单选题An administrator is beginning a set of failover tests. The administrator would like to have clean log files foreach test. Which command will achieve this?()AclcycleBclrefreshCcllogcycleDcllogrotate

单选题
An administrator is beginning a set of failover tests. The administrator would like to have clean log files foreach test. Which command will achieve this?()
A

clcycle

B

clrefresh

C

cllogcycle

D

cllogrotate


参考解析

解析: 暂无解析

相关考题:

The network administrator has just finished installing a new 10/100/1000 switch, but receives reports from the server administrator that servers connected to the new switch seem to be experiencing slow LAN connections. The network administrator checks the port connecting the new switch to the core switch and sees the following information:Which of the following is the MOST likely cause of the slow connections?()A. The servers have not had VLAN tagging enabled on their NICs.B. Speed and duplex have not been set.C. VLAN tagging was not set on the trunk.D. The servers have been connected with CAT5 cable.

A user cannot access files on /deps/it directory, the administrator verifies permissions are set for the directory. Which of the following actions need to be performed to only grant read access to the user on the IT directory?()A. Set folder permissions to 760.B. Set folder permissions to 770.C. Set folder permissions to modifyD. Set folder permissions to full control

An administrator is creating a redundant environment for a current data center. A backup site must be available if the entire data center site should become unavailable. To reduce costs, this backup site does not need to be up and running at all times ready for failover. It must contain equipment and the ability to restore data from the data center.Which of the following site types should be considered to meet these requirements?()A. Hot siteB. Warm siteC. Cold siteD. Active failover site

Whenever a failover takes place on the ASA (configured for failover), all active connections are droppedand clients must re-establish their connections unless: ()A、 The ASA is configured for Active-Standby failover.B、The ASA is configured for Active-Activefailover.C、 The ASA is configured for Active-Active failover and a state failover link has been configured.D、 The ASA is configured for Active-Standby failover and a state failover link has been configured.E、 The ASA is configured to use a serial cable as the failover link.F、 The ASA is configured for LAN-Based failover

A user cannot access files on /deps/it directory, the administrator verifies permissions are set rw-------for the directory.  Which of the following actions need to be performed to only grant read access to the user on the IT directory?()A、 Set folder permissions to 760.B、 Set folder permissions to 770.C、 Set folder permissions to modify.D、 Set folder permissions to full control.

You set up scheduled tasks to run and notify you of any failures. 3 days later you see that none of the tasks ran and you received no notifications. What should you do?()A、Set the schedule service to run under the administrator account.B、Set the scheduled tasks to run under the administrator account.C、Enable the messenger serviceD、Set the schedule service to run under the local system account and set it to start automatically.

An administrator is configuring cross-site LVM and wants to ensure that logical volume copies are always onseparate disks. When creating a new logical volume, how could the administrator ensure that this requirement is achieved?()A、Set the allocation policy to strictB、Set the allocation policy to superstrictC、Set the Maximum Number of Physical Volumes to 2D、Set the Number of Copies for each logical partition to 2

A user cannot access files on /deps/it directory, the administrator verifies permissions are set for the directory. Which of the following actions need to be performed to only grant read access to the user on the IT directory?()A、Set folder permissions to 760.B、Set folder permissions to 770.C、Set folder permissions to modifyD、Set folder permissions to full control

In the access log,what does an ACL tag beginning with BLOCK_ADMIN indicate?() A、 the destination was manually added to the block listB、 the malware category is set to blocking modeC、 the transaction was blocked because of application or object propertiesD、 the transaction was manually blocked by the administrative user

An administrator needs to grant privileges to other server staff members to run archive utilities on adefault Windows installation. The administrator needs to set the minimum permissions to:()A、 remote users.B、 account operators.C、 server operators.D、 backup operators.

An administrator has set up a company’s intranet server.Users should be able to access it but nousers are able to.The administrator verifies that the website is accessible by IP address.Which of the following should the administrator look at FIRST to resolve the issue?()A、WINS serverB、DNS serverC、Lmhosts fileD、DHCP cache

An administrator is creating a redundant environment for a current data center. A backup site must be available if the entire data center site should become unavailable. To reduce costs, this backup site does not need to be up and running at all times ready for failover. It must contain equipment and the ability to restore data from the data center.  Which of the following site types should be considered to meet these requirements? ()A、 Hot siteB、 Warm siteC、 Cold siteD、 Active failover site

An administrator notices that every time a particular server is restarted it requires a password in order for the server to begin the start up process. Which of the following is the reason this is happening?()A、The server needs to have the password service verified and reconfigured.B、The server administrator has set a password policy in Group Policy.C、The server has the BIOS setting configured incorrectly.D、The server is set with a boot password before accessing the OS

A system administrator needs to specify a set of FQDN to IP address mappings for a legacyserver; the administrator does not want the legacy server to be referenced by other servers. Which of the following should the administrator use to set this?()A、DHCP serverB、DNS serverC、Host fileD、Route statements

What can be done to enable the debug information for functions to be displayed when using‘ksh -x’to debug a script?()A、Run the script using ‘ksh -fx’.B、Run the script using ‘ksh -a function -x’.C、Edit the script and add ‘set -x’ at the beginning.D、Edit the script and add ‘set -x’ at the beginning of each function.

A customer is in the process of testing their configuration prior to going live. The administrator discovers thatPowerHA is taking 31 seconds to deal with a standard NIC failure. What can the administrator do to speed upthe process of NIC failure detection and diagnosis?()A、Tune the topsvcs NIM settingsB、Tune the grpsvcs NIM settingsC、Activate the fast failure detection (FFD) featureD、Activate the Gigabit fast failover feature on the physical adapters

A system administrator would like to set a system to reboot after a crash.  What is the best way to do this?()A、 smit chgsysB、 bosbootC、 smit dumpD、 bootlist -r

The System Administrator has set up shared processors on three partitions in the p5 590 system. The shared processors have been set to uncapped. The system administrator notices that the logical partition is acting like it is capped. What is the most probable cause?()A、The uncapped weight has been set to 0.B、The uncapped weight has been set to 128.C、The processing unit for that partition was set to .1 processing units. A full processor was assigned.D、The processing unit for that partition was set to 0.50 processing units. A full processor was assigned.

You are the Exchange administrator of the Xxx Corporation’s Exchange organization.You have a Mailbox server in a cluster continuous replication (CCR) environment.When a lossy failover occurs, the system automatically re-delivers the recent e-mail messages sent to users on the failed clustered mailbox server.You want to ensure that if another lossy failover occurs, then all mail will be re-delivered, even if there were a large amount of messages sent before the lossy failover occurred.You also want to increase the time a message will be retained by a Hub Transport Server to ensure that messages are not lost in transit.What should you configure?()A、Use the New-JournalRule cmdlet with the WhatIf switchB、Use the Set-TransportConfig cmdlet with the MaxDumpsterTime parameterC、Use the Set-TransportRule cmdlet with the FromScope switchD、Use the Set-MailboxDatabase cmdlet with the MailboxRetention switch

You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There are two servers named FC01 and FC02 in your company. And WindowsServer 2008 Enterprise is run by the server. The Failover Clustering feature is installed on the server. Theserver is configured as a two-node cluster. An application named APP01 is run by the cluster. The company work time is from 09:00 to 17:00. You need to make sure that APP01 can be accessed duringthese hours. FC01 is configured as the preferred owner for APP01. And you are required to preventfailback of the cluster during business hours. Which action should be performed to achieve the goal?()A、To achieve the goal, the Prevent failback option should be enabled in the Failover properties.B、To achieve the goal, the If resource fails, attempt restart on current node policy should be enabled for all APP01 resources. And then, the Maximum restarts for specified period should be set to 0.C、To achieve the goal, the Period option should be set to 8 hours in the Failover properties.D、To achieve the goal, the Allow failback option should be set to allow failback between 17 and 9 hours in the Failover properties.

You have two servers named FC1 and FC2 that run Windows Server 2008 Enterprise Edition. Both servers have the Failover Clustering feature installed. You configure the servers as a two-node cluster. The cluster runs an application named APP1. Business hours for your company are 09:00 to 17:00. APP1 must be available during these hours. You configure FC1 as the preferred owner for APP1. You need to prevent failback of the cluster during business hours. What should you do?()A、Set the Period option to 8 hours in the Failover properties.B、Set the Allow failback option to allow failback between 17 and 9 hours in the Failover properties.C、Enable the Prevent failback option in the Failover properties.D、Enable the If resource fails, attempt restart on current node policy for all APP1 resources. Set the maximum restarts for specified period to 0.

单选题An administrator is configuring an application monitor. Upon encountering an unrecoverable error the administrator does not want the resource group to failover. How can the application monitor be configured toachieve this?()AConfigure the application monitor with a restart count of 0BConfigure the application monitor with a monitor mode of NotifyCConfigure the application monitor with a notify method of MonitorDConfigure the application monitor with a failure action of Notify

单选题You set up scheduled tasks to run and notify you of any failures. 3 days later you see that none of the tasks ran and you received no notifications. What should you do?()ASet the schedule service to run under the administrator account.BSet the scheduled tasks to run under the administrator account.CEnable the messenger serviceDSet the schedule service to run under the local system account and set it to start automatically.

单选题An administrator is beginning a set of failover tests. The administrator would like to have clean log files foreach test. Which command will achieve this?()AclcycleBclrefreshCcllogcycleDcllogrotate

单选题An administrator notices that every time a particular server is restarted it requires a password in order for the server to begin the start up process. Which of the following is the reason this is happening?()AThe server needs to have the password service verified and reconfigured.BThe server administrator has set a password policy in Group Policy.CThe server has the BIOS setting configured incorrectly.DThe server is set with a boot password before accessing the OS

单选题An administrator needs to grant privileges to other server staff members to run archive utilities on adefault Windows installation. The administrator needs to set the minimum permissions to:()A remote users.B account operators.C server operators.D backup operators.

单选题A user cannot access files on /deps/it directory, the administrator verifies permissions are set rw-------for the directory.  Which of the following actions need to be performed to only grant read access to the user on the IT directory?()A Set folder permissions to 760.B Set folder permissions to 770.C Set folder permissions to modify.D Set folder permissions to full control.

单选题The System Administrator has set up shared processors on three partitions in the p5 590 system. The shared processors have been set to uncapped. The system administrator notices that the logical partition is acting like it is capped. What is the most probable cause?()AThe uncapped weight has been set to 0.BThe uncapped weight has been set to 128.CThe processing unit for that partition was set to .1 processing units. A full processor was assigned.DThe processing unit for that partition was set to 0.50 processing units. A full processor was assigned.