File infectors are also called______viruses.
A.filter
B.parasail
C.parasitic
D.attack
第1题:
A large corporation is concerned about the amount of time it takes to back up their main file server. They are also concerned that their IT technician frequently forgets to change the backup tapes, thereby leaving the company open to data loss. Which backup system would solve both problems?()
第2题:
如果要将文件名file1修改为file2,下列命令()可以实现。
第3题:
A hospital customer with an experienced AIX and Microsoft Windows staff wants to consolidate all of their file/print services onto fewer systems. They currently use multiple Microsoft Windows-based Intelsystems that are experiencing reliability problems. They also have POWER4+ systems that are running multiple AIX LPARs that have experienced no reliability issues. They need at least 99.99% uptime. Which solution will meet their uptime needs at the lowest cost?()
第4题:
Which gets the name of the parent directory file “file.txt”?()
第5题:
You are the desktop administrator for your company. Laura is a user in the company's accounting department. Laura uses a Windows XP Professional computer. Laura installs a new software application that was listed on her Add or Remove Programs list. Laura reports that the new application now opens whenever she double-clicks any file that has a .doc file name extension. She also reports that 24 new icons appear on the New menu when she right-clicks her desktop. Laura asks you to reconfigure her computer so that Microsoft Word opens when she double-clicks files that have a .doc file name extension. She also wants you to remove the new icons from the New menu. You instruct Laura to uninstall the new application. After she uninstalls the application, she reports that she can no longer open .doc files by double-clicking them. She also reports that the unwanted icons on the New menu are still present. You reinstall the new application, and it continues to open when Laura double-clicks .doc files. You want to restore the .doc file association and to remove the unwanted icons from the New menu on Laura's computer. You want to accomplish these tasks as quickly as possible. You also want to ensure that none of Laura's other documents or personal settings are affected. What should you do?()
第6题:
A
B
C
D
第7题:
Decrease the amount of time between transaction log backups.
Configure the database to use the simple recovery model.
Configure the RECOVERY INTERVAL option to be a smaller value.
Run DBCC SHRINKFILE on the transaction log file.
第8题:
String name= File.getParentName(“file.txt”);
String name= (new File(“file.txt”)).getParent();
String name = (new File(“file.txt”)).getParentName();
String name= (new File(“file.txt”)).getParentFile();
Directory dir=(new File (“file.txt”)).getParentDir(); String name= dir.getName();
第9题:
A
B
C
D
第10题:
Open the file using the menu option file->open make the changes and recompile the report.
Convert the file into .REP file using the report compiler make the changes and convert the file back to a .REX file.
Execute the R30CONV command to convert the file to a .RDF file, make the changes and convert the file back to a .REX file.
Choose file -> administration->compile. Convert the file to a .REP file, make the changes and convert the file back to a .REX file.
Execute the R30CONV command to convert the file to a .REP file, make the changes and convert the file back to a .REX file.
第11题:
Increasing the size of a logical volume also increases the size of the file system
Reducing the size of a logical volume requires reducing the size of the file system first
Increasing the size of a file system requires increasing the size of the logical volume first
Increasing the size of a file system also increases the size of the logical volume when necessary
第12题:
Name the new server File2. Create a new mirrored volume by using two 72-GB disks. Connect File2 to the network and copy the data from File1. When copying is complete, shut down the old File1.
Name the new server File1. Move both disks from the old File1 to the new File1. Scan the disks for changes. Import the disks. Connect the new File1 to the network.
Name the new server File1. Break the mirror on the old File1. Move one of the disks from the old File1 to the new File1. Scan the disk for changes. Initialize the disk. Select the spare disk and create the mirror. Connect the new File1 to the network.
Name the new server File1. Remove one of the disks in the mirror from the old File1. Move the disk to the new File1. Scan the disk for changes. Import the disk. Shut down the old File1 and connect the new File1 to the network.
第13题:
An administrator has written a script to check that the contents of an application configuration file are identicalon all cluster nodes. The script has also been associated with a user defined custom verification method. Theadministrator would like the contents of this file to be checked and verified automatically on a daily basis.How can this be achieved?()
第14题:
What is the difference between thE.remove and thE.purge action with the dpkg command?()
第15题:
Which of the following will occur if an operator types the command vi file.out?()
第16题:
Your network consists of a single Active Directory domain. All network servers run Windows Server2003 Service Pack 2 (SP2).Your organization has a storage area network (SAN). All shared folders on file servers are stored on theSAN.The Change permission for all shared folders is assigned to Domain Users. Different NTFS permissionsare also applied to the shared folders.You perform a daily full backup of all the files stored in the shared folders.A file server fails and requires several hours to repair.You need to provide users access to the shared folders that were on the failed file server as quickly aspossible. Existing permissions must be retained for all files.What should you do? ()
第17题:
You delete content from a file named Speed.doc that is stored in the C:///Data folder. You edit 20 files in this folder over the next two days. You need to restore the version of the file that had the correct data. You also need to ensure that the other files in the folder remain unaffected. What should you do? ()
第18题:
-remove removes the program, -purge also removes the config files
-remove only removes the program, -purge only removes the config files
-remove removes a package, -purge also removes all packages dependent on it
-remove removes only the package file itself, -purge removes all files related to the package
第19题:
Files found in the file system that are also on tape will NOT be overwritten.
The missing files, present on the backup tape, are restored to the file system with the data as it was when the backup was taken.
The access times are preserved by tar and will reflect the time when a user last accessed the data.
The modification time on the files restored by tar will be preserved and will reflect the time the file was last modified before the backup, NOT the time of the restore operation.
第20题:
RAID
tape library
optical storage
disk to disk to tape
第21题:
If the file exists it will be opened for editing. If the file does not exist an error message will be displayed.
If the file exists it will be opened for editing. If the file does not exist a new file with the name file.out will be created and opened for editing.
If the file exists an error message will be displayed. If the file does not exist a new file with the name file.out will be created and opened for editing.
If the file exists the operator will be asked whether to open the file or overwrite the file. If the file does not exist a new file with the name file.out will be created and opened for editing.
第22题:
LIST
SWITCH
VALIDATE
CONFIGURE
RESYNC CATALOG
UPGRADE CATALOG
第23题:
By using a job scheduler such as cron
By enabling automatic cluster verification
By including the script name in the file /usr/es/sbin/cluster/etc/clverify.rc
By including the custom method name in the file /usr/es/sbin/cluster/etc/rc.authomethods