网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
An administrator learns that users are unable to login to a server via ssh. After making a telnet connection to the server, how can the administrator check the status of the sshd subsystem?()
A
lssys -a com
B
lssys -a sshd
C
lssrc -s sshd
D
lssrc -s tcpip
参考答案
参考解析
解析:
暂无解析
更多 “单选题An administrator learns that users are unable to login to a server via ssh. After making a telnet connection to the server, how can the administrator check the status of the sshd subsystem?()A lssys -a comB lssys -a sshdC lssrc -s sshdD lssrc -s tcpip” 相关考题
考题
You use—login-path to access a MySQL server on a Linux installation.Which statement is true about the – login-path option that is created by using mysql_config_editor?()
A.All system users have access to the MySQL server via—login path localB.login-path can be used only for MySQL servers running on a local machineC.login-path allows you to provide login credentials without passing clear text passwords on the command lineD.When using – login-path to connect to a remote MySQL server, the remote server version must be 5.6 or later
考题
Which two statements are true of login classes?()
A. Users can be members of multiple login classes.B. Login classes define authorization parameters for a user.C. There are five system-defined login classes.D. Login class permission flags can be overridden for certain commands.
考题
A user is unable to connect to the company‘s intranet server by FQDN, but can connect by IP address. Other users are not having a problem. An administrator verifies that the user can successfully ping the server by IP address and can properly resolve the FQDN using nslookup. The problem is persisting after running ipconfig /flushdns.Which of the following should the administrator do NEXT?()A. Examine the Imhost file.B. Flush the cache on the DNS server.C. Flush the cache on the WINS server.D. Examine the hosts file
考题
What must an administrator do to prevent new telnet users from connecting to the system?()
A.rmdev -l /dev/ptsB.touch /etc/nologinC.chdev -l sys0 -a nologinD.chuser -a login=false ALL
考题
下列哪组中的用户能够共享文件夹()。A、Administrators,ServerOperators和PowerUsersB、Users和ServerOperatorsC、Users和PowerUsersD、Users和Administrator
考题
A network administrator wants to detect a login attack against a router. What IOS command can make the attack recorded in syslog server?()A、Logging detect fail-loginB、Login on-failure logC、Login detect login-failure logD、Logging login on-failureE、none of the above
考题
Users report that they are unable to connect to a server. An administrator confirms that it is unreachable across the network. Other administrators have been working in the server room throughout the day. Which of the following is the NEXT step the administrator should take?()A、 Verify the configuration of the connected port on the network switch.B、 Reboot the server.C、 Install a new NIC on the server.D、 Verify that network cables are connected.
考题
A user is unable to determine the default system texteditor. How can the local administrator assist the user by identifying the default text editor for the system?()A、Login as the user and run 'echo $ENV'.B、Login as root and run the 'env' command.C、Login as root and 'cat /etc/environment'.D、Login as the user and run the 'env' command.
考题
A user is unable to determine the default system text editor. How can the local administrator assist the user by identifying the default text editor for the system?()A、Login as the user and run ’echo $ENV’.B、Login as root and run the ’env’ command.C、Login as root and ’cat /etc/environment’.D、Login as the user and run the ’env’ command.
考题
Which two statements are true of login classes?()A、Users can be members of multiple login classes.B、Login classes define authorization parameters for a user.C、There are five system-defined login classes.D、Login class permission flags can be overridden for certain commands.
考题
Several remote sales employees, who have come into the office this week, report that they are unable to get on the Internet, but no other users have reported similar issues. The help desk hasescalated the issue and the case notes state that the users have IP addresses that begin with 169. Which of the following should the system administrator check FIRST?()A、DHCP serverB、Network switchesC、DNS serverD、Core router
考题
An administrator receives a call from a user who is unable to receive email. After troubleshooting the administrator is able to resolve the issue and verify that user is able to access email again. Which of the following is the NEXT step that the administrator should take?()A、 Implement preventative measures.B、 Close the issue.C、 Document the outcome.D、 Question other users to make sure they are not having the same issue.
考题
An administrator creates a new directory then shares it on the Windows server. The administrator sets the permissions for everyone to "Modify" but users report they are unable to create or delete documents. Which of the following is the cause?()A、The administrator forgot to change the share permissionsB、The users were not part of the “Everyone” built in groupC、The administrator shared the files but not the folderD、“Modify” only allows users to change existing documents
考题
An administrator receives a call from a user who is unable to receive email. After troubleshooting the administrator is able to resolve the issue and verify that user is able to access email again. Which of the following is the NEXT step that the administrator should take?()A、Implement preventative measures.B、Close the issue.C、Document the outcome.D、Question other users to make sure they are not having the same issue
考题
Multiple users call from the same location saying that they have no network connectivity. The administrator is unable to ping the main switch at that IDF. Which of the following configuration management documents would the administrator MOST likely consult to troubleshoot the issue?()A、Baseline configurationB、Security policyC、Performance and transaction logsD、Physical network diagram
考题
A system administrator receives a new server and has booted the system for the first time. The administrator has set up the terminals and users. The user start to log on. Root is logged in on the console. When additional users start to log in, an error is displayed stating that All available login sessions are in use. Which of the following steps should be followed to resolve this problem?()A、Permissions on /etc/security were changed in error; do a chmod 755 on /etc/security directory.B、Increase the number of licenses; using smit chaili censeC、Change the Maximum number of PROCESSES allowed per user variable; using smit chgsys.D、Change User can logi field from false to true: using smit chuser.
考题
A system administrator has been asked to lock a specific login account. Which of the following commands is used to accomplish this?()A、pwdckB、usrckC、chuserD、rmuser
考题
What must an administrator do to prevent new telnet users from connecting to the system?()A、rmdev -l /dev/ptsB、touch /etc/nologinC、chdev -l sys0 -a nologinD、chuser -a login=false ALL
考题
Maria has been set up as an assistant to the administrator. Users of your network are complaining that Maria has been opening their files and editing them. She needs to perform backups and installations of programs, and setting up of printers. How do you fix the problem with the minimum amount of effort, yet allowing her to accomplish the assigned tasks? ()A、Remove her Administrator privilege and give her Power Users and Backup Operators.B、Leave her as Administrator and make deny on Users’ files.C、Remove her administrator privileges and assign her Server Operators.D、Remove her administrator privileges and assign her Power Users and Replicator. E、Tell her that she isn’t allowed to tamper with other users files.
考题
多选题In the admin GUI, you navigate to "System" "Status" "Active Users". You see several buttons, including "Delete Session", "Delete All Sessions". "Refresh Roles", and "Disable All Users".Which two statements are true?()ATo forcibly sign out a single user, you should select the check box next to that user's login name, then select Delete Session.BIf you select Delete All Sessions, all users are forcibly signed out and are unable to sign in again until Enable All Users is selected.CSelecting Disable All Users prevents users from signing in and starting a new session, but does not forcibly sign out any users that already have an existing session.DSelecting Refresh Roles re-evaluates authentication policies, role-mapping rules, and resource policies for all existing user sessions.
考题
单选题An administrator learns that users are unable to login to a server via ssh. After making a telnet connection to the server, how can the administrator check the status of the sshd subsystem?()A
lssys -a comB
lssys -a sshdC
lssrc -s sshdD
lssrc -s tcpip
考题
单选题Certkiller.com has a server with Active Directory Rights Management Services (AD RMS) server installed. Users have computers with Windows Vista installed on them with an Active Directory domain installed at Windows Server 2003 functional level. As an administrator at Certkiller.com, you discover that the users are unable to benefit from AD RMS to protect their documents. You need to configure AD RMS to enable users to use it and protect their documents. What should you do to achieve this functionality()A
Configure an email account in Active Directory Domain Services (AD DS) for each user.B
Add and configure ADRMSADMIN account in local administrators group on the user computersC
Add and configure the ADRMSSRVC account in AD RMS server’s local administrator groupD
Reinstall the Active Directory domain on user computersE
All of the above
考题
单选题An administrator creates a new directory then shares it on the Windows server. The administrator sets the permissions for everyone to "Modify" but users report they are unable to create or delete documents. Which of the following is the cause?()A
The administrator forgot to change the share permissionsB
The users were not part of the “Everyone” built in groupC
The administrator shared the files but not the folderD
“Modify” only allows users to change existing documents
考题
单选题An administrator receives a call from a user who is unable to receive email. After troubleshooting the administrator is able to resolve the issue and verify that user is able to access email again. Which of the following is the NEXT step that the administrator should take?()A
Implement preventative measures.B
Close the issue.C
Document the outcome.D
Question other users to make sure they are not having the same issue.
考题
单选题A network administrator wants to detect a login attack against a router. What IOS command can make the attack recorded in syslog server?()A
Logging detect fail-loginB
Login on-failure logC
Login detect login-failure logD
Logging login on-failureE
none of the above
考题
单选题A user is unable to connect to the company's intranet server by FQDN, but can connect by IP address. Other users are not having a problem. An administrator verifies that the user can successfully ping the server by IP address and can properly resolve the FQDN using nslookup. The problem is persisting after running ipconfig /flushdns. Which of the following should the administrator do NEXT?()A
Examine the Imhost file.B
Flush the cache on the DNS server.C
Flush the cache on the WINS server.D
Examine the hosts file
考题
单选题You have created a password file using the following command: ORAPWD file=d:/oracle/ora9i/orapwU01 password=change_on_install entries=3 Which of the following is true about this password file?()A
If the REMOTE_LOGIN_PASSWORDFILE parameter is set to SHARED in the initialization parameter file, then a maximum of three users can be granted the SYSDBA or SYSOPER privileges.B
If the REMOTE_LOGIN_PASSWORDFILE parameter is set to EXCLUSIVE in the initialization parameter file, then a maximum of three users can be granted the SYSDBA or SYSOPER privileges.C
If the REMOTE_LOGIN_PASSWORDFILE parameter is set to SHARED in the initialization parameter file, then the SYSDBA and SYSOPER privileges can be granted to other users as long as space in the password file isD
If the REMOTE_LOGIN_PASSWORDFILE parameter is set to EXCLUSIVE in the initialization parameter file, then the SYSDBAand SYSOPER privileges can be granted to other users as long as space in the password file is available.
考题
单选题Users report that they are unable to connect to a server. An administrator confirms that it is unreachable across the network. Other administrators have been working in the server room throughout the day. Which of the following is the NEXT step the administrator should take?()A
Verify the configuration of the connected port on the network switch.B
Reboot the server.C
Install a new NIC on the server.D
Verify that network cables are connected.
热门标签
最新试卷