JN0-311

多选题Which three actions must you perform as part of the WXOS software upgrade process?()(Choose three.)AReboot the device.BReapply the license key.CSave the current configuration.DLoad the image using FTP, TFTP, or from the local disk.EBack up the configra

题目
多选题
Which three actions must you perform as part of the WXOS software upgrade process?()(Choose three.)
A

Reboot the device.

B

Reapply the license key.

C

Save the current configuration.

D

Load the image using FTP, TFTP, or from the local disk.

E

Back up the configration using FTP, TFTP, or to the local disk

参考答案和解析
正确答案: A,D
解析: 暂无解析
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which three actions are allowed in event details? ()(Choose three.)

A.Send

B.Raise

C.Delete

D.Receive

E.Acknowledge


参考答案:A, B, D

第2题:

You are the administrator of a SQL Server 2000 computer. The server contains your company's order processing database. Two-hundred operators take orders by telephone 24 hours a day. Threehundred data entry personnel enter data from orders received by mail.

To ensure that order data will not be lost, your company's disaster recovery policy requires that backups be written to tape. Copies of these tapes must be stored at an off-site company location. Orders must be entered into the database before they can be filled. If the server fails, you must be able to recover the order data as quickly as possible.

You need to create a backup strategy that meets the company requirements and minimizes server workload. Which two actions should you take? (Each correct answer represents part of the solution. Choose two.)

A.Perform. a combination of full database and filegroup backups.

B.Perform. a combination of full database and file backups.

C.Perform. a combination of full database, differential, and transaction log backups.

D.Back up the data to a local tape drive.

E.Back up the data to a network share, and then use enterprise backup software to write the disk backups to tape.


正确答案:CE
解析:Explanation:
C: Most OLTP backup schemes include a full database, differential, and transaction log backups

E: In order to recover the data as quickly as possibly we backup the data to network share, and then backup that share to tape. This minimizes the impact of the backup process on the SQL Server computer.

Note 1: SQL Server 2000 provides three database recovery models. These are the Simple recovery model, the Full Recovery Model and the Bulk-Logged Recovery model. Simple Recovery requires the least administration. In the Simple Recovery model, data is recoverable only to the last full database or differential backup. Transaction log backups are not used, and consequently, minimal transaction log space is required.

This Recovery Model is not an appropriate choice for production systems where loss of recent changes is unacceptable. Full Recovery and Bulk-Logged Recovery models provide the greatest protection for data. These models rely on the transaction log to provide full recoverability and to prevent work loss in the broadest range of failure scenarios.

The Full Recovery model provides the most flexibility for recovering databases to an earlier point in time. The Bulk-Logged model provides higher performance and lower log space consumption for certain large-scale operations. It does this at the expense of some flexibility of pointin- time recovery. In this scenario we would want to implement the Full Recovery model as this Recovery model provides complete protection against media failure and provides the ability to recover the database to the point of failure or to a specific point in time.

To guarantee this degree of recoverability, all operations are fully logged. The backup strategy for full recovery consists of database backups, differential backups, which are optional, and transaction log backups. The differential backups are optional but have less of an effect on the system while they run, as they are smaller than full database backups.

This is because a differential backup creates a copy of all the pages in a database modified after the last database backup. A transaction log backup makes a copy only of the log file and backs up the changes made to the database after the last full or differential database backup. A log file backup cannot be used by itself to restore a database. A log file is used after a database restore to recover the database to the point of the original failure. The full database, differential, and transaction log backups can be written to a hard disk or other disk storage media such as a tape drive.

Disk backup devices can be defined on a local disk of a server or on a remote disk on a shared network resource. Tape backup devices are used in the same way as disk devices, with the exception that the tape device must be connected physically to the computer running an instance of SQL Server. SQL Server 2000 thus does not support backing up to remote tape devices.

Note 2, file backup, filegroup backup: SQL Server 2000 supports backing up or restoring individual files or filegroups within a database. This is a complex backup and the restore process that is usually reserved for large databases with high availability requirements. If the time available for backups is not long enough to support backing up the full database, subsets of the database can be backed up at different times. If a disk holding database files or filegroups fails, the site can restore just the lost files or filegroups. This allows for a quicker recovery because only the damaged files or filegroups are restored in the first step, not the entire database.

Incorrect Answers:
A: An OLTP server requires transaction log backups in order to be able to recover up to the point of failure.

B: An OLTP server requires transaction log backups in order to be able to recover up to the point of failure.

D: Backing up to a local tape device would minimize cost but it would compared to a backup to a network it would decrease performance of the server more, and it would take more time to recover.

第3题:

4 words marked A), B), C) and D ) in each group. Choose the one which underlined part has a different pronunciation from the other three.

A.exerciseB.excuse

C.explain

D.tremely


参考答案:A

第4题:

You are the network administrator for Company. You have been assigned the task to create and deploy a standard Windows 2000 Professional image to all 2,500 client computers that today are installed with Windows 98. You log on to a client computer called Company by using a local administrative account called SetupUser and install three Windows 2000 professional compatible software packages on Company. You create an image using third party software. You deploy the image to a test client computer and join the client computer to a domain. You want to create shortcuts on all users' desktops for the software packages you installed. You also want users to have the option to delete the icons.  Which profile must you edit?()

  • A、The SetupUser profile
  • B、The Default User profile
  • C、The Administrator profile
  • D、The System profile
  • E、The All Users profile

正确答案:B

第5题:

Which three configuration steps must be completed for a Cisco router in order to enable local AAA login authentication?() (Choose three.)

  • A、Apply the method list to an interface
  • B、Specify the default method list and apply it to the interface
  • C、Enable AAA
  • D、Define a method list

正确答案:A,C,D

第6题:

Which three methods can you use for route discovery on a WX platform? ()(Choose three.)

A. Enable RIP

B. Enable OSPF

C. Periodically poll any router

D. Import routes from a TFTP server


参考答案:A, B, D

第7题:

You are upgrading your Cisco router IOS from a TFTP server over the network. The upgrade procedure is stopped and you are prompted to erase the current flash contents before continuing. What is most plausible reason for this? ()

A. There is insufficient room for more than one image.

B. The router has detected a copy of the current software image on the TFTP server.

C. The file can be relocated and not compressed.

D. The image to load is a binary executable file.


参考答案:A

第8题:

Which three tasks can be performed using a duplicate database? ()(Choose three.)

A. Testing the backup and recovery procedures

B. Testing the upgrade of an Oracle database to a new release

C. Testing the effect of an application changes on database performance

D. Continuously updating archive log files from the target database to support failover


参考答案:A, B, C

第9题:

You are upgrading your Cisco router IOS from a TFTP server over the network. The upgrade procedure is stopped and you are prompted to erase the current flash contents before continuing. What is most plausible reason for this? ()

  • A、There is insufficient room for more than one image.
  • B、The router has detected a copy of the current software image on the TFTP server.
  • C、The file can be relocated and not compressed.
  • D、The image to load is a binary executable file.

正确答案:A

第10题:

Which three methods can you use for route discovery on a WX platform? ()(Choose three.)

  • A、Enable RIP
  • B、Enable OSPF
  • C、Periodically poll any router
  • D、Import routes from a TFTP server

正确答案:A,B,D

更多相关问题