网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
A non-root user can run rsh commands from serverA to serverB, but attempts to run rsh  commands by the root user return with a permission error message. What action will resolve the problem?()
A

Add root user to the /etc/hosts.equiv on serverB .

B

Create $HOME/.rhosts file for the root user on serverB .

C

Restart the rshd daemon with root enabled option on serverB .

D

Add entry to allow root user from serverA to the /etc/hosts.allow on serverB .


参考答案

参考解析
解析: 暂无解析
更多 “单选题A non-root user can run rsh commands from serverA to serverB, but attempts to run rsh  commands by the root user return with a permission error message. What action will resolve the problem?()A Add root user to the /etc/hosts.equiv on serverB .B Create $HOME/.rhosts file for the root user on serverB .C Restart the rshd daemon with root enabled option on serverB .D Add entry to allow root user from serverA to the /etc/hosts.allow on serverB .” 相关考题
考题 Which two commands will successfully create ping traffic?() A. user@router# ping 10.10.10.1B. user@router# run ping 10.10.10.1C. user@router ping 10.10.10.1D. user@router request ping 10.10.10.1

考题 A non-root user can run rsh commands from serverA to serverB, but attempts to run rsh commands by the root user return with apermission error message.What action will resolve the problem?() A.Add root user to the /etc/hosts.equiv on serverBB.Create $HOME/.rhosts file for the root user on serverBC.Restart the rshd daemon with root enabled option on serverBD.Add entry to allow root user from serverA to the /etc/hosts.allow on serverB

考题 The following entry is in the /etc/host.equiv and /home/jsmith/.rhosts file on server Alpha:+ jsmith.What does this entry indicate?()A、The user "jsmith" can use r-commands from any server to server Alpha system-wideB、The user "jsmith" can use r-commands from server Alpha to any server system-wideC、The user "jsmith" can use r-commands from server Alpha to any server with a /home/jsmith directoryD、The user "jsmith" can use r-commands from any server to server Alpha only in the /home/jsmith directory

考题 How are the commands a user is allowed to enter defined in JUNOS?()A、Permissions are configured individually for each user.B、Users are associated with user classes, and each class defines the permissions for entering commands.C、There are four default classes with different permissions and you can only use these four.D、Permissions are associated with each user ID

考题 A user is unable to determine the default system text editor. How can the local administrator assist the user by identifying the default text editor for the system?()A、Login as the user and run ’echo $ENV’.B、Login as root and run the ’env’ command.C、Login as root and ’cat /etc/environment’.D、Login as the user and run the ’env’ command.

考题 In Windows XP, how can a user change the programs that run at startup? ()(Select TWO).A、Add or remove programs from the system key of the registry.B、Add or remove programs from the boot.ini file.C、Add or remove programs from the startup folder.D、Run msconfig and configure startup programs.E、Run appstart and configure startup programs.

考题 Which of the following procedures should be performed to run diagnostics in single-user mode? ()A、 Run standalone diagnostics from the cd. B、 Run standalone diagnostics from the AIX tape. C、 Run maintenance mode diagnostics from the hard drive. D、 Run maintenance mode diagnostics from the diskette. 

考题 A user with the userid of ’joe’ is unable to rsh from SYSTEMA to SYSTEMB without having to retype their password, but they can rsh from SYSTEMB to SYSTEMA.  No other users are experiencing the same issue.Both systems have a /home/joe/.rhosts file that contain the proper references to the other host. The /home/joe/.rhosts files on both SYSTEMA and SYSTEMB are owned by userid ’joe’.  Which of the following is the most likely cause of this problem?()A、User ’joe’ is specified in the /etc/nologin on SYSTEMAB、User ’joe’ is specified in the /etc/nologin on SYSTEMBC、The file permissions on the /home/joe/.rhosts file on SYSTEMA is correct.D、The file permissions on the /home/joe/.rhosts file on SYSTEMB is incorrect.

考题 non-root user can run rsh commands from serverA to serverB, but attempts to run rsh commands by the root user return with a permission error message. What action will resolve the problem? ()A、Add root user to the /etc/hosts.equiv on serverbB、Create $HOME/.rhosts file for the root user on serverbC、Restart the rshd daemon with root enabled option on serverbD、Add entry to allow root user from serverA to the /etc/hosts.allow on serverb

考题 After updating serverB’s network configurations, an administrator notices that serverA, which resides in a different subnet, is unable to communicate with serverB via ssh or telnet. As ping’s to the server fail, the administrator logs onto serverB via a console and finds an available interface en0 in the ’up’ state. From the console connection, en0 can communicate with other servers in the same subnet. What is the most likely cause of the problem?()A、en0 has no associated ip address.B、serverB is missing its default route.C、serverB and serverA cannot connect due to a firewall.D、en0 has been set up to block traffic from servers that are in different subnets.

考题 A non-root user can run rsh commands from serverA to serverB, but attempts to run rsh  commands by the root user return with a permission error message. What action will resolve the problem?()A、Add root user to the /etc/hosts.equiv on serverB .B、Create $HOME/.rhosts file for the root user on serverB .C、Restart the rshd daemon with root enabled option on serverB .D、Add entry to allow root user from serverA to the /etc/hosts.allow on serverB .

考题 How can an operator list all its history of commands in one step?()A、Run c -l 0?from the command line.Run ?c -l 0?from the command line.B、Invoke SMIT for the shell environment.C、Run the SC + H?combination at the command prompt.Run the ?SC + H?combination at the command prompt.D、Use a rep?command with its UID against the /var/log/history_cmds file.Use a ?rep?command with its UID against the /var/log/history_cmds file.

考题 An administrator has set up serverA and serverB to use the /etc/hosts.equiv file so that applications on serverA can remotely run commands on serverB. Which command will verify if a new user from serverA is trusted on serverB?()A、As the root user from serverA run the command rhost serverBB、As the root user from serverA run the command rlogin serverBC、As the desired user from serverB run the command rhost serverAD、As the desired user from serverA run the command rlogin serverB

考题 A banking user with the userid of ’joe’ is unable to rsh from SYSTEMA to SYSTEMB without having to retype their password, but they can rsh from SYSTEMB to SYSTEMA. No other users are experiencing the same issue.  Both systems have a /home/joe/.rhosts file that contain the proper references to the other host. The /home/joe/.rhosts files on both SYSTEMA and SYSTEMB are owned by userid ’joe’.  Which of the following is the most likely cause of this problem()A、User ’joe’ is specified in the /etc/nologin on SYSTEMb.B、User ’joe’ is specified in the /etc/nologin on SYSTEMa.C、The file permissions on the /home/joe/.rhosts file on SYSTEMA are incorrect.D、The file permissions on the /home/joe/.rhosts file on SYSTEMB are incorrect.

考题 Which two commands will successfully create ping traffic?()A、user@router# ping 10.10.10.1B、user@router# run ping 10.10.10.1C、user@router ping 10.10.10.1D、user@router request ping 10.10.10.1

考题 You are the administrator of a computer named Computer1 that runs Windows 7. Several users shareComputer1. The users plan to encrypt files on the computer. You need to ensure that you can access allencrypted files on the computer.  What should you do first?()A、At a command prompt, run Cipher.exe.B、At a command prompt, run Certutil.exe.C、From the local computer policy, modify the User Rights Assignment.D、From User Accounts, run the Manage your file encryption certificates wizard.

考题 The user cannot access some Internet websites, but can connect to resources inside the local network. The technician successfully uses the ping command to test the user’s connectivity. Which of the following commands can the technician run NEXT to troubleshoot the issue?()A、net /?B、ipconfig /flushdnsC、netstat -rD、nbtstat -R

考题 单选题After updating serverB’s network configurations, an administrator notices that serverA, which resides in a different subnet, is unable to communicate with serverB via ssh or telnet. As ping’s to the server fail, the administrator logs onto serverB via a console and finds an available interface en0 in the ’up’ state. From the console connection, en0 can communicate with other servers in the same subnet. What is the most likely cause of the problem?()A en0 has no associated ip address.B serverB is missing its default route.C serverB and serverA cannot connect due to a firewall.D en0 has been set up to block traffic from servers that are in different subnets.

考题 单选题You are ready to implement RMAN in the backup and recover strategy for your company. Which system privilege must the RMAN user have to be able to connect and execute RMAN commands on a target database?()A SYSDBAB SYSOPERC No system privileges are required for the RMAN user.D Only SYS user can connect and execute RMAN commands on a target database.

考题 单选题A banking user with the userid of ’joe’ is unable to rsh from SYSTEMA to SYSTEMB without having to retype their password, but they can rsh from SYSTEMB to SYSTEMA. No other users are experiencing the same issue.  Both systems have a /home/joe/.rhosts file that contain the proper references to the other host. The /home/joe/.rhosts files on both SYSTEMA and SYSTEMB are owned by userid ’joe’.  Which of the following is the most likely cause of this problem()A User ’joe’ is specified in the /etc/nologin on SYSTEMb.B User ’joe’ is specified in the /etc/nologin on SYSTEMa.C The file permissions on the /home/joe/.rhosts file on SYSTEMA are incorrect.D The file permissions on the /home/joe/.rhosts file on SYSTEMB are incorrect.

考题 单选题The following entry is in the /etc/host.equiv and /home/jsmith/.rhosts file on server Alpha:+ jsmith.What does this entry indicate?()A The user jsmith can use r-commands from any server to server Alpha system-wideB The user jsmith can use r-commands from server Alpha to any server system-wideC The user jsmith can use r-commands from server Alpha to any server with a /home/jsmith directoryD The user jsmith can use r-commands from any server to server Alpha only in the /home/jsmith directory

考题 多选题In Windows XP, how can a user change the programs that run at startup? ()(Select TWO).AAdd or remove programs from the system key of the registry.BAdd or remove programs from the boot.ini file.CAdd or remove programs from the startup folder.DRun msconfig and configure startup programs.ERun appstart and configure startup programs.

考题 单选题A user with the userid of ’joe’ is unable to rsh from SYSTEMA to SYSTEMB without having to retype their password, but they can rsh from SYSTEMB to SYSTEMA.  No other users are experiencing the same issue.Both systems have a /home/joe/.rhosts file that contain the proper references to the other host. The /home/joe/.rhosts files on both SYSTEMA and SYSTEMB are owned by userid ’joe’.  Which of the following is the most likely cause of this problem?()A User ’joe’ is specified in the /etc/nologin on SYSTEMAB User ’joe’ is specified in the /etc/nologin on SYSTEMBC The file permissions on the /home/joe/.rhosts file on SYSTEMA is correct.D The file permissions on the /home/joe/.rhosts file on SYSTEMB is incorrect.

考题 单选题An administrator has set up serverA and serverB to use the /etc/hosts.equiv file so that applications on serverA can remotely run commands on serverB. Which command will verify if a new user from serverA is trusted on serverB?()A As the root user from serverA run the command rhost serverBB As the root user from serverA run the command rlogin serverBC As the desired user from serverB run the command rhost serverAD As the desired user from serverA run the command rlogin serverB

考题 单选题Which of the following procedures should be performed to run diagnostics in single-user mode? ()A  Run standalone diagnostics from the cd. B  Run standalone diagnostics from the AIX tape. C  Run maintenance mode diagnostics from the hard drive. D  Run maintenance mode diagnostics from the diskette. 

考题 单选题A user is unable to determine the default system texteditor. How can the local administrator assist the user by identifying the default text editor for the system?()A Login as the user and run 'echo $ENV'.B Login as root and run the 'env' command.C Login as root and 'cat /etc/environment'.D Login as the user and run the 'env' command.

考题 单选题How are the commands a user is allowed to enter defined in JUNOS?()A Permissions are configured individually for each user.B Users are associated with user classes, and each class defines the permissions for entering commands.C There are four default classes with different permissions and you can only use these four.D Permissions are associated with each user ID

考题 单选题All the database users are presently connected to the database instance and working. The HR user hasopened three database sessions and executed the following command in one of his sessions:SQL UPDATE persons SET ccode=’U031’ WHERE ccode=’U029’; 123 rows updated.SQL DELETE FROM persons WHERE exp=’Y’;3 rows deleted. The SYS user opens a new session after HR executed the above commands.  Which sessions can see theeffect of the UPDATE and DELETE commands()A All sessions of the HR user onlyB All sessions of the HR user and the SYS userC The session of the HR user that executed the commandsD All the sessions for which the database users have access privilege to the PERSONS table