An administrator logs into a server and notices slow performance. When the system finishes the logon process a message is displayed saying the system is out of Virtual Memory. Which of the following is the MOST likely cause of this issue?()
第1题:
A system administrator noticed several error messages on the screen while the system was booting up; but was not able to write them down. Where should the system administrator look for the console log, assuming it is in the default location?()
第2题:
A user in your company network needs to encrypt a folder that is on her Windows 2000 Professional computer. Her computer has two drives: Drive C and Drive D. The folder that needs to be encrypted is located on Drive D. When the user attempts to encrypt the folder, no option for encryption can be found in the folder properties. What should you do to enable the user to encrypt the folder? ()
第3题:
An administrator receives a contract for a server install at a new building. Which of the followingshould be completed after installing the server?()
第4题:
A system administrator decides to review the system error log after installing new hardware. Which of the following is the correct command to use?()
第5题:
How could an Administrator verify if there were any problems during the installation of WebSphere Commerce V5.6?()
第6题:
A junior level Database Administrator erroneously deleted the database alert log while users were accessing the database. Which action should you take to recover the alert log?()
第7题:
You are the desktop administrator for Contoso, Ltd. A graphic designer named Peter saves all his files in the My Documents folder on his Window XP Professional computer. Peter now needs to work on several computers each day to complete his work. Peter needs to be able to access his files at any time. You implement a roaming user profile and a home directory for Peter. However, Peter reports that when he uses his roaming profile, it takes 10 minutes for him to log on to computers other than his own. You need to reduce the amount of time it takes for Peter to log on to computers when using his roaming profile. What should you do?()
第8题:
You are installing an application on a computer that runs Windows Server 2008 R2. During installation, the application will need to add new attributes and classes to the Active Directory database. You need to ensure that you can install the application. What should you do()
第9题:
Request the user to logoff and log back on.
Add the user as an administrator on their local machine.
Add the user as an administrator on the server.
Run an ipconfig /renew on the user’s machine.
第10题:
Increase the size of redo log files
Increase the size of redo log buffer
Increase the number of redo log files
Place the redo log files on a separate disk
Decrease the number of redo log groups to two
Increate the number Log Writer (LGWR) process
第11题:
From ntdsutil.exe, run Set DSRM Password.
From ntdsutil.exe, run Security account management.
From Active Directory Users and Computers, select the Account is trusted for delegation option for the Administrator account.
From Active Directory Users and Computers, select the Store password using reversible encryption option for the Administrator account.
第12题:
USER_DUMP_DEST
CORE_DUMP_DEST
ALERT_LOG_DEST
ALERT_DUMP_DEST
TRACE_DUMP_DEST
BACKGROUND_DUMP_DEST
第13题:
In which file can the administrator view the detailed results of the overnight cluster automatic verification?()
第14题:
Which two of these methods will allow a CUE administrator to view the output of the CUE message log file?()
第15题:
A System p administrator suspects they are receiving an error from one of their nightly cron jobs. The job is: 0 1 * * * /usr/local/bin/nightlycheck.pl Where should the administrator first look for errors reported by this cron job()
第16题:
A System p administrator noticed several error messages on the screen while the system was booting up; but was not able to write them down. Where should the system administrator look for the console log, assuming it is in the default location()
第17题:
When an emulated error notification method is complete, an administrator can view the error log By typing the errpt command to be sure the emulation took place. To verify that the error log entry is the result of the emulated event,the log entry resource name is set to EMULATOR,or which of the following?()
第18题:
In which scenario is a Database Administrator NOT required to perform an incomplete recovery?()
第19题:
You are installing an application on a computer that runs Windows Server 2008 R2. During installation, the application will need to add new attributes and classes to the Active Directory database. You need to ensure that you can install the application. What should you do()
第20题:
A System p administrator needs to run the annualreval.sh script, directing standard error to /var/log/reval.err, and appending standard out to /var/log/reval.log. How can this be accomplished ()
第21题:
/var/log/syslog.out
var/log/cron.log
/var/spool/cron/logs
第22题:
clcycle
clrefresh
cllogcycle
cllogrotate
第23题:
/var/log/conslog
/var/log/console.log
/var/adm/ras/conslog
/var/ras/console.log
第24题:
syslog server
GUI interface
CLI
text editor
TFTP server