移动端

  • 题王微信公众号

    题王微信公众号

    微信搜“题王网”真题密题、最新资讯、考试攻略、轻松拿下考试

计算机考试

科目:

[切换]
题库
练习
考试
资讯

模式切换

0 0 0
我的错题 我的收藏 学习笔记

章节目录

单选题 When monitoring a system using /usr/bin/vmstat with an interval, the metrics under page pi and page po represent which of the following phrases?()

A

 The pages to and from paging space per second

B

 The page intervals and page operations per second

C

 The page interrupts and page operations per second

D

 The page segments transferred between pi and po devices per second

单选题 A client has been unable to fix corruption of system files and does not have a backup or an Automated System Recovery (ASR) disk. Which of the following is the BEST action to take next?()

A

Copy the missing file from another computer and reboot.

B

Execute a Windows repair from the Windows setup media.

C

Boot into the Recovery Console and execute FIXBOOT.

D

Reboot and press the F2 key when prompted.

多选题 A technician is attempting to get into the BIOS and they are being prompted for a password. Which of the following can clear the BIOS password?()

A

Pull the CMOS battery.

B

Pull the 20/24 pin connector from the main board.

C

Short the reset circuit near the RAM.

D

Use the appropriate jumper on main board.

E

Use the reset button on the front panel.

单选题 A customer has successfully upgraded their System x servers. Now the are very concerned about their applications. They have a historical collection of various applications that do not interact. Which of the following should the sales professional suggest?()

A

Rewrite applications using Linux to limit licensing fees

B

Port applications toanAIX or UNIX server to conserve energy and floor space

C

SAP or similar all encompassing applications

D

Webenable all applications

单选题 A System x administrator is considering new storage subsystems. Which is a benefit of SAS over Solid State of the following?()

A

Higher transfer speeds

B

Increased power consumption with Solid State

C

Increased bandwidth

D

Cost per MB

单选题 访问控制是为了限制访问主体对访问客体的访问权限,从而使计算机系统在合法范围内使用的安全措施,以下关于访问控制的叙述中,()是不正确的。

A

访问控制包括2个重要的过程:鉴别和授权

B

访问控制机制分为2种:强制访问控制(MAC.和自主访问控制(DAC.

C

RBAC基于角色的访问控制对比DAC的先进之处在于用户可以自主的将访问的权限授给其它用户

D

RBAC不是基于多级安全需求的,因为基于RBAC的系统中主要关心的是保护信息的完整性,即“谁可以对什么信息执行何种动作”

首页 上一页 1 2 3 4 5 下一页 尾页 /

到第