单选题A file named "core" exists in the current directory.  Which of the following commands should be used to determine what created the "core" file?()Adump -t core Bstrings core Ctrace -a core Dcrash core /unix_up

题目
单选题
A file named "core" exists in the current directory.  Which of the following commands should be used to determine what created the "core" file?()
A

 dump -t core 

B

 strings core 

C

 trace -a core 

D

 crash core /unix_up


相似考题
更多“单选题A file named "core" exists in the current directory.  Which of the following commands should be used to determine what created the "core" file?()A  dump -t core B  strings core C  trace -a core D  crash core /unix_up”相关问题
  • 第1题:

    Refer to the exhibit. Which recommended practice is applicable?()

    A. If no core layer is deployed, the design will be easier to scale.

    B. If no core layer is deployed, there will be fewer cabling requirements.

    C. If no core layer is deployed, the distribution switches should not be fully meshed.

    D. A dedicated campus core layer is not needed for connecting fewer than five buildings.

    E. A dedicated campus core layer should be deployed for connecting three or more buildings.


    参考答案:E

  • 第2题:

    当某个进程非正常退出时,会在当前目录下产生一个core文件,该文件记录了错误的原因。通过命令file core可以找出是哪个进程产生。


    正确答案:正确

  • 第3题:

    To which switch or switches should you provide redundant links in order to achieve high availability with reliable fast convergence in the enterprise campus?()

    • A、 to a core switch running Cisco NSF and SSO from redundant distribution switches connected with a Layer 2 link
    • B、 to a core switch running Cisco NSF and SSO from redundant distribution switches connected with a Layer 3 link
    • C、 to two core switches from redundant distribution switches connected with Layer 2 link
    • D、 to two core switches from redundant distribution switches connected with Layer 3 link
    • E、 to two core switches running Cisco NSF and SSO from two redundant distribution switches running Cisco NSF and SSO

    正确答案:D

  • 第4题:

    整个iPhone的操作系统包括()

    • A、Core OS
    • B、Core Serives
    • C、Core Data
    • D、Media
    • E、Cocoa Touch

    正确答案:A,B,D,E

  • 第5题:

    What statement is true regarding processor allocation when implementing micro-partitions? ()

    • A、 The minimum configurable capacity allocation is 1.0 core and the minimum increment is 0.1 core.
    • B、 The minimum configurable capacity allocation is 0.1 core and the minimum increment is 0.01 core.
    • C、 The minimum configurable capacity allocation is 1.0 core and the minimum increment is 0.01 core.
    • D、 The minimum configurable capacity allocation is 0.1 core and the minimum increment is 0.001

    正确答案:B

  • 第6题:

    Customers looking to utilize quad-core processors in a blade environment should use which of the following power saving options?()

    • A、IBM HS21 - Quad-core processor designed for 4-way servers
    • B、IBM x3850 Server - Quad-core LV processors
    • C、IBM LS41 - Quad-core processor designed for 4-way servers
    • D、IBM HS21 - Quad-core LV processors

    正确答案:D

  • 第7题:

    Intel推出的Core系列CPU,大部分集成了显示核心,此系列是。()

    • A、Core I3
    • B、Core I3、I5、I7
    • C、Core I3与I5
    • D、Core I5

    正确答案:B

  • 第8题:

    Which six files are maintained in the Flash Recovery Area?()

    • A、 control file
    • B、 RMAN files
    • C、 password file
    • D、 parameter file
    • E、 flashback logs
    • F、 data file copies
    • G、 core dump files
    • H、 archived log files
    • I、 RMAN recovery scripts
    • J、 control file autobackpus

    正确答案:A,B,E,F,H,J

  • 第9题:

    单选题
    Which command will set the core size file to unlimited for the user‘webapp’?()
    A

    no -p 'core=-1' webapp

    B

    chuser 'core=-1' webapp

    C

    setsenv -attr 'core=unlimited' webapp

    D

    chsec -f '/etc/security/limits' 'core=-1' webapp


    正确答案: C
    解析: 暂无解析

  • 第10题:

    单选题
    What is an advantage of having wire rope with a fiber core over that of a wire rope of the same size with a wire core().
    A

    Fiber core rope offers greater strength

    B

    Fiber core rope offers greater flexibility

    C

    Fiber core rope can be used at higher operating temperatures

    D

    Fiber core rope is the only type authorized for cargo runners


    正确答案: C
    解析: 暂无解析

  • 第11题:

    单选题
    What statement is true regarding processor allocation when implementing micro-partitions? ()
    A

     The minimum configurable capacity allocation is 1.0 core and the minimum increment is 0.1 core.

    B

     The minimum configurable capacity allocation is 0.1 core and the minimum increment is 0.01 core.

    C

     The minimum configurable capacity allocation is 1.0 core and the minimum increment is 0.01 core.

    D

     The minimum configurable capacity allocation is 0.1 core and the minimum increment is 0.001


    正确答案: C
    解析: 暂无解析

  • 第12题:

    单选题
    A customer has just purchased an 8-core POWER 570 which has two dual port 1 Gbps  Integrated Virtual Ethernet (IVE) adapters. The customer wants to implement queue pairs (QPs) to take advantage of parallel processing of network traffic to its client logical partitions. Assuming that the system is to utilize the IVEs in both CECs,  which configuration will allow a logical partition to utilize the entire eight cores for network traffic processing?()
    A

     Set Multiple Core Scaling (MCS) value of the port group to 8 and set multiple core parameter of the client Ethernet adapters to yes.

    B

     Set Multiple Core Scaling (MCS) value of the port group to 4 and set multiple core parameter of the client Ethernet adapters to yes.

    C

     Set Multiple Core Scaling (MCS) value of one of the physical port groups to 4 and set multiple core parameter of the client Ethernet adapters to yes.

    D

     Set Multiple Core Scaling (MCS) value of one of the physical port groups to 8 and set the multiple core parameter of the client Ethernet adapters to yes.


    正确答案: D
    解析: 暂无解析

  • 第13题:

    The switches shown in the diagram, Core and Core2, are both Catalyst 2950s. The addressing scheme for each company site is as follows:Router Ethernet port - 1st usable addressCore - 2nd usable addressCore2 - 3rd usable addressFor this network, which of the following commands must be configured on Core2 to allow it to be managed remotely from any subnet on the network? ()

    A.Core2(config)# interface f0/0 Core2(config-if)# ip address 192.168.1.10 255.255.255.248

    B.Core2(config)# interface vlan 1 Core2(config-if)# ip address 192.168.1.11 255.255.255.248

    C.Core2(config)# line con 0 Core2(config-line)# password cisco

    D.Core2(config)# line vty 0 4 Core2(config-line)# password cisco

    E.Core2(config)# ip default-gateway 192.168.1.9

    F.Core2(config)# ip route 0.0.0.0 0.0.0.0 192.168.1.8


    参考答案:B, D, E

  • 第14题:

    什么是知识产权核(Intellectual Property Core,简称IP Core)?指出“软知识产权核(Soft IP Core)”、“硬知识产权核(Hard IP Core)”、“固知识产权核(Firm IP Core)”的意义和差别。


    正确答案: 知识产权核是一种预先设计好的甚至已经过验证的具有某种特定功能的集成电路、器件或部件
    软核:主要描述功能,以HDL(硬件描述语言)文本形式提交给用户
    固核:主要描述结构,介于软核和硬核之间,以门电路级网表的形式提供给用户
    硬核:基于物理描述,并已经过工艺验证,以电路物理结构掩模版图和全套工艺文件提供给用户

  • 第15题:

    In the parameter file of the production database, the BACKGROUND_DUMP_DEST parameter is set to $ORACLE_HOME/users. Which two types of files would you find in this location?()

    • A、the alert log file
    • B、the core dump files
    • C、the change tracking file
    • D、the user session trace files
    • E、the database audit trail files
    • F、the background process trace files

    正确答案:A,F

  • 第16题:

    查看IHUB 内存的命令

    • A、show core1-uptime
    • B、show system core1-cpu
    • C、show system core1-memory-pools

    正确答案:C

  • 第17题:

    Which command will set the core size file to unlimited for the user‘webapp’?()

    • A、no -p 'core=-1' webapp
    • B、chuser 'core=-1' webapp
    • C、setsenv -attr 'core=unlimited' webapp
    • D、chsec -f '/etc/security/limits' 'core=-1' webapp

    正确答案:B

  • 第18题:

    A file named "core" exists in the current directory.  Which of the following commands should be used to determine what created the "core" file?()

    • A、 dump -t core 
    • B、 strings core 
    • C、 trace -a core 
    • D、 crash core /unix_up

    正确答案:B

  • 第19题:

    You work as a database administrator for Certkiller .com. You determine that archiving was not successful in one of thedestinators. You want to check the alert log file for more information on this. Which initialization parameter gives you the location of the alert log file?()

    • A、USER_DUMP_DEST
    • B、CORE_DUMP_DEST
    • C、ALERT_LOG_DEST
    • D、ALERT_DUMP_DEST
    • E、TRACE_DUMP_DEST
    • F、BACKGROUND_DUMP_DEST

    正确答案:F

  • 第20题:

    You executed the following command to back up your control file:  ALTER DATABASE BACKUP CONTROLFILE TO TRACE;  Which initialization parameter is used to specify the location of the trace file?()

    • A、USER_DUMP_DEST
    • B、CORE_DUMP_DEST
    • C、TRACE_DUMP_DEST
    • D、BACKUP_DUMP_DEST
    • E、BACKGROUND_DUMP_DEST

    正确答案:A

  • 第21题:

    多选题
    In the parameter file of the production database, the BACKGROUND_DUMP_DEST parameter is set to $ORACLE_HOME/users. Which two types of files would you find in this location?()
    A

    the alert log file

    B

    the core dump files

    C

    the change tracking file

    D

    the user session trace files

    E

    the database audit trail files

    F

    the background process trace files


    正确答案: F,D
    解析: 暂无解析

  • 第22题:

    单选题
    Customers looking to utilize quad-core processors in a blade environment should use which of the following power saving options?()
    A

    IBM HS21 - Quad-core processor designed for 4-way servers

    B

    IBM x3850 Server - Quad-core LV processors

    C

    IBM LS41 - Quad-core processor designed for 4-way servers

    D

    IBM HS21 - Quad-core LV processors


    正确答案: D
    解析: 暂无解析

  • 第23题:

    单选题
    Which of the following is a characteristic of a data center core?()
    A

     Server-to-server traffic always remains in the core layer.

    B

     The recommended practice is for the core infrastructure to be in Layer 3.

    C

     The boundary between Layer 2 and Layer 3 should be implemented in the aggregation layer.

    D

     The Cisco Express Forwarding hashing algorithm is the default, based on the IP address andLayer 4 port.

    E

     Core layer should run BGP along with an IGP because iBGP has a lower administrativedistance than any IGP.


    正确答案: C
    解析: 暂无解析