网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
A banking user with the userid of ’joe’ is unable to rsh from SYSTEMA to SYSTEMB without having to retype their password, but they can rsh from SYSTEMB to SYSTEMA. No other users are experiencing the same issue. Both systems have a /home/joe/.rhosts file that contain the proper references to the other host. The /home/joe/.rhosts files on both SYSTEMA and SYSTEMB are owned by userid ’joe’. Which of the following is the most likely cause of this problem()
- A、User ’joe’ is specified in the /etc/nologin on SYSTEMb.
- B、User ’joe’ is specified in the /etc/nologin on SYSTEMa.
- C、The file permissions on the /home/joe/.rhosts file on SYSTEMA are incorrect.
- D、The file permissions on the /home/joe/.rhosts file on SYSTEMB are incorrect.
参考答案
更多 “ A banking user with the userid of ’joe’ is unable to rsh from SYSTEMA to SYSTEMB without having to retype their password, but they can rsh from SYSTEMB to SYSTEMA. No other users are experiencing the same issue. Both systems have a /home/joe/.rhosts file that contain the proper references to the other host. The /home/joe/.rhosts files on both SYSTEMA and SYSTEMB are owned by userid ’joe’. Which of the following is the most likely cause of this problem()A、User ’joe’ is specified in the /etc/nologin on SYSTEMb.B、User ’joe’ is specified in the /etc/nologin on SYSTEMa.C、The file permissions on the /home/joe/.rhosts file on SYSTEMA are incorrect.D、The file permissions on the /home/joe/.rhosts file on SYSTEMB are incorrect.” 相关考题
考题
An administrator receives a call from a user who is unable to receive email. After troubleshooting the administrator is able to resolve the issue and verify that user is able to access email again.Which of the following is the NEXT step that the administrator should take?()A. Implement preventative measures.B. Close the issue.C. Document the outcome.D. Question other users to make sure they are not having the same issue
考题
Abankinguserwiththeuseridof’joe’isunabletorshfromSYSTEMAtoSYSTEMBwithouthavingtoretypetheirpassword,buttheycanrshfromSYSTEMBtoSYSTEMA.Nootherusersareexperiencingthesameissue.Bothsystemshavea/home/joe/.rhostsfilethatcontaintheproperreferencestotheotherhost.The/home/joe/.rhostsfilesonbothSYSTEMAandSYSTEMBareownedbyuserid’joe’.Whichofthefollowingisthemostlikelycauseofthisproblem()A.User’joe’isspecifiedinthe/etc/nologinonSYSTEMb.B.User’joe’isspecifiedinthe/etc/nologinonSYSTEMa.C.Thefilepermissionsonthe/home/joe/.rhostsfileonSYSTEMAareincorrect.D.Thefilepermissionsonthe/home/joe/.rhostsfileonSYSTEMBareincorrect.
考题
Auserwiththeuseridof’joe’isunabletorshfromSYSTEMAtoSYSTEMBwithouthavingtoretypetheirpassword,buttheycanrshfromSYSTEMBtoSYSTEMA.Nootherusersareexperiencingthesameissue.Bothsystemshavea/home/joe/.rhostsfilethatcontaintheproperreferencestotheotherhost.The/home/joe/.rhostsfilesonbothSYSTEMAandSYSTEMBareownedbyuserid’joe’.Whichofthefollowingisthemostlikelycauseofthisproblem?()A.User’joe’isspecifiedinthe/etc/nologinonSYSTEMAB.User’joe’isspecifiedinthe/etc/nologinonSYSTEMBC.Thefilepermissionsonthe/home/joe/.rhostsfileonSYSTEMAiscorrect.D.Thefilepermissionsonthe/home/joe/.rhostsfileonSYSTEMBisincorrect.
考题
A non-root user can run rsh commands from serverA to serverB, but attempts to run rsh commands by the root user return with apermission error message.What action will resolve the problem?()
A.Add root user to the /etc/hosts.equiv on serverBB.Create $HOME/.rhosts file for the root user on serverBC.Restart the rshd daemon with root enabled option on serverBD.Add entry to allow root user from serverA to the /etc/hosts.allow on serverB
考题
You are designing a strategy for migrating the UNIX user accounts to Active Directory. Which three actions should you perform?()A、Import the user accounts as inetOrgPerson objects. B、Import the user accounts into Active Directory by using the Ldifde command-line tool. C、Export all user accounts from the UNIX servers to a text file. D、Export all user accounts and their passwords from the UNIX servers to a text file. Encrypt this file to achieve extra security. E、Assign random passwords to each user object, and securely distribute the password to the users. F、Create the same strong password for each user object, and require users to change their passwords at first logon.
考题
A user is unable to connect to the company's intranet server by FQDN, but can connect by IP address. Other users are not having a problem. An administrator verifies that the user can successfully ping the server by IP address and can properly resolve the FQDN using nslookup. The problem is persisting after running ipconfig /flushdns. Which of the following should the administrator do NEXT?()A、Examine the Imhost file.B、Flush the cache on the DNS server.C、Flush the cache on the WINS server.D、Examine the hosts file
考题
What should an administrator do to allow the logon of a user to a local system without limitations from the host‘webserver’?()A、configure the /etc/.rhosts with:webserverB、configure the root’$HOME/.rhost file with:+webserverC、configure each user’s $HOME/.rhosts file with:webserverD、configure the root’$HOME/.rhost file with:webserver
考题
The following entry is in the /etc/host.equiv and /home/jsmith/.rhosts file on server Alpha:+ jsmith.What does this entry indicate?()A、The user "jsmith" can use r-commands from any server to server Alpha system-wideB、The user "jsmith" can use r-commands from server Alpha to any server system-wideC、The user "jsmith" can use r-commands from server Alpha to any server with a /home/jsmith directoryD、The user "jsmith" can use r-commands from any server to server Alpha only in the /home/jsmith directory
考题
A customer has 4 POWER6 servers managed by a Hardware Management Console (HMC). They plan to install a second HMC for redundancy. Which of the following statements correctlydescribes the dual HMC environment? ()A、 To provide the Service Agent function, both HMCs must have Service Agent enabled and a dedicated modem and phone line.B、 Authorized users must have the same username and password on both HMCs, so that every user of one HMC is automatically authorized on the other.C、 Both HMCs are automatically notified of any changes that occur in the managed systems, so results of changes made to the managed system by one HMC are visible on theD、 Both HMCs must be running the same software revision. Software maintenance must be performed on both HMCs at the same time, but one HMC should be disconnected from
考题
A user selects their proper domain and is unable to log into their Windows computer. The errorstates: System cannot log you on to the domain because the systems computer account in its primary domain is missing or the password on that account is incorrect. Which of the following is the MOST likely cause for this error?()A、 The computers account was removed from Active Directory.B、 The users account was removed from Active Directory.C、 The computer was disjoined from the domain.D、 The user typed in the wrong password.
考题
An administrator receives a call from a user who is unable to receive email. After troubleshooting the administrator is able to resolve the issue and verify that user is able to access email again. Which of the following is the NEXT step that the administrator should take?()A、 Implement preventative measures.B、 Close the issue.C、 Document the outcome.D、 Question other users to make sure they are not having the same issue.
考题
An administrator receives a call from a user who is unable to receive email. After troubleshooting the administrator is able to resolve the issue and verify that user is able to access email again. Which of the following is the NEXT step that the administrator should take?()A、Implement preventative measures.B、Close the issue.C、Document the outcome.D、Question other users to make sure they are not having the same issue
考题
A user with the userid of ’joe’ is unable to rsh from SYSTEMA to SYSTEMB without having to retype their password, but they can rsh from SYSTEMB to SYSTEMA. No other users are experiencing the same issue.Both systems have a /home/joe/.rhosts file that contain the proper references to the other host. The /home/joe/.rhosts files on both SYSTEMA and SYSTEMB are owned by userid ’joe’. Which of the following is the most likely cause of this problem?()A、User ’joe’ is specified in the /etc/nologin on SYSTEMAB、User ’joe’ is specified in the /etc/nologin on SYSTEMBC、The file permissions on the /home/joe/.rhosts file on SYSTEMA is correct.D、The file permissions on the /home/joe/.rhosts file on SYSTEMB is incorrect.
考题
non-root user can run rsh commands from serverA to serverB, but attempts to run rsh commands by the root user return with a permission error message. What action will resolve the problem? ()A、Add root user to the /etc/hosts.equiv on serverbB、Create $HOME/.rhosts file for the root user on serverbC、Restart the rshd daemon with root enabled option on serverbD、Add entry to allow root user from serverA to the /etc/hosts.allow on serverb
考题
What should an administrator do to allow the logon of a user to a local system without limitations from the host ‘webserver’?()A、configure the /etc/.rhosts with. webserver userB、configure the root'$HOME/.rhost file with.+webserver userC、configure each user's $HOME/.rhosts file with. webserver userD、configure the root'$HOME/.rhost file with.webserver ip user
考题
What should an administrator do to allow the logon of a user to a local system without limitations from the host ’webserver’?() A、configure the /etc/.rhosts withweb:serverB、configure the root’$HOME/.rhost file with:+webserver C、configure each user’s $HOME/.rhosts file with:webserver D、configure the root’$HOME/.rhost file with:
考题
A system administrator wants to couple two servers together so that users from server A can access server B without entering their password. How would this be accomplished?()A、employ NIS to synchronize user names and passwordsB、create a /.rhosts on server A and serve BC、create a $HOME/.netrc for all users on server A and serve rBD、create a /etc/hosts.equiv on server A and server B
考题
You have created a password file using the following command: ORAPWD file=d:/oracle/ora9i/orapwU01 password=change_on_install entries=3 Which of the following is true about this password file?()A、 If the REMOTE_LOGIN_PASSWORDFILE parameter is set to SHARED in the initialization parameter file, then a maximum of three users can be granted the SYSDBA or SYSOPER privileges.B、 If the REMOTE_LOGIN_PASSWORDFILE parameter is set to EXCLUSIVE in the initialization parameter file, then a maximum of three users can be granted the SYSDBA or SYSOPER privileges.C、 If the REMOTE_LOGIN_PASSWORDFILE parameter is set to SHARED in the initialization parameter file, then the SYSDBA and SYSOPER privileges can be granted to other users as long as space in the password file isD、 If the REMOTE_LOGIN_PASSWORDFILE parameter is set to EXCLUSIVE in the initialization parameter file, then the SYSDBAand SYSOPER privileges can be granted to other users as long as space in the password file is available.
考题
You are designing a strategy for migrating the UNIX user accounts to Active Directory. Which three actions should you perform?()A、 Import the user accounts as inetOrgPerson objects.B、 Import the user accounts into Active Directory by using the Ldifde command-line tool.C、 Export all user accounts from the UNIX servers to a text file.D、 Export all user accounts and their passwords from the UNIX servers to a text file. Encrypt this file to achieve extra security.E、 Assign random passwords to each user object, and securely distribute the password to the users.F、 Create the same strong password for each user object, and require users to change their passwords at first logon.G、 Instruct users to use the same name and password as they used on the UNIX servers.
考题
You have an Exchange Server 2010 organization.You need to ensure that a user can open a resource mailbox.What are two possible ways to achieve this goal?()A、From Microsoft Office Outlook, modify the properties of the resource mailbox.B、From the Exchange Management Console, create a new sharing policy.C、From the Exchange Management Shell, set the Resource Delegates parameter for the resource mailbox.D、From the Active Directory Users and Computers console, reset the password for the account associated to the resource mailbox, and then provide the password to the user.
考题
单选题The following entry is in the /etc/host.equiv and /home/jsmith/.rhosts file on server Alpha:+ jsmith.What does this entry indicate?()A
The user jsmith can use r-commands from any server to server Alpha system-wideB
The user jsmith can use r-commands from server Alpha to any server system-wideC
The user jsmith can use r-commands from server Alpha to any server with a /home/jsmith directoryD
The user jsmith can use r-commands from any server to server Alpha only in the /home/jsmith directory
考题
单选题A customer has 4 POWER6 servers managed by a Hardware Management Console (HMC). They plan to install a second HMC for redundancy. Which of the following statements correctlydescribes the dual HMC environment? ()A
To provide the Service Agent function, both HMCs must have Service Agent enabled and a dedicated modem and phone line.B
Authorized users must have the same username and password on both HMCs, so that every user of one HMC is automatically authorized on the other.C
Both HMCs are automatically notified of any changes that occur in the managed systems, so results of changes made to the managed system by one HMC are visible on theD
Both HMCs must be running the same software revision. Software maintenance must be performed on both HMCs at the same time, but one HMC should be disconnected from
考题
单选题An administrator receives a call from a user who is unable to receive email. After troubleshooting the administrator is able to resolve the issue and verify that user is able to access email again. Which of the following is the NEXT step that the administrator should take?()A
Implement preventative measures.B
Close the issue.C
Document the outcome.D
Question other users to make sure they are not having the same issue.
考题
多选题Youe just configured the network interface on You?e just configured the network interface on systemA and the following information is displayed pertaining to systemA’s network interface: You have been instructed to change the name of this system to systemB. Which four files need to be modified to change the name of this system from systemA to systemB? ()A/etc/nodenameB/etc/hostname.rtls0C/etc/hostnameD/etc/inet/hostsE/etc/domainnameF/etc/inet/ipnodesG/etc/inetd.conf
考题
单选题You have just configured the network interface on systemA . The following information is From systemB, you test the network connectivity by sending ICMP ECHO_REQUEST packets to systemA. The following message is displayed: no answer from systemA What is most likely the problem?()A
The interface is not plumbed.B
The interface is not configured.C
The interface does not have valid routes configured.D
The interface is not marked as
考题
单选题A banking user with the userid of ’joe’ is unable to rsh from SYSTEMA to SYSTEMB without having to retype their password, but they can rsh from SYSTEMB to SYSTEMA. No other users are experiencing the same issue. Both systems have a /home/joe/.rhosts file that contain the proper references to the other host. The /home/joe/.rhosts files on both SYSTEMA and SYSTEMB are owned by userid ’joe’. Which of the following is the most likely cause of this problem()A
User ’joe’ is specified in the /etc/nologin on SYSTEMb.B
User ’joe’ is specified in the /etc/nologin on SYSTEMa.C
The file permissions on the /home/joe/.rhosts file on SYSTEMA are incorrect.D
The file permissions on the /home/joe/.rhosts file on SYSTEMB are incorrect.
考题
单选题A user with the userid of ’joe’ is unable to rsh from SYSTEMA to SYSTEMB without having to retype their password, but they can rsh from SYSTEMB to SYSTEMA. No other users are experiencing the same issue.Both systems have a /home/joe/.rhosts file that contain the proper references to the other host. The /home/joe/.rhosts files on both SYSTEMA and SYSTEMB are owned by userid ’joe’. Which of the following is the most likely cause of this problem?()A
User ’joe’ is specified in the /etc/nologin on SYSTEMAB
User ’joe’ is specified in the /etc/nologin on SYSTEMBC
The file permissions on the /home/joe/.rhosts file on SYSTEMA is correct.D
The file permissions on the /home/joe/.rhosts file on SYSTEMB is incorrect.
热门标签
最新试卷