单选题 In AIX Version 5.3, a system administrator wants to create a bootlist for normal bootups from a file named /bootlist.norm. Which of the following is the proper command to accomplish this()
bootlist -m normal < /bootlist.norm
bootlist -m normal -f /bootlist.norm
bootlist -m normal -o /bootlist.norm
bootlist -m normal hdisk0 hdisk1 rmt0 fd /bootlist.norm
单选题 The /etc/qconfig file needs to be modified on a busy AIX print server with 30 printers attached. What action should be performed before modifying this file()
lpstat; Record the currently running jobs
enq -D
enq -X
enq -h -p
单选题 To load the base operating system on a machine using NIM, what are the minimum NIM resources that must be defined for the installation to succeed()
A mksysb resource, a SPOT resource, and an lpp_source resource
A SPOT resource, an lpp_source resource, and a machine definition
An lpp_source resource, a mksysb resource, and a machine definition
A SPOT resource, an lpp_source resource, a bosinst_data resource, and a machine definition
单选题 Which of the following commands restarts a TCP/IP subsystem that provides network services ()
refresh -s inetd
refresh -s tcpip
/etc/rc.tcpip efresh
refresh -g inetd
单选题 During which boot phase is the rootvg first activated()
Phase 1
Phase 2
Phase 3
POST Phase
单选题 Following a system boot, the display indicates that previously detected hardware is missing. Which of the following commands would identify the missing hardware()
diag
Iscfg
cfgmgr
Isslot
单选题 An administrator can create logical volumes and then add file systems to them, or create the file system directly. What is an dvantage of the two-step approach instead of the one-step approach()
The number of bytes per inode can be specified.
Placement of the filesystem on the disk can be specified.
The jfslog can be specified on creation of the filesystem.
Either a JFS or JFS2 filesystem can be created on the logical volume.
单选题 A System p administrator has created a customized security profile using AIX Security Expert. Which of the following commands will apply this to a system()
aixpert -f mysec.xml
aixpert -a mysec.xml
chsec -f mysec.xml
chsec -a mysec.xml
下列属于直线行驶的是()
某通信机房设置七氟丙烷预制灭火系统,该系统应有( )种启动方式。
唐后期书院产生的一个原因是受到()的影响。
压力损失是指()
干旱区造林,整地的主要目的是()
治癫证痰气郁结证,治以()
小学低、中年级的儿童____识记发展最为迅速。
( )是北京市制定的第一个全面保护历史文化名城的法规。
安全带的正确使用:使用前作外观检查,若破损应()使用。
Your network consists of a single Active Directory domain. The domain contains more than 300 group objects. The group objects are divided between several regional organizational units (OUs). You need to create a list of all groups that have names that begin with the word Sales. Which command should you use? ()