单选题In which file can the administrator view the detailed results of the overnight cluster automatic verification?()A clutils.logB cluster.logC clverify.logD autoverify.log

题目
单选题
In which file can the administrator view the detailed results of the overnight cluster automatic verification?()
A

clutils.log

B

cluster.log

C

clverify.log

D

autoverify.log


相似考题
更多“单选题In which file can the administrator view the detailed results of the overnight cluster automatic verification?()A clutils.logB cluster.logC clverify.logD autoverify.log”相关问题
  • 第1题:

    An administrator runs clstat on a cluster node and receives the following response: ’Can not get  Cluster Information.’ Which of the following daemons may need to be started in order to correct this problem?()

    • A、 topsvcs
    • B、 clinfoES
    • C、 snmpinfo
    • D、 clsmuxpdES

    正确答案:B

  • 第2题:

    A cluster administrator wants to create a snapshot backup of the cluster. Which smit menu can be used to dothis?()

    • A、Extended Configuration
    • B、System Management (C-SPOC)
    • C、Problem Determination Tools
    • D、Initialization and Standard Configuration

    正确答案:A

  • 第3题:

    How can the administrator use file ’a’ containing ’-El sys0’ to view the attributes of a device()?  

    • A、lsdev -fv a
    • B、lsattr -f a
    • C、lsattr`cat a`
    • D、lsdev -Cccat a

    正确答案:B

  • 第4题:

    Company.com has decided to use the FUBAR Application Server to host their web application. Unfortunately, the FUBAR Application Server uses the server machine’s file system for its JNDI namespace. Every JNDI lookup performed in the web application is translated into a file 1/0 operation, which results in very poor performance.  Which J2EE pattern can help with this performance issue?()

    • A、 Transfer Object
    • B、 Service Locator
    • C、 Intercepting Filter
    • D、 Model-View-Controller

    正确答案:B

  • 第5题:

    Which result or results do these actions produce?()

    • A、Users in both departments can access their files from the network.
    • B、Users in the accounting department can view the legal department’s documents.
    • C、Users in the legal department cannot view the accounting department’s documents.
    • D、Company managers can access and modify both departments’ files.

    正确答案:A,C,D

  • 第6题:

    单选题
    An administrator will be performing a PowerHA upgrade on a cluster from version 5.3 to version 5.5. Which ofthe following tasks will verify a successful migration?()
    A

    Use the clstat command and verify the cluster is in a stable state

    B

    After each node is upgraded, run a verification and synchronization

    C

    After all nodes are upgraded, run a verification and synchronization

    D

    Take a snapshot of each node and verify the configuration is the same


    正确答案: D
    解析: 暂无解析

  • 第7题:

    单选题
    A cluster administrator has decided to add a cluster verification to the weekly maintenance scripts  That are run from corn.  When a cluster verification is performed,which of the following will require a custom verification method?()
    A

     HACMP ODM object classes

    B

     HACMP Error Notification

    C

     HACMP Topology & Resources

    D

     HACMP Application Server Start/Stop scripts


    正确答案: B
    解析: 暂无解析

  • 第8题:

    单选题
    In which file can the administrator view the detailed results of the overnight cluster automatic verification?()
    A

    clutils.log

    B

    cluster.log

    C

    clverify.log

    D

    autoverify.log


    正确答案: B
    解析: 暂无解析

  • 第9题:

    单选题
    A network administrator would like to view detailed interface status, properties, statistics, errors,and CoS packet counters.Which operational command will display this information?()
    A

    show interfaces extensive

    B

    show interfaces

    C

    show configuration interfaces

    D

    show interface status


    正确答案: C
    解析: 暂无解析

  • 第10题:

    单选题
    A system administrator suspects that there were problems with the AIX installation on a pSeries server. Which of the following commands can be used, with the appropriate flags, to view the BOS installation output files?()
    A

    alog

    B

    errpt

    C

    lscfg

    D

    installp


    正确答案: B
    解析: 暂无解析

  • 第11题:

    单选题
    A cluster administrator wants to create a snapshot backup of the cluster. Which smit menu can be used to dothis?()
    A

    Extended Configuration

    B

    System Management (C-SPOC)

    C

    Problem Determination Tools

    D

    Initialization and Standard Configuration


    正确答案: B
    解析: 暂无解析

  • 第12题:

    单选题
    While selecting files during an interactive restore with ufsrestore, you are interrupted by a junior  administrator before you can complete the file selection process and start the restore. After answering the administrator’s question, you realize that you have forgotten which files you had already selected for the restore.  How can you determine which files are already marked for extraction and restore? ()
    A

     You can use the ls subcommand of ufsrestore.

    B

     You can use the add subcommand of ufsrestore.

    C

     You can use the select subcommand of ufsrestore.

    D

     You can view the selected files as they are marked with a plus sign (+) in the list that is permanently displayed in the upper half of the interactive ufsrestore screen view.


    正确答案: D
    解析: 暂无解析

  • 第13题:

    An administrator will be performing a PowerHA upgrade on a cluster from version 5.3 to version 5.5. Which ofthe following tasks will verify a successful migration?()

    • A、Use the clstat command and verify the cluster is in a stable state
    • B、After each node is upgraded, run a verification and synchronization
    • C、After all nodes are upgraded, run a verification and synchronization
    • D、Take a snapshot of each node and verify the configuration is the same

    正确答案:C

  • 第14题:

    When an emulated error notification method is complete, an administrator can view the error log  By typing the errpt command to be sure the emulation took place.  To verify that the error log entry is the result of the emulated event,the log entry resource name is set to EMULATOR,or which of the following?()  

    • A、 A user defined Resource Name
    • B、 A cluster defined Resource Name
    • C、 An error daemon specific Resource Name
    • D、 A Resource Name generated by Automatic Error Notification

    正确答案:A

  • 第15题:

    A cluster administrator has decided to add a cluster verification to the weekly maintenance scripts  That are run from corn.  When a cluster verification is performed,which of the following will require a custom verification method?()  

    • A、 HACMP ODM object classes
    • B、 HACMP Error Notification
    • C、 HACMP Topology & Resources
    • D、 HACMP Application Server Start/Stop scripts

    正确答案:B

  • 第16题:

    While selecting files during an interactive restore with ufsrestore, you are interrupted by a junior  administrator before you can complete the file selection process and start the restore. After answering the administrator’s question, you realize that you have forgotten which files you had already selected for the restore.  How can you determine which files are already marked for extraction and restore? ()

    • A、 You can use the ls subcommand of ufsrestore.
    • B、 You can use the add subcommand of ufsrestore.
    • C、 You can use the select subcommand of ufsrestore.
    • D、 You can view the selected files as they are marked with a plus sign (+) in the list that is permanently displayed in the upper half of the interactive ufsrestore screen view.

    正确答案:A

  • 第17题:

    单选题
    An administrator has written a script to check that the contents of an application configuration file are identicalon all cluster nodes. The script has also been associated with a user defined custom verification method. Theadministrator would like the contents of this file to be checked and verified automatically on a daily basis.How can this be achieved?()
    A

    By using a job scheduler such as cron

    B

    By enabling automatic cluster verification

    C

    By including the script name in the file /usr/es/sbin/cluster/etc/clverify.rc

    D

    By including the custom method name in the file /usr/es/sbin/cluster/etc/rc.authomethods


    正确答案: D
    解析: 暂无解析

  • 第18题:

    单选题
    An administrator runs clstat on a cluster node and receives the following response: ’Can not get  Cluster Information.’ Which of the following daemons may need to be started in order to correct this problem?()
    A

     topsvcs

    B

     clinfoES

    C

     snmpinfo

    D

     clsmuxpdES


    正确答案: C
    解析: 暂无解析

  • 第19题:

    单选题
    Which of the following practices can encourage students to read an article critically?
    A

    Evaluating its point of view.

    B

    Finding out the facts.

    C

    Finding detailed information.

    D

    Doing translation exercises.


    正确答案: A
    解析:

  • 第20题:

    单选题
    Company.com performs a cluster verification on a regular basis. Cluster verification is successfulbut the cluster sometimes fails to start the applications during a fallover. Investigation of the issue has revealed that the non-shared component of the application configuration information is not being kept up to date on the secondary nodes.  What can be used to help resolve this issue?()
    A

     A pre-event

    B

     Error notification

    C

     Application monitoring

    D

     Custom verification methods


    正确答案: D
    解析: 暂无解析

  • 第21题:

    单选题
    How can the administrator use file ’a’ containing ’-El sys0’ to view the attributes of a device()?
    A

    lsdev -fv a

    B

    lsattr -f a

    C

    lsattr`cat a`

    D

    lsdev -Cccat a


    正确答案: D
    解析: 暂无解析

  • 第22题:

    多选题
    Which two of these methods will allow a CUE administrator to view the output of the CUE message log file?()
    A

    syslog server

    B

    GUI interface

    C

    CLI

    D

    text editor

    E

    TFTP server


    正确答案: A,D
    解析: 暂无解析

  • 第23题:

    单选题
    Company.com has decided to use the FUBAR Application Server to host their web application. Unfortunately, the FUBAR Application Server uses the server machine’s file system for its JNDI namespace. Every JNDI lookup performed in the web application is translated into a file 1/0 operation, which results in very poor performance.  Which J2EE pattern can help with this performance issue?()
    A

     Transfer Object

    B

     Service Locator

    C

     Intercepting Filter

    D

     Model-View-Controller


    正确答案: B
    解析: 暂无解析

  • 第24题:

    单选题
    When an emulated error notification method is complete, an administrator can view the error log  By typing the errpt command to be sure the emulation took place.  To verify that the error log entry is the result of the emulated event,the log entry resource name is set to EMULATOR,or which of the following?()
    A

     A user defined Resource Name

    B

     A cluster defined Resource Name

    C

     An error daemon specific Resource Name

    D

     A Resource Name generated by Automatic Error Notification


    正确答案: B
    解析: 暂无解析