题目详情
当前位置:首页 > 职业培训考试
题目详情:
发布时间:2023-12-04 06:20:04

[单项选择]An application server is running slowly. After viewing performance monitoring data it is detected that the disk queue length is high. Which of the following could BEST resolve the situation?()
A. Add more disk drives.
B. Increase the amount of virtual memory.
C. Add a faster processor.
D. Add more memory to stop paging to disk.

更多"An application server is running sl"的相关试题:

[单项选择]An enterprise has a web application running both HTTP and HTTPS. How many Clusters must becreated?()
A. 1
B. 2
C. 3
D. 4
[单项选择]An administrator is running proprietary server software that requires services to be reconfigured every time the server is upgraded to the latest vendor version. Which of the following is the BEST solution to address this problem?()
A. The current system configuration should be documented for future use.
B. Server diagramming and environmental topologies should be documented.
C. A copy of the latest pre-installation plan should be developed and utilized.
D. Vendor support should be contacted so that they can correct the issue.
[多项选择]You want to shutdown a running Mysql Server cleanly. Which three commands that are valid on either Windows or Linux will achieve this?()
A. Shell> mysqladmin –u root –p shutdown
B. Shell> nmc mysql shutdown
C. Mysql> STOP PROCESS mysqld
D. Shell> /etc/init.d/mysql stop
E. Shell> service mysql safe_exit
F. Shell> pkill –u mysql mysqld_safe
G. Shell> net stop mysql
[单项选择] An application fails to start after a Technology Level upgrade. The application vendor recommends that two filesets upgraded as part of the new Technology Level be rejected. What is the recommended method for performing this task?()
A. Run instfix -u to reject the filesets.
B. Run installp -r to reject the filesets.
C. Run installp -u to uninstall the filesets.
D. Restore the system to previous state from the system backup.
[单项选择]The police______running after the thief.
[单项选择]When running a Windows server, which option is used with the ping command to convert numerical addresses to host names?()
A. -r
B. -a
C. -v
D. -n
[多项选择] A Mysql instance is running on a dedicated server. Developers access the server from the same network subnet. Users access the database through an application that is running on a separate server in a DMZ. Which two will optimize the security of this setup?()
A. Disabling connections from named pipes or socket files (depending on the operating system of the server)
B. Enabling and using SSL for connections to the Mysql database
C. Installing Mysql on the application server, and running the database and application on the same server
D. Starting the server with – bind- address=0.0.0.0 specified
E. Running the server with – skip-networking specified
F. Limiting logins to originate from the application server or the server's subnet'
[多项选择] Five minutes after issuing the show running-config command, a technician enters the command again and notices that several access list statements have been altered. Because of this, the technician believes that the router is being configured by an unknown person through Telnet. Before changing the router passwords, the technician would like to discover if anyone is connected to the router by Telnet and stop them from making further changes. Which commands will accomplish these options?()
A. show hosts
B. show sessions
C. show connections
D. disconnect
E. CTRL+SHIFT+6x
F. exit
[单项选择] A web server is running correctly but sending a RST packet to any client trying to connect using HTTP on TCP port 80. Which of the following tools should be used to determine the listening port of the web server?()
A. Route
B. Ifconfig
C. Netstat
D. Nslookup
[单项选择]After filling in the application form, I was requested to _____ a recent photograph to the form.
A. attach
B. obtain
C. attain
D. retain
[单项选择] An application server is running slowly. After viewing performance monitoring data it is detected that the disk queue length is high.  Which of the following could BEST resolve the situation?()
A.  Add more disk drives.
B.  Increase the amount of virtual memory.
C.  Add a faster processor.
D.  Add more memory to stop paging to disk.
[多项选择]The WebSphere Application Server provides a Dynamic Cache Monitor.  Which of the following can be monitored using this tool?()
A. Servlet Response Times
B. Cache Statistics
C. Database Connection Pool Statistics
D. Disk Statistics
[单项选择]WebSphere Application Server supports performance data collection using the Performance Monitoring Infrastructure (PMI).  Which tool supports PMI and would be best to analyze the WebSphere Commerce runtime EJB, JVM and thread pool stats?()
A. WebSphere Commerce Analyzer
B. Tivoli Performance Viewer.
C. Tivoli Web Site Analyzer.
D. DB2 Intelligent Miner for Data.
[单项选择]After a server has been installed into a rack, an administrator must ensure which of the following?()
A. Warm air flow is permitted through the front bezel
B. The system is labeled so that it can be identified
C. Verify the change control process can be implemented
D. Determine the correct power requirements
[单项选择]After performing a copy backup of a file server, the archive bit on the backed up files will be which of the following?()
A. Deleted
B. Unchanged
C. Set
D. Copied
[单项选择]After applying a new driver to a NIC, the server reboots and fails to restart. Which of the following is the BEST way to resolve the problem?()
A. Boot using recovery console and restore the previous driver.
B. Boot the server, press F8 and access last known good configuration.
C. Restore the server using last backup tape.
D. Boot the server with ASR option.
[单项选择]After running the CONFIGURE RETENTION POLICY TO RECOVERY WINDOW OF 7 DAYS command, what has been accomplished?()
A. Retain the data file backup for 7 days.
B. Run the recover process every 7 days.
C. Destroy the physical backup files every 7 days.
D. Destroy the physical backup files older than 7 days.
E. Retain one backup of each data file for at least 7 days.
F. Keep the catalog information in the control file for 7 days.
[单项选择] A client/server application has been configured to use local naming. The client and server run on separate machines. When the client tries to connect, it receives a TNS error. By carefully examining the environment, a tnsnames.ora is found only on the Oracle server machine, among other things. After copying this tnsnames.ora onto the client machine, the client is able to connect to the server.  Which statement is true?()
A. tnsnames.ora must be on the client machine for local naming. 
B. tnsnames.ora must be removed from the server for the connection to work. 
C. tnsnames.ora must be on both the client and server machines for local naming. 
D. tnsnames.ora is not required for local naming; the problem was not fixed by copying the file to the client.
[单项选择]After running the vmstat command, which of the following would most likely cause the value in the blocked column to be unusually high?()
A.  Kernel thread
B.  Too many users
C.  Memory shortage
D.  Network contention

我来回答:

购买搜题卡查看答案
[会员特权] 开通VIP, 查看 全部题目答案
[会员特权] 享免全部广告特权
推荐91天
¥36.8
¥80元
31天
¥20.8
¥40元
365天
¥88.8
¥188元
请选择支付方式
  • 微信支付
  • 支付宝支付
点击支付即表示同意并接受了《购买须知》
立即支付 系统将自动为您注册账号
请使用微信扫码支付

订单号:

请不要关闭本页面,支付完成后请点击【支付完成】按钮
恭喜您,购买搜题卡成功
重要提示:请拍照或截图保存账号密码!
我要搜题网官网:https://www.woyaosouti.com
我已记住账号密码