An administrator logs into a server and notices slow performance.  When the system finishes the logon process a message is displayed saying the system is out of Virtual Memory.  Which of the following is the MOST likely cause of this issue?()A、The drives have been configured as basic.B、The system partition with the page file is out of space.C、The VMFS has bad sectors.D、The drivers for the memory have become corrupt.

An administrator logs into a server and notices slow performance.  When the system finishes the logon process a message is displayed saying the system is out of Virtual Memory.  Which of the following is the MOST likely cause of this issue?()

  • A、The drives have been configured as basic.
  • B、The system partition with the page file is out of space.
  • C、The VMFS has bad sectors.
  • D、The drivers for the memory have become corrupt.

相关考题:

You are an administrator of Ezonexam.com's network. You want to perform. routine upgrades on your Windows 2000 Server computer. You use your non-administrator user account in the domain to logon to the server.You want to upgrade all of the critical system files and patches on the server in the shortest possible time.What should you do?A.Use Windows Update.B.Run System File Checker.C.Log on as administrator and run Windows Update.D.Log on as administrator and run System File Checker.

An administrator receives a contract for a server install at a new building. Which of the followingshould be completed after installing the server?() A. Log the administrator password usedB. Test the air temperatureC. Update the network diagramD. Review the evacuation procedures

You have a stand-alone server that runs Windows Server 2003 Service Pack 2 (SP2).You attempt to log on to the server by using the Administrator account and receive the following error message.You need to log on to the server by using the Administrator account.What should you do first? ()A. Restart the server in Safe mode.B. Restart the server by using the Last Known Good Configuration option.C. Log on to another stand-alone server as an Administrator.D. Log on to the server by using an account that is a member of the Power Users group.

The system administrator wants to use a new jfslog /dev/fs1log with the filesystem /test/fs1 on the testvg volume group. The following commands were used to create the log and assign it to the filesystem:  (1)mklv -t jfslog -y /dev/fs1log testvg 1   (2)chfs -a log=/dev/fs1log /test/fs1   While trying to mount the /test/fs1 filesystem the administrator received the error:  "Cannot mount /dev/fs1lv on /test/fs1: A system call received a parameter that is not valid". What step did the administrator miss that most likely caused the error?()A、Use the logform command to format /dev/fs1log as a jfslogB、Use the chlv command to change the lv type of /dev/fs1log to jfslogC、Use the chvg command to change the default jfslog of testvg to /dev/fs1logD、Edit the /etc/filesystems file to change the log associated with /test/fs1 to /dev/fs1log

A system administrator noticed several error messages on the screen while the system was booting up; but was not able to write them down. Where should the system administrator look for the console log, assuming it is in the default location?()A、/tmp/conslogB、/etc/console.logC、/var/adm/ras/conslogD、/var/ras/console.log

In which file can the administrator view the detailed results of the overnight cluster automatic verification?()A、clutils.logB、cluster.logC、clverify.logD、autoverify.log

A user in your company network needs to encrypt a folder that is on her Windows 2000 Professional computer. Her computer has two drives: Drive C and Drive D. The folder that needs to be encrypted is located on Drive D. When the user attempts to encrypt the folder, no option for encryption can be found in the folder properties. What should you do to enable the user to encrypt the folder? ()A、Log on to her computer as an administrator, and then run the cipher/e command.B、Instruct the user to run the chipper/e command.C、Log on to her computer as an administrator, and then run the Secedit/enforce command.D、Instruct the user to run the Secedit/enforce command.E、Log on to her computer as an administrator, and then run the Convert d:/FS:NTFS command.

Which two of these methods will allow a CUE administrator to view the output of the CUE message log file?()A、syslog server B、GUI interface C、CLI D、text editorE、TFTP server

An administrator receives a contract for a server install at a new building. Which of the followingshould be completed after installing the server?()A、Log the administrator password usedB、Test the air temperatureC、Update the network diagramD、Review the evacuation procedures

A System p administrator suspects they are receiving an error from one of their nightly cron jobs. The  job is: 0 1 * * * /usr/local/bin/nightlycheck.pl Where should the administrator first look for errors reported by  this cron job()A、/var/log/syslog.outB、var/log/cron.logC、/var/spool/cron/logsD、mail

A system administrator decides to review the system error log after installing new hardware. Which of the following is the correct command to use?()A、errptB、syslogC、prtdiagD、errlogger

A System p administrator noticed several error messages on the screen while the system was booting up; but was not able to write them down.  Where should the system administrator look for the console log, assuming it is in the default location()A、/var/log/conslogB、/var/log/console.logC、/var/adm/ras/conslogD、/var/ras/console.log

How could an Administrator verify if there were any problems during the installation of WebSphere Commerce V5.6?()A、Check the wcinstall.log fileB、Verify the commerce processes are runningC、Check the servlet.log fileD、Check the WebSphere.log file

When an emulated error notification method is complete, an administrator can view the error log  By typing the errpt command to be sure the emulation took place.  To verify that the error log entry is the result of the emulated event,the log entry resource name is set to EMULATOR,or which of the following?()  A、 A user defined Resource NameB、 A cluster defined Resource NameC、 An error daemon specific Resource NameD、 A Resource Name generated by Automatic Error Notification

A junior level Database Administrator erroneously deleted the database alert log while users were accessing the database. Which action should you take to recover the alert log?()  A、 Do nothing.B、 Restart the database.C、 Perform recovery on the database.D、 Restore the alert log from the last backup.

In which scenario is a Database Administrator NOT required to perform an incomplete recovery?()A、 when all the online redo log groups are multiplexed and one of the members of a group is missingB、 when all the online redo log groups are not multiplexed and one log group is missingC、 when all the control files are missingD、 when some important tables are deleted from the database and purged from the Recycle Bin

You are the desktop administrator for Contoso, Ltd. A graphic designer named Peter saves all his files in the My Documents folder on his Window XP Professional computer. Peter now needs to work on several computers each day to complete his work. Peter needs to be able to access his files at any time. You implement a roaming user profile and a home directory for Peter. However, Peter reports that when he uses his roaming profile, it takes 10 minutes for him to log on to computers other than his own. You need to reduce the amount of time it takes for Peter to log on to computers when using his roaming profile. What should you do?() A、Change the UNC path of Peter’s roaming profile to his home directory folder. B、Log on as a local administrator on Peter’s computer. Change the roaming profile to a local profile. C、Log on as a local administrator on Peter’s computer. Edit the local Group Policy to exclude Directories in Roaming Profile. D、Log on as a local administrator on Peter’s computer. In the properties of the My Documents folder, change the Target folder location to Peter’s home directory.

You are installing an application on a computer that runs Windows Server 2008 R2.   During installation, the application will need to add new attributes and classes to the Active Directory  database.   You need to ensure that you can install the application.   What should you do()A、Change the functional level of the forest to Windows Server 2008 R2.B、Log on by using an account that has Server Operator rights.C、Log on by using an account that has Schema Administrator rights and the appropriate rights to install  the application.D、Log on by using an account that has the Enterprise Administrator rights and the appropriate rights to  install the application.

You are installing an application on a computer that runs Windows Server 2008 R2. During  installation, the application will need to add new attributes and classes to the Active Directory  database.     You need to ensure that you can install the application.     What should you do()A、Change the functional level of the forest to Windows Server 2008 R2.B、Log on by using an account that has Server Operator rights.C、Log on by using an account that has Schema Administrator rights and the appropriate rights to install the applicatioD、Log on by using an account that has the Enterprise Administrator rights and the appropriate rights to install the app

A System p administrator needs to run the annualreval.sh script, directing standard error to /var/log/reval.err, and appending standard out to /var/log/reval.log.  How can this be accomplished ()A、annualreval.sh 21 /var/log/reval.log 2 /var/log/reval.errB、annualreval.sh 1/var/log/reval.log 2/var/log/reval.errC、annualreval.sh 21 /var/log/reval.log /var/log/reval.errD、annualreval.sh 1/var/log/reval.log 2/var/log/reval.err

单选题A user requests access to a new file share.The administrator adds the user to the group with the appropriate access.The user is still unable to access the share.Which of the following actions should the administrator do to resolve the permissions issue?()ARequest the user to logoff and log back on.BAdd the user as an administrator on their local machine.CAdd the user as an administrator on the server.DRun an ipconfig /renew on the user’s machine.

单选题A System p administrator suspects they are receiving an error from one of their nightly cron jobs. The  job is: 0 1 * * * /usr/local/bin/nightlycheck.pl Where should the administrator first look for errors reported by  this cron job()A/var/log/syslog.outBvar/log/cron.logC/var/spool/cron/logsDmail

多选题You work as a database administrator for Supportcenter.cn. Users in the SupportCenter PROD database complain about the slow response when accessing the database. In the Active Session Waiting: Configuration page you find that the majority of the wait time is for the redo log buffer. Further investigation using the Run Queue graph and operating system tools reveals that the redo log files are on the same disks, and that the disk I/O for the redo log files is the reason for the performance degradation.  Which two actions would you take to gain performance?()AIncrease the size of redo log filesBIncrease the size of redo log bufferCIncrease the number of redo log filesDPlace the redo log files on a separate diskEDecrease the number of redo log groups to twoFIncreate the number Log Writer (LGWR) process

单选题An administrator is beginning a set of failover tests. The administrator would like to have clean log files foreach test. Which command will achieve this?()AclcycleBclrefreshCcllogcycleDcllogrotate

单选题You have a domain controller named Server1 that runs Windows Server 2003 Service Pack 2 (SP2).You start Server1 in Directory Services Restore Mode and attempt to log on by using the username administrator and a password of Pa$$w0rd. The logon attempt fails.You restart Server1 normally and successfully log on to the server by using the username administrator and a password of Pa$$w0rd.You need to ensure that you can log on to Server1 in Directory Services Restore Mode.What should you do? ()AFrom ntdsutil.exe, run Set DSRM Password.BFrom ntdsutil.exe, run Security account management.CFrom Active Directory Users and Computers, select the Account is trusted for delegation option for the Administrator account.DFrom Active Directory Users and Computers, select the Store password using reversible encryption option for the Administrator account.

单选题A System p administrator noticed several error messages on the screen while the system was booting up; but was not able to write them down.  Where should the system administrator look for the console log, assuming it is in the default location()A/var/log/conslogB/var/log/console.logC/var/adm/ras/conslogD/var/ras/console.log

单选题You work as a database administrator for Supportcenter.cn. You determine that archiving was not successful in one of thedestinators. You want to check the alert log file for more information on this.Which initialization parameter gives you the location of the alert log file?()AUSER_DUMP_DESTBCORE_DUMP_DESTCALERT_LOG_DESTDALERT_DUMP_DESTETRACE_DUMP_DESTFBACKGROUND_DUMP_DEST

多选题Which two of these methods will allow a CUE administrator to view the output of the CUE message log file?()Asyslog serverBGUI interfaceCCLIDtext editorETFTP server