网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
What should an administrator do to allow the logon of a user to a local system without limitations from the host ‘webserver’?()
A

configure the /etc/.rhosts with. webserver <user>

B

configure the root'$HOME/.rhost file with.+webserver <user>

C

configure each user's $HOME/.rhosts file with. webserver <user>

D

configure the root'$HOME/.rhost file with.<webserver ip> <user>


参考答案

参考解析
解析: 暂无解析
更多 “单选题What should an administrator do to allow the logon of a user to a local system without limitations from the host ‘webserver’?()A configure the /etc/.rhosts with. webserver userB configure the root'$HOME/.rhost file with.+webserver userC configure each user's $HOME/.rhosts file with. webserver userD configure the root'$HOME/.rhost file with.webserver ip user” 相关考题
考题 You are the administrator of Ezonexam.com's network.Ezonexam has several branch offices. Each branch office has a Windows 2000 Server computer with Service Pack 2 installed. Each branch office also has a technical support department. You want to configure the remote Windows 2000 Server computers so that whenever a new driver becomes available from Microsoft, the branch offices are notified automatically when the administrator logs on to the server.What should you do?A.Install Windows UpdateB.Install the Windows 2000 Resource Kit.C.Configure System File Checker to notify the branch offices.D.Configure Window File Protection to notify the branch offices.

考题 An administrator created a .env file in a user‘s home directory to configure a number of custom environment variables for a local application. However, after the user logs out and then logs back into the system, the custom variables are not being set.What is the most likely reason that the custom .env file is being ignored?()A.A shell other than ksh is being used by the user.B.The line ‘export ENV=$HOME/.env‘ is missing from /etc/profile.C.The line ‘export ENV=$HOME/.env‘ is missing from the user‘s .profile.D.The env_profile attribute is not defined for the user within /etc/security/user.

考题 A non-root user can run rsh commands from serverA to serverB, but attempts to run rsh commands by the root user return with apermission error message.What action will resolve the problem?() A.Add root user to the /etc/hosts.equiv on serverBB.Create $HOME/.rhosts file for the root user on serverBC.Restart the rshd daemon with root enabled option on serverBD.Add entry to allow root user from serverA to the /etc/hosts.allow on serverB

考题 An Enterprise decides to implement Authentication Proxy for per-user authentication for home offices. Each home office also supports an IP Phone. What should you do?()A、Configure Access Control Lists to ensure Voice over IP traffic is checked by Auth Proxy.B、Configure pNAT to ensure Voice over IP packets are properly translated.C、Configure IOS firewall to permit RTP port numbers through the firewall via VPN. D、Configure Access Control Lists to allow Voice over IP traffic to bypass Auth Proxy checking.

考题 What should an administrator do to allow the logon of a user to a local system without limitations from the host‘webserver’?()A、configure the /etc/.rhosts with:webserverB、configure the root’$HOME/.rhost file with:+webserverC、configure each user’s $HOME/.rhosts file with:webserverD、configure the root’$HOME/.rhost file with:webserver

考题 As an administrator at Cer-tech .com, you manage a member server having Windows Server 2008. A Terminal Services role is installed on the server along with Microsoft Windows System Resource Manager(WSERVERM). Users are complaining about degradation in performance on Terminal Server. You find outthat a single user is consuming 100% of the processor time. To rectify the problem, you create a resource-allocation policy named Policy1 which limits each user to 30% of the total processor time. Still, there is noimprovement in the performance. What should you do to configure WSERVERM to force Policy1?()A、Configure each user account to allocate a resource quota on WSERVERM applicationB、Configure Policy1 to accept the WSERVERM resource quota for each userC、Restart the Server and the Terminal Services configuration serviceD、Configure policy1 as the Managing Policy

考题 A user with the userid of ’joe’ is unable to rsh from SYSTEMA to SYSTEMB without having to retype their password, but they can rsh from SYSTEMB to SYSTEMA.  No other users are experiencing the same issue.Both systems have a /home/joe/.rhosts file that contain the proper references to the other host. The /home/joe/.rhosts files on both SYSTEMA and SYSTEMB are owned by userid ’joe’.  Which of the following is the most likely cause of this problem?()A、User ’joe’ is specified in the /etc/nologin on SYSTEMAB、User ’joe’ is specified in the /etc/nologin on SYSTEMBC、The file permissions on the /home/joe/.rhosts file on SYSTEMA is correct.D、The file permissions on the /home/joe/.rhosts file on SYSTEMB is incorrect.

考题 non-root user can run rsh commands from serverA to serverB, but attempts to run rsh commands by the root user return with a permission error message. What action will resolve the problem? ()A、Add root user to the /etc/hosts.equiv on serverbB、Create $HOME/.rhosts file for the root user on serverbC、Restart the rshd daemon with root enabled option on serverbD、Add entry to allow root user from serverA to the /etc/hosts.allow on serverb

考题 What should an administrator do to allow the logon of a user to a local system without limitations from the host ‘webserver’?()A、configure the /etc/.rhosts with. webserver userB、configure the root'$HOME/.rhost file with.+webserver userC、configure each user's $HOME/.rhosts file with. webserver userD、configure the root'$HOME/.rhost file with.webserver ip user

考题 What should an administrator do to allow the logon of a user to a local system without limitations from the host ’webserver’?()  A、configure the /etc/.rhosts withweb:serverB、configure the root’$HOME/.rhost file with:+webserver C、configure each user’s $HOME/.rhosts file with:webserver D、configure the root’$HOME/.rhost file with:  

考题 An administrator created a .env file in a user’s home directory to configure a number of custom environment variables for a local application. However, after the user logs out and then logs back into the system, the custom variables are not being set What is the most likely reason that the custom .env file is being ignored?()A、A shell other than ksh is being used by the user.B、The line ’export ENV=$HOME/.env’ is missing from /etc/profile.C、The line ’export ENV=$HOME/.env’ is missing from the user’s .profile.D、The env_profile attribute is not defined for the user within /etc/security/user.

考题 A banking user with the userid of ’joe’ is unable to rsh from SYSTEMA to SYSTEMB without having to retype their password, but they can rsh from SYSTEMB to SYSTEMA. No other users are experiencing the same issue.  Both systems have a /home/joe/.rhosts file that contain the proper references to the other host. The /home/joe/.rhosts files on both SYSTEMA and SYSTEMB are owned by userid ’joe’.  Which of the following is the most likely cause of this problem()A、User ’joe’ is specified in the /etc/nologin on SYSTEMb.B、User ’joe’ is specified in the /etc/nologin on SYSTEMa.C、The file permissions on the /home/joe/.rhosts file on SYSTEMA are incorrect.D、The file permissions on the /home/joe/.rhosts file on SYSTEMB are incorrect.

考题 You are the administrator of a Windows 2000 Professional portable computer that is shared by users in the sales department.  You want to configure a roaming user profile for each user. You want each individual user profile setting to be available from any location, including by using a dial-up connection.  You log on to the computer by using the local Administrator account. You create user accounts for the users in the sales department. When you attempt to configure each individual user account profile to be a roaming profile, you find that you cannot. You receive the change Profile Type dialog box as shown in the exhibit (Click the Exhibit button)  You want to be able to configure each user account to use a roaming user profile. What should you do?( )A、From System in Control Panel, select the Change Type option, and then select the Roaming profile option. B、From Users and passwords in Control Panel, select the Advanced tab, and then define the path for the profile location. C、Use the Network Connection wizard to create a virtual private network (VPN) connection to the network, and define the mandatory profile path on each domain user account. D、Connect the portable computer to the network, and configure the user accounts for a roaming user profile.

考题 You need to configure the local security policy setting to request a user name and password when you make changes to the computer system.  What should you do?()A、Enable the Password must meet complexity requirements setting.B、Enable the User Account Control: Detect application installations and prompt for elevation setting.C、Configure the Interactive logon: Prompt user to change password before expiration setting to a value between 1 and 999.D、Configure the User Account Control: Behavior of the elevation prompt for administrators in Admin Approval mode setting to the Prompt for credentials option.

考题 You are the administrator of your company’s network. You purchase 75 new Windows 2000 Professional computers that will be shared by the users in Graphic organizational unit (OU). All the computers are configured identically. You want the users to be able to maintain their individual desktop settings regardless of which computer they use. You want to accomplish this with the least amount of administrative effort. What should you do? ()A、Configure each computer to join a workgroup.      Create a user account and a local profile for each user. B、Configure each computer to join a workgroup.      Create a domain user account that uses roaming user profiles. C、Configure each computer to join the domain.      Create a user account for each user on a domain controller. D、Configure each computer to join the domain.      Create domain user accounts that use roaming user profiles.

考题 Certkiller.com has a server with Active Directory Rights Management Services (AD RMS) server installed. Users have computers with Windows Vista installed on them with an Active Directory domain installed at Windows Server 2003 functional level. As an administrator at Certkiller.com, you discover that the users are unable to benefit from AD RMS to protect their documents. You need to configure AD RMS to enable users to use it and protect their documents. What should you do to achieve this functionality()A、Configure an email account in Active Directory Domain Services (AD DS) for each user.B、Add and configure ADRMSADMIN account in local administrators group on the user computersC、Add and configure the ADRMSSRVC account in AD RMS server’s local administrator groupD、Reinstall the Active Directory domain on user computersE、All of the above

考题 Your network consists of a single domain. All domain controllers run Windows Server 2003 Service Pack 2 (SP2). All client computers run Windows XP Professional Service Pack 3 (SP3). You need to ensure that users’ personal settings are the same when they log on to different client computers in the domain. What should you do? ()A、From the properties of each user account, configure a profile path.B、From the properties of each user account, configure a home folder path.C、From the Default Domain Policy, configure a logon script that runs Loadstate.exe.D、From the Default Domain Policy, configure a logon script that runs Scanstate.exe.

考题 You need to identify each help desk user who bypasses the new corporate security policy. What should you do?()A、Configure Audit Special Logon and define Special Groups.B、Configure Audit Other Privilege Use Events and define Special Groups.C、Configure Audit Sensitive Privilege Use and configure auditing for the HelpDesk group.D、Configure Audit Object Access and modify the auditing settings for the HelpDesk group.

考题 单选题Your network consists of a single domain. All domain controllers run Windows Server 2003 Service Pack 2 (SP2). All client computers run Windows XP Professional Service Pack 3 (SP3). You need to ensure that users’ personal settings are the same when they log on to different client computers in the domain. What should you do? ()A From the properties of each user account, configure a profile path.B From the properties of each user account, configure a home folder path.C From the Default Domain Policy, configure a logon script that runs Loadstate.exe.D From the Default Domain Policy, configure a logon script that runs Scanstate.exe.

考题 单选题You network contains a server named Server1. You have a computer named Computer1 that runs Windows XP Professional. Employees log on to Computer1 by using local user accounts. You need to configure the user profiles on Computer1 to be stored on Server1. What should you do?()A On Computer1, map a drive to an administrative share on Server1.  Configure each user's profile path to point to the mapped drive. B Create a shared folder on Server1.  Assign Full Control permissions to all users. On Computer1, configure each user's profile path to a folder in the shared folder. C Create a shared folder on Server1.  Assign Full Control permissions to all users. On Computer1, configure each user's home folder path to a folder in the shared folder. D On Computer1, map a drive from each client computer to an administrative share on Server1.  Configure each user's home folder path to point to the mapped drive. 

考题 单选题A non-root user can run rsh commands from serverA to serverB, but attempts to run rsh  commands by the root user return with a permission error message. What action will resolve the problem?()A Add root user to the /etc/hosts.equiv on serverB .B Create $HOME/.rhosts file for the root user on serverB .C Restart the rshd daemon with root enabled option on serverB .D Add entry to allow root user from serverA to the /etc/hosts.allow on serverB .

考题 单选题An administrator created a .env file in a user’s home directory to configure a number of custom environment variables for a local application. However, after the user logs out and then logs back into the system, the custom variables are not being set What is the most likely reason that the custom .env file is being ignored?()A A shell other than ksh is being used by the user.B The line ’export ENV=$HOME/.env’ is missing from /etc/profile.C The line ’export ENV=$HOME/.env’ is missing from the user’s .profile.D The env_profile attribute is not defined for the user within /etc/security/user.

考题 单选题An administrator created a .env file in a user’s home directory to configure a number of custom environment variables for a local application. However, after the user logs out and then logs back into the system, the custom variables are not being set What is the most likely reason that the custom .env file is being ignored?()A A shell other than ksh is being used by the user.B The line ’export ENV=$HOME/.env’ is missing from /etc/profile.C The line ’export ENV=$HOME/.env’ is missing from the user’s .profile.D The env_profile attribute is not defined for the user within /etc/security/user.

考题 单选题What should an administrator do to allow the logon of a user to a local system without limitations from the host ’webserver’?()A configure the /etc/.rhosts withweb:serverB configure the root’$HOME/.rhost file with:+webserver C configure each user’s $HOME/.rhosts file with:webserver D configure the root’$HOME/.rhost file with:  

考题 单选题You are the administrator of a Windows 2000 Professional portable computer that is shared by users in the sales department.  You want to configure a roaming user profile for each user. You want each individual user profile setting to be available from any location, including by using a dial-up connection.  You log on to the computer by using the local Administrator account. You create user accounts for the users in the sales department. When you attempt to configure each individual user account profile to be a roaming profile, you find that you cannot. You receive the change Profile Type dialog box as shown in the exhibit (Click the Exhibit button)  You want to be able to configure each user account to use a roaming user profile. What should you do?( )A From System in Control Panel, select the Change Type option, and then select the Roaming profile option. B From Users and passwords in Control Panel, select the Advanced tab, and then define the path for the profile location. C Use the Network Connection wizard to create a virtual private network (VPN) connection to the network, and define the mandatory profile path on each domain user account. D Connect the portable computer to the network, and configure the user accounts for a roaming user profile.

考题 单选题A user with the userid of ’joe’ is unable to rsh from SYSTEMA to SYSTEMB without having to retype their password, but they can rsh from SYSTEMB to SYSTEMA.  No other users are experiencing the same issue.Both systems have a /home/joe/.rhosts file that contain the proper references to the other host. The /home/joe/.rhosts files on both SYSTEMA and SYSTEMB are owned by userid ’joe’.  Which of the following is the most likely cause of this problem?()A User ’joe’ is specified in the /etc/nologin on SYSTEMAB User ’joe’ is specified in the /etc/nologin on SYSTEMBC The file permissions on the /home/joe/.rhosts file on SYSTEMA is correct.D The file permissions on the /home/joe/.rhosts file on SYSTEMB is incorrect.

考题 单选题What should an administrator do to allow the logon of a user to a local system without limitations from the host‘webserver’?()A configure the /etc/.rhosts with:webserverB configure the root’$HOME/.rhost file with:+webserverC configure each user’s $HOME/.rhosts file with:webserverD configure the root’$HOME/.rhost file with:webserver