网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which of the following is a differentiating feature of file permissions as compared to share permissions?()
A
File permissions are less granular than share permissions.
B
Full control can only be set using file permissions.
C
File permissions are more granular than share permissions.
D
Full control can only be set using share permissions.
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which of the following is a differentiating feature of file permissions as compared to share permissions?()A File permissions are less granular than share permissions.B Full control can only be set using file permissions.C File permissions are more granular than share permissions.D Full control can only be set using share permissions.” 相关考题
考题
Session affinity is a feature of which of the following devices?()
A. DNS serverB. DHCP serverC. Load balancerD. IPS
考题
Which of the following is not a design feature of human language?A.Arbitrariness
B.Displacement
C.Duality
D.Diachronicity
考题
VLAN maps have been configured on switch R1. Which of the following actions are taken in a VLAN map that does not contain a match clause? ()A、 Implicit deny feature at end of list.B、 Implicit deny feature at start of list.C、 Implicit forward feature at end of listD、 Implicit forward feature at start of list.
考题
Which of the following dbx commands should be used to obtain a stack trace from a coredump file?()A、trace B、where C、status D、which
考题
An administrator is implementing a new data retention program for the company. Which of the following is the MOST important consideration as the new program is created? ()A、 Awareness of company policy requirementsB、 Differentiating between archiving and backup processesC、 Awareness of potential legal requirementsD、 Ensuring that the backups for the retention program cover key business areas
考题
Which of the following is a differentiating feature of file permissions as compared to share permissions?()A、File permissions are less granular than share permissions.B、Full control can only be set using file permissions.C、File permissions are more granular than share permissions.D、Full control can only be set using share permissions.
考题
Which of the following is a built-in feature of FAT?()A、 8.3 name conventionB、 Fault toleranceC、 EncryptionD、 Compression
考题
Which of the following attributes is set when a file is ready to be backed up?()A、aB、hC、rD、s
考题
Which of the following commands changes a file characteristic so that it cannot be seen with astandard directory query? ()A、attrib file.txt +hB、attrib file.txt +rC、ren file.txtD、attrib file.txt +s
考题
Which of the following has NO effect on controlling the access permissions needed to run the "date" command on the remote machine "Earth" using the following syntax?rsh Earth date()。A、The local file: /etc/.netrcB、The remote file: ~/ .rhostsC、The securetcpip commandD、The remote file: /etc/hosts.equiv
考题
An administrator suspects someone is modifying a sensitive file, and wants to log access information for this file. Which of the following AIX component accomplishes this?()A、auditB、syslogC、TCBD、sysck
考题
Which of the following AIX commands will create an NIS map file(s)?()A、pwdadmB、make allC、makedbmD、mkpasswd
考题
When configuring the messaging system, which of the following are valid parameters for the file transport? ()A、File NameB、Operating SystemC、LocationD、HostE、Mode
考题
You issued the following command: ALTER DATABASE ENABLE BLOCK CHANGE TRACKING; What will be the result of issuing this command?()A、 The block change tracking feature is enabled, and the information about the system change number is written in the change tracking file.B、 The block change tracking feature is enabled, and the information about the log sequence number is written in the change tracking file.C、 The block change tracking feature is enabled, and the information about the blocks that are changed since the last backup is written in the change tracking file.D、 The block change tracking feature is enabled, and the information about the locations of the datafiles and the online redo log files are written in the change tracking file.
考题
单选题Which of the following has NO effect on controlling the access permissions needed to run the "date" command on the remote machine "Earth" using the following syntax?rsh Earth date()。A
The local file: /etc/.netrcB
The remote file: ~/ .rhostsC
The securetcpip commandD
The remote file: /etc/hosts.equiv
考题
单选题To determine whether a particular file has a virus by only inspecting a few initial packets before receiving the entire file, which UTM feature do you enable?()A
URL white listsB
intelligent pre-screeningC
tricklingD
scan mode extensions
考题
单选题You issued the following command: ALTER DATABASE ENABLE BLOCK CHANGE TRACKING; What will be the result of issuing this command?()A
The block change tracking feature is enabled, and the information about the system change number is written in the change tracking file.B
The block change tracking feature is enabled, and the information about the log sequence number is written in the change tracking file.C
The block change tracking feature is enabled, and the information about the blocks that are changed since the last backup is written in the change tracking file.D
The block change tracking feature is enabled, and the information about the locations of the datafiles and the online redo log files are written in the change tracking file.
考题
单选题Which of the following is an exclusive feature of the LTO-5 drive?()A
NFS File SystemB
Micro PartitioningC
Encryption capableD
IBM Long Term File System
考题
单选题Which of the following is NOT a suprasegrnental feature?A
PitchB
StressC
ToneD
Intonation
考题
单选题Which of the following is the main feature of an OLTP application?()A
Summarized queriesB
Granular transactionsC
Voluminous historical dataD
Heterogeneous data sources
考题
单选题Which of the following is a differentiating feature of file permissions as compared to share permissions?()A
File permissions are less granular than share permissions.B
Full control can only be set using file permissions.C
File permissions are more granular than share permissions.D
Full control can only be set using share permissions.
考题
单选题Which of the following is not a design feature of human language?()A
ArbitrarinessB
DisplacementC
DualityD
Meaningfulness
考题
单选题Which of the following is not a design feature of human language?A
Arbitrariness.B
Displacement.C
Duality.D
Diachronicity.
热门标签
最新试卷