单选题When the clverify utility is run,verification checks use ODM data provided by the common communication infrastructure. This provides efficient access to configuration ODMs from the other nodes. The utility manages these files by storing the copies in various directories depending on the success or failure of the verification pass.  By default,this directory is "/var/hacmp/clverify/current/nodename/ if the ’current’ directory still exists when clverify stops running,this indicates which of the following?()A A successful completion of clverifyB A problem with the clverify utilityC All nodes agree on active configurationD Configuration differences between current and last successful clverify

单选题
When the clverify utility is run,verification checks use ODM data provided by the common communication infrastructure. This provides efficient access to configuration ODMs from the other nodes. The utility manages these files by storing the copies in various directories depending on the success or failure of the verification pass.  By default,this directory is "/var/hacmp/clverify/current/nodename/ if the ’current’ directory still exists when clverify stops running,this indicates which of the following?()
A

 A successful completion of clverify

B

 A problem with the clverify utility

C

 All nodes agree on active configuration

D

 Configuration differences between current and last successful clverify


参考解析

解析: 暂无解析

相关考题:

A user on your network downloads a video card driver from the Internet. You are unsure of the source of the driver. You want to ensure that the user does not lose production time because of an incompatible driver. What should you do?()A、Install the driver into the computer. Restart the computer. Use the last known good configuration to recover the original driver if necessary. B、Install the driver in the computer. Use the hardware troubleshooter and then use the recovery console to recover the original driver if necessary. C、Display the advanced attributes of the video card driver file. Install the file only if the contents have been secured. D、Run file signature verification utility to verify that the driver has been digitally signed.

In which file can the administrator view the detailed results of the overnight cluster automatic verification?()A、clutils.logB、cluster.logC、clverify.logD、autoverify.log

The utility that checks the file system structure is:()A、REGEDITB、SYSEDITC、MSCONFIGD、CHKDSK

A customer purchased a new PC with Windows XP but wants to run a program designed forWindows 98. Which of the following will allow this program to run under Windows XP?()A、Change the file permissions for the executable file.B、Use the convert utility to change the attributes of the executable file.C、Make sure that Windows XP has FAT32 file system.D、Run the executable file under compatibility mode.

Which of the following should be done during a Windows server OS installation to install third party drivers for a storage array controller?()A、 Use recovery console from Windows setup.B、 Have the manufacturer’s driver disk in the floppy drive and Windows will install it automatically.C、 Press F6 when prompted during the setup utility.D、 Run setup using the appropriate installation wizard.

An administrator will be performing a PowerHA upgrade on a cluster from version 5.3 to version 5.5. Which ofthe following tasks will verify a successful migration?()A、Use the clstat command and verify the cluster is in a stable stateB、After each node is upgraded, run a verification and synchronizationC、After all nodes are upgraded, run a verification and synchronizationD、Take a snapshot of each node and verify the configuration is the same

You need to relocate the existing user and computer objects in your company to different  organizational units.     What are two possible ways to achieve this goal()A、Run the Dsmod utility.B、Run the Active Directory Migration Tool (ADMT).C、Run the Active Directory Users and Computers utility.D、Run the move-item command in the Microsoft Windows PowerShell utility.

After installing the base operating system and the Server bundle, a system administrator decides to remove several printer definitions that the system users will not need. Which of the following procedures is the best way for a system administrator to remove the extra printer definitions?()A、Select the SMIT option to remove software productsB、Reinstall the desired filesets using the "Force Overwrite" optionC、Delete the unnecessary entries from the /usr/lpp/printers directoryD、Use the ODM edit (odem) utility to revmoe the definition from the system's ODM database

Company.com performs cluster verification every Sunday night with a corn job. The systems administrator reviews the /var/hacmp/clverify/clverify.log on Monday morning and notice that cluster verification posted a message about inconsistent filesystem names in one of the shared volume groups.  What should the administrator do?()  A、 Cause a fallover to occur on the resource group.B、 Export the volume groups and re-import them on all nodes.C、 Run an importvg -L command on all the nodes in the cluster.D、 Investiage recent changes to the shared volume group and use C-SPOC to correct inconsistencies.

When a problem occurs in an HACMP cluster,which log file will show the high level overview of the cluster operation?()  A、 /tmp/hacmp.outB、 /tmp/clstrmgr.debugC、 /usr/es/adm/cluster.logD、 /var/hacrmp/clverify/clverify.log

When the clverify utility is run,verification checks use ODM data provided by the common communication infrastructure. This provides efficient access to configuration ODMs from the other nodes. The utility manages these files by storing the copies in various directories depending on the success or failure of the verification pass.  By default,this directory is "/var/hacmp/clverify/current/nodename/ if the ’current’ directory still exists when clverify stops running,this indicates which of the following?()A、 A successful completion of clverifyB、 A problem with the clverify utilityC、 All nodes agree on active configurationD、 Configuration differences between current and last successful clverify

A cluster administrator has decided to add a cluster verification to the weekly maintenance scripts  That are run from corn.  When a cluster verification is performed,which of the following will require a custom verification method?()  A、 HACMP ODM object classesB、 HACMP Error NotificationC、 HACMP Topology  ResourcesD、 HACMP Application Server Start/Stop scripts

For which two tasks would it be best NOT to use the utility SQL*Loader?()A、When loading selected rows into each table.B、When loading data from an export dump file.C、When loading data from disk, tape, or named pipes.D、When your data is NOT being inserted from a flat file.E、When using a record management system to access data files.

Very soon you will be performing maintenance operations. You would have several jobs to run as soon as the maintenance period starts. Which method would you use to create jobs without specifying the time period when the job should be run?()A、 use DBMS_IJOB packageB、 use Oracle SchedulerC、 use DBMS_JOB packageD、 use Oracle Data Pump Export and Import

You are the network administrator for your company. The network consists of a single Active Directory domain. All network servers run Windows Server 2003. You are directed to back up all files in a folder named C:/Data on one of the servers. You use the Backup utility to perform a normal backup of C:/Data. When the backup is complete, you review the backup log file and discover the following message: "WARNING: Portions of '/Data/Letter.doc' cannot be read. The backed up data is corrupt or incomplete. This file will not restore correctly." You need to ensure that all documents in C:/Data can be restored successfully. What should you do? ()A、In the Backup utility, specify an incremental backup. Run the backup again.B、In the Backup utility, clear the Disable volume shadow copy option. Run the backup again.C、In the attribute properties of C:/Data/Letter.doc, select the File is ready for archiving option. Run the backup again.D、In the Offline Settings dialog box of C:/Data, select the All files and programs that users open from the share will be automatically available offline option. Run the backup again.

You are the administrator of Company’s network.You install 50 new Windows 2000 Professional computers in the marketing department. Two weeks later,users report that five of the computers have stopped responding. You troubleshoot the five computers.You find that some users have installed unsigned device drivers that are not supported by Windows 2000Professional.You want to determine which drivers were installed by users.What should you do?()A、Run the chkdsk /f command on all drives on the computers.B、Configure Windows 2000 Professional to enable driver signing verification.C、Run the File Signature Verification tool on the computers.D、Run the System File Checker utility on the computers.

You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003. You are directed to back up all files in folder named c:/Data on one of the servers. You use the Backup utility to perform a normal backup of c:/Data. When the backup is complete, you review the backup log file and discover the following message: "WARNING: Portions of '/Data/Letter.doc' cannot be read. The backed up data is corrupt or incomplete. This file will not restore correctly" You need to ensure that all documents in c:/Data can be restored successfully. What should you do?()A、In the Backup utility, specify an incremental backup. Run the backup again.B、In the Backup utility, clear the Disable volume shadow copy option. Run the backup again.C、In the attribute properties of c:/Data/Letter.doc, select the File is ready for archiving option. Run the backup again.D、In the Offline settings dialog box of c:/Data, select the All files and programs that users open from the share will be automatically available offline option. Run the backup again.

You need to design a migration strategy to migrate public folders from the existing Exchange Server 5.5 environment to the Exchange Server 2003 environment. What should you do?()A、Install and configure the Exchange utility. Use the utility to migrate and import all calendar information into each new mailboxB、Install and configure the InterOrg Replication Utility. Use the utility to migrate public folder information from Exchange Server 5.5 to Exchange Server 2003C、Install and configure a public folder connection agreement. Use this agreement to migrate the public folder information from Exchange Server 5.5 to Exchange Server 2003D、Run the pfmigrate command to migrate the public folder information from Exchange Server 5.5 to Exchange Server 2003

单选题A cluster administrator has decided to add a cluster verification to the weekly maintenance scripts  That are run from corn.  When a cluster verification is performed,which of the following will require a custom verification method?()A HACMP ODM object classesB HACMP Error NotificationC HACMP Topology  ResourcesD HACMP Application Server Start/Stop scripts

单选题Company.com performs cluster verification every Sunday night with a corn job. The systems administrator reviews the /var/hacmp/clverify/clverify.log on Monday morning and notice that cluster verification posted a message about inconsistent filesystem names in one of the shared volume groups.  What should the administrator do?()A Cause a fallover to occur on the resource group.B Export the volume groups and re-import them on all nodes.C Run an importvg -L command on all the nodes in the cluster.D Investiage recent changes to the shared volume group and use C-SPOC to correct inconsistencies.

单选题What happens when Host Checker is configured to perform checks every "0" minutes? ()AHost Checker is disabled.BHost Checker will perform continous checks.CHost Checker will perform checks when user logs out.DHost Checker will perform checks when user first logs in.

单选题Node ’C’ has just completed reintegration in a three-node cluster. The hacmp.out logifle displays  The event node_up_complete for Node ’C’. The cluster administrator wishes to verify that the cluster is stable.  In addition to reviewing the cluster log files,what utility should be run to verify the cluster state?()A clstatB clinfoC cldiagD clverify

单选题Very soon you will be performing maintenance operations. You would have several jobs to run as soon as the maintenance period starts. Which method would you use to create jobs without specifying the time period when the job should be run?()A use DBMS_IJOB packageB use Oracle SchedulerC use DBMS_JOB packageD use Oracle Data Pump Export and Import

单选题Which of the following should be done during a Windows server OS installation to install third party drivers for a storage array controller?()A Use recovery console from Windows setup.B Have the manufacturer’s driver disk in the floppy drive and Windows will install it automatically.C Press F6 when prompted during the setup utility.D Run setup using the appropriate installation wizard.

单选题Your company’s security policy requires complex passwords. You have a comma delimited file named import.csv that contains user account information. You  need to create user accounts in the domain by using the import.csv file.   You also need to ensure that the new user accounts are set to use default passwords and are  disabled.     What should you do()AModify the userAccountControl attribute to disabled. Run the csvde -i -k -f import.csv command. Run the DSMOD uBModify the userAccountControl attribute to accounts disabled. Run the csvde -f import.csv command. Run the DSMCModify the userAccountControl attribute to disabled. Run the wscript import.csv command. Run the DSADD utility toDModify the userAccountControl attribute to disabled. Run the ldifde -i -f import.csv command. Run the DSADD utility

单选题You want to configure and schedule offline database backups to run automatically.  Which tool or utility wouldyou use to achieve this()AThe XML scriptBThe PL/SQL scriptCThe DBMS_SCHEDULER packageDEnterprise Manager to schedule the backup

单选题You are the network administrator for The network consists of a single Active Directory domain All network servers run Windows Server 2003. One member server hosts a folder named F:/TestKingData. Thousands of users constantly request and updates files in F:/TestKingData. You use the Backup utility to perform an incremental backup of F:/TestKingData on magnetic tape. The backup completes normally, but you see an error indicator illuminated on the tape server. You need to verify that you can restore F:/TestKingData from the backup tape. The verification process must not affect existing files. What should you do?()AIn the Backup utility, use the Restore and Manage Media tab to select the original tape media. Ensure that files will be restored to their original location. Start the restoration and verify that all files are restored successfully.BIn the Backup utility, use the Restore and Manage Media tab to select the original tape media. Ensure that files will be restored to a new location. Start the restoration and verify that all files are restored successfully.CIn the Backup utility, select the Verify data after the backup completes option. Use the original backup tape to perform another incremental backup. Ensure that all files are verifies successfully.DIn the Backup utility, select the Verify data after the backup completes option. Use a new backup tape to perform another incremental backup. When the verification phase of the backup begins, replace the new tape with the original tape. Ensure that all files are verified successfully.

单选题Your companys security policy requires complex passwords.   You have a comma delimited file named import.csv that contains user account information.    You need to create user accounts in the domain by using the import.csv file. You also need to ensure that  the new user accounts are set to use default passwords and are disabled.  What should you do()AModify the userAccountControl attribute to disabled. Run the csvde i  k f import.csv command. Run  the DSMOD utility to set default passwords for the user accounts.BModify the userAccountControl attribute to accounts disabled. Run the csvde  f import.csv command.  Run the DSMOD utility to set default passwords for the user accounts.CModify the userAccountControl attribute to disabled. Run the wscript import.csv command. Run the  DSADD utility to set default passwords for the imported user accounts.DModify the userAccountControl attribute to disabled. Run the ldifde i  f import.csv command. Run the  DSADD utility to set passwords for the imported user accounts.