CMS专题

多选题Using the Tivoli Dynamic Workload Console, what are two ways to  change the priority of a job?()AOpen the Set Priority panel from the job properties.BChange the priority of the job stream that contains the job.CSelect the corresponding action from the 

题目
多选题
Using the Tivoli Dynamic Workload Console, what are two ways to  change the priority of a job?()
A

Open the Set Priority panel from the job properties.

B

Change the priority of the job stream that contains the job.

C

Select the corresponding action from the Monitor jobs task panel.

D

Open the job stream properties and drill down to the job priority  panel.

E

The priority of a job can only be changed from the Workload  Designer.

如果没有搜索结果,请直接 联系老师 获取答案。
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

What is the objective of the aaa authentication login console-in local command?()

  • A、It specifies the login authentication method list named console-in using the local user database on the router
  • B、It specifies the login authorization method list named console-in using the local RADIUS username-password data base
  • C、It specifies the login authentication list named console-in using the local username- password data base on the router
  • D、It specifies the login authorization method list named console-in using the local username- password data base on the router

正确答案:A

第2题:

What are two circumstances for which it may be advisable to use the  silent uninstallation method instead of an interactive method?()

  • A、 The Administrator is unable to successfully export DISPLAY to a  remote server.
  • B、 IBM Tivoli Workload Scheduler is installed on a server for which  there is no console access.
  • C、 DNS is not working properly and the server cannot be accessed  remotely to run the uninstallation script.
  • D、 TCP on the server on which IBM Tivoli Workload Scheduler is  installed is configured for half-duplex rather than full-duplex.
  • E、 The remote IBM Tivoli Workload Scheduler server is multi-homed, thus  the return connection to IBM Tivoli Workload Scheduler cannot be  established thereby requiring the use of the silent  uninstaller.

正确答案:A,B

第3题:

What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。

A.Allow unrestricted access to the console or VTY ports

B.Use a firewall to restrict access from the outside to the network devices

C.Always use Telnet to access the device command line because its data is automatically encrypted

D.Use SSH or another encrypted and authenticated transport to access device configurations

E.Prevent the loss of passwords by disabling password encryption


参考答案:B, D

第4题:

User "twsuser" is logged on to the IBM Tivoli Workload Scheduler  Master Domain Manager server using Job Scheduling Console to update  calendar. The user receives a message: MODIFY on   CALENDAR access not granted.  What is the cause of this error?()

  • A、 Batchman process is down.
  • B、 User password has expired.
  • C、 WebSphere security is damaged.
  • D、 There are insufficient permissions in Security file.

正确答案:D

第5题:

Using the Tivoli Dynamic Workload Console, what are two ways to  change the priority of a job?()

  • A、 Open the "Set Priority" panel from the job properties.
  • B、 Change the priority of the job stream that contains the job.
  • C、 Select the corresponding action from the Monitor jobs task panel.
  • D、 Open the job stream properties and drill down to the job priority  panel.
  • E、 The priority of a job can only be changed from the Workload  Designer.

正确答案:A,C

第6题:

What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.)()

  • A、Allow unrestricted access to the console or VTY ports.
  • B、Use a firewall to restrict access from the outside to the network devices.
  • C、Always use Telnet to access the device command line because its data is automatically encrypted.
  • D、Use SSH or another encrypted and authenticated transport to access device configurations.
  • E、Prevent the loss of passwords by disabling password encryption. 

正确答案:B,D

第7题:

Which two commands are used to migrate IBM Tivoli Workload Scheduler  to version 8.5 on a UNIX system?()

  • A、 launch.sh
  • B、 wdinstspb
  • C、 SETUP.bin
  • D、 twsinst -migrate
  • E、 SETUP.bin -silent

正确答案:C,E

第8题:

When using the Tivoli Dynamic Workload Console, which monitor tasks are available to the user?()

  • A、 all those that have been created by all users
  • B、 just those created by the user in the current session
  • C、 all those created by the user and shared with user’s login group
  • D、 just those where the connection engine specifies the user’s logon

正确答案:C

第9题:

What is the location for the application server scripts? ()

  • A、 wastools directory in IBM Tivoli Workload Scheduler bin directory
  • B、 wastools directory in IBM Tivoli Workload Automation home directory
  • C、 appserver directory in IBM Tivoli Workload Scheduler parent  directory
  • D、 appserver directory in IBM Tivoli Workload Automation home directory

正确答案:B

第10题:

When using IBM Tivoli Monitoring Universal Agents monitors, which  three IBM Tivoli Workload Scheduler processes can be monitored by  default? ()

  • A、 reptr
  • B、 writer
  • C、 netman
  • D、 monman
  • E、 batchman
  • F、 appservman

正确答案:C,D,E

更多相关问题