File infectors are also called______viruses.A.filterB.parasailC.parasiticD.attack

File infectors are also called______viruses.

A.filter

B.parasail

C.parasitic

D.attack


相关考题:

You are the administrator of a SQL Server 2000 computer. The server contains a database named Acct. You purge the Acct database of old records and perform. a full backup. The database now uses 4 GB of space. The database files are configured as shown in the Acct Properties exhibit.The server has two hard disks that are configured as shown in the Server Configuration exhibit.The 3 GB transaction log file for the Acct database is stored on drive C. You need to make room for a new database that has a 3 GB data file and a 1 GB transaction log file. You want to optimize database performance on both databases. You also want to minimize administrative overhead.What should you do?A.Shrink the empty data file on drive E. Place the new data file and the new log file on drive E.B.Shrink the empty data file on drive E. Backup and shrink the log file on drive C to 2 GB. Place the new data file on drive E and the new log file on drive C.C.Shrink the data file on drive D to 1 GB, and then shrink the data file on drive E to 2 GB. Place the new data file on drive D and the new log file on drive E.D.Shrink and delete the data file on drive C, and then shrink the database files on drives D and E so that they are both 2 GB. Place the new data file and the new log file on drive C.

Which of the following statements best describes the relationship between a logical volume and a journaled file system (JFS)?() A.Increasing the size of a logical volume also increases the size of the file systemB.Reducing the size of a logical volume requires reducing the size of the file system firstC.Increasing the size of a file system requires increasing the size of the logical volume firstD.Increasing the size of a file system also increases the size of the logical volume when necessary

You delete content from a file named Speed.doc that is stored in the C:\Data folder. You edit 20 files in this folder over the next two days. You need to restore the version of the file that had the correct data. You also need to ensure that the other fiels in the folder remain unaffected.What should you do?()A.AB.BC.CD.D

Refer to the exhibit:The technician wants to upload a new IOS in the router while keeping the existing IOS. What is the maximum size of an IOS file that could be loaded if the original IOS is also kept in flash?()A.3MBB.4MBC.5MBD.7MBE.8MB

A large corporation is concerned about the amount of time it takes to back up their main file server. They are also concerned that their IT technician frequently forgets to change the backup tapes, thereby leaving the company open to data loss. Which backup system would solve both problems?()A、 RAIDB、 tape libraryC、 optical storageD、 disk to disk to tape

An administrator has written a script to check that the contents of an application configuration file are identicalon all cluster nodes. The script has also been associated with a user defined custom verification method. Theadministrator would like the contents of this file to be checked and verified automatically on a daily basis.How can this be achieved?()A、By using a job scheduler such as cronB、By enabling automatic cluster verificationC、By including the script name in the file /usr/es/sbin/cluster/etc/clverify.rcD、By including the custom method name in the file /usr/es/sbin/cluster/etc/rc.authomethods

如果要将文件名file1修改为file2,下列命令()可以实现。A、cp file1file2B、mv file1file2C、ls file1file2D、ll file1file2

What is the difference between thE.remove and thE.purge action with the dpkg command?()A、 -remove removes the program, -purge also removes the config filesB、 -remove only removes the program, -purge only removes the config filesC、 -remove removes a package, -purge also removes all packages dependent on itD、 -remove removes only the package file itself, -purge removes all files related to the package

A hospital customer with an experienced AIX and Microsoft Windows staff wants to consolidate all of their file/print services onto fewer systems.  They currently use multiple Microsoft Windows-based Intelsystems that are experiencing reliability problems.  They also have POWER4+ systems that are running multiple AIX LPARs that have experienced no reliability issues. They need at least 99.99% uptime. Which solution will meet their uptime needs at the lowest cost?()A、Combine the file/print servers onto a larger Intel-based machine (x445).B、Bring up a Linux LPAR on the pSeries and run Samba to provide file/print services.C、Bring up another AIX LPAR on the pSeries and run Samba to provide file/print services.D、Bring up another AIX LPAR on the pSeries and run Connect Direct to provide file/print services.

Which of the following will occur if an operator types the command vi file.out?()A、If the file exists it will be opened for editing. If the file does not exist an error message will be displayed.B、If the file exists it will be opened for editing. If the file does not exist a new file with the name file.out will be created and opened for editing.C、If the file exists an error message will be displayed. If the file does not exist a new file with the name file.out will be created and opened for editing.D、If the file exists the operator will be asked whether to open the file or overwrite the file. If the file does not exist a new file with the name file.out will be created and opened for editing.

Which gets the name of the parent directory file “file.txt”?()A、 String name= File.getParentName(“file.txt”);B、 String name= (new File(“file.txt”)).getParent();C、 String name = (new File(“file.txt”)).getParentName();D、 String name= (new File(“file.txt”)).getParentFile();E、 Directory dir=(new File (“file.txt”)).getParentDir();  String name= dir.getName();

Your network consists of a single Active Directory domain. All network servers run Windows Server2003 Service Pack 2 (SP2).Your organization has a storage area network (SAN). All shared folders on file servers are stored on theSAN.The Change permission for all shared folders is assigned to Domain Users. Different NTFS permissionsare also applied to the shared folders.You perform a daily full backup of all the files stored in the shared folders.A file server fails and requires several hours to repair.You need to provide users access to the shared folders that were on the failed file server as quickly aspossible. Existing permissions must be retained for all files.What should you do? ()A、Attach an existing file server to the SAN storage locations. Configure the shared folders on the server.B、Attach an existing file server to the SAN storage locations. Configure NTFS permissions for the folders.C、On an existing file server, restore the data from the tape backup. Configure NTFS permissions for the folders.D、On an existing file server, restore the data from the tape backup. Configure the shared folders on the server.

You are the desktop administrator for your company. Laura is a user in the company's accounting department. Laura uses a Windows XP Professional computer. Laura installs a new software application that was listed on her Add or Remove Programs list. Laura reports that the new application now opens whenever she double-clicks any file that has a .doc file name extension. She also reports that 24 new icons appear on the New menu when she right-clicks her desktop. Laura asks you to reconfigure her computer so that Microsoft Word opens when she double-clicks files that have a .doc file name extension. She also wants you to remove the new icons from the New menu. You instruct Laura to uninstall the new application. After she uninstalls the application, she reports that she can no longer open .doc files by double-clicking them. She also reports that the unwanted icons on the New menu are still present. You reinstall the new application, and it continues to open when Laura double-clicks .doc files. You want to restore the .doc file association and to remove the unwanted icons from the New menu on Laura's computer. You want to accomplish these tasks as quickly as possible. You also want to ensure that none of Laura's other documents or personal settings are affected. What should you do?()A、Restore the computer to the restore point that was created when Laura installed the new application.B、Restore the System State data to Laura's computer from a backup tape. C、Use the Windows XP Professional CD-ROM to perform an Automated System Recovery (ASR) restore. D、Restart the computer by using the last known good configuration.

You delete content from a file named Speed.doc that is stored in the C:///Data folder. You edit 20 files in this folder over the next two days.  You need to restore the version of the file that had the correct data. You also need to ensure that the other files in the folder remain unaffected.  What should you do? ()A、From the Previous Versions tab, restore the version of the file that contains the correct data.B、Restore a version of the folder that contains the correct version of the file.C、Open a version of the folder that contains the correct version of the file.D、Copy a version of the folder that contains the correct version of the file. Replace the existing version of the folder with the older version.

单选题You are changing the security settings of a file named MyData.xml.You need to preserve the existing inherited access rules.You also need to prevent the access rules from inheriting changes in the future.   Which code segment should you use?()A AB BC CD D

单选题What is the difference between thE.remove and thE.purge action with the dpkg command?()A -remove removes the program, -purge also removes the config filesB -remove only removes the program, -purge only removes the config filesC -remove removes a package, -purge also removes all packages dependent on itD -remove removes only the package file itself, -purge removes all files related to the package

单选题You are a database administrator for your company. The company uses a SQL Server 2005 database. A full backup of the database is made each night. Transaction log backups are made each morning and each afternoon. You notice that the database transaction log file grows very large throughout the day. You need to minimize the size of the transaction log file. You also need to minimize data loss in the event of a failure. What should you do?()ADecrease the amount of time between transaction log backups.BConfigure the database to use the simple recovery model.CConfigure the RECOVERY INTERVAL option to be a smaller value.DRun DBCC SHRINKFILE on the transaction log file.

多选题A corrupted file system is now repaired and back in use. Some, but not all of the files within the file  systems have been deleted. The only backup of this file system is a month-old tar archive. This archive will need to be restored as root.  Which two statements correctly describe the effects of the restore operation?()AFiles found in the file system that are also on tape will NOT be overwritten.BThe missing files, present on the backup tape, are restored to the file system with the data as it was when the backup was taken.CThe access times are preserved by tar and will reflect the time when a user last accessed the data.DThe modification time on the files restored by tar will be preserved and will reflect the time the file was last modified before the backup, NOT the time of the restore operation.

单选题Which gets the name of the parent directory file “file.txt”?()A String name= File.getParentName(“file.txt”);B String name= (new File(“file.txt”)).getParent();C String name = (new File(“file.txt”)).getParentName();D String name= (new File(“file.txt”)).getParentFile();E Directory dir=(new File (“file.txt”)).getParentDir();  String name= dir.getName();

单选题A large corporation is concerned about the amount of time it takes to back up their main file server. They are also concerned that their IT technician frequently forgets to change the backup tapes, thereby leaving the company open to data loss. Which backup system would solve both problems?()A RAIDB tape libraryC optical storageD disk to disk to tape

单选题After you back up /export using a file system snapshot, and you have removed the snapshot, you also need to remove the backing store. If the snapshot was created with:  # mkdir /var/tmp/backup-snaps  # fssnap -o  bs=/var/tmp/backup-snaps /export   Which file do you need to remove? ()A AB BC CD D

单选题Which of the following will occur if an operator types the command vi file.out?()AIf the file exists it will be opened for editing. If the file does not exist an error message will be displayed.BIf the file exists it will be opened for editing. If the file does not exist a new file with the name file.out will be created and opened for editing.CIf the file exists an error message will be displayed. If the file does not exist a new file with the name file.out will be created and opened for editing.DIf the file exists the operator will be asked whether to open the file or overwrite the file. If the file does not exist a new file with the name file.out will be created and opened for editing.

单选题The character mode sales report is stored on the network drive as a .REX. You need to make changes to the report layout. Using the report builder how would you change this file?()AOpen the file using the menu option file-open make the changes and recompile the report. BConvert the file into .REP file using the report compiler make the changes and convert the file back to a .REX file. CExecute the R30CONV command to convert the file to a .RDF file, make the changes and convert the file back to a .REX file. DChoose file - administration-compile. Convert the file to a .REP file, make the changes and convert the file back to a .REX file. EExecute the R30CONV command to convert the file to a .REP file, make the changes and convert the file back to a .REX file.

单选题RMAN automatically propagate information about the database structure, archived redo logs, backup sets, and data file copies into the recovery catalog from the target database’s control file. This information can also be propagated to the catalog manually by using the ()command.ALISTBSWITCHCVALIDATEDCONFIGUREERESYNC CATALOGFUPGRADE CATALOG

单选题Which of the following statements best describes the relationship between a logical volume and a journaled file system (JFS)?()AIncreasing the size of a logical volume also increases the size of the file systemBReducing the size of a logical volume requires reducing the size of the file system firstCIncreasing the size of a file system requires increasing the size of the logical volume firstDIncreasing the size of a file system also increases the size of the logical volume when necessary

单选题An administrator has written a script to check that the contents of an application configuration file are identicalon all cluster nodes. The script has also been associated with a user defined custom verification method. Theadministrator would like the contents of this file to be checked and verified automatically on a daily basis.How can this be achieved?()ABy using a job scheduler such as cronBBy enabling automatic cluster verificationCBy including the script name in the file /usr/es/sbin/cluster/etc/clverify.rcDBy including the custom method name in the file /usr/es/sbin/cluster/etc/rc.authomethods

单选题You are the network administrator for your company. All network servers run Windows Server 2003.The network includes a file server named File1. File1 contains a single disk for system files and two SCSIhard disks that comprise a 72-GB mirrored volume with 65 GB of read-only data. Users connect to thisdata by using shortcuts on their desktops.File1 is scheduled for replacement. You have a scheduled maintenance window to complete this task.Before the maintenance window, you build a new server.You need to bring the new server online with current data and re-establish redundancy as quickly aspossible. You must also ensure that the desktop shortcuts will continue to function.What should you do? ()AName the new server File2. Create a new mirrored volume by using two 72-GB disks. Connect File2 to the network and copy the data from File1. When copying is complete, shut down the old File1.BName the new server File1. Move both disks from the old File1 to the new File1. Scan the disks for changes. Import the disks. Connect the new File1 to the network.CName the new server File1. Break the mirror on the old File1. Move one of the disks from the old File1 to the new File1. Scan the disk for changes. Initialize the disk. Select the spare disk and create the mirror. Connect the new File1 to the network.DName the new server File1. Remove one of the disks in the mirror from the old File1. Move the disk to the new File1. Scan the disk for changes. Import the disk. Shut down the old File1 and connect the new File1 to the network.