Which registry variable should be set to keep the buffer pools in memory on AIX and Linux?()A、DB2_KEEP_BP  B、DB2_PINNED_BP  C、DB2MEMDISCLAIM  D、DB2MEMMAXFREE

Which registry variable should be set to keep the buffer pools in memory on AIX and Linux?()

  • A、DB2_KEEP_BP  
  • B、DB2_PINNED_BP  
  • C、DB2MEMDISCLAIM  
  • D、DB2MEMMAXFREE

相关考题:

下列属于恢复系统镜像的是( ) A.PartitionMagicB. Registry MedicC.GhostD.Realplayer

You are the administrator responsible for security and user desktop settings on your network. You need to configure a custom registry entry for all users. You want to add the custom registry entry into a Group Policy object (GPO) with the least amount of administrative effort.What should you do?A.Configure an ADM template and add the template to the GPO.B.Configure an INF policy and add the policy to the GPO.C.Configure a Microsoft Windows installer package and add the package to the GPO.D.Configure RIS to include the registry entry.

Bob, a support technician, is trying to locate a particular registry key using REGEDIT.EXE, on aWindows 2000 PC. Which of the following is the BEST method of doing this?() A. Use the import function from the File menu.B. Use the find function in the Edit menu.C. Use the display binary data function in the View menu.D. Navigate through the registry sub-trees.

Ezonexam is migrating to a private IP addressing scheme. Which of the following describe the use of private IP addresses? (Choose two)A.Addresses chosen by Ezonexam.com to communicate with the Internet.B.Addresses that cannot be routed through the public Internet.C.Addresses that can be routed through the public Internet.D.A scheme to conserve public addresses.E.Addresses licensed to enterprise or ISPs by an Internet registry organization.

Window98中注册表编辑器的名称是( )。A.Regedt32.exeB.Registry editor.exeC.Regedit.exeD.Registry.exe

Which of the following describe private IP addresses?() A. addresses chosen by a company to communicate with the InternetB. addresses that cannot be routed through the public InternetC. addresses that can be routed through the public InternetD. a scheme to conserve public addressesE. addresses licensed to enterprises or ISPs by an Internet registry organization

Which document lists all the lifesaving equipment required for a vessel?A.Certificate of InspectionB.American Bureau of Shipping Classification CertificateC.International Convention for the Safety of Life at Sea CertificateD.Certificate of Registry

Please (填写)()this visitor’s registry book.A、fill withB、fill inC、fill awayD、fill up

The company wants to evaluate making all business office users administrators on their client computers. You need to design a method to ensure that this change can be made in a manner that meets business and security requirements. What should you do?()A、On all domain controllers, implement registry access auditing for all registry keys that are considered sensitive by the company’s written security policyB、On all client computers, implement logon auditing for all user account logonsC、On all client computers, configure registry access auditing for all registry keys that are considered sensitive by the company’s written security policyD、On all domain controllers, implement logon auditing for all user account logons

During the startup of a Windows XP Professional workstation, a message appears stating a service failed to start. Which of the following administrative areas will show what service failed?()A、Registry utilityB、MSCONFIG utilityC、Control PanelD、Event Viewer

Please fill in this visitor’s ().A、registry bookB、exercise bookC、seaman’s bookD、record book

Which of the following describe private IP addresses? (Choose two.)()A、addresses chosen by a company to communicate with the InternetB、addresses that cannot be routed through the public InternetC、addresses that can be routed through the public InternetD、a scheme to conserve public addressesE、addresses licensed to enterprises or ISPs by an Internet registry organization

Which of the following describe private IP addresses?()A、addresses chosen by a company to communicate with the InternetB、addresses that cannot be routed through the public InternetC、addresses that can be routed through the public InternetD、a scheme to conserve public addressesE、addresses licensed to enterprises or ISPs by an Internet registry organization

An ISP has assigned prefix 3000:1234:5678::/48 to Company1. Which of the following terms would typically be used to describe this type of public IPv6 prefix?()A、Subnet prefixB、ISP prefixC、Global routing prefixD、Registry prefix

Which of the following describe private IP addresses?()A、Addresses chosen by a company to communicate with the Internet.B、Addresses that cannot be routed through the public Internet.C、Addresses that can be routed through the public Internet.D、A scheme to conserve public addresses.E、Addresses licensed to enterprise or ISPs by an Internet registry organization.

Which of the following is MOST likely to improve the performance of SOAP-based Web services?()A、 Use message level securityB、 Use fine-grained Web servicesC、 Use document/literal instead of RPC/encodedD、 Avoid stale data in the UDDI registry by turning off caching

After making changes to shipping charges, which Registry entry needs to be updated to reflect those changes?()A、Unified Business FlowB、CalculationC、Business PolicyD、Command Execution TriggersE、Quantity Manager

You need to configure Microsoft Windows Firewall to allow technicians to remotely control your computer.  Which exception should you enable? ()A、Remote Registry ServiceB、Remote AssistanceC、Remote AdministrationD、Remote Service Management

单选题Which of the following is MOST likely to improve the performance of SOAP-based Web services?()A Use message level securityB Use fine-grained Web servicesC Use document/literal instead of RPC/encodedD Avoid stale data in the UDDI registry by turning off caching

单选题Each lifebuoy shall be marked in block capitals of the Roman alphabet with()of the ship.Athe call sign and nameBthe official number and nameCthe port of registry and nameDthe port of registry and official number

单选题Fire fighting equipment requirements for a particular vessel may be found on the().ACertificate of InspectionBCertificate of SeaworthinessCClassification CertificateDCertificate of Registry

单选题Bob, a support technician, is trying to locate a particular registry key using REGEDIT.EXE, on aWindows 2000 PC. Which of the following is the BEST method of doing this?()AUse the import function from the File menu.BUse the find function in the Edit menu.CUse the display binary data function in the View menu.DNavigate through the registry sub-trees.

多选题You administer a network with Windows-based endpoints that have custom software images. You want to use Host Checker to require that endpoints are running the custom software image.Which two Host Checker policy rules would be used to enforce this requirement?()AIsolate a file name unique to the custom image and create a custom rule-type of File which matches on the file. Select the Required option under the custom rule.BIdentify the MAC address unique to network cards installed in PCs with the custom image and create a custom rule-type of MAC Address which matches on the appropriate MAC address.CSelect the Required option under the custom rule Identify the IP address unique to the network cards installed in PCs with the custom image and create a custom rule-type of IP Address which matches on the appropriate IP address. Select the Required option under the custom rule.DIsolate or create a unique Windows registry key for the custom image and create a custom rule- type of Registry Setting which matches on the name of the registry key.

单选题The company wants to evaluate making all business office users administrators on their client computers. You need to design a method to ensure that this change can be made in a manner that meets business and security requirements. What should you do?()AOn all domain controllers, implement registry access auditing for all registry keys that are considered sensitive by the company’s written security policyBOn all client computers, implement logon auditing for all user account logonsCOn all client computers, configure registry access auditing for all registry keys that are considered sensitive by the company’s written security policyDOn all domain controllers, implement logon auditing for all user account logons

单选题What()your registry port, over.AareBisCwereDwas

单选题After making changes to shipping charges, which Registry entry needs to be updated to reflect those changes?()AUnified Business FlowBCalculationCBusiness PolicyDCommand Execution TriggersEQuantity Manager

单选题What’s your port()registry?AonBofCinDto