A file named "core" exists in the current directory. Which of the following commands should be used to determine what created the "core" file?()
第1题:
A. Server-to-server traffic always remains in the core layer.
B. The recommended practice is for the core infrastructure to be in Layer 3.
C. The boundary between Layer 2 and Layer 3 should be implemented in the aggregation layer.
D. The Cisco Express Forwarding hashing algorithm is the default, based on the IP address and Layer 4 port.
E. Core layer should run BGP along with an IGP becauseiBGP has a lower administrative distance than any IGP.
第2题:
The switches shown in the diagram, Core and Core2, are both Catalyst 2950s. The addressing scheme for each company site is as follows:Router Ethernet port - 1st usable addressCore - 2nd usable addressCore2 - 3rd usable addressFor this network, which of the following commands must be configured on Core2 to allow it to be managed remotely from any subnet on the network? ()

A.Core2(config)# interface f0/0 Core2(config-if)# ip address 192.168.1.10 255.255.255.248
B.Core2(config)# interface vlan 1 Core2(config-if)# ip address 192.168.1.11 255.255.255.248
C.Core2(config)# line con 0 Core2(config-line)# password cisco
D.Core2(config)# line vty 0 4 Core2(config-line)# password cisco
E.Core2(config)# ip default-gateway 192.168.1.9
F.Core2(config)# ip route 0.0.0.0 0.0.0.0 192.168.1.8
第3题:
什么是知识产权核(Intellectual Property Core,简称IP Core)?指出“软知识产权核(Soft IP Core)”、“硬知识产权核(Hard IP Core)”、“固知识产权核(Firm IP Core)”的意义和差别。
第4题:
In the parameter file of the production database, the BACKGROUND_DUMP_DEST parameter is set to $ORACLE_HOME/users. Which two types of files would you find in this location?()
第5题:
查看IHUB 内存的命令
第6题:
What statement is true regarding processor allocation when implementing micro-partitions? ()
第7题:
Customers looking to utilize quad-core processors in a blade environment should use which of the following power saving options?()
第8题:
Intel推出的Core系列CPU,大部分集成了显示核心,此系列是。()
第9题:
Which six files are maintained in the Flash Recovery Area?()
第10题:
no -p 'core=-1' webapp
chuser 'core=-1' webapp
setsenv -attr 'core=unlimited' webapp
chsec -f '/etc/security/limits' 'core=-1' webapp
第11题:
the alert log file
the core dump files
the change tracking file
the user session trace files
the database audit trail files
the background process trace files
第12题:
Server-to-server traffic always remains in the core layer.
The recommended practice is for the core infrastructure to be in Layer 3.
The boundary between Layer 2 and Layer 3 should be implemented in the aggregation layer.
The Cisco Express Forwarding hashing algorithm is the default, based on the IP address andLayer 4 port.
Core layer should run BGP along with an IGP because iBGP has a lower administrativedistance than any IGP.
第13题:

A. If no core layer is deployed, the design will be easier to scale.
B. If no core layer is deployed, there will be fewer cabling requirements.
C. If no core layer is deployed, the distribution switches should not be fully meshed.
D. A dedicated campus core layer is not needed for connecting fewer than five buildings.
E. A dedicated campus core layer should be deployed for connecting three or more buildings.
第14题:
当某个进程非正常退出时,会在当前目录下产生一个core文件,该文件记录了错误的原因。通过命令file core可以找出是哪个进程产生。
第15题:
To which switch or switches should you provide redundant links in order to achieve high availability with reliable fast convergence in the enterprise campus?()
第16题:
整个iPhone的操作系统包括()
第17题:
In base e-Commerce module designs, where should firewall perimeters be placed? ()
第18题:
Which command will set the core size file to unlimited for the user‘webapp’?()
第19题:
A customer has just purchased an 8-core POWER 570 which has two dual port 1 Gbps Integrated Virtual Ethernet (IVE) adapters. The customer wants to implement queue pairs (QPs) to take advantage of parallel processing of network traffic to its client logical partitions. Assuming that the system is to utilize the IVEs in both CECs, which configuration will allow a logical partition to utilize the entire eight cores for network traffic processing?()
第20题:
You work as a database administrator for Certkiller .com. You determine that archiving was not successful in one of thedestinators. You want to check the alert log file for more information on this. Which initialization parameter gives you the location of the alert log file?()
第21题:
You executed the following command to back up your control file: ALTER DATABASE BACKUP CONTROLFILE TO TRACE; Which initialization parameter is used to specify the location of the trace file?()
第22题:
dump -t core
strings core
trace -a core
crash core /unix_up
第23题:
Fiber core rope offers greater strength
Fiber core rope offers greater flexibility
Fiber core rope can be used at higher operating temperatures
Fiber core rope is the only type authorized for cargo runners