It enables an attacker to perform an IP sweep of devices.
It enables a hacker to know which operating system the system is running.
It can overflow the session table to its limit, which can result in rejection of legitimate traffic.
It creates a ping of death and can cause the entire network to be infected with a virus.
第1题:
An administrator is troubleshooting a problem on an application server, but has not determined the cause of the problem and is not able to replicate the problem. Which of the following should the administrator do prior to escalating the issue?()
第2题:
What is the use of an "all configuration" backup in Cisco UCS?()
第3题:
An administrator is troubleshooting a problem on an application server, but has not determined the cause of the problem and is not able to replicate the problem. Which of the following should the administrator do prior to escalating the issue?()
第4题:
After installing the base operating system and the Server bundle, a system administrator decides to remove several printer definitions that the system users will not need. Which of the following procedures is the best way for a system administrator to remove the extra printer definitions?()
第5题:
Which two statements are true about the WebLogic Cluster ?()
第6题:
You create a large, n-tier Web application that has a custom event tracking system. You need to create a custom event type that enables your event tracking system to record all relevant event details for all types of events. The events must be stored in Microsoft SQL Server. From which base type should your custom event type inherit? ()
第7题:
Can be used to migrate from a 6120 to a 6140 and retain the same service profiles
Can only be used on the fabric interconnect on which it was created
Can be used to migrate from a 6120 to 6140 and retain system IP addresses and cluster information
Can be used to match firmware versions between 6120 and 6140 during a migration
第8题:
Move the page file to a free drive.
Delete the file.
Add more memory.
Remove the page file from system properties
第9题:
Select the SMIT option to remove software products
Reinstall the desired filesets using the Force Overwrite option
Delete the unnecessary entries from the /usr/lpp/printers directory
Use the ODM edit (odem) utility to revmoe the definition from the system's ODM database
第10题:
It enables an attacker to perform an IP sweep of devices.
It enables a hacker to know which operating system the system is running.
It can overflow the session table to its limit, which can result in rejection of legitimate traffic.
It creates a ping of death and can cause the entire network to be infected with a virus.
第11题:
IWebEventCustomEvaluator
WebEventProvider
WebBaseEvent
WebAuditEvent
第12题:
The file system superblock is dirty. It can be replaced from the VGDA
The logical volume superblock is dirty. It can be replaced from the VGDA
The file system superblock is dirty. It can be replaced from the secondary copy
The logical volume superblock is dirty. It can be replaced from the secondary copy
第13题:
A system administrator detects thousands of open idle connections from the same source.Which problem can arise from this type of attack?()
第14题:
Which of the following will help protect an operating system from vulnerability?()
第15题:
The ‘fsck -p /dev/lv00’ command returned the following message:Not a recognized filesystem type. What is the likely cause of the problem and how should it be resolved?()
第16题:
An attacker sends a low rate of TCP SYN segments to hosts, hoping that at least one port replies. Which type of an attack does this scenario describe?()
第17题:
You create a large, n-tier Web application that has a custom event tracking system. You need to create a custom event type that enables your event tracking system to record all relevant event details for all types of events. The events must be stored in Microsoft SQL Server. From which base type should your custom event type inherit? ()
第18题:
It is a hardware problem caused by the power failure.
There is a network problem, most probably with name resolution.
Sine the system was never rebooted, devices are marked defined instead of available and need to be activated.
Some filesets may be marked as broken and need to be reinstalled.
第19题:
The SAN is offline
Fiber channel switch
Multiple failed drives in the SAN
HBA
第20题:
Download free anti-virus programs from the Internet.
Perform updates from the manufacturers website regularly.
Using the operating systems email program only to open attachments.
Monitoring what is displayed on the screen.
第21题:
mount -no /data
chfs -A no /data
mount -t nfs /data
chfs -a type=nfs /data
第22题:
Gather information from users.
Reboot the server.
Apply the latest service packs to the operating system.
Perform a root cause analysis.
第23题:
IWeb Event Custom Evaluator
Web Event Provider
Web Base Event
Web Audit Event
第24题:
Gather information from users.
Reboot the server.
Apply the latest service packs to the operating system.
Perform a root cause analysis