网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Which of the following file systems are native to *nix?()

  • A、FAT
  • B、EXT3
  • C、NTFS
  • D、FAT32

参考答案

更多 “Which of the following file systems are native to *nix?()A、FATB、EXT3C、NTFSD、FAT32” 相关考题
考题 Which of the following dbx commands should be used to obtain a stack trace from a coredump file?()A、trace B、where C、status D、which

考题 After performing a copy backup of a file server, the archive bit on the backed up files will be which of the following?()A、 DeletedB、 UnchangedC、 SetD、 Copied

考题 Which of the following file types can Microsoft servers package for remote installation by default?()A、 .exeB、 .iniC、 .msiD、 .dll

考题 Which of the following attributes is set when a file is ready to be backed up?()A、aB、hC、rD、s

考题 Which of the following commands changes a file characteristic so that it cannot be seen with astandard directory query? ()A、attrib file.txt +hB、attrib file.txt +rC、ren file.txtD、attrib file.txt +s

考题 Which of the following tools is used to report the location of logical partitions of a file system on a physical volume?()A、 lsfsB、 iostatC、 lslv -pD、 lsvg -p

考题 Which of the following tools should be used to analyze the placement of file fragments on a mirrored logical volume?()A、 dfB、 lslvC、 filemonD、 fileplace

考题 Which of the following has NO effect on controlling the access permissions needed to run the "date" command on the remote machine "Earth" using the following syntax?rsh Earth date()。A、The local file: /etc/.netrcB、The remote file: ~/ .rhostsC、The securetcpip commandD、The remote file: /etc/hosts.equiv

考题 An administrator suspects someone is modifying a sensitive file, and wants to log access information for this file. Which of the following AIX component accomplishes this?()A、auditB、syslogC、TCBD、sysck

考题 Which of the following AIX commands will create an NIS map file(s)?()A、pwdadmB、make allC、makedbmD、mkpasswd

考题 When configuring the messaging system, which of the following are valid parameters for the file transport? ()A、File NameB、Operating SystemC、LocationD、HostE、Mode

考题 In a DNS environment, the zone file that maps hostnames to IP address (sometimes called the named.hosts file), is created on which of the following servers?()A、CacheB、PrimaryC、SecondaryD、Primary and secondary

考题 In order to enable remote administration of users and tablespaces on an Oracle database, which of the following types of files must exist in the database?()A、Password file B、Initialization file C、Datafile D、Control file E、Nothing - SYSDBA privileges are not required for these actions

考题 单选题Which of the following has NO effect on controlling the access permissions needed to run the "date" command on the remote machine "Earth" using the following syntax?rsh Earth date()。A The local file: /etc/.netrcB The remote file: ~/ .rhostsC The securetcpip commandD The remote file: /etc/hosts.equiv

考题 单选题In order to enable remote administration of users and tablespaces on an Oracle database, which of the following types of files must exist in the database?()A Password file B Initialization file C Datafile D Control file E Nothing - SYSDBA privileges are not required for these actions

考题 单选题Which of the following is an exclusive feature of the LTO-5 drive?()A NFS File SystemB Micro PartitioningC Encryption capableD IBM Long Term File System