网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
What do the entries in the /proc directory represent?()
A
They are the decimal numbers corresponding to the active process IDs.
B
They are the decimal numbers corresponding to the gid of the system group.
C
They are the decimal numbers corresponding to the block IDs of the boot sector.
D
They are the decimal numbers corresponding to the inodes of the system directories.
参考答案
参考解析
解析:
暂无解析
更多 “单选题What do the entries in the /proc directory represent?()A They are the decimal numbers corresponding to the active process IDs.B They are the decimal numbers corresponding to the gid of the system group.C They are the decimal numbers corresponding to the block IDs of the boot sector.D They are the decimal numbers corresponding to the inodes of the system directories.” 相关考题
考题
It is said in Australia there is more land than the government knows ___.
A. it what to do wthB. what do it withC. what to do with itD. to do what with it
考题
“请问喝什么茶”用英语最妥当的表述是( )。A.What is the juice do you likeB.What is the coffee do you likeC.What is the tea do you likeD.What is the wine do you like
考题
-________?-I'd like to see a pair of brown shoes.A、What do you wantB、What do you likeC、What can I do for youD、Do you want to buy something
考题
You discover audit log entries that report attempts to log on to your computer. You need to be notified of all logon attempts that occur on your computer.What should you do?()
A.AB.BC.CD.D
考题
What does the command "IP ARP synchronize" do in a vPC configuration?()A、 Synchronizes ARP entries between vPC peers every five minutesB、 Triggers a manual update of ARP entries from the primary peer to the secondaryC、 Enables a bulk loading of ARP entries when a vPC peer is restoredD、 Uses the peer-keepalive link to maintain ARP table consistency
考题
Given the security constraint in a DD:// 101. 102. 103.Foo 104./Bar/Baz/* 105.POST 106. 107. 108.DEVELOPER 109. 110. And given that "MANAGER" is a valid role-name,which four are true for this security constraint?()A、MANAGER can do a GET on resources in the /Bar/Baz directory.B、MANAGER can do a POST on any resource in the /Bar/Baz directory.C、MANAGER can do a TRACE on any resource in the /Bar/Baz directory.D、DEVELOPER can do a GET on resources in the /Bar/Baz directory.E、DEVELOPER can do only a POST on resources in the /Bar/Baz directory.F、DEVELOPER can do a TRACE on any resource in the /Bar/Baz directory.
考题
What do the entries in the /proc directory represent?()A、They are the decimal numbers corresponding to the active process IDs.B、They are the decimal numbers corresponding to the gid of the system group.C、They are the decimal numbers corresponding to the block IDs of the boot sector.D、They are the decimal numbers corresponding to the inodes of the system directories.
考题
You are designing an Active Directory forest structure to meet the business and technical requirements. What should you do?()A、Create a single forest that has one domain. Use OUs to separate the departments.B、Create a single forest that has multiple domains to represent every department.C、Create a single forest that has three domains: one for finance, one for HR, and one for the remaining departments.D、Create multiple forests that have a single domain in each forest to represent the departments.
考题
You are designing a site topology to meet the business and technical requirements. What should you do?()A、Increase the replication interval between sites.B、Use SMTP as the transport protocol for replication.C、Create site links to represent the physical topology. D、Disable the Knowledge Consistency Checker (KCC) and manually configure site replication.
考题
Your company has a server that runs an instance of Active Directory Lightweight Directory Services (AD LDS). You need to create new organizational units in the AD LDS application directory partition. What should you do()A、Use the Active Directory Users and Computers snap-in to create the organizational units on the AD LDS application directory partition.B、Use the ADSI Edit snap-in to create the organizational units on the AD LDS application directory partition.C、Use the dsadd OU command to create the organizational units.D、Use the dsmod OU command to create the organizational units.
考题
You have an Exchange Server 2010 organization.You need to prevent users from changing their password by using Outlook Web App (OWA).What should you do?()A、Create a Group Policy Object.B、Create an Outlook Web App Mailbox policy.C、Modify the authentication settings of the OWA virtual directory.D、Modify the authentication settings of the IISADMPWD virtual directory.
考题
You need to remove the Active Directory Domain Services role from a domain controller named DC1. What should you do()A、Run the netdom remove DC1 commandB、Run the nltest /remove_server: DC1 commandC、Run the Dcpromo utility. Remove the Active Directory Domain Services role.D、Reset the Domain Controller computer account by using the Active Directory Users and Computers utility.
考题
Your network contains an Active Directory forest. The forest contains multiple sites. You need to enable universal group membership caching for a site. What should you do()A、From Active Directory Sites and Services, modify the NTDS Settings.B、From Active Directory Sites and Services, modify the NTDS Site Settings.C、From Active Directory Users and Computers, modify the properties of all universal groups used in the site.D、From Active Directory Users and Computers, modify the computer objects for the domain controllers in the site.
考题
Your company has two domain controllers that are configured as internal DNS servers. All zones on the DNS servers are Active Directory-integrated zones. The zones allow all dynamic updates. You discover that the contoso.com zone has multiple entries for the host names of computers that do not exist. You need to configure the contoso.com zone to automatically remove expired records. What should you do()A、Enable only secure updates on the contoso.com zone.B、Enable scavenging and configure the refresh interval on the contoso.com zone.C、From the Start of Authority tab, decrease the default refresh interval on the contoso.com zone.D、From the Start of Authority tab, increase the default expiration interval on the contoso.com zone.
考题
Your network contains a single Active Directory domain. You need to create an Active Directory Domain Services snapshot. What should you do()A、Use the Ldp tool.B、Use the NTDSUtil tool.C、Use the Wbadmin tool.D、From Windows Server Backup, perform a full backup.
考题
You are designing a DNS and DHCP implementation strategy to support the new environment. What should you do?()A、Create a WINS resource record in the Active Directory DNS zone.B、Create a WINS referral zone in the DNS zone that supports Active Directory.C、Configure a DNS domain name on the DHCP server.D、Configure the DHCP server to update DNS for DHCP clients that do not support dynamic updates.
考题
Your company has a server that runs an instance of Actrve Directory Lightweight Directory Service (AD LDS) You need to create new organizational units in the AD LDS application directory partition What should you do()A、Use the Actrve Directory Users and Computers snap-in to create the organizational units on the AD LDS application directory partitionB、Use the ADSI Edit snap-in to create the organizational units on the AD LDS application directory partitionC、Use the dsadd OU command to create the organizational unitsD、Use the dsmod OU command to create the organizational units
考题
单选题What does the command "IP ARP synchronize" do in a vPC configuration?()A
Synchronizes ARP entries between vPC peers every five minutesB
Triggers a manual update of ARP entries from the primary peer to the secondaryC
Enables a bulk loading of ARP entries when a vPC peer is restoredD
Uses the peer-keepalive link to maintain ARP table consistency
考题
单选题Given that file is a reference to a File object that represents a directory, which code fragments will succeed in obtaining a list of the entries in the directory?()A
Vector filelist = ((Directory) file).getList();B
String[] filelist = file.directory();C
Enumeration filelist = file.contents();D
String[] filelist = file.list();E
Vector filelist = (new Directory(file)).files();
考题
单选题You are designing a DNS and DHCP implementation strategy to support the new environment. What should you do?()A
Create a WINS resource record in the Active Directory DNS zone.B
Create a WINS referral zone in the DNS zone that supports Active Directory.C
Configure a DNS domain name on the DHCP server.D
Configure the DHCP server to update DNS for DHCP clients that do not support dynamic updates.
考题
单选题You install a new Exchange Server 2010 server.You need to ensure that users can connect from the Internet to the server by using Exchange ActiveSync.What should you do on the Exchange server?()A
Modify the internal URL for the Microsoft-Server-ActiveSync virtual directory.B
Modify the external URL for the Microsoft-Server-ActiveSync virtual directory.C
Enable Anonymous Authentication for the Microsoft-Server-ActiveSync virtual directory.D
Enable Windows Integrated Authentication for the Microsoft-Server-ActiveSync virtual directory.
考题
单选题Your company has an Active Directory domain. You log on to the domain controller. The Active Directory Schema snap-in is not available in the Microsoft Management Console (MMC). You need to access the Active Directory Schema snap-in. What should you do()A
Register Schmmgmt.dll.B
Log off and log on again by using an account that is a member of the Schema Admins group.C
Use the Ntdsutil.exe command to connect to the schema master operations master and open the schema for writingD
Add the Active Directory Lightweight Directory Services (AD/LDS) role to the domain controller by using Server Man
考题
单选题What do the entries in the /proc directory represent?()A
They are the decimal numbers corresponding to the active process IDs.B
They are the decimal numbers corresponding to the gid of the system group.C
They are the decimal numbers corresponding to the block IDs of the boot sector.D
They are the decimal numbers corresponding to the inodes of the system directories.
考题
多选题Given the security constraint in a DD:// 101. 102. 103.Foo 104./Bar/Baz/* 105.POST 106. 107. 108.DEVELOPER 109. 110. And given that "MANAGER" is a valid role-name,which four are true for this security constraint?()AMANAGER can do a GET on resources in the /Bar/Baz directory.BMANAGER can do a POST on any resource in the /Bar/Baz directory.CMANAGER can do a TRACE on any resource in the /Bar/Baz directory.DDEVELOPER can do a GET on resources in the /Bar/Baz directory.EDEVELOPER can do only a POST on resources in the /Bar/Baz directory.FDEVELOPER can do a TRACE on any resource in the /Bar/Baz directory.
考题
单选题You are designing an Active Directory forest structure to meet the business and technical requirements. What should you do?()A
Create a single forest that has one domain. Use OUs to separate the departments.B
Create a single forest that has multiple domains to represent every department.C
Create a single forest that has three domains: one for finance, one for HR, and one for the remaining departments.D
Create multiple forests that have a single domain in each forest to represent the departments.
考题
单选题Your network contains an Active Directory domain. You need to restore a deleted computer account from the Active Directory Recycle Bin. What should you do()A
From the command prompt, run recover.exe.B
From the command prompt, run ntdsutil.exe.C
From the Active Directory Module for Windows PowerShell, run the Restore-Computer cmdlet.D
From the Active Directory Module for Windows PowerShell, run the Restore-ADObject cmdlet.
考题
单选题You are designing a site topology to meet the business and technical requirements. What should you do?()A
Increase the replication interval between sites,B
Use SMTP as the transport protocol for replication.C
Create site links to represent the physical topology.D
Disable the Knowledge Consistency Checker (KCC) and manually configure site replication.
热门标签
最新试卷