网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

What should an administrator do to allow the logon of a user to a local system without limitations from the host ’webserver’?()  

  • A、configure the /etc/.rhosts withweb:server
  • B、configure the root’$HOME/.rhost file with:+webserver 
  • C、configure each user’s $HOME/.rhosts file with:webserver 
  • D、configure the root’$HOME/.rhost file with: 

参考答案

更多 “What should an administrator do to allow the logon of a user to a local system without limitations from the host ’webserver’?()  A、configure the /etc/.rhosts withweb:serverB、configure the root’$HOME/.rhost file with:+webserver C、configure each user’s $HOME/.rhosts file with:webserver D、configure the root’$HOME/.rhost file with:  ” 相关考题
考题 An administrator created a .env file in a user‘s home directory to configure a number of custom environment variables for a local application. However, after the user logs out and then logs back into the system, the custom variables are not being set.What is the most likely reason that the custom .env file is being ignored?()A.A shell other than ksh is being used by the user.B.The line ‘export ENV=$HOME/.env‘ is missing from /etc/profile.C.The line ‘export ENV=$HOME/.env‘ is missing from the user‘s .profile.D.The env_profile attribute is not defined for the user within /etc/security/user.

考题 A non-root user can run rsh commands from serverA to serverB, but attempts to run rsh commands by the root user return with apermission error message.What action will resolve the problem?() A.Add root user to the /etc/hosts.equiv on serverBB.Create $HOME/.rhosts file for the root user on serverBC.Restart the rshd daemon with root enabled option on serverBD.Add entry to allow root user from serverA to the /etc/hosts.allow on serverB

考题 What should an administrator do to allow the logon of a user to a local system without limitations from the host‘webserver’?()A、configure the /etc/.rhosts with:webserverB、configure the root’$HOME/.rhost file with:+webserverC、configure each user’s $HOME/.rhosts file with:webserverD、configure the root’$HOME/.rhost file with:webserver

考题 A user with the userid of ’joe’ is unable to rsh from SYSTEMA to SYSTEMB without having to retype their password, but they can rsh from SYSTEMB to SYSTEMA.  No other users are experiencing the same issue.Both systems have a /home/joe/.rhosts file that contain the proper references to the other host. The /home/joe/.rhosts files on both SYSTEMA and SYSTEMB are owned by userid ’joe’.  Which of the following is the most likely cause of this problem?()A、User ’joe’ is specified in the /etc/nologin on SYSTEMAB、User ’joe’ is specified in the /etc/nologin on SYSTEMBC、The file permissions on the /home/joe/.rhosts file on SYSTEMA is correct.D、The file permissions on the /home/joe/.rhosts file on SYSTEMB is incorrect.

考题 non-root user can run rsh commands from serverA to serverB, but attempts to run rsh commands by the root user return with a permission error message. What action will resolve the problem? ()A、Add root user to the /etc/hosts.equiv on serverbB、Create $HOME/.rhosts file for the root user on serverbC、Restart the rshd daemon with root enabled option on serverbD、Add entry to allow root user from serverA to the /etc/hosts.allow on serverb

考题 What should an administrator do to allow the logon of a user to a local system without limitations from the host ‘webserver’?()A、configure the /etc/.rhosts with. webserver userB、configure the root'$HOME/.rhost file with.+webserver userC、configure each user's $HOME/.rhosts file with. webserver userD、configure the root'$HOME/.rhost file with.webserver ip user

考题 A non-root user can run rsh commands from serverA to serverB, but attempts to run rsh  commands by the root user return with a permission error message. What action will resolve the problem?()A、Add root user to the /etc/hosts.equiv on serverB .B、Create $HOME/.rhosts file for the root user on serverB .C、Restart the rshd daemon with root enabled option on serverB .D、Add entry to allow root user from serverA to the /etc/hosts.allow on serverB .

考题 An administrator created a .env file in a user’s home directory to configure a number of custom environment variables for a local application. However, after the user logs out and then logs back into the system, the custom variables are not being set What is the most likely reason that the custom .env file is being ignored?()A、A shell other than ksh is being used by the user.B、The line ’export ENV=$HOME/.env’ is missing from /etc/profile.C、The line ’export ENV=$HOME/.env’ is missing from the user’s .profile.D、The env_profile attribute is not defined for the user within /etc/security/user.

考题 An administrator has set up serverA and serverB to use the /etc/hosts.equiv file so that applications on serverA can remotely run commands on serverB. Which command will verify if a new user from serverA is trusted on serverB?()A、As the root user from serverA run the command rhost serverBB、As the root user from serverA run the command rlogin serverBC、As the desired user from serverB run the command rhost serverAD、As the desired user from serverA run the command rlogin serverB

考题 You are the administrator of a Windows 2000 Professional portable computer that is shared by users in the sales department.  You want to configure a roaming user profile for each user. You want each individual user profile setting to be available from any location, including by using a dial-up connection.  You log on to the computer by using the local Administrator account. You create user accounts for the users in the sales department. When you attempt to configure each individual user account profile to be a roaming profile, you find that you cannot. You receive the change Profile Type dialog box as shown in the exhibit (Click the Exhibit button)  You want to be able to configure each user account to use a roaming user profile. What should you do?( )A、From System in Control Panel, select the Change Type option, and then select the Roaming profile option. B、From Users and passwords in Control Panel, select the Advanced tab, and then define the path for the profile location. C、Use the Network Connection wizard to create a virtual private network (VPN) connection to the network, and define the mandatory profile path on each domain user account. D、Connect the portable computer to the network, and configure the user accounts for a roaming user profile.

考题 You need to configure the local security policy setting to request a user name and password when you make changes to the computer system.  What should you do?()A、Enable the Password must meet complexity requirements setting.B、Enable the User Account Control: Detect application installations and prompt for elevation setting.C、Configure the Interactive logon: Prompt user to change password before expiration setting to a value between 1 and 999.D、Configure the User Account Control: Behavior of the elevation prompt for administrators in Admin Approval mode setting to the Prompt for credentials option.

考题 You need to design a method to enable remote encryption on Server5. What should you do?()A、Configure the editor’s user account properties to enable Store password using reversible encryptionB、Configure the editor’s user account properties to enable Use DES encryption for this accountC、Configure the Local Security Policy on Server to enable the System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing security policyD、Configure the Server5 computer account properties to enable Trust computer for delegation

考题 You are the administrator of your company’s network. You purchase 75 new Windows 2000 Professional computers that will be shared by the users in Graphic organizational unit (OU). All the computers are configured identically. You want the users to be able to maintain their individual desktop settings regardless of which computer they use. You want to accomplish this with the least amount of administrative effort. What should you do? ()A、Configure each computer to join a workgroup.      Create a user account and a local profile for each user. B、Configure each computer to join a workgroup.      Create a domain user account that uses roaming user profiles. C、Configure each computer to join the domain.      Create a user account for each user on a domain controller. D、Configure each computer to join the domain.      Create domain user accounts that use roaming user profiles.

考题 Certkiller.com has a server with Active Directory Rights Management Services (AD RMS) server installed. Users have computers with Windows Vista installed on them with an Active Directory domain installed at Windows Server 2003 functional level. As an administrator at Certkiller.com, you discover that the users are unable to benefit from AD RMS to protect their documents. You need to configure AD RMS to enable users to use it and protect their documents. What should you do to achieve this functionality()A、Configure an email account in Active Directory Domain Services (AD DS) for each user.B、Add and configure ADRMSADMIN account in local administrators group on the user computersC、Add and configure the ADRMSSRVC account in AD RMS server’s local administrator groupD、Reinstall the Active Directory domain on user computersE、All of the above

考题 Your network consists of a single domain. All domain controllers run Windows Server 2003 Service Pack 2 (SP2). All client computers run Windows XP Professional Service Pack 3 (SP3). You need to ensure that users’ personal settings are the same when they log on to different client computers in the domain. What should you do? ()A、From the properties of each user account, configure a profile path.B、From the properties of each user account, configure a home folder path.C、From the Default Domain Policy, configure a logon script that runs Loadstate.exe.D、From the Default Domain Policy, configure a logon script that runs Scanstate.exe.

考题 One of the remote branch offices of Certkiller branch is running a Windows Server 2008 having ready only domain controller (RODC) installed.For security reasons you don’t want some critical credentials like (passwords, encryption keys) to be stored on RODC. What should you do so that these credentials are not replicated to any RODC’s in the forest()A、Configure RODC filtered attribute set on the serverB、Configure RODC filtered set on the server that holds Schema Operations Master role.C、Delegate local administrative permissions for an RODC to any domain user without granting that user any user rights for the domainD、Configure forest functional level server for Windows server 2008 to configure filteredattribute set.E、None of the above

考题 You network contains a server named Server1. You have a computer named Computer1 that runs Windows XP Professional. Employees log on to Computer1 by using local user accounts. You need to configure the user profiles on Computer1 to be stored on Server1. What should you do?() A、On Computer1, map a drive to an administrative share on Server1.  Configure each user's profile path to point to the mapped drive. B、Create a shared folder on Server1.  Assign Full Control permissions to all users. On Computer1, configure each user's profile path to a folder in the shared folder. C、Create a shared folder on Server1.  Assign Full Control permissions to all users. On Computer1, configure each user's home folder path to a folder in the shared folder. D、On Computer1, map a drive from each client computer to an administrative share on Server1.  Configure each user's home folder path to point to the mapped drive. 

考题 You are the administrator of your company’s network. A user name Andrew has limited dexterity, which prevents him from using standard keyboard when completing his daily tasks. You configure Windows 2000 Professional to use sticky keys and screen keyboard options. You save the accessibility options to a shared folder on the local hard disk of Andrews’s computer. You want to configure the same options for another user Peter. You log on to Peter’s computer using his local user account and you access the folder over the network from Peter’s computer. You select the .acw file from the shared folder to set up Peter’s computer to use the accessibility option. You receive an error message as follows: " There was a problem running the file when running the accessibility wizard". What should you do to install the accessibility features on Peter’s computer?()A、Copy the .acw file to the c;/documents/setting/default user folderB、Save the accessibility option to the floppy disk and change the permission to allow full control  of the fileC、Resume the setting for the option by using utility manager, then copy the file to Peter’s local  profile folderD、Change the permission of the .acw file in the folder to allow access for Peter’s user account. 

考题 单选题You network contains a server named Server1. You have a computer named Computer1 that runs Windows XP Professional. Employees log on to Computer1 by using local user accounts. You need to configure the user profiles on Computer1 to be stored on Server1. What should you do?()A On Computer1, map a drive to an administrative share on Server1.  Configure each user's profile path to point to the mapped drive. B Create a shared folder on Server1.  Assign Full Control permissions to all users. On Computer1, configure each user's profile path to a folder in the shared folder. C Create a shared folder on Server1.  Assign Full Control permissions to all users. On Computer1, configure each user's home folder path to a folder in the shared folder. D On Computer1, map a drive from each client computer to an administrative share on Server1.  Configure each user's home folder path to point to the mapped drive. 

考题 单选题A non-root user can run rsh commands from serverA to serverB, but attempts to run rsh  commands by the root user return with a permission error message. What action will resolve the problem?()A Add root user to the /etc/hosts.equiv on serverB .B Create $HOME/.rhosts file for the root user on serverB .C Restart the rshd daemon with root enabled option on serverB .D Add entry to allow root user from serverA to the /etc/hosts.allow on serverB .

考题 单选题An administrator created a .env file in a user’s home directory to configure a number of custom environment variables for a local application. However, after the user logs out and then logs back into the system, the custom variables are not being set What is the most likely reason that the custom .env file is being ignored?()A A shell other than ksh is being used by the user.B The line ’export ENV=$HOME/.env’ is missing from /etc/profile.C The line ’export ENV=$HOME/.env’ is missing from the user’s .profile.D The env_profile attribute is not defined for the user within /etc/security/user.

考题 单选题An administrator created a .env file in a user’s home directory to configure a number of custom environment variables for a local application. However, after the user logs out and then logs back into the system, the custom variables are not being set What is the most likely reason that the custom .env file is being ignored?()A A shell other than ksh is being used by the user.B The line ’export ENV=$HOME/.env’ is missing from /etc/profile.C The line ’export ENV=$HOME/.env’ is missing from the user’s .profile.D The env_profile attribute is not defined for the user within /etc/security/user.

考题 单选题What should an administrator do to allow the logon of a user to a local system without limitations from the host ’webserver’?()A configure the /etc/.rhosts withweb:serverB configure the root’$HOME/.rhost file with:+webserver C configure each user’s $HOME/.rhosts file with:webserver D configure the root’$HOME/.rhost file with:  

考题 单选题You are the administrator of a Windows 2000 Professional portable computer that is shared by users in the sales department.  You want to configure a roaming user profile for each user. You want each individual user profile setting to be available from any location, including by using a dial-up connection.  You log on to the computer by using the local Administrator account. You create user accounts for the users in the sales department. When you attempt to configure each individual user account profile to be a roaming profile, you find that you cannot. You receive the change Profile Type dialog box as shown in the exhibit (Click the Exhibit button)  You want to be able to configure each user account to use a roaming user profile. What should you do?( )A From System in Control Panel, select the Change Type option, and then select the Roaming profile option. B From Users and passwords in Control Panel, select the Advanced tab, and then define the path for the profile location. C Use the Network Connection wizard to create a virtual private network (VPN) connection to the network, and define the mandatory profile path on each domain user account. D Connect the portable computer to the network, and configure the user accounts for a roaming user profile.

考题 单选题An administrator has set up serverA and serverB to use the /etc/hosts.equiv file so that applications on serverA can remotely run commands on serverB. Which command will verify if a new user from serverA is trusted on serverB?()A As the root user from serverA run the command rhost serverBB As the root user from serverA run the command rlogin serverBC As the desired user from serverB run the command rhost serverAD As the desired user from serverA run the command rlogin serverB

考题 单选题What should an administrator do to allow the logon of a user to a local system without limitations from the host ‘webserver’?()A configure the /etc/.rhosts with. webserver userB configure the root'$HOME/.rhost file with.+webserver userC configure each user's $HOME/.rhosts file with. webserver userD configure the root'$HOME/.rhost file with.webserver ip user

考题 单选题What should an administrator do to allow the logon of a user to a local system without limitations from the host‘webserver’?()A configure the /etc/.rhosts with:webserverB configure the root’$HOME/.rhost file with:+webserverC configure each user’s $HOME/.rhosts file with:webserverD configure the root’$HOME/.rhost file with:webserver