs parallel recompilation of any stored PL/SQL as well as Java code.D. It performs sequential recompilation of any stored PL/SQL as well as Java code.
Users are reporting problems connecting to servers in the remote company.com domain. The administrator suspects this to be a DNS problem.Which of the following commands would the administrator run to identify the DNS server of the remote company.com?()A. dig company.com nsB. ipconfig/allC. ifconfig-aD. dig company.com mx
Which three functions are associated with a Cisco Unified CallManager? ()A、 connects traditional telephony devices to voice over IP infrastructureB、 converts analog signals to digital formatC、 performs voice compressionD、 performs call processingE、 performs dial plan administrationF、 performs signaling and device control
What is the meaning of the default value of the EIGRP variance command of 1? ()A、Only the path that is the feasible successor should be used.B、Load balancing is disabled on t his router.C、The router only performs equal - cost load balancing on all paths that have a metric greater than 1D、The router performs equal - cost load balancing.
()performs 2 basic functions: marketing and logistics.A、paper wrappingB、PackagingC、warehouseD、transportation
Which of the following server types performs the same function as the HOSTS file?()A、 FTPB、 DHCPC、 DNSD、 WINS
Users are reporting problems connecting to servers in the remote company.com domain. The administrator suspects this to be a DNS problem. Which of the following commands would the administrator run to identify the DNS server of the remote company.com?()A、dig company.com nsB、ipconfig/allC、ifconfig-aD、dig company.com mx
Which of the following statement is incorrect regarding RMAN?()A、It detects corrupt blocks.B、It performs only offline database backups.C、It omits empty blocks during backups.D、It performs tablespace point-in-time recovery (TSPITR).
You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com policy prohibits the users from changing their password by using Outlook Web App (OWA). What should you do?()A、The best option is to set up an Outlook Web App Mailbox policy so that the users comply with the Company.com policy.B、The best option is to set up a Group Policy Object so that the users comply with the Company.com policy.C、The best option is to change the authentication settings of the OWA virtual directory so that the users comply with the Company.com policy.D、The best option is to change the authentication settings of the IISADMPWD virtual directory so that the users comply with the Company.com policy.
You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com policy prohibits the users from changing their password by using Outlook Web App (OWA).However, they can use Windows to change their passwords.What should you do?()A、The best option is to configure the settings on the Segmentation tab, in the properties of the OWA virtual directory so that the users comply with the Company.com policy.B、The best option is to configure the settings on the Account tab, in the properties of the user accounts so that the users comply with the Company.com policy.C、The best option is to configure the settings on the Mailbox Features tab, in the properties of the mailboxes so that the users comply with the Company.com policy.D、The best option is to configure the settings on the Authentication tab, in the properties of the OWA virtual directory so that the users comply with the Company.com policy.
You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com security policy prohibits the employees to send certain words between them.What should you do?()A、The best option is to create an Outlook Protection Rule to comply with the Company.com security policy.B、The best option is to set up a content filtering feature to comply with the Company.com security policy.C、The best option is to create a transport rule to comply with the Company.com security policy.D、The best option is to set up a sender reputation feature to comply with the Company.com security policy.
单选题Company.com performs cluster verification every Sunday night with a corn job. The systems administrator reviews the /var/hacmp/clverify/clverify.log on Monday morning and notice that cluster verification posted a message about inconsistent filesystem names in one of the shared volume groups. What should the administrator do?()A Cause a fallover to occur on the resource group.B Export the volume groups and re-import them on all nodes.C Run an importvg -L command on all the nodes in the cluster.D Investiage recent changes to the shared volume group and use C-SPOC to correct inconsistencies.
单选题Which of the following server types performs the same function as the HOSTS file?()A FTPB DHCPC DNSD WINS
单选题You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com security policy prohibits the employees to send certain words between them.What should you do?()AThe best option is to create an Outlook Protection Rule to comply with the Company.com security policy.BThe best option is to set up a content filtering feature to comply with the Company.com security policy.CThe best option is to create a transport rule to comply with the Company.com security policy.DThe best option is to set up a sender reputation feature to comply with the Company.com security policy.
单选题Company.com performs a cluster verification on a regular basis. Cluster verification is successfulbut the cluster sometimes fails to start the applications during a fallover. Investigation of the issue has revealed that the non-shared component of the application configuration information is not being kept up to date on the secondary nodes. What can be used to help resolve this issue?()A A pre-eventB Error notificationC Application monitoringD Custom verification methods
单选题Your organization decided to upgrade the existing Oracle 10g database to Oracle 11g database in a multiprocessor environment. At the end of the upgrade,you observe that the DBA executes the following script: SQL @utlrp.sql What is the significance of executing this script?()A It performs parallel recompilation of only the stored PL/SQL code.B It performs sequential recompilation of only the stored PL/SQL code.C It performs parallel recompilation of any stored PL/SQL as well as Java code.D It performs sequential recompilation of any stored PL/SQL as well as Java code.
单选题You enable block change tracking. You issue the following command: BACKUP INCREMENTAL LEVEL 0 DATABASE; The next day, you issue the following command: BACKUP INCREMENTAL LEVEL 1 CUMULATIVE DATABASE; Which statement about the use of the change tracking file is true?()ARMAN reads the block change tracking file only when it performs the incremental level 0 backup.BRMAN reads the block change tracking file when it performs both incremental backups.CRMAN reads the block change tracking file only when it performs the incremental level 1 backup.DRMAN does not read the block change tracking file when it performs either incremental backup.
单选题Which of the following statement is incorrect regarding RMAN?()AIt detects corrupt blocks.BIt performs only offline database backups.CIt omits empty blocks during backups.DIt performs tablespace point-in-time recovery (TSPITR).