网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You have read/write permission on an ordinary file foo. You have just run In foo bar. What would happen if you ran rm foo?()
A

 foo and bar would both be removed.

B

 foo would be removed while bar would remain accessible.

C

 foo would be removed, bar would still exist but would be unusable.

D

 Both foo and bar would remain accessible.

E

 You would be asked whether bar should be removed.


参考答案

参考解析
解析: 暂无解析
更多 “单选题You have read/write permission on an ordinary file foo. You have just run In foo bar. What would happen if you ran rm foo?()A  foo and bar would both be removed.B  foo would be removed while bar would remain accessible.C  foo would be removed, bar would still exist but would be unusable.D  Both foo and bar would remain accessible.E  You would be asked whether bar should be removed.” 相关考题
考题 You are the administrator of some of TestKing‘s file servers. Peter is hired as an intern in the human resources department. Peter needs access to some HR files. He also needs to be able to read the file named Handbook.doc, but he must not be able to make changes to it.Handbook.doc exists in a folder named HRResources. Peter needs to have Read and Modify permissions for the other files in the HRResources folder.Peter is a member of the Domain Users group and the HR group. The permissions on the HRResources folder are shown in the following table.You need to ensure that Peter can access the appropriate files and that he cannot make changes to Handbook.doc.What should you do?()A. Set the hidden and system attributes on Handbook.Doc.B. Disable permissions inheritance on Handbook.doc.C. Assign Peter the Allow-Read permission for Handbook.doc.D. Assign Peter the Deny-Write NTFS permission for Handbook.doc.

考题 To understand a word, you have to read all the letters in it; to understand a sentence you have to read all the words in it.()A对B错

考题 To understand a word, you have to read all the letters in it; to understand a sentence you have to read all the words in it.()

考题 You have enabled backup optimization for the RMAN environment.Identify two criteria on which RMAN will skip the file, if it has already been backed up.()A、The data file backup is done with multiple channelsB、The data files is in the read-write mode after being backed up in the read only modeC、The backup was taken after the data files was taken offline-normal or is in the read only modeD、The data file backup complies with the back retention policy and the backup duplexing feature

考题 You have read/write permission on an ordinary file foo. You have just run In foo bar. What would happen if you ran rm foo?()A、 foo and bar would both be removed.B、 foo would be removed while bar would remain accessible.C、 foo would be removed, bar would still exist but would be unusable.D、 Both foo and bar would remain accessible.E、 You would be asked whether bar should be removed.

考题 You work as a database administrator for Supportcenter.cn. You are using Recovery Manager (RMAN) to perform backups in your databases. Which four backup operations can be performed using RMAN?()A、A backup of the target database when it is mountedB、A backup of online redo log files when the database is openC、A backup of only used data blocks in the file beingbeingbackup upD、A backup of online, read/write data files when the database is openE、A backup of only those data blocks that have changed since a previous backupF、A backup of online, read/write data files when the database is in the NOMOUNT state.

考题 You have a read-only tablespace on read-only media. You want to perform a media recovery on the existing data files, but using a backup control file. The backup control file indicates that the status of the read-only tablespace was read/write when the control file was backed up. What should you consider?()A、 take data files from the read-only tablespace offline before performing a recoveryB、 recovery using backup control file is not possible, so restore all the files from the last full database backup, and then open the databaseC、 drop the read-only tablespace and re-create the tablespace after recoveryD、 perform a recovery; status of the tablespace in control file will be changed automatically

考题 Your network consists of a single Active Directory domain. The domain includes a group named SalesUsers. You have a file server that runs Windows Server 2003 Service Pack 2 (SP2). The server has a folder named CorpData. You share the CorpData folder and assign the Domain Users group the Full Control share permission. In the CorpData folder, you create a folder named Sales. You need to configure security for the Sales folder to meet the following requirements: ·Members of the SalesUsers group must be able to read, create, and modify all files and folders. ·All other users must be able to view items in the folder. What should you do? ()A、On the Sales folder, block permission inheritance and remove permissions. Assign the Allow - Modify permission to the SalesUsers group.B、On the Sales folder, block permission inheritance and copy permissions. On the Sales folder, assign the Allow - Modify permission to the SalesUsers group.C、On the CorpData share, change the share permission for Domain Users to Read. On the Sales folder, assign the Allow - Modify permissions to the SalesUsers group.D、On the CorpData folder, block permission inheritance and remove permissions. In the Sales folder, assign the Allow - Modify permissions to the SalesUsers group.

考题 You work as a Web Developer at Certkiller.com. You are in the process of creating a Webapplication using Microsoft ASP.NET 3.5.  You need to ensure that the application is able to load staff information from an XML file into aDataSet instance. The XML file contains an inline schema. You have to call a method of theDataSet class in order to load the information.  Identify how you can accomplish this?()A、You should call the ReadXml method with the ReadSchema XML read mode.B、You should call the ReadXml method with the InferTypedSchema XML read mode.C、You should call the ReadXmlSchema method.D、You should call the ReadXml method with the InferSchema XML read mode.

考题 You are the desktop administrator for Contoso, Ltd. The company's network contains 1,000 Windows XP Professional computers, which are members of a single Active Directory domain. The computers' hard disks are formatted as NTFS. The company's software developers release a new custom application. The application uses a .dll file named AppLib.dll, which is installed in a folder named /Program Files/Contoso/OpsApp. The company's help desk technicians report that several users experience problems when they use the application because the AppLib.dll file was deleted on their client computers. The company's software developers recommend that you modify the file permissions on AppLib.dll so that users have only Read permission on the file. You need to ensure that all users have only Read permission on the AppLib.dll file on all 1,000 Windows XP Professional computers. What should you do?() A、Write a logon script that moves the AppLib.dll file into the %systemroot%/System32 folder.B、Ensure that Windows File Protection is enabled on all 1,000 Windows XP Professional computers.C、Apply the logon script to all domain user accounts. D、Use the Security Configuration and Analysis console to create a new security template that modifies the file permissions on AppLib.dll. E、Use Active Directory Group Policy to import and apply the template to all 1,000 Windows XP Professional computers. F、Repackage the custom application in a Windows Installer package. 

考题 Your company plans to distribute an application to all of its client computers by using GroupPolicy. You save a file named setup.msi to a local folder on the domain controller. You assign the Authenticated Users group the Read and Read  Execute permissions for the folder. You create a new Group Policy  object (GPO) and a new Computer Configuration software installation package, and you point the package to the setup.msi file in the local folder. You link the GPO to an organizational unit (OU) that contains a computer object for a test client computer. When you log on to the test client computer, you  notice that the application is not installed. You need to ensure that the application is installed on the test computer.  What should you do?()A、 Modify the permissions on the folder that contains the setup.msi file so that authenticated users have the List Folder Contents permission. Log off the client computer and then log on.B、 Modify the permissions on the folder that contains the setup.msi file so that authenticated users have the List Folder Contents permission. Restart the client computer.C、 Place the setup.msi file into a shared folder. Modify the software installation package to point to the shared folder. Log off the client computer and then log on.D、 Place the setup.msi file into a shared folder. Modify the software installation package to point to the shared folder. Restart the client computer.

考题 You are developing a class library that will open the network socket connections to computers on the network. You will deploy the class library to the global assembly cache and grant it full trust. You write the following code to ensure usage of the socket connections.  SocketPermission permission =   new SocketPermission(PermissionState.Unrestricted);  permission.Assert(); Some of the applications that use the class library might not have the necessary permissions to open the network socket connections.You need to cancel the assertion. Which code segment should you use?()A、CodeAccessPermission.RevertAssert();B、CodeAccessPermission.RevertDeny();C、permission.Deny();D、permission.PermitOnly();

考题 单选题You have a computer that runs Windows 7. The computer contains a folder named C:/data. You use Advanced Sharing to share C:/data by using the default share permissions. When a user tries to access theshare over the network, he gets an Access is Denied error message. You need to ensure that the user canaccess the share.  What should you do?()A Allow file and printer sharing through Windows Firewall.B Change the network location from a Public network to a Home or Work network.C From the Security settings of the folder, assign the user the Read NTFS permission.D From the Advanced Sharing settings of the folder, assign the user the Read share permission.

考题 问答题Practice 3  You have read the job advertisement below in a newspaper and you want to apply for the job. Write a letter of application to the manager of the company, Mr. Meed, giving all the necessary personal information. You should write approximately 100 words.  Do not sign your own name at the end of your letter. Use“Wang Lin” instead. You do not need to write the address.

考题 单选题All network servers run Windows Server 2003, and all client computers run Windows XP Professional. Sandra, the manager of the human resources department, asks you to create a shared folder named HRDrop. You create a HRDrop folder on a member server. You assign the Allow - Full Control share permission to the Everyone group. Now you need to configure the NTFS permissions on HRDrop to fulfil the following requirements: 1. Sandra must be able to read, modify, change permissions on, and delete all files and subfolders in HRDrop. 2. All other domain users must only be able to add new files to HRDrop. What should you do?()A Assign the Allow - Modify permission to Sandra. Assign the Allow - Read permission to the Users group.B Assign the Allow - Full Control permission to Sandra. Assign the Allow - Write permission and the Deny - Read and Execute permission to the Users group.C Assign the Allow - Modify permission to Sandra. Assign the Allow - List Folder permission to the Users group.D Assign the Allow - Full Control permission to Sandra. Assign the Allow - Read permission to the Users group.E Assign the Allow - Full Control permission to Sandra. Assign the Allow - Write permission to the Users group and remove the Read and Execute permissions to the Users group.

考题 单选题You have a read-only tablespace on read-only media. You want to perform a media recovery on the existing data files, but using a backup control file. The backup control file indicates that the status of the read-only tablespace was read/write when the control file was backed up. What should you consider?()A  take data files from the read-only tablespace offline before performing a recoveryB  recovery using backup control file is not possible, so restore all the files from the last full database backup, and then open the databaseC  drop the read-only tablespace and re-create the tablespace after recoveryD  perform a recovery; status of the tablespace in control file will be changed automatically

考题 单选题Your network contains an Active Directory domain. The domain contains a member server that runs Windows Server 2008 R2.You have a folder named Data that is located on the C drive. The folder has the default NTFS permissions configured.A support technician shares C:/Data by using the File Sharing Wizard and specifies the default settings.Users report that they cannot access the shared folder.You need to ensure that all domain users can access the share.What should you do?()A Enable access-based enumeration (ABE) on the share.B Assign the Read NTFS permission to the Domain Users group.C From the Network and Sharing Center, enable public folder sharing.D From the File Sharing Wizard, configure the Read permission level for the Domain Users group.

考题 问答题Practice 1  You have read the following advertisement on the Morning Post, an English newspaper.  Write an application letter to the hotel manager. Your letter should include:  (1) reasons for your application  (2) a request for an interview  You should write approximately 100 words. Do not sign your own name at the end of your letter. Use “Wang Lin” instead. You do not need to write the address.

考题 问答题You recently entered a competition for learners of English. You have just received this letter from the organizers of the competition, on which you have written some notes.  Read the letter carefully. Then write a reply giving the information requested and also covering the notes you have written in the letter.  Write a letter of no fewer than 80 words in an appropriate style on the answer sheet. Do not write any addresses.

考题 单选题You have read/write permission on an ordinary file foo. You have just run In foo bar. What would happen if you ran rm foo?()A  foo and bar would both be removed.B  foo would be removed while bar would remain accessible.C  foo would be removed, bar would still exist but would be unusable.D  Both foo and bar would remain accessible.E  You would be asked whether bar should be removed.

考题 单选题One of the tablespaces is read-only in your database. The loss of all control files forced you to re-create the control file. Which operation do you need to perform after re-creating the control file and opening the database?()A  drop and re-create the read-only tablespacesB  rename the read-only data files to their correct file namesC  change the tablespace status from read/write to read-onlyD  re-create the read-only tablespace because it is automatically removed

考题 问答题The extract below comes from an article which appeared in a magazine called Society Today. You read the extract and have strong feelings about its contents, and decide to write an article, in which you respond to the points made and express your own views.  You should write the article in no fewer than 120 words. Now write your letter on the answer sheet.

考题 多选题You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows 2003 Server, and all client computers run Windows XP Professional. A file server named TK1 has two hard drives. You format D:/ and use the default file permissions. Then you copy a directory named Data from another file server to D:/ on TK1. Now you need to create a network share and configure NTFS permissions settings for D:/Data. You must fulfil the following requirements: 1. All domain users need read access to D:/Data. 2. Members of the Sales group need the ability to add and delete files in a directory named D:/Data/Sales. 3. Members of the Engineering group need the ability to read and modify files in a directory named D:/Data/Enginering. Which three actions should you perform?() (Each correct answer presents part of the solution. Choose three)AAssign the Allow - Modify NTFS permission on D:/Data/Sales to the Sales group.BAssign the Allow - Write NTFS permission on D:/Data/Engineering to the Engineering group.CShare D:/Data as Data and use the default share permissions.DShare D:/Data as Data and assign the Allow - Change share permission to the Everyone group.EAssign the Allow - Full Control NTFS permission on D:/Data to the Administrators group.FChange the share permission on D:/Data to assign the Allow - Modify permission to the Everyone group.GAssign the Allow - Read NTFS permission on D:/Data to the Users group.HAssign the Allow - Write NTFS permission on D:/Data/Sales and D:/Data/Engineering to the Creator Owner group.

考题 单选题Your company plans to distribute an application to all of its client computers by using GroupPolicy. You save a file named setup.msi to a local folder on the domain controller. You assign the Authenticated Users group the Read and Read  Execute permissions for the folder. You create a new Group Policy  object (GPO) and a new Computer Configuration software installation package, and you point the package to the setup.msi file in the local folder. You link the GPO to an organizational unit (OU) that contains a computer object for a test client computer. When you log on to the test client computer, you  notice that the application is not installed. You need to ensure that the application is installed on the test computer.  What should you do?()A  Modify the permissions on the folder that contains the setup.msi file so that authenticated users have the List Folder Contents permission. Log off the client computer and then log on.B  Modify the permissions on the folder that contains the setup.msi file so that authenticated users have the List Folder Contents permission. Restart the client computer.C  Place the setup.msi file into a shared folder. Modify the software installation package to point to the shared folder. Log off the client computer and then log on.D  Place the setup.msi file into a shared folder. Modify the software installation package to point to the shared folder. Restart the client computer.

考题 多选题You have enabled backup optimization for the RMAN environment.Identify two criteria on which RMAN will skip the file, if it has already been backed up.()AThe data file backup is done with multiple channelsBThe data files is in the read-write mode after being backed up in the read only modeCThe backup was taken after the data files was taken offline-normal or is in the read only modeDThe data file backup complies with the back retention policy and the backup duplexing feature

考题 单选题One of the tablespaces is read/x7fonly in your database. The loss of all control files forced you to re/x7fcreate the control file.  Which operation do you need to perform after re/x7fcreating the control file and opening the database?()A drop and re­create the read­only tablespacesB rename the read­only data files to their correct file namesC change the tablespace status from read/write to read­onlyD re­create the read­only tablespace because it is automatically removed

考题 多选题You have enabled backup optimization for the RMAN environment. Identify two criteria on which RMAN will skip the file, if it has already been backed up.() (Choose two.)AThe data file backup is done with multiple channelsBThe data files is in the read-write mode after being backed up in the read only modeCThe backup was taken after the data files was taken offline-normal or is in the read only modeDThe data file backup complies with the back retention policy and the backup duplexing feature

考题 问答题Practice 2  ● You work in a company which deals with industrial waste. You have read about a new kind of pump which could save your company thousands of dollars in service and maintenance costs.  ● Write a memo to your Head of Department saying:  ● where you read about the new pump  ● why you think it could be a good investment  ● how you might get more information about it.  ● Write 40—50 words on a separate sheet.