An administrator will replace five current servers. Which of the following is the MOST important to review before installing new servers?()A、 Verify uninterruptible power supply (UPS) loadB、 Verify if server consumes 220VC、 Verify CPU loadD、 Verify if server consumes 110V
An administrator will replace five current servers. Which of the following is the MOST important to review before installing new servers?()
- A、 Verify uninterruptible power supply (UPS) load
- B、 Verify if server consumes 220V
- C、 Verify CPU load
- D、 Verify if server consumes 110V
相关考题:
What happens if you shutdown abort ASM instance?() A. The RDBMSs connected will shutdown abort tooB. CLUSTER SERVICE will shutdownC. ASM wil do instance recovery after startup
An administrator is experiencing availability issues on a Linux server. The administrator decides tocheck the server for an IP address conflict on the server. Which of the following commands should the administrator use?()A.tracerouteB.tracertC.ifconfigD.ipconfig
An administrator is using a protocol analyzer to monitor traffic between two servers. However, theonly traffic that appears is broadcast and traffic originating from the administrator‘s PC.Which of the following devices is the administrator plugged into? ()A.HubB. BridgeC. SwitchD. Router
Th efollowing access list below was applied outbound on the E0 interface connected to the 192.169.1.8/29LAN:access-list 135 deny tcp 192.169.1.80.0.0.7 eq 20 anyaccess-list 135 deny tcp 192.169.1.80.0.0.7 e q21 anyHow will the above access lists affect traffic?()A.FTP traffic from 192.169.1.22 wil lbe deniedB.Not raffic,except for FTP traffic wil lbe allowed to exit E0C.FTP traffic from 192.169.1.9 to any host will be deniedD.All traffic exiting E0 will be deniedE.All FTP traffic to network 192.169.1.9/29 will be denied
Windows默认帐户应如何管理()A、禁用Administrator帐户,重命名Guest帐户B、禁用Administrator及Guest帐户C、重命名Administrator帐户,禁用Guest帐户D、重命名Administrator及Guest帐户
An administrator attempts to install the latest security patches for an older server. When the administrator runs the patch installer, the install fails. The administrator tries again, and the installer fails again. Which of the following is the MOST likely reason for this?()A、 The administrator improperly configured the virtual memory settings on the server.B、 The administrator is using incorrect patch switches for the install.C、 The administrator is trying to install security patches for software that is not installed.D、 The administrator is trying to install patches that require hard drive encryption on the server.
An administrator creates a new directory then shares it on the Windows server. The administrator sets the permissions for everyone to "Modify" but users report they are unable to create or delete documents. Which of the following is the cause?()A、The administrator forgot to change the share permissionsB、The users were not part of the “Everyone” built in groupC、The administrator shared the files but not the folderD、“Modify” only allows users to change existing documents
An administrator has set up a company’s intranet server.Users should be able to access it but nousers are able to.The administrator verifies that the website is accessible by IP address.Which of the following should the administrator look at FIRST to resolve the issue?()A、WINS serverB、DNS serverC、Lmhosts fileD、DHCP cache
An administrator is using a protocol analyzer to monitor traffic between two servers. However, the only traffic that appears is broadcast and traffic originating from the administrator's PC. Which of the following devices is the administrator plugged into? ()A、HubB、BridgeC、SwitchD、Router
An administrator is implementing a second server due to the increased usage. Which of the following optimization techniques is the administrator using?()A、Caching enginesB、QoSC、Traffic shapingD、Load balancing
An administrator is experiencing availability issues on a Linux server. The administrator decides tocheck the server for an IP address conflict on the server. Which of the following commands should the administrator use?()A、tracerouteB、tracertC、ifconfigD、ipconfig
A system administrator needs to specify a set of FQDN to IP address mappings for a legacyserver; the administrator does not want the legacy server to be referenced by other servers. Which of the following should the administrator use to set this?()A、DHCP serverB、DNS serverC、Host fileD、Route statements
Which of the following statements is TRUE about the reorgvg command?()A、No logical volumes wil be moved if write-verify is set to yes.B、No action will be performed if it cannot fulfill the allocation requirements.C、Physical partitions of a logical volume will be moved if the logical volume's relocatable flag is set to "no".D、Physical partitions will be moved as close as possible to the positions specified, if the allocation requirements cannot be fulfilled.
A system administrator received the following message while trying to ssh to a server: connection timed out.The administrator pinged the server and had no response. The administrator then pinged the gateway, and was successful. Which tool could the administrator use next to isolate the problem?()A、routeB、tracerouteC、netstat -nrD、broadcast ping
Which of the following tasks can be performed by a Buyer Administrator using the Organization Administration console?()A、The Buyer Administrator can approve the shoppers within their organization.B、The Buyer Administrator can create a new seller organization.C、The Buyer Administrator can assign access levels to their members.D、The Buyer Administrator can make Request for Quotes (RFQ) to a seller organization.
What happens if you shutdown abort ASM instance?()A、The RDBMSs connected will shutdown abort tooB、CLUSTER SERVICE will shutdownC、ASM wil do instance recovery after startup
多选题Which of the following tasks can be performed by a Buyer Administrator using the Organization Administration console?()AThe Buyer Administrator can approve the shoppers within their organization.BThe Buyer Administrator can create a new seller organization.CThe Buyer Administrator can assign access levels to their members.DThe Buyer Administrator can make Request for Quotes (RFQ) to a seller organization.
单选题A user requests access to a new file share.The administrator adds the user to the group with the appropriate access.The user is still unable to access the share.Which of the following actions should the administrator do to resolve the permissions issue?()ARequest the user to logoff and log back on.BAdd the user as an administrator on their local machine.CAdd the user as an administrator on the server.DRun an ipconfig /renew on the user’s machine.
单选题An administrator attempts to install the latest security patches for an older server. When the administrator runs the patch installer, the install fails. The administrator tries again, and the installer fails again. Which of the following is the MOST likely reason for this?()AThe administrator improperly configured the virtual memory settings on the server.BThe administrator is using incorrect patch switches for the install.CThe administrator is trying to install security patches for software that is not installed.DThe administrator is trying to install patches that require hard drive encryption on the server.
单选题An administrator creates a new directory then shares it on the Windows server. The administrator sets the permissions for everyone to "Modify" but users report they are unable to create or delete documents. Which of the following is the cause?()AThe administrator forgot to change the share permissionsBThe users were not part of the “Everyone” built in groupCThe administrator shared the files but not the folderD“Modify” only allows users to change existing documents
单选题What happens if you shutdown abort ASM instance?()AThe RDBMSs connected will shutdown abort tooBCLUSTER SERVICE will shutdownCASM wil do instance recovery after startup
单选题为了加强防止黑客猜测系统管理员Administrator的密码,保证系统安全,最有效的措施是哪个?()A给Administrator账户设置复杂密码B降低Administrator账户的系统权限C降低Guest账户权限D给Administrator账户改名
单选题Th efollowing access list below was applied outbound on the E0 interface connected to the 192.169.1.8/29LAN: access-list 135 deny tcp 192.169.1.80.0.0.7 eq 20 any access-list 135 deny tcp 192.169.1.80.0.0.7 e q21 any How will the above access lists affect traffic?()AFTP traffic from 192.169.1.22 wil lbe deniedBNot raffic,except for FTP traffic wil lbe allowed to exit E0CFTP traffic from 192.169.1.9 to any host will be deniedDAll traffic exiting E0 will be deniedEAll FTP traffic to network 192.169.1.9/29 will be denied