更多“Which of the following resources can be explicitly locked?()”相关问题
  • 第1题:

    Which of the following resources can be explicitly locked?()

    A.Row

    B.Page

    C.Table

    D.Column


    参考答案:C

  • 第2题:

    In IPCCX, skills can be assigned to which of the following configuration objects?()

    • A、resources  
    • B、Skill Groups  
    • C、competence levels  
    • D、Resource Groups

    正确答案:A

  • 第3题:

    A group of users report that they can access local resources but cannot access the Internet. Which of the following should the administrator use to test connectivity?()

    • A、 tracert
    • B、 msconfig
    • C、 route
    • D、 net use

    正确答案:A

  • 第4题:

    Which of the following are examples of physical security measures?()

    • A、Policies and procedures
    • B、Encryption
    • C、Locked doors
    • D、Security personnel
    • E、Backup tapes

    正确答案:C,D

  • 第5题:

    Cindy wants to set up third-party tools so she can access them via the designer. Which one of  the following should cindy do?()

    • A、 file-> inport 
    • B、 tools->import 
    • C、 tools->add tools 
    • D、 shared resources->third party tools

    正确答案:B

  • 第6题:

    Which of the following resources can be explicitly locked?()

    • A、Row
    • B、Page
    • C、Table
    • D、Column

    正确答案:C

  • 第7题:

    Users complain an AIX server is running slow.  Which of the following commands can be run to determine what is consuming systems resources?()

    • A、 tprof
    • B、 lpstat
    • C、 ps aux
    • D、 entstat

    正确答案:C

  • 第8题:

    View the Exhibit to observe the roles assigned to the SL_REP user.  Which statement is true about theassignment of the SELECT_CATALOG_ROLE role to the SL_REP user()

    • A、The user must enable the role explicitly.
    • B、The user can grant the role to other users.
    • C、The user cannot use the role until the DBA enables it explicitly.
    • D、The user can start using the role immediately without any changes

    正确答案:A

  • 第9题:

    Which of the following ensures the MOST secure access to a server room?()

    • A、 ID card readers
    • B、 Server rack doors
    • C、 Biometric devices
    • D、 Locked doors

    正确答案:C

  • 第10题:

    多选题
    Which three statements about Label-Switched Paths (LSPs) are true? ()
    A

    LSPs are bidirectional.

    B

    LSPs are unidirectional.

    C

    LSPs can be signaled by CAC.

    D

    LSPs can be configured explicitly.

    E

    LSPs can be configured dynamically.


    正确答案: A,B
    解析: 暂无解析

  • 第11题:

    单选题
    Which of the following ensures the MOST secure access to a server room?()
    A

     ID card readers

    B

     Server rack doors

    C

     Biometric devices

    D

     Locked doors


    正确答案: C
    解析: 暂无解析

  • 第12题:

    单选题
    Which of the following describes a computer in which the HDD LED is lit, but the mouse does notrespond and the computer is unresponsive?()
    A

    The computer has locked up

    B

    Windows Update is running

    C

    The computer is in Safe Mode

    D

    The reset button is stuck


    正确答案: C
    解析: 暂无解析

  • 第13题:

    After creating backups of critical system and user data, which of the following is the BEST location to store the backups?()

    • A、In the supply closet so anyone can access them if needed
    • B、Near the server for easy access to restore files
    • C、Locked in a cabinet in the IT Manager’s office
    • D、At a secure off-site storage facility

    正确答案:D

  • 第14题:

    Which three statements about Label-Switched Paths (LSPs) are true? ()

    • A、 LSPs are bidirectional.
    • B、 LSPs are unidirectional.
    • C、 LSPs can be signaled by CAC.
    • D、 LSPs can be configured explicitly.
    • E、 LSPs can be configured dynamically.

    正确答案:B,D,E

  • 第15题:

    Which of the following describes a computer in which the HDD LED is lit, but the mouse does notrespond and the computer is unresponsive?()

    • A、The computer has locked up
    • B、Windows Update is running
    • C、The computer is in Safe Mode
    • D、The reset button is stuck

    正确答案:A

  • 第16题:

    A user took a laptop on vacation and made changes to the configuration in order to use the device at the hotel. The user can reach the Internet, but cannot access any internal network resources. Which of the following is the MOST likely reason?()

    • A、Incorrect DNS
    • B、Incorrect subnet mask
    • C、Duplicate IP address
    • D、Incorrect SSID

    正确答案:A

  • 第17题:

    An administrator believes that the Staging Configuration Directory (SCD) may be locked due to an error in aDARE event. Which of the following commands can the administrator run to check for the existence of locks?()

    • A、cldump d
    • B、cldare e
    • C、clverify L
    • D、chconfigchk r

    正确答案:B

  • 第18题:

    To which of the following resources can a lock be applied?()

    • A、Row
    • B、Alias
    • C、Bitmap
    • D、Column

    正确答案:A

  • 第19题:

    The enableModifiedFlag enables which of the following?()

    • A、User initiated edit document command
    • B、Silent navigation from an edited page
    • C、User initiated save command
    • D、Removal of a locked for editing status

    正确答案:C

  • 第20题:

    The user cannot access some Internet websites, but can connect to resources inside the local network. The technician successfully uses the ping command to test the user’s connectivity. Which of the following commands can the technician run NEXT to troubleshoot the issue?()

    • A、net /?
    • B、ipconfig /flushdns
    • C、netstat -r
    • D、nbtstat -R

    正确答案:B

  • 第21题:

    单选题
    Users complain an AIX server is running slow.  Which of the following commands can be run to determine what is consuming systems resources?()
    A

     tprof

    B

     lpstat

    C

     ps aux

    D

     entstat


    正确答案: A
    解析: 暂无解析

  • 第22题:

    单选题
    Cindy wants to set up third-party tools so she can access them via the designer. Which one of  the following should cindy do?()
    A

     file-> inport 

    B

     tools->import 

    C

     tools->add tools 

    D

     shared resources->third party tools


    正确答案: D
    解析: 暂无解析

  • 第23题:

    单选题
    Which of the following resources can be referenced in the LOCK statement?()
    A

    Row

    B

    Table

    C

    Column

    D

    Table space


    正确答案: A
    解析: 暂无解析

  • 第24题:

    单选题
    A group of users report that they can access local resources but cannot access the Internet. Which of the following should the administrator use to test connectivity?()
    A

     tracert

    B

     msconfig

    C

     route

    D

     net use


    正确答案: C
    解析: 暂无解析