单选题Before performing a mksysb system backup, which of the following procedures should a system administrator perform to avoid backing up certain user files?()AAdd the list of files to /etc/exclude.rootvg.BModify the image.data file and add the files to be excluded form the backup.CModify the bosinst.data file and specify which files are to be excluded from the backup.DSpecify the files to be excluded on the command line when executing the mksysb command.

单选题
Before performing a mksysb system backup, which of the following procedures should a system administrator perform to avoid backing up certain user files?()
A

Add the list of files to /etc/exclude.rootvg.

B

Modify the image.data file and add the files to be excluded form the backup.

C

Modify the bosinst.data file and specify which files are to be excluded from the backup.

D

Specify the files to be excluded on the command line when executing the mksysb command.


参考解析

解析: 暂无解析

相关考题:

After performing a copy backup of a file server, the archive bit on the backed up files will be which of the following?() A. DeletedB. UnchangedC. SetD. Copied

Before performing a mksysb system backup, which of the following procedures should a system administrator perform to avoid backing up certain user files?() A.Add the list of files to /etc/exclude.rootvg.B.Modify the image.data file and add the files to be excluded form the backup.C.Modify the bosinst.data file and specify which files are to be excluded from the backup.D.Specify the files to be excluded on the command line when executing the mksysb command.

A system administrator needs to backup datavg which contains a database that pre-allocates files by padding them with nulls, similar to treating them as sparse files. In order to effectively backup and be able to restore the datavg files, which backup method should be used?()A.savevgB.tarC.cpioD.mksysb

A system administrator needs to backup datavg which contains a database that pre-allocates files by padding them with nulls, similar to treating them as sparse files. In order to effectively backup and be able to restore the datavg files, which backup method should be used?()A、savevgB、tarC、cpioD、mksysb

Before performing a mksysb system backup, which of the following procedures should a system administrator perform to avoid backing up certain user files?()A、Add the list of files to /etc/exclude.rootvg.B、Modify the image.data file and add the files to be excluded form the backup.C、Modify the bosinst.data file and specify which files are to be excluded from the backup.D、Specify the files to be excluded on the command line when executing the mksysb command.

Which of the following files should be edited to disable remote machines from performing a "finger" on a system?()A、/etc/security/userB、/etc/servicesC、/etc/inetd.confD、/etc/hosts.equiv

A corrupted file system is now repaired and back in use. Some, but not all of the files within the file  systems have been deleted. The only backup of this file system is a month-old tar archive. This archive will need to be restored as root.  Which two statements correctly describe the effects of the restore operation?()A、 Files found in the file system that are also on tape will NOT be overwritten.B、 The missing files, present on the backup tape, are restored to the file system with the data as it was when the backup was taken.C、 The access times are preserved by tar and will reflect the time when a user last accessed the data.D、 The modification time on the files restored by tar will be preserved and will reflect the time the file was last modified before the backup, NOT the time of the restore operation.

You want to use Windows 2000 backup to perform a weekly backup of the user data on a Windows 2000 Professional computer. You want to ensure that the registry, boot files and COM plus objects are also backed up. What should you do?()A、Configure the Windows backup to backup the system partition.B、Configure the Windows backup to backup the System State Data.C、Create a script written in MS Visual Basic scripting addition language to run rdisk.exe/s before the back up starts.D、Create a batch file to run rdisk.exe/s before the backup starts.

Which of the following access levels allows a user to perform normal day to day work with their own files but does not allow them to change system files or computer performance?()A、AdministratorB、UserC、GuestD、Power user

After performing a copy backup of a file server, the archive bit on the backed up files will be which of the following?()A、 DeletedB、 UnchangedC、 SetD、 Copied

A system administrator has an existing mksysb image, but would like to modify the image.data file on the mksysb before installing it on a system. Which of the following procedures is most appropriate to perform?()A、Create a new image.data file and recreate the mksysb image.B、Use the dd command to replace the image.data file on the mksysb tape.C、Use the tctl command to palce the new image.data file on the mksysb tape.D、Place the new image.data file on a diskette that will be road during the installation of the mksysb.

A system administrator had a disk failure on an HMC. The disk was replaced and the HMC was loaded from the Product Recovery CD. The system administrator had performed a backup to DVD of the HMC data before the system failed. After restoring the backup files, it was noticed that no profile files were restored. What is the most likely cause of this problem?()A、The profile data was not initialized after restoring the backup CDB、The profile data was not backed up before doing the Critical Console Data backupC、A Critical Console Data backup was performed which backs up user data, but not profile dataD、A Save Upgrade data was done instead of a backup Critical Console Data and the profile files were not included

Which files are managed through the use of the file collection "HACMP_Files"?()A、The PowerHA Global ODM.B、System networking files including /etc/hosts, /etc/inetd.conf and /etc/servicesC、Security files including /etc/passwd, /etc/security/passwd, /etc/group and/etc/security/groupD、User configurable files including Application server start and stop scripts, custom pre and post notificationevents and application monitoring scripts

A System p administrator needs to set the default password length for all users to six characters.  Which of the following files needs to be edited to accomplish this ()A、/etc/security/limitsB、/etc/security/mkuser.sysC、/etc/security/privD、/etc/security/user

The user base of a three-node cluster has increased. In order to add clustered users to all nodes, which of the following steps should be performed?()  A、 On one of the nodes,add the users via C-SPOC ’Add a User to the Cluster’smit menu.B、 Use C-SPOC to synchronize the password files between cluster nodes.C、 On all of the nodes,add the users to the /etc/passwd and system security files,and then synchronize the cluster.D、 On one of the nodes,add the users to the /tec/passwd and system security files,add home directories,and use cron to automate the movement of system security files between nodes.

You need to back up the existing data on a computer before you install a new application. You also need to ensure that you are able to recover individual user files that are replaced or deleted during the installation.  What should you do?()A、Create a System Restore point.B、Perform an Automated System Recovery (ASR) backup and restore.C、In the Backup and Restore Center window, click the Back up files button.D、In the Backup and Restore Center window, click the Back up computer button.

单选题Your data recovery strategy must meet the following requirements: Back up all data files and folders in C:///Data.  Restore individual files and folders in C:///Data.  Ensure that data is backed up to and restored from external media.  What should you do?()AUse the Previous Versions feature to restore the files and folders.BUse the System Restore feature to perform backup and restore operations.CUse the NTBackup utility to back up and restore individual files and folders.DUse the Backup and Restore Center to back up and restore files.

单选题A system administrator needs to backup datavg which contains a database that pre-allocates files by padding them with nulls, similar to treating them as sparse files. In order to effectively backup and be able to restore the datavg files, which backup method should be used?()AsavevgBtarCcpioDmksysb

单选题After performing a copy backup of a file server, the archive bit on the backed up files will be which of the following?()ADeletedBUnchangedCSetDCopied

单选题A system administrator has an existing mksysb image, but would like to modify the image.data file on the mksysb before installing it on a system. Which of the following procedures is most appropriate to perform?()ACreate a new image.data file and recreate the mksysb image.BUse the dd command to replace the image.data file on the mksysb tape.CUse the tctl command to palce the new image.data file on the mksysb tape.DPlace the new image.data file on a diskette that will be road during the installation of the mksysb.

单选题A system administrator had a disk failure on an HMC. The disk was replaced and the HMC was loaded from the Product Recovery CD. The system administrator had performed a backup to DVD of the HMC data before the system failed. After restoring the backup files, it was noticed that no profile files were restored. What is the most likely cause of this problem?()AThe profile data was not initialized after restoring the backup CDBThe profile data was not backed up before doing the Critical Console Data backupCA Critical Console Data backup was performed which backs up user data, but not profile dataDA Save Upgrade data was done instead of a backup Critical Console Data and the profile files were not included

多选题A corrupted file system is now repaired and back in use. Some, but not all of the files within the file  systems have been deleted. The only backup of this file system is a month-old tar archive. This archive will need to be restored as root.  Which two statements correctly describe the effects of the restore operation?()AFiles found in the file system that are also on tape will NOT be overwritten.BThe missing files, present on the backup tape, are restored to the file system with the data as it was when the backup was taken.CThe access times are preserved by tar and will reflect the time when a user last accessed the data.DThe modification time on the files restored by tar will be preserved and will reflect the time the file was last modified before the backup, NOT the time of the restore operation.

单选题You want to use Windows 2000 backup to perform a weekly backup of the user data on a Windows 2000 Professional computer. You want to ensure that the registry, boot files and COM plus objects are also backed up. What should you do?()AConfigure the Windows backup to backup the system partition.BConfigure the Windows backup to backup the System State Data.CCreate a script written in MS Visual Basic scripting addition language to run rdisk.exe/s before the back up starts.DCreate a batch file to run rdisk.exe/s before the backup starts.

单选题Which of the following files should be edited to disable remote machines from performing a "finger" on a system?()A/etc/security/userB/etc/servicesC/etc/inetd.confD/etc/hosts.equiv

单选题After performing a copy backup of a file server, the archive bit on the backed up files will be which of the following?()A DeletedB UnchangedC SetD Copied

单选题Which of the following access levels allows a user to perform normal day to day work with their own files but does not allow them to change system files or computer performance?()AAdministratorBUserCGuestDPower user

单选题The user base of a three-node cluster has increased. In order to add clustered users to all nodes, which of the following steps should be performed?()A On one of the nodes,add the users via C-SPOC ’Add a User to the Cluster’smit menu.B Use C-SPOC to synchronize the password files between cluster nodes.C On all of the nodes,add the users to the /etc/passwd and system security files,and then synchronize the cluster.D On one of the nodes,add the users to the /tec/passwd and system security files,add home directories,and use cron to automate the movement of system security files between nodes.