网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which action changes the default editor for ALL users on the system from vi to edit of the following?()
A

Issue the command:  export EDITOR=/usr/bin/edit

B

Modify /.profile and change the EDITOR variable to /usr/bin/edit

C

Modify /etc/environment and add  EDITOR=/usr/bin/edit  export EDITOR

D

Modify /etc/security/defaults and change the EDITOR value to /usr/bin/edit


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which action changes the default editor for ALL users on the system from vi to edit of the following?()A Issue the command:  export EDITOR=/usr/bin/editB Modify /.profile and change the EDITOR variable to /usr/bin/editC Modify /etc/environment and add  EDITOR=/usr/bin/edit  export EDITORD Modify /etc/security/defaults and change the EDITOR value to /usr/bin/edit” 相关考题
考题 Which form of BGP changes the BGP Next Hop attribute by default?() A.IBGPB.EBGPC.CBGPD.MBGP

考题 Which two statements are true about the configure exclusive command?() A. It allows users to retain all uncommitted changes when exiting exclusive configuration mode.B. It allows multiple users to edit private copies of the configuration concurrently.C. It causes the loss of all uncommitted changes when exiting exclusive configuration mode.D. It excludes other users from editing the configuration.

考题 Which of the following is true when Bob, a technician, is setting default security permissions on a folder?()A、There are no significant changes to other files.B、The created folder inherits the most restrictive permissions within the folder.C、The permissions are inherited by all files and folders within that folder.D、All folders within that folder are given a restrictive password.

考题 Which two statements are true about firewall filter configurations?()A、Multiple action modifiers can be included in the same term.B、Only a single action modifier can be included in the same term.C、The default term within a firewall filter uses the discard action.D、The default term within a firewall filter uses the reject action.

考题 A routing policy has three terms and the first term of the policy does not contain a terminating action. What will become of the routes after they have been evaluated by the first term?()A、In the absence of a terminating action, all routes are accepted.B、The route will be evaluated by the second term in the policy.C、The default action will be applied.D、In the absence of a termination action, all routes are rejected.

考题 Which two statements apply when a user has entered private configuration mode by typing configure private?()A、All users have their own active configuration.B、All users have their own private candidate configuration.C、When a user commits, all nonconflicting changes made by all users are committed.D、When a user commits, only the user's own changes are committed.

考题 Which action changes the default editor for ALL users on the system from vi to edit?()A、Issue the command:export EDITOR=/usr/bin/edit edit each users .profile to change the EDITOR value to /usr/bin/editB、Modify /.profile and change the EDITOR variable to /usr/bin/editC、Modify /etc/environment and add EDITOR=/usr/bin/edit export EDITORD、Modify /etc/security/defaults and change the EDITOR value to /usr/bin/edit

考题 A companys computer policy dictates that all users workstations must use the companys corporate web page as their default home page.  Which of the following methods should an administrator use to BEST comply with this policy?()A、 Configure a logon script to set the homepage at logon.B、 Set the default homepage to the corporate website in Group Policy.C、 Manually configure the homepage on all workstations and setup trace logs to ensure compliance.D、 Set the default homepage to the corporate website on the base computer image.

考题 Which of the following is the default directory for User Profiles in Windows 7?()A、C:/ProfilesB、C:/User ProfilesC、C:/Users/ProfilesD、C:/Users

考题 When setting security permissions on a folder, which of the following properties apply?()A、Guest users are allowed changed permissions.B、All sub-folders inherit the most restrictive permissions within the folder.C、All sub-folders within that folder are given a password.D、By default, read permissions are denied on all files within the folder.

考题 A system administrator wants to configure a system so that all new users will be put into the database group by default. How would this be accomplished?()A、remove all other groups from the systemB、run the command mkuser -default "GROUP=database"C、change the default group in /usr/lib/security/mkuser.defaultD、edit /etc/security/group to move all users to the database stanza

考题 A System p administrator needs to set the default password length for all users to six characters.  Which of the following files needs to be edited to accomplish this ()A、/etc/security/limitsB、/etc/security/mkuser.sysC、/etc/security/privD、/etc/security/user

考题 Companycom has just installed a p5 595 with four uncapped LPARs in a shared processor pool. The system and profile settings are still in their default states. One of the LPARs has an application that is consuming all of the available shared processor resources. Users of this application are complaining about response time. Which of the following changes to the slow LPAR would improve response time?()A、Enable SMTB、Reduce the weightC、Renice the processD、Increase the weight

考题 Which two statements apply when a user has entered private configuration mode by typing configure private? ()A、All users have their own active configurationB、All users have their own private candidate configurationC、When a user commits, all nonconflicting changes made by all users are commitedD、When a user commits, only the user's own changes are commited

考题 Which two statements apply when a user has entered private configuration mode by typing configure private?()A、All users have their own active configurationB、All users have their own private candidate configurationC、When a user commits, all non conflicting changes made by all users are commitedD、When a users commits, only the user's own changes are commited

考题 View the Exhibit.You executed the following command to perform a backup of the USERS tablespace: RMAN BACKUP TABLESPACE USERS;  Which three types of files are backed up? ()A、 all the data files belonging to the USERS tablespaceB、 password fileC、 online redo log filesD、 the current control fileE、 archived redo log filesF、 the current server parameter fileG、 data files belonging to the USERS tablespace and all the default tablespaces

考题 单选题A system administrator wants to configure a system so that all new users will be put into the database group by default. How would this be accomplished?()A remove all other groups from the systemB run the command mkuser -default GROUP=databaseC change the default group in /usr/lib/security/mkuser.defaultD edit /etc/security/group to move all users to the database stanza

考题 单选题Which form of BGP changes the BGP Next Hop attribute by default?()A IBGPB EBGPC CBGPD MBGP

考题 多选题Which two statements are true about the configure exclusive command?()AIt allows users to retain all uncommitted changes when exiting exclusive configuration mode.BIt allows multiple users to edit private copies of the configuration concurrently.CIt causes the loss of all uncommitted changes when exiting exclusive configuration mode.DIt excludes other users from editing the configuration.

考题 多选题View the Exhibit.You executed the following command to perform a backup of the USERS tablespace: RMAN BACKUP TABLESPACE USERS;  Which three types of files are backed up? ()Aall the data files belonging to the USERS tablespaceBpassword fileConline redo log filesDthe current control fileEarchived redo log filesFthe current server parameter fileGdata files belonging to the USERS tablespace and all the default tablespaces

考题 单选题You are a systems administrator responsible for deploying Windows SharePoint Services (WSS) for accessby users from an external business partner. You have installed the appropriate server role and have verified that the SharePoint Web site loads properly from the local server computer. All options are usingtheir installation default values. External users report that they cannot log on to the site. Which of thefollowing changes should you make to resolve the problem?()A Create a new site within an existing site collection for the external users.B Create a new site collection for the external users.C Change the authentication mode for the Web application to Forms authentication.D Modify the User Permissions For Web Applications settings.

考题 单选题You work as a database administrator for Supportcenter.cn. You find that users with DBA role are using more CPU resources than what is allocated in their profiles. Which action would you take to ensure that resources limits are imposed on these users?()A Assign the DEFAULT profile to the usersB Set the RESOURCE_LIMIT parameter to TRUE in the parameter fileC Create a new profile with CPU restrictions and assign it to the usersD Specify the users as members of the DEFAULT_CONSUMER_GROUPE Revoke the DBA role and grant CONNECT and RESOURCE role to the users

考题 多选题Which two statements apply when a user has entered private configuration mode by typing configure private?()AAll users have their own active configurationBAll users have their own private candidate configurationCWhen a user commits, all non conflicting changes made by all users are commitedDWhen a users commits, only the user's own changes are commited

考题 多选题Which two statements apply when a user has entered private configuration mode by typing configure private? ()AAll users have their own active configurationBAll users have their own private candidate configurationCWhen a user commits, all nonconflicting changes made by all users are commitedDWhen a user commits, only the user's own changes are commited

考题 单选题The DBA is defining role for users. Which of the following is not an acceptable method for defining a default role?()A ALTER USER DEFAULT ROLE ALLB ALTER USER DEFAULT ROLE ALL EXCEPT ROLE_1C ALTER USER DEFAULT ROLE NONED ALTER USER DEFAULT ROLE NONE EXCEPT ROLE_1

考题 多选题Which two statements apply when a user has entered private configuration mode by typing configure private?()AAll users have their own active configuration.BAll users have their own private candidate configuration.CWhen a user commits, all nonconflicting changes made by all users are committed.DWhen a user commits, only the user's own changes are committed.

考题 单选题Which action change the default editor for ALL users on the system from vi to edit()A Issue the command: export EDITOR=/usr/bin/edit edit each user .profile to change the EDITOR value to /usr/bin/editB Modify /.profile and change the EDITOR variable to /usr/bin/editC Modify /etc/environment and add EDITOR=/usr/bin/edit export EDITORD Modify /etc/security/defaults and change the EDITOR value to /usr/bin/edit