The administrator changed the number of virtual processors from 1 to 2 in the default_profile of an LPAR. The operator ran thecfgmgr command expecting to see 2 processors after that, but did not see them. What action must be done to apply the changes?()A、Reboot AIX within the LPAR.B、Run cfgmgr against the device sys0.C、Shutdown and then activate the default_profile.D、Ensure the RSCT daemon is operative and run cfgmgr again.

The administrator changed the number of virtual processors from 1 to 2 in the default_profile of an LPAR. The operator ran thecfgmgr command expecting to see 2 processors after that, but did not see them. What action must be done to apply the changes?()

  • A、Reboot AIX within the LPAR.
  • B、Run cfgmgr against the device sys0.
  • C、Shutdown and then activate the default_profile.
  • D、Ensure the RSCT daemon is operative and run cfgmgr again.

相关考题:

I wonder whether our life()considerably by 2010. A、will changeB、will be changingC、will have to changeD、will have changed

Web users are reporting issues downloading various types of media. Which of the following shouldthe administrator do FIRST?() A. Find out what has recently changed on the networkB. Create an action plan and solution identifying potential effects.C. Continue to gather information and see what other problems may exist.D. Determine the most probable cause.

WhichmodifierisusedtochangelistenerparametersintheListenerControlutilityenvironment?() A.SETB.ALTERC.CHANGED.UPDATE

A customer reports the optical drive is no longer responding. Which of the following questionsshould be asked FIRST?()A、“Did you log in with an administrator account?”B、“Have you been to any inappropriate websites?”C、“What have you changed since the optical drive worked properly?”D、“What has changed since the optical drive worked properly?”

要把D装换成NTFS文件系统,使用用下列哪项命令()。A、convertd:/fs:NTFSB、convertd:/fs:NTFSC、changed:/fs:NTFSD、changed:/fs:NTFS

As a frame leaves a Layer 3 device, the Layer 2 encapsulation information is changed from what it was when it entered the devicE.For what two reasons can this happen? ()A、The data is moving from 10BASE-TX to 100BASE-TX.B、The WAN encapsulation type has changed.C、The data format has changed from analog to digital.D、The source and destination hosts are in the same subnet.E、The source and destination MAC addresses have changed.

An administrator is planning an upgrade of a major software package on an application server.The software has been tested successfully in a test environment and it is ready to go into production. Which of the following steps should the administrator take next?()A、Identify necessary operating system updatesB、Implement the changeC、Document the changeD、Schedule system down time

An administrator is upgrading memory on the server. Once the server in turned back on, the administrator notices that the memory has not changed. The system board website says the board should accept the new amount of memory.  Which of the following should the administrator do FIRST?()A、 Replace memory chips with known good memory chips.B、 Reseat the memory chips.C、 Update the BIOS.D、 Upgrade the server OS.

A system administrator receives a new server and has booted the system for the first time. The administrator has set up the terminals and users. The user start to log on. Root is logged in on the console. When additional users start to log in, an error is displayed stating that All available login sessions are in use. Which of the following steps should be followed to resolve this problem?()A、Permissions on /etc/security were changed in error; do a chmod 755 on /etc/security directory.B、Increase the number of licenses; using smit chaili censeC、Change the Maximum number of PROCESSES allowed per user variable; using smit chgsys.D、Change User can logi field from false to true: using smit chuser.

Which of the following commands would a system administrator run tovalidate /etc/tunables/nextboot after manually editing()A、ksh -n nextbootB、tunsave -a -f nextbootC、tuncheck -r -f nextbootD、tunsave nextboot

An administrator attempts to create a link of /etc/db_conf to the target directory /db/v9.7/install/config. The following command failed toAn administrator attempts to create a link of /etc/db_conf to the target directory /db/v9.7/install/config. The following command failed to create the link:  ln /db/v9.7/install/config /etc/db_conf   Which option should be used when re-running the command to resolve the problem?()  A、-s flag to create a soft linkB、-n flag to force create a hard linkC、-N flag to force create a hard linkD、-S flag to force create a soft link

An administrator attempts to create a link of /etc/db_conf to the target directory /db/v9.7/install/config. The following n?command failed toAn administrator attempts to create a link of /etc/db_conf to the target directory /db/v9.7/install/config. The following ?n?command failed to create the link.ln/db/v9.7/install/config /etc/db_conf. Which option should be used when re-running the command to resolve the problem?()A、-s flag to create a soft linkB、-n flag to force create a hard linkC、-N flag to force create a hard linkD、-S flag to force create a soft link

You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003, and all client computers run Windows XP Professional. You create a shared folder named TestKing Docs on a member server named TestKing3. TestKing Docs will store project documents. You need to ensure that users can access previous version of the documents in TestKing Docs. What should you do?()A、Modify the Offline Settings option for TestKing Docs to make all files available offline.B、Configure shadow copies of the volume containing TestKing Docs.C、Use Task Scheduler to create a job that uses the Copy command to copy all changed documents to another folder every day.D、Use the Backup utility to schedule a backup of all changed documents every hou

单选题You work as a database administrator for Certkiller .com. According to your backup strategy, you performed an incremental level 0 backup of your database. Which statement regarding this backup is true?()AThe backup is similar to image copy.BThe backup contains all used data blocks.CThe backup contains only unused data blocks.DThe backup contains all data blocks changed since the last incremental level 1 backup.

单选题An administrator is upgrading memory on the server. Once the server in turned back on, the administrator notices that the memory has not changed. The system board website says the board should accept the new amount of memory.  Which of the following should the administrator do FIRST?()A Replace memory chips with known good memory chips.B Reseat the memory chips.C Update the BIOS.D Upgrade the server OS.

单选题What command should a system administrator run after using an editor to create the /etc/tunables/nextboot file?()Aksh -n nextbootBtunsave -a -f nextbootCtuncheck -r -f nextbootDdiff $(vmtune) /etc/tunables/nextboot

单选题A company has a policy that states that all servers will be fully backed up on the weekend.Additionally, all changed items will be backed up each night. In the event of a server failure, the administrator wants to be able to fully recover the system using two restore jobs. Which of the following backup levels should be used nightly?()AIncrementalBNormalCDifferentialDFull

单选题You work as a database administrator for Certkiller .com. You enabled tracing while creating a listener to your database.  What additional information is available to you when you enable tracing?()AInformation about each Oracle Net connection.BInformation about each entry in theLinstener.orafileCInformation about the changed done in the databaseDInformation about the different listeners in your systemEInformation about all thenondatabasefiles required to operate the database

单选题A customer reports the optical drive is no longer responding. Which of the following questionsshould be asked FIRST?()A“Did you log in with an administrator account?”B“Have you been to any inappropriate websites?”C“What have you changed since the optical drive worked properly?”D“What has changed since the optical drive worked properly?”

单选题An administrator attempts to create a link of /etc/db_conf to the target directory /db/v9.7/install/config. The following n?command failed toAn administrator attempts to create a link of /etc/db_conf to the target directory /db/v9.7/install/config. The following ?n?command failed to create the link.ln/db/v9.7/install/config /etc/db_conf. Which option should be used when re-running the command to resolve the problem?()A-s flag to create a soft linkB-n flag to force create a hard linkC-N flag to force create a hard linkD-S flag to force create a soft link

单选题An administrator is upgrading memory on the server. Once the server in turned back on, the administrator notices that the memory has not changed. The system board website says the board should accept the new amount of memory.Which of the following should the administrator do FIRST?()AReplace memory chips with known good memory chips.BReseat the memory chips.CUpdate the BIOS.DUpgrade the server OS

单选题An administrator is planning an upgrade of a major software package on an application server. The software has been tested successfully in a test environment and it is ready to go into production.  Which of the following steps should the administrator take next?()A Identify necessary operating system updatesB Implement the changeC Document the changeD Schedule system down time

多选题As a frame leaves a Layer 3 device, the Layer 2 encapsulation information is changed from what it was when it entered the device. For what two reasons can this happen?()AThe data is moving from 10BASE-TX to 100BASE-TX.BThe WAN encapsulation type has changed.CThe data format has changed from analog to digital.DThe source and destination hosts are in the same subnet.EThe source and destination MAC addresses have changed.

单选题The administrator is unable to establish connectivity between two Cisco routers. Upon reviewing the command output of both routers, what is the most likely caust of the problem?()AAuthentication needs to be changed to PAP for both routers.BSerial IP addresses of routers are not on the same subnet.CUsername/password is incorrectly configured.DRouter names are incorrectly configured.