网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
An administrator attempts to create a link of /etc/db_conf to the target directory /db/v9.7/install/config. The following n?command failed toAn administrator attempts to create a link of /etc/db_conf to the target directory /db/v9.7/install/config. The following ?n?command failed to create the link.ln/db/v9.7/install/config /etc/db_conf. Which option should be used when re-running the command to resolve the problem?()
A
-s flag to create a soft link
B
-n flag to force create a hard link
C
-N flag to force create a hard link
D
-S flag to force create a soft link
参考答案
参考解析
解析:
暂无解析
更多 “单选题An administrator attempts to create a link of /etc/db_conf to the target directory /db/v9.7/install/config. The following n?command failed toAn administrator attempts to create a link of /etc/db_conf to the target directory /db/v9.7/install/config. The following ?n?command failed to create the link.ln/db/v9.7/install/config /etc/db_conf. Which option should be used when re-running the command to resolve the problem?()A -s flag to create a soft linkB -n flag to force create a hard linkC -N flag to force create a hard linkD -S flag to force create a soft link” 相关考题
考题
Which UNIX command creates a symbolic link named myfile in the current directory to the file/etc/hosts?A.In -s/etc/hosts myfileB.In -s myfile/etc/hostsC.link -s/etc/hosts myfileD.link -s myfile/etc/hosts
考题
A non-root user can run rsh commands from serverA to serverB, but attempts to run rsh commands by the root user return with apermission error message.What action will resolve the problem?()
A.Add root user to the /etc/hosts.equiv on serverBB.Create $HOME/.rhosts file for the root user on serverBC.Restart the rshd daemon with root enabled option on serverBD.Add entry to allow root user from serverA to the /etc/hosts.allow on serverB
考题
An administrator attempts a traceroute but receives a "Destination Unreadable" messagE.Which protocol is responsible for that message?()
A.RARPB.RUDPC.ICMPD.SNMP
考题
You are designing a strategy to address the requirements of the advertising department. What should you do? ()A、 Create a GPO and link it to the Denver site.B、 Create a GPO and link it to the Advertising OU.C、 Create a GPO and link it to the graphicdesigninstitute.com domain.D、 Configure the Default Domain Policy to have the No Override option.E、 Use block inheritance to prevent the GPO from applying to members of the advertising department.
考题
以下Gr配置中属于MTP3 Management的为()。A、List Load ShareB、Create Link setC、Create Signaling pointD、Create GT Conversion rule
考题
An administrator attempts a traceroute but receives a "Destination Unreadable" message. Which protocol is responsible for that message?()A、RARPB、RUDPC、ICMPD、SNMP
考题
he system administrator is making system wide changes to a server, which will add to the PATH variable for the server environment. Where is the PATH variable found for the system?()A、/profileB、/etc/envpathC、/etc/profileD、/etc/environment
考题
A System p administrator is investigating a possible security breech and wants to review information about failed login attempts to the system. Which of the following commands will show this()A、fwtmp /etc/security/failedloginB、cat /etc/security/failedloginC、whoD、alog -f /etc/security/failedlogin -o
考题
What is the process for creating an NFS mount between two servers in the same network zone?()A、Export the desired filesystem in the /etc/nfs file, run ’exportfs -a’,create a mount directory on the desired server, and mount the NFS filesystem.B、Run ’exportfs -a’,export the desired filesystem in the /etc/nfs file,create a mount directory on the desired server, and mount the NFS filesystem.C、Export the desired filesystem in the /etc/exports file, run ’exportfs -a’,create a mount directory on the desired server,and mount the NFS filesystem.D、Run ’exportfs -u’,export the desired filesystem in the /etc/exports file, create a mount directory on the desired server,and mount the NFS filesystem.
考题
A non-root user can run rsh commands from serverA to serverB, but attempts to run rsh commands by the root user return with a permission error message. What action will resolve the problem?()A、Add root user to the /etc/hosts.equiv on serverB .B、Create $HOME/.rhosts file for the root user on serverB .C、Restart the rshd daemon with root enabled option on serverB .D、Add entry to allow root user from serverA to the /etc/hosts.allow on serverB .
考题
A System p administrator needs to set the default password length for all users to six characters. Which of the following files needs to be edited to accomplish this ()A、/etc/security/limitsB、/etc/security/mkuser.sysC、/etc/security/privD、/etc/security/user
考题
A system administrator wants to couple two servers together so that users from server A can access server B without entering their password. How would this be accomplished?()A、employ NIS to synchronize user names and passwordsB、create a /.rhosts on server A and serve BC、create a $HOME/.netrc for all users on server A and serve rBD、create a /etc/hosts.equiv on server A and server B
考题
An administrator attempts to create a link of /etc/db_conf to the target directory /db/v9.7/install/config. The following command failed toAn administrator attempts to create a link of /etc/db_conf to the target directory /db/v9.7/install/config. The following command failed to create the link: ln /db/v9.7/install/config /etc/db_conf Which option should be used when re-running the command to resolve the problem?() A、-s flag to create a soft linkB、-n flag to force create a hard linkC、-N flag to force create a hard linkD、-S flag to force create a soft link
考题
An administrator attempts to create a link of /etc/db_conf to the target directory /db/v9.7/install/config. The following n?command failed toAn administrator attempts to create a link of /etc/db_conf to the target directory /db/v9.7/install/config. The following ?n?command failed to create the link.ln/db/v9.7/install/config /etc/db_conf. Which option should be used when re-running the command to resolve the problem?()A、-s flag to create a soft linkB、-n flag to force create a hard linkC、-N flag to force create a hard linkD、-S flag to force create a soft link
考题
The system administrator is making system wide changes to a server, which will add to the PATH variable for the server environment. Where is the PATH variable found for the system?()A、/profileB、/etc/envpathC、/etc/profileD、/etc/environment
考题
You need to design an audit strategy for Southbridge Video. Your solution must meet business requirements.What should you do?()A、Create a new security template that enables the Audit account logon events policy for successful and failed attempts. Create a new GPO, and link it to the domain. Import the new security template into the new GPOB、Create a new security template that enables the Audit account logon events policy for successful and failed attempts. Create a new GPO, and link it to the Domain Controllers OU. Import the new security template into the new GPOC、Create a new security template that enables the Audit logon events policy for successful and failed attempts. Create a new GPO, and link it to the Domain Controllers OU. Import the new security template into the new GPOD、Create a new security template that enables the Audit logon events policy for successful and failed attempts. Create a new GPO, and link it to the domain. Import the new security template into the new GPO
考题
You are designing for implementing Group Policy objects (GPOs) to meet the business and technical requirement. What should you do?()A、Create one new GPO to enforce software restriction policies. Link this GPO to the domain.B、Create one new GPO to enforce software restriction policies. Link this GPO to the appropriate organizational unit (OU).C、Create one new GPO to enforce software restriction policies. Link this GPO to all organizational units (OUs).D、Create new GPOs to match the number of organizational units (OUs).configure these GPOs to enforce software restriction policies. Link this GPO to its respective OU.
考题
All consultants belong to a global group named TempWorkers. You place three file servers in a new organizational unit named SecureServers. The three file servers contain confidential data located in shared folders. You need to record any failed attempts made by the consultants to access the confidential data. Which two actions should you perform()A、Create and link a new GPO to the SecureServers organizational unit. Configure the Audit privilege use Failure audiB、Create and link a new GPO to the SecureServers organizational unit. Configure the Audit object access Failure audC、Create and link a new GPO to the SecureServers organizational unit. Configure the Deny access to this computer fD、On each shared folder on the three file servers, add the three servers to the Auditing tab. Configure the Failed Full control setting in the Auditing Entry dialog box.E、On each shared folder on the three file servers, add the TempWorkers global group to the Auditing tab. Configure th
考题
A system administrator has created tty2 on a serial port connection to a system. When attempting to verify the connection the following error is observed: # cu -ml tty2 cu: 0835-028 The connection failed. NO DEVICES AVAILABLE. Which of the following should be performed to correct this error?()A、Create an entry for tty2 in the /etc/uucp/Devices fileB、Re-enter the command as "cu -dml tty2"C、Create an entry for tty2 in the /etc/uucp/Systems fileD、Re-enter the command as "cu -s 9600 -dh -t -l tty2"
考题
What system startup file would an administrator edit for starting up miscellaneous third party applications?()A、/etc/rc.netB、/etc/rc.bootC、/etc/rc.localD、/etc/rc.tcpip
考题
You are the administrator of a SQL Server 2005 computer named SQL1. SQL1 is a member of a Microsoft Active Directory domain. You do not have any rights or privileges to perform domain administration. However, you have been granted membership in the local Administrators group on SQL1. You perform most of the management of SQL1 from your administrative workstation. However, for security reasons, you want to track all attempts for interactive logons and network connections to SQL1. What should you do?()A、Create a Group Policy object (GPO) that is configured for success and failure auditing of the Audit account logon events setting. Ask the domain administrator to link the GPO to the object containing SQL1.B、Configure the SQL Server service on SQL1 to audit all successful and failed logon attempts.C、Edit the local security policy of SQL1. Then, configure success and failure auditing on the Audit logon events setting.D、Run the SQL Server Profiler and use a standard default template.
考题
多选题To save time configuring some custom network facilities, a junior administrator in your company attempts to copy some entries from the /etc/inetd.conf file on a Solaris 8 OS server into the /etc/inetd.conf on a Solaris 10 OS server. The junior administrator is unable to determine why services do not start. Which two commands can you run on the Solaris 10 OS server to start the services?()Ainetconv -fBinetcfg -i /etc/inetd.confCinetcfg -o /etc/inetd.confDinetconv -f -i /etc/inetd.confEinetconv -forceimport -o /etc/inetd.conf
考题
单选题An administrator attempts to add a new 100GB logical volume to the datavg volume group, which resides on hdisk1. How can the administrator easily determine if there is enough space in datavg to create the logical volume()A
lslg datavgB
lspv datavgC
lsvg datavgD
lslv hdisk1
考题
单选题What command should a system administrator run after using an editor to create the /etc/tunables/nextboot file?()A
ksh -n nextbootB
tunsave -a -f nextbootC
tuncheck -r -f nextbootD
diff $(vmtune) /etc/tunables/nextboot
考题
单选题You need to design an audit strategy for Southbridge Video. Your solution must meet business requirements.What should you do?()A
Create a new security template that enables the Audit account logon events policy for successful and failed attempts. Create a new GPO, and link it to the domain. Import the new security template into the new GPOB
Create a new security template that enables the Audit account logon events policy for successful and failed attempts. Create a new GPO, and link it to the Domain Controllers OU. Import the new security template into the new GPOC
Create a new security template that enables the Audit logon events policy for successful and failed attempts. Create a new GPO, and link it to the Domain Controllers OU. Import the new security template into the new GPOD
Create a new security template that enables the Audit logon events policy for successful and failed attempts. Create a new GPO, and link it to the domain. Import the new security template into the new GPO
考题
单选题What system startup file would an administrator edit for starting up miscellaneous third party applications?()A
/etc/rc.netB
/etc/rc.bootC
/etc/rc.localD
/etc/rc.tcpip
考题
单选题You are designing a strategy to address the requirements of the advertising department. What should you do? ()A
Create a GPO and link it to the Denver site.B
Create a GPO and link it to the Advertising OU.C
Create a GPO and link it to the graphicdesigninstitute.com domain.D
Configure the Default Domain Policy to have the No Override option.E
Use block inheritance to prevent the GPO from applying to members of the advertising department.
热门标签
最新试卷