A company uses raw logical volumes. Which command can be used to back up the data in the raw logical volumes to a tape?()A、ddB、tarC、cpioD、mksysb

A company uses raw logical volumes. Which command can be used to back up the data in the raw logical volumes to a tape?()

  • A、dd
  • B、tar
  • C、cpio
  • D、mksysb

相关考题:

The journal entry a company uses to record the estimated accrued product warranty liability is ( ) A. debit Product Warranty Expense; credit Product Warranty PayableB. debit Product Warranty Payable; credit CashC. debit Product Warranty Expense; credit CashD. debit Product Warranty Payable; credit Product Warranty Expense

Your Web site uses custom Themes. Your Web site must support additional Themes based on the user‘s company name. The company name is set when a user logs on to the Web site. The company‘s Theme name is stored in a variable named ThemeName. You need to use this variable to dynamically set the Web site‘s Theme.What should you do?()A.B.C.D.

A brand new network application is required for the Acme Company, and they are considering the use of a connectionless service. What are the characteristics of a connectionless service?() A. It uses a Reliable transport mechanism.B. It uses a Non-reliable transport mechanismC. It is less bandwidth-intensive than connection oriented servicesD. it uses handshaking

A brand new network application is required for the Acme Company, and they are considering the use of a connectionless service. What are the characteristics of a connectionless service?()A、It uses a Reliable transport mechanism.B、It uses a Non-reliable transport mechanismC、It is less bandwidth-intensive than connection oriented servicesD、it uses handshaking

Company uses layer 3 switches in the Core of their network. Which method of Layer 3 switching  uses a forwarding information base (FIB)?()A、Topology-based switchingB、Demand-based switchingC、Route cachingD、Flow-based switchingE、None of the other alternatives apply

The core Company switches are configured to use 802.1Q trunks.  Which three statements are  correct with regard to the IEEE 802.1Q standard?()A、 The IEEE 802.1Q frame format adds a 4 byte field to a Ethernet frameB、 The packet is encapsulated with a 26 byte header and a 4 byte FCSC、 The protocol uses point-to-multipoint connectivityD、 The protocol uses point-to-point connectivityE、 The IEEE 802.1Q frame uses multicast destination of 0x01-00-0c-00-00F、 The IEEE 802.1Q frame retains the original MAC destination address

You are a database administrator for your company. The company uses a vendor company’s application that is based on a proprietary database. You query data from the application database and import the data into a SQL Server 2005 database. The application vendor provides you with a new OLE DB driver to be used when querying the application database. Company policy prohibits connections between the SQL Server database and the application database, except when querying this data. You need to provide a way to query data from the application database. What should you?()A、Configure a Linked Server connection to the application database.B、Write a query that uses an OPENDATASOURCE command.C、Write a query that uses an OPENQUERY command.D、Configure a Remote Server connection to the application database.

You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.Company.com makes use of an Edge Transport server.The employees at Company.com usually receive e-mail from another company named Courseware Publishers.The  employees at Courseware Publishers uses the uses the courseware.com e-mail address suffix.However, due to unforeseen circumstances, Company.com, has acquired Courseware Publishers.You have received instructions from the CIO to make sure that the messages sent from Courseware Publishers have their courseware.com e-mail address suffix in their source address. What should you do?()A、The best option is to create an accepted domain.B、The best option is to create an e-mail address policy.C、The best option is to create a Receive connector.D、The best option is to create an address rewrite entry.

You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named DB01 in the instance. The company CIO wants all the application developers can capture traces to troubleshoot the application that uses the database DB1, and they can perform this by using SQL Server Profiler. But they have to be given as little permission as possible. The company CIO assigns this task to you.  So what action should you perform to achieve this goal?()  A、All the SQL Server logins of the application developers have to be added to a fixed server role. B、All the database users of the application developers have to be added to a fixed database role C、All SQL Server logins of the application developers should be given the appropriate server-level permissions. D、All database users of the application developers should be given the appropriate database-level permissions.

You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a management data warehouse that uses the data collector to collect performance data. You intend to maintain the management data. You want to implement a data collection process. The process can gather and upload data in the management data warehouse on different schedules.  What process should you implement?() A、You should create a cached data collectionB、You should create an on-demand non-cached data collection C、You should create a scheduled non-cached data collection D、You should create two different SQL Agent jobs that are scheduled stimultaneously

You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of two instances both of which run on the same computer. One is a SQL Server 2008 instance; another is a SQL Server 2005 instance. There is a database named DB1 in the SQL Server 2008 instance. DB1 uses the Fulltext indexes. Several records that include the word "root" are added to DB1. An empty resultset is returned when the Fulltext index is queried for the word "root." You must make sure the query can return records that contain the word "root". What should you do?()  A、You should terminate and restart the MSFTESQL service B、You should rebuild the full-text index C、The word "root" should be added to the stop list D、The word "root" should be added to the thesaurus file

ou work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. According to the company requirement, you intend to perform an installation of an instance of SQL Server Reporting Services (SSRS) to the same machine. Now your company CIO wants version histories of all deployed reports can be kept. As a technical support, what should you do to ensure this?()A、You should use the http.sys listener to install the SSRS instance. B、You should configure the SSRS database, make it use Native mode C、You should configure the SSRS database, make it use SharePoint integrated mode D、You should use the Internet Information Services default Web site to install the SSRS instance

You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. You have to perform the backup of the default trace according to the requirement of your failure recovery plan. The default trace is contained in the subdirectory.You have to backup the subdirectory.  Which SQL Server database engine subdirectory should be backed up?()A、DATAB、INSTALL C、LOG D、BINN

多选题The core Company switches are configured to use 802.1Q trunks.  Which three statements are  correct with regard to the IEEE 802.1Q standard?()AThe IEEE 802.1Q frame format adds a 4 byte field to a Ethernet frameBThe packet is encapsulated with a 26 byte header and a 4 byte FCSCThe protocol uses point-to-multipoint connectivityDThe protocol uses point-to-point connectivityEThe IEEE 802.1Q frame uses multicast destination of 0x01-00-0c-00-00FThe IEEE 802.1Q frame retains the original MAC destination address

单选题You are a database administrator for your company. The company uses a SQL Server 2005 database that includes a table named Inventory. The table contains a column named Price. A company policy states that the value in the Price column cannot be decreased by more than 10 percent in any single database operation. Updates to the Price column are made by various means, including by using ad hoc queries. You need to ensure that this company policy is enforced. What should you do?()ACreate a trigger that rolls back changes to the Price column that violate company policy.BCreate a stored procedure that disallows changes to the Price column that violate company policy.COn the Price column, create a check constraint that requires a specified minimum value.DOn the Price column, create a foreign key constraint to a table that contains valid prices.

单选题Your company has an Active Directory forest. The company has servers that run Windows Server 2008 amd client computers that run Windows Vista. The domain uses a set of GPO administrative templates that have been approved to support regulatory compliance requirements. Your partner company has an Active Directory forest that contains a single domain, The company has servers that run Windows Server 2008 and client computers that run Windows Vista. You need to configure your partner company’s domain to use the approved set of administrative templates. What should you do()AUse the Group Policy Management Console (GPMC) utility to back up the GPO to a file. In each site, import the GPO to the default domain policy.BCopy the ADMX files from your company’s PDC emulator to the PolicyDefinitions folder on the partner company’s PDC emulatorCCopy the ADML files from your company’s PDC emulator to the PolicyDefinitions folder on the partner company’s PDC emulatorDDownload the conf.adm, system.adm, wuau.adm, and inetres.adm files from the Microsoft Updates Web site. Copy the ADM files to the PolicyDefinitions folder on thr partner company’s emulator.

单选题You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.the Company.com contains an exchange server 2010 client access server named -ex12.Company.com has an employee named andy booth.he uses exchange activesync to down load attachment.You have received instructions from the cio to limit andy booth’s attachments size;however your action should not in any way affect the other employees at Company.com.What should you do?()AThe best option is to set up a new managed content setting.BThe best option is to change Andy Booth’s message size restrictions.CThe best option is to set up a new Exchange ActiveSync mailbox policy.DThe best option is to change the default Exchange ActiveSync mailbox policy.

单选题You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.Company.com contains quite a few internal DNS server.You have received instructions from the CIO to make sure that the Internet names are resolved by the Hub Transport servers that uses the external DNS servers. What should you do?()AThe best option is to change the properties of the default remote domain.BThe best option is to change the message delivery properties of the Hub Transport global settings.CThe best option is to change the properties of a Send connector.DThe best option is to change the properties of the Hub Transport server object.

单选题Your company has an Active Directory forest. The company has servers that run Windows Server  2008 R2 and client computers that run Windows 7. The domain uses a set of GPO administrative  templates that have been approved to support regulatory compliance requirements.     Your partner company has an Active Directory forest that contains a single domain. The company  has servers that run Windows Server 2008 R2 and client computers that run Windows 7.     You need to configure your partner company’s domain to use the approved set of administrative  templates.   What should you do()AUse the Group Policy Management Console (GPMC) utility to back up the GPO to a file. In each site, import the GPBCopy the ADMX files from your company’s PDC emulator to the PolicyDefinitions folder on the partner company’s PDCCCopy the ADML files from your company’s PDC emulator to the PolicyDefinitions folder on the partner company’s PDC DDownload the conf.adm, system.adm, wuau.adm, and inetres.adm files from the Microsoft Updates Web site.

单选题You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. The instance contains a database named DB1. An application which is continuously connected uses DB1. The application extensively uses the INSERT command and triggers the population of multiple tables. Now you notice that the application has a poor performance. You doubt that this problem has something to do with blocking. You have to monitor the state of the instance at regular intervals while not affecting the application performance further.  Which tool should you use? ()AYou should use Dynamic Management Views BYou should use SQL Server Resource Governor CYou should use SQL Server Profiler DYou should use Windows System Monitor

单选题You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. Now according to the requirement of the company CIO, users on the SQL Server instance must be able to use the OPENROWSET() function to query remote data source.  In the options below, which sp_configure configuration option should you configure?AAgent XPs Bremote access Cremote proc trans DAd Hoc Distributed Queries

单选题You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. Now you get an order from your company CIO, you have to identify whether a database integrity check (DBCC CHECKDB) was run for a particular database.  Which log file should you examine?()Alog.trc Bdefault.trc CERRORLOG DSQLAGENT

单选题You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. The company wants to export data from SQL Server to a Microsoft Excel file. The company assigns this task to you. You perform this by using the SQL Server Import and Export Wizard. After this, you save the package definition to a file. Now you have to reexecute the package from the command line.  In the options below, which utility should you choose to use?()Abcp.exe Bdta.exe Cdtexec.exe Dsqlmaint.exe

单选题You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. Now your company CIO assigns a task to you. The company CIO wants you to configure FILESTREAM data and the two requirements below must be met: you must enable FILESTREAM for file I/O streaming access; remote client computers must be able to have streaming access to FILESTREAM data. You must make sure that FILESTREAM data is enabled. Which service should you configure? ()AYou should configure SQL Server VSS Writer BYou should configure Distributed File System CYou should configure SQL Server DYou should configure SQL Server Full Text

单选题A company uses raw logical volumes. Which command can be used to back up the data in the raw logical volumes to a tape?()AddBtarCcpioDmksysb

单选题You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. For some reason, now the company wants to view the number of users who access the SQL Server instance. The company CIO assigns this task to you. You have to use Windows System Monitor to find out the concrete number. Which performance object should you capture?()ASQLServer:Buffer Manager BSQLServer:Access Methods CSQLServer:General Statistics DSQLServer:Exec Statistics

单选题Company uses layer 3 switches in the Core of their network. Which method of Layer 3 switching  uses a forwarding information base (FIB)?()ATopology-based switchingBDemand-based switchingCRoute cachingDFlow-based switchingENone of the other alternatives apply

多选题A brand new network application is required for the Acme Company, and they are considering the use of a connectionless service. What are the characteristics of a connectionless service?()AIt uses a Reliable transport mechanism.BIt uses a Non-reliable transport mechanismCIt is less bandwidth-intensive than connection oriented servicesDit uses handshaking