单选题After factory-defaults have been loaded, which two syslog files will be present in the configuration?()A system and chassisdB syslog-messages and NVRAMC messages and interactive-commandsD authorization and events

题目
单选题
After factory-defaults have been loaded, which two syslog files will be present in the configuration?()
A

system and chassisd

B

syslog-messages and NVRAM

C

messages and interactive-commands

D

authorization and events


相似考题
参考答案和解析
正确答案: B
解析: 暂无解析
更多“单选题After factory-defaults have been loaded, which two syslog files will be present in the configuration?()A system and chassisdB syslog-messages and NVRAMC messages and interactive-commandsD authorization and events”相关问题
  • 第1题:

    Which three statements about Syslog utilization are true?()

    • A、Utilizing Syslog improves network performance.
    • B、The Syslog server automatically notifies the network administrator of network problems.
    • C、A Syslog server provides the storage space necessary to store log files without using router disk space.
    • D、There are more Syslog messages available within Cisco IOS than there are comparable SNMP trap messages.
    • E、Enabling Syslog on a router automatically enables NTP for accurate time stamping。
    • F、A Syslog server helps in aggregation of logs and alerts.

    正确答案:C,D,F

  • 第2题:

    A corrupted file system is now repaired and back in use. Some, but not all of the files within the file  systems have been deleted. The only backup of this file system is a month-old tar archive. This archive will need to be restored as root.  Which two statements correctly describe the effects of the restore operation?()

    • A、 Files found in the file system that are also on tape will NOT be overwritten.
    • B、 The missing files, present on the backup tape, are restored to the file system with the data as it was when the backup was taken.
    • C、 The access times are preserved by tar and will reflect the time when a user last accessed the data.
    • D、 The modification time on the files restored by tar will be preserved and will reflect the time the file was last modified before the backup, NOT the time of the restore operation.

    正确答案:B,D

  • 第3题:

    Which two locations can be configured as a source for the IOS image in the boot system command?()

    • A、RAM
    • B、NVRAM
    • C、flash memory
    • D、HTTP server
    • E、TFTP server
    • F、Telnet server

    正确答案:C,E

  • 第4题:

    At system install, the /etc/syslog.conf file specifies that messages be logged for which facilities?()

    • A、communications
    • B、kernel
    • C、security
    • D、none

    正确答案:D

  • 第5题:

    You execute the following Recovery Manager (RMAN) commands in he following order:   BACKUP VALIDATE DATABAE RECOVER CORRUPTION LIST;   Which two tasks are performed by these commands?()  

    • A、 Repair the corrupted blocks. If any. In the backup created
    • B、 Populate VSCOPV_CORRUPTION with names of files that have corrupted blocks
    • C、 Back up the database after checking whether array of the files have corrupted blocks
    • D、 Discover any corrupt blocks that are viewable with the VSDATABASE_BI-OCK_CORBUPTION view
    • E、 Repair all corrupted blocks that have been logged in the VSDATABASE_BLOCK_ CORRUPTION

    正确答案:B,C

  • 第6题:

    You have enabled backup optimization for the RMAN environment. Identify two criteria on which RMAN will skip the file, if it has already been backed up.()

    • A、 The data file backup is done with multiple channels
    • B、 The data files is in the read-write mode after being backed up in the read only mode
    • C、 The backup was taken after the data files was taken offline-normal or is in the read only mode
    • D、 The data file backup complies with the back retention policy and the backup duplexing fe ture

    正确答案:C,D

  • 第7题:

    The loss of which two types of files may require a recovery with the RESETLOGS option?()

    • A、 control files
    • B、 password file
    • C、 archived log files
    • D、 system-critical data files for which all the redo entries are present
    • E、 non-system-critical data files for which all the redo entries are present

    正确答案:A,C

  • 第8题:

    单选题
    Two data files have been deleted at the operating system level by accident. Your database is running in ARCHIVELOG mode and online backups are taken nightly. One of the data files that has been deleted belongs to the USERS tablespace on the other belongs to the SYSTEM tablespace. How can you recover from this situation?()
    A

    Shut down the database, restore the two data files and then start up the database. 

    B

    Take the system and users tablespace offline, restore the two data files, recover the two datafiles, and then bring the SYSTEM and USERS tablespaces online. 

    C

    Shut down the database, restore the two data files, start up the database in MOUNT mode, recover the two data files, and then alter the database open. 

    D

    Take the SYSTEM and USERS tablespaces offline, recover the two datafiles and then bring the SYSTEM and USERS tablespaces online.


    正确答案: B
    解析: 暂无解析

  • 第9题:

    多选题
    The loss of which two types of files may require a recovery with the RESETLOGS option?()
    A

    control files

    B

    password file

    C

    archived log files

    D

    system-critical data files for which all the redo entries are present

    E

    non-system-critical data files for which all the redo entries are present


    正确答案: B,C
    解析: 暂无解析

  • 第10题:

    多选题
    A corrupted file system is now repaired and back in use. Some, but not all of the files within the file  systems have been deleted. The only backup of this file system is a month-old tar archive. This archive will need to be restored as root.  Which two statements correctly describe the effects of the restore operation?()
    A

    Files found in the file system that are also on tape will NOT be overwritten.

    B

    The missing files, present on the backup tape, are restored to the file system with the data as it was when the backup was taken.

    C

    The access times are preserved by tar and will reflect the time when a user last accessed the data.

    D

    The modification time on the files restored by tar will be preserved and will reflect the time the file was last modified before the backup, NOT the time of the restore operation.


    正确答案: C,B
    解析: 暂无解析

  • 第11题:

    单选题
    A patch has been applied to the operating system.  After rebooting, the system is hung.  Which of the following commands should have been performed to prevent the system from hanging?()
    A

     lppchk, bosboot 

    B

     lslpp -l, oslevel 

    C

     installp -C, lppchk 

    D

     bosboot, synclvodm 


    正确答案: C
    解析: 暂无解析

  • 第12题:

    单选题
    At system install, the /etc/syslog.conf file specifies that messages be logged for which facilities?()
    A

    communications

    B

    kernel

    C

    security

    D

    none


    正确答案: C
    解析: 暂无解析

  • 第13题:

    After factory-defaults have been loaded, which two syslog files will be present in the configuration?()

    • A、system and chassisd
    • B、syslog-messages and NVRAM
    • C、messages and interactive-commands
    • D、authorization and events

    正确答案:C

  • 第14题:

    You have enabled backup optimization for the RMAN environment. Identify two criteria on which RMAN will skip the file, if it has already been backed up.() (Choose two.)

    • A、The data file backup is done with multiple channels
    • B、The data files is in the read-write mode after being backed up in the read only mode
    • C、The backup was taken after the data files was taken offline-normal or is in the read only mode
    • D、The data file backup complies with the back retention policy and the backup duplexing feature

    正确答案:C,D

  • 第15题:

    A patch has been applied to the operating system.  After rebooting, the system is hung.  Which of the following commands should have been performed to prevent the system from hanging?()

    • A、 lppchk, bosboot 
    • B、 lslpp -l, oslevel 
    • C、 installp -C, lppchk 
    • D、 bosboot, synclvodm 

    正确答案:A

  • 第16题:

    System configurations on the HMC have been backed up correctly. After a restore, the partitions are defined with different characteristics than the running systems. What is the most probable cause of this problem?()

    • A、The LPAR Configuration backup is corrupt
    • B、The LPAR Configuration has been altered using DLPAR
    • C、The LPAR Configuration backup was performed on a different HMC
    • D、The LPAR Configuration has been altered through the Advanced System Management Interface (ASMI) on the server after the backup was performed

    正确答案:B

  • 第17题:

    You have a durable subscriber, and the subscriber is down or not reachable when the message is  produced. Which two options regarding the expiry of these messages are true?()

    • A、after the subscriber is unavailable for 10 minutes
    • B、when the subscriber is available
    • C、after the subscriber is unavailable for after an hour
    • D、are available until the specified time elapses
    • E、are expired instantly

    正确答案:B,D

  • 第18题:

    You decided to use Direct NFS configuration in a non-RAC Oracle installation and created the oranfstab file in /etc. Which two statements are true regarding this oranfstab file?())  

    • A、 Its entries are specific to a single database.
    • B、 It contains file systems that have been mounted by Direct NFS.
    • C、 It is globally available to all Oracle 11g databases on the machine.
    • D、 It contains file systems that have been mounted by the kernel NFS system.

    正确答案:C,D

  • 第19题:

    Two data files have been deleted at the operating system level by accident. Your database is running in ARCHIVELOG mode and online backups are taken nightly. One of the data files that has been deleted belongs to the USERS tablespace on the other belongs to the SYSTEM tablespace. How can you recover from this situation?()

    • A、Shut down the database, restore the two data files and then start up the database. 
    • B、Take the system and users tablespace offline, restore the two data files, recover the two datafiles, and then bring the SYSTEM and USERS tablespaces online. 
    • C、Shut down the database, restore the two data files, start up the database in MOUNT mode, recover the two data files, and then alter the database open. 
    • D、Take the SYSTEM and USERS tablespaces offline, recover the two datafiles and then bring the SYSTEM and USERS tablespaces online.

    正确答案:C

  • 第20题:

    单选题
    System configurations on the HMC have been backed up correctly. After a restore, the partitions are defined with different characteristics than the running systems. What is the most probable cause of this problem?()
    A

    The LPAR Configuration backup is corrupt

    B

    The LPAR Configuration has been altered using DLPAR

    C

    The LPAR Configuration backup was performed on a different HMC

    D

    The LPAR Configuration has been altered through the Advanced System Management Interface (ASMI) on the server after the backup was performed


    正确答案: C
    解析: 暂无解析

  • 第21题:

    单选题
    A system administrator had a disk failure on an HMC. The disk was replaced and the HMC was loaded from the Product Recovery CD. The system administrator had performed a backup to DVD of the HMC data before the system failed. After restoring the backup files, it was noticed that no profile files were restored. What is the most likely cause of this problem?()
    A

    The profile data was not initialized after restoring the backup CD

    B

    The profile data was not backed up before doing the Critical Console Data backup

    C

    A Critical Console Data backup was performed which backs up user data, but not profile data

    D

    A Save Upgrade data was done instead of a backup Critical Console Data and the profile files were not included


    正确答案: B
    解析: 暂无解析

  • 第22题:

    单选题
    In addition to writing information to a trace file, the Cisco CRS System sends standard event logging messages to a syslog server through which service?()
    A

    SNMP Trap

    B

    Alarm  

    C

    CDP  

    D

    Win32


    正确答案: B
    解析: 暂无解析

  • 第23题:

    单选题
    Which RMAN command is used to verify the status of a backup or copy, and also updates the repository when files have been deleted using operating system commands?()
    A

    CHANGE

    B

    RESYNC

    C

    CATALOG

    D

    CROSSCHECK


    正确答案: B
    解析: 暂无解析