网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
What should an administrator do to set up a required role for a user id that will allow it to start/stop WPARs on the server?()
A

On the desired WPAR:mkrole authorizations=aix.wpar.system newRole setkst -t role chuser roles=newRole default_roles=newRole user1

B

On the global environment:mkrole authorizations=aix.wpar.system newRole setkst -t role chuser roles=newRole default_roles=newRole user1

C

On the desired WPAR:Edit the /etc/security/authorizations file adding:‘newRole authorizations=aix.wpar.system’setkst -t role chuser roles=newRole default_roles=newRole user1

D

On the global environment:Edit the /etc/security/authorizations file adding:‘newRole authorizations=aix.wpar.system’setkst -t role chuser roles=newRole default_roles=newRole user1


参考答案

参考解析
解析: 暂无解析
更多 “单选题What should an administrator do to set up a required role for a user id that will allow it to start/stop WPARs on the server?()A On the desired WPAR:mkrole authorizations=aix.wpar.system newRole setkst -t role chuser roles=newRole default_roles=newRole user1B On the global environment:mkrole authorizations=aix.wpar.system newRole setkst -t role chuser roles=newRole default_roles=newRole user1C On the desired WPAR:Edit the /etc/security/authorizations file adding:‘newRole authorizations=aix.wpar.system’setkst -t role chuser roles=newRole default_roles=newRole user1D On the global environment:Edit the /etc/security/authorizations file adding:‘newRole authorizations=aix.wpar.system’setkst -t role chuser roles=newRole default_roles=newRole user1” 相关考题
考题 You are the administrator of a Junos Pulse Access Control Service implementation. You must restrict authenticated users connected from the branch offices to a few specific resources within the data center. However, when the authenticated users are connected at the corporate office, they are allowed more access to the data center resources.You have created two roles with different levels of access and are trying to determine the best way of controlling when a user is mapped to a specific role. Having the user prompted to manually select their role is possible, but you want to automate the process.Which configuration solves this problem?()A. Implement a RADIUS request attribute policy to assist with realm selection and create different role-mapping rules for the user in each realm.B. Implement a directory/attribute server on the realm and set up this server to determine by group membership the proper role to which a user should be mapped.C. Reorder the role-mapping rules to allow for the more open role to be mapped first and then enable the stop processing rules when this rule matches function on this role.D. Implement a Host Checker policy on the realm that determines the geographic location of the device and restricts the user based on the results of the policy.

考题 Whatshouldanadministratordotosetuparequiredroleforauseridthatwillallowittostart/stopWPARsontheserver?() A.OnthedesiredWPAR:mkroleauthorizations=aix.wpar.systemnewRolesetkst-trolechuser roles=newRoledefault_roles=newRoleuser1B.Ontheglobalenvironment:mkroleauthorizations=aix.wpar.systemnewRolesetkst-trole chuserroles=newRoledefault_roles=newRoleuser1C.OnthedesiredWPAR:Editthe/etc/security/authorizationsfileadding:‘newRoleauthorizations=aix.wpar.system’setkst-trolechuserroles=newRoledefault_roles=newRoleuser1D.Ontheglobalenvironment:Editthe/etc/security/authorizationsfileadding:‘newRoleauthorizations=aix.wpar.system’setkst-trolechuserroles=newRoledefault_roles=newRoleuser1

考题 What should an administrator do to set up a required role for a user id that will allow it to start/stop WPARs on the server?()A、On the desired WPAR:mkrole authorizations=aix.wpar.system newRole setkst -t role chuser roles=newRole default_roles=newRole user1B、On the global environment:mkrole authorizations=aix.wpar.system newRole setkst -t role chuser roles=newRole default_roles=newRole user1C、On the desired WPAR:Edit the /etc/security/authorizations file adding:‘newRole authorizations=aix.wpar.system’setkst -t role chuser roles=newRole default_roles=newRole user1D、On the global environment:Edit the /etc/security/authorizations file adding:‘newRole authorizations=aix.wpar.system’setkst -t role chuser roles=newRole default_roles=newRole user1

考题 Which step do you need to perform to enable a user with the SYSDBA privilege to log in as SYSDBA in iSQL*Plus?()A、The user must be granted the database administrator (DBA) privilege.B、The user must be listed in the password file for the authentication.C、No special setup is needed for the user to connect as SYSDBA in iSQL*Plus.D、Set up a user in the Oracle Application Server Containers for J2EE (OC4J) user manager,and grant the webDba role to the user.

考题 You work as a database administrator for Certkiller .com. While granting a role,SELECT_CATALOG_ROLE, to a user, Certkiller, using Oracle Enterprise Manager 10g Database Control, you have cleared the DEFAULT check box. What will be the result?()A、The user cannot use the role at all.B、The role would not be granted to the user.C、The user needs to enable the role explicitly.D、The user can start using the role immediately.E、The user would have the admin option for the role.

考题 A system administrator receives a new server and has booted the system for the first time. The administrator has set up the terminals and users. The user start to log on. Root is logged in on the console. When additional users start to log in, an error is displayed stating that All available login sessions are in use. Which of the following steps should be followed to resolve this problem?()A、Permissions on /etc/security were changed in error; do a chmod 755 on /etc/security directory.B、Increase the number of licenses; using smit chaili censeC、Change the Maximum number of PROCESSES allowed per user variable; using smit chgsys.D、Change User can logi field from false to true: using smit chuser.

考题 Which role should a site administrator assign to a user in the selling organization to allow the user to manage suborganizations and users in their organization?()A、Organization AdministratorB、SellerC、Seller AdministratorD、Store AdministratorE、Account Representative

考题 An administrator has created three different Odyssey Access Client preconfiguration files and assigned them to three different roles in the same realm.Which action should the administrator take to ensure that users get the correct Odyssey Access Client preconfiguration file?()A、Configure each user account in the auth server with the appropriate Odyssey Access Client preconfiguration files.B、Configure the role-mapping rules with the appropriate Odyssey Access Client preconfiguration files.C、Ensure that merge roles is selected in the role-mapping rules.D、Ensure that the first role a user is mapped to is the role with the appropriate Odyssey Access Client preconfiguration file.

考题 Which additional configuration must be completed when setting up role restrictions using certificates? ()A、Set up a certificate authentication server.B、Configure the authentication realm to remember certificate information.C、Configure the authentication realm to use a certificate server for authentication.D、Configure a role mapping rule requiring certification information to map user to role.

考题 View the Exhibit to observe the roles assigned to the SL_REP user.  Which statement is true about theassignment of the SELECT_CATALOG_ROLE role to the SL_REP user()A、The user must enable the role explicitly.B、The user can grant the role to other users.C、The user cannot use the role until the DBA enables it explicitly.D、The user can start using the role immediately without any changes

考题 .Your companys virtual environment includes Windows Server 2008 R2 Hyper-V servers. You manage the environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You need to provide a user with the ability to perform only the Create, Delete, Start, Stop, Pause, Resume, and Shut Down virtual machine (VM) management tasks on your host servers .  What should you do?()A、In VMM,create a Self-Service user role.B、In VMM,create a Delegated Administrator user role.C、In VMM,assign the Local Administrator permission for the host servers to the user.D、In Authorization Manager, create a role on the users client computer and add the user to this role.

考题 You are the Exchange administrator for your organization.You need to move a user’s mailbox from the mailbox server role of an Exchange 2007 SP2 server to the mailbox server role of an Exchange 2010 server in the same forest.You must ensure that the end-user can still access their e-mail account.What action should you take?()A、Run the Move-Mailbox cmdletB、Run the New-MoveRequest cmdletC、Use the Exchange Management console to issue a New Remote Move RequestD、Run the Set-MailboxDatabaseCopy cmdlet

考题 You need to define an authentication system for the main office database administrators. The setup should require the minimum amount of administrative effort. The authentication environment must fulfill the company’s security requirements.What should you do?()A、Create a SQL Server login with Windows Authentication for each main office database administrator.Add all of these logins to the db_owner role in each database.B、Create a SQL Server login with SQL Server Authentication for each main office database administrator.Add all of these logins to the sysadmin role.C、Create a Windows global group named DBAdmins. Add each main office database administrator’s Windows user account to the Windows DBAdmins group.Create a SQL Server login with Windows Authentication for the group.Add the group to the serveradmin fixed server role.D、Add each main office database administrator’s Windows user account to the Windows SQLManagersgroup.

考题 You create a Web site that is for members only. The behavior of the Web site changes according to the role of the user. The Web site uses the ASP.NET Membership control for creation of user accounts. You need to find out whether a user is a member of a particular role. What should you do?()A、Pass the user names and passwords to Membership.ValidateUser.B、Pass the role names to User.IsInRole.C、Pass the role names to Roles.RoleExists.D、Pass the user names to Membership.GetUser.

考题 Your company has an Active Directory Domain Services (AD DS) domain that includes an AD security group named Monitoring. You are configuring a Windows Server 2008 R2 Hyper-V server that hosts several virtual machines (VMs). You need to ensure that members of the Monitoring group can only stop and start VMs on the host server. What should you do?()A、Add the Monitoring group to the Server Operators AD security group.B、In Authorization Manager, add the Monitoring group to the Administrator role in the default scope.C、In Authorization Manager, create a task that includes the Stop Virtual Machine and Start Virtual Machine operations. Add the task to the Administrator role.D、In Authorization Manager, create a role in the default scope. Add the Stop Virtual Machine and Start Virtual Machine operations to the role. Assign the Monitoring group to the role.

考题 单选题You are the Exchange administrator for your organization.You need to move a user’s mailbox from the mailbox server role of an Exchange 2007 SP2 server to the mailbox server role of an Exchange 2010 server in the same forest.You must ensure that the end-user can still access their e-mail account.What action should you take?()A Run the Move-Mailbox cmdletB Run the New-MoveRequest cmdletC Use the Exchange Management console to issue a New Remote Move RequestD Run the Set-MailboxDatabaseCopy cmdlet

考题 单选题Your company has an Active Directory Domain Services (AD DS) domain that includes an AD security group named Monitoring. You are configuring a Windows Server 2008 R2 Hyper-V server that hosts several virtual machines (VMs). You need to ensure that members of the Monitoring group can only stop and start VMs on the host server. What should you do?()A Add the Monitoring group to the Server Operators AD security group.B In Authorization Manager, add the Monitoring group to the Administrator role in the default scope.C In Authorization Manager, create a task that includes the Stop Virtual Machine and Start Virtual Machine operations. Add the task to the Administrator role.D In Authorization Manager, create a role in the default scope. Add the Stop Virtual Machine and Start Virtual Machine operations to the role. Assign the Monitoring group to the role.

考题 单选题View the Exhibit to observe the roles assigned to the SL_REP user.  Which statement is true about theassignment of the SELECT_CATALOG_ROLE role to the SL_REP user()A The user must enable the role explicitly.B The user can grant the role to other users.C The user cannot use the role until the DBA enables it explicitly.D The user can start using the role immediately without any changes

考题 单选题You work as a database administrator for Certkiller .com. While granting a role,SELECT_CATALOG_ROLE, to a user, Certkiller, using Oracle Enterprise Manager 10g Database Control, you have cleared the DEFAULT check box. What will be the result?()A The user cannot use the role at all.B The role would not be granted to the user.C The user needs to enable the role explicitly.D The user can start using the role immediately.E The user would have the admin option for the role.

考题 单选题What should an administrator do to set up a required role for a user id that will allow it to start/stop WPARs on the server?()A On the desired WPAR:mkrole authorizations=aix.wpar.system newRole setkst -t role chuser roles=newRole default_roles=newRole user1B On the global environment:mkrole authorizations=aix.wpar.system newRole setkst -t role chuser roles=newRole default_roles=newRole user1C On the desired WPAR:Edit the /etc/security/authorizations file adding:‘newRole authorizations=aix.wpar.system’setkst -t role chuser roles=newRole default_roles=newRole user1D On the global environment:Edit the /etc/security/authorizations file adding:‘newRole authorizations=aix.wpar.system’setkst -t role chuser roles=newRole default_roles=newRole user1

考题 单选题.Your companys virtual environment includes Windows Server 2008 R2 Hyper-V servers. You manage the environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You need to provide a user with the ability to perform only the Create, Delete, Start, Stop, Pause, Resume, and Shut Down virtual machine (VM) management tasks on your host servers .  What should you do?()A In VMM,create a Self-Service user role.B In VMM,create a Delegated Administrator user role.C In VMM,assign the Local Administrator permission for the host servers to the user.D In Authorization Manager, create a role on the users client computer and add the user to this role.

考题 单选题You create a Web site that is for members only. The behavior of the Web site changes according to the role of the user. The Web site uses the ASP.NET Membership control for creation of user accounts. You need to find out whether a user is a member of a particular role. What should you do? ()A Pass the user names and passwords to Membership.ValidateUser.B Pass the role names to User.IsInRole.C Pass the role names to Roles.RoleExists.D Pass the user names to Membership.GetUser.

考题 单选题An administrator has created three different Odyssey Access Client preconfiguration files and assigned them to three different roles in the same realm.Which action should the administrator take to ensure that users get the correct Odyssey Access Client preconfiguration file?()A Configure each user account in the auth server with the appropriate Odyssey Access Client preconfiguration files.B Configure the role-mapping rules with the appropriate Odyssey Access Client preconfiguration files.C Ensure that merge roles is selected in the role-mapping rules.D Ensure that the first role a user is mapped to is the role with the appropriate Odyssey Access Client preconfiguration file.

考题 单选题You are the administrator of a Junos Pulse Access Control Service implementation. You must restrict authenticated users connected from the branch offices to a few specific resources within the data center. However, when the authenticated users are connected at the corporate office, they are allowed more access to the data center resources. You have created two roles with different levels of access and are trying to determine the best way of controlling when a user is mapped to a specific role. Having the user prompted to manually select their role is possible, but you want to automate the process. Which configuration solves this problem?()A Implement a RADIUS request attribute policy to assist with realm selection and create different role-mapping rules for the user in each realm.B Implement a directory/attribute server on the realm and set up this server to determine by group membership the proper role to which a user should be mapped.C Reorder the role-mapping rules to allow for the more open role to be mapped first and then enable the stop processing rules when this rule matches function on this role.D Implement a Host Checker policy on the realm that determines the geographic location of the device and restricts the user based on the results of the policy.

考题 单选题Two Exchange Servers 2010 has Mailbox Servers.You create a DAG.You need to install all of Failover Clustering Components on Mailbox Servers. What should you do?()A Add both Servers to DAGB Install Application Server Role on both ServersC Run Setup /Roles:MB /NewCMS on both serversD Run Start -clusteredMailboxServer cmdlet on both servers

考题 单选题You need to define an authentication system for the main office database administrators. The setup should require the minimum amount of administrative effort. The authentication environment must fulfill the company’s security requirements.What should you do?()A Create a SQL Server login with Windows Authentication for each main office database administrator.Add all of these logins to the db_owner role in each database.B Create a SQL Server login with SQL Server Authentication for each main office database administrator.Add all of these logins to the sysadmin role.C Create a Windows global group named DBAdmins. Add each main office database administrator’s Windows user account to the Windows DBAdmins group.Create a SQL Server login with Windows Authentication for the group.Add the group to the serveradmin fixed server role.D Add each main office database administrator’s Windows user account to the Windows SQLManagersgroup.

考题 单选题Which role should a site administrator assign to a user in the selling organization to allow the user to manage suborganizations and users in their organization?()A Organization AdministratorB SellerC Seller AdministratorD Store AdministratorE Account Representative

考题 单选题A system administrator receives a new server and has booted the system for the first time. The administrator has set up the terminals and users. The user start to log on. Root is logged in on the console. When additional users start to log in, an error is displayed stating that All available login sessions are in use. Which of the following steps should be followed to resolve this problem?()A Permissions on /etc/security were changed in error; do a chmod 755 on /etc/security directory.B Increase the number of licenses; using smit chaili censeC Change the Maximum number of PROCESSES allowed per user variable; using smit chgsys.D Change User can logi field from false to true: using smit chuser.