网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
How can permissions be set up on /tmp so that a user cannot delete another user’s files?()
A

chmod +s /tmp

B

chmod 775 /tmp

C

chmod 1777 /tmp

D

chmod 4755 /tmp


参考答案

参考解析
解析: 暂无解析
更多 “单选题How can permissions be set up on /tmp so that a user cannot delete another user’s files?()A chmod +s /tmpB chmod 775 /tmpC chmod 1777 /tmpD chmod 4755 /tmp” 相关考题
考题 How are the commands a user is allowed to enter defined in JUNOS?() A.Permissions are configured individually for each user.B.Users are associated with user classes, and each class defines the permissions for entering commands.C.There are four default classes with different permissions and you can only use these four.D.Permissions are associated with each user ID

考题 A user cannot access files on /deps/it directory, the administrator verifies permissions are set for the directory. Which of the following actions need to be performed to only grant read access to the user on the IT directory?()A. Set folder permissions to 760.B. Set folder permissions to 770.C. Set folder permissions to modifyD. Set folder permissions to full control

考题 You have a computer that runs Windows Vista.You need to configure your computer so that you can interact with your desktop when you are prompted for user account control permissions.What should you do?()A.AB.BC.CD.D

考题 A user cannot access files on /deps/it directory, the administrator verifies permissions are set rw-------for the directory.  Which of the following actions need to be performed to only grant read access to the user on the IT directory?()A、 Set folder permissions to 760.B、 Set folder permissions to 770.C、 Set folder permissions to modify.D、 Set folder permissions to full control.

考题 A user can ping everything on the local network earth.net from an AIX box (which is located on earth.net). However, if the user tries to ping something on another network (mars.net) the user must type the fully qualified hostname. What can the user do so that the fully qualified hostname does not have to be typed every time the user wants to access ANY machine on mars.net?()A、Edit the /etc/hosts file and add an alias to the correct entryB、Set up an alias in his .kshrc file to alias the hostname to the fully qualified hostnameC、Add an alias to /etc/aliasesD、Add mars.net to the search path of the resolv.conf file

考题 How do oyu write the current candidate configuration to the permanent storage media?()A、[edit] user@router# save /var/tmp/current.confB、[edit] user@router# write /var/tmp/current.confC、[edit] user@router# commit /var/tmp/current.confD、[edit] user@router# dump /var/tmp/current.conf

考题 How are the commands a user is allowed to enter defined in JUNOS?()A、Permissions are configured individually for each user.B、Users are associated with user classes, and each class defines the permissions for entering commands.C、There are four default classes with different permissions and you can only use these four.D、Permissions are associated with each user ID

考题 A user cannot access files on /deps/it directory, the administrator verifies permissions are set for the directory. Which of the following actions need to be performed to only grant read access to the user on the IT directory?()A、Set folder permissions to 760.B、Set folder permissions to 770.C、Set folder permissions to modifyD、Set folder permissions to full control

考题 You are asked to free up disk space so you can update your version of the Junos OS.Which two commands display the files that will be removed?()A、user@router request system storage cleanupB、user@router show system storageC、user@router request system storage cleanup dry-runD、user@router show system storage detail

考题 Which of the following is a differentiating feature of file permissions as compared to share permissions?()A、File permissions are less granular than share permissions.B、Full control can only be set using file permissions.C、File permissions are more granular than share permissions.D、Full control can only be set using share permissions.

考题 A network consultant is asked to set up a wireless network in a home. The home user wants the wireless network to be available in every comer of the house. Which of the following additional information will the technician need to determine the equipment for the installation? ()(Select TWO)A、The length of the houseB、How many rooms are in the houseC、How many users will be using the wireless networkD、The building material of the houseE、The cost of the house

考题 A system administrator receives a new server and has booted the system for the first time. The administrator has set up the terminals and users. The user start to log on. Root is logged in on the console. When additional users start to log in, an error is displayed stating that All available login sessions are in use. Which of the following steps should be followed to resolve this problem?()A、Permissions on /etc/security were changed in error; do a chmod 755 on /etc/security directory.B、Increase the number of licenses; using smit chaili censeC、Change the Maximum number of PROCESSES allowed per user variable; using smit chgsys.D、Change User can logi field from false to true: using smit chuser.

考题 A user reports that they cannot cd to /tmp/application. A system administrator entered the following command:   (1)ls -ld /tmp/application   (2)drw-r--r-- 4 root system 512 Jan 15 14:09 application   What is the most likely cause of the problem?()A、The /tmp/application should be globally writable.B、The /tmp/application directory should be executable.C、The /tmp/application directory should be owned by the user.D、The /tmp/application directory should have the sticky bit set.

考题 An administrator has set up serverA and serverB to use the /etc/hosts.equiv file so that applications on serverA can remotely run commands on serverB. Which command will verify if a new user from serverA is trusted on serverB?()A、As the root user from serverA run the command rhost serverBB、As the root user from serverA run the command rlogin serverBC、As the desired user from serverB run the command rhost serverAD、As the desired user from serverA run the command rlogin serverB

考题 What are three actions performed by the mysql_secure_installation tool?()A、It prompts you to set the root user account passwordB、It checks whether file permissions are appropriate within datadirC、It asks to remove the test database, which is generated at installation timeD、It can delete any anonymous accountsE、It verifies that all users are configuration with the longer password hash

考题 单选题A user reports that they cannot cd to /tmp/application. A system administrator entered the following    command: Is -Id /tmp/application   drw-r-r- 4 root system 512 Jan 15 14:09 application Which of the following is the most likely cause of the  problem()A The /tmp/application should be globally writable.B The /tmp/application directory should be executable.C The /tmp/application directory should be owned by the user.D The /tmp/application directory should have the sticky bit set

考题 单选题A user cannot access files on /deps/it directory, the administrator verifies permissions are set for the directory. Which of the following actions need to be performed to only grant read access to the user on the IT directory?()A Set folder permissions to 760.B Set folder permissions to 770.C Set folder permissions to modifyD Set folder permissions to full control

考题 单选题Which statement is true regarding the password-recovery process?()A You must have a console connectionB You cannot set the console port to an insecure modeC You must press the Enter key so that you can boot into single-user modeD When prompted to enter the full pah name of the shell you must press the Enter key

考题 单选题You work as the enterprise exchange administrator at Xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution.It has come to the attention of Xxx management that a network user named Rory Allen is using Exchange ActiveSync to abuse the company’s e-mail policy by downloading huge attachments that does not pertain to his work detail.Consequently you receive instruction from Xxx to restrict the attachments size for Rory Allen’s to 100 KB. How can you achieve the goal by ensure that only Rory Allen is restricted?()A You must set up a new ActiveSync Device Access rule.B You must set up a managed folder mailbox policy.C You must set up a new role assignment policy.D You must set up Outlook Protection Rules.

考题 单选题You are a systems administrator responsible for managing a Windows Server 2008 Web server. Recently,your organization set up a new IIS Web site that will be accessed by users outside of your organizations.Consultants should be able to connect to this Web site, using IIS Manager. Your organization’s securitypolicy prevents you from creating domain accounts or local user accounts for these users. You attempt touse the IIS Manager Permissions feature for the Web site. However, when you click Allow User, you areable to select only Windows users.  How can you resolve this problem?()A Verify that Management Service has been started.B Reconfigure the file system permissions for the root folder of the Web site.C Reconfigure Management Service to enable Windows And IIS Manager Credentials.D Verify the Authentication settings for the Web site.

考题 单选题An administrator has set up serverA and serverB to use the /etc/hosts.equiv file so that applications on serverA can remotely run commands on serverB. Which command will verify if a new user from serverA is trusted on serverB?()A As the root user from serverA run the command rhost serverBB As the root user from serverA run the command rlogin serverBC As the desired user from serverB run the command rhost serverAD As the desired user from serverA run the command rlogin serverB

考题 单选题Which statement is true regarding the password-recovery process?()A You must have a console connection.B You cannot set the console port to an insecure mode.C You must press the Enter key so that you can boot into single-user mode.D When prompted to enter the full pathname of the shell, you must press the Enter key.

考题 单选题Which of the following is a differentiating feature of file permissions as compared to share permissions?()A  File permissions are less granular than share permissions.B  Full control can only be set using file permissions.C  File permissions are more granular than share permissions.D  Full control can only be set using share permissions.

考题 单选题How can permissions be set up on /tmp so that one user in a group cannot delete another user’s files in that same group()A chmod +s /tmpB chmod 755 /tmpC chmod 1777 /tmpD chmod 4755 /tmp

考题 单选题How do you write the current candidate configuration to the permanent storage media?()A [edit] user@router# save /var/tmp/current.confB [edit] user@router# write /var/tmp/current.confC [edit] user@router# commit /var/tmp/current.confD [edit] user@router# dump /var/tmp/current.conf

考题 单选题How are the commands a user is allowed to enter defined in JUNOS?()A Permissions are configured individually for each user.B Users are associated with user classes, and each class defines the permissions for entering commands.C There are four default classes with different permissions and you can only use these four.D Permissions are associated with each user ID

考题 单选题A user cannot access files on /deps/it directory, the administrator verifies permissions are set rw-------for the directory.  Which of the following actions need to be performed to only grant read access to the user on the IT directory?()A  Set folder permissions to 760.B  Set folder permissions to 770.C  Set folder permissions to modify.D  Set folder permissions to full control.