Which command must be run to log a hardware repair entry in the errorlog?()A、diagB、cfgmgrC、errlogD、errlogger
Which command must be run to log a hardware repair entry in the errorlog?()
- A、diag
- B、cfgmgr
- C、errlog
- D、errlogger
相关考题:
Which command shows the event and traceoptions file for chassis clusters?() A. show log chassisdB. show log clusterdC. show log jsrpdD. show log messages
A user is successfully authenticating to the network but is unable to access protected resources behind a ScreenOS enforcer. You log in to the ScreenOS enforcer and issue the command get auth table infranet and you do not see the user listed.Which two event log settings on the Junos Pulse Access Control Service must you enable to troubleshootthis issue?()A. Connection RequestsB. System ErrorsC. Enforcer EventsD. Enforcer Command Trace
A log filter of log severity DEBUG pppPacket ATM 4/3.66 is configured within the category of pppPacket.Which configuration command removes this specific log filter?() A.AB.BC.CD.D
Which command must be run to log a hardware repair entry in the errorlog?() A.diagB.cfgmgrC.errlogD.errlogger
You are the network administrator for TestKing. All network servers run Windows Server 2003.A server named TestKing18 functions as a domain controller. You back up TestKing18 and generate a detailed backup log.You need to view the full backup log.What should you do?()A. Run the ntbackup command with the /L option.B. Run the ntbackup command with the /F option.C. Open the Backup utility. On the Tools menu, click Report.D. Open Event Viewer. In the application log, view Ntbackup events
Which CLI command is used to create a W3C log?() A、 make logB、 log configC、 w3c log configD、 advance dproxy configE、 mklog file
A user in your company network needs to encrypt a folder that is on her Windows 2000 Professional computer. Her computer has two drives: Drive C and Drive D. The folder that needs to be encrypted is located on Drive D. When the user attempts to encrypt the folder, no option for encryption can be found in the folder properties. What should you do to enable the user to encrypt the folder? ()A、Log on to her computer as an administrator, and then run the cipher/e command.B、Instruct the user to run the chipper/e command.C、Log on to her computer as an administrator, and then run the Secedit/enforce command.D、Instruct the user to run the Secedit/enforce command.E、Log on to her computer as an administrator, and then run the Convert d:/FS:NTFS command.
Which of the following commands will be run at a command prompt to determine which WindowsOS is running on the computer?()A、VERB、Device ManagerC、VERIFYD、SET
Which command must be run after an administrator has made changes to /etc/services to activate the changes?()A、/etc/rc.tcpipB、refresh -s inetdC、startsrc -s inetdD、startsrc -g tcpip
How can an operator list all its history of commands in one step?()A、Run c -l 0?from the command line.Run ?c -l 0?from the command line.B、Invoke SMIT for the shell environment.C、Run the SC + H?combination at the command prompt.Run the ?SC + H?combination at the command prompt.D、Use a rep?command with its UID against the /var/log/history_cmds file.Use a ?rep?command with its UID against the /var/log/history_cmds file.
An administrator has set up serverA and serverB to use the /etc/hosts.equiv file so that applications on serverA can remotely run commands on serverB. Which command will verify if a new user from serverA is trusted on serverB?()A、As the root user from serverA run the command rhost serverBB、As the root user from serverA run the command rlogin serverBC、As the desired user from serverB run the command rhost serverAD、As the desired user from serverA run the command rlogin serverB
Which configuration command removes all log filters currently configured on the ERX Edge Router?()A、 no log hereB、 no log fieldsC、 no log filtersD、 no log severity
You plan to execute the following command to perform a Flashback Database operation in your database: SQL FLASHBACK DATABASE TO TIMESTAMP (SYSDATE -5/24); Which two statements are true about this?()A、 The database must have multiplexed redo log filesB、 The database must be in the MOUNT state to execute the commandC、 The database must be in the NOMOUNT state to execute the commandD、 The database must be opened in RESTRICTED mode before this operationE、 The database must be opened with the RESETLOGS option after the flashback operation
Which initialization parameter must you set to enable automatic archiving? ()A、LOG_ARCHIVE_DESTB、LOG_ARCHIVE_STARTC、LOG_ARCHIVE_FORMATD、LOG_ARCHIVE_MAX_PROCESSES
Your company has an Active Directory domain. You install a new domain controller in the domain. Twenty users report that they are unable to log on to the domain. You need to register the SRV records. Which command should you run on the new domain controller()A、Run the netsh interface reset command.B、Run the ipconfig /flushdns command.C、Run the dnscmd /EnlistDirectoryPartition command.D、Run the sc stop netlogon command followed by the sc start netlogon command.
You are preparing the supporting network infrastructure for the upgrade to Exchange Server 2003. You want to accomplish this upgrade by using the minimum amount of administrative effort.Which two actions should you perform?()A、Run the setup.exe /domainprep command on a domain controller in the prod.testking.com domainB、Run the setup.exe /domainprep command on a domain controller in the app.testking.com domainC、Run the setup-exe /domainprep command on a domain controller in the testking.com domainD、Log on to the domain by using a user account that is a member of the Domain Admins groupE、Log on to the domain by using a user account that is a member of the Schema Admins group
单选题Your company has an Active Directory domain. You install a new domain controller in the domain. Twenty users report that they are unable to log on to the domain. You need to register the SRV records. Which command should you run on the new domain controller()ARun the netsh interface reset command.BRun the ipconfig /flushdns command.CRun the dnscmd /EnlistDirectoryPartition command.DRun the sc stop netlogon command followed by the sc start netlogon command.
多选题You plan to execute the following command to perform a Flashback Database operation in your database: SQL FLASHBACK DATABASE TO TIMESTAMP (SYSDATE -5/24); Which two statements are true about this?()AThe database must have multiplexed redo log filesBThe database must be in the MOUNT state to execute the commandCThe database must be in the NOMOUNT state to execute the commandDThe database must be opened in RESTRICTED mode before this operationEThe database must be opened with the RESETLOGS option after the flashback operation
单选题Which configuration command removes all log filters currently configured on the ERX Edge Router?()A no log hereB no log fieldsC no log filtersD no log severity
多选题Which are the prerequisites for performing flashback transactions on your database?()AUndo retention guarantee for the database must be configured.BSupplemental log must be enabled for the primary key.CSupplemental log must be enabled.DExecute permission on the DBMS_FLASHBACK package must be granted to the user.
单选题An administrator has set up serverA and serverB to use the /etc/hosts.equiv file so that applications on serverA can remotely run commands on serverB. Which command will verify if a new user from serverA is trusted on serverB?()AAs the root user from serverA run the command rhost serverBBAs the root user from serverA run the command rlogin serverBCAs the desired user from serverB run the command rhost serverADAs the desired user from serverA run the command rlogin serverB
多选题A user is successfully authenticating to the network but is unable to access protected resources behind a ScreenOS enforcer. You log in to the ScreenOS enforcer and issue the command get auth table infranet and you do not see the user listed.Which two event log settings on the Junos Pulse Access Control Service must you enable to troubleshootthis issue?()AConnection RequestsBSystem ErrorsCEnforcer EventsDEnforcer Command Trace
单选题You have a computer that runs Windows XP Professional. You attempt to install an application by using a Windows Installer package name app1. msi. The application installation fails. You plan to install the application again. You need to create an application installation log for the application setup. What should you do?()AAt the command prompt, run msiexec /log app1. msi /passive. BAt the command prompt, run msiexec /log app1. log /package app1. msi. CFrom the Local Security Policy, enable auditing for object access, and then run app1. msi.DFrom the Event Viewer, increase the size of the application log, and then run app1. msi.
单选题Which command do you use to identify the meaning of a syslog message?()Ahelp log messagesBman log messagesCman syslogDhelp syslog
单选题Which command shows the event and traceoptions file for chassis clusters?()Ashow log chassisdBshow log clusterdCshow log jsrpdDshow log messages
单选题How can an operator list all its history of commands in one step?()ARun c -l 0?from the command line.Run ?c -l 0?from the command line.BInvoke SMIT for the shell environment.CRun the SC + H?combination at the command prompt.Run the ?SC + H?combination at the command prompt.DUse a rep?command with its UID against the /var/log/history_cmds file.Use a ?rep?command with its UID against the /var/log/history_cmds file.