In which file can the administrator view the detailed results of the overnight cluster automatic verification?()A、clutils.logB、cluster.logC、clverify.logD、autoverify.log
In which file can the administrator view the detailed results of the overnight cluster automatic verification?()
- A、clutils.log
- B、cluster.log
- C、clverify.log
- D、autoverify.log
相关考题:
A network administrator would like to view detailed interface status, properties, statistics, errors,and CoS packet counters.Which operational command will display this information?() A. show interfaces extensiveB. show interfacesC. show configuration interfacesD. show interface status
Which of the following practices can encourage students to read an article critically?A.Evaluating its point of view. B.Finding out the facts.C.Finding detailed information.D.Doing translation exercises.
Which of the following practices can encourage students to read an article critically?A.Evaluating its point of view.B.Finding out the facts.C.Finding detailed information.D.Doing translation exercises.
An administrator has written a script to check that the contents of an application configuration file are identicalon all cluster nodes. The script has also been associated with a user defined custom verification method. Theadministrator would like the contents of this file to be checked and verified automatically on a daily basis.How can this be achieved?()A、By using a job scheduler such as cronB、By enabling automatic cluster verificationC、By including the script name in the file /usr/es/sbin/cluster/etc/clverify.rcD、By including the custom method name in the file /usr/es/sbin/cluster/etc/rc.authomethods
A network administrator would like to view detailed interface status, properties, statistics, errors,and CoS packet counters.Which operational command will display this information?()A、show interfaces extensiveB、show interfacesC、show configuration interfacesD、show interface status
Which two of these methods will allow a CUE administrator to view the output of the CUE message log file?()A、syslog server B、GUI interface C、CLI D、text editorE、TFTP server
An administrator runs clstat on a cluster node and receives the following response: ’Can not get Cluster Information.’ Which of the following daemons may need to be started in order to correct this problem?()A、 topsvcsB、 clinfoESC、 snmpinfoD、 clsmuxpdES
An administrator will be performing a PowerHA upgrade on a cluster from version 5.3 to version 5.5. Which ofthe following tasks will verify a successful migration?()A、Use the clstat command and verify the cluster is in a stable stateB、After each node is upgraded, run a verification and synchronizationC、After all nodes are upgraded, run a verification and synchronizationD、Take a snapshot of each node and verify the configuration is the same
A cluster administrator wants to create a snapshot backup of the cluster. Which smit menu can be used to dothis?()A、Extended ConfigurationB、System Management (C-SPOC)C、Problem Determination ToolsD、Initialization and Standard Configuration
When an emulated error notification method is complete, an administrator can view the error log By typing the errpt command to be sure the emulation took place. To verify that the error log entry is the result of the emulated event,the log entry resource name is set to EMULATOR,or which of the following?() A、 A user defined Resource NameB、 A cluster defined Resource NameC、 An error daemon specific Resource NameD、 A Resource Name generated by Automatic Error Notification
How can the administrator use file ’a’ containing ’-El sys0’ to view the attributes of a device()? A、lsdev -fv aB、lsattr -f aC、lsattr`cat a`D、lsdev -Cccat a
A cluster administrator has decided to add a cluster verification to the weekly maintenance scripts That are run from corn. When a cluster verification is performed,which of the following will require a custom verification method?() A、 HACMP ODM object classesB、 HACMP Error NotificationC、 HACMP Topology ResourcesD、 HACMP Application Server Start/Stop scripts
Company.com has decided to use the FUBAR Application Server to host their web application. Unfortunately, the FUBAR Application Server uses the server machine’s file system for its JNDI namespace. Every JNDI lookup performed in the web application is translated into a file 1/0 operation, which results in very poor performance. Which J2EE pattern can help with this performance issue?()A、 Transfer ObjectB、 Service LocatorC、 Intercepting FilterD、 Model-View-Controller
Which two statements about Automatic Storage Management (ASM) are true?()A、ASM provides mirroring on file by file basis.B、ASM provides automatic load balancing across all ASM disks.C、ASM supports the Oracle database and operating system files.D、ASM can be used to store trace files, alert log files, and the server parameter file (SPFILE).
To view the results of the most recent Automatic SQL Tuning Advisor task,which sequence should you follow?() A、 EM Database home page,Software and Support,SQL Advisors,Automatic SQL Tuning AdvisorB、 EM Database home page,Software and Support,Advisor Central,SQL Advisors,Automatic SQL Tuning AdvisorC、 EM Database home page,Software and Support,Support Workbench,Advisor Central,SQL Advisors,Automatic SQL Tuning AdvisorD、 Either B or CE、 All of the above
Which two files in the database can be configured for automatic backups by using the autobackupfeature in Recovery Manager (RMAN)()A、data filesB、control filesC、parameter fileD、online redo log filesE、server parameter file
While selecting files during an interactive restore with ufsrestore, you are interrupted by a junior administrator before you can complete the file selection process and start the restore. After answering the administrator’s question, you realize that you have forgotten which files you had already selected for the restore. How can you determine which files are already marked for extraction and restore? ()A、 You can use the ls subcommand of ufsrestore.B、 You can use the add subcommand of ufsrestore.C、 You can use the select subcommand of ufsrestore.D、 You can view the selected files as they are marked with a plus sign (+) in the list that is permanently displayed in the upper half of the interactive ufsrestore screen view.
Which result or results do these actions produce?()A、Users in both departments can access their files from the network.B、Users in the accounting department can view the legal department’s documents.C、Users in the legal department cannot view the accounting department’s documents.D、Company managers can access and modify both departments’ files.
单选题An administrator has written a script to check that the contents of an application configuration file are identicalon all cluster nodes. The script has also been associated with a user defined custom verification method. Theadministrator would like the contents of this file to be checked and verified automatically on a daily basis.How can this be achieved?()ABy using a job scheduler such as cronBBy enabling automatic cluster verificationCBy including the script name in the file /usr/es/sbin/cluster/etc/clverify.rcDBy including the custom method name in the file /usr/es/sbin/cluster/etc/rc.authomethods
单选题An administrator runs clstat on a cluster node and receives the following response: ’Can not get Cluster Information.’ Which of the following daemons may need to be started in order to correct this problem?()A topsvcsB clinfoESC snmpinfoD clsmuxpdES
单选题A cluster administrator has decided to add a cluster verification to the weekly maintenance scripts That are run from corn. When a cluster verification is performed,which of the following will require a custom verification method?()A HACMP ODM object classesB HACMP Error NotificationC HACMP Topology ResourcesD HACMP Application Server Start/Stop scripts
单选题Which of the following practices can encourage students to read an article critically?AEvaluating its point of view.BFinding out the facts.CFinding detailed information.DDoing translation exercises.
单选题In which file can the administrator view the detailed results of the overnight cluster automatic verification?()Aclutils.logBcluster.logCclverify.logDautoverify.log
单选题Company.com performs a cluster verification on a regular basis. Cluster verification is successfulbut the cluster sometimes fails to start the applications during a fallover. Investigation of the issue has revealed that the non-shared component of the application configuration information is not being kept up to date on the secondary nodes. What can be used to help resolve this issue?()A A pre-eventB Error notificationC Application monitoringD Custom verification methods
多选题Which two of these methods will allow a CUE administrator to view the output of the CUE message log file?()Asyslog serverBGUI interfaceCCLIDtext editorETFTP server
多选题Which two files in the database can be configured for automatic backups by using the autobackupfeature in Recovery Manager (RMAN)()Adata filesBcontrol filesCparameter fileDonline redo log filesEserver parameter file
单选题When an emulated error notification method is complete, an administrator can view the error log By typing the errpt command to be sure the emulation took place. To verify that the error log entry is the result of the emulated event,the log entry resource name is set to EMULATOR,or which of the following?()A A user defined Resource NameB A cluster defined Resource NameC An error daemon specific Resource NameD A Resource Name generated by Automatic Error Notification