更多“单选题A program is crashing and causing the computer to lockup. Which of the following is the BESTlocation for a technician to check for further information about the cause of the crash?()A Application logB File Replication logC System logD Security log”相关问题
  • 第1题:

    日常故障处理时,在APG40中通过EventViewer,可以看到().

    A.System log

    B.Security log

    C.Audit log

    D.Application log


    参考答案:A, B, D

  • 第2题:

    A user states that their work PC has become infected with a virus. Which of the following shouldthe technician do FIRST?()

    • A、Perform an antivirus program scan
    • B、Boot the machine into Safe Mode
    • C、Remove the machine from the network
    • D、Check for system security patches

    正确答案:C

  • 第3题:

    In which file can the administrator view the detailed results of the overnight cluster automatic verification?()

    • A、clutils.log
    • B、cluster.log
    • C、clverify.log
    • D、autoverify.log

    正确答案:C

  • 第4题:

    What is the default local location for syslog and trace files?()

    • A、/log
    • B、/home/log
    • C、/var/log
    • D、/etc/log

    正确答案:C

  • 第5题:

    A user states that their web browser was recently updated and continuously crashes. Which of the following could the technician use to gather more information about the issue?()

    • A、NTBACKUP log
    • B、Advanced tab in the System applet in Control Panel
    • C、Event Log
    • D、Internet Options applet in Control Panel

    正确答案:C

  • 第6题:

    A program is crashing and causing the computer to lockup. Which of the following is the BESTlocation for a technician to check for further information about the cause of the crash?()

    • A、Application log
    • B、File Replication log
    • C、System log
    • D、Security log

    正确答案:A

  • 第7题:

    A technician is troubleshooting a workstation that has the wrong time information. All workstations should be pointing to a central NTP server. Which of the following locations would the technician check to investigate error messages related to this issue?()

    • A、IIS log
    • B、Application log
    • C、System log
    • D、Security log

    正确答案:C

  • 第8题:

    Which log contains information about service restarts, system errors, warnings, and requests to check server connectivity? ()

    • A、Events log
    • B、System log
    • C、User Access log
    • D、Admin Access log

    正确答案:A

  • 第9题:

    You received the following error:   ORA-01578: ORACLE data block corrupted   (file # %s, block # %s)   Which file will you check to view additional information regarding the cause of this error?()

    • A、the alert log file and the trace files
    • B、 the redo log files
    • C、 the control file
    • D、 the change tracking file

    正确答案:A

  • 第10题:

    单选题
    A user suspects that a recently installed program overwrote a Windows system file on the computer. Which of the following commands could be run to check and verify the system files?()
    A

    system /v

    B

    winnt /s

    C

    sfc /scannow

    D

    chkdsk /f


    正确答案: B
    解析: 暂无解析

  • 第11题:

    单选题
    Which log contains information about service restarts, system errors, warnings, and requests to check server connectivity? ()
    A

    Events log

    B

    System log

    C

    User Access log

    D

    Admin Access log


    正确答案: C
    解析: 暂无解析

  • 第12题:

    单选题
    You received the following error:   ORA-01578: ORACLE data block corrupted   (file # %s, block # %s)   Which file will you check to view additional information regarding the cause of this error?()
    A

    the alert log file and the trace files

    B

     the redo log files

    C

     the control file

    D

     the change tracking file


    正确答案: C
    解析: 暂无解析

  • 第13题:

    下面那个log文件是属于PONNBI北向系统的

    • A、ponnbi_wrapper.log
    • B、server.log
    • C、security.log
    • D、inventory.log

    正确答案:A

  • 第14题:

    A user suspects that a recently installed program overwrote a Windows system file on the computer. Which of the following commands could be run to check and verify the system files?()

    • A、system /v
    • B、winnt /s
    • C、sfc /scannow
    • D、chkdsk /f

    正确答案:C

  • 第15题:

    A program configuration file on a shared computer changes each time the program is run, causing the program to fail. Which of the following steps could a technician take to help prevent this file from being changed?()

    • A、Set the group’s folder permissions to deny.
    • B、Use Event Viewer to monitor changes to the file.
    • C、Store a backup copy of the file on a USB drive.
    • D、Change the file attribute to read only.

    正确答案:D

  • 第16题:

    APG的事件查看器(EVENTVIEWER)可以查看下述哪些事件?()

    • A、System Log
    • B、Application Log
    • C、Security Log
    • D、User Log

    正确答案:A,B,C

  • 第17题:

    A technician installed a new application on a Windows XP desktop. When the technician tries to launch the application it crashes. Which of the following can the technician use to troubleshoot the application?()

    • A、System logs
    • B、Security logs
    • C、Application logs
    • D、Application installation logs

    正确答案:C

  • 第18题:

    A technician is troubleshooting a user’s problem; important Windows services are not starting. In which of the following locations should the technician check to investigate when these services started or stopped?()

    • A、Com+.log
    • B、System Log
    • C、Security Log
    • D、Application Log

    正确答案:B

  • 第19题:

    An administrator receives an error when attempting to execute a WebSphere Commerce command and decides to take the following steps to troubleshoot the problem:   Check to see if the request was processed by the WebSphere plug-in but was never received by the WebSphere Application Server  Check for Java errors from EJBs and servlets  Trace WebSphere Commerce Server subsystems and commands  Which of the following files should the administrator check to accomplish these steps?()

    • A、error.log
    • B、trace.log
    • C、http_plugin.log
    • D、servlet.log
    • E、SystemOut.log

    正确答案:B,C,E

  • 第20题:

    You are working on the Certkiller database.  What is the default name of the alert log file in this database?()

    • A、alert_ Certkiller .log
    • B、alertlog_ Certkiller .log
    • C、alert_log_ Certkiller .log
    • D、Certkiller _alert_log.log
    • E、log_alert_: Certkiller .log
    • F、trace_alert_ Certkiller .log

    正确答案:A

  • 第21题:

    单选题
    A program configuration file on a shared computer changes each time the program is run, causing the program to fail. Which of the following steps could a technician take to help prevent this file from being changed?()
    A

    Set the group’s folder permissions to deny.

    B

    Use Event Viewer to monitor changes to the file.

    C

    Store a backup copy of the file on a USB drive.

    D

    Change the file attribute to read only.


    正确答案: D
    解析: 暂无解析

  • 第22题:

    单选题
    A customer’s computer crashes consistently when a specific application is launched. Thetechnician has looked at the computer and confirmed the cause of the crash. Which of thefollowing is the NEXT troubleshooting step the technician should take?()
    A

    Verify full system functionality.

    B

    Document the findings, actions, and outcomes.

    C

    Establish a plan of action to resolve the problem.

    D

    Question the user and identify changes the user has made to the system.


    正确答案: D
    解析: 暂无解析

  • 第23题:

    单选题
    What is the default local location for syslog and trace files?()
    A

    /log

    B

    /home/log

    C

    /var/log

    D

    /etc/log


    正确答案: C
    解析: 暂无解析