单选题The sysdumpdev command can be used to configure remote dump devices. Which of the following conditions is NOT used for a remote dump device configuration?()A The local and the remote host must have Transmission Control Protocol/Internet Protocol (TCP/I

题目
单选题
The sysdumpdev command can be used to configure remote dump devices. Which of the following conditions is NOT used for a remote dump device configuration?()
A

The local and the remote host must have Transmission Control Protocol/Internet Protocol (TCP/IP) installed and configured. 

B

The remote host must support NFS. 

C

The remote host must have an NFS exported directory defined such that the local host has read and write permissions to the dump file on the remote host. 

D

The remote host can be the same as the local host.


相似考题
更多“单选题The sysdumpdev command can be used to configure remote dump devices. Which of the following conditions is NOT used for a remote dump device configuration?()A The local and the remote host must have Transmission Control Protocol/Internet Protocol (TCP/I”相关问题
  • 第1题:

    Which of the following is TRUE about the ate program?()

    • A、When running ate for the first time it will prompt for all the required information and configure all the required devices
    • B、The program is used by cu to communicate to a remote system
    • C、The program is used for remote communications between the host and a remote system using a modem or null modem via a tty port
    • D、The program ate calls cu to communicate with the remote system

    正确答案:C

  • 第2题:

    Which statement correctly describes IPsec VPN backup technology?()

    • A、The cypto isakmp keepalive command is used to configure the Stateful Switchover (SSO)protocol
    • B、Reverse Route Injection (RRI) is configured on at the remote site to inject the central sitenetworks
    • C、Each Hot Standby Routing Protocol (HSRP) standby group has two well-known MACaddresses and a virtual IP address
    • D、The cypto isakmp keepalive command is used to configure stateless failover

    正确答案:D

  • 第3题:

    The sysdumpdev command can be used to configure remote dump devices. Which of the following conditions is NOT used for a remote dump device configuration?()

    • A、The local and the remote host must have Transmission Control Protocol/Internet Protocol (TCP/IP) installed and configured. 
    • B、The remote host must support NFS. 
    • C、The remote host must have an NFS exported directory defined such that the local host has read and write permissions to the dump file on the remote host. 
    • D、The remote host can be the same as the local host.

    正确答案:D

  • 第4题:

    Which of the following commands should be used to assure that a dump can be forced using the reset button on a system without a key switch?()

    • A、sysdumpdev -k 
    • B、sysdumpdev -L 
    • C、sysdumpdev -K 
    • D、sysdumpdev -P

    正确答案:C

  • 第5题:

    You executed the following command to back up your control file:  ALTER DATABASE BACKUP CONTROLFILE TO TRACE;  Which initialization parameter is used to specify the location of the trace file?()

    • A、USER_DUMP_DEST
    • B、CORE_DUMP_DEST
    • C、TRACE_DUMP_DEST
    • D、BACKUP_DUMP_DEST
    • E、BACKGROUND_DUMP_DEST

    正确答案:A

  • 第6题:

    Your company runs Remote Desktop Services. You have a Remote Desktop Session Host (RD Session Host) server. You need to select a digita l certificate for signing Remote Desktop Protocol (.rdp) files. Which two certificate types can you use to achieve this goal?()

    • A、Trusted third party SSL certificate
    • B、Authenticated Session
    • C、Wo rkstation Authentication
    • D、Remote Desktop Protocol (RDP) Signing

    正确答案:A,D

  • 第7题:

    单选题
    You executed the following command to back up your control file:  ALTER DATABASE BACKUP CONTROLFILE TO TRACE;  Which initialization parameter is used to specify the location of the trace file?()
    A

    USER_DUMP_DEST

    B

    CORE_DUMP_DEST

    C

    TRACE_DUMP_DEST

    D

    BACKUP_DUMP_DEST

    E

    BACKGROUND_DUMP_DEST


    正确答案: E
    解析: 暂无解析

  • 第8题:

    单选题
    Which statement is true regarding the remote route table of a local WX device?()
    A

    Remote routes are the compression subnets advertised by remote WX devices.

    B

    Remote routes include routes for remote hosts or subnets advertised by a WAN router.

    C

    Remote routes are the routes advertised by remote routers that are more than two hops away.

    D

    Remote routes are the compression subnets advertised by the local WX device to the remote WX devices.


    正确答案: D
    解析: 暂无解析

  • 第9题:

    单选题
    A system administrator needs to configure dump devices for the system. Which command would be used to estimate the size required for a dump device?()
    A

    lsdev

    B

    chdev

    C

    sysdumpdev

    D

    sysdumpstart


    正确答案: A
    解析: 暂无解析

  • 第10题:

    单选题
    You have just configured a static default route on router TK1. What is the purpose of a default route?()
    A

    It is a route to be used when the routing protocol fails.

    B

    It is a route configured by an ISP that sends traffic into a corporate network.

    C

    It is a route used when a packet is destined for a remote network that is not listed in the routing table.

    D

    It is a route manually configured for a specific remote network for which a routing protocol is not configured.

    E

    It is used to send traffic to a stub network.


    正确答案: A
    解析: 暂无解析

  • 第11题:

    单选题
    Which protocol should be used to establish a secure terminal connection to a remote network device?Select the best response.()
    A

    ARP

    B

    SSH

    C

    Telnet

    D

    WEP

    E

    SNMPv1

    F

    SNMPv2


    正确答案: E
    解析: 暂无解析

  • 第12题:

    单选题
    Which statement correctly describes IPsec VPN backup technology?()
    A

    The cypto isakmp keepalive command is used to configure the Stateful Switchover (SSO)protocol

    B

    Reverse Route Injection (RRI) is configured on at the remote site to inject the central sitenetworks

    C

    Each Hot Standby Routing Protocol (HSRP) standby group has two well-known MACaddresses and a virtual IP address

    D

    The cypto isakmp keepalive command is used to configure stateless failover


    正确答案: D
    解析: 暂无解析

  • 第13题:

    Which protocol should be used to establish a secure terminal connection to a remote network device?Select the best response.()

    • A、ARP
    • B、SSH
    • C、Telnet
    • D、WEP
    • E、SNMPv1
    • F、SNMPv2

    正确答案:B

  • 第14题:

    Which of the following tools can be used to securely connect to a remote system?()

    • A、RCMD
    • B、SSH
    • C、TELNET
    • D、HTTP

    正确答案:B

  • 第15题:

    Which of the following local files is used to run the date command on the remote machine "Earth" using the following rexec command without request for a password? rexec Earth date()。

    • A、~/ .rhosts
    • B、$HOME/.netrc
    • C、/etc/hosts.equiv
    • D、/etc/security/user

    正确答案:B

  • 第16题:

    A system administrator needs to configure dump devices for the system. Which command would be used to estimate the size required for a dump device?()

    • A、lsdev
    • B、chdev
    • C、sysdumpdev
    • D、sysdumpstart

    正确答案:C

  • 第17题:

    Your company runs Remote Desktop Services. You have a Remote Desktop Session Host (RD Session Host) server. You need to select a digital certificate for signing Remote Desktop Protocol (.rdp) files. Which two certificate types can you use to achieve this goal?()

    • A、Trusted third party SSL certificate
    • B、Authenticated Session
    • C、Workstation Authentication
    • D、Remote Desktop Protocol (RDP) Signing

    正确答案:A,D

  • 第18题:

    单选题
    Which of the following commands should be used to assure that a dump can be forced using the reset button on a system without a key switch? ()
    A

     sysdumpdev -k 

    B

     sysdumpdev -L 

    C

     sysdumpdev -K 

    D

     sysdumpdev -P


    正确答案: C
    解析: 暂无解析

  • 第19题:

    单选题
    The sysdumpdev command can be used to configure remote dump devices. Which of the following conditions is NOT used for a remote dump device configuration?()
    A

    The local and the remote host must have Transmission Control Protocol/Internet Protocol (TCP/IP) installed and configured. 

    B

    The remote host must support NFS. 

    C

    The remote host must have an NFS exported directory defined such that the local host has read and write permissions to the dump file on the remote host. 

    D

    The remote host can be the same as the local host.


    正确答案: C
    解析: 暂无解析

  • 第20题:

    单选题
    Which of the following is TRUE about the ate program?()
    A

    When running ate for the first time it will prompt for all the required information and configure all the required devices

    B

    The program is used by cu to communicate to a remote system

    C

    The program is used for remote communications between the host and a remote system using a modem or null modem via a tty port

    D

    The program ate calls cu to communicate with the remote system


    正确答案: A
    解析: 暂无解析

  • 第21题:

    多选题
    Your company runs Remote Desktop Services. You have a Remote Desktop Session Host (RD Session Host) server. You need to select a digital certificate for signing Remote Desktop Protocol (.rdp) files. Which two certificate types can you use to achieve this goal?()
    A

    Trusted third party SSL certificate

    B

    Authenticated Session

    C

    Workstation Authentication

    D

    Remote Desktop Protocol (RDP) Signing


    正确答案: D,B
    解析: 暂无解析

  • 第22题:

    单选题
    Which of the following local files is used to run the date command on the remote machine "Earth" using the following rexec command without request for a password? rexec Earth date()。
    A

    ~/ .rhosts

    B

    $HOME/.netrc

    C

    /etc/hosts.equiv

    D

    /etc/security/user


    正确答案: A
    解析: 暂无解析

  • 第23题:

    单选题
    Which of the following tools can be used to securely connect to a remote system?()
    A

    RCMD

    B

    SSH

    C

    TELNET

    D

    HTTP


    正确答案: D
    解析: 暂无解析

  • 第24题:

    多选题
    Your company runs Remote Desktop Services. You have a Remote Desktop Session Host (RD Session Host) server. You need to select a digita l certificate for signing Remote Desktop Protocol (.rdp) files. Which two certificate types can you use to achieve this goal?()
    A

    Trusted third party SSL certificate

    B

    Authenticated Session

    C

    Wo rkstation Authentication

    D

    Remote Desktop Protocol (RDP) Signing


    正确答案: C,D
    解析: 暂无解析