单选题A system contains multiple hot-swap stand-alone disks with a large number of JFS2 file systems. Which feature of JFS2 can be used to improve reliability, availability and serviceability (RAS) if a disk failure occurs?()A Inline loggingB Dynamic inode a

题目
单选题
A system contains multiple hot-swap stand-alone disks with a large number of JFS2 file systems. Which feature of JFS2 can be used to improve reliability, availability and serviceability (RAS) if a disk failure occurs?()
A

Inline logging

B

Dynamic inode allocation

C

Linear directory organization

D

Online filesystem defragmentation


相似考题
参考答案和解析
正确答案: A
解析: 暂无解析
更多“单选题A system contains multiple hot-swap stand-alone disks with a large number of JFS2 file systems. Which feature of JFS2 can be used to improve reliability, availability and serviceability (RAS) if a disk failure occurs?()A Inline loggingB Dynamic inode a”相关问题
  • 第1题:

    Which of the following is NOT a security feature relating to user accounts?()

    • A、Some commands can be password protected requiring logged in customers to re-enter their password.
    • B、A user account can be disabled automatically, after a specified number of invalid login attempts.
    • C、An account can have multiple valid passwords at the same time, any of which can be used to access the account.
    • D、The password policy feature can allow the system to require passwords to include a minimum number of numeric characters.
    • E、Logged in customers can be logged off of the system after a specified period of inactivity.

    正确答案:C

  • 第2题:

    A system contains multiple hot-swap stand-alone disks with a large number of JFS2 file systems. Which feature of JFS2 can be used to improve reliability, availability and serviceability (RAS) if a disk failure occurs?()

    • A、Inline logging
    • B、Dynamic inode allocation
    • C、Linear directory organization
    • D、Online filesystem defragmentation

    正确答案:A

  • 第3题:

    A system administrator can create logical volumes and then add file systems to them, or create the file system directly. What is an advantage of the two-step approach instead of the one-step approach?()

    • A、The number of bytes per inode can be specified.
    • B、Placement of the filesystem on the disk can be specified.
    • C、The jfslog can be specified on creation of the filesystem.
    • D、Either a JFS or JFS2 filesystem can be created on the logical volume.

    正确答案:B

  • 第4题:

    A System p distribution customer is very concerned about Reliability, Availability and  Serviceability (RAS). They are planning to install several p6 servers in their facilities and want to be able to move an LPAR from one System p to another.  Which of the following would accomplish this()

    • A、System p servers using similar SAN storage
    • B、System p servers must share an HMC
    • C、System p servers must have the same level HMC
    • D、System p servers with VIOS

    正确答案:B

  • 第5题:

    Which of the following statements is mot correct about mirroring?()

    • A、Mirroring, with the write-verify option turned on, can be used to increase performance.
    • B、Mirroring is a better choice that disk-striping, for large sequential-access file system when one is looking for performance.
    • C、Mirroring, with a parallel-scheduling policy, may improve I/O read-operation performance.
    • D、Mirroring, with maximum inter-disk allocation policy, is used to enhance availability.

    正确答案:C

  • 第6题:

    Which two are the uses of the ASM metadata backup and restore (AMBR) feature?()

    • A、 It can be used to back up all data on ASM disks.
    • B、 It can be used to recover the damaged ASM disk group along with the data.
    • C、 It can be used to gather information about a preexisting ASM disk group with disk paths,disk name,failure groups,attributes templates,and alias directory structure.
    • D、 It can be used to re-create the ASM disk group with its attributes.

    正确答案:C,D

  • 第7题:

    单选题
    An  administrator  can  create  logical  volumes  and  then  add  file  systems  to  them,  or  create  the  file  system directly.  What is an dvantage of the two-step approach instead of the one-step approach()
    A

    The number of bytes per inode can be specified.

    B

    Placement of the filesystem on the disk can be specified.

    C

    The jfslog can be specified on creation of the filesystem.

    D

    Either a JFS or JFS2 filesystem can be created on the logical volume.


    正确答案: C
    解析: 暂无解析

  • 第8题:

    多选题
    Which two are the uses of the ASM metadata backup and restore (AMBR) feature?()
    A

    It can be used to back up all data on ASM disks.

    B

    It can be used to recover the damaged ASM disk group along with the data.

    C

    It can be used to gather information about a preexisting ASM disk group with disk paths,disk name,failure groups,attributes templates,and alias directory structure.

    D

    It can be used to re-create the ASM disk group with its attributes.


    正确答案: D,C
    解析: 暂无解析

  • 第9题:

    单选题
    A system administrator can create logical volumes and then add file systems to them, or create the file system directly. What is an advantage of the two-step approach instead of the one-step approach?()
    A

    The number of bytes per inode can be specified.

    B

    Placement of the filesystem on the disk can be specified.

    C

    The jfslog can be specified on creation of the filesystem.

    D

    Either a JFS or JFS2 filesystem can be created on the logical volume.


    正确答案: B
    解析: 暂无解析

  • 第10题:

    单选题
    Under  which  of  the  following  circumstances  must  a  JFS  filesystem  be  used  instead  of  a  JFS2   filesystem()
    A

    filesystem will contain 100GB files

    B

    filesystem resides on a 32-bit system

    C

    filesystem contains a large number of small files

    D

    filesystem compression is required


    正确答案: A
    解析: 暂无解析

  • 第11题:

    单选题
    Which hardware storage option, when set up with redundant disks, offers the least stability,availability, and reliability for Mysql data?()
    A

    RAID 5

    B

    iSCSI

    C

    SAN (Storage Area Network)

    D

    NFS (Networked File System)


    正确答案: B
    解析: 暂无解析

  • 第12题:

    单选题
    Which of the following statements are FALSE concerning the defragfs command?()
    A

     The defragfs command should not be run against file systems and logical volumes that contain mostly transitory information, such as /tmp.

    B

     The defragfs command should not be run on a large JFS2 file system when running on a 32-bit kernel.

    C

     The defragfs command can improve file system performance by increasing the file system’s contiguous free space.

    D

     The defragfs command can only be run against file systems that are mounted with read-write permissions.


    正确答案: A
    解析: 暂无解析

  • 第13题:

    Which of the following statements are FALSE concerning the defragfs command?()

    • A、 The defragfs command should not be run against file systems and logical volumes that contain mostly transitory information, such as /tmp.
    • B、 The defragfs command should not be run on a large JFS2 file system when running on a 32-bit kernel.
    • C、 The defragfs command can improve file system performance by increasing the file system’s contiguous free space.
    • D、 The defragfs command can only be run against file systems that are mounted with read-write permissions.

    正确答案:B

  • 第14题:

    An Enhanced Journeyed File System that is in a shred non-concurrent Volume Group is growing  at an unexpected rate. It is the administrator’s task to enlarge the filesystem without interrupting service.  What method should be sued to achieve this goal?()  

    • A、 Use HACMP C-SPOC to increase the size of the JFS2 filesystem.
    • B、 Use the smitty jfs2 fastpath to increase the size of the JFS2 filesystem.
    • C、 Use HACMP C-SPOC to increase the size of the JFS2 filesystem and inline JFS2 logs.
    • D、 Use mklvcopy hdisk# 2 jfs2lvname to increase the size of the JFS2 filesystem,then use splitlvcopy jfs2lvname 1 -y newjfs2lvname hdisk# to present the increased JFS2 filesystem to HACMP.

    正确答案:A

  • 第15题:

    Under  which  of  the  following  circumstances  must  a  JFS  filesystem  be  used  instead  of  a  JFS2   filesystem()

    • A、filesystem will contain 100GB files
    • B、filesystem resides on a 32-bit system
    • C、filesystem contains a large number of small files
    • D、filesystem compression is required

    正确答案:D

  • 第16题:

    When is it appropriate to use a JFS filesystem instead of a JFS2 filesystem?()

    • A、When the filesystem will contain 100GB files.
    • B、When the filesystem resides on a 32-bit system.
    • C、When the filesystem contains a large number of small files.
    • D、When filesystem compression is required due to limited disk space.

    正确答案:D

  • 第17题:

    An  administrator  can  create  logical  volumes  and  then  add  file  systems  to  them,  or  create  the  file  system directly.  What is an dvantage of the two-step approach instead of the one-step approach()

    • A、The number of bytes per inode can be specified.
    • B、Placement of the filesystem on the disk can be specified.
    • C、The jfslog can be specified on creation of the filesystem.
    • D、Either a JFS or JFS2 filesystem can be created on the logical volume.

    正确答案:B

  • 第18题:

    Which hardware storage option, when set up with redundant disks, offers the least stability,availability, and reliability for Mysql data?()

    • A、RAID 5
    • B、iSCSI
    • C、SAN (Storage Area Network)
    • D、NFS (Networked File System)

    正确答案:C

  • 第19题:

    单选题
    Which of the following is NOT a security feature relating to user accounts?()
    A

    Some commands can be password protected requiring logged in customers to re-enter their password.

    B

    A user account can be disabled automatically, after a specified number of invalid login attempts.

    C

    An account can have multiple valid passwords at the same time, any of which can be used to access the account.

    D

    The password policy feature can allow the system to require passwords to include a minimum number of numeric characters.

    E

    Logged in customers can be logged off of the system after a specified period of inactivity.


    正确答案: A
    解析: 暂无解析

  • 第20题:

    单选题
    Which of the following commands can be used to show all disks configured on the system?()
    A

    lsdev -C disk

    B

    lsdev -P disk

    C

    lsdev -Cc disk

    D

    lsdev -Pc disk


    正确答案: B
    解析: 暂无解析

  • 第21题:

    单选题
    Which of the following statements is mot correct about mirroring?()
    A

    Mirroring, with the write-verify option turned on, can be used to increase performance.

    B

    Mirroring is a better choice that disk-striping, for large sequential-access file system when one is looking for performance.

    C

    Mirroring, with a parallel-scheduling policy, may improve I/O read-operation performance.

    D

    Mirroring, with maximum inter-disk allocation policy, is used to enhance availability.


    正确答案: B
    解析: 暂无解析

  • 第22题:

    单选题
    A high availability solution must be designed for a single file server.  Data must be replicated between the disks to ensure a failure of one disk does not bring down the server.  Which of thefollowing meets these requirements?()
    A

    RAID 1

    B

    RAID 0

    C

    Active/passive cluster

    D

    Disk-to-disk


    正确答案: D
    解析: 暂无解析

  • 第23题:

    单选题
    When is it appropriate to use a JFS filesystem instead of a JFS2 filesystem?()
    A

    When the filesystem will contain 100GB files.

    B

    When the filesystem resides on a 32-bit system.

    C

    When the filesystem contains a large number of small files.

    D

    When filesystem compression is required due to limited disk space.


    正确答案: B
    解析: 暂无解析