The system log has a proprietary format.
System logs must be sent to a remote device.
New system logs can be created and archived.
Most software processes create their own logs.
第1题:
A server is having problems booting into the operating system. Which of the following can provide important information to begin to troubleshoot the cause?()
第2题:
Which CLI command is used to upgrade a Juniper router?()
第3题:
A server is having problems booting into the operating system. Which of the following can provide important information to begin to trouble shoot the cause?()
第4题:
Which of the following commands can be used to review the system error logs?()
第5题:
When an operator is trying to log off the system displays this message: you have running jobs?? What does this mean?()
第6题:
Which statements are true regarding system-partitioned tables?()
第7题:
The source and target platforms must be the same
Redo logs, control files and temp files are also transported
The transported database must have the same database identifier (DBID) as the source database and cannot be changed
The COMPATIBLE parameter must be set to 10.0.0.0 or higher and the database must be opened in readonly mode before being transported
Recovery Manager (RMAN) is used to convert the necessary data files of the database if the target platform is different and has different endian format
第8题:
It must include a root password
It is roll back file number 50, and you can recover it by issuing rollback 50
It is created by issuing request system configuration rescue save
It is updated automatically when you commit
第9题:
request system software add
request system software downgrade
request system software replace
request system software rollback
第10题:
The Cisco VIC can create an unlimited number of Virtual NICs
The number of vNICs on the Cisco VIC that can be created is determined by the number of chassis uplinks
vNICs are created using software on the host operating system
The host operating system sees a vNIC as a physical PCIe device
The host operating system sees a vNIC as a sub-interface of a primary NIC
The Cisco VIC can create 1024 vNICs
第11题:
The logical router can span across chassis.
The fabric and system controller module are shared by all logical routers.
Each logical router has a distinct fabric and system controller module
The logical router can share a route processor
The logical router cannot share a route processor
第12题:
Syslogd creates error log entries in the system error log.
The default error log is stored in /var/adm/ras/error.log.
All entries in the error log are related to software problems.
Error logging is automatically enabled during system initialization.
第13题:
Which two commands allow you to return to a previous version of software on the device?()
第14题:
Which two statements regarding system logging on a Juniper enterprise router are correct?()
第15题:
Which TWO of the following tasks of system maintenance can be improved by using Remote Deployment Manager?()
第16题:
Which of the following statements best describes error logging?()
第17题:
Which two statements are true about the rescue configuration file?()
第18题:
Your organization has 20 servers that run Windows Server 2003 Service Pack 2 (SP2). You need to monitor all 20 servers for a period of 24 hours by using the same performance counters. You must achieve this goal by using the least amount of administrative effort. What should you do first? ()
第19题:
user@router> request system storage cleanup
user@router> show system storage
user@router> request system storage cleanup dry-run
user@router> show system storage detail
第20题:
Recycle bin exists for the tables only in non-SYSTEM, locally managed tablespaces.
You can flash back a dropped table provided row movement has been enabled on the table.
If you drop an index before dropping its associated table, then the recovery of the index is not supported when you flash back the dropped table.
When you execute the DROP TABLESPACE? INCLUDING CONTENTS command, the objects in the tablespace are places in the recycle bin.
When a dropped table is moved to the recycle bin, only the table is renamed to a system-generated name; its associated objects and constraints are not renamed.
If you drop a table that is protected by the recycle bin, then associated bitmap-joined indexes and materialized view logs are also stored in the recycle bin.
第21题:
Flashback Table can be performed on system tables.
Flashback Table operation does not shrink the segments.
Flashback Table uses log mining to extract SQL_REDO and SQL_UNDO statements.
Flashback Table operation acquires exclusive data manipulation language (DML) locks.
第22题:
The system log has a proprietary format.
System logs must be sent to a remote device.
New system logs can be created and archived.
Most software processes create their own logs.
第23题:
Only a single partitioning key column can be specified.
All DML statements must use partition-extended syntax.
The same physical attributes must be specified for each partition.
Unique local indexes cannot be created on a system-partitioned table.
Traditional partition pruning and partitionwise joins are not supported on these tables.
第24题:
Flashback logs are not archived.
Flashback logs are maintained in redo log files.
Flashback logs are maintained in the Flash Recovery Area.
Flashback logs are used to maintain Flashback Database related errors.
Flashback logs need to be cleared manually after you disable Flashback Database.