单选题Which of the following files should an administrator modify to configure dynamic caching?()Adynacache.xmlBcachespec.xmlCdynacache.confDcachemon.xmlEcachespec.conf
单选题
Which of the following files should an administrator modify to configure dynamic caching?()
A
dynacache.xml
B
cachespec.xml
C
dynacache.conf
D
cachemon.xml
E
cachespec.conf
参考解析
解析:
暂无解析
相关考题:
An administrator is experiencing availability issues on a Linux server. The administrator decides tocheck the server for an IP address conflict on the server. Which of the following commands should the administrator use?()A.tracerouteB.tracertC.ifconfigD.ipconfig
A system administrator needs to backup datavg which contains a database that pre-allocates files by padding them with nulls, similar to treating them as sparse files. In order to effectively backup and be able to restore the datavg files, which backup method should be used?()A.savevgB.tarC.cpioD.mksysb
A user cannot access files on /deps/it directory, the administrator verifies permissions are set rw-------for the directory. Which of the following actions need to be performed to only grant read access to the user on the IT directory?()A、 Set folder permissions to 760.B、 Set folder permissions to 770.C、 Set folder permissions to modify.D、 Set folder permissions to full control.
An administrator notes that after a recent power outage, some open files were corrupted on one affected file server. Which of the following items should the administrator consider to determine the cause of this corruption?()A、The server's memoryB、The server's RAID controller batteryC、The server's processorD、The server's NIC teaming configuration
Before performing a mksysb system backup, which of the following procedures should a system administrator perform to avoid backing up certain user files?()A、Add the list of files to /etc/exclude.rootvg.B、Modify the image.data file and add the files to be excluded form the backup.C、Modify the bosinst.data file and specify which files are to be excluded from the backup.D、Specify the files to be excluded on the command line when executing the mksysb command.
A user reports that each day some files are deleted from the department share. The administrator needs to find who deleted these files. Which of the following actions should the administrator perform?()A、 Enable audit object access and specify files and folders to monitor using Task Manager.B、 Enable audit policy change and specify files and folders to monitor using Windows Explorer.C、 Enable audit object access and specify files and folders to monitor using Windows Explorer.D、 Open Performance Monitor and monitor folder activity.
An administrator creates a new directory then shares it on the Windows server. The administrator sets the permissions for everyone to "Modify" but users report they are unable to create or delete documents. Which of the following is the cause?()A、The administrator forgot to change the share permissionsB、The users were not part of the “Everyone” built in groupC、The administrator shared the files but not the folderD、“Modify” only allows users to change existing documents
An administrator does not have console access to a Windows Server. Which of the following command line utilities should the administrator use to reboot the system remotely?()A、rebootB、pkillC、shutdownD、kill
An administrator needs to connect servers to the Fiber Channel SAN. Which of the following should the administrator install in the servers to allow this connection?()A、RiserB、HBAC、SCSI cardD、SAS card
An administrator notes that after a recent power outage, some open files were corrupted on oneaffected file server. Which of the following items should the administrator consider to determine the cause of this corruption?()A、 The servers memoryB、 The servers RAID controller batteryC、 The servers processorD、 The servers NIC teaming configuration
An administrator is getting reports that a file server is responding slowly. Which of the following steps should the administrator take FIRST?()A、Remove unnecessary files on the server to free up hard disk space.B、Defragment the server’s hard disks.C、Compare monitoring results with the server baseline.D、Add additional memory to reduce paging.
A server administrator implements a solution that should fix an issue. Which of the following should the administrator do NEXT in the troubleshooting process?()A、Notify users impacted by the problemB、Verify full system functionalityC、Document the actions and outcomesD、Identify the scope of the problem
An administrator is experiencing availability issues on a Linux server. The administrator decides tocheck the server for an IP address conflict on the server. Which of the following commands should the administrator use?()A、tracerouteB、tracertC、ifconfigD、ipconfig
Which of the following commands should Karen, a technician, use to examine and restoreprotected system files?()A、SFCB、RECOVERC、REPLACED、COPY
An administrator is investigating an incident where an unauthorized user gained access to a servera nd modified HR files.The administrator has a tested theory as to how the user accomplished this.Which of the following actions should the administrator take NEXT?()A、Perform a root cause analysis.B、Implement a change to the servers.C、Establish a plan of action to resolve the issue.D、Question users prior to implementing the solution.
An administrator receives an error when attempting to execute a WebSphere Commerce command and decides to take the following steps to troubleshoot the problem: Check to see if the request was processed by the WebSphere plug-in but was never received by the WebSphere Application Server Check for Java errors from EJBs and servlets Trace WebSphere Commerce Server subsystems and commands Which of the following files should the administrator check to accomplish these steps?()A、error.logB、trace.logC、http_plugin.logD、servlet.logE、SystemOut.log
An administrator notices the / filesystem is 98% full. Which of the following files commonly grow rapidly()A、/var/adm/wtmpB、/etc/security/failedloginC、/smit.scriptD、/proc
Which of the following files should an administrator modify to configure dynamic caching?()A、dynacache.xmlB、cachespec.xmlC、dynacache.confD、cachemon.xmlE、cachespec.conf
Which of the following roles can use the Organization Administration Console to create and modify users in their organization?()A、Buyer AdministratorB、Site AdministratorC、SellerD、Seller AdministratorE、Store Administrator
单选题Which of the following files should an administrator modify to configure dynamic caching?()Adynacache.xmlBcachespec.xmlCdynacache.confDcachemon.xmlEcachespec.conf
多选题Which of the following roles can use the Organization Administration Console to create and modify users in their organization?()ABuyer AdministratorBSite AdministratorCSellerDSeller AdministratorEStore Administrator
单选题Before performing a mksysb system backup, which of the following procedures should a system administrator perform to avoid backing up certain user files?()AAdd the list of files to /etc/exclude.rootvg.BModify the image.data file and add the files to be excluded form the backup.CModify the bosinst.data file and specify which files are to be excluded from the backup.DSpecify the files to be excluded on the command line when executing the mksysb command.
单选题A system administrator needs to backup datavg which contains a database that pre-allocates files by padding them with nulls, similar to treating them as sparse files. In order to effectively backup and be able to restore the datavg files, which backup method should be used?()AsavevgBtarCcpioDmksysb
单选题A user reports that each day some files are deleted from the department share. The administrator needs to find who deleted these files. Which of the following actions should the administrator perform?()A Enable audit object access and specify files and folders to monitor using Task Manager.B Enable audit policy change and specify files and folders to monitor using Windows Explorer.C Enable audit object access and specify files and folders to monitor using Windows Explorer.D Open Performance Monitor and monitor folder activity.
多选题An administrator receives an error when attempting to execute a WebSphere Commerce command and decides to take the following steps to troubleshoot the problem: Check to see if the request was processed by the WebSphere plug-in but was never received by the WebSphere Application Server Check for Java errors from EJBs and servlets Trace WebSphere Commerce Server subsystems and commands Which of the following files should the administrator check to accomplish these steps?()Aerror.logBtrace.logChttp_plugin.logDservlet.logESystemOut.log
单选题An administrator creates a new directory then shares it on the Windows server. The administrator sets the permissions for everyone to "Modify" but users report they are unable to create or delete documents. Which of the following is the cause?()AThe administrator forgot to change the share permissionsBThe users were not part of the “Everyone” built in groupCThe administrator shared the files but not the folderD“Modify” only allows users to change existing documents
单选题An administrator notes that after a recent power outage, some open files were corrupted on one affected file server. Which of the following items should the administrator consider to determine the cause of this corruption?()AThe server's memoryBThe server's RAID controller batteryCThe server's processorDThe server's NIC teaming configuration
单选题An administrator notes that after a recent power outage, some open files were corrupted on oneaffected file server. Which of the following items should the administrator consider to determine the cause of this corruption?()A The servers memoryB The servers RAID controller batteryC The servers processorD The servers NIC teaming configuration