An administrator has received complaints from users that an application is not available while other applications run. This application resides on an NFS mounted filesystem. Which of the following commands should be run as a reasonable first step to hand

题目

An administrator has received complaints from users that an application is not available while other applications run. This application resides on an NFS mounted filesystem. Which of the following commands should be run as a reasonable first step to handle this problem?()

  • A、df
  • B、showmount
  • C、exportfs
  • D、refresh -g nfs

相似考题
更多“An administrator has received complaints from users that an application is not available while other applications run. This application resides on an NFS mounted filesystem. Which of the following commands should be run as a reasonable first step to handl”相关问题
  • 第1题:

    A user reports that their machine seems to be running slower than usual. The user states that the computer has become progressively worse as more applications are installed. Which of the following is the FIRST step the technician should take?()

    • A、Run the CHKDSK utility
    • B、Run the disk defragmenter utility
    • C、Increase the capacity on the system volume
    • D、Convert to a dynamic drive on the system

    正确答案:B

  • 第2题:

    An administrator is looking to apply a new service pack for an OS on several systems that run business critical applications for a large international finance corporation. Which of the following should the administrator do FIRST?()

    • A、Deploy the service pack to a single department within the corporation.
    • B、Upgrade the system with requirements for that service pack.
    • C、Deploy the service pack to a non-critical application server.
    • D、Submit a change control for the service pack deployment.

    正确答案:D

  • 第3题:

    An administrator receives an error when attempting to execute a WebSphere Commerce command and decides to take the following steps to troubleshoot the problem:   Check to see if the request was processed by the WebSphere plug-in but was never received by the WebSphere Application Server  Check for Java errors from EJBs and servlets  Trace WebSphere Commerce Server subsystems and commands  Which of the following files should the administrator check to accomplish these steps?()

    • A、error.log
    • B、trace.log
    • C、http_plugin.log
    • D、servlet.log
    • E、SystemOut.log

    正确答案:B,C,E

  • 第4题:

    A System p administrator wants to NFS mount a filesystem from server "alpha" to server "bravo".  Which of the following commands should be issued from "bravo" to determine which filesystems are being exported by server "alpha"()

    • A、lsexport alpha
    • B、showmount -e alpha
    • C、exportfs -l alpha
    • D、mount -e nfs alpha

    正确答案:B

  • 第5题:

    management has asked bob to post an introductory welcome page when notes users first open the video application in which one of the following places should bob put the welcome message?()

    • A、 in a document named welcome 
    • B、 in the  database about doc 
    • C、 in the  database using doc 
    • D、 in the first page in the database design

    正确答案:B

  • 第6题:

    You use Microsoft Visual Studio 2010 and Microsoft .NET Framework 4 to create a Windows Presentation Foundation (WPF) application. The application uses data-bound controls. You discover that when the application is executed by users, one of the controls is not displayed properly. You need to view the property values assigned to the controls. What should you do?()

    • A、 Use IntelliTrace. 
    • B、 Use PresentationTraceSource.
    • C、 Run the application in debug mode with Visual Studio 2010. Use the Auto window while you step through the application code.
    • D、 Run the application in debug mode with Visual Studio 2010. Use the WPF Visualizer while you step through the application code.

    正确答案:D

  • 第7题:

    You are the desktop administrator for your company. All users in the network have Windows XP Professional computers. Users in the research department have dual-processor computers. Users in the research department report that when they run 16-bit Windows programs, their computer performance becomes very slow. You use System Monitor to monitor the users’ computers. You discover that when the users are running their 16-bit applications, one processor shows a sustained utilization of more than 90 percent while the other processor only shows utilization of less than 10 percent. You need to improve application performance for the users in the research department. What should you do?()

    • A、Configure each application to run in a separate memory space.
    • B、Configure each application to run in AboveNormal priority class.
    • C、For each application, set the compatibility mode to Windows 95.  
    • D、Configure processor affinity for each application to allow it to run on both processors.

    正确答案:A

  • 第8题:

    Your network consists of a single Active Directory domain. All domain controllers run Windows Server 2008 R2. All client computers run Windows 7. All user accounts are stored in an organizational unit (OU) named Staff. All client computer accounts are stored in an OU named Clients.  You plan to deploy a new application. You need to ensure that the application deployment meets the following requirements: èUsers must access the application from an icon on the Start menu. èThe application must be available to remote users when they are offline. What should you do?()

    • A、Publish the application to users in the Staff OU.
    • B、Publish the application to users in the Clients OU.
    • C、Assign the application to computers in the Staff OU.
    • D、Assign the application to computers in the Clients OU.

    正确答案:D

  • 第9题:

    单选题
    A system administrator has filesystems that should not be mounted during system startup. How can the system administrator prevent the /data filesystem from being mounted during subsequent boots?()
    A

    mount -no /data

    B

    chfs -A no /data

    C

    mount -t nfs /data

    D

    chfs -a type=nfs /data


    正确答案: D
    解析: 暂无解析

  • 第10题:

    单选题
    An administrator is troubleshooting a problem on an application server, but has not determined the cause of the problem and is not able to replicate the problem.  Which of the following should the administrator do prior to escalating the issue?()
    A

     Gather information from users.

    B

     Reboot the server.

    C

     Apply the latest service packs to the operating system.

    D

     Perform a root cause analysis.


    正确答案: B
    解析: 暂无解析

  • 第11题:

    An administrator is planning an upgrade of a major software package on an application server.The software has been identified, the project approved and the upgrade purchased. Which of the following steps should the administrator take NEXT?()

    • A、Create a test environment for the new version.
    • B、Determine system requirements for the upgrade.
    • C、Request bids from other competing vendors in the product space.
    • D、Document the upgrade.

    正确答案:A

  • 第12题:

    An administrator is troubleshooting a problem on an application server, but has not determined the cause of the problem and is not able to replicate the problem.  Which of the following should the administrator do prior to escalating the issue?()

    • A、 Gather information from users.
    • B、 Reboot the server.
    • C、 Apply the latest service packs to the operating system.
    • D、 Perform a root cause analysis.

    正确答案:A

  • 第13题:

    An administrator has received complaints from users that an application is not available while other applications  run. This  application  resides  on  an  NFS  mounted  filesystem.   Which  of  the  following  commands should be run as a reasonable first step to handle this problem()

    • A、df
    • B、showmount
    • C、exportfs
    • D、refresh -g nfs

    正确答案:A

  • 第14题:

    A system administrator has added a new port entry in /etc/services for a new application to be tested. Which of the following commands should be used to activate this port?()

    • A、telinit -q
    • B、refresh -s inetd
    • C、startsrc -g services
    • D、refresh -s portmap

    正确答案:B

  • 第15题:

    You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You manage a server that runs Windows Server 2008. The server hasTerminal Service Web Access (TS Web Access) installed. Several line-of-business applications areavailable on the server by using TS Web Access. You have a new application installed on the server. Youhave to make the application available through TS Web Access. In order to achieve this,What action should you perform?()

    • A、In order to make the application available through TS Web Access, the data source for TS Web Accessshould be specified from the TS Web Access Web site.
    • B、In order to make the application available through TS Web Access, the application should be added to the RemoteApp Programs list from TS RemoteApp Manager.
    • C、In order to make the application available through TS Web Access, the users should be added to the TS Web Access Computers group from the Local Users and Groups snap-in.
    • D、In order to make the application available through TS Web Access, the mstsc.exe command should be run and specify the /v parameter should be specified from the command prompt.

    正确答案:B

  • 第16题:

    You are an enterprise administrator for Cer-tech .com. The corporate network of the company consists ofan Active Directory domain. All the servers on the network run Windows Server 2008. The network runs aTerminal services role on a server to enable remote users to run commonly required applications from theirterminal. A Terminal Services application called App1 that runs on the server has suddenly stopped responding. Todiagnose the problem, you monitored the memory usage on the server for a week and discover that App1application has a memory leak. To resolve the problem, you first looked for a patch but that was not currently available. So you created a new resource-allocation policy in Microsoft Windows Server ResourceManager and configured a Process Matching Criteria named TrackMem for the application. Which of the following options would you choose to terminate the application when the application consumes more than half of the available memory on the server?()

    • A、Configure the resource-allocation policy and set the maximum working set limit option to half theavailable memory on the server.
    • B、Configure the resource-allocation policy and set the maximum committed memory option to half theavailable memory on the server.
    • C、Set the new policy as a Profiling Policy.
    • D、Set the new policy as a Managing Policy.

    正确答案:B,D

  • 第17题:

    The system administrator has requested that all setuid/setgid bits be removed from executables in application filesystem. Which command will achieve this?()

    • A、chmod -R o-s /application
    • B、chmod -R ug-s /application
    • C、chmod -R -s -o /application
    • D、chmod -R -s -ug /application

    正确答案:B

  • 第18题:

    多选题
    An administrator receives an error when attempting to execute a WebSphere Commerce command and decides to take the following steps to troubleshoot the problem:   Check to see if the request was processed by the WebSphere plug-in but was never received by the WebSphere Application Server  Check for Java errors from EJBs and servlets  Trace WebSphere Commerce Server subsystems and commands  Which of the following files should the administrator check to accomplish these steps?()
    A

    error.log

    B

    trace.log

    C

    http_plugin.log

    D

    servlet.log

    E

    SystemOut.log


    正确答案: B,D
    解析: 暂无解析

  • 第19题:

    单选题
    You are developing an application that runs by using the credentials of the end user. Only users who are members of the Administrator group get permission to run the application. You write the following security code to protect sensitive data within the application.bool isAdmin=false;  WindowsBuiltInRole role=WindowsBuiltInRole.Administrator; ......  if(!isAdmin)          throw new Exception("User not permitted");   You need to add a code segment to this security code to ensure that the application throws an exception if a user is not a member of the Administrator group. Which code segment should you use?()
    A

    A

    B

    B

    C

    C

    D

    D


    正确答案: B
    解析: 暂无解析

  • 第20题:

    多选题
    While troubleshooting a video problem on an application server, the system administrator has determined that the video firmware should be updated.  Which of the following sources should be used tolocate an appropriate update for this hardware? ()
    A

    Third-party manufacturer

    B

    Video chipset manufacturer

    C

    Server manufacturer

    D

    Operating system manufacturer

    E

    Shareware file sharing site


    正确答案: B,C
    解析: 暂无解析